From 5ca056923b7d320fce80abd9044c895fa7e58dae Mon Sep 17 00:00:00 2001
From: Ruth Hoffmann A permutation pattern class package
Email: rh347@icloud.com
-
Homepage: TODO
-
Address:
TODO
+
Homepage: https://rh347.host.cs.st-andrews.ac.uk/
+
Address:
Ruth Hoffmann
School of Computer Science,
University of St. Andrews,
North Haugh,
St. Andrews,
Fife,
KY16 9SS,
SCOTLAND
Steve Linton
diff --git a/doc/chap0.txt b/doc/chap0.txt
index b282f78..5c18aa2 100644
--- a/doc/chap0.txt
+++ b/doc/chap0.txt
@@ -22,8 +22,15 @@
Ruth Hoffmann
Email: [7Xmailto:rh347@icloud.com[107X
- Homepage: [7XTODO[107X
- Address: [33X[0;14YTODO[133X
+ Homepage: [7Xhttps://rh347.host.cs.st-andrews.ac.uk/[107X
+ Address: [33X[0;14YRuth Hoffmann[133X
+ [33X[0;14YSchool of Computer Science,[133X
+ [33X[0;14YUniversity of St. Andrews,[133X
+ [33X[0;14YNorth Haugh,[133X
+ [33X[0;14YSt. Andrews,[133X
+ [33X[0;14YFife,[133X
+ [33X[0;14YKY16 9SS,[133X
+ [33X[0;14YSCOTLAND[133X
Steve Linton
diff --git a/doc/chap0_mj.html b/doc/chap0_mj.html
index 1c6737c..0b7dabf 100644
--- a/doc/chap0_mj.html
+++ b/doc/chap0_mj.html
@@ -6,7 +6,7 @@
A permutation pattern class package
Email: rh347@icloud.com
-
Homepage: TODO
-
Address:
TODO
+
Homepage: https://rh347.host.cs.st-andrews.ac.uk/
+
Address:
Ruth Hoffmann
School of Computer Science,
University of St. Andrews,
North Haugh,
St. Andrews,
Fife,
KY16 9SS,
SCOTLAND
Steve Linton
diff --git a/doc/chap1.html b/doc/chap1.html
index 5cb686c..a14cee9 100644
--- a/doc/chap1.html
+++ b/doc/chap1.html
@@ -26,13 +26,13 @@
1 Introduction
-
Token passing networks (TPNs) are directed graphs with nodes that can hold at most one token. Also each graph has a designated input node, which generates an ordered sequence of numbered tokens and a designated output node that collects the tokens in the order they arrive at it. The input node has no incoming edges, whereas the output node has no outgoing edges. A token t travels through the graph, from node to node, if there is an edge connecting the nodes, if the node the token is moving from is either the input node and the tokens 1, ..., t-1 have been released or the node is not the output node, and lastly if the destination node contains no token or it is the output node. [3]
+Token passing networks (TPNs) are directed graphs with nodes that can hold at most one token. Also each graph has a designated input node, which generates an ordered sequence of numbered tokens and a designated output node that collects the tokens in the order they arrive at it. The input node has no incoming edges, whereas the output node has no outgoing edges. A token t travels through the graph, from node to node, if there is an edge connecting the nodes, if the node the token is moving from is either the input node and the tokens 1, ..., t-1 have been released or the node is not the output node, and lastly if the destination node contains no token or it is the output node. [ALTd.]
-The set of permutations resulting from a TPN is closed under the property of containment. A permutation a contains a permutation b of shorter length if in a there is a subsequence that is isomorphic to b. This class of permutations can be represented by its anti-chain, which in this context is called the basis. [2]
+The set of permutations resulting from a TPN is closed under the property of containment. A permutation a contains a permutation b of shorter length if in a there is a subsequence that is isomorphic to b. This class of permutations can be represented by its anti-chain, which in this context is called the basis. [AAR03]
-To enhance the computability of permutation pattern classes, each permutation can be encoded, using the so called rank encoding. For a permutation p_1 ... p_n, it is the sequence e_1... e_n where e_i is the rank of p_i among {p_i,p_i+1,...,p_n}. It can be shown that the sets of encoded permutations of the class and the basis, both are a rational languages. Rational languages can be represented by automata. [2]
+To enhance the computability of permutation pattern classes, each permutation can be encoded, using the so called rank encoding. For a permutation p_1 ... p_n, it is the sequence e_1... e_n where e_i is the rank of p_i among {p_i,p_i+1,...,p_n}. It can be shown that the sets of encoded permutations of the class and the basis, both are a rational languages. Rational languages can be represented by automata. [AAR03]
-There is another approach to get from TPNs to their corresponding automata. Namely building equivalence classes from TPNs using the different dispositions of tokens within them. These equivalence classes of dispositions and the rank encoding of the permutations allow to build the same rational language as from the process above. [3]
+There is another approach to get from TPNs to their corresponding automata. Namely building equivalence classes from TPNs using the different dispositions of tokens within them. These equivalence classes of dispositions and the rank encoding of the permutations allow to build the same rational language as from the process above. [ALTd.]
diff --git a/doc/chap1.txt b/doc/chap1.txt index a78c85f..640f591 100644 --- a/doc/chap1.txt +++ b/doc/chap1.txt @@ -10,24 +10,24 @@ connecting the nodes, if the node the token is moving from is either the input node and the tokens [22X1, ..., t-1[122X have been released or the node is not the output node, and lastly if the destination node contains no token or it - is the output node. [3][133X + is the output node. [ALTd.][133X [33X[0;0YThe set of permutations resulting from a TPN is closed under the property of containment. A permutation [22Xa[122X contains a permutation [22Xb[122X of shorter length if in [22Xa[122X there is a subsequence that is isomorphic to [22Xb[122X. This class of permutations can be represented by its anti-chain, which in this context is - called the basis. [2][133X + called the basis. [AAR03][133X [33X[0;0YTo enhance the computability of permutation pattern classes, each permutation can be encoded, using the so called rank encoding. For a permutation [22Xp_1 ... p_n[122X, it is the sequence [22Xe_1... e_n[122X where [22Xe_i[122X is the rank of [22Xp_i[122X among [22X{p_i,p_i+1,...,p_n}[122X. It can be shown that the sets of encoded permutations of the class and the basis, both are a rational languages. - Rational languages can be represented by automata. [2][133X + Rational languages can be represented by automata. [AAR03][133X [33X[0;0YThere is another approach to get from TPNs to their corresponding automata. Namely building equivalence classes from TPNs using the different dispositions of tokens within them. These equivalence classes of dispositions and the rank encoding of the permutations allow to build the - same rational language as from the process above. [3][133X + same rational language as from the process above. [ALTd.][133X diff --git a/doc/chap10_mj.html b/doc/chap10_mj.html index e26d8c7..5697c5c 100644 --- a/doc/chap10_mj.html +++ b/doc/chap10_mj.html @@ -6,7 +6,7 @@Token passing networks (TPNs) are directed graphs with nodes that can hold at most one token. Also each graph has a designated input node, which generates an ordered sequence of numbered tokens and a designated output node that collects the tokens in the order they arrive at it. The input node has no incoming edges, whereas the output node has no outgoing edges. A token \(t\) travels through the graph, from node to node, if there is an edge connecting the nodes, if the node the token is moving from is either the input node and the tokens \(1, \ldots, t-1\) have been released or the node is not the output node, and lastly if the destination node contains no token or it is the output node. [3]
+Token passing networks (TPNs) are directed graphs with nodes that can hold at most one token. Also each graph has a designated input node, which generates an ordered sequence of numbered tokens and a designated output node that collects the tokens in the order they arrive at it. The input node has no incoming edges, whereas the output node has no outgoing edges. A token \(t\) travels through the graph, from node to node, if there is an edge connecting the nodes, if the node the token is moving from is either the input node and the tokens \(1, \ldots, t-1\) have been released or the node is not the output node, and lastly if the destination node contains no token or it is the output node. [ALTd.]
-The set of permutations resulting from a TPN is closed under the property of containment. A permutation \(a\) contains a permutation \(b\) of shorter length if in \(a\) there is a subsequence that is isomorphic to \(b\). This class of permutations can be represented by its anti-chain, which in this context is called the basis. [2]
+The set of permutations resulting from a TPN is closed under the property of containment. A permutation \(a\) contains a permutation \(b\) of shorter length if in \(a\) there is a subsequence that is isomorphic to \(b\). This class of permutations can be represented by its anti-chain, which in this context is called the basis. [AAR03]
-To enhance the computability of permutation pattern classes, each permutation can be encoded, using the so called rank encoding. For a permutation \(p_{1} \ldots p_{n}\), it is the sequence \(e_{1}\ldots e_{n}\) where \(e_{i}\) is the rank of \(p_{i}\) among \(\{p_{i},p_{i+1},\ldots,p_{n}\}\). It can be shown that the sets of encoded permutations of the class and the basis, both are a rational languages. Rational languages can be represented by automata. [2]
+To enhance the computability of permutation pattern classes, each permutation can be encoded, using the so called rank encoding. For a permutation \(p_{1} \ldots p_{n}\), it is the sequence \(e_{1}\ldots e_{n}\) where \(e_{i}\) is the rank of \(p_{i}\) among \(\{p_{i},p_{i+1},\ldots,p_{n}\}\). It can be shown that the sets of encoded permutations of the class and the basis, both are a rational languages. Rational languages can be represented by automata. [AAR03]
-There is another approach to get from TPNs to their corresponding automata. Namely building equivalence classes from TPNs using the different dispositions of tokens within them. These equivalence classes of dispositions and the rank encoding of the permutations allow to build the same rational language as from the process above. [3]
+There is another approach to get from TPNs to their corresponding automata. Namely building equivalence classes from TPNs using the different dispositions of tokens within them. These equivalence classes of dispositions and the rank encoding of the permutations allow to build the same rational language as from the process above. [ALTd.]
diff --git a/doc/chap2.html b/doc/chap2.html index e79ae6c..2e2bf83 100644 --- a/doc/chap2.html +++ b/doc/chap2.html @@ -35,7 +35,7 @@A token passing network is a directed graph with a designated input node and a designated output node. The input node has no incoming edges whereas the output node has no outgoing edges. Also the input node generates a sequence of tokens, labelled 1, 2, 3, ... . These tokens are passed on to the nodes within the graph, where each node, apart from the input and output node, can hold at most one token at any time. The edges do not hold tokens but are there to pass them on. The following must hold if a token t moves from the node x to the node y.
-There is an edge from x to y; x is the input node, and the tokens 1, 2, 3, ... , t-1 have been moved, or x is any other node but not the output node; lastly either y is the output node or y is not the input node and currently is not occupied by a token. [3]
+There is an edge from x to y; x is the input node, and the tokens 1, 2, 3, ... , t-1 have been moved, or x is any other node but not the output node; lastly either y is the output node or y is not the input node and currently is not occupied by a token. [ALTd.]
Token passing networks, or TPNs, are represented in GAP as a list. Each entry of the list is the index of the node within the TPN and contains a list of the "destinations", i.e. the end of the edge or arrow where it is directed to.
diff --git a/doc/chap2.txt b/doc/chap2.txt index 3c26a91..23d1d0e 100644 --- a/doc/chap2.txt +++ b/doc/chap2.txt @@ -13,7 +13,7 @@ [33X[0;0YThere is an edge from [22Xx[122X to [22Xy[122X; [22Xx[122X is the input node, and the tokens 1, 2, 3, ... , [22Xt-1[122X have been moved, or [22Xx[122X is any other node but not the output node; lastly either [22Xy[122X is the output node or [22Xy[122X is not the input node and currently - is not occupied by a token. [3][133X + is not occupied by a token. [ALTd.][133X [33X[0;0YToken passing networks, or TPNs, are represented in [5XGAP[105X as a list. Each entry of the list is the index of the node within the TPN and contains a diff --git a/doc/chap2_mj.html b/doc/chap2_mj.html index 8659cc5..4b66d85 100644 --- a/doc/chap2_mj.html +++ b/doc/chap2_mj.html @@ -6,7 +6,7 @@A token passing network is a directed graph with a designated input node and a designated output node. The input node has no incoming edges whereas the output node has no outgoing edges. Also the input node generates a sequence of tokens, labelled 1, 2, 3, ... . These tokens are passed on to the nodes within the graph, where each node, apart from the input and output node, can hold at most one token at any time. The edges do not hold tokens but are there to pass them on. The following must hold if a token \(t\) moves from the node \(x\) to the node \(y\).
-There is an edge from \(x\) to \(y\); \(x\) is the input node, and the tokens 1, 2, 3, ... , \(t-1\) have been moved, or \(x\) is any other node but not the output node; lastly either \(y\) is the output node or \(y\) is not the input node and currently is not occupied by a token. [3]
+There is an edge from \(x\) to \(y\); \(x\) is the input node, and the tokens 1, 2, 3, ... , \(t-1\) have been moved, or \(x\) is any other node but not the output node; lastly either \(y\) is the output node or \(y\) is not the input node and currently is not occupied by a token. [ALTd.]
Token passing networks, or TPNs, are represented in GAP as a list. Each entry of the list is the index of the node within the TPN and contains a list of the "destinations", i.e. the end of the edge or arrow where it is directed to.
diff --git a/doc/chap3.html b/doc/chap3.html index cddfe65..d12331b 100644 --- a/doc/chap3.html +++ b/doc/chap3.html @@ -33,7 +33,7 @@A permutation π=π_1 ... π_n has rank encoding p_1 ... p_n where p_i= |{j : j ≥ i, π_j ≤ π_i } |. In other words the rank encoded permutation is a sequence of p_i with 1≤ i≤ n, where p_i is the rank of π_i in {π_i,π_i+1,... ,π_n}. [2]
+A permutation π=π_1 ... π_n has rank encoding p_1 ... p_n where p_i= |{j : j ≥ i, π_j ≤ π_i } |. In other words the rank encoded permutation is a sequence of p_i with 1≤ i≤ n, where p_i is the rank of π_i in {π_i,π_i+1,... ,π_n}. [AAR03]
The encoding of the permutation 3 2 5 1 6 7 4 8 9 is done as follows:
diff --git a/doc/chap3.txt b/doc/chap3.txt index 65d169f..c689a8d 100644 --- a/doc/chap3.txt +++ b/doc/chap3.txt @@ -4,21 +4,21 @@ [33X[0;0YA permutation [22Xπ=π_1 ... π_n[122X has rank encoding [22Xp_1 ... p_n[122X where [22Xp_i= |{j : j ≥ i, π_j ≤ π_i } |[122X. In other words the rank encoded permutation is a sequence of [22Xp_i[122X with [22X1≤ i≤ n[122X, where [22Xp_i[122X is the rank of [22Xπ_i[122X in [22X{π_i,π_i+1,... - ,π_n}[122X. [2][133X + ,π_n}[122X. [AAR03][133X [33X[0;0YThe encoding of the permutation 3 2 5 1 6 7 4 8 9 is done as follows:[133X - Permutation │ Encoding │ Assisting list - 325167489 │ [22X∅[122X │ 123456789 - 25167489 │ 3 │ 12456789 - 5167489 │ 32 │ 1456789 - 167489 │ 323 │ 146789 - 67489 │ 3231 │ 46789 - 7489 │ 32312 │ 4789 - 489 │ 323122 │ 489 - 89 │ 3231221 │ 89 - 9 │ 32312211 │ 9 - [22X∅[122X │ 323122111 │ [22X∅[122X + Permutation │ Encoding │ Assisting list + 325167489 │ [22X∅[122X │ 123456789 + 25167489 │ 3 │ 12456789 + 5167489 │ 32 │ 1456789 + 167489 │ 323 │ 146789 + 67489 │ 3231 │ 46789 + 7489 │ 32312 │ 4789 + 489 │ 323122 │ 489 + 89 │ 3231221 │ 89 + 9 │ 32312211 │ 9 + [22X∅[122X │ 323122111 │ [22X∅[122X [33X[0;0YDecoding a permutation is done in a similar fashion, taking the sequence [22Xp_1 ... p_n[122X and using the reverse process will lead to the permutation [22Xπ=π_1 ... @@ -27,17 +27,17 @@ [33X[0;0YThe sequence 3 2 3 1 2 2 1 1 1 is decoded as:[133X - Encoding │ Permutation │ Assisting list - 323122111 │ [22X∅[122X │ 123456789 - 23122111 │ 3 │ 12456789 - 3122111 │ 32 │ 1456789 - 122111 │ 325 │ 146789 - 22111 │ 3251 │ 46789 - 2111 │ 32516 │ 4789 - 111 │ 325167 │ 489 - 11 │ 3251674 │ 89 - 1 │ 32516748 │ 9 - [22X∅[122X │ 325167489 │ [22X∅[122X + Encoding │ Permutation │ Assisting list + 323122111 │ [22X∅[122X │ 123456789 + 23122111 │ 3 │ 12456789 + 3122111 │ 32 │ 1456789 + 122111 │ 325 │ 146789 + 22111 │ 3251 │ 46789 + 2111 │ 32516 │ 4789 + 111 │ 325167 │ 489 + 11 │ 3251674 │ 89 + 1 │ 32516748 │ 9 + [22X∅[122X │ 325167489 │ [22X∅[122X [1X3.1 [33X[0;0YEncoding and Decoding[133X[101X diff --git a/doc/chap3_mj.html b/doc/chap3_mj.html index d659d3d..44eaa0c 100644 --- a/doc/chap3_mj.html +++ b/doc/chap3_mj.html @@ -6,7 +6,7 @@A permutation \(\pi=\pi_{1} \ldots \pi_{n}\) has rank encoding \(p_{1} \ldots p_{n}\) where \( p_{i}= |\{j : j \geq i, \pi_{j} \leq \pi_{i} \} | \). In other words the rank encoded permutation is a sequence of \(p_{i}\) with \(1\leq i\leq n\), where \(p_{i}\) is the rank of \(\pi_{i}\) in \(\{\pi_{i},\pi_{i+1},\ldots ,\pi_{n}\}\). [2]
+A permutation \(\pi=\pi_{1} \ldots \pi_{n}\) has rank encoding \(p_{1} \ldots p_{n}\) where \( p_{i}= |\{j : j \geq i, \pi_{j} \leq \pi_{i} \} | \). In other words the rank encoded permutation is a sequence of \(p_{i}\) with \(1\leq i\leq n\), where \(p_{i}\) is the rank of \(\pi_{i}\) in \(\{\pi_{i},\pi_{i+1},\ldots ,\pi_{n}\}\). [AAR03]
The encoding of the permutation 3 2 5 1 6 7 4 8 9 is done as follows:
diff --git a/doc/chap4.html b/doc/chap4.html index f9305c6..4ced4db 100644 --- a/doc/chap4.html +++ b/doc/chap4.html @@ -32,7 +32,7 @@It is known that the language of all encoded permutations of a TPN is rational, and thus is it indeed possible to turn a TPN into an automaton. The idea is to inspect all dispositions of tokens within the TPN and find equivalence classes of these dispositions, for more details consult [3]. Adding a constraint, which limits the number of tokens at any time within the TPN, is also considered in this chapter.
+It is known that the language of all encoded permutations of a TPN is rational, and thus is it indeed possible to turn a TPN into an automaton. The idea is to inspect all dispositions of tokens within the TPN and find equivalence classes of these dispositions, for more details consult [ALTd.]. Adding a constraint, which limits the number of tokens at any time within the TPN, is also considered in this chapter.
The algorithms featured in this chapter do not return the minimal automata representing the input TPN as they are exactly visualising the equivalence classes of the dispositions of the tokens in the TPN. The automaton can be minimalised by choice, as it simplifies future computations involving the automaton also is makes the automata more legible.
diff --git a/doc/chap4.txt b/doc/chap4.txt index 3b9eb16..d3c29d5 100644 --- a/doc/chap4.txt +++ b/doc/chap4.txt @@ -4,7 +4,7 @@ [33X[0;0YIt is known that the language of all encoded permutations of a TPN is rational, and thus is it indeed possible to turn a TPN into an automaton. The idea is to inspect all dispositions of tokens within the TPN and find - equivalence classes of these dispositions, for more details consult [3]. + equivalence classes of these dispositions, for more details consult [ALTd.]. Adding a constraint, which limits the number of tokens at any time within the TPN, is also considered in this chapter.[133X diff --git a/doc/chap4_mj.html b/doc/chap4_mj.html index c000afc..d5700ab 100644 --- a/doc/chap4_mj.html +++ b/doc/chap4_mj.html @@ -6,7 +6,7 @@It is known that the language of all encoded permutations of a TPN is rational, and thus is it indeed possible to turn a TPN into an automaton. The idea is to inspect all dispositions of tokens within the TPN and find equivalence classes of these dispositions, for more details consult [3]. Adding a constraint, which limits the number of tokens at any time within the TPN, is also considered in this chapter.
+It is known that the language of all encoded permutations of a TPN is rational, and thus is it indeed possible to turn a TPN into an automaton. The idea is to inspect all dispositions of tokens within the TPN and find equivalence classes of these dispositions, for more details consult [ALTd.]. Adding a constraint, which limits the number of tokens at any time within the TPN, is also considered in this chapter.
The algorithms featured in this chapter do not return the minimal automata representing the input TPN as they are exactly visualising the equivalence classes of the dispositions of the tokens in the TPN. The automaton can be minimalised by choice, as it simplifies future computations involving the automaton also is makes the automata more legible.
diff --git a/doc/chap5.txt b/doc/chap5.txt index 3fc78b9..711c940 100644 --- a/doc/chap5.txt +++ b/doc/chap5.txt @@ -73,7 +73,8 @@ [33X[0;0YIf [22Xi,j ∈ Q ∖ { n+1 }[122X,with [22Xi < j[122X, and [22Xi',j' ∈ S[122X, [22Xi=i', j=j'[122X then[133X - [24X[33X[0;6Yf(i,i')=i, f(i,j')=j, f(j,j')=j, f(j,i')=j-1 or n+1.[133X[124X + [33X[1;6Y[24X[33X[0;0Yf(i,i')=i, f(i,j')=j, f(j,j')=j, f(j,i')=j-1 or n+1.[133X[124X[133X + [4X[32X Example [32X[104X [4X[25Xgap>[125X [27Xx:=Automaton("det",4,2,[[1,3,1,4],[2,2,4,4]],[1],[2]);[127X[104X diff --git a/doc/chap5_mj.html b/doc/chap5_mj.html index 7c6f31f..70f5ce1 100644 --- a/doc/chap5_mj.html +++ b/doc/chap5_mj.html @@ -6,7 +6,7 @@Permutation pattern classes can be determined using their corresponding basis. The basis of a pattern class is the anti-chain of the class, under the order of containment. A permutation π contains another permutation σ (of shorter length) if there is a subsequence in π, which is isomorphic to σ.
-With the rational language of the rank encoded class, it is also possible to find the rational language of the basis and vice versa. Several specific kinds of transducers are used in this process. [2]
+With the rational language of the rank encoded class, it is also possible to find the rational language of the basis and vice versa. Several specific kinds of transducers are used in this process. [AAR03]
diff --git a/doc/chap6.txt b/doc/chap6.txt index ce7e6eb..e7d5c8b 100644 --- a/doc/chap6.txt +++ b/doc/chap6.txt @@ -8,7 +8,7 @@ [33X[0;0YWith the rational language of the rank encoded class, it is also possible to find the rational language of the basis and vice versa. Several specific - kinds of transducers are used in this process. [2][133X + kinds of transducers are used in this process. [AAR03][133X [1X6.1 [33X[0;0YTransducers[133X[101X @@ -158,7 +158,8 @@ permutations which do not belong to the class. Using[133X - [24X[33X[0;6YB(L)=(L^r D^t)^r ∩ L^c[133X[124X + [33X[1;6Y[24X[33X[0;0YB(L)=(L^r D^t)^r ∩ L^c[133X[124X[133X + [33X[0;0Yit is possible using the deletion transducer [22XD[122X and the language of rank encoded permutations [22XL[122X to find the language of the rank encoded permutations @@ -213,7 +214,8 @@ encoded basis of a permutation class, and using the formula[133X - [24X[33X[0;6YL=B_k ∩ ((B(L)^r I^t)^c )^r[133X[124X + [33X[1;6Y[24X[33X[0;0YL=B_k ∩ ((B(L)^r I^t)^c )^r[133X[124X[133X + [33X[0;0Yreturns the automaton that accepts the rank encoded permutations of the class. In the formula, [22XB_k[122X is the automaton that accepts all permutations of diff --git a/doc/chap6_mj.html b/doc/chap6_mj.html index f424c83..2d0b482 100644 --- a/doc/chap6_mj.html +++ b/doc/chap6_mj.html @@ -6,7 +6,7 @@Permutation pattern classes can be determined using their corresponding basis. The basis of a pattern class is the anti-chain of the class, under the order of containment. A permutation \(\pi\) contains another permutation \(\sigma\) (of shorter length) if there is a subsequence in \(\pi\), which is isomorphic to \(\sigma\).
-With the rational language of the rank encoded class, it is also possible to find the rational language of the basis and vice versa. Several specific kinds of transducers are used in this process. [2]
+With the rational language of the rank encoded class, it is also possible to find the rational language of the basis and vice versa. Several specific kinds of transducers are used in this process. [AAR03]
diff --git a/doc/chap7.txt b/doc/chap7.txt index 70b31d1..8188dde 100644 --- a/doc/chap7.txt +++ b/doc/chap7.txt @@ -15,7 +15,8 @@ [33X[0;0YThe complement of a permutation [22Xτ=τ_1...τ_n[122X is the permutation[133X - [24X[33X[0;6Yτ^C=(n+1)-τ_1 (n+1)-τ_2... (n+1)-τ_n[133X[124X + [33X[1;6Y[24X[33X[0;0Yτ^C=(n+1)-τ_1 (n+1)-τ_2... (n+1)-τ_n[133X[124X[133X + [33X[0;0Y.[133X diff --git a/doc/chap7_mj.html b/doc/chap7_mj.html index ca34401..caadcb8 100644 --- a/doc/chap7_mj.html +++ b/doc/chap7_mj.html @@ -6,7 +6,7 @@‣ IsSimplePerm ( perm ) | ( function ) |
Returns: true
if perm
is simple.
To check whether perm
(length of perm
= n) is a simple permutation IsSimplePerm
uses the basic algorithm proposed by Uno and Yagiura in [8] to compare the perm
against the identity permutation of the same length.
To check whether perm
(length of perm
= n) is a simple permutation IsSimplePerm
uses the basic algorithm proposed by Uno and Yagiura in [UY00] to compare the perm
against the identity permutation of the same length.
@@ -123,7 +123,7 @@8.2-1 IsSimplePerm
8.3 Point Deletion in Simple Permutations
-In [7] it is shown how one can get chains of permutations by starting with a simple permutation and then removing either a single point or two points and the resulting permutation would still be simple. We have applied this theory to create functions such that the set of simple permutations of shorter length, by one deletion, can be found.
+In [PR12] it is shown how one can get chains of permutations by starting with a simple permutation and then removing either a single point or two points and the resulting permutation would still be simple. We have applied this theory to create functions such that the set of simple permutations of shorter length, by one deletion, can be found.
@@ -184,7 +184,7 @@8.3-3 PointDeletion
8.4 Block-Decomposition
-Given a permutation π of length m and nonempty permutations α_1,...,α_m the inflation of π by α_1,...,α_m, written as π[α_1,...,α_m], is the permutation obtained by replacing each entry π(i) by an interval that is order isomorphic to α_i [4]. Conversely a block-decomposition of σ is any expression of σ as an inflation σ=π[α_1,...,α_m]. The block decomposition of a permutation is unique if and only if σ,π,α_1,...,α_n all are in the same pattern class and π is simple and π≠ 1 2, 2 1 [1].
+Given a permutation π of length m and nonempty permutations α_1,...,α_m the inflation of π by α_1,...,α_m, written as π[α_1,...,α_m], is the permutation obtained by replacing each entry π(i) by an interval that is order isomorphic to α_i [Bri08]. Conversely a block-decomposition of σ is any expression of σ as an inflation σ=π[α_1,...,α_m]. The block decomposition of a permutation is unique if and only if σ,π,α_1,...,α_n all are in the same pattern class and π is simple and π≠ 1 2, 2 1 [AA05].
For example the inflation of 25413[21,1,1,1,2413]=3 2 8 9 1 5 7 4 6, written in GAP this is
diff --git a/doc/chap8.txt b/doc/chap8.txt index 9eb98e1..c5ef7e3 100644 --- a/doc/chap8.txt +++ b/doc/chap8.txt @@ -49,8 +49,8 @@ [6XReturns:[106X [33X[0;10Y[10Xtrue[110X if [10Xperm[110X is simple.[133X [33X[0;0YTo check whether [10Xperm[110X (length of [10Xperm[110X = [22Xn[122X) is a simple permutation - [10XIsSimplePerm[110X uses the basic algorithm proposed by Uno and Yagiura in [8] to - compare the [10Xperm[110X against the identity permutation of the same length.[133X + [10XIsSimplePerm[110X uses the basic algorithm proposed by Uno and Yagiura in [UY00] + to compare the [10Xperm[110X against the identity permutation of the same length.[133X [4X[32X Example [32X[104X [4X[25Xgap>[125X [27XIsSimplePerm([2,3,4,5,1,1,1,1]);[127X[104X @@ -65,11 +65,11 @@ [1X8.3 [33X[0;0YPoint Deletion in Simple Permutations[133X[101X - [33X[0;0YIn [7] it is shown how one can get chains of permutations by starting with a - simple permutation and then removing either a single point or two points and - the resulting permutation would still be simple. We have applied this theory - to create functions such that the set of simple permutations of shorter - length, by one deletion, can be found.[133X + [33X[0;0YIn [PR12] it is shown how one can get chains of permutations by starting + with a simple permutation and then removing either a single point or two + points and the resulting permutation would still be simple. We have applied + this theory to create functions such that the set of simple permutations of + shorter length, by one deletion, can be found.[133X [1X8.3-1 OnePointDelete[101X @@ -129,10 +129,10 @@ [33X[0;0YGiven a permutation [22Xπ[122X of length [22Xm[122X and nonempty permutations [22Xα_1,...,α_m[122X the inflation of [22Xπ[122X by [22Xα_1,...,α_m[122X, written as [22Xπ[α_1,...,α_m][122X, is the permutation obtained by replacing each entry [22Xπ(i)[122X by an interval that is order - isomorphic to [22Xα_i[122X [4]. Conversely a block-decomposition of [22Xσ[122X is any + isomorphic to [22Xα_i[122X [Bri08]. Conversely a block-decomposition of [22Xσ[122X is any expression of [22Xσ[122X as an inflation [22Xσ=π[α_1,...,α_m][122X. The block decomposition of a permutation is unique if and only if [22Xσ,π,α_1,...,α_n[122X all are in the same - pattern class and [22Xπ[122X is simple and [22Xπ≠ 1 2, 2 1[122X [1].[133X + pattern class and [22Xπ[122X is simple and [22Xπ≠ 1 2, 2 1[122X [AA05].[133X [33X[0;0YFor example the inflation of [22X25413[21,1,1,1,2413]=3 2 8 9 1 5 7 4 6[122X, written in [5XGAP[105X this is [10X[[2,5,4,1,3],[2,1],[1],[1],[1],[2,4,1,3]][110X. This decomposition @@ -193,7 +193,8 @@ uniquely in the following form,[133X - [24X[33X[0;6Yσ = 12 [α_1,α_2][133X[124X + [33X[1;6Y[24X[33X[0;0Yσ = 12 [α_1,α_2][133X[124X[133X + [33X[0;0Ywhere [22Xα_1[122X is not plus-decomposable.[133X @@ -228,7 +229,8 @@ written uniquely in the following form,[133X - [24X[33X[0;6Yσ = 21 [α_1,α_2][133X[124X + [33X[1;6Y[24X[33X[0;0Yσ = 21 [α_1,α_2][133X[124X[133X + [33X[0;0Ywhere [22Xα_1[122X is not minus-decomposable.[133X @@ -263,12 +265,14 @@ as,[133X - [24X[33X[0;6Yσ ⊕ τ = σ_1 σ_2...σ_k τ_1+k τ_2+k...τ_l+k .[133X[124X + [33X[1;6Y[24X[33X[0;0Yσ ⊕ τ = σ_1 σ_2...σ_k τ_1+k τ_2+k...τ_l+k .[133X[124X[133X + [33X[0;0YIn a similar fashion the skew sum of [22Xσ, τ[122X is[133X - [24X[33X[0;6Yσ ⊖ τ = σ_1+l σ_2+l...σ_k+l τ_1 τ_2...τ_l .[133X[124X + [33X[1;6Y[24X[33X[0;0Yσ ⊖ τ = σ_1+l σ_2+l...σ_k+l τ_1 τ_2...τ_l .[133X[124X[133X + [33X[0;0YThe calculation of the direct and skew sums of permutations using the rank encoding is also straight forward and is used in the functions described diff --git a/doc/chap8_mj.html b/doc/chap8_mj.html index f14f980..05086ef 100644 --- a/doc/chap8_mj.html +++ b/doc/chap8_mj.html @@ -6,7 +6,7 @@[[2,5,4,1,3],[2,1],[1],[1],[1],[2,4,1,3]]
. This decomposition of 3 2 8 9 1 5 7 4 6 is not unique. The unique block-decomposition, as described above, for 3 2 8 9 1 5 7 4 6=2413[21,12,1,2413] or in GAP notation[3,2,8,9,1,5,7,4,6]=[[2,4,1,3],[2,1],[1,2],[1],[2,4,1,3]]
.GAP (PatternClass) - Chapter 8: Properties of Permutations @@ -110,7 +110,7 @@8.2-1 IsSimplePerm
‣ IsSimplePerm
( perm )( function ) Returns:
-true
ifperm
is simple.To check whether
+perm
(length ofperm
= \(n\)) is a simple permutationIsSimplePerm
uses the basic algorithm proposed by Uno and Yagiura in [8] to compare theperm
against the identity permutation of the same length.To check whether
perm
(length ofperm
= \(n\)) is a simple permutationIsSimplePerm
uses the basic algorithm proposed by Uno and Yagiura in [UY00] to compare theperm
against the identity permutation of the same length.@@ -126,7 +126,7 @@8.2-1 IsSimplePerm
8.3 Point Deletion in Simple Permutations
-In [7] it is shown how one can get chains of permutations by starting with a simple permutation and then removing either a single point or two points and the resulting permutation would still be simple. We have applied this theory to create functions such that the set of simple permutations of shorter length, by one deletion, can be found.
+In [PR12] it is shown how one can get chains of permutations by starting with a simple permutation and then removing either a single point or two points and the resulting permutation would still be simple. We have applied this theory to create functions such that the set of simple permutations of shorter length, by one deletion, can be found.
@@ -187,7 +187,7 @@8.3-3 PointDeletion
8.4 Block-Decomposition
-Given a permutation \(\pi\) of length \(m\) and nonempty permutations \(\alpha_{1},\ldots,\alpha_{m}\) the inflation of \(\pi\) by \(\alpha_{1},\ldots,\alpha_{m}\), written as \(\pi[\alpha_{1},\ldots,\alpha_{m}]\), is the permutation obtained by replacing each entry \(\pi(i)\) by an interval that is order isomorphic to \(\alpha_{i}\) [4]. Conversely a block-decomposition of \(\sigma\) is any expression of \(\sigma\) as an inflation \(\sigma=\pi[\alpha_{1},\ldots,\alpha_{m}]\). The block decomposition of a permutation is unique if and only if \(\sigma,\pi,\alpha_{1},\ldots,\alpha_{n}\) all are in the same pattern class and \(\pi\) is simple and \(\pi\neq 1 2,\ 2 1\) [1].
+Given a permutation \(\pi\) of length \(m\) and nonempty permutations \(\alpha_{1},\ldots,\alpha_{m}\) the inflation of \(\pi\) by \(\alpha_{1},\ldots,\alpha_{m}\), written as \(\pi[\alpha_{1},\ldots,\alpha_{m}]\), is the permutation obtained by replacing each entry \(\pi(i)\) by an interval that is order isomorphic to \(\alpha_{i}\) [Bri08]. Conversely a block-decomposition of \(\sigma\) is any expression of \(\sigma\) as an inflation \(\sigma=\pi[\alpha_{1},\ldots,\alpha_{m}]\). The block decomposition of a permutation is unique if and only if \(\sigma,\pi,\alpha_{1},\ldots,\alpha_{n}\) all are in the same pattern class and \(\pi\) is simple and \(\pi\neq 1 2,\ 2 1\) [AA05].
For example the inflation of \(25413[21,1,1,1,2413]=3 2 8 9 1 5 7 4 6\), written in GAP this is
diff --git a/doc/chap9.html b/doc/chap9.html index de7d5cf..e3ed0b6 100644 --- a/doc/chap9.html +++ b/doc/chap9.html @@ -68,7 +68,7 @@[[2,5,4,1,3],[2,1],[1],[1],[1],[2,4,1,3]]
. This decomposition of \(3 2 8 9 1 5 7 4 6\) is not unique. The unique block-decomposition, as described above, for \(3 2 8 9 1 5 7 4 6=2413[21,12,1,2413]\) or in GAP notation[3,2,8,9,1,5,7,4,6]=[[2,4,1,3],[2,1],[1,2],[1],[2,4,1,3]]
.9 Regular Languages of Sets of Permutations
9.1 Inversions in Permutations
-An inversion in a permutation τ=τ_1...τ_n is a pair (i,j) such that 1≤ i<j≤ n and τ_i>τ_j [5].
+An inversion in a permutation τ=τ_1...τ_n is a pair (i,j) such that 1≤ i<j≤ n and τ_i>τ_j [CJS11].
@@ -236,7 +236,7 @@9.3 Language of all non-simple permutations
E(hatΩ_k) is the sublanguage of E(Ω_k) excluding the words of length ≤ 1.
-E(mathcalD_P(Ω_k)) is the language of all plus-decomposable permutations as described in [6].
+E(mathcalD_P(Ω_k)) is the language of all plus-decomposable permutations as described in [HL13].
@@ -452,7 +452,7 @@9.5 Exceptionality
m (2m) (m-1) (2m-1) ... 1 (m+1)
-where m ≥ 2 [7].
+where m ≥ 2 [PR12].
diff --git a/doc/chap9.txt b/doc/chap9.txt index eafadb3..3ce8929 100644 --- a/doc/chap9.txt +++ b/doc/chap9.txt @@ -8,7 +8,7 @@ [1X9.1 [33X[0;0YInversions in Permutations[133X[101X [33X[0;0YAn inversion in a permutation [22Xτ=τ_1...τ_n[122X is a pair [22X(i,j)[122X such that [22X1≤ iτ_j[122X [5].[133X + n[122X and [22Xτ_i>τ_j[122X [CJS11].[133X [1X9.1-1 InversionAut[101X @@ -166,10 +166,14 @@ highest rank [22Xk[122X is described by the following equation,[133X - [24X[33X[0;6YE(NS_k) = E(Ω_k) ∩ ( ⋃_l=1^k-1 P_l ⋃_m=l^k-1 E(hatΩ_k-m)^+m ∪ ⋃_j=1^k-1 E(hatΩ_k-j)^+j ∪[133X[124X + [33X[1;6Y[24X[33X[0;0YE(NS_k) = E(Ω_k) ∩ ( ⋃_l=1^k-1 P_l ⋃_m=l^k-1 E(hatΩ_k-m)^+m ∪ + ⋃_j=1^k-1 E(hatΩ_k-j)^+j ∪[133X[124X[133X - [24X[33X[0;6Y∪ ⋃_a=2^k-1 ⋃_b=0^k-1-a Q_a,b ⋃_i=0^a-2 (E(hatΩ_k-(b+i))^+b+i)^(a-i) ) Σ^* ∪ E(mathcalD_P(Ω_k))[133X[124X + + [33X[1;6Y[24X[33X[0;0Y∪ ⋃_a=2^k-1 ⋃_b=0^k-1-a Q_a,b ⋃_i=0^a-2 (E(hatΩ_k-(b+i))^+b+i)^(a-i) ) + Σ^* ∪ E(mathcalD_P(Ω_k))[133X[124X[133X + [33X[0;0Ywhere [22XΣ[122X is the alphabet [22X{1,...,k}[122X, [22Xk∈N[122X, [22Xk ≥ 3[122X.[133X @@ -189,7 +193,7 @@ [33X[0;0Y[22XE(hatΩ_k)[122X is the sublanguage of [22XE(Ω_k)[122X excluding the words of length [22X≤ 1[122X.[133X [33X[0;0Y[22XE(mathcalD_P(Ω_k))[122X is the language of all plus-decomposable permutations as - described in [6].[133X + described in [HL13].[133X [1X9.3-1 LengthBoundAut[101X @@ -373,7 +377,8 @@ [22XΩ_k[122X[133X - [24X[33X[0;6YE(S_k) = E(Ω_k∖ NS_k) = E(Ω_k) ∖ E(NS_k) = E(Ω_k) ∩ E(NS_k)^C[133X[124X + [33X[1;6Y[24X[33X[0;0YE(S_k) = E(Ω_k∖ NS_k) = E(Ω_k) ∖ E(NS_k) = E(Ω_k) ∩ E(NS_k)^C[133X[124X[133X + [1X9.4-1 SimplePermAut[101X @@ -405,18 +410,22 @@ forms,[133X - [24X[33X[0;6Y2 4 6 ... (2m) 1 3 5 ... (2m-1)[133X[124X + [33X[1;6Y[24X[33X[0;0Y2 4 6 ... (2m) 1 3 5 ... (2m-1)[133X[124X[133X + + + + [33X[1;6Y[24X[33X[0;0Y(2m-1) (2m-3) ... 1 (2m) (2m-2) ... 2[133X[124X[133X + - [24X[33X[0;6Y(2m-1) (2m-3) ... 1 (2m) (2m-2) ... 2[133X[124X + [33X[1;6Y[24X[33X[0;0Y(m+1) 1 (m+2) 2 (m+3) 3 ... (2m) m[133X[124X[133X - [24X[33X[0;6Y(m+1) 1 (m+2) 2 (m+3) 3 ... (2m) m[133X[124X + [33X[1;6Y[24X[33X[0;0Ym (2m) (m-1) (2m-1) ... 1 (m+1)[133X[124X[133X - [24X[33X[0;6Ym (2m) (m-1) (2m-1) ... 1 (m+1)[133X[124X - [33X[0;0Ywhere [22Xm ≥ 2[122X [7].[133X + [33X[0;0Ywhere [22Xm ≥ 2[122X [PR12].[133X [1X9.5-1 IsExceptionalPerm[101X diff --git a/doc/chap9_mj.html b/doc/chap9_mj.html index 4f8bdcf..8985a7d 100644 --- a/doc/chap9_mj.html +++ b/doc/chap9_mj.html @@ -6,7 +6,7 @@ GAP (PatternClass) - Chapter 9: Regular Languages of Sets of Permutations @@ -71,7 +71,7 @@9 Regular Languages of Sets of Permutations
9.1 Inversions in Permutations
-An inversion in a permutation \(\tau=\tau_{1}\ldots\tau_{n}\) is a pair \((i,j)\) such that \(1\leq i<j\leq n\) and \(\tau_{i}>\tau_{j}\) [5].
+An inversion in a permutation \(\tau=\tau_{1}\ldots\tau_{n}\) is a pair \((i,j)\) such that \(1\leq i<j\leq n\) and \(\tau_{i}>\tau_{j}\) [CJS11].
@@ -250,7 +250,7 @@9.3 Language of all non-simple permutations
\(E(\hat{\Omega}_{k})\) is the sublanguage of \(E(\Omega_{k})\) excluding the words of length \(\leq 1\).
-\(E(\mathcal{D}_{P}(\Omega_{k}))\) is the language of all plus-decomposable permutations as described in [6].
+\(E(\mathcal{D}_{P}(\Omega_{k}))\) is the language of all plus-decomposable permutations as described in [HL13].
@@ -476,7 +476,7 @@9.5 Exceptionality
m (2m) (m-1) (2m-1) \ldots 1 (m+1) \] -where \(m \geq 2\) [7].
+where \(m \geq 2\) [PR12].
diff --git a/doc/chapBib.html b/doc/chapBib.html index 3868f4a..351e38e 100644 --- a/doc/chapBib.html +++ b/doc/chapBib.html @@ -27,7 +27,7 @@References
-[1] Albert, M. H. and Atkinson, M. D., +[AA05] Albert, M. H. and Atkinson, M. D., Simple permutations and pattern restricted permutations, Discrete Mathematics, 300 (1--3) @@ -39,7 +39,7 @@
References
-[2] Albert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N., +[AAR03] Albert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N., Regular closed sets of permutations, Theoretical Computer Science, 306 @@ -50,7 +50,7 @@
References
-[3] Atkinson, M. D., Livesey, M. J. and Tulley, D., +[ALTd.] Atkinson, M. D., Livesey, M. J. and Tulley, D., Permutations generated by token passing in graphs, Theoretical Computer Science, 178 @@ -61,7 +61,7 @@
References
-[4] Brignall, R., +[Bri08] Brignall, R., A Survey of Simple Permutations, ArXiv e-prints (2008). @@ -70,7 +70,7 @@
References
-[5] Claesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E., +[CJS11] Claesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E., Upper bounds for the Stanley-Wilf limit of 1324 and other layered patterns, ArXiv e-prints @@ -80,7 +80,7 @@
References
-[6] Hoffmann, R. and Linton, S., +[HL13] Hoffmann, R. and Linton, S., Regular Languages of Plus- and Minus- (In)Decomposable Permutations, Pure Mathematics and Applications (to appear) @@ -90,7 +90,7 @@
References
-[7] Pierrot, A. and Rossin, D., +[PR12] Pierrot, A. and Rossin, D., Simple permutations poset, ArXiv e-prints (2012), @@ -100,7 +100,7 @@
References
-[8] Uno, T. and Yagiura, M., +[UY00] Uno, T. and Yagiura, M., Fast Algorithms to Enumerate All Common Intervals of Two Permutations, Algorithmica, diff --git a/doc/chapBib.txt b/doc/chapBib.txt index 64d735d..4b75514 100644 --- a/doc/chapBib.txt +++ b/doc/chapBib.txt @@ -2,31 +2,32 @@ [1XReferences[101X - [[20X1[120X] [16XAlbert, M. H. and Atkinson, M. D.[116X, [17XSimple permutations and pattern + [[20XAA05[120X] [16XAlbert, M. H. and Atkinson, M. D.[116X, [17XSimple permutations and pattern restricted permutations[117X, [18XDiscrete Mathematics[118X, [19X300[119X, 1--3 (2005), 1 -- 15, (()). - [[20X2[120X] [16XAlbert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N.[116X, [17XRegular closed sets - of permutations[117X, [18XTheoretical Computer Science[118X, [19X306[119X (2003), 85 - 100. + [[20XAAR03[120X] [16XAlbert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N.[116X, [17XRegular closed + sets of permutations[117X, [18XTheoretical Computer Science[118X, [19X306[119X (2003), 85 - 100. - [[20X3[120X] [16XAtkinson, M. D., Livesey, M. J. and Tulley, D.[116X, [17XPermutations generated - by token passing in graphs[117X, [18XTheoretical Computer Science[118X, [19X178[119X (n.d.), 103 - - 118. + [[20XALTd.[120X] [16XAtkinson, M. D., Livesey, M. J. and Tulley, D.[116X, [17XPermutations + generated by token passing in graphs[117X, [18XTheoretical Computer Science[118X, [19X178[119X + (n.d.), 103 - 118. - [[20X4[120X] [16XBrignall, R.[116X, [17XA Survey of Simple Permutations[117X, [18XArXiv e-prints[118X (2008). + [[20XBri08[120X] [16XBrignall, R.[116X, [17XA Survey of Simple Permutations[117X, [18XArXiv e-prints[118X + (2008). - [[20X5[120X] [16XClaesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E.[116X, [17XUpper + [[20XCJS11[120X] [16XClaesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E.[116X, [17XUpper bounds for the Stanley-Wilf limit of 1324 and other layered patterns[117X, [18XArXiv e-prints[118X (2011). - [[20X6[120X] [16XHoffmann, R. and Linton, S.[116X, [17XRegular Languages of Plus- and Minus- + [[20XHL13[120X] [16XHoffmann, R. and Linton, S.[116X, [17XRegular Languages of Plus- and Minus- (In)Decomposable Permutations[117X, [18XPure Mathematics and Applications (to appear)[118X (2013). - [[20X7[120X] [16XPierrot, A. and Rossin, D.[116X, [17XSimple permutations poset[117X, [18XArXiv e-prints[118X + [[20XPR12[120X] [16XPierrot, A. and Rossin, D.[116X, [17XSimple permutations poset[117X, [18XArXiv e-prints[118X (2012), 1--15. - [[20X8[120X] [16XUno, T. and Yagiura, M.[116X, [17XFast Algorithms to Enumerate All Common + [[20XUY00[120X] [16XUno, T. and Yagiura, M.[116X, [17XFast Algorithms to Enumerate All Common Intervals of Two Permutations[117X, [18XAlgorithmica[118X, [19X26[119X (2000), 2000. diff --git a/doc/chapBib_mj.html b/doc/chapBib_mj.html index 48bc75d..d881206 100644 --- a/doc/chapBib_mj.html +++ b/doc/chapBib_mj.html @@ -6,7 +6,7 @@
GAP (PatternClass) - References @@ -30,7 +30,7 @@References
-[1] Albert, M. H. and Atkinson, M. D., +[AA05] Albert, M. H. and Atkinson, M. D., Simple permutations and pattern restricted permutations, Discrete Mathematics, 300 (1--3) @@ -42,7 +42,7 @@
References
-[2] Albert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N., +[AAR03] Albert, M. H., Atkinson, M. D. and Ru\v{s}kuc, N., Regular closed sets of permutations, Theoretical Computer Science, 306 @@ -53,7 +53,7 @@
References
-[3] Atkinson, M. D., Livesey, M. J. and Tulley, D., +[ALTd.] Atkinson, M. D., Livesey, M. J. and Tulley, D., Permutations generated by token passing in graphs, Theoretical Computer Science, 178 @@ -64,7 +64,7 @@
References
-[4] Brignall, R., +[Bri08] Brignall, R., A Survey of Simple Permutations, ArXiv e-prints (2008). @@ -73,7 +73,7 @@
References
-[5] Claesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E., +[CJS11] Claesson, A., Jel{\'{i}}nek, V. and Steingr{\'{i}}msson, E., Upper bounds for the Stanley-Wilf limit of 1324 and other layered patterns, ArXiv e-prints @@ -83,7 +83,7 @@
References
-[6] Hoffmann, R. and Linton, S., +[HL13] Hoffmann, R. and Linton, S., Regular Languages of Plus- and Minus- (In)Decomposable Permutations, Pure Mathematics and Applications (to appear) @@ -93,7 +93,7 @@
References
-[7] Pierrot, A. and Rossin, D., +[PR12] Pierrot, A. and Rossin, D., Simple permutations poset, ArXiv e-prints (2012), @@ -103,7 +103,7 @@
References
-[8] Uno, T. and Yagiura, M., +[UY00] Uno, T. and Yagiura, M., Fast Algorithms to Enumerate All Common Intervals of Two Permutations, Algorithmica, diff --git a/doc/chapInd.html b/doc/chapInd.html index abd449f..05b48e0 100644 --- a/doc/chapInd.html +++ b/doc/chapInd.html @@ -25,70 +25,70 @@
diff --git a/doc/chapInd.txt b/doc/chapInd.txt index 35d6425..4755cfd 100644 --- a/doc/chapInd.txt +++ b/doc/chapInd.txt @@ -2,70 +2,70 @@ [1XIndex[101X - [2XAcceptedWords[102X 6.4-4 - [2XAcceptedWordsR[102X 6.4-5 - [2XAcceptedWordsReversed[102X 6.4-5 - [2XAutStateTransitionMatrix[102X 6.4-3 - [2XBasisAutomaton[102X 6.2-1 - [2XBlockDecomposition[102X 8.4-2 - [2XBoundedClassAutomaton[102X 6.2-3 - [2XBufferAndStack[102X 2.1-3 - [2XClassAutFromBase[102X 6.2-5 - [2XClassAutFromBaseEncoding[102X 6.2-4 - [2XClassAutomaton[102X 6.2-2 - [2XClassDirectSum[102X 6.3-1 - [2XCombineAutTransducer[102X 6.1-5 - [2XConstrainedGraphToAut[102X 4.1-2 - [2XDeletionTransducer[102X 6.1-2 - [2XExceptionalBoundedAutomaton[102X 9.5-2 - [2XExpandAlphabet[102X 6.2-6 - [2XGapAut[102X 9.3-4 - [2XGapSumAut[102X 9.3-6 - [2XGraphToAut[102X 4.1-1 - [2XInbetweenPermAutomaton[102X 10.1-1 - [2XInbetweenPermSet[102X 10.1-2 - [2XInflation[102X 8.4-1 - [2XInversionAut[102X 9.1-1 - [2XInversionAutOfClass[102X 9.1-2 - [2XInvolvementTransducer[102X 6.1-4 - [2XIs2StarReplaceable[102X 5.1-2 - [2XIsExceptionalPerm[102X 9.5-1 - [2XIsInterval[102X 8.1-1 - [2XIsMinusDecomposable[102X 8.6-1 - [2XIsPlusDecomposable[102X 8.5-1 - [2XIsPossibleGraphAut[102X 5.1-4 - [2XIsRankEncoding[102X 7.2-1 - [2XIsSimplePerm[102X 8.2-1 - [2XIsStarClosed[102X 5.1-1 - [2XIsStratified[102X 5.1-3 - [2XIsSubPerm[102X 10.1-3 - [2XLengthBoundAut[102X 9.3-1 - [2XLoopFreeAut[102X 10.2-1 - [2XLoopVertexFreeAut[102X 10.2-2 - [2XMinusDecomposableAut[102X 9.2-3 - [2XMinusIndecomposableAut[102X 9.2-4 - [2XNextGap[102X 9.3-3 - [2XNonSimpleAut[102X 9.3-7 - [2XNumberAcceptedWords[102X 6.4-2 - [2XOnePointDelete[102X 8.3-1 - [2XParstacks[102X 2.1-1 - [2XPermComplement[102X 7.1-1 - [2XPermDirectSum[102X 8.7-1 - [2XPermSkewSum[102X 8.7-2 - [2XPlusDecomposableAut[102X 9.2-1 - [2XPlusIndecomposableAut[102X 9.2-2 - [2XPointDeletion[102X 8.3-3 - [2XRankDecoding[102X 3.1-2 - [2XRankEncoding[102X 3.1-1 - [2XSeqstacks[102X 2.1-2 - [2XSequencesToRatExp[102X 3.1-3 - [2XShiftAut[102X 9.3-2 - [2XSimplePermAut[102X 9.4-1 - [2XSpectrum[102X 6.4-1 - [2XSumAut[102X 9.3-5 - [2XTransducer[102X 6.1-1 - [2XTransposedTransducer[102X 6.1-3 - [2XTwoPointDelete[102X 8.3-2 + [2XAcceptedWords[102X 6.4-4 + [2XAcceptedWordsR[102X 6.4-5 + [2XAcceptedWordsReversed[102X 6.4-5 + [2XAutStateTransitionMatrix[102X 6.4-3 + [2XBasisAutomaton[102X 6.2-1 + [2XBlockDecomposition[102X 8.4-2 + [2XBoundedClassAutomaton[102X 6.2-3 + [2XBufferAndStack[102X 2.1-3 + [2XClassAutFromBase[102X 6.2-5 + [2XClassAutFromBaseEncoding[102X 6.2-4 + [2XClassAutomaton[102X 6.2-2 + [2XClassDirectSum[102X 6.3-1 + [2XCombineAutTransducer[102X 6.1-5 + [2XConstrainedGraphToAut[102X 4.1-2 + [2XDeletionTransducer[102X 6.1-2 + [2XExceptionalBoundedAutomaton[102X 9.5-2 + [2XExpandAlphabet[102X 6.2-6 + [2XGapAut[102X 9.3-4 + [2XGapSumAut[102X 9.3-6 + [2XGraphToAut[102X 4.1-1 + [2XInbetweenPermAutomaton[102X 10.1-1 + [2XInbetweenPermSet[102X 10.1-2 + [2XInflation[102X 8.4-1 + [2XInversionAut[102X 9.1-1 + [2XInversionAutOfClass[102X 9.1-2 + [2XInvolvementTransducer[102X 6.1-4 + [2XIs2StarReplaceable[102X 5.1-2 + [2XIsExceptionalPerm[102X 9.5-1 + [2XIsInterval[102X 8.1-1 + [2XIsMinusDecomposable[102X 8.6-1 + [2XIsPlusDecomposable[102X 8.5-1 + [2XIsPossibleGraphAut[102X 5.1-4 + [2XIsRankEncoding[102X 7.2-1 + [2XIsSimplePerm[102X 8.2-1 + [2XIsStarClosed[102X 5.1-1 + [2XIsStratified[102X 5.1-3 + [2XIsSubPerm[102X 10.1-3 + [2XLengthBoundAut[102X 9.3-1 + [2XLoopFreeAut[102X 10.2-1 + [2XLoopVertexFreeAut[102X 10.2-2 + [2XMinusDecomposableAut[102X 9.2-3 + [2XMinusIndecomposableAut[102X 9.2-4 + [2XNextGap[102X 9.3-3 + [2XNonSimpleAut[102X 9.3-7 + [2XNumberAcceptedWords[102X 6.4-2 + [2XOnePointDelete[102X 8.3-1 + [2XParstacks[102X 2.1-1 + [2XPermComplement[102X 7.1-1 + [2XPermDirectSum[102X 8.7-1 + [2XPermSkewSum[102X 8.7-2 + [2XPlusDecomposableAut[102X 9.2-1 + [2XPlusIndecomposableAut[102X 9.2-2 + [2XPointDeletion[102X 8.3-3 + [2XRankDecoding[102X 3.1-2 + [2XRankEncoding[102X 3.1-1 + [2XSeqstacks[102X 2.1-2 + [2XSequencesToRatExp[102X 3.1-3 + [2XShiftAut[102X 9.3-2 + [2XSimplePermAut[102X 9.4-1 + [2XSpectrum[102X 6.4-1 + [2XSumAut[102X 9.3-5 + [2XTransducer[102X 6.1-1 + [2XTransposedTransducer[102X 6.1-3 + [2XTwoPointDelete[102X 8.3-2 ------------------------------------------------------- diff --git a/doc/chapInd_mj.html b/doc/chapInd_mj.html index 7d75a27..c232ad4 100644 --- a/doc/chapInd_mj.html +++ b/doc/chapInd_mj.html @@ -6,7 +6,7 @@Index
-AcceptedWords
6.4-4
-AcceptedWordsR
6.4-5
-AcceptedWordsReversed
6.4-5
-AutStateTransitionMatrix
6.4-3
-BasisAutomaton
6.2-1
-BlockDecomposition
8.4-2
-BoundedClassAutomaton
6.2-3
-BufferAndStack
2.1-3
-ClassAutFromBase
6.2-5
-ClassAutFromBaseEncoding
6.2-4
-ClassAutomaton
6.2-2
-ClassDirectSum
6.3-1
-CombineAutTransducer
6.1-5
-ConstrainedGraphToAut
4.1-2
-DeletionTransducer
6.1-2
-ExceptionalBoundedAutomaton
9.5-2
-ExpandAlphabet
6.2-6
-GapAut
9.3-4
-GapSumAut
9.3-6
-GraphToAut
4.1-1
-InbetweenPermAutomaton
10.1-1
-InbetweenPermSet
10.1-2
-Inflation
8.4-1
-InversionAut
9.1-1
-InversionAutOfClass
9.1-2
-InvolvementTransducer
6.1-4
-Is2StarReplaceable
5.1-2
-IsExceptionalPerm
9.5-1
-IsInterval
8.1-1
-IsMinusDecomposable
8.6-1
-IsPlusDecomposable
8.5-1
-IsPossibleGraphAut
5.1-4
-IsRankEncoding
7.2-1
-IsSimplePerm
8.2-1
-IsStarClosed
5.1-1
-IsStratified
5.1-3
-IsSubPerm
10.1-3
-LengthBoundAut
9.3-1
-LoopFreeAut
10.2-1
-LoopVertexFreeAut
10.2-2
-MinusDecomposableAut
9.2-3
-MinusIndecomposableAut
9.2-4
-NextGap
9.3-3
-NonSimpleAut
9.3-7
-NumberAcceptedWords
6.4-2
-OnePointDelete
8.3-1
-Parstacks
2.1-1
-PermComplement
7.1-1
-PermDirectSum
8.7-1
-PermSkewSum
8.7-2
-PlusDecomposableAut
9.2-1
-PlusIndecomposableAut
9.2-2
-PointDeletion
8.3-3
-RankDecoding
3.1-2
-RankEncoding
3.1-1
-Seqstacks
2.1-2
-SequencesToRatExp
3.1-3
-ShiftAut
9.3-2
-SimplePermAut
9.4-1
-Spectrum
6.4-1
-SumAut
9.3-5
-Transducer
6.1-1
-TransposedTransducer
6.1-3
-TwoPointDelete
8.3-2
+AcceptedWords
6.4-4
+AcceptedWordsR
6.4-5
+AcceptedWordsReversed
6.4-5
+AutStateTransitionMatrix
6.4-3
+BasisAutomaton
6.2-1
+BlockDecomposition
8.4-2
+BoundedClassAutomaton
6.2-3
+BufferAndStack
2.1-3
+ClassAutFromBase
6.2-5
+ClassAutFromBaseEncoding
6.2-4
+ClassAutomaton
6.2-2
+ClassDirectSum
6.3-1
+CombineAutTransducer
6.1-5
+ConstrainedGraphToAut
4.1-2
+DeletionTransducer
6.1-2
+ExceptionalBoundedAutomaton
9.5-2
+ExpandAlphabet
6.2-6
+GapAut
9.3-4
+GapSumAut
9.3-6
+GraphToAut
4.1-1
+InbetweenPermAutomaton
10.1-1
+InbetweenPermSet
10.1-2
+Inflation
8.4-1
+InversionAut
9.1-1
+InversionAutOfClass
9.1-2
+InvolvementTransducer
6.1-4
+Is2StarReplaceable
5.1-2
+IsExceptionalPerm
9.5-1
+IsInterval
8.1-1
+IsMinusDecomposable
8.6-1
+IsPlusDecomposable
8.5-1
+IsPossibleGraphAut
5.1-4
+IsRankEncoding
7.2-1
+IsSimplePerm
8.2-1
+IsStarClosed
5.1-1
+IsStratified
5.1-3
+IsSubPerm
10.1-3
+LengthBoundAut
9.3-1
+LoopFreeAut
10.2-1
+LoopVertexFreeAut
10.2-2
+MinusDecomposableAut
9.2-3
+MinusIndecomposableAut
9.2-4
+NextGap
9.3-3
+NonSimpleAut
9.3-7
+NumberAcceptedWords
6.4-2
+OnePointDelete
8.3-1
+Parstacks
2.1-1
+PermComplement
7.1-1
+PermDirectSum
8.7-1
+PermSkewSum
8.7-2
+PlusDecomposableAut
9.2-1
+PlusIndecomposableAut
9.2-2
+PointDeletion
8.3-3
+RankDecoding
3.1-2
+RankEncoding
3.1-1
+Seqstacks
2.1-2
+SequencesToRatExp
3.1-3
+ShiftAut
9.3-2
+SimplePermAut
9.4-1
+Spectrum
6.4-1
+SumAut
9.3-5
+Transducer
6.1-1
+TransposedTransducer
6.1-3
+TwoPointDelete
8.3-2
GAP (PatternClass) - Index @@ -28,70 +28,70 @@Index
-AcceptedWords
6.4-4
-AcceptedWordsR
6.4-5
-AcceptedWordsReversed
6.4-5
-AutStateTransitionMatrix
6.4-3
-BasisAutomaton
6.2-1
-BlockDecomposition
8.4-2
-BoundedClassAutomaton
6.2-3
-BufferAndStack
2.1-3
-ClassAutFromBase
6.2-5
-ClassAutFromBaseEncoding
6.2-4
-ClassAutomaton
6.2-2
-ClassDirectSum
6.3-1
-CombineAutTransducer
6.1-5
-ConstrainedGraphToAut
4.1-2
-DeletionTransducer
6.1-2
-ExceptionalBoundedAutomaton
9.5-2
-ExpandAlphabet
6.2-6
-GapAut
9.3-4
-GapSumAut
9.3-6
-GraphToAut
4.1-1
-InbetweenPermAutomaton
10.1-1
-InbetweenPermSet
10.1-2
-Inflation
8.4-1
-InversionAut
9.1-1
-InversionAutOfClass
9.1-2
-InvolvementTransducer
6.1-4
-Is2StarReplaceable
5.1-2
-IsExceptionalPerm
9.5-1
-IsInterval
8.1-1
-IsMinusDecomposable
8.6-1
-IsPlusDecomposable
8.5-1
-IsPossibleGraphAut
5.1-4
-IsRankEncoding
7.2-1
-IsSimplePerm
8.2-1
-IsStarClosed
5.1-1
-IsStratified
5.1-3
-IsSubPerm
10.1-3
-LengthBoundAut
9.3-1
-LoopFreeAut
10.2-1
-LoopVertexFreeAut
10.2-2
-MinusDecomposableAut
9.2-3
-MinusIndecomposableAut
9.2-4
-NextGap
9.3-3
-NonSimpleAut
9.3-7
-NumberAcceptedWords
6.4-2
-OnePointDelete
8.3-1
-Parstacks
2.1-1
-PermComplement
7.1-1
-PermDirectSum
8.7-1
-PermSkewSum
8.7-2
-PlusDecomposableAut
9.2-1
-PlusIndecomposableAut
9.2-2
-PointDeletion
8.3-3
-RankDecoding
3.1-2
-RankEncoding
3.1-1
-Seqstacks
2.1-2
-SequencesToRatExp
3.1-3
-ShiftAut
9.3-2
-SimplePermAut
9.4-1
-Spectrum
6.4-1
-SumAut
9.3-5
-Transducer
6.1-1
-TransposedTransducer
6.1-3
-TwoPointDelete
8.3-2
+AcceptedWords
6.4-4
+AcceptedWordsR
6.4-5
+AcceptedWordsReversed
6.4-5
+AutStateTransitionMatrix
6.4-3
+BasisAutomaton
6.2-1
+BlockDecomposition
8.4-2
+BoundedClassAutomaton
6.2-3
+BufferAndStack
2.1-3
+ClassAutFromBase
6.2-5
+ClassAutFromBaseEncoding
6.2-4
+ClassAutomaton
6.2-2
+ClassDirectSum
6.3-1
+CombineAutTransducer
6.1-5
+ConstrainedGraphToAut
4.1-2
+DeletionTransducer
6.1-2
+ExceptionalBoundedAutomaton
9.5-2
+ExpandAlphabet
6.2-6
+GapAut
9.3-4
+GapSumAut
9.3-6
+GraphToAut
4.1-1
+InbetweenPermAutomaton
10.1-1
+InbetweenPermSet
10.1-2
+Inflation
8.4-1
+InversionAut
9.1-1
+InversionAutOfClass
9.1-2
+InvolvementTransducer
6.1-4
+Is2StarReplaceable
5.1-2
+IsExceptionalPerm
9.5-1
+IsInterval
8.1-1
+IsMinusDecomposable
8.6-1
+IsPlusDecomposable
8.5-1
+IsPossibleGraphAut
5.1-4
+IsRankEncoding
7.2-1
+IsSimplePerm
8.2-1
+IsStarClosed
5.1-1
+IsStratified
5.1-3
+IsSubPerm
10.1-3
+LengthBoundAut
9.3-1
+LoopFreeAut
10.2-1
+LoopVertexFreeAut
10.2-2
+MinusDecomposableAut
9.2-3
+MinusIndecomposableAut
9.2-4
+NextGap
9.3-3
+NonSimpleAut
9.3-7
+NumberAcceptedWords
6.4-2
+OnePointDelete
8.3-1
+Parstacks
2.1-1
+PermComplement
7.1-1
+PermDirectSum
8.7-1
+PermSkewSum
8.7-2
+PlusDecomposableAut
9.2-1
+PlusIndecomposableAut
9.2-2
+PointDeletion
8.3-3
+RankDecoding
3.1-2
+RankEncoding
3.1-1
+Seqstacks
2.1-2
+SequencesToRatExp
3.1-3
+ShiftAut
9.3-2
+SimplePermAut
9.4-1
+Spectrum
6.4-1
+SumAut
9.3-5
+Transducer
6.1-1
+TransposedTransducer
6.1-3
+TwoPointDelete
8.3-2