Permutations resilient to deletions

نویسندگان

  • Noga Alon
  • Steve Butler
  • Ron Graham
  • Utkrisht C. Rajkumar
چکیده

Let σ be a permutation on [n] = {1, 2, . . . , n} which can be written in two-line notation, and let φ : [n] → S be a bijection. Construct τ (resp. β) by replacing the elements in σ as dictated by φ and then deleting up to d elements in the top (resp. bottom) line and contracting the result, making sure no symbol is deleted in both lines. The permutation σ is d-resilient if τ and β always uniquely determine φ (or equivalently, determine where the deletions in the top and bottom lines occurred). Necessary and sufficient conditions for a permutation to be d-resilient are established in terms of whether a family of auxiliary graphs are acyclic. Also, constructions are given for d-resilient permutations which have size n exponential in d, this is best possible. It is further shown that for every fixed d and sufficiently large n a positive portion of all permutations of n elements are d-resilient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilient Monotone Sequential Maximization

Applications in machine learning, optimization, andcontrol require the sequential selection of a few system elements,such as sensors, data, or actuators, to optimize the systemperformance across multiple time steps. However, in failure-proneand adversarial environments, sensors get attacked, data getdeleted, and actuators fail. Thence, traditional sequential designparadi...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

Reconstructing compositions

We consider the problem of reconstructing compositions of an integer from their subcompositions, which was raised by Raykova (albeit disguised as a question about layered permutations). We show that every composition w of n ≥ 3k+1 can be reconstructed from its set of k-deletions, i.e., the set of all compositions of n− k contained in w. As there are compositions of 3k with the same set of k-del...

متن کامل

Resilient Non-Submodular Maximization over Matroid Constraints

Applications in control, robotics, and optimizationmotivate the design of systems by selecting system elements,such as actuators, sensors, or data, subject to complex designconstraints that require the system elements not only to bea few in number, but also, to satisfy heterogeneity or global-interdependency constraints; in particular, matroid constraints.However, in fai...

متن کامل

Mathematics of Evolution and Phylogeny

Gene-order data have been used successfully to reconstruct organellar phylogenies; they offer low error rates, the potential to reach farther back in time than through DNA sequences (because genome-level events are rarer than DNA point mutations), and immunity from the so-called gene-tree vs. species-tree problem (caused by the fact that the evolutionary history of specific genes is not isomorp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017