2. Violator Spaces
Definition 1 ([3]). A violator space is a pair , where E is a finite set and ν is a violator operator, i.e., a mapping , such that for all subsets the following properties are satisfied: V1: (consistency);
V2: and (locality).
Let
be a violator space. Let
. So, if
is defined by (
3) then
Theorem 1 ([11]). Let E be a finite set and two mappings, such that for all . Then, is a violator space if and only if φ satisfies C1: (extensivity);
C2: (self-convexity).
Thus, we have two equivalent approaches to defining violator spaces:
the classic one—, where the ground set E is equipped with the mapping satisfying consistency and locality;
the dual one—, where the ground set E is equipped with the mapping satisfying extensivity and self-convexity.
In what follows, a pair , where E is a finite set and is a mapping satisfying extensivity and self-convexity, will be considered a violator space as well.
Since a violator operator is extensive it may be interpreted as a type of a “closure” operator. The concept of closure appears in many disciplines, including topology, algebra, logic, geometry, convexity analysis, graph theory, etc. It is also known by other names, such as span, hull, and envelope. For instance, the convex hull operator on the Euclidean space is a classic example of a closure operator.
Definition 2. Let E be a finite set; is a closure operator on E if for all subsets the following properties are satisfied:
CL1: (extensivity);
CL2: (isotonicity);
CL3: (idempotence).
It is proved that every closure operator is a violator operator, since isotonicity and idempotence imply self-convexity, and extensivity with self-convexity implies idempotence [
11]. However, not each violator operator is a closure operator, since it does not have to satisfy isotonicity.
Let us consider some additional properties of violator operators.
Lemma 1. Let be a violator space. Then, for all .
Proof. “If”: Let . Since extensivity implies , we conclude with .
“Only if”: If then . Hence, by self-convexity, . □
Proposition 1. Let E be a finite set. For each extensive operator self-convexity is equivalent to the following property:
C22: for all .
Proof. 1. C2 ⇒ C22: From Lemma 1 . Hence, .
2. C22 ⇒C2: (from extensivity). Then, C22 implies . □
Lemma 2 ([
11]).
Let be a violator space. Then, 2.1. Uniquely Generated Violator Spaces
Let be an arbitrary space with the operator . is a generator of if . A basis of X is an inclusion-minimal set (not necessarily included in X) with . A space is uniquely generated if every set has a unique basis.
Proposition 2 ([11]). A violator space is uniquely generated if and only if for every It is known that a closure operator
is uniquely generated if and only if it satisfies the
anti-exchange property [
10,
12,
13]:
We extend this characterization to violator spaces in the following:
Theorem 2 ([11]). Let be a violator space. Then, is uniquely generated if and only if the operator φ satisfies the anti-exchange property. An element x of a subset is an extreme point of X if . The set of extreme points of X is denoted by .
Proposition 3 ([11]). For violator spaces: if and only if . Theorem 3 ([11]). Let be a violator space. Then, is uniquely generated if and only if for every set , . Corollary 1 ([11]). Let be a uniquely generated violator space. Then, for every the set is the unique basis of X. 2.2. LP-Type Problems
A different way to define violator spaces, consistent with their historical development, is through their introduction as a framework that generalizes LP-type problems.
An LP-type problem is defined by a finite set E of constraints and a value associated with every subset . These values can be real numbers or elements of any other linearly ordered set. The mapping must satisfy the axioms outlined in the following definition.
Definition 3 ([3]). An LP-type problem is a quadruple , where E is a finite set, W is a set linearly ordered by ≤, and w is a mapping , such that for all subsets the following properties are satisfied: V11: (monotonicity);
V22: for all , if and there exists such that then (locality).
A classic example of an LP-type problem is the computation of the smallest circle that contains all of a given finite set of points in the Euclidean plane. In this case, E represents a set of points in the plane, and is the radius of the smallest circle that encloses all points of X. Monotonicity of w is straightforward. To demonstrate locality, observe that for if then X and Y share the same smallest enclosing circle. If then a lies outside this circle, which, in turn, means .
For an LP-type problem and for , a basis of X is an inclusion-minimal subset B of X with . Solving an LP-type problem means identifying a basis of E.
Let us again illustrate this, using the smallest circle problem. A basis of X is a minimal subset of points that share the same enclosing circle as X. Specifically, all points in this basis lie on the boundary of the circle.
The set of all constraints violating
, denoted as
, is defined as
This set includes all elements
a in the ground set
E that are not in
X and, when added to
X, cause the objective function
w to increase. For the smallest circle problem, the violated constraints of
X are precisely the points that lie outside the smallest enclosing circle of
X.
One can see that the condition
generally does not suffice for
. For example [
3], if
for all
then any
X of the same size will have the same
; however,
, and so no distinct sets
X share the value of
. Thus, we can see that
w by itself does not capture the combinatorial structure of the problem. To describe the “structure” of an LP-type problem Matoušek et al. [
3] introduced the concept of a violator space and proved that every LP-type problem can naturally be converted into a violator space with violator mapping
but that the reverse is not necessarily true.
Proposition 4 ([3]). Consider an LP-type problem , and let ν be its violator mapping defined by (3). Then, is a violator space and is basis-equivalent to . Take a small example, to illustrate how LP-type systems really create a violator space and bases.
Example 1. Build the simplest LP-type system whose atoms a, b, c, d have weights 1, 2, 2, 3, respectively. The full definition of the function w, the corresponding function ν, and the bases are shown in Table 1. It is easy to see that the operator w is monotone and satisfies locality. It is not a uniquely generated space, since the subsets and each have two bases.
In the previous example, the violator operator is also a closure operator, as it is monotone. Consider another example, which encapsulates all the previous definitions and illustrates the basic concepts of LP-type problems.
Example 2. Let be four points in the Euclidean plane, such that point c lies on the boundary of the circle passing through points a and b.
Let us sort the radii of the enclosing circles by size. For each point from E, the radius of its circle is 0. The radius of the circle that encloses the pair of points or is half the distance between the two points. The radius of the circle that encloses both points a and b is equal to the radius of the circle that encloses all three points a, b, and c, making it the third-largest radius. The next-largest radius is for the pairs and , and so on.
The full definitions of the function w and the corresponding functions ν and φ are shown in Table 2. It is easy to see that the operator w is monotone and satisfies locality. However, the operator does not satisfy monotonicity. Indeed, while , (see Table 1 and Figure 1). From this example, we can also gain a better understanding of the notion of basis. Thus, the basis of the subset is the pair , and the basis of E is a pair . Note that a unique basis is not always guaranteed. If we add another point e on the circle passing through points , exactly opposite point c, we obtain two bases for : the pair and the pair (see Figure 2). 3. Greedoids
The concept of a greedoid was introduced by Bernhard Korte and László Lovász around 1980 as a way to generalize the notion of structures that can be optimized using greedy algorithms [
7].
Definition 4. A set system is a greedoid if the following properties are satisfied:
(i) ;
(ii) , such that (augmentation property).
Elements of are called feasible sets.
The rank function of a greedoid is defined as follows:
Theorem 4 ([10]). A function is the rank function of a greedoid if and only if for all and all the following conditions hold: (1.1)
(1.2) (subcardinality)
(1.3) implies (monotonicity)
(1.4) implies (local submodularity).
Moreover, the greedoid is uniquely determined by its rank function: So, the pair
may be considered as a greedoid with
defined by (
4).
3.1. LP-Type Problems and Greedoids
The rank function r of a greedoid satisfies all the properties of the mapping w of an LP-type problem. It is monotone (Theorem 4) and satisfies the locality.
Proposition 5. Let be a greedoid with rank function r. Then, and implies for all and .
Proof. If and there is a maximal feasible set , with . In addition, there is a feasible set , with . Since A is a maximal feasible set in Y, , and . Then (from the augmentation property), there exists for which . Since A is a maximal feasible set in Y, , and so , i.e., is a feasible set, and then . □
Thus, each greedoid may be considered as an LP-type problem .
Note that the family
is the family of all the bases of an LP-type problem, since for each proper subset
A of a feasible set,
However, if the bases of an LP-type problem
form a greedoid, a function
w does not have to be a greedoid’s rank function. For example, every monotone function
w with different values on each element of
turns all subsets of
E to bases. While the bases constitute a greedoid, a function
w does not have to satisfy subcardinality.
Let us build a specific LP-type problem , where E is a finite set and w is a mapping , such that for all subsets the following properties are satisfied:
(1) ;
(2) (subcardinality);
(3) implies (monotonicity);
(4) For all if and there exists such that then (locality).
The property (4) may be reformulated as follows:
(5) For all and with and we have .
Proposition 6. Let w be a monotone mapping on . Then, locality (5) is equivalent to local submodularity (1.4).
Proof. 1. Let w satisfy locality and . Denote . Then, , and ; then, (from (5)) we have .
2. Let w satisfy local submodularity, , , , and . By repeatedly applying local submodularity we prove that . It is easy to see that the proposition is correct for . Let . From monotonicity it follows that . Hence, . Local submodularity implies . Denote .
Prove by induction on n that for each . From monotonicity it follows that for each . Then, implies . Thus, . □
In fact, the property of local submodularity may be extended as follows.
Corollary 2. If such that then .
Theorem 4 implies that an LP-type problem with mapping and determines a greedoid by .
3.2. Violator and Rank Closure Operators on Greedoids
Define
(rank) closure operator of greedoids ([
10]):
. The operator is extensive (
) and idempotent (
), but it does not have to be an isotone operator. So,
is not always a closure operator. At the same time, the definition of
coincides with the definition of a violator operator (
1). The following theorem supports the interpretation of greedoids as a subclass of violator spaces, since Properties
(i) and
(ii) define a violator operator.
Theorem 5 ([14]). A mapping is the closure operator of some greedoid if and only if (i)
(ii)
(iii) if for all and then .
Moreover, if σ satisfies (i), (ii), and (iii) then
.
Based on the definition of extreme points, we have
Then, the following condition
for all
is equivalent to
, and so the property
(iii) may be rewritten as follows:
Define —the family of bases with respect to operator .
Proposition 7. for each violator operator σ.
Proof. If , i.e., for all then for all holds , and so (from Proposition 3) . Then, . If then there exists , such that . Hence, for each self-convexity implies , i.e., . This concludes the proof, with . □
It is worth mentioning that Property (iii) is not necessary for to be a greedoid.
Example 3. Let . Define for each except . It is easy to check that the space is a uniquely generated violator space (it satisfies both extensivity and convexity) where the family of bases forms a greedoid. At the same time, operator φ does not satisfy (5), which is equivalent to (iii). Indeed, if then , , but . If we consider the rank function of the greedoid, we can see that , and so . Then, for this function σ the property (iii) holds and we have a not-uniquely-generated violator space.
Thus, the same family of bases may be obtained by different mappings.
3.3. Antimatroids—Uniquely Generated Greedoids
An antimatroid is a combinatorial structure related to the concept of a greedoid, and it describes a process where elements are added to a set in a sequential manner, subject to certain constraints. Antimatroids have many applications. Thus, game theory provides a framework in which antimatroids are interpreted as permission structures for coalitions [
15]. In mathematical psychology, antimatroids are used to describe the feasible states of knowledge of a human learner [
16,
17].
Antimatroids have various definitions. We will use the following.
Definition 5. An antimatroid is a greedoid closed under union.
To provide an equivalent definition, we need to introduce the concept of accessibility.
Definition 6. An accessible set system is a set system in which every non-empty feasible set contains an element x, such that is feasible.
By definition, the family of feasible sets of a greedoid is an accessible set system.
Lemma 3 ([10]). For an accessible set system the following statements are equivalent: (A1) is an antimatroid
(A2) is closed under union
(A3) implies .
Proposition 8. An antimatroid is a uniquely generated greedoid.
Proof. Let be an antimatroid. Since each antimatroid is a greedoid, it remains to prove that the greedoid is uniquely generated. Suppose there are two bases, and , such that . Since is a family of bases then . Hence, , because is an antimatroid. But (see Lemma 2). Contradiction. □
Since, for each greedoid is a violator operator, Theorem 2 implies the following.
Corollary 3. The operator σ of each antimatroid satisfies the anti-exchange property.
Theorem 6. The family is an antimatroid if and only if is a uniquely generated greedoid.
Proof. It remains to be proven that each uniquely generated greedoid is an antimatroid. Suppose but . Then, , and . Contradiction to anti-exchange property. □
4. Conclusions
We have shown that greedoids can be defined using a variant of the violator operator. The connections between violator spaces and greedoids have enabled us to provide a new characterization of antimatroids.
To gain further structural insights into antimatroids, one can explore co-spanning relations. Given an operator
, two sets
X and
Y are
co-spanning if
. The equivalence relation known as co-spanning has been studied for greedoids [
10], and it has been shown that this relation uniquely determines greedoids.
Similar equivalence relations have also been explored for violator spaces [
11,
18,
19]. It is known that violator operators are closed under union (Lemma 2) and satisfy the following property [
11]:
which we refer to as
convexity, in accordance with Monjardet [
20], since this property addresses all sets lying between two given sets.
Based on this property, it was proved [
19] that the equivalence classes of a co-spanning relation are closed under union and convex if and only if they arise from a co-spanning relation of a violator space. Moreover, a co-spanning partition to intervals
corresponds to a uniquely generated violator space. We extended this approach to antimatroids and convex geometries, with the initial results available in [
21]. Further investigation of these structures could lead to new characterizations of antimatroids and other combinatorial structures.
It seems very appealing to generalize our findings to the infinite case. As we see it, topological spaces may provide the main motivation for such a generalization [
22].