
Journal of Combinatorial Mathematics and Combinatorial Computing
ISSN: 0835-3026 (print) 2817-576X (online)
The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) embarked on its publishing journey in April 1987. From 2024 onward, it publishes four volumes per year in March, June, September and December. JCMCC has gained recognition and visibility in the academic community and is indexed in renowned databases such as MathSciNet, Zentralblatt, Engineering Village and Scopus. The scope of the journal includes; Combinatorial Mathematics, Combinatorial Computing, Artificial Intelligence and applications of Artificial Intelligence in various files.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 121-128
- Published: 30/04/1993
We define a closure operation on a particular family of graphs that possesses the property that the resulting graph is Hamiltonian if and only if the original graph is Hamiltonian.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 107-120
- Published: 30/04/1993
We present cost-optimal parallel algorithms for generating partitions and compositions of an integer
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 97-106
- Published: 30/04/1993
We show that
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 77-96
- Published: 30/04/1993
Reconfigurable parallel computers provide a number of choices of algorithm or architecture configurations to execute a task. This paper introduces and discusses the problem of allocating configurations to nodes of a task precedence graph, where each node represents a subtask. Each subtask can be executed on one of a number of distinct configurations and one of these choices must be assigned to it. We are given the execution time on a configuration, and the reconfiguration time between any allocatable pair of configurations of related subtasks. The objective is to assign a configuration for each subtask such that the overall completion time of the entire task is minimized. This paper provides a graph theoretic formulation for this configuration assignment problem, and shows that it is NP-hard even if the maximum degree of the precedence graph is at most 3 and the number of choices for each subtask is at most 2. The problem is shown to be solvable when the maximum degree of the precedence graph is 2, thus closing the gap between the P and NP cases in terms of the degree of the graph. We then present efficient polynomial time algorithms to find the optimal assignment for two special cases of precedence graphs—(1) trees, and (2) series-parallel graphs.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 65-75
- Published: 30/04/1993
A graph is orientable to a line digraph (OLD, for short) if its lines can be oriented in such a way that the resulting digraph is the line digraph of some digraph. In this paper, we find all graphs such that both the graph and its complement are OLD and also characterize these graphs in terms of minimal forbidden subgraphs. As shown, all of these graphs have at most nine points.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 57-64
- Published: 30/04/1993
Using multisets, a short proof of Polya’s theorem is given.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 39-56
- Published: 30/04/1993
The connectivity of a graph
First, we prove that the problem of finding the least cardinality
We then show that the problem satisfying property (ii) or (iii) has a polynomial-time solution if
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 33-38
- Published: 30/04/1993
Let
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 23-31
- Published: 30/04/1993
It was conjectured by Paul Erdős that if
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 013
- Pages: 3-22
- Published: 30/04/1993
A simple model of an unreliable network is a probabilistic graph in which each edge has an independent probability of being operational. The two-terminal reliability is the probability that specified source and target nodes are connected by a path of operating edges.
Upper bounds on the two-terminal reliability can be obtained from an edge-packing of the graph by source-target cutsets. However, the particular cutsets chosen can greatly affect the bound.
In this paper, we examine three cutset selection strategies, one of which is based on a transshipment formulation of the
These cutset selection strategies allow heuristics for obtaining good upper bounds analogous to the pathset selection heuristics used for lower bounds.
The computational results for some example graphs from the literature provide insight for obtaining good edge-packing bounds. In particular, the computational results indicate that, for the purposes of generating good reliability bounds, the effect of allowing crossing cuts cannot be ignored, and should be incorporated in a good edge-packing heuristic.
This gives rise to the problem of finding a least cost cutset whose contraction in the graph reduces the source-target distance by exactly one.