Linear algebra methods for Forbidden configurations
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 5763169 (Why is no real title available?)
- scientific article; zbMATH DE number 736296 (Why is no real title available?)
- A combinatorial problem; stability and order for models and theories in infinitary languages
- Counterexample to the Frankl-Pach conjecture for uniform, dense families
- Disjoint representability of sets and their complements
- Excluded permutation matrices and the Stanley-Wilf conjecture
- Forbidding complete hypergraphs as traces
- On disjointly representable sets
- On the Uniform Convergence of Relative Frequencies of Events to Their Probabilities
- On the VC-dimension of uniform hypergraphs
- On the density of families of sets
- Small forbidden configurations
- Small forbidden configurations. IV: The 3 rowed case
- Traces of uniform families of sets
- Two refinements of the bound of Sauer, Perles and Shelah, and of Vapnik and Chervonenkis
- Unavoidable traces of set systems
Cited in
(9)- Matrices with forbidden subconfigurations
- Matrices with forbidden submatrices
- Two refinements of the bound of Sauer, Perles and Shelah, and of Vapnik and Chervonenkis
- Forbidden configurations: boundary cases
- Genetic algorithms applied to problems of forbidden configurations
- Forbidden configurations: Induction and linear algebra
- Small forbidden configurations. IV: The 3 rowed case
- Multivalued matrices and forbidden configurations
- Small forbidden configurations. III.
This page was built for publication: Linear algebra methods for Forbidden configurations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q653981)