Journal of Combinatorial Mathematics and Combinatorial Computing
ISSN: 0835-3026 (print) 2817-576X (online)
The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs).
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 51-72
- Published: 31/10/1987
Generalized Moore graphs are regular graphs that satisfy an additional distance condition, namely, that there be the maximum number of vertices as close as possible to any particular vertex, when that vertex is considered as root vertex. These graphs form a useful model for the study of various theoretical properties of computer communications networks. In particular, they lend themselves to a discussion of lower bounds for network cost, delay, reliability, and vulnerability. A considerable number of papers have already been published concerning the existence and properties of generalized Moore graphs of valence three, and some initial studies have discussed generalized Moore graphs of valence four, when the number of vertices is less than fourteen. This paper continues the previous studies for those cases when the graph contains a number of vertices that is between fourteen and twenty. In the case of valence three, the graph with a complete second level exists; it is just the Petersen graph. The situation is quite different for valence four; not only does the graph with a complete second level not exist, but the graphs in its immediate “neighbourhood” also fail to exist.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 37-50
- Published: 31/10/1987
In this paper, we investigate the existence of skew frames with sets of skew transversals. We consider skew frames of type \(1^n\) and skew frames of type \((2^m)^q\) with sets of skew transversals. These frames are equivalent to three-dimensional frames which have complementary \(2\)-dimensional projections with special properties.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 29-36
- Published: 31/10/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 13-28
- Published: 31/10/1987
All graphs meeting the basic necessary conditions to be the leave graph of a maximal partial triple system with at most thirteen elements are generated. A hill-climbing algorithm is developed to determine which of these candidates are in fact leave graphs. Improved necessary conditions for a graph to be a leave graph are developed.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 5-11
- Published: 31/10/1987
Some new lower bounds for higher Ramsey numbers are presented. Results concerning generalized hypergraph Ramsey numbers are also given.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 221-234
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 217-219
- Published: 30/04/1987
We enumerate the perfect one-factorizations of \(K_{50}\), which are generated by starters in \({Z}_{49}\), fixed by multiplication by \(18\) and \(30\). There are precisely \(67\) non-isomorphic examples.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 207-215
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 191-205
- Published: 30/04/1987
Let the vertices of a graph denote computer processes which communicate by passing messages along edges. It has been a standard Computer Science problem to provide algorithms that let the processes solve problems jointly (e.g. leader election, clock synchronization). What if some of the processes are maliciously faulty, i.e. send messages calculated to sabotage joint algorithms? Here we review a few “byzantine agreement” algorithms with interesting graph-theoretic features and raise questions about graph connectivity and diameter (with a few answers).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 181-190
- Published: 30/04/1987
Let the vertices of a graph denote processes in a distributed or time-shared computer system; let two vertices be connected by an edge if the two processes cannot proceed at the same time (they mutually exclude one another). Managing mutual exclusion and related scheduling problems has given rise to substantial literature in computer science. Some methods of attack include covering or partitioning the graph with cliques or threshold graphs. Here I survey some recent graph-theoretic results and examples motivated by this approach.




