Results 11 to 20 of about 11,862 (202)

PreLie-decorated hypertrees [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2013
Weighted hypertrees have been used by C. Jensen, J. McCammond, and J. Meier to compute some Euler characteristics in group theory. We link them to decorated hypertrees and 2-coloured rooted trees. After the enumeration of pointed and non-pointed types of
Bérénice Oger
doaj   +1 more source

COMBINATORIAL ANALYSIS IN THE SCHEME OF ALLOCATION OF DISTINGUISHABLE PARTICLES INTO INDISTINGUISHABLE CELLS WITH A GIVEN NUMBER OF NON-EMPTY CELLS

open access: yesTransactions of the Karelian Research Centre of the Russian Academy of Sciences, 2019
The scheme of allocating r distinguishable particles into n indistinguishable cells with k non-empty cells is studied along the directions of enumerative combinatorics.
Natalia Enatskaya
doaj   +1 more source

Generalized triangulations, pipe dreams, and simplicial spheres [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2011
We exhibit a canonical connection between maximal $(0,1)$-fillings of a moon polyomino avoiding north-east chains of a given length and reduced pipe dreams of a certain permutation.
Luis Serrano, Christian Stump
doaj   +1 more source

Generation modulo the action of a permutation group [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2013
Originally motivated by algebraic invariant theory, we present an algorithm to enumerate integer vectors modulo the action of a permutation group. This problem generalizes the generation of unlabeled graph up to an isomorphism.
Nicolas Borie
doaj   +1 more source

Hopf Algebra of Sashes [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2014
A general lattice theoretic construction of Reading constructs Hopf subalgebras of the Malvenuto-Reutenauer Hopf algebra (MR) of permutations. The products and coproducts of these Hopf subalgebras are defined extrinsically in terms of the embedding in MR.
Shirley Law
doaj   +1 more source

Combinatorics of Second Derivative: Graphical Proof of Glaisher-Crofton Identity

open access: yesAdvances in Mathematical Physics, 2018
We give a purely combinatorial proof of the Glaisher-Crofton identity which is derived from the analysis of discrete structures generated by the iterated action of the second derivative.
Pawel Blasiak   +2 more
doaj   +1 more source

Fourier series of functions involving higher-order ordered Bell polynomials

open access: yesOpen Mathematics, 2017
In 1859, Cayley introduced the ordered Bell numbers which have been used in many problems in number theory and enumerative combinatorics. The ordered Bell polynomials were defined as a natural companion to the ordered Bell numbers (also known as the ...
Kim Taekyun   +3 more
doaj   +1 more source

Many 2-level polytopes from matroids [PDF]

open access: yes, 2015
The family of 2-level matroids, that is, matroids whose base polytope is 2-level, has been recently studied and characterized by means of combinatorial properties.
Grande, Francesco, Rué, Juanjo
core   +3 more sources

Use of Enumerative Combinatorics for Proving the Applicability of an Asymptotic Stability Result on Discrete-Time SIS Epidemics in Complex Networks

open access: yesMathematics, 2018
In this paper, we justify by the use of Enumerative Combinatorics, the applicability of an asymptotic stability result on Discrete-Time Epidemics in Complex Networks, where the complex dynamics of an epidemic model to identify the nodes that contribute ...
Carlos Rodríguez Lucatero   +1 more
doaj   +1 more source

Bayer noise quasisymmetric functions and some combinatorial algebraic structures [PDF]

open access: yesCategories and General Algebraic Structures with Applications
Recently, quasisymmetric functions have been widely studied due to their big connection to enumerative combinatorics, combinatorial Hopf algebra and number theory.
Adnan Abdulwahid
doaj   +1 more source

Home - About - Disclaimer - Privacy