首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Forbidden configurations and repeated induction
Authors:RP Anstee  CGW Meehan
Institution:aMathematics Department, The University of British Columbia, Vancouver, B.C., Canada V6T 1Z2
Abstract:For a given k×? matrix F, we say a matrix A has no configurationF if no k×? submatrix of A is a row and column permutation of F. We say a matrix is simple if it is a (0,1)-matrix with no repeated columns. We define View the MathML source as the maximum number of columns in an m-rowed simple matrix which has no configuration F. A fundamental result of Sauer, Perles and Shelah, and Vapnik and Chervonenkis determines View the MathML source exactly, where Kk denotes the k×2k simple matrix. We extend this in several ways. For two matrices G,H on the same number of rows, let GH] denote the concatenation of G and H. Our first two sets of results are exact bounds that find some matrices B,C where View the MathML source and View the MathML source. Our final result provides asymptotic boundary cases; namely matrices F for which View the MathML source is O(mp) yet for any choice of column α not in F, we have View the MathML source is Ω(mp+1). This is evidence for a conjecture of Anstee and Sali. The proof techniques in this paper are dominated by repeated use of the standard induction employed in forbidden configurations. Analysis of base cases tends to dominate the arguments. For a k-rowed (0,1)-matrix F, we also consider a function View the MathML source which is the minimum number of columns in an m-rowed simple matrix for which each k-set of rows contains F as a configuration.
Keywords:Extremal set theory  Shattered sets  VC-dimension  Forbidden configurations  Trace
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号