Combinatorics and Optimization
Permanent URI for this collectionhttps://uwspace.uwaterloo.ca/handle/10012/9928
This is the collection for the University of Waterloo's Department of Combinatorics and Optimization.
Research outputs are organized by type (eg. Master Thesis, Article, Conference Paper).
Waterloo faculty, students, and staff can contact us or visit the UWSpace guide to learn more about depositing their research.
Browse
Recent Submissions
Item Forbidding odd K3,3 as a graft minor(University of Waterloo, 2025-10-06) Reinert, NathanA graph is odd−K5 free if K5 cannot be obtained by deleting edges and then contracting all edges in a cut. odd − K5 free graphs play an important role in the study of multi-commodity flows. A graph is odd − K3,3 free if K3,3 cannot be obtained by contracting edges and then deleting all edges in an eulerian subgraph. A long-standing conjecture of Paul Seymour predicts that postman sets pack in odd − K3,3 free graphs. We study odd − K3,3 free graphs that are almost planar in this thesis and discuss the relation to Seymour’s conjecture.Item Reflected and nonsymmetric crystal graphs(University of Waterloo, 2025-09-05) Niergarth, HarperThis thesis is comprised of two projects. The first studies a certain composition of crystal operators on semistandard Young tableaux, which we term raised reflection operators, and are related to a sign-reversing involution used to prove the Littlewood--Richardson rule. In particular, we investigate the graph defined by these crystal operators. Our main result is that this graph is balanced bipartite, giving another proof of the Littlewood--Richardson rule. We do so by giving a set of local rules that this graph satisfies and showing that any graph satisfying these rules is balanced bipartite. The second studies crystal operators on multiline queues. Certain multiline queues, called non-wrapping multiline queues, are in bijection with semistandard Young tableaux but are better equipped to study nonsymmetric polynomials called Demazure atoms. Indeed, each multiline queue comes equipped with a weak composition, called the type, and summing over all multiline queues of a fixed type yields a Demazure atom. Crystal operators on multiline queues do not preserve type. Our main result characterizes how crystal operators interact with the type of a multiline queue. In particular, we show that these operators may only change the type by a simple transposition and that the type changes if and only if the multiline queue is in a specific configuration.Item Extensions of the Tutte Polynomial and Results on the Interlace Polynomial(University of Waterloo, 2025-08-14) Reynes, JosephineIn graph theory, graph polynomials are an important tool to encode information from a graph. The Tutte polynomial, first introduced in 1947, is one of the most important graph polynomials due to its universality. Here, we present three classic definitions of the Tutte polynomial via a deletion-contraction recursion, via rank and nullity, and via activities. We will touch on the significance of this polynomial to the field of mathematics to motivate an extension to signed graphs. Extending the polynomial to retain deletion contraction and inactivity information, we introduce an extended Tutte polynomial to allow for the construction of a Tutte like polynomial on signed graphs. Using the extended information, we examine the monomials of these polynomials as grid walks. Using grid walking and the extended Tutte polynomial, we investigate the relationship between the Tutte polynomial of a graph and that of its bipartite representation. This is done with a view toward the construction of a Tutte like polynomial for oriented hypergraphs. While many graph polynomials are directly related to the Tutte polynomial, there are also a wide variety of polynomials related in special cases only. One such polynomial is the Martin polynomial and, related to it, the interlace polynomial. Here, we discuss how these two polynomials are related and how results on the Martin polynomial can be extended to the interlace polynomial. The Martin invariant, a specific evaluation of the Martin polynomial, obeys the symmetries of the Feynman period. The Feynman period of a graph is useful in quantum field theory, but difficult to compute and thus there is interest in finding graph invariants that have the same symmetries. It was established that the interlace polynomial on interlace graphs was equal to the Martin polynomial on the associated 4-regular graph. While only graphs that do not contain a set of forbidden vertex minors are interlace graphs, the interlace polynomial is defined over all graphs. We discuss how this provides a way to try and extend the notion of Feynman symmetries via the interlace polynomial and some specific classes of graphs with formulas. Additionally, the interlace polynomial is only equal to the Martin polynomial for interlace graphs of 4-regular graphs, but the Martin polynomial is defined for 2k-regular graphs. Thus, we work toward creating an interlace-like polynomial for graphs derived from 2k-regular cases of the Martin polynomial.Item Combinatorial Aspects of Feynman Integrals and Causal Set Theory(University of Waterloo, 2025-05-23) Shaban, KimiaThis thesis consists of two distinct sections, the first highlighting causal set theory (CST) and the second focusing on Feynman period estimation. This work specifically covers how discrete structures from algebraic combinatorics can be applied to problems from physics, and how we can use computational tools and techniques to help solve these problems from a mathematical perspective. In the first part of the thesis, we introduce CST, an approach to quantum gravity that focuses on how events in spacetime are causally related to one another. In CST, discretized spacetime is given by a locally finite poset. A significant portion of this section focuses on covtree, which allows us to evolve such a discrete spacetime, in a way that does not depend on arbitrary labelling. However recognizing nodes of covtree involve solving a particular downset reconstruction problem. To attack this we define a graph that compares downsets that differ by exactly one element, with a particular focus on the order dimension two case. This section of the thesis sheds light on evolving a spacetime by constructing future elements within the covtree framework. Reconstructing spacetime in this way will allow for researchers to advance our understanding of covtree’s structure and improves causal set theory as an approach to quantum gravity. In the second part, we provide an introduction to Feynman periods, explaining their significance in quantum field theory (QFT) calculations. We will discuss how machine learning models, such as linear and quadratic regression, and graph neural networks, can be applied to Feynman graphs and their properties, to predict the Feynman period. Even simple techniques like linear regression, on graph parameters only, which do not consider the graph structure directly, can make highly accurate predictions of Feynman periods. The work presented in this section, done jointly with Dr. Paul-Hermann Balduf, is published in the Journal of High Energy Physics. This research has significant implications for QFT computations, which can become computationally infeasible at large scales, and facilitates further exploration in particle physics.Item Analysis of the Three-operator Davis-Yin Splitting in the Inconsistent Case(University of Waterloo, 2025-05-20) Naguib, AndrewThis thesis analyzes the Davis–Yin three-operator splitting method in the inconsistent case, where the underlying monotone inclusion problem may fail to have a solution. The Davis–Yin algorithm extends the Douglas–Rachford and forward–backward splitting methods and is effective in reformulating optimization and inclusion problems as fixed-point iterations. Our study investigates its behavior when no fixed point exists. We prove, under mild assumptions, that the Davis–Yin shadow sequence converges to a solution of the normal problem, which represents a minimal perturbation of the original formulation.Item Quantum programming and synthesis: Internalizing Clifford operations and beyond(University of Waterloo, 2025-04-29) Winnick, SamuelClifford operations are a subset of quantum operations used extensively in quantum error correction and classical simulation of quantum circuits. The first part of the thesis is motivated by the problem of programming with generalized Clifford operations, such as the quantum Fourier transform. We delve into the algebraic complications that arise for systems of even dimension $d$, and we are particularly interested in the case when $d$ is a power of $2$. We apply our results in the design of a quantum functional programming language, in which the user does not have to worry about these irrelevant complications. Later, we consider the problem of compiling circuits over universal gate sets. In particular, we study the problem of multi-qutrit exact synthesis over a variety of gate sets including Clifford gates. Lastly, we present a framework for defining a symplectic form on an object in a sufficiently structured category, and lay out the theory, generalizing the theory of symplectic forms on a finite dimensional vector space or locally compact abelian group. In the process, we develop new results and perspectives on operations defined on categories.Item Asymptotics of the number of lattice points in the transportation polytope via optimization on Lorentzian polynomials.(University of Waterloo, 2025-04-28) Lee, ThomasWe formally extend the theory of polynomial capacity to power series and totally uni- modular matrices. Using these results, we prove the log-asymptotic correctness of bounds by Brändén, Leake, and Pak developed through the use of Lorentzian polynomials ([BLP23]) under certain conditions, and provide a counterexample where these bounds are not log- asymptotically correct, even when symmetry exists.Item Some Sylvester-Gallai-Type Theorems for Higher-Dimensional Flats(University of Waterloo, 2025-04-28) Kroeker, Matthew EliotIn response to an old question of Sylvester, Gallai proved that, for any finite set of points in the plane, not all contained in a single line, there is a line containing exactly two of them. This is known as the Sylvester-Gallai Theorem. In the language of matroid theory, which is used in this thesis, the Sylvester-Gallai Theorem says that every rank-3 real-representable matroid has a two-point line. Independently of Gallai and around the same time, Melchior proved the stronger result that, in a rank-3 real-representable matroid, the average number of points in a line is less than three. The purpose of this thesis is to prove theorems of this type for flats of higher dimension. The Sylvester-Gallai Theorem was generalized to higher dimensions by Hansen, who proved that, for any positive integer k, a simple real-representable matroid of rank at least 2k-1 has a rank-k independent flat. We will prove a theorem of this type for matroids representable over any given finite field by characterizing the "unavoidable flats" for matroids in this class. In particular, we show that any simple matroid of sufficiently high rank representable over a given finite field has a rank-k flat which is either independent or a projective or affine geometry. As a corollary, we will get the following Ramsey theorem: for any two-colouring of the points of a matroid of sufficiently high rank representable over a given finite field, there is a monochromatic rank-k flat. The rest of the thesis concerns generalizing Melchior’s theorem to higher dimensions. For planes, we prove that, in a real-representable matroid M of rank at least four, the average plane-size is at most an absolute constant, unless M is a direct sum of lines (in which case the average plane-size could be arbitrarily large). Generalizing this result to hyperplanes of arbitrary rank k, we prove that, if M is a simple rank-(k+1) real-representable matroid whose average hyperplane-size is greater than some constant depending only on k, then all but a constant number b_k of the points of M are covered by a small collection of flats of relatively low rank. We also show that this constant b_k is best-possible. Melchior’s Theorem also implies that the average size of a flat (of any rank) in a rank-3 real-representable matroid is at most an absolute constant. We prove that, for any positive integer r, the average size of a flat in a rank-r real-representable matroid is at most some constant depending only on r.Item Denormalized Lorentzian Laurent series(University of Waterloo, 2025-04-24) Mohammadi Yekta, MaryamWe introduce and study the class of denormalized Lorentzian Laurent series and prove lower bounds on their coefficients. To do this, we define a capacity function on Laurent series using their domain of convergences. As a result, we can use simpler arguments to re-prove an already known lower bound on the number of contingency tables, which are lattice points of transportation polytopes; and tidy up and slightly improve an already known lower bound on the number of integral flows of a network.Item Max-Min Greedy Matching(University of Waterloo, 2024-12-17) Rakhmatullin, Ramazan; Pashkovich, KanstantsinWe study the problem of max-min greedy matching introduced in (Eden et al. 2022). The max-min greedy matching problem is a variant of the well known online bipartite matching problem introduced in (Karp et al. 1990). Given a bipartite graph $G=(U \cup V; E)$, the first player selects a priority ordering $\pi$ of $V$. After that the second player selects an arrival order $\sigma$ of $U$ depending on the ordering $\pi$ selected by the first player. Once both players did their selections, the vertices of $U$ arrive in the order specified by $\sigma$. Upon arrival, each vertex in $U$ is matched with its highest-priority neighbor that is still unmatched, if one exists. Here, the highest-priority is defined with respect to $\pi$. The first player aims to maximize the size of the resulting matching, while the second player seeks to minimize it. We investigate the max-min greedy matching problem. We aim to improve the lower bound of the guaranteed matching size achievable by the first player. We present a linear time algorithm that constructs an ordering $\pi$ such that for every $\sigma$ the ratio between the resulting matching size and the maximum matching size is at least $\frac{5}{9}$. Our result improves the previous best known ratio of $\frac{1}{2} + \frac{1}{86}$ from (Eden et al. 2022). The best known upper bound on the ratio is $\frac{2}{3}$ (Cohen-Addad et al. 2016). Thus, our result makes the gap between the lower and upper bounds for the ratio substantially smaller. Our method introduces a novel ``balanced path decomposition'' technique. This decomposition provides crucial structural properties such as existence of large matchings within these paths; and absence of certain edges between the paths. These structural properties allow us to prove the desired lower bound on the ratio. Our findings suggest that the achieved matching ratio can be further improved and that the balanced path decomposition may have broader applications.Item On the relation among the maximum degree, the chromatic number and the clique number(University of Waterloo, 2024-12-12) Xie, Xinyue; Haxell, PennyWe study the relation among the maximum degree $\Delta(G)$, the chromatic number $\chi(G)$ and the clique number $\omega(G)$ of a graph $G$ by proving results related to the Borodin-Kostochka Conjecture and Reed's Conjecture, which are two long-standing conjectures on this subject. The Borodin-Kostochka Conjecture states that a graph $G$ with $\chi(G)=\Delta(G)\ge9$ has a clique of size $\Delta(G)$. Reed's Conjecture states that any graph $G$ satisfies $\chi(G)\le \lceil\frac{1}{2}(\Delta(G)+\omega(G)+1)\rceil$. By combining and extending the approaches taken by Cranston and Rabern and by Haxell and MacDonald, we use the technique of Mozhan partitions to prove a generalized Borodin-Kostochka-type result as follows. Given a nonnegative integer $t$, for every graph $G$ with $\Delta(G)\ge 4t^2+11t+7$ and $\chi(G)=\Delta(G)-t$, the graph $G$ contains a clique of size $\Delta(G)-2t^2-7t-4$. We further prove that both conjectures hold for graphs with at least one critical vertex that is not in an odd hole, by following similar proofs as by Aravind, Karthick and Subramanian and by Chen, Lan, Lin and Zhou. This result then motivates us to study Reed's Conjecture in the context of graphs in which all vertices are in some odd hole. By investigating blow-ups and powers of cycles, we enumerate several classes of graphs for which Reed's Conjecture holds with equality. They generalize many of the known tight examples. We also introduce a class of graphs constructed from blow-ups and powers of paths, which gives rise to a new family of irregular tight examples.Item Algebraic Approach to Quantum Isomorphisms(University of Waterloo, 2024-09-24) Sobchuk, Mariia; Godsil, ChrisIn very brief, this thesis is a study of quantum isomorphisms. We have started with two pairs of quantum isomorphic graphs and looked for generalizations of those. We have learned that those two pairs of graphs are related by Godsil-McKay switching and one of the graphs is an orthogonality graph of lines in a root system. These two observations lead to research in two directions. First, since quantum isomorphisms preserve coherent algebras, we studied a question of when Godsil-McKay switching preserved coherent algebras. In this way, non isomorphic graphs related by Godsil-McKay switching with isomorphic coherent algebras are candidates to being quantum isomorphic and non isomorphic. Second, while it was known that one of the graphs in a pair was an orthogonality graphs of the lines in a root system $E_8,$ we showed that a graph from another pair is also an orthogonality graph of the lines in a root system $F_4.$ We have studied orthogonality graphs of lines in root systems $B_{2^d},C_{2^d},D_{2^d}$ and showed that they have quantum symmetry. Finally, we have touched upon structures of quantum permutations, relationships between fractional and quantum isomorphisms as well as connection to quantum independence and chromatic numbers.Item Theory and Results on Restarting Schemes for Accelerated First Order Methods(University of Waterloo, 2024-09-10) Pavlovic, Viktor; Vavasis, Stephen; Moursi, WalaaComposite convex optimization problems are abundant in industry, and first order methods to solve them are growing in popularity as the size of variables reaches billions. Since the objective function could be possibly non-smooth, proximal gradient methods are one of the main tools for these problems. These methods benefit from acceleration, which uses the memory of past iterates to add momentum to the algorithms. Such methods have a O(1/k^2) convergence rate in terms of function value where k is the iteration number. Restarting algorithms has been seen to help speed up algorithms. O'Donoghue and Candes introduced adaptive restart strategies for accelerated first order methods which rely on easy to compute conditions, and indicate a large performance boost in terms of convergence. The restart works by resetting the momentum gained from acceleration. Their strategies in general are a heuristic, and there is no proof of convergence. In this thesis we show that restarting with the O'Donoghue and Candes condition improves the standard convergence rate in special cases. We consider the case of one-dimensional functions where we prove that the gradient based restart strategy from O'Donoghue and Candes improves the O(1/k^2) bound. We also study the restarting scheme applied to the method of alternating projections (MAP) for two closed, convex, and nonempty sets. It is shown in Chapter 6 that MAP falls into the convex composite paradigm and therefore acceleration can be applied. We study the case of MAP applied to two hyperplanes in arbitrary dimension. Furthermore we make observations as to why the restarts help, what makes a good restart condition, as well as what is needed to make progress in the general case.Item Tubings of Rooted Trees(University of Waterloo, 2024-09-05) Cantwell, Amelia; Yeats, KarenA tubing of a rooted tree is a broad term for a way to split up the tree into induced connected subtrees. They are useful for computing series expansion coefficients. This thesis discusses two different definitions of tubings, one which helps us understand Dyson- Schwinger equations, and the other which helps us understand the Magnus expansion. Chord diagrams are combinatorial objects that relate points on a circle. We can explicitly map rooted connected chord diagrams to tubings of rooted trees by a bijection, and we explore further combinatorial properties arising from this map. Furthermore, this thesis describes how re-rooting a tubed tree will change the chord diagram. We present an algorithm for finding the new chord diagram by switching some chords around. Finally, a different notion of tubings of rooted trees is introduced, which was originally developed by Mencattini and Quesney [27]. They defined two sub-types of tubings: vertical and horizontal which are used to find coefficients in the Magnus expansion. These two types of tubings have an interesting relationship when the forests are viewed as plane posets.Item Tight Multi-Target Security for Key Encapsulation Mechanisms(University of Waterloo, 2024-09-04) Glabush, Lewis; Stebila, DouglasThe use of symmetric encryption schemes requires that the communicating parties have access to a shared secret key. A key encapsulation mechanism (KEM) is a cryptographic tool for the secure establishment of such a key. The KEMs most commonly used at this time are vulnerable to adversaries with access to a large quantum computer. This project concerns KEMs that are resistant to all known quantum attacks, such as lattice-based schemes. A desirable property for any KEM is multi-target security, capturing the idea that security does not degrade below the targeted level as the number of users of a protocol or the amount of communication per user scales to a certain threshold. For schemes based on prime-order groups, multi-ciphertext security can be trivially reduced to singleciphertext security using self reducibility arguments, but these arguments are not available for lattice-based schemes. Indeed, one of the alternates in NIST’s post-quantum cryptography standardization project, FrodoKEM, was susceptible to simple attacks in the multi-target setting. The standard approach to building IND-CCA secure KEMs has been to start with an IND-CPA secure public key encryption scheme (PKE) and apply the Fujisaki-Okamoto transform (FO). In this paper, we introduce a new variant of the FO transform, called the salted FO transform (SFO) which adds a uniformly random salt to the generation of ciphertexts. We then show that the resulting KEM’s have much tighter security bounds compared to their generic counterparts. We then apply our results to FrodoKEM to resolve the aforementioned simple attacks.Item Price-setting Problems and Matroid Bayesian Online Selection(University of Waterloo, 2024-08-30) DeHaan, Ian; Pashkovich, KanstantsinWe study a class of Bayesian online selection problems with matroid constraints. Consider a seller who has several items they wish to sell, with the set of sold items being subject to some structural constraints, e.g., the set of sold items should be independent with respect to some matroid. Each item has an offer value drawn independently from a known distribution. In a known order, items arrive and drawn values are presented to the seller. If the seller chooses to sell the item, they gain the drawn value as revenue. Given distribution information for each item, the seller wishes to maximize their expected revenue by carefully choosing which offers to accept as they arrive. Such problems have been studied extensively when the seller's revenue is compared with the offline optimum, referred to as the "prophet". In this setting, a tight 2-competitive algorithm is known when the seller is limited to selling independent sets of a matroid [KW12]. We turn our attention to the online optimum, or "philosopher", and ask how well the seller can do with polynomial-time computation, compared to a seller with unlimited computation but with the same limited distribution information about offers. We show that when the underlying constraints are laminar and the arrival of buyers follows a natural "left-to-right" order, there is a polynomial-time approximation scheme for maximizing the seller's revenue. We also show that such a result is impossible for the related case when the underlying constraints correspond to a graphic matroid. In particular, it is PSPACE-hard to approximate the philosopher's expected revenue to some fixed constant α < 1; moreover, this cannot be alleviated by requirements on the arrival order in the case of graphic matroids. We also show similar hardness results for both transversal and cographic matroids. We then turn our attention to a related problem where the arrival order of items is unknown and uniformly random. In this setting, we show that there is a polynomial-time approximation scheme whenever the rank of the matroid is bounded above by a constant and all probabilities in the input are bounded below by a constant. We additionally examine the computational complexity of computing the prophet's expected revenue. We show that this problem is #P-hard, and give a fully polynomial-time randomized approximation scheme for the problem.Item Contracts for Density and Packing Functions(University of Waterloo, 2024-08-30) Skitsko, Jacob; Pashkovich, KanstantsinWe study contracts for combinatorial problems in multi-agent settings. In this problem, a principal designs a contract with several agents, whose actions the principal is unable to observe. The principal is able to see only the outcome of the agents' collective actions. All agents that decided to exert effort incur costs, and so naturally all agents expect a fraction of the principal's reward as a compensation. The principal needs to decide what fraction of their reward to give to each agent so that the principal's expected utility is maximized. One of our focuses is on the case when the principal's reward function is supermodular and is based on some graph. Recently, Deo-Campo Vuong et al. showed that for this problem it is impossible to provide any finite multiplicative approximation or additive FPTAS unless P=NP. On a positive note, Deo-Campo Vuong et al. provided an additive PTAS for the case when all agents have the same cost. Deo-Campo Vuong et al. asked whether an additive PTAS can be obtained for the general case, i.e for the case when agents potentially have different costs. In this thesis, we answer this open question in positive. Additionally, we provide multiplicative approximation algorithms for functions that are based on hypergraphs and encode packing constraints. This family of functions provides a generalization for XOS functions.Item Control over the KKR bijection with respect to the nesting structure on rigged configurations and a CSP instance involving Motzkin numbers(University of Waterloo, 2024-08-27) Chan, William; Mandelshtam, OlyaThere are two disjoint main projects that this thesis covers. The Motzkin numbers are a sort of “re- laxed version” of the Catalan numbers. For example, Catalan numbers count perfect non-crossing matchings, while Motzkin numbers count not necessarily perfect non-crossing matchings. The first project deals with instances of the cyclic sieving phenomenon involving Motzkin numbers and their standard q−analogue. We also show that the standard q−analogue for Motzkin numbers satisfy a similar generating series interpretation to that of the q−Catalan numbers. The second project deals with understanding the Kerov-Kirillov-Reshetikhin (KKR) bijection between semistandard tableaux and rigged configurations with a particular emphasis on the standard case. In partic- ular, we understand inducing perturbations on the corresponding rigged configuration via direct operations on the tableau. We develop a technique to take a standard tableau T, and output a new standard tableau T′ which has the same corresponding rigged configuration up to a rigging on any desired row of the first rigged partition. We also develop an alternate technique to Kuniba, Okado, Sakamoto, Takagi, and Yamada that “unwraps” the natural nesting structure on rigged configurations. The primary operation from which all the above follows from is “raise” which we introduce and give various combinatorial models for. The operation raise induces a very simple, controlled perturbation on the corresponding rigged configuration. Our results are formulated in terms of paths or (classically) highest weight elements of tensor products of Kirillov-Reshetikhin crystals.Item Euclidean Distance Matrix Correction with a Single Corrupted Element(University of Waterloo, 2024-08-27) Tina Chenrui, Xu; Wolkowicz, Henry; Walaa, MoursiIn this thesis, we study the problem of correcting the error from a noisy Euclidean distance matrix (EDM). An EDM is a matrix where elements are squared distance between points in R^d. We consider the special case where only one of the distance is corrupted. We develop efficient algorithms to solve this problem, initially assuming that the points are in general position, and solve the problem using three different types of facial reduction: exposing vector, facial vectors, and Gale transform. Furthermore, we investigate yielding elements of an EDM and develop an algorithm for identifying one small principal submatrix with the embedding dimension d when many of the points are in a linear manifold of dimension smaller than d, allowing us to handle a more general problem. We present numerical experiments implemented in MATLAB, demonstrating the effectiveness of our solutions.Item Non-Generic Analytic Combinatorics in Several Variables and Lattice Path Asymptotics(University of Waterloo, 2024-08-27) Kroitor, Alexander; Melczer, StephenFinding and analyzing generating functions is a classic and powerful way of studying combinatorial structures. While generating functions are a priori purely formal objects, there is a rich theory treating them as complex-analytic functions. This is the field of analytic combinatorics, which exploits classical results in complex and harmonic analysis to find asymptotics of coefficient sequences of generating functions. More recently, the field of analytic combinatorics in several variables has been developed to study multivariate generating functions, which are amenable to multivariate analytic results. When dealing with multivariate asymptotics we first pick a direction vector. To find asymptotics using analytic combinatorics, one typically uses the Cauchy integral formula to write the underlying sequence being studied as a complex integral, then uses residue computations to reduce to a so-called Fourier-Laplace integral. When the direction vector chosen is generic, the Fourier-Laplace integral being studied is well-behaved and asymptotics can be computed. When the direction vector chosen is non-generic, the Fourier-Laplace integral has singular amplitude, and asymptotics are harder to compute. This thesis studies singular Fourier-Laplace integrals and their applications to combinatorics. Determining asymptotics for the number of lattice walks restricted to certain regions is one of the particular successes of analytic combinatorics in several variables. In particular, Melczer and Mishna determined asymptotics for the number of walks in an orthant whose set of steps is a subset of { ±1, 0 }^d \ { 0 } and is symmetric over every axis. Melczer and Wilson later determined asymptotics for lattice path models whose set of steps is a subset of { ±1, 0 }^d \ { 0 } and is symmetric over all but one axis, except when the vector sum of all the steps is 0. Here we determine asymptotics in the zero sum case using asymptotics of singular Fourier-Laplace integrals. We additionally study asymptotics of lattice path models restricted to Weyl chambers, before giving some generalizations of asymptotics of singular Fourier-Laplace integrals.