Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.

Geoffrey Exoo1
1Department of Mathematics and Computer Science Indiana State University Terre Haute, IN 47809
Abstract:

Some new lower bounds for higher Ramsey numbers are presented. Results concerning generalized hypergraph Ramsey numbers are also given.

W.D. Wallis1, Wang Zhi-jian2
1Southern Illinois University, Carbondale IL 62901 Scochow Railway Teachers College, Scochow, People’s Republic of China
2 Southern Illinois University, Carbondale IL 62901 Scochow Railway Teachers College, Scochow, People’s Republic of China
E.C. lhrig1, E. Seah1, D.R. Stinson1
1Arizona State University, University of Manitoba, and University of Manitoba
Abstract:

We enumerate the perfect one-factorizations of \(K_{50}\), which are generated by starters in \({Z}_{49}\), fixed by multiplication by \(18\) and \(30\). There are precisely \(67\) non-isomorphic examples.

RG. Stanton1, Anne Penfold Street2
1Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2
2Department of Mathematics Department of Mathematics St. Lucia, Queensland, Australia 4067
Edward T.Ordman1
1Department of Mathematical Sciences Menphis State University Memphis, TN 38152
Abstract:

Let the vertices of a graph denote computer processes which communicate by passing messages along edges. It has been a standard Computer Science problem to provide algorithms that let the processes solve problems jointly (e.g. leader election, clock synchronization). What if some of the processes are maliciously faulty, i.e. send messages calculated to sabotage joint algorithms? Here we review a few “byzantine agreement” algorithms with interesting graph-theoretic features and raise questions about graph connectivity and diameter (with a few answers).

Edward T.Ordman1
1Department of Mathematical Sciences Memphis State University Memphis, TN 38152
Abstract:

Let the vertices of a graph denote processes in a distributed or time-shared computer system; let two vertices be connected by an edge if the two processes cannot proceed at the same time (they mutually exclude one another). Managing mutual exclusion and related scheduling problems has given rise to substantial literature in computer science. Some methods of attack include covering or partitioning the graph with cliques or threshold graphs. Here I survey some recent graph-theoretic results and examples motivated by this approach.

Edward Neuman1
1Department of Mathematics Southern Illinois Univereity Carbondale, Illinois 62901
Abstract:

A triangle in a Steiner triple system \(S\) is a triple of blocks from \(S\) which meet pairwise and whose intersection is empty. If \(S\) contains \(b\) blocks, and \(b = 3q + 8\), where \(0 \leq 8 \leq 2\), then a triangulation of \(S\) is a collection of \(q\) triangles \(\{T_1, T_2, \ldots, T_q\}\) in \(S\) such that no two distinct triangles share a common block. It is shown that, for \(v \equiv 1\) or \(3 \pmod{6}\), there exists a Steiner triple system which admits a triangulation. Moreover, if \(8 = 2\), there is a triangulated triple system in which the pair of blocks not occurring in a triangle are disjoint, and a triangulated triple system in which they intersect.

W.L. Kocay1
1Department of Computer Science University of Manitoba Winnipeg, Manitoba CANADA R3T 2N2
Abstract:

The polynomial algorithms for isomorphism testing in \(3\)-regular graphs known to date use set-wise stabilisation in \(2\)-groups acting on singletons, pairs, and sometimes triples of vertices. In this note we describe a new, simpler way of “getting rid of the triples”. Although the order of the complexity of isomorphism testing remains \(O(\text{n}^3 \log \text{n})\), the resulting algorithm is more efficient, since this portion of the set-wise stabilisation in the algorithm will be faster.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;