W.D. Wallis1, Wang Zhi-jian2
1Southern Illinois University, Carbondale IL 62901 Scochow Railway Teachers College, Scochow, People’s Republic of China
2 Southern Illinois University, Carbondale IL 62901 Scochow Railway Teachers College, Scochow, People’s Republic of China
E. C. lhrig1, E. Seah1, D. R. Stinson1
1Arizona State University, University of Manitoba, and University of Manitoba
Abstract:

We enumerate the perfect one-factorizations of \(K_{50}\), which are generated by starters in \({Z}_{49}\), fixed by multiplication by \(18\) and \(30\). There are precisely \(67\) non-isomorphic examples.

RG. Stanton1, Anne Penfold Street2
1Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2
2Department of Mathematics Department of Mathematics St. Lucia, Queensland, Australia 4067
Edward T. Ordman1
1Department of Mathematical Sciences Menphis State University Memphis, TN 38152
Abstract:

Let the vertices of a graph denote computer processes which communicate by passing messages along edges. It has been a standard Computer Science problem to provide algorithms that let the processes solve problems jointly (e.g. leader election, clock synchronization). What if some of the processes are maliciously faulty, i.e. send messages calculated to sabotage joint algorithms? Here we review a few “byzantine agreement” algorithms with interesting graph-theoretic features and raise questions about graph connectivity and diameter (with a few answers).

Edward T. Ordman1
1Department of Mathematical Sciences Memphis State University Memphis, TN 38152
Abstract:

Let the vertices of a graph denote processes in a distributed or time-shared computer system; let two vertices be connected by an edge if the two processes cannot proceed at the same time (they mutually exclude one another). Managing mutual exclusion and related scheduling problems has given rise to substantial literature in computer science. Some methods of attack include covering or partitioning the graph with cliques or threshold graphs. Here I survey some recent graph-theoretic results and examples motivated by this approach.

Edward Neuman1
1Department of Mathematics Southern Illinois Univereity Carbondale, Illinois 62901
Abstract:

A triangle in a Steiner triple system \(S\) is a triple of blocks from \(S\) which meet pairwise and whose intersection is empty. If \(S\) contains \(b\) blocks, and \(b = 3q + 8\), where \(0 \leq 8 \leq 2\), then a triangulation of \(S\) is a collection of \(q\) triangles \(\{T_1, T_2, \ldots, T_q\}\) in \(S\) such that no two distinct triangles share a common block. It is shown that, for \(v \equiv 1\) or \(3 \pmod{6}\), there exists a Steiner triple system which admits a triangulation. Moreover, if \(8 = 2\), there is a triangulated triple system in which the pair of blocks not occurring in a triangle are disjoint, and a triangulated triple system in which they intersect.

W.L. Kocay1
1Department of Computer Science University of Manitoba Winnipeg, Manitoba CANADA R3T 2N2
Abstract:

The polynomial algorithms for isomorphism testing in \(3\)-regular graphs known to date use set-wise stabilisation in \(2\)-groups acting on singletons, pairs, and sometimes triples of vertices. In this note we describe a new, simpler way of “getting rid of the triples”. Although the order of the complexity of isomorphism testing remains \(O(\text{n}^3 \log \text{n})\), the resulting algorithm is more efficient, since this portion of the set-wise stabilisation in the algorithm will be faster.

Shen Hao1
1Shanghai Jiao Tong University
Abstract:

In thie paper, various constructions for resolvable group divisible designs with block size \(4\) are given.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;