2 7 M ay 1 99 8 ENUMERATION SCHEMES AND , MORE IMPORTANTLY , THEIR AUTOMATIC GENERATION
نویسنده
چکیده
It is way too soon to teach our computers how to become full-fledged humans. It is even premature to teach them how to become mathematicians, it is even unwise, at present, to teach them how to become combinatorialists. But the time is ripe to teach them how to become experts in a suitably defined and narrowly focused subarea of combinatorics. In this article, I will describe my efforts to teach my beloved computer, Shalosh B. Ekhad, how to be an enumerator of Wilf classes. Just like the Wright Brothers' first flight, and Len Adelman's first DNA computer (and perhaps like the first Fleischmann-Pons Cold Fusion experiment), the actual accomplishments are very meager. But I do hope to demonstrate feasibility, and jump-start a research area that is not quite part of AI, and not quite algorithmic combinatorics. It is something brand-new, let's call it Artificial Combinatorics (AC). The closest analogy is Deep Blue, but instead of playing Chess, Shalosh will play a game called 'Wilf-class enumeration'. It is still very far from beating the Kasparovs of the area (to name a few), but I am sure that the ultimate version will. With all due respect to Wilf classes and Enumeration, and even to Combinatorics, the main point of this article is not to enhance our understanding of Wilf classes, but to illustrate how much (if not all) of mathematical research will be conducted in a few years. It goes as follow. Have a (as of now, human) mathematician get a brilliant idea. Teach that idea to a computer, and let the computer 'do research' using that idea. Accompanying Software In a sense, this article is a user's manual for the Maple package WILF, available from my homepage http://www.math.temple.edu/~ zeilberg (click on Maple packages and programs, and then download WILF). The empirical version of the rigorous WILF is HERB, also available there. Enumeration Schemes Suppose that we have to find a 'formula' (in the sense of Wilf[Wi], i.e. a polynomial-time algorithm) for computing a n := |A n |, where A n is an infinite family of finite sets, parameterized by n. Usually A n is a natural subset of a larger set B n , and is defined as the set of members of B n that satisfy a certain set of conditions C n. For example if A n is the set of permutations on {1, 2,. .. , n}, …
منابع مشابه
1 6 M ay 2 00 8 Schröder Paths and Pattern Avoiding Partitions
In this paper, we introduce labelling schemes for certain Schröder paths. The two labelling schemes provide bijections between Schröder paths without up steps followed immediately by horizontal steps and τ-avoiding partitions, where τ ∈ {12312, 12321}, and it is exciting to see that some partition statistics can be translated to statistics of the corresponding Schröder paths. As a consequence, ...
متن کامل. da ta - a n ] 7 M ay 1 99 9 Test your surrogate data before you test for nonlinearity
The schemes for the generation of surrogate data in order to test the null hypothesis of linear stochastic process undergoing nonlinear static transform are investigated as to their consistency in representing the null hypothesis. In particular, we pinpoint some important caveats of the prominent algorithm of amplitude adjusted Fourier transform surrogates (AAFT) and compare it to the iterated ...
متن کاملua nt - p h / 96 10 03 1 v 3 1 9 M ay 1 99 7 Correcting the effects of spontaneous emission on cold - trapped ions
We propose two quantum error correction schemes which increase the maximum storage time for qubits in a system of cold trapped ions, using a minimal number of ancillary qubits. Both schemes consider only the errors introduced by the decoherence due to spontaneous emission from the upper levels of the ions. Continuous monitoring of the ion fluorescence is used in conjunction with selective coher...
متن کاملEnumeration Schemes for Words Avoiding Permutations
The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching method is that of enumeration schemes, introduced by Zeilberger and extended by Vatter. In this paper we further extend the method of enumeration schemes to words avoiding permutation patterns. The process of finding enumeration schemes is programmable and allows for the automatic enumer...
متن کامل/ 99 05 02 6 v 1 6 M ay 1 99 9 April , 1999 The Faddeev - Jackiw Approach and the Affine sl ( 2 ) Toda Model Coupled to Matter Field
The affine sl 2 Toda model coupled to matter field is treated as a constrained system in the context of Faddeev-Jackiw and the (constrained) symplectic schemes. We recover from this theory either, the sine-Gordon or the massive Thirring model, through a process of Hamiltonian reduction, considering the equivalence of the Noether and topological currrents as a constraint and symmetry breaking of...
متن کامل