List Of Figures

Figure 1.1The graph of a relation
Figure 1.2Hasse diagram
Figure 1.3Only the first two posets are lattices
Figure 1.4(a) Pentagon(N5) and (b) diamond(M3)
Figure 1.5Cross product of posets
Figure 1.6A computation in the happened-before model
Figure 1.7Ferrer's diagram for (4,3,2) shown to contain (2,2,2)
Figure 1.8Young's lattice for (3,3,3)
Figure 2.1Adjacency list representation of a poset
Figure 2.2Vector clock labeling of a poset for a distributed computation
Figure 2.3Vector clock algorithm
Figure 2.4(a) An antichain of size 5 and (b) its two linear extensions
Figure 2.5(a,b) Trivial examples of p-diagrams
Figure 2.6(a) A p-diagram and (b) its corresponding infinite poset
Figure 3.1Decomposition of P into t chains
Figure 3.2Hall's Marriage Theorem
Figure 3.3A poset of width 2 forcing an algorithm to use three chains for decomposition
Figure 3.4Chain partitioning algorithm
Figure 4.1Function that determines if an antichain of size k exists
Figure 4.2An example of a failed naive strategy. (a) The initial configuration. (b) The point at which the strategy fails: there is nowhere to insert (2,0,0). (c) This example can be merged into two chains
Figure 4.3Generalized merge procedure for deposets
Figure 4.4Function FindQ that finds the output queue to insert an element
Figure 4.5Using a queue insert graph to find the output queue
Figure 4.6Algorithm for the adversary
Figure 5.1Examples: lattices and sublattices
Figure 5.2Table notation for the algebra (X, ⊔ , ...

Get Introduction to Lattice Theory with Computer Science Applications now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.