
Gronau, Mullin and Pietsch determined the exact closure of index one of all subsets
For every connected, even-degree graph
The Huffman coding scheme is a character-based algorithm in which every leaf node represents a character only. In this paper, we study three variations of the Huffman coding scheme for compressing 16-bit Chinese language. Although it is observed that IDC can generate the shortest code length among the three variations, but its empirical compression ratio is below 1.8, which is unsatisfactory. In order to achieve higher compression performance, i.e., compression ratio over 2, word-based compression algorithms should be employed. A possible way to develop word-based algorithms is to use the technique of cascading. Two kinds of algorithms are chosen for cascading. They are LZ algorithms and the Huffman coding scheme. LZ algorithms are used for finding repeating phrases while the Huffman coding scheme is used for encoding the phrases instead of characters. The experimental results show that the cascading algorithm of LZSSPDC outperforms a famous UNIX cascading compressor GZIP by 5\% on average.
Grotzsch conjectured that if
In this paper, we prove that a
In this paper, we survey some recent bounds on domination parameters. A characterisation of connected graphs with minimum degree at least 2 and domination number exceeding a third their size is obtained. Upper bounds on the total domination number,
Necessary and sufficient conditions for the existence of a decomposition of
A
This paper characterizes a particular scheme of partially filled Latin squares and when they can be completed to full Latin squares. In particular, given an
We give counterexamples for two theorems given for the integrity of prisms and ladders in [2] (Theorem 2.17 and Theorem 2.18 in [1]). We also compute the integrity of several special graphs.
We apply a lattice point counting method due to Blass and Sagan [2] to compute the characteristic polynomials for the subspace arrangements interpolated between the Coxeter hyperplane arrangements. Our proofs provide combinatorial interpretations for the characteristic polynomials of such subspace arrangements. In the process of doing this, we explore some interesting properties of these polynomials.
A graph of a puzzle is obtained by associating each possible position with a vertex and by inserting edges between vertices if and only if the corresponding positions can be obtained from each other in one move. Computational methods for finding the vertices at maximum distance
The total domination number
In this paper we define the imbalance of equi-replicate incomplete block designs. We prove that the imbalance measure of an equi-replicate incomplete block design has a lower bound, and this bound is attained if and only if the design is a 2-concurrence design. This result allows one to formulate the construction of 2-concurrence designs as an optimization problem.
Until quite recently, very few weakly completable critical sets were known. The purpose of this note is to prove the existence of at least one Latin square of each order greater than four in which a weakly completable set exists. This is done by actual construction of such a square. Non-existence of weakly completable sets in Latin squares of orders 2, 3, and 4 is already known.
In our recent paper Necessary and sufficient conditions for some two variable orthogonal designs in order 44, Koukouvinos, Mitrouli and Seberry leave 7 cases unresolved. Using a new algorithm given in our paper A new algorithm for computer searches for orthogonal designs by the present four authors we are able to finally resolve all these cases.
This note records that the necessary conditions for the existence of two variable designs constructed using four circulant matrices are sufficient. In particular, of 484 potential cases, 404 cases have been found, 68 cases do not exist, and 12 cases cannot be constructed using four circulant matrices.
We determine the number of non-isomorphic triple systems with bipoints in those cases for which the total number of triples does not exceed 20.
Temporal load-balancing – “spreading out” the executions of tasks over time — is desirable in many applications. A form of temporal load-balancing is introduced: scheduling to maximize minimum inter-completion time (MICT-scheduling). It is shown that MICT-scheduling is, in general, NP-hard. A number of restricted classes of task systems are identified, which can be efficiently MICT-scheduled.
Given a finite-dimensional vector space
\begin{enumerate}
\item Given some linearly independent vectors
\item Given a
\end{enumerate}
An exact answer to the first question is derived. Here there are two cases to consider, depending on whether or not the column vector
Let
1970-2025 CP (Manitoba, Canada) unless otherwise stated.