let s do some computer algebra and combinatorics
play

Lets do some Computer Algebra and Combinatorics! SYMBOLIC-NUMERIC - PowerPoint PPT Presentation

SYMBOLIC-NUMERIC TOOLS FOR ANALYTIC COMBINATORICS IN SEVERAL VARIABLES Stephen Melczer ENS Lyon / Inria & University of Waterloo Joint work with Bruno Salvy Lets do some Computer Algebra and Combinatorics! SYMBOLIC-NUMERIC TOOLS


  1. SYMBOLIC-NUMERIC TOOLS FOR ANALYTIC COMBINATORICS IN SEVERAL VARIABLES Stephen Melczer ENS Lyon / Inria & University of Waterloo 
 Joint work with Bruno Salvy Let’s do some Computer Algebra and Combinatorics!

  2. SYMBOLIC-NUMERIC TOOLS FOR ANALYTIC COMBINATORICS IN SEVERAL VARIABLES Stephen Melczer ENS Lyon / Inria & University of Waterloo 
 Joint work with Bruno Salvy Lassen Sie uns einige Computer-Algebra und Kombinatorik tun!

  3. Motivation: Asymptotics of Diagonals Input: Rational function with power series z z z i z i z i N Goal: Asymptotics of the diagonal sequence as Example (Simple lattice walks) 
 Here counts the number of ways to walk from (0,0) 
 to using the steps (0,1) and (1,0).

  4. Motivation: Asymptotics of Diagonals Input: Rational function with power series z z z i z i z i N Goal: Asymptotics of the diagonal sequence as Example (Restricted factors in words) 
 Here counts the number of binary words with k zeroes 
 and k ones that do not contain 10101101 or 1110101.

  5. Motivation: Asymptotics of Diagonals Input: Rational function with power series z z z i z i z i N Goal: Asymptotics of the diagonal sequence as Example (Apéry) 
 Here determines Apéry’s sequence, related to his 
 celebrated proof of the irrationality of . 


  6. Connections to Univariate Theory D-FINITE DIAGONAL ALGEBRAIC RATIONAL

  7. Connections to Univariate Theory D-FINITE ? DIAGONAL ALGEBRAIC RATIONAL

  8. Univariate Analytic Combinatorics X If is analytic then s k z k S ( z ) = k ≥ 0 1 1 S ( z ) dz Z Z X s k z k − n − 1 z n +1 = 2 π i 2 π i C C k ≥ 0 1 Z X s k z k − n − 1 = 2 π i C k ≥ 0 = s n for a suitable closed curve around the origin. C

  9. “Transfer Theorem” for Asymptotics

  10. “Transfer Theorem” for Asymptotics

  11. “Transfer Theorem” for Asymptotics

  12. “Transfer Theorem” for Asymptotics

  13. “Transfer Theorem” for Asymptotics

  14. “Transfer Theorem” for Asymptotics Contribution Exponentially smaller Determined by local behaviour

  15. Analytic Combinatorics in Several Variables Theorem (CIF In Several Variables) Let be holomorphic at the origin. Q z z z z Then there is a unique series converging i z i z i N absolutely in a neighbourhood of the origin, with z z i z i The goal is to determine the points where local behaviour determines asymptotics, and deform T to be close to such points. In general this is very very hard!

  16. Analytic Combinatorics in Several Variables There has been much work in the last few decades translating results from Complex Analysis in Several Variables to this context. Essentially, the important points are the zeroes of which are on the z boundary of the domain of convergence and minimize the product , which encodes z 1 z n exponential growth.

  17. Analytic Combinatorics in Several Variables is combinatorial if every coe ffi cient . z i Assuming F is combinatorial + generic conditions, asymptotics are determined by the points in such that z z z z z

  18. Analytic Combinatorics in Several Variables is combinatorial if every coe ffi cient . z i Assuming F is combinatorial + generic conditions, asymptotics are determined by the points in such that z z z z z is coordinate-wise minimal in z (1) is an algebraic condition. 
 (2) is a semi-algebraic condition (can be expensive).

  19. Kronecker’s Approach to Solving (RUR) Generically there are a finite number of solutions of (1). “ Kronecker’s Approach” to Solving (1880s): 
 Results in linear form 
 C and parametrization square-free History and Background: see Castro, Pardo, Hägele, and Morais (2001)

  20. 
 The Kronecker Representation Compute a Kronecker Representation of the system z z z Suppose Then in bit ops there is a prob. algorithm to find:

  21. 
 
 The Kronecker Representation Compute a Kronecker Representation of the system z z z Suppose Then in bit ops there is a prob. algorithm to find: Giusti, Lecerf, Salvy (2001) Schost (2001)

  22. Example (Lattice Path Model) 
 The number of walks from the origin taking steps 
 {NW,NE,SE,SW} and staying in the first quadrant has 
 One can calculate the Kronecker representation so that the solutions of (1) are described by:

  23. Example (Lattice Path Model) 
 The number of walks from the origin taking steps 
 {NW,NE,SE,SW} and staying in the first quadrant has 
 One can calculate the Kronecker representation Which of these points are on the domain of convergence? so that the solutions of (1) are described by:

  24. Numerical Kronecker Representation These bounds allow for e ffi cient computation via e ffi cient algorithms for polynomial solving and root bounds. Operation on BIT COMPLEXITY Coordinates Determine 0 Determine sign Find all equal coordinates Find 
 Fast univariate solving: Sagralo ff and K. Mehlhorn (2016)

  25. Back to ACSV In the combinatorial case*, it is enough to examine only the positive real points on the variety to determine minimality . Thus, one adds the equation for a new variable and finds the positive real point(s) with no . z

  26. Back to ACSV In the combinatorial case*, it is enough to examine only the positive real points on the variety to determine minimality . Thus, one adds the equation for a new variable and finds the positive real point(s) with no . z

  27. Back to ACSV In the combinatorial case*, it is enough to examine only the positive real points on the variety to determine minimality . Thus, one adds the equation for a new variable and finds the positive real point(s) with no . z

  28. First Complexity Results for ACSV Theorem (M. and Salvy, 2016) 
 Under generic conditions, and assuming is combinatorial, z the points contributing to dominant diagonal asymptotics can be determined in bit operations. Each contribution has the form and can be found to precision in bit ops. 
 The genericity assumptions heavily restrict the form of the asymptotic growth. Removing more of these assumptions is ongoing work.

  29. Example 1 Example (Apéry) 
 For simplicity, we add the variable and use the linear form . The Kronecker representation is There are two real critical points, and one is positive. After testing minimality, one has proven asymptotics

  30. Example 1 Example (Apéry) 
 For simplicity, we add the variable and use the linear form . The Kronecker representation is There are two real critical points, and one is positive. After testing minimality, one has proven asymptotics

  31. (Non-)Example 2 Example (Restricted Words in Factors) 
 One can get a more direct representation for the variables , 
 as in the system

  32. (Non-)Example 2 Example (Restricted Words in Factors) 
 One can get a more direct representation for the variables , 
 as in the system But , the (lowest terms) coe ffi cients of have numerators 
 of size !

  33. Example 3 Example (Restricted Words in Factors) 
 Using the Kronecker representation gives where are polynomials with largest coe ff around 2500. 


  34. Example 3 Example (Restricted Words in Factors) 
 Using the Kronecker representation gives where are polynomials with largest coe ff around 2500. 
 There are two points with positive coordinates, adding 
 allows one to show which is minimal, and that

  35. Example 3 Example (Restricted Words in Factors) 
 Using the Kronecker representation gives where are polynomials with largest coe ff around 2500. 
 There are two points with positive coordinates, adding 
 allows one to show which is minimal, and that

  36. Conclusion We • Give the first complexity bounds for methods in analytic combinatorics in several variables • Combine strong symbolic results on the Kronecker representation with fast algorithms on univariate polynomials in a novel way to create a symbolic-numeric data structure Lots of room for extensions on the analytic combinatorics side and the computer algebra side!

  37. FIN ( MERCI )

  38. Example (Lattice Path Model) 
 The asymptotic contribution of a point given by a root of 
 is All 4 roots contribute to the asymptotics up to 
 exponential decay, however only the first determines the 
 dominant polynomial growth, which is

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend