FORBIDDEN CONFIGURATIONS, DISCREPANCY AND DETERMINANTS

被引:7
|
作者
ANSTEE, RP [1 ]
机构
[1] UNIV BRITISH COLUMBIA,DEPT MATH,VANCOUVER V6T 1Y4,BC,CANADA
关键词
D O I
10.1016/S0195-6698(13)80051-0
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
An m × n matrix A is said to have hereditary discrepancy d if the maximum over submatrices B of A of the minimum over (−1/2, +1/2)-vectors x of ‖Bx‖∞. If A is integral and has no repeated rows then we show that m is bounded by a polynomial in n for fixed d. This improves a result of Lovász and Vesztergombi for fixed d. Let A be an m × n matrix with no repeated rows and with each square submatrix having determinant {0, ±1, ±2,..., ±k} . Then m is bounded by a polynomial in n for fixed k. This extends a result of Heller for totally unimodular matrices. (A result of Kung combined with results of J. Lee provides a much better bound.) Both bounds follow from repeated applications of the forbidden configuration theorem of Sauer, Perles and Shelah, which states that an m × n (0, 1)-matrix with no repeated rows and no 2kxk submatrix of all (0, 1)-rows on k columns has m at most ( n k−1)+ ( n k−2)+⋯+ ( n0). © 1990, Academic Press Limited. All rights reserved.
引用
收藏
页码:15 / 19
页数:5
相关论文
共 50 条
  • [21] Forbidden configurations and Steiner designs
    Balachandran, Niranjan
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 65 (03) : 353 - 364
  • [22] FORBIDDEN CONFIGURATIONS IN SYSTEM OF 3 PHOTONS
    KOPYLOV, GI
    SOVIET JOURNAL OF NUCLEAR PHYSICS-USSR, 1967, 4 (04): : 570 - &
  • [23] Decomposition of planar graphs with forbidden configurations
    Li, Lingxi
    Lu, Huajing
    Wang, Tao
    Zhu, Xuding
    DISCRETE APPLIED MATHEMATICS, 2023, 331 : 147 - 158
  • [24] Linear hash families and forbidden configurations
    Colbourn, Charles J.
    Ling, Alan C. H.
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (01) : 25 - 55
  • [25] FORBIDDEN CONFIGURATIONS - INDUCTION AND LINEAR ALGEBRA
    ANSTEE, RP
    EUROPEAN JOURNAL OF COMBINATORICS, 1995, 16 (05) : 427 - 438
  • [26] LARGE FORBIDDEN CONFIGURATIONS AND DESIGN THEORY
    Anstee, R. P.
    Sali, Attila
    STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2016, 53 (02) : 157 - 166
  • [27] Linear hash families and forbidden configurations
    Charles J. Colbourn
    Alan C. H. Ling
    Designs, Codes and Cryptography, 2009, 52 : 25 - 55
  • [28] Linear algebra methods for forbidden configurations
    Richard P. Anstee
    Balin Fleming
    Combinatorica, 2011, 31 : 1 - 19
  • [29] Multi-symbol forbidden configurations
    Ellis, Keaton
    Liu, Baian
    Sali, Attila
    DISCRETE APPLIED MATHEMATICS, 2020, 276 : 24 - 36
  • [30] dp-Rank and Forbidden Configurations
    Johnson, Hunter
    NOTRE DAME JOURNAL OF FORMAL LOGIC, 2013, 54 (01) : 1 - 13