-
Proving the 5-Engel identity in the 2-generator group of exponent four
Authors:
Colin Ramsay
Abstract:
It is known that the fifth Engel word $E_5$ is trivial in the 2-generator group of exponent four $B(2,4)$, and so can be written as a product of fourth powers. Explicit products of 250 and 28 powers are known, using fourth powers of words up to lengths four and ten respectively. Using a reduction technique based on the recursive enumerability of the set of trivial words in a finite presentation we…
▽ More
It is known that the fifth Engel word $E_5$ is trivial in the 2-generator group of exponent four $B(2,4)$, and so can be written as a product of fourth powers. Explicit products of 250 and 28 powers are known, using fourth powers of words up to lengths four and ten respectively. Using a reduction technique based on the recursive enumerability of the set of trivial words in a finite presentation we were able to rewrite $E_5$ as a product of 26 fourth powers of words up to length five.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
Implicit Polarized F: local type inference for impredicativity
Authors:
Henry Mercer,
Cameron Ramsay,
Neel Krishnaswami
Abstract:
System F, the polymorphic lambda calculus, features the principle of impredicativity: polymorphic types may be (explicitly) instantiated at other types, enabling many powerful idioms such as Church encoding and data abstraction. Unfortunately, type applications need to be implicit for a language to be human-usable, and the problem of inferring all type applications in System F is undecidable. As a…
▽ More
System F, the polymorphic lambda calculus, features the principle of impredicativity: polymorphic types may be (explicitly) instantiated at other types, enabling many powerful idioms such as Church encoding and data abstraction. Unfortunately, type applications need to be implicit for a language to be human-usable, and the problem of inferring all type applications in System F is undecidable. As a result, language designers have historically avoided impredicative type inference.
We reformulate System F in terms of call-by-push-value, and study type inference for it. Surprisingly, this new perspective yields a novel type inference algorithm which is extremely simple to implement (not even requiring unification), infers many types, and has a simple declarative specification. Furthermore, our approach offers type theoretic explanations of how many of the heuristics used in existing algorithms for impredicative polymorphism arise.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
If you Cheat, I Cheat: Cheating on a Collaborative Task with a Social Robot
Authors:
Ali Ayub,
Huiqing Hu,
Guangwei Zhou,
Carter Fendley,
Crystal Ramsay,
Kathy Lou Jackson,
Alan R. Wagner
Abstract:
Robots may soon play a role in higher education by augmenting learning environments and managing interactions between instructors and learners. Little, however, is known about how the presence of robots in the learning environment will influence academic integrity. This study therefore investigates if and how college students cheat while engaged in a collaborative sorting task with a robot. We emp…
▽ More
Robots may soon play a role in higher education by augmenting learning environments and managing interactions between instructors and learners. Little, however, is known about how the presence of robots in the learning environment will influence academic integrity. This study therefore investigates if and how college students cheat while engaged in a collaborative sorting task with a robot. We employed a 2x2 factorial design to examine the effects of cheating exposure (exposure to cheating or no exposure) and task clarity (clear or vague rules) on college student cheating behaviors while interacting with a robot. Our study finds that prior exposure to cheating on the task significantly increases the likelihood of cheating. Yet, the tendency to cheat was not impacted by the clarity of the task rules. These results suggest that normative behavior by classmates may strongly influence the decision to cheat while engaged in an instructional experience with a robot.
△ Less
Submitted 30 June, 2021;
originally announced July 2021.
-
Listing Words in Free Groups
Authors:
Colin Ramsay
Abstract:
Lists of equivalence classes of words under rotation or rotation plus reversal (i.e., necklaces and bracelets) have many uses, and efficient algorithms for generating these lists exist. In combinatorial group theory elements of a group are typically written as words in the generators and their inverses, and necklaces and bracelets correspond to conjugacy classes and relators respectively. We prese…
▽ More
Lists of equivalence classes of words under rotation or rotation plus reversal (i.e., necklaces and bracelets) have many uses, and efficient algorithms for generating these lists exist. In combinatorial group theory elements of a group are typically written as words in the generators and their inverses, and necklaces and bracelets correspond to conjugacy classes and relators respectively. We present algorithms to generate lists of freely and cyclically reduced necklaces and bracelets in free groups. Experimental evidence suggests that these algorithms are CAT -- that is, they run in constant amortized time.
△ Less
Submitted 25 June, 2017;
originally announced June 2017.
-
Writing Commutators of Commutators as Products of Cubes
Authors:
Colin Ramsay
Abstract:
It is known that commutators of commutators can be written as products of cubes, with the current upper bound on the number of cubes being 60. We discuss how proofs extracted via coset enumeration can be used to investigate this problem, and exhibit a rewriting using only 14 cubes.
It is known that commutators of commutators can be written as products of cubes, with the current upper bound on the number of cubes being 60. We discuss how proofs extracted via coset enumeration can be used to investigate this problem, and exhibit a rewriting using only 14 cubes.
△ Less
Submitted 28 July, 2015;
originally announced July 2015.
-
3D eclipse map** in AM Herculis systems - `Genetically modified fireflies'
Authors:
Pasi J. Hakala Mark Cropper Gavin Ramsay
Abstract:
In order to map the 3-dimensional location and shape of the emission originating within the accretion stream in AM Her systems, we have investigated the possibilities of relaxing the hitherto-applied constraint of a predetermined stream trajectory in modelling the eclipse profiles. We use emission points which can be located anywhere in the Roche lobe of the primary, together with a regularisati…
▽ More
In order to map the 3-dimensional location and shape of the emission originating within the accretion stream in AM Her systems, we have investigated the possibilities of relaxing the hitherto-applied constraint of a predetermined stream trajectory in modelling the eclipse profiles. We use emission points which can be located anywhere in the Roche lobe of the primary, together with a regularisation term which favours any curved stream structure, connected at the secondary and white dwarf primary. Our results show that, given suitable regularisation constraints, such inversion is feasible. We investigate the effect of removing the regularisation term, and also the sensitivity of the fit to input parameters such as inclination.
△ Less
Submitted 17 April, 2002;
originally announced April 2002.