-
The CFG Complexity of Singleton Sets
Abstract: Let G be a context-free grammar (CFG) in Chomsky normal form. We take the number of rules in G to be the size of G. We also assume all CFGs are in Chomsky normal form. We consider the question of, given a string w of length n, what is the smallest CFG such that L(G)={w}? We show the following: 1) For all w, |w|=n, there is a CFG of size with O(n/log n) rules, such that L(G)={w}. 2) There exi… ▽ More
Submitted 31 May, 2024; v1 submitted 30 May, 2024; originally announced May 2024.
Comments: Most results already known
MSC Class: F.4
-
arXiv:2111.08916 [pdf, ps, other]
Alternative Paradigms of Computation
Abstract: With Moore's law coming to a close it is useful to look at other forms of computer hardware. In this paper we survey what is known about several modes of computation: Neuromorphic, Custom Logic, Quantum, Optical, Spintronics, Reversible, Many-Valued Logic, Chemical, DNA, Neurological, Fluidic, Amorphous, Thermodynamic, Peptide, and Membrane. For each of these modes of computing we discuss pros, co… ▽ More
Submitted 17 November, 2021; originally announced November 2021.
ACM Class: F.m
-
An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm
Abstract: One of the most significant challenges on cryptography today is the problem of factoring large integers since there are no algorithms that can factor in polynomial time, and factoring large numbers more than some limits(200 digits) remain difficult. The security of the current cryptosystems depends on the hardness of factoring large public keys. In this work, we want to implement two existing fact… ▽ More
Submitted 4 November, 2021; originally announced November 2021.
-
arXiv:1507.08497 [pdf, ps, other]
Which Unbounded Protocol for Envy Free Cake Cutting is Better?
Abstract: A division of a cake by n people is envy free if everyone thinks they got the biggest pieces. Note that peoples tastes can differ. There is a discrete protocol for envy free division for n=3 which takes at most 5 cuts. For n=4 and beyond there is a protocol but the number of cuts it takes is unbounded. In particular the number of cuts depends on peoples tastes. Given any number N peoples tastes ca… ▽ More
Submitted 21 August, 2015; v1 submitted 28 July, 2015; originally announced July 2015.
-
arXiv:1503.08847 [pdf, ps, other]
On the Sizes of DPDAs, PDAs, LBAs
Abstract: There are languages A such that there is a Pushdown Automata (PDA) that recognizes A which is much smaller than any Deterministic Pushdown Automata (DPDA) that recognizes A. There are languages A such that there is a Linear Bounded Automata (Linear Space Turing Machine, henceforth LBA) that recognizes A which is much smaller than ny PDA that recognizes A. There are languages A such that both A and… ▽ More
Submitted 15 July, 2015; v1 submitted 30 March, 2015; originally announced March 2015.
ACM Class: F.1.1
-
arXiv:1407.5128 [pdf, ps, other]
A Sane Proof that COLk \le COL3
Abstract: Let COLk be the set of all k-colorable graphs. It is easy to show that if a<b then COLa \le COLb (poly time reduction). Using the Cook-Levin theorem it is easy to show that if 3 \le a< b then COLb \le COLa. However this proof is insane in that it translates a graph to a formula and then the formula to a graph. We give a simple proof that COLk \le COL3.
Submitted 27 January, 2016; v1 submitted 18 July, 2014; originally announced July 2014.
ACM Class: F.1.3
-
arXiv:1401.6734 [pdf, ps, other]
Distinct volume subsets
Abstract: Suppose that $a$ and $d$ are positive integers with $a \geq 2$. Let $h_{a,d}(n)$ be the largest integer $t$ such that any set of $n$ points in $\mathbb{R}^d$ contains a subset of $t$ points for which all the non-zero volumes of the ${t \choose a}$ subsets of order $a$ are distinct. Beginning with Erdős in 1957, the function $h_{2,d}(n)$ has been closely studied and is known to be at least a power… ▽ More
Submitted 10 May, 2015; v1 submitted 26 January, 2014; originally announced January 2014.
Comments: 10 pages
Journal ref: SIAM Journal on Discrete Math 29(1), pp. 472-480 (2014)
-
arXiv:1205.3813 [pdf, ps, other]
An NP-Complete Problem in Grid Coloring
Abstract: A c-coloring of G(n,m)=n x m is a map** of G(n,m) into {1,...,c} such that no four corners forming a rectangle have the same color. In 2009 a challenge was proposed via the internet to find a 4-coloring of G(17,17). This attracted considerable attention from the popular mathematics community. A coloring was produced; however, finding it proved to be difficult. The question arises: is the problem… ▽ More
Submitted 9 December, 2022; v1 submitted 16 May, 2012; originally announced May 2012.
Comments: 35 pages
MSC Class: 68Q17; 03F20 ACM Class: F.2.2; F.4.1
-
arXiv:1108.3347 [pdf, ps, other]
Proving programs terminate using well orderings, Ramsey Theory, and Matrices
Abstract: Many programs allow the user to input data several times during its execution. If the program runs forever the user may input data infinitely often. A program terminates if it terminates no matter what the user does. We discuss various ways to prove that program terminates. The proofs use well orderings, Ramsey Theory, and Matrices. These techniques are used by real program checkers.
Submitted 3 November, 2014; v1 submitted 16 August, 2011; originally announced August 2011.
Comments: While this is classified under Combinatorics (to tell combinatorists that someone is using their stuff) it should also be of interest to Logicians and Computer Scientists
MSC Class: 68N30; 05D10; 03F35 ACM Class: B.7.2
-
arXiv:cs/0411076 [pdf, ps, other]
Lower bounds on the Deterministic and Quantum Communication Complexity of Hamming Distance
Abstract: Alice and Bob want to know if two strings of length n are almost equal. That is, do they differ on \textit{at most} a bits? Let 0\leq a\leq n-1. We show that any deterministic protocol, as well as any error-free quantum protocol (C* version), for this problem requires at least n-2 bits of communication. We show the same bounds for the problem of determining if two strings differ in exactly a bits.… ▽ More
Submitted 12 January, 2015; v1 submitted 20 November, 2004; originally announced November 2004.
Comments: 12 pages, this version to appear in ACM Transactions on Computation Theory