Results 1  10
of
345
Twenty combinatorial examples of asymptotics derived from multivariate generating functions
"... Abstract. Let {ar: r ∈ Nd} be a ddimensional array of numbers for which the generating function F (z): = ∑ r arzr is meromorphic in a neighborhood of the origin. For example, F may be a rational multivariate generating function. We discuss recent results that allow the effective computation of asym ..."
Abstract

Cited by 33 (15 self)
 Add to MetaCart
Abstract. Let {ar: r ∈ Nd} be a ddimensional array of numbers for which the generating function F (z): = ∑ r arzr is meromorphic in a neighborhood of the origin. For example, F may be a rational multivariate generating function. We discuss recent results that allow the effective computation of asymptotic expansions for the coefficients of F. Our purpose is to illustrate the use of these techniques on a variety of problems of combinatorial interest. The survey begins by summarizing previous work on the asymptotics of univariate and multivariate generating functions. Next we describe the Morsetheoretic underpinnings of some new asymptotic techniques. We then quote and summarize these results in such a way that only elementary analyses are needed to check hypotheses and carry out computations. The remainder of the survey focuses on combinatorial applications, such as enumeration of words with forbidden substrings, edges and cycles in graphs, polyominoes, and descents in permutations. After the individual examples, we discuss three broad classes of examples, namely, functions derived via the transfer matrix method, those derived via the kernel method, and those derived via the method of Lagrange inversion. These methods have
Information Propagation Speed in Mobile and Delay Tolerant Networks
, 2009
"... The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where endtoend multihop paths may not exist and communication routes may only be available through time and mobility. We use analytical tools to derive gene ..."
Abstract

Cited by 23 (10 self)
 Add to MetaCart
The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where endtoend multihop paths may not exist and communication routes may only be available through time and mobility. We use analytical tools to derive generic theoretical upper bounds for the information propagation speed in large scale mobile and intermittently connected networks. In other words, we upperbound the optimal performance, in terms of delay, that can be achieved using any routing algorithm. We then show how our analysis can be applied to specific mobility and graph models to obtain specific analytical estimates. In particular, when nodes move at speed v and their density ν is small (the network is sparse and surely disconnected), we prove that the information propagation speed is upper bounded by (1 + O(ν 2))v in the random waypoint model, while it is upper bounded by O ( √ νvv) for other mobility models (random walk, Brownian motion). We also present simulations that confirm the validity of the bounds in these scenarios.
Euclidean algorithms are Gaussian
, 2003
"... Abstract. We prove a Central Limit Theorem for a general class of costparameters associated to the three standard Euclidean algorithms, with optimal speed of convergence, and error terms for the mean and variance. For the most basic parameter of the algorithms, the number of steps, we go further an ..."
Abstract

Cited by 22 (10 self)
 Add to MetaCart
Abstract. We prove a Central Limit Theorem for a general class of costparameters associated to the three standard Euclidean algorithms, with optimal speed of convergence, and error terms for the mean and variance. For the most basic parameter of the algorithms, the number of steps, we go further and prove a Local Limit Theorem (LLT), with speed of convergence O((log N) −1/4+ǫ). This extends and improves the LLT obtained by Hensley [27] in the case of the standard Euclidean algorithm. We use a “dynamical analysis ” methodology, viewing an algorithm as a dynamical system (restricted to rational inputs), and combining tools imported from dynamics, such as the crucial transfer operators, with various other techniques: Dirichlet series, Perron’s formula, quasipowers theorems, the saddle point method. Dynamical analysis had previously been used to perform averagecase analysis of algorithms. For the present (dynamical) analysis in distribution, we require precise estimates on the transfer operators, when a parameter varies along vertical lines in the complex plane. Such estimates build on results obtained only recently by Dolgopyat in the context of continuoustime dynamics [20]. 1.
A functional limit theorem for the profile of search trees
 Annals of Applied Probability
, 2008
"... We study the profile Xn,k of random search trees including binary search trees and mary search trees. Our main result is a functional limit theorem of the normalized profile Xn,k/EXn,k for k =⌊α log n ⌋ in a certain range of α. A central feature of the proof is the use of the contraction method to ..."
Abstract

Cited by 21 (11 self)
 Add to MetaCart
We study the profile Xn,k of random search trees including binary search trees and mary search trees. Our main result is a functional limit theorem of the normalized profile Xn,k/EXn,k for k =⌊α log n ⌋ in a certain range of α. A central feature of the proof is the use of the contraction method to prove convergence in distribution of certain random analytic functions in a complex domain. This is based on a general theorem concerning the contraction method for random variables in an infinitedimensional Hilbert space. As part of the proof, we show that the Zolotarev metric is complete for a Hilbert space. 1. Introduction. Search
AUTOMATIC CLASSIFICATION OF RESTRICTED LATTICE WALKS
"... Abstract. We propose an experimental mathematics approach leading to the computerdriven discovery of various structural properties of general counting functions coming from enumeration of walks. 1. ..."
Abstract

Cited by 20 (6 self)
 Add to MetaCart
Abstract. We propose an experimental mathematics approach leading to the computerdriven discovery of various structural properties of general counting functions coming from enumeration of walks. 1.
Graph classes with given 3connected components: asymptotic enumeration and random graphs
, 2009
"... Consider a family T of 3connected graphs of moderate growth, and let G be the class of graphs whose 3connected components are graphs in T. We present a general framework for analyzing such graphs classes based on singularity analysis of generating functions, which generalizes previously studied c ..."
Abstract

Cited by 16 (7 self)
 Add to MetaCart
Consider a family T of 3connected graphs of moderate growth, and let G be the class of graphs whose 3connected components are graphs in T. We present a general framework for analyzing such graphs classes based on singularity analysis of generating functions, which generalizes previously studied cases such as planar graphs and seriesparallel graphs. We provide a general result for the asymptotic number of graphs in G, based on the singularities of the exponential generating function associated to T. We derive limit laws, which are either normal or Poisson, for several basic parameters, including the number of edges, number of blocks and number of components. For the size of the largest block we find a fundamental dichotomy: classes similar to planar graphs have almost surely a unique block of linear size, while classes similar to seriesparallel graphs have only sublinear blocks. This dichotomy also applies to the size of the largest 3connected component. For some classes under study both regimes occur, because of a critical phenomenon as the edge density in the class varies.
Threshold graph limits and random threshold graphs
 In preparation
"... Abstract. We study the limit theory of large threshold graphs and apply this to a variety of models for random threshold graphs. The results give a nice set of examples for the emerging theory of graph limits. 1. ..."
Abstract

Cited by 16 (10 self)
 Add to MetaCart
Abstract. We study the limit theory of large threshold graphs and apply this to a variety of models for random threshold graphs. The results give a nice set of examples for the emerging theory of graph limits. 1.
The Complete Analysis of a Polynomial Factorization Algorithm Over Finite Fields
, 2001
"... This paper derives basic probabilistic properties of random polynomials over finite fields that are of interest in the study of polynomial factorization algorithms. We show that the main characteristics of random polynomial can be treated systematically by methods of "analytic combinatorics" based o ..."
Abstract

Cited by 14 (3 self)
 Add to MetaCart
This paper derives basic probabilistic properties of random polynomials over finite fields that are of interest in the study of polynomial factorization algorithms. We show that the main characteristics of random polynomial can be treated systematically by methods of "analytic combinatorics" based on the combined use of generating functions and of singularity analysis. Our object of study is the classical factorization chain which is described in Fig. 1 and which, despite its simplicity, does not appear to have been totally analysed so far. In this paper, we provide a complete averagecase analysis.