Journal of Combinatorial Mathematics and Combinatorial Computing
ISSN: 0835-3026 (print) 2817-576X (online)
The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs).
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 002
- Pages: 5-11
- Published: 31/10/1987
Some new lower bounds for higher Ramsey numbers are presented. Results concerning generalized hypergraph Ramsey numbers are also given.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 221-234
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 217-219
- Published: 30/04/1987
We enumerate the perfect one-factorizations of \(K_{50}\), which are generated by starters in \({Z}_{49}\), fixed by multiplication by \(18\) and \(30\). There are precisely \(67\) non-isomorphic examples.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 207-215
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 191-205
- Published: 30/04/1987
Let the vertices of a graph denote computer processes which communicate by passing messages along edges. It has been a standard Computer Science problem to provide algorithms that let the processes solve problems jointly (e.g. leader election, clock synchronization). What if some of the processes are maliciously faulty, i.e. send messages calculated to sabotage joint algorithms? Here we review a few “byzantine agreement” algorithms with interesting graph-theoretic features and raise questions about graph connectivity and diameter (with a few answers).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 181-190
- Published: 30/04/1987
Let the vertices of a graph denote processes in a distributed or time-shared computer system; let two vertices be connected by an edge if the two processes cannot proceed at the same time (they mutually exclude one another). Managing mutual exclusion and related scheduling problems has given rise to substantial literature in computer science. Some methods of attack include covering or partitioning the graph with cliques or threshold graphs. Here I survey some recent graph-theoretic results and examples motivated by this approach.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 175-180
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 149-174
- Published: 30/04/1987
A triangle in a Steiner triple system \(S\) is a triple of blocks from \(S\) which meet pairwise and whose intersection is empty. If \(S\) contains \(b\) blocks, and \(b = 3q + 8\), where \(0 \leq 8 \leq 2\), then a triangulation of \(S\) is a collection of \(q\) triangles \(\{T_1, T_2, \ldots, T_q\}\) in \(S\) such that no two distinct triangles share a common block. It is shown that, for \(v \equiv 1\) or \(3 \pmod{6}\), there exists a Steiner triple system which admits a triangulation. Moreover, if \(8 = 2\), there is a triangulated triple system in which the pair of blocks not occurring in a triangle are disjoint, and a triangulated triple system in which they intersect.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 141-148
- Published: 30/04/1987
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 001
- Pages: 131-140
- Published: 30/04/1987
The polynomial algorithms for isomorphism testing in \(3\)-regular graphs known to date use set-wise stabilisation in \(2\)-groups acting on singletons, pairs, and sometimes triples of vertices. In this note we describe a new, simpler way of “getting rid of the triples”. Although the order of the complexity of isomorphism testing remains \(O(\text{n}^3 \log \text{n})\), the resulting algorithm is more efficient, since this portion of the set-wise stabilisation in the algorithm will be faster.




