A Survey of Forbidden Configuration Results
نویسنده
چکیده
Let F be a k×` (0,1)-matrix. We say a (0,1)-matrix A has F as a configuration if there is a submatrix of A which is a row and column permutation of F . In the language of sets, a configuration is a trace and in the language of hypergraphs a configuration is a subhypergraph. Let F be a given k × ` (0,1)-matrix. We define a matrix to be simple if it is a (0,1)-matrix with no repeated columns. The matrix F need not be simple. We define forb(m,F ) as the maximum number of columns of any simple m-rowed matrix A which do not contain F as a configuration. Thus if A is an m×n simple matrix which has no submatrix which is a row and column permutation of F then n ≤ forb(m,F ). Or alternatively if A is an m × (forb(m,F ) + 1) simple matrix then A has a submatrix which is a row and column permutation of F . We call F a forbidden configuration. The fundamental result is due to Sauer, Perles and Shelah, Vapnik and Chervonenkis. For Kk denoting the k×2k submatrix of all (0,1)-columns on k rows, then forb(m,Kk) = ( m k−1 ) + ( m k−2 ) + · · · ( m 0 ) . We seek asymptotic results for forb(m,F ) for a fixed F and as m tends to infinity . A conjecture of Anstee and Sali predicts the asymptotically best constructions from which to derive the asymptotics of forb(m,F ). The conjecture has helped guide the research and has been verified for k × ` F with k = 1, 2, 3 and for simple F with k = 4 as well as other cases including ` = 1, 2. We also seek exact values for forb(m,F ).
منابع مشابه
A Survey of Forbidden Configuration Results (Draft)
This paper surveys various results concerning the problem of forbidden configurations (also known as trace in the language of set systems). Let F be a k × ` (0,1)-matrix (the forbidden configuration). We define a matrix to be simple if it is a (0,1)-matrix with no repeated columns. The matrix F need not be simple. We define forb(m,F ) as the maximum number of columns of any simple m-rowed matri...
متن کاملVisual Preferences of Small Urban Parks Based on Spatial Configuration of Place
The importance of small urban parks (SUP) in mega cities has been accepted as an essential component of urban lung and restorative settings. As urban population in the world increases and the cost of maintaining large parks escalates, urban authorities are shifting their attention to creating and maintaining smaller urban parks. However, SUP may present a different ambience due to their locatio...
متن کاملCharacterizing graphs with convex and connected configuration spaces
We define and study exact, efficient representations of realization spaces Euclidean Distance Constraint Systems (EDCS). These are graphs with distance assignments on the edges (frameworks) or graphs with distance interval assignments on the edges. Each representation corresponds to a choice of non-edges or Cayley parameters. The set of realizable distance assignments to the chosen parameters y...
متن کاملRe-embedding a 1-Plane Graph into a Straight-Line Drawing in Linear Time
Thomassen characterized some 1-plane embedding as the forbidden configuration such that a given 1-plane embedding of a graph is drawable in straight-lines if and only if it does not contain the configuration [C. Thomassen, Rectilinear drawings of graphs, J. Graph Theory, 10(3), 335-341, 1988]. In this paper, we characterize some 1-plane embedding as the forbidden configuration such that a given...
متن کاملForbidden Subgraphs for Planar Blict and Blitact Graphs
Many graphs which are encountered in the study of graph theory are characterized by a type of configuration or subgraphs they possess. However, there are occasions when such graphs are more easily defined or described by the kind of subgraphs they are not permitted to contain. Such subgraphs are called forbidden subgraphs. In this paper, we present characterizations of graphs whose blict and bl...
متن کامل