Abdol-Hossein Esfahanian1, Ortrud R. Ocllermann2
1Computer Science Department Michigan State University
2Computer Science Department University of Natal
Abstract:

A graph G is istance-hereditary if for every connected induced subgraph H of G and every pair u,v of vertices of H, we have dH(u,v)=dG(u,v). A frequently occurring communication problem in a multicomputer is to determine the most efficient way of routing a message from a processor (called the source) to a number of other processors (called the destinations). When devising a routing from a source to several destinations it is important that each destination receives the source message in a minimum number of time steps and that the total number of messages generated be minimized. Suppose G is the graph that models a multicomputer and let M={s,v1,v2,,vk} be a subset of V(G) such that s corresponds to the source node and the nodes v1,v2,,vk correspond to the destinations nodes. Then an optimal communication tree (OCT) T for M is a tree that satisfies the following conditions:

  1. MV(T),
  2. dT(s,vi)=dG(s,vi) for 1ik,
  3. no tree T satisfying (a) and (b) has fewer vertices than T.

It is known that the problem of finding an OCT is NP-hard for graphs G in general, and even in the case where G is the n-cube, or a graph whose maximum degree is at most three. In this article, it is shown that an OCT for a given set M in a distance-hereditary graph can be found in polynomial time. Moreover, the problem of finding the minimum number of edges in a distance-hereditary graph H that contains a given graph G as spanning subgraph is considered, where H is isomorphic to the n-cycle, the s-cube or the grid.

S. R. Campbell1, M. N. Ellingham2, Gordon F. Royle3
1Department of Mathematics and Computer Science Belmont University, 1900 Belmont Blvd Nashville, Tennessee 37212, U.S.A.
2Department of Mathematics, 1326 Stevenson Center Vanderbilt University, Nashville, Tennessee 37240, U.S.A.
3Department of Computer Science, University of Western Australia Nedlands, Western Australia 6009, Australia
Abstract:

A graph is said to be wellcovered if all maximal independent sets of vertices in the graph have the same cardinality. Determining whether a graph is well-covered has recently been shown (independently by Chvátal and Slater and by Sankaranarayana and Stewart) to be a co-NP-complete problem. In this paper, we characterise all well-covered cubic (3-regular) graphs. Our characterisation yields a polynomial time algorithm for recognising well-covered cubic graphs.

Shen Hao1
1Department of Applied Mathematics, Shanghai Jiao Tong University Shanghai 200030, The People’s Republic of China
Abstract:

It is proved in this paper that there exists a simple B[4,6;v] for every v6. It is also proved that there exists an indecomposable simple B[4,6;v] for every v6,v{12,13,16,17,20}.

Gary Haggard1
1 Bucknell University Lewisburg, Pennsylvania U.S.A. 17837
Abstract:

An efficient algorithm for calculating the chromatic polynomial of large graphs relative to the tree basis is presented. As an application of this algorithm, the degree thirty-two chromatic polynomial of the dual of the truncated icosahedron is calculated. Before this algorithm, only the by-hand calculations of Hall, Siry, and Vander-slice, completed in 1965, had produced this chromatic polynomial.

Otokar GroSek1, Robert Jajcay2
1Department of Mathematics Slovak Technical University Bratislava, 812 19, Ilkovigova 3 Czechoslovakia
2Department of Mathematics University of Nebraska Lincoln, NE 68588-0323
Abstract:

Generalized difference sets are difference sets with prescribed (and possibly different) multiplicities for every element. In this paper, constructions will be given for generalized difference sets on the semigroup of positive integer for almost every possible multiplicity function (sequence of multiplicities).

Gary L. Mullen1, David Purdy1
1Department of Mathematics The Pennsylvania State University University Park, PA 16802
Robert A. Liebler1
1Colorado State University Fort Collins, Colorado 80523
Abstract:

A version of the discrete Fourier transform that is valid in noncommutative groups is presented together with examples and an application to the study of difference sets in groups of order 4p2.

T. S. Griggs1, J. P. Murphy1
1Department of Mathematics and Statistics Lancashire Polytechnic Preston PRI 2TQ England
Abstract:

An algorithm to construct anti-Pasch Steiner triple systems is described and utilized to construct 101 such systems of order 19. It is also proved that no anti-Pasch STS(19) contains a non-trivial subsystem. Furthermore, anti-Pasch STS(19)s with prescribed automorphisms are identified.

Denis Hanson1
1Department of Mathematics University of Regina Regina, Sask. Canada S48 0A2
Abstract:

We define a closure operation on a particular family of graphs that possesses the property that the resulting graph is Hamiltonian if and only if the original graph is Hamiltonian.

Selim G. Akl1, Ivan Stojmenovié2
1Department of Computing and Information Science Queen’s University Kingston, Ontario Canada K7L 3N6
2Computer Science Department University of Ottawa Ottawa, Ontario Canada K1N 9B4
Abstract:

We present cost-optimal parallel algorithms for generating partitions and compositions of an integer n in lexicographic order. The algorithms utilize a linear array of n processors, where each processor has constant-size memory and is responsible for producing one part of a given partition or composition.

Jennifer Seberry 1, Mieko Yamada2
1Department of Computer Science The University of Wollongong Wollongong, NSW, 2500 Australia
2Department of Mathematics Kyushu University Fukuoka 812 Japan
Abstract:

We show that M-structures can be extended to Hadamard matrices of generalized quaternion type and obtain multiplication type theorems which preserve the structure.

Hyeong-Ah Choi1, Bhagirath Narahari1
1Department of Electrical Engineering & Computer Science The George Washington University Washington, DC U.S.A. 20052
Abstract:

Reconfigurable parallel computers provide a number of choices of algorithm or architecture configurations to execute a task. This paper introduces and discusses the problem of allocating configurations to nodes of a task precedence graph, where each node represents a subtask. Each subtask can be executed on one of a number of distinct configurations and one of these choices must be assigned to it. We are given the execution time on a configuration, and the reconfiguration time between any allocatable pair of configurations of related subtasks. The objective is to assign a configuration for each subtask such that the overall completion time of the entire task is minimized. This paper provides a graph theoretic formulation for this configuration assignment problem, and shows that it is NP-hard even if the maximum degree of the precedence graph is at most 3 and the number of choices for each subtask is at most 2. The problem is shown to be solvable when the maximum degree of the precedence graph is 2, thus closing the gap between the P and NP cases in terms of the degree of the graph. We then present efficient polynomial time algorithms to find the optimal assignment for two special cases of precedence graphs—(1) trees, and (2) series-parallel graphs.

Zoran Radosavijevic1, Slobodan Simic1, Zsolt Tuza2
1Department of Mathematics, Faculty of Electrical Engineering University of Belgrade Bulevar Revolucije 73 11000 Belgrade Serbia, Yugoslavia
2Computer and Automation Institute Hungarian Academy of Sciences H-1111 Budapest, Kende u. 13-17 Hungary
Abstract:

A graph is orientable to a line digraph (OLD, for short) if its lines can be oriented in such a way that the resulting digraph is the line digraph of some digraph. In this paper, we find all graphs such that both the graph and its complement are OLD and also characterize these graphs in terms of minimal forbidden subgraphs. As shown, all of these graphs have at most nine points.

W. H. Holzmann1
1Department of Mathematical Sciences University of Lethbridge 4401 University Drive Lethbridge, Alberta Canada, T1K 3M4
Abstract:

Using multisets, a short proof of Polya’s theorem is given.

A. Duksu Oh1, Hyeong-Ah Choi2, Abdol-Hossein Esfahanian3
1Department of Mathematics St. Mary’s College of Maryland St. Mary’s City, MD 20686
2Department of Electrical Engineering & Computer Science George Washington University Washington, DC 20052
3Department of Computer Science Michigan State University East Lansing, MI 48824
Abstract:

The connectivity of a graph G(V,E) is the least cardinality |S| of a vertex set S such that GS is either disconnected or trivial. This notion of connectivity has been generalized in two ways: one by imposing some graphical property on the set S, and the other by imposing some graphical property on the components of the graph GS. In this paper, we study some instances of each of the above generalizations.

First, we prove that the problem of finding the least cardinality |S| such that the graph GS is disconnected and one of the following properties (i) – (iii) is satisfied, is NP-hard: (i) given a set of forbidden pairs of vertices, the set S does not contain a forbidden pair of vertices; (ii) the set S does not contain the neighborhood of any vertex in G; (iii) no component of GS is trivial.
We then show that the problem satisfying property (ii) or (iii) has a polynomial-time solution if G is a k-tree. Applications of the above generalizations and the implications of our results to the topological design of fault-tolerant networks are discussed.

Johannes H. Hattingh1, Michael A. Henning2
1Department of Mathematics Rand Afrikaans University P. O. Box 524, 2006 Aucklandpark, South Africa
2Department of Mathematics and Applied Mathematics University of Natal P. O. Box 375, 3200 Pietermaritzburg, South Africa
Abstract:

Let k1 be an integer and let G be a graph. A set D of vertices of G is a k-dominating set if every vertex of V(G)D is within distance k of some vertex of D. The graph G is called well-k-dominated if every minimal k-dominating set of G is of the same cardinality. A characterization of block graphs that are well-k-dominated is presented, where a block graph is a graph in which each of its blocks is complete.

Ralph J. Faudree1, Brendan D. McKay2
1Department of Mathematical Sciences Memphi State University Memphis, Tennessee, USA
2Computer Science Department Australian National University Canberra, ACT, Australia
Abstract:

It was conjectured by Paul Erdős that if G is a graph with chromatic number at least k, then the diagonal Ramsey number r(G)r(Kk). That is, the complete graph Kk has the smallest diagonal Ramsey number among the graphs of chromatic number k. This conjecture is shown to be false for k=4 by verifying that r(W6)=17, where W6 is the wheel with 6 vertices, since it is well known that r(K4)=18. Computational techniques are used to determine r(W6) as well as the Ramsey numbers for other pairs of small order wheels.

Louis D. Nel1, Heidi J. Strayer2
1School of Computer Science Carleton University Ottawa, Ontario K1S 5B6
2Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1
Abstract:

A simple model of an unreliable network is a probabilistic graph in which each edge has an independent probability of being operational. The two-terminal reliability is the probability that specified source and target nodes are connected by a path of operating edges.
Upper bounds on the two-terminal reliability can be obtained from an edge-packing of the graph by source-target cutsets. However, the particular cutsets chosen can greatly affect the bound.
In this paper, we examine three cutset selection strategies, one of which is based on a transshipment formulation of the $k$-cut problem.
These cutset selection strategies allow heuristics for obtaining good upper bounds analogous to the pathset selection heuristics used for lower bounds.
The computational results for some example graphs from the literature provide insight for obtaining good edge-packing bounds. In particular, the computational results indicate that, for the purposes of generating good reliability bounds, the effect of allowing crossing cuts cannot be ignored, and should be incorporated in a good edge-packing heuristic.
This gives rise to the problem of finding a least cost cutset whose contraction in the graph reduces the source-target distance by exactly one.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;