S. Georgiou1, C. Koukouvinos1, E. Lappas1
1Department of Mathematics National Technical University of Athens Zografou 15773, Athens, Greece
Abstract:

Combinatorial designs are a powerful tool because of their beautiful combinatorial structure that can help in many applications, such as coding theory or cryptography. A conference key distribution system is a scheme to design a conference key, and then to distribute this key to only participants attending the conference in order to communicate with each other securely. In this paper, we present an efficient conference key distribution system using difference families. Using techniques for creating the conference key and for performing authentication based on identification information, the communication protocol is designed. Applying the known results on difference families, we obtain many new infinite classes of conference key distribution systems. In special classes of difference families, the message overhead is \( O(v\sqrt{tv}) \), where \( v \) is the number of participants and \( t \) is the number of the \( k \)-elements subsets that consist of the difference family. The security of the presented protocol, which is an important problem in the construction of a secure system, is proved to be as computationally difficult to calculate as factoring and discrete logarithms.

V. Frezza1, V. Napolitano2
1VALERIA FREZZA VIA VaSTO 13 75010 Pisticci SCALO (Mr)
2Vito NAPOLITANO DiPARTIMENTO DI MATEMATICA, UNIVERSITA DELLA BASILICATA, ContTrRaDA MaccHiaA Romana, 85100 POTENZA
Abstract:

In this paper, finite \( \{2,t\} \)-semiaffine linear spaces are investigated. When \( t = 5 \), their parameters are determined, and it is also proved that there is a single finite \( \{2, 5\} \)-semiaffine linear space on \( v = 20 \) points and with constant point degree \( 7 \).

F. Franek1, J. Holub2, A. Rosa3
1Department of Computers and Software McMaster University Hamilton, Ontario, Canada
2Department of Computers and Software McMaster University Hamilton, Ontario, Canada and Department of Computer Science and Engineering Czech Technical University Prague, Czech Republic
3Department of Mathematics and Statistics McMaster University Hamilton, Ontario, Canada
Abstract:

We establish that for each of the 5005 possible types of 2-factorizations of the complete graph \( K_{13} \), there exists at least one solution. We also enumerate all nonisomorphic solutions to the Oberwolfach problem \( \text{OP}(13;3,3,3,4) \).

Malek Rahoual1, Rachid Saad2
1LaMIL, Université d’Evry Val d’Essonne, 91000 Evry – France.
2Laboratoire d’ Informatique Fondamentale et Appliquée Université de Boumerdés, 35000 Algérie
Abstract:

Scheduling static tasks on parallel architectures is a basic problem arising in the design of parallel algorithms. This NP-complete problem has been widely investigated in the literature and remains one of the most challenging questions in the field. Among the resolution methods for this type of problems, the taboo search technique is of particular interest. Based on this technique, two algorithms are proposed and tested on a sample of instances in order to be compared experimentally with other well-known algorithms. The results clearly indicate good overall performances of our algorithms. Next, some NP-completeness results are established showing that this problem is intractable for approximation, even for some restricted cases bearing a clear relation to the instances treated experimentally in this work.

C. M. de Matas1
1Department of Mathematics and Computer Science The University of the West Indies St. Augustine, TRINIDAD AND TOBAGO.
Abstract:

\( X \)-proper edge colourings of bipartite graphs are defined. These colourings arise in timetables where rooms have to be assigned to courses. The objective is to minimize the number of different rooms in which each course must be taught. An optimum assignment is represented by a \( k \)-optimum edge colouring of a bipartite graph. Some necessary conditions for a \( k \)-optimum colouring are obtained, in terms of forbidden subgraphs. An algorithm based on removing these forbidden subgraphs to obtain improved colourings is described.

Jill Taudree1, R. Jasper Faudree2, Ronald J. Gould3, Michael 8. Jacobson4, Linda Lesniak5
1University of Alaska, Fairbanks
2University of Memphis
3Emory University
4University of Colorado at Denver
5Drew University
Abstract:

A graph \( G \) of order \( n \) is pancyclic if it contains a cycle of length \( \ell \) for every \( \ell \) such that \( 3 \leq \ell \leq n \). If the graph is bipartite, then it contains no cycles of odd length. A balanced bipartite graph \( G \) of order \( 2n \) is bipancyclic if it contains a cycle of length \( \ell \) for every even \( \ell \), such that \( 4 \leq \ell \leq 2n \). A graph \( G \) of order \( n \) is called \( k \)-semipancyclic, \( k \geq 0 \), if there is no “gap” of \( k+1 \) among the cycle lengths in \( G \), i.e., for no \( \ell \leq n-k \) is it the case that each of \( C_\ell, \ldots, C_{\ell+k} \) is missing from \( G \). Generalizing this to bipartite graphs, a bipartite graph \( G \) of order \( n \) is called \( k \)-semibipancyclic, \( k \geq 0 \), if there is no “gap” of \( k+1 \) among the even cycle lengths in \( G \), i.e., for no \( \ell \leq n-2k \) is it the case that each of \( C_{2\ell}, \ldots, C_{2\ell+2k} \) is missing from \( G \).

In this paper we generalize a result of Hakimi and Schmeichel in several ways. First to \( k \)-semipancyclic, then to bipartite graphs, giving a condition for a hamiltonian bipartite graph to be bipancyclic or one of two exceptional graphs. Finally, we give a condition for a hamiltonian bipartite graph to be \( k \)-semibipancyclic or a member of a very special class of hamiltonian bipartite graphs.

John Gimbel1
1Mathematical Sciences, P.O. Box 756660, University of Alaska, Fairbanks, Alaska, 99775 U.S.A.
Abstract:

We consider labeling edges of graphs with elements from abelian groups. Particular attention is given to graphs where the labels on any two Hamiltonian cycles sum to the same value. We find several characterizations for such labelings for cubes, complete graphs, and complete bipartite graphs. This extends work of [1, 8, 9, 10]. We also consider the computational complexity of testing if a labeled graph has this property and show it is NP-complete even when restricted to integer labelings of 3-connected, cubic, planar graphs with face girth at least five.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;