Ars Combinatoria

ISSN 0381-7032 (print), 2817-5204 (online)

Ars Combinatoria is the oldest Canadian journal of combinatorics, established in 1976, dedicated to advancing combinatorial mathematics through the publication of high-quality, peer-reviewed research papers. Over the decades, it has built a strong international reputation and continues to serve as a leading platform for significant contributions to the field.
Open Access:  The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, Ars Combinatoria publishes four issues annually—in March, June, September, and December.
Scope: Publishes research in all areas of combinatorics, including graph theory, design theory, enumeration, algebraic combinatorics, combinatorial optimization and related fields.
Indexing & Abstracting:  Indexed in MathSciNet, Zentralblatt MATH, and EBSCO, ensuring wide visibility and scholarly reach.
Rapid Publication: Submissions are processed efficiently, with accepted papers published promptly in the next available issue.
Print & Online Editions: Issues are available in both print and online formats to serve a broad readership.

Martin Hildebrand1, John Starkweather2
1 Institute for Mathematics and its Applications, University of Minnesota, Minneapolis, MN 55455-0436
2 Department of Mathematics, University of Michigan, Ann Arbor, MI 48109-1003
Abstract:

This paper examines the numbers of lattice paths of length \(n\) from the origin to integer points along the line \((a,b,c,d) + t(1,-1,1,-1)\). These numbers form a sequence which this paper shows is log concave, and for sufficiently large values of \(n\), the location of the maximum of this sequence is shown. This paper also shows unimodality of such sequences for other lines provided that \(n\) is sufficiently large.

Arnold Knopfmacher1, Richard Warlimont2
1 Department of Computational & Applied Mathematics University of the Witwatersrand Private Bag 3 2050 South Africa
2Fachbereich Mathematik Universitat Regensburg Postfach 93053 8400 Regensburg Germany
Abstract:

A cover of a finite set \(N\) is a collection of subsets of \(N\) whose union is \(N\). We determine the number of such covers whose blocks all have distinct sizes. The cases of unordered and ordered blocks are each considered.

Denis Hanson1, Gary MacGillivray2, Bjarne Toft3
1 Department of Mathematics and Statistics University of Regina, Regina, Sask., Canada S4S 0A2
2 Department of Mathematics and Statistics University of Victoria, Victoria, B.C., Canada V8W 3P4
3Institut for Matematik og Datalogi Odense Universitet, DK-5230 Odense M, Denmark
Abstract:

Let \(n(k)\) be the smallest number of vertices of a bipartite graph not being \(k\)-choosable. We show that \(n(3) = 14\) and moreover that \(n(k) \leq k. n(k-2)+2^k\). In particular, it follows that \(n(4) \leq 40\) and \(n(6) \leq 304\).

T.Aaron Gulliver1, Vijay K.Bhargava2
1 Department of Electrical and Electronic Engineering University of Canterbury Christchurch, New Zealand
2 Department of Electrical and Computer Engineering University of Victoria P.O. Box 3055, MS 8610, Victoria, BC, Canada V8W 3P6
Abstract:

Eight new codes are presented which improve the bounds on maximum minimum distance for binary linear codes. They are rate \(\frac{m-r}{pm},r\geq 1\) , \(r\)-degenerate quasi-cyclic codes.

Charlie H.Cooke1
1 Dept. of Mathematics and Statistics Old Dominion University Norfolk, VA 23529
Abstract:

A method for synthesizing combinatorial structures which are members of an extended class of resolvable incomplete lattice designs is presented. Square and rectangular lattices both are realizable, yet designs in the extended class are not limited in number of treatments by the classically severe restriction \(v = s^2\) or \(v = s(s-1)\). Rather, the current restriction is the condition that there exist a finite closable set of \(k\)-permutations on the objects of some group or finite field, which is then used as the generating array for a \(L(0,1)\) lattice design. A connection to Hadamard matrices \(H(p,p)\) is considered.

R. Safavi-Naini1, L. Tombak1
1 Department of Computer Science University of Wollongong Northfields Ave., Wollongong 2522, AUSTRALIA
Abstract:

Near-perfect protection is a useful extension of perfect protection which is a necessary condition for authentication systems that satisfy Pei-Rosenbaum’s bound. Near-perfect protection implies perfect protection for key strategies, defined in the paper, in which the enemy tries to guess the correct key. We prove a bound on the probability of deception for key strategies, characterize codes that satisfy the bound with equality and conclude the paper with a comparison of this bound and Pei-Rosenbaum’s bound.

P.J. Owens1, D.A. Preece2
1 Department of Mathematical & Computing Sciences University of Surrey, Guildford GU2 5XH, UK
2 Institute of Mathematics and Statistics, Cornwallis Building The University, Canterbury, Kent CT2 7NF, UK
Abstract:

This note gives what is believed to be the first published example of a symmetric \(11 \times 11\) Latin square which, although not cyclic, has the property that the permutation between any two rows is an \(11\)-cycle. The square has the further property that two subsets of its rows constitute \(5 \times 11\) Youden squares. The note shows how this \(11 \times 11\) Latin square can be obtained by a general construction for \(n \times n\) Latin squares where \(n\) is prime with \(n \geq 11\). The permutation between any two rows of any Latin square obtained by the general construction is an \(n\)-cycle; two subsets of \((n-1)/2\) rows from the Latin square constitute Youden squares if \(n \equiv 3 \pmod{8}\).

W.G. Bridges1, Tzong-Pyng Tsaur1
1 The University of Wyoming Laramie, Wyoming 82071
Abstract:

The twenty-five year old \(\lambda\)-design conjecture remains unsettled. Attempts to characterize these irregular, tight, \(2\)-designs have produced a great number of parametric and dual structure characterizations of the so-called Type-I Designs. We establish some new structural characterizations and establish the conjecture in the smallest unsettled case (\(\lambda = 14\)) of the \(2p\) family.

Jagdish Saran1
1 Department of Statistics Faculty of Mathematical Sciences University of Delhi Delhi – 110007, India
Abstract:

In this paper we consider a random walk in a plane in which a particle at any stage moves one unit in any one of the four directions, namely, north, south, east, and west with equal probability and derive the joint and marginal distributions of certain characteristics of this random walk by using combinatorial methods.

Michael R.Anderson1
1Department of Computer Science Boise State University Boise, ID 83725
Abstract:

A subset \(S\) of an ordered set \(P\) is called a cutset if each maximal chain of \(P\) has nonempty intersection with \(S\); if, in addition, \(S\) is also an antichain, it is an antichain cutset. We consider new characterizations and generalizations of these and related concepts. The main generalization is to make our definitions in graph theoretic terms. For instance, a cutset is a subset \(S\) of the vertex set \(V\) of graph \(G = (V, E)\) which meets each extremal path of \(G\). Our principal results include (1)a characterization, by means of a closure property, of those antichains which are cutsets;(2) a characterization, by means of “forbidden paths” in the graph, of those graphs which can be expressed as the union of antichain cutsets;(3) a simpler proof of an existing result about \(N\)-free orders; and (4) efficient algorithms for many related problems, such as constructing antichain cutsets containing or excluding specified elements or forming a chain.

We include a brief discussion of the use of antichain cutsets in a parsing problem for \(LR(k)\) languages.