Results 1  10
of
49
A Survey of Combinatorial Gray Codes
 SIAM Review
, 1996
"... The term combinatorial Gray code was introduced in 1980 to refer to any method for generating combinatorial objects so that successive objects differ in some prespecified, small way. This notion generalizes the classical binary reflected Gray code scheme for listing nbit binary numbers so that ..."
Abstract

Cited by 123 (2 self)
 Add to MetaCart
(Show Context)
The term combinatorial Gray code was introduced in 1980 to refer to any method for generating combinatorial objects so that successive objects differ in some prespecified, small way. This notion generalizes the classical binary reflected Gray code scheme for listing nbit binary numbers so that successive numbers differ in exactly one bit position, as well as work in the 1960's and 70's on minimal change listings for other combinatorial families, including permutations and combinations. The area of combinatorial Gray codes was popularized by Herbert Wilf in his invited address at the SIAM Discrete Mathematics Conference in 1988 and his subsequent SIAM monograph in which he posed some open problems and variations on the theme. This resulted in much recent activity in the area and most of the problems posed by Wilf are now solved. In this paper, we survey the area of combinatorial Gray codes, describe recent results, variations, and trends, and highlight some open problems. ...
Diamond: A storage architecture for early discard in interactive search
, 2004
"... Permission is granted for noncommercial reproduction of the work for educational or research purposes. ..."
Abstract

Cited by 66 (21 self)
 Add to MetaCart
(Show Context)
Permission is granted for noncommercial reproduction of the work for educational or research purposes.
Inferring a possibility distribution from empirical data
 Fuzzy Sets and Systems
"... Several transformations from probabilities to possibilities have been proposed. In particular, Dubois and Prade’s procedure produces the most specific possibility distribution among the ones dominating a given probability distribution. In this paper, this method is generalized to the case where the ..."
Abstract

Cited by 18 (2 self)
 Add to MetaCart
(Show Context)
Several transformations from probabilities to possibilities have been proposed. In particular, Dubois and Prade’s procedure produces the most specific possibility distribution among the ones dominating a given probability distribution. In this paper, this method is generalized to the case where the probabilities are unknown, the only information being a data sample represented by a histogram. It is proposed to characterize the probabilities of the different classes by simultaneous confidence intervals with a given confidence level 1 − α. From this imprecise specification, a procedure for constructing a possibility distribution is described, insuring that the resulting possibility distribution will dominate the true probability distribution in at least 100(1 − α) % of the cases. Finally, a simple efficient algorithm is given which makes the computations tractable even if the number of classes is high.
Evolution on distributive lattices
 J THEOR BIOL
, 2006
"... We consider the directed evolution of a population after an intervention that has significantly altered the underlying fitness landscape. We model the space of genotypes as a distributive lattice; the fitness landscape is a realvalued function on that lattice. The risk of escape from intervention ..."
Abstract

Cited by 16 (9 self)
 Add to MetaCart
(Show Context)
We consider the directed evolution of a population after an intervention that has significantly altered the underlying fitness landscape. We model the space of genotypes as a distributive lattice; the fitness landscape is a realvalued function on that lattice. The risk of escape from intervention, i.e., the probability that the population develops an escape mutant before extinction, is encoded in the risk polynomial. Tools from algebraic combinatorics are applied to compute the risk polynomial in terms of the fitness landscape. In an application to the development of drug resistance in HIV, we study the risk of viral escape from treatment with the protease inhibitors ritonavir and indinavir.
E.: Tight performance bounds in the worstcase analysis of feedforward networks
"... feedforward networks ..."
(Show Context)
The Posterior Probability of Bayes Nets with Strong Dependences
 Soft Computing
, 1999
"... Stochastic independence is an idealized relationship located at one end of a continuum of values measuring degrees of dependence. Modeling real world systems, we are often not interested in the distinction between exact independence and any degree of dependence, but between weak ignorable and strong ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
Stochastic independence is an idealized relationship located at one end of a continuum of values measuring degrees of dependence. Modeling real world systems, we are often not interested in the distinction between exact independence and any degree of dependence, but between weak ignorable and strong substantial dependence. Good models map significant deviance from independence and neglect approximate independence or dependence weaker than a noise threshold. This intuition is applied to learning the structure of Bayes nets from data. We determine the conditional posterior probabilities of structures given that the degree of dependence at each of their nodes exceeds a critical noise level. Deviance from independence is measured by mutual information. Arc probabilities are determined by the amount of mutual information the neighbors contribute to a node, is greater than a critical minimum deviance from independence. A Ø 2 approximation for the probability density function of mutual info...
Generating and characterizing the perfect elimination orderings of a chordal graph
, 2003
"... WedevelV a constant time transposition"oraclo for the set of perfectelectdVU orderings of chordal graphs. Using thisoracl; we can generate a Gray code ofal perfectelectd;; orderings in constant amortized time using knownresul: about antimatroids. Using clngd trees, we show how theinitialdW: ..."
Abstract

Cited by 12 (1 self)
 Add to MetaCart
WedevelV a constant time transposition"oraclo for the set of perfectelectdVU orderings of chordal graphs. Using thisoracl; we can generate a Gray code ofal perfectelectd;; orderings in constant amortized time using knownresul: about antimatroids. Using clngd trees, we show how theinitialdW:A: of theald:::Eq can be performedinlerfo time. Weal develB two new characterizations of perfectelectd::qq orderings: one in terms ofchordlqd paths, and the other in terms uv separators.
Abstract A CAT Algorithm for Generating Permutations with a Fixed Number of Inversions
"... We develop a constant amortized time (CAT) algorithm for generating permutations with a given number of inversions. We also develop an algorithm for the generation of permutations with given index. ..."
Abstract

Cited by 9 (0 self)
 Add to MetaCart
(Show Context)
We develop a constant amortized time (CAT) algorithm for generating permutations with a given number of inversions. We also develop an algorithm for the generation of permutations with given index.
A Gray Code for Necklaces of Fixed Density
 SIAM J. Discrete Math
, 1997
"... A necklace is an equivalence class of binary strings under rotation. In this paper, we present a Gray code listing of all nbit necklaces with d ones so that (i) each necklace is listed exactly once by a representative from its equivalence class and (ii) successive representatives, including the las ..."
Abstract

Cited by 8 (0 self)
 Add to MetaCart
A necklace is an equivalence class of binary strings under rotation. In this paper, we present a Gray code listing of all nbit necklaces with d ones so that (i) each necklace is listed exactly once by a representative from its equivalence class and (ii) successive representatives, including the last and the first in the list, differ only by the transposition of two bits. The total time required is O(nN (n; d)), where N (n; d) denotes the number of nbit binary necklaces with d ones. This is the first algorithm for generating necklaces of fixed density which is known to achieve this time bound. 1 Introduction In a combinatorial family, a Gray code is an exhaustive listing of the objects in the family so that successive objects differ only in a small way [Wil]. The classic example is the binary reflected Gray code [Gra], which is a list of all nbit binary strings in which each string differs from its successor in exactly one bit. By applying the binary Gray code, a variety of problems...
Shift Gray Codes
, 2009
"... Combinatorial objects can be represented by strings, such as 21534 for the permutation (1 2) (3 5 4), or 110100 for the binary tree corresponding to the balanced parentheses (()()). Given a string s = s1s2⋯sn, the rightshift operation ��→ shift(s, i, j) replaces the substring sisi+1⋯sj by si+1⋯sjsi ..."
Abstract

Cited by 7 (4 self)
 Add to MetaCart
Combinatorial objects can be represented by strings, such as 21534 for the permutation (1 2) (3 5 4), or 110100 for the binary tree corresponding to the balanced parentheses (()()). Given a string s = s1s2⋯sn, the rightshift operation ��→ shift(s, i, j) replaces the substring sisi+1⋯sj by si+1⋯sjsi. In other words, si is rightshifted into position j by applying the permutation (j j −1 ⋯ i) to the indices of s. Rightshifts include prefixshifts (i = 1) and adjacenttranspositions (j = i + 1). A fixedcontent language is a set of strings that contain the same multiset of symbols. Given a fixedcontent language, a shift Gray code is a list of its strings where consecutive strings differ by a shift. This thesis asks if shift Gray codes exist for a variety of combinatorial objects. This abstract question leads to a number of practical answers. The first prefixshift Gray code for multiset permutations is discovered, and it provides the first algorithm for generating multiset permutations in O(1)time while