Next Article in Journal
Robust State Feedback Control with D-Admissible Assurance for Uncertain Discrete Singular Systems
Previous Article in Journal
Extremal Trees for Logarithmic VDB Topological Indices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Greedoids and Violator Spaces

1
Department of Computer Science, Holon Institute of Technology, Holon 5810201, Israel
2
Department of Mathematics, Ariel University, Ariel 40700, Israel
*
Author to whom correspondence should be addressed.
Axioms 2024, 13(9), 633; https://doi.org/10.3390/axioms13090633
Submission received: 31 July 2024 / Revised: 9 September 2024 / Accepted: 14 September 2024 / Published: 17 September 2024
(This article belongs to the Section Algebra and Number Theory)

Abstract

:
This research explores the interplay between violator spaces and greedoids—two distinct theoretical frameworks developed independently. Violator spaces were introduced as a generalization of linear programming, while greedoids were designed to characterize combinatorial structures where greedy algorithms yield optimal solutions. These frameworks have, until now, existed in isolation. This paper bridges the gap by showing that greedoids can be defined using a modified violator operator. The established connections not only deepen our understanding of these theories but also provide a new characterization of antimatroids.
MSC:
52A01; 52B40 (primary); 90C05 (secondary)

1. Preliminaries

The primary objective of the paper is to establish connections between two combinatorial concepts: violator spaces and greedoids. Violator spaces emerged as a generalization of Linear Programming (LP) problems. LP-type problems were introduced and studied by Matoušek, Sharir, and Welzl [1,2] as a combinatorial framework encompassing linear programming and other computational geometric problems. Subsequently, Matoušek [3] introduced violator spaces as a simpler framework that generalizes LP-type problems. Violator spaces provide an abstract structure that facilitates the formulation and design of efficient algorithms for solving optimization problems across diverse areas, such as computational geometry [4], computational algebra [5], and machine learning [6].
Greedoids were introduced in an effort to characterize combinatorial structures where the greedy algorithm yields optimal solutions [7,8]. Numerous examples of greedoids appear in various areas of mathematics [9,10]. This work explores the relationships between violator spaces and greedoids, showing that greedoids can be defined using a variant of the violator operator. These interrelations provide a new characterization of antimatroids.

2. Violator Spaces

Definition 1 
([3]). A violator space is a pair ( E , ν ) , where E is a finite set and ν is a violator operator, i.e., a mapping 2 E 2 E , such that for all subsets X , Y E the following properties are satisfied:
V1: X ν ( X ) = (consistency);
V2: ( X Y and Y ν ( X ) = ) ν ( X ) = ν ( Y ) (locality).
Let ( E , ν ) be a violator space. Let φ ( X ) = E ν ( X ) . So, if ν is defined by (3) then
φ ( X ) = { a E : w ( X a ) = w ( X ) } .
Theorem 1 
([11]). Let E be a finite set and ν , φ : 2 E 2 E two mappings, such that φ ( X ) = E ν ( X ) for all X E . Then, ( E , ν ) is a violator space if and only if φ satisfies
C1: X φ ( X ) (extensivity);
C2: ( X Y φ ( X ) ) φ ( X ) = φ ( Y ) (self-convexity).
Thus, we have two equivalent approaches to defining violator spaces:
  • the classic one— ( E , ν ) , where the ground set E is equipped with the mapping ν satisfying consistency and locality;
  • the dual one— ( E , φ ) , where the ground set E is equipped with the mapping φ satisfying extensivity and self-convexity.
In what follows, a pair ( E , φ ) , where E is a finite set and φ is a mapping satisfying extensivity and self-convexity, will be considered a violator space as well.
Since a violator operator φ is extensive it may be interpreted as a type of a “closure” operator. The concept of closure appears in many disciplines, including topology, algebra, logic, geometry, convexity analysis, graph theory, etc. It is also known by other names, such as span, hull, and envelope. For instance, the convex hull operator on the Euclidean space is a classic example of a closure operator.
Definition 2. 
Let E be a finite set; τ : 2 E 2 E is a closure operator on E if for all subsets X , Y E the following properties are satisfied:
CL1: X τ ( X ) (extensivity);
CL2: X Y τ ( X ) τ ( Y ) (isotonicity);
CL3: τ ( τ ( X ) ) = τ ( X ) (idempotence).
It is proved that every closure operator is a violator operator, since isotonicity and idempotence imply self-convexity, and extensivity with self-convexity implies idempotence [11]. However, not each violator operator is a closure operator, since it does not have to satisfy isotonicity.
Let us consider some additional properties of violator operators.
Lemma 1. 
Let ( E , φ ) be a violator space. Then, X φ ( Y ) φ ( Y ) = φ ( Y X ) for all X , Y E .
Proof. 
If”: Let φ ( Y ) = φ ( Y X ) . Since extensivity implies X Y X φ ( Y X ) , we conclude with X φ ( Y ) .
Only if”: If X φ ( Y ) then Y Y X φ ( Y ) . Hence, by self-convexity, φ ( Y ) = φ ( Y X ) . □
Proposition 1. 
Let E be a finite set. For each extensive operator φ : 2 E 2 E self-convexity is equivalent to the following property:
C22: ( X φ ( Y ) Y φ ( X ) ) φ ( X ) = φ ( Y ) for all X , Y E .
Proof. 
1. C2C22: From Lemma 1 ( X φ ( Y ) Y φ ( X ) ) φ ( Y ) = φ ( X Y ) = φ ( X ) . Hence, φ ( X ) = φ ( Y ) .
2. C22C2: ( X Y φ ( X ) ) X φ ( Y ) Y φ ( X ) (from extensivity). Then, C22 implies φ ( X ) = φ ( Y ) . □
Lemma 2 
([11]). Let ( E , φ ) be a violator space. Then,
φ ( X ) = φ ( Y ) φ ( X Y ) = φ ( X ) = φ ( Y )

2.1. Uniquely Generated Violator Spaces

Let ( E , α ) be an arbitrary space with the operator α : 2 E 2 E . B E is a generator of X E if α ( B ) = α ( X ) . A basis of X is an inclusion-minimal set B E (not necessarily included in X) with α ( B ) = α ( X ) . A space ( E , α ) is uniquely generated if every set X E has a unique basis.
Proposition 2 
([11]). A violator space ( E , φ ) is uniquely generated if and only if for every X , Y E
φ ( X ) = φ ( Y ) φ ( X Y ) = φ ( X ) = φ ( Y ) .
It is known that a closure operator τ is uniquely generated if and only if it satisfies the anti-exchange property [10,12,13]:
p , q τ ( X ) p τ ( X q ) q τ ( X p ) .
We extend this characterization to violator spaces in the following:
Theorem 2 
([11]). Let ( E , φ ) be a violator space. Then, ( E , φ ) is uniquely generated if and only if the operator φ satisfies the anti-exchange property.
An element x of a subset X E is an extreme point of X if x α ( X x ) . The set of extreme points of X is denoted by e x ( X ) .
Proposition 3 
([11]). For violator spaces: x e x ( X ) if and only if φ ( X ) φ ( X x ) .
Theorem 3 
([11]). Let ( E , φ ) be a violator space. Then, ( E , φ ) is uniquely generated if and only if for every set X E , φ ( X ) = φ ( e x ( X ) ) .
Corollary 1 
([11]). Let ( E , φ ) be a uniquely generated violator space. Then, for every X E the set e x ( X ) is the unique basis of X.

2.2. LP-Type Problems

A different way to define violator spaces, consistent with their historical development, is through their introduction as a framework that generalizes LP-type problems.
An LP-type problem is defined by a finite set E of constraints and a value w ( X ) associated with every subset X E . These values can be real numbers or elements of any other linearly ordered set. The mapping X w ( X ) must satisfy the axioms outlined in the following definition.
Definition 3 
([3]). An LP-type problem is a quadruple ( E , w , W , ) , where E is a finite set, W is a set linearly ordered by ≤, and w is a mapping 2 E W , such that for all subsets X , Y E the following properties are satisfied:
V11: X Y w ( X ) w ( Y ) (monotonicity);
V22: for all X Y , if w ( X ) = w ( Y ) and there exists a E such that w ( Y ) < w ( Y a ) then w ( X ) < w ( X a ) (locality).
A classic example of an LP-type problem is the computation of the smallest circle that contains all of a given finite set of points in the Euclidean plane. In this case, E represents a set of points in the plane, and w ( X ) is the radius of the smallest circle that encloses all points of X. Monotonicity of w is straightforward. To demonstrate locality, observe that for X Y if w ( X ) = w ( Y ) then X and Y share the same smallest enclosing circle. If w ( Y ) < w ( Y a ) then a lies outside this circle, which, in turn, means w ( X ) < w ( X a ) .
For an LP-type problem ( E , w , W , ) and for X E , a basis of X is an inclusion-minimal subset B of X with w ( B ) = w ( X ) . Solving an LP-type problem ( E , w , W , ) means identifying a basis of E.
Let us again illustrate this, using the smallest circle problem. A basis of X is a minimal subset of points that share the same enclosing circle as X. Specifically, all points in this basis lie on the boundary of the circle.
The set of all constraints violating X E , denoted as ν ( X ) , is defined as
ν ( X ) = { a E : w ( X a ) > w ( X ) } .
This set includes all elements a in the ground set E that are not in X and, when added to X, cause the objective function w to increase. For the smallest circle problem, the violated constraints of X are precisely the points that lie outside the smallest enclosing circle of X.
One can see that the condition w ( X ) = w ( Y ) generally does not suffice for ν ( X ) = ν ( Y ) . For example [3], if w ( X ) = X for all X E then any X of the same size will have the same w ( X ) ; however, ν ( X ) = E X , and so no distinct sets X share the value of ν ( X ) . Thus, we can see that w by itself does not capture the combinatorial structure of the problem. To describe the “structure” of an LP-type problem Matoušek et al. [3] introduced the concept of a violator space and proved that every LP-type problem can naturally be converted into a violator space with violator mapping ν but that the reverse is not necessarily true.
Proposition 4 
([3]). Consider an LP-type problem ( E , w , W , ) , and let ν be its violator mapping defined by (3). Then, ( E , ν ) is a violator space and ( E , ν ) is basis-equivalent to ( E , w , W , ) .
Take a small example, to illustrate how LP-type systems really create a violator space and bases.
Example 1. 
Build the simplest LP-type system whose atoms a, b, c, d have weights 1, 2, 2, 3, respectively. The full definition of the function w, the corresponding function ν, and the bases are shown in Table 1.
It is easy to see that the operator w is monotone and satisfies locality. It is not a uniquely generated space, since the subsets { b , c } and { a , b , c } each have two bases.
In the previous example, the violator operator ν is also a closure operator, as it is monotone. Consider another example, which encapsulates all the previous definitions and illustrates the basic concepts of LP-type problems.
Example 2. 
Let E = { a , b , c , d } be four points in the Euclidean plane, such that point c lies on the boundary of the circle passing through points a and b.
Let us sort the radii of the enclosing circles by size. For each point from E, the radius of its circle is 0. The radius of the circle that encloses the pair of points ( a , c ) or ( b , c ) is half the distance between the two points. The radius of the circle that encloses both points a and b is equal to the radius of the circle that encloses all three points a, b, and c, making it the third-largest radius. The next-largest radius is for the pairs ( a , d ) and ( b , d ) , and so on.
The full definitions of the function w and the corresponding functions ν and φ are shown in Table 2.
It is easy to see that the operator w is monotone and satisfies locality. However, the operator φ ( X ) does not satisfy monotonicity. Indeed, while X = { a , b } Y = { a , b , d } , φ ( X ) = { a , b , c } φ ( Y ) = { a , b , d } (see Table 1 and Figure 1). From this example, we can also gain a better understanding of the notion of basis. Thus, the basis of the subset { a , b , c } is the pair { a , b } , and the basis of E is a pair { c , d } . Note that a unique basis is not always guaranteed. If we add another point e on the circle passing through points { a , b } , exactly opposite point c, we obtain two bases for { a , b , c , e } : the pair { a , b } and the pair { c , e } (see Figure 2).

3. Greedoids

The concept of a greedoid was introduced by Bernhard Korte and László Lovász around 1980 as a way to generalize the notion of structures that can be optimized using greedy algorithms [7].
Definition 4. 
A set system ( E , F ) is a greedoid if the following properties are satisfied:
(i)  F ;
(ii)  X , Y F , X < Y y Y X , such that X y F (augmentation property).
Elements of F are called feasible sets.
The rank function of a greedoid is defined as follows:
r ( X ) = m a x { | A | : A X , A F } .
Theorem 4 
([10]). A function r : 2 E Z + is the rank function of a greedoid if and only if for all X , Y E and all x , y E the following conditions hold:
(1.1) r ( ) = 0
(1.2) r ( X ) | X | (subcardinality)
(1.3) X Y implies r ( X ) r ( Y ) (monotonicity)
(1.4) r ( X ) = r ( X x ) = r ( X y ) implies r ( X ) = r ( X x y ) (local submodularity).
Moreover, the greedoid is uniquely determined by its rank function:
F = { X : r ( X ) = | X | } .
So, the pair ( E , r ) may be considered as a greedoid with F defined by (4).

3.1. LP-Type Problems and Greedoids

The rank function r of a greedoid satisfies all the properties of the mapping w of an LP-type problem. It is monotone (Theorem 4) and satisfies the locality.
Proposition 5. 
Let ( E , F ) be a greedoid with rank function r. Then, r ( X ) = r ( Y ) and r ( Y ) < r ( Y a ) implies r ( X ) < r ( X a ) for all X Y and a E .
Proof. 
If X Y and r ( X ) = r ( Y ) there is a maximal feasible set A X , with | A | = r ( X ) = r ( Y ) . In addition, there is a feasible set C ( Y a ) , with | C | > | A | . Since A is a maximal feasible set in Y, C Y , a Y and a C . Then (from the augmentation property), there exists x C for which A x F . Since A is a maximal feasible set in Y, x Y , and so x = a , i.e., A a is a feasible set, and then r ( X ) < r ( X a ) . □
Thus, each greedoid ( E , r ) may be considered as an LP-type problem ( E , r , Z + , ) .
Note that the family F is the family of all the bases of an LP-type problem, since for each proper subset A of a feasible set,
X F , r ( A ) A < X = r ( X ) .
However, if the bases of an LP-type problem ( E , w , Z + , ) form a greedoid, a function w does not have to be a greedoid’s rank function. For example, every monotone function w with different values on each element of 2 E turns all subsets of E to bases. While the bases constitute a greedoid, a function w does not have to satisfy subcardinality.
Let us build a specific LP-type problem ( E , w , Z + , ) , where E is a finite set and w is a mapping 2 E Z + , such that for all subsets X , Y E the following properties are satisfied:
(1)  w ( ) = 0 ;
(2)  w ( X ) | X | (subcardinality);
(3)  X Y implies w ( X ) w ( Y ) (monotonicity);
(4) For all X Y if w ( X ) = w ( Y ) and there exists a E such that w ( Y ) < w ( Y a ) then w ( X ) < w ( X a ) (locality).
The property (4) may be reformulated as follows:
(5) For all X Y and a E with w ( X ) = w ( Y ) and w ( X ) = w ( X a ) we have w ( Y ) = w ( Y a ) .
Proposition 6. 
Let w be a monotone mapping on 2 E . Then, locality (5) is equivalent to local submodularity (1.4).
Proof. 
1. Let w satisfy locality and w ( X ) = w ( X x ) = w ( X y ) . Denote Y = X x . Then, X Y , w ( X ) = w ( Y ) and w ( X ) = w ( X y ) ; then, (from (5)) we have w ( X ) = w ( Y ) = w ( Y y ) = w ( X x y ) .
2. Let w satisfy local submodularity, X Y E , a E , w ( X ) = w ( Y ) , and w ( X ) = w ( X a ) . By repeatedly applying local submodularity we prove that w ( Y ) = w ( Y a ) . It is easy to see that the proposition is correct for a Y . Let Y X = { y 1 , y 2 , , y n } . From monotonicity it follows that w ( X ) = w ( X y 1 ) = w ( Y ) . Hence, w ( X ) = w ( X a ) = w ( X y 1 ) . Local submodularity implies w ( X ) = w ( X y 1 a ) . Denote Y k = X { y 1 , y 2 , , y k } .
Prove by induction on n that w ( X ) = w ( Y k a ) for each 1 k n . From monotonicity it follows that w ( X ) = w ( Y k ) for each 1 k n . Then, w ( X ) = w ( Y k a ) = w ( Y k y k + 1 ) implies w ( X ) = w ( Y k + 1 a ) . Thus, w ( X ) = w ( Y ) = w ( Y n a ) = w ( Y a ) . □
In fact, the property of local submodularity may be extended as follows.
Corollary 2. 
If X , Y E such that w ( X ) = w ( Y ) = w ( X Y ) then w ( X Y ) = w ( X Y ) .
Theorem 4 implies that an LP-type problem with mapping w ( ) = 0 and w ( X ) X determines a greedoid ( E , w ) by F = { X : w ( X ) = X } .

3.2. Violator and Rank Closure Operators on Greedoids

Define (rank) closure operator of greedoids ([10]): σ ( X ) = { x : r ( X x ) = r ( X ) } . The operator is extensive ( C L 1 ) and idempotent ( C L 3 ), but it does not have to be an isotone operator. So, σ is not always a closure operator. At the same time, the definition of σ coincides with the definition of a violator operator (1). The following theorem supports the interpretation of greedoids as a subclass of violator spaces, since Properties (i) and (ii) define a violator operator.
Theorem 5 
([14]). A mapping σ : 2 E 2 E is the closure operator of some greedoid ( E , F ) if and only if
(i) X σ ( X )
(ii) ( X Y σ ( X ) ) σ ( X ) = σ ( Y )
(iii) if z σ ( X x z ) for all z X x and x σ ( X y ) then y σ ( X x ) .
Moreover, if σ satisfies (i), (ii), and (iii) then
F = { X E : x X : x σ ( X x ) } .
Based on the definition of extreme points, we have
F = { X E : X = e x ( X ) } .
Then, the following condition z σ ( X x z ) for all z X x is equivalent to X x F , and so the property (iii) may be rewritten as follows:
( X x F ) ( x σ ( X y ) ) y σ ( X x ) .
Define B = { X E : Y X : σ ( X ) σ ( Y ) } —the family of bases with respect to operator σ .
Proposition 7. 
B = F for each violator operator σ.
Proof. 
If X B , i.e., for all Y X : σ ( X ) σ ( Y ) then for all x X holds σ ( X ) σ ( X x ) , and so (from Proposition 3) x σ ( X x ) . Then, B F . If X B then there exists Y X , such that σ ( X ) = σ ( Y ) . Hence, for each x X Y self-convexity implies σ ( X ) = σ ( X x ) , i.e., x σ ( X x ) . This concludes the proof, with F B . □
It is worth mentioning that Property (iii) is not necessary for F to be a greedoid.
Example 3. 
Let E = { 1 , 2 , 3 } . Define φ ( X ) = X for each X E except φ ( { 1 } ) = φ ( { 1 , 3 } ) = { 1 , 3 } . It is easy to check that the space ( E , φ ) is a uniquely generated violator space (it satisfies both extensivity and convexity) where the family of bases F = P ( { 1 , 2 , 3 } ) { 1 , 3 } forms a greedoid. At the same time, operator φ does not satisfy (5), which is equivalent to (iii). Indeed, if X = , x = 3 , y = 1 then X x = { 3 } F , x φ ( X y ) = φ ( { 1 } ) = { 1 , 3 } , but y φ ( X x ) = φ ( { 3 } ) .
If we consider the rank function of the greedoid, we can see that r ( { 1 } ) = r ( { 3 } ) = r ( { 1 , 3 } ) , and so σ ( { 1 } ) = σ ( { 3 } ) = { 1 , 3 } . Then, for this function σ the property (iii) holds and we have a not-uniquely-generated violator space.
Thus, the same family of bases may be obtained by different mappings.

3.3. Antimatroids—Uniquely Generated Greedoids

An antimatroid is a combinatorial structure related to the concept of a greedoid, and it describes a process where elements are added to a set in a sequential manner, subject to certain constraints. Antimatroids have many applications. Thus, game theory provides a framework in which antimatroids are interpreted as permission structures for coalitions [15]. In mathematical psychology, antimatroids are used to describe the feasible states of knowledge of a human learner [16,17].
Antimatroids have various definitions. We will use the following.
Definition 5. 
An antimatroid is a greedoid closed under union.
To provide an equivalent definition, we need to introduce the concept of accessibility.
Definition 6. 
An accessible set system ( E , F ) is a set system in which every non-empty feasible set X F contains an element x, such that X x is feasible.
By definition, the family of feasible sets of a greedoid is an accessible set system.
Lemma 3 
([10]). For an accessible set system ( E , F ) the following statements are equivalent:
(A1) ( E , F ) is an antimatroid
(A2) F is closed under union
(A3) A , A x , A y F implies A { x , y } F .
Proposition 8. 
An antimatroid is a uniquely generated greedoid.
Proof. 
Let F be an antimatroid. Since each antimatroid is a greedoid, it remains to prove that the greedoid is uniquely generated. Suppose there are two bases, B 1 and B 2 , such that σ ( B 1 ) = σ ( B 2 ) . Since F is a family of bases then B 1 , B 2 F . Hence, B 1 B 2 F , because F is an antimatroid. But σ ( B 1 B 2 ) = σ ( B 1 ) (see Lemma 2). Contradiction. □
Since, for each greedoid σ is a violator operator, Theorem 2 implies the following.
Corollary 3. 
The operator σ of each antimatroid satisfies the anti-exchange property.
Theorem 6. 
The family F is an antimatroid if and only if F is a uniquely generated greedoid.
Proof. 
It remains to be proven that each uniquely generated greedoid is an antimatroid. Suppose A , A x , A y F but A { x , y } F . Then, x , y σ ( A ) , x σ ( A y ) and y σ ( A x ) . Contradiction to anti-exchange property. □

4. Conclusions

We have shown that greedoids can be defined using a variant of the violator operator. The connections between violator spaces and greedoids have enabled us to provide a new characterization of antimatroids.
To gain further structural insights into antimatroids, one can explore co-spanning relations. Given an operator σ , two sets X and Y are co-spanning if σ ( X ) = σ ( Y ) . The equivalence relation known as co-spanning has been studied for greedoids [10], and it has been shown that this relation uniquely determines greedoids.
Similar equivalence relations have also been explored for violator spaces [11,18,19]. It is known that violator operators are closed under union (Lemma 2) and satisfy the following property [11]:
( X Y Z ) ( φ ( X ) = φ ( Z ) ) φ ( X ) = φ ( Y ) = φ ( Z )
which we refer to as convexity, in accordance with Monjardet [20], since this property addresses all sets lying between two given sets.
Based on this property, it was proved [19] that the equivalence classes of a co-spanning relation are closed under union and convex if and only if they arise from a co-spanning relation of a violator space. Moreover, a co-spanning partition to intervals [ A ] φ = [ e x ( A ) , φ ( A ) ] corresponds to a uniquely generated violator space. We extended this approach to antimatroids and convex geometries, with the initial results available in [21]. Further investigation of these structures could lead to new characterizations of antimatroids and other combinatorial structures.
It seems very appealing to generalize our findings to the infinite case. As we see it, topological spaces may provide the main motivation for such a generalization [22].

Author Contributions

Writing—Original draft, Y.K.; Writing—Review and editing, V.E.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

There is no data to be shared for this article.

Acknowledgments

We would like to thank the anonymous reviewers for their helpful suggestions. Special thanks to the reviewer who significantly contributed to the revision of Section 2 by adding examples to illustrate the new concepts.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Matoušek, J.; Sharir, M.; Welzl, E. A subexponential bound for linear programming. Algorithmica 1996, 16, 498–516. [Google Scholar] [CrossRef]
  2. Sharir, M.; Welzl, E. A combinatorial bound for linear programming and related problems. In STACS 1992—9th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1992; Volume 577, pp. 569–579. [Google Scholar]
  3. Gärtner, B.; Matoušek, J.; Rüst, L.; Škovroň, P. Violator spaces: Structure and algorithms. Discret. Appl. Math. 2008, 156, 2124–2141. [Google Scholar] [CrossRef]
  4. Har-Peled, S. Shortest path in a polygon using sublinear space. J. Comput. Geom. 2016, 7, 19–45. [Google Scholar]
  5. De Loera, J.A.; Petrovic, S.; Stasi, D. Random sampling in computational algebra: Helly numbers and violator spaces. J. Symb. Comput. 2016, 77, 1–15. [Google Scholar] [CrossRef]
  6. Esposito, G.; Martin, M. A Randomized algorithm for the exact solution of transductive support vector machines. Appl. Artif. Intell. 2015, 29, 459–479. [Google Scholar] [CrossRef]
  7. Korte, B.; Lovász, L. Mathematical structures underlying greedy algorithms. In Fundamentals of Computation Theory; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1981; Volume 117, pp. 205–209. [Google Scholar]
  8. Szeszlér, D. Sufficient conditions for the optimality of the greedy algorithm in greedoids. J. Comb. 2022, 44, 287–302. [Google Scholar] [CrossRef]
  9. Björner, A.; Ziegler, G.M. Introduction to Greedoids. In Matroid Applications; White, N., Ed.; Cambridge University Press: Cambridge, UK, 1992. [Google Scholar]
  10. Korte, B.; Lovász, L.; Schrader, R. Greedoids; Springer: New York, NY, USA; Berlin/Heidelberg, Germany, 1991. [Google Scholar]
  11. Kempner, Y.; Levit, V.E. Violator spaces vs. closure spaces. Eur. J. Comb. 2019, 80, 203–213. [Google Scholar] [CrossRef]
  12. Edelman, P.H.; Jamison, R.E. The theory of convex geometries. Geom. Dedicata 1985, 19, 247–270. [Google Scholar] [CrossRef]
  13. Pfaltz, J. Closure Lattices. Discret. Math. 1996, 154, 217–236. [Google Scholar] [CrossRef]
  14. Goecke, O.; Korte, B.; Lovász, L. Examples and algorithmic properties of greedoids. In Combinatorial Optimization; Simone, B., Ed.; Lecture Notes in Mathematics; Springer: New York, NY, USA; Berlin/Heidelberg, Germany, 2006; Volume 1403, pp. 113–161. [Google Scholar]
  15. Algaba, E.; Bilbao, J.M.; van den Brink, R.; Jimenez-Losada, A. Cooperative Games on Antimatroids. Discret. Math. 2004, 282, 1–15. [Google Scholar] [CrossRef]
  16. Falmagne, J.-C.; Doignon, J.-P. Learning Spaces: Interdisciplinary Applied Mathematics; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  17. Yoshikawa, H.; Hirai, H.; Makino, K. A representation of antimatroids by Horn rules and its application to educational systems. J. Math. Psychol. 2017, 77, 82–93. [Google Scholar] [CrossRef]
  18. Brise, Y.; Gärtner, B. Clarkson’s algorithm for violator spaces. Comput. Geom. 2011, 44, 70–81. [Google Scholar] [CrossRef]
  19. Kempner, Y.; Levit, V.E. Cospanning characterizations of violator and co-violator spaces. In Combinatorics, Graph Theory and Computing. SEICCGTC 2021; Springer Proceedings in Mathematics & Statistics; Hoffman, F., Holliday, S., Rosen, Z., Shahrokhi, F., Wierman, J., Eds.; Springer: Cham, Switzerland, 2024; Volume 448, pp. 109–117. [Google Scholar] [CrossRef]
  20. Monjardet, B.; Raderanirina, V. The duality between the anti-exchange closure operators and the path independent choice operators on a finite set. Math. Soc. Sci. 2001, 41, 131–150. [Google Scholar] [CrossRef]
  21. Kempner, Y.; Levit, V.E. Cospanning characterizations of antimatroids and convex geometries. arXiv 2021, arXiv:2107.08556. [Google Scholar]
  22. Lei, Y.; Zhang, J. Closure system and its semantics. Axioms 2021, 10, 198. [Google Scholar] [CrossRef]
Figure 1. An example of four points in a coordinate system.
Figure 1. An example of four points in a coordinate system.
Axioms 13 00633 g001
Figure 2. An example of five points in a coordinate system.
Figure 2. An example of five points in a coordinate system.
Axioms 13 00633 g002
Table 1. An example involving four elements.
Table 1. An example involving four elements.
X w ( X ) ν ( X ) Bases
{ a } 1 { b , c , d } { a }
{ b } 2 { d } { b }
{ c } 2 { d } { c }
{ d } 3 { d }
{ a , b } 2 { d } { b }
{ a , c } 2 { d } { c }
{ a , d } 3 { d }
{ b , c } 2 { d } { b } , { c }
{ b , d } 3 { d }
{ c , d } 3 { d }
{ a , b , c } 2 { d } { b } , { c }
{ a , b , d } 3 { d }
{ a , c , d } 3 { d }
{ b , c , d } 3 { d }
{ a , b , c , d } 3 { d }
Table 2. An example of four points in a coordinate system.
Table 2. An example of four points in a coordinate system.
X w ( X ) ν ( X ) φ ( X )
{ a } 0 { b , c , d } { a }
{ b } 0 { a , c , d } { b }
{ c } 0 { a , b , d } { c }
{ d } 0 { a , b , c } { d }
{ a , b } 2 { d } { a , b , c }
{ a , c } 1 { b , d } { a , c }
{ a , d } 3 { b , c } { a , d }
{ b , c } 1 { a , d } { b , c }
{ b , d } 3 { a , c } { b , d }
{ c , d } 5 { a , b , c , d }
{ a , b , c } 2 { d } { a , b , c }
{ a , b , d } 4 { c } { a , b , d }
{ a , c , d } 5 { a , b , c , d }
{ b , c , d } 5 { a , b , c , d }
{ a , b , c , d } 5 { a , b , c , d }
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kempner, Y.; Levit, V.E. Greedoids and Violator Spaces. Axioms 2024, 13, 633. https://doi.org/10.3390/axioms13090633

AMA Style

Kempner Y, Levit VE. Greedoids and Violator Spaces. Axioms. 2024; 13(9):633. https://doi.org/10.3390/axioms13090633

Chicago/Turabian Style

Kempner, Yulia, and Vadim E. Levit. 2024. "Greedoids and Violator Spaces" Axioms 13, no. 9: 633. https://doi.org/10.3390/axioms13090633

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop