Traces of Uniform Families of Sets
نویسنده
چکیده
The trace of a set F on a another set X is F |X = F ∩ X and the trace of a family F of sets on X is FX = {F |X : F ∈ F}. In this note we prove that if a k-uniform family F ⊂ ([n] k ) has the property that for any k-subset X the trace F|X does not contain a maximal chain (a family C0 ⊂ C1 ⊂ ... ⊂ Ck with |Ci| = i), then |F| ≤ ( n−1 k−1 ) . This bound is sharp as shown by {F ∈ ([n] k ) , 1 ∈ F}. Our proof gives also the stability of the extremal family.
منابع مشابه
Degrees of M-fuzzy families of independent L-fuzzy sets
The present paper studies fuzzy matroids in view of degree. First wegeneralize the notion of $(L,M)$-fuzzy independent structure byintroducing the degree of $M$-fuzzy family of independent $L$-fuzzysets with respect to a mapping from $L^X$ to $M$. Such kind ofdegrees is proved to satisfy some axioms similar to those satisfiedby $(L,M)$-fuzzy independent structure. ...
متن کاملUniform connectedness and uniform local connectedness for lattice-valued uniform convergence spaces
We apply Preuss' concept of $mbbe$-connectedness to the categories of lattice-valued uniform convergence spaces and of lattice-valued uniform spaces. A space is uniformly $mbbe$-connected if the only uniformly continuous mappings from the space to a space in the class $mbbe$ are the constant mappings. We develop the basic theory for $mbbe$-connected sets, including the product theorem. Furtherm...
متن کاملAsymmetric Uniform-Laplace Distribution: Properties and Applications
‎The goal of this study is to introduce an Asymmetric Uniform-Laplace (AUL) distribution‎. ‎We present a detailed theoretical description of this distribution‎. ‎We try to estimate the parameters of AUL distribution using the maximum likelihood method‎. ‎Since the likelihood approach results in complicated forms‎, ‎we suggest a bootstrap-based approach for es...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملMaximal Intersecting Families of Finite Sets and «uniform Hjelmslev Planes
The following theorem is proved. The collection of lines of an n-uniform projective Hjelmslev plane is maximal when considered as a collectiion of mutually intersecting sets of equal cardinality.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. J. Comb.
دوره 16 شماره
صفحات -
تاریخ انتشار 2009