Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Suzanne M.Seager1
1Mount Saint Vincent University, Halifax, NS, Canada
Abstract:

We show that for a cubic graph on \(n\) nodes, the size of the dominating set found by the greedy algorithm is at most \(\frac{4}{9}n\), and that this bound is tight.

Soojin Cho1
1Department of Mathematics Ajou University
Abstract:

For a standard tableau \(T\) of shape \(\lambda \vdash n\), \(maj(T)\) is the sum of \(i\)’s such that \(i+1\) appears in a row strictly below that of \(i\) in \(T\). We consider the \(g\)-polynomial \(f^\lambda(q) = \sum_\tau q^{ maj(T)}\), which appears in many contexts: as a dimension of an irreducible representation of finite general linear group, as a special case of Kostka-Foulkes polynomials, and so on. In this article, we try to understand `maj’ on a standard tableau \(T\) in relation to `inv’ on a multiset permutation (or a permutation of type \(\lambda\)). We construct an injective map from the set of standard tableaux to the set of permutations of type \(\lambda\) (increasing in each block) such that the `maj’ of the tableau is the `maj’ of the corresponding permutation when \(\lambda\) is a two-part partition. We believe that this helps to understand irreducible unipotent representations of finite general linear groups.

Luis Boza1, Eugenio M.Fedriani2, Juan Nunez3
1Departamento de Matematica Aplicada I. Univ. de Sevilla, Avda Reina Mercedes 2, 41012-SEVILLA.
2Departamento de Economfa y Empresa. Univ. Pablo de Olavide. Ctra. de Utrera, Km.1. 41013-SEVILLA.
3 Departamento de Geometria y Topologfa. Univ. de Sevilla. Apdo. 1160, 41080-SEVILLA.
Abstract:

Many results about outer-embeddings (graphs having all their vertices in the same face) have been obtained recently in topological graph theory in recent times. In this paper, we deal with some difficulties appearing in the study of such embeddings. Particularly, we propose several problems concerning outer-embeddings in pseudosurfaces and we prove that two of them are NP-complete.

We also describe some properties about lists of forbidden minors for outer-embeddings in certain kinds of pseudosurfaces.

Miranca Fischermann1, Dieter Rautenbach1, Lutz Volkmann1
1Lehrstuhl II fiir Mathematik, RWTH-Aachen, 52056 Aachen, Germany
Abstract:

For some fixed \( n_0 \geq 0 \), we study the minimum number of vertices or edges that have to be removed from a graph such that no component of the rest has more than \( n_0 \) vertices.

Ezra Brown1, Theresa P.Vaughan2
1Department of Mathematics Virginia Tech Blacksburg, VA 24061-0123
2Department of Mathematics University of North Carolina at Greensboro Greensboro, NC 27412
Abstract:

An \( [r, s, n, t] \)-configuration is a collection \(C\) of \(r\)-sets in \( \{1, \ldots, n\} \) such that every \( s \)-set in \( \{1, \ldots, n\} \) contains at most \( t \) of the \( r \)-sets in \( C \). Studying this generalization of the Steiner system was suggested by a theorem of Poonen on union-closed families of sets. In this paper, we consider only \( [3, 4, n, 2] \)-configurations, and refer to them as \(n\)-configurations; by an \( (n, k) \)-configuration we mean an \(n\)-configuration containing exactly \(k\) \(3\)-sets. An \((n,k)\)-configuration is maximal if it is not contained in any \( (n, k + 1) \)-configuration; finally, \( L(n) \) is the largest integer \(k\) for which an \((n, k)\)-configuration exists. In this paper, we determine \(L(n)\) for \( 4 \leq n \leq 9 \), and characterize all the maximal \( n \)-configurations for \(n = 4, 5,\) and \(6\), as well as the \((n, L(n))\)-configurations for \( n = 7, 8, \) and \( 9 \).

Mukund V.Bapat1, N.B. Limaye2
1Department of Mathematics, Vidyanagari, University of Mumbai Mumbai – 400098, INDIA
2S. S. H. Kelkar College, Devgad Maharashtra, INDIA
Abstract:

Let \( G \) be a simple graph with vertex set \( V \) and edge set \( E \). A vertex labeling \( f: V \to \{0,1,2\} \) induces an edge labeling \( \bar{f}: E \to \{0,1,2\} \) defined by \( \bar{f}(uv) = |f(u) – f(v)| \). Let \( u_f(i) \) denote the number of vertices \( v \) with \( f(v) = i \), \( i = 0,1,2 \). Similarly, \( e_f(i) \) denotes the number of edges \( uv \) with \( \bar{f}(uv) = i \), \( i = 0,1,2 \). A graph is said to be \( 3 \)-equitable if there exists a vertex labeling \( f \) such that \( |v_f(i) – v_f(j)| \leq 1 \) and \( |e_f(i) – e_f(j)| \leq 1 \) for all \( i \neq j \), \( i, j = 0,1,2 \). In which case, \( f \) is called a \( 3 \)-equitable labeling.

In this paper, we prove that the following graphs are three equitable: (1) Helm graph \( H_n \) (\( n \geq 4 \)), (2) A Flower graph \( FL_n \), (3) One point union \( H_n^{(k)} \) of \( k \)-copies of \( H_n \), \( k \geq 1 \), (4) One point union \( K_4^{(k)} \) of \( k \) copies of \( K_4 \), (5) A \( K_4 \)-snake of \( n \) blocks, each equal to \( K_4 \), (6) A \( C_t \)-snake of \( n \) blocks, \( t = 4,6 \) and \( t = 5 \) with \( n \) not congruent to \( 3 \) modulo \( 6 \).

Petter Kristiansen1, Sandra M.Hedetniemi2, Stephen T.Hedetniemi3
1Department of Informatics University of Bergen N-5020 Bergen, Norway
2 Department of Computer Science Clemson University Clemson, SC 29634, USA
3Department of Computer Science Clemson University Clemson, SC 29634, USA
Abstract:

A defensive alliance in a graph \( G = (V,E) \) is a set of vertices \( S \subseteq V \) satisfying the condition that every vertex \( v \in S \) has at most one more neighbor in \( V – S \) than it has in \( S \). Because of such an alliance, the vertices in \( S \), agreeing to mutually support each other, have the strength of numbers to be able to defend themselves from the vertices in \( V – S \). In this paper, we introduce this new concept, together with a variety of other kinds of alliances, and initiate the study of their mathematical properties.

Mark S.Anderson1, Robert C.Brigham2, Julie R.Carrington1, Richard P.Vitray1, Donna J.Williams3, Jay Yellen1
1Department of Mathematical Sciences, Rollins College, Winter Park FL 32789
2Department of Mathematics, University of Central Florida, Orlando FL 32816
3Department of Computer Science, Wake Forest University Winston-Salem NC 27109
Abstract:

The distance-\( k \) domination number of graph \( G \), \( \gamma_{\leq k}(G) \), is the cardinality of a smallest set of vertices, \( S \), such that every vertex not in \( S \) is no more than distance \( k \) from at least one vertex of \( S \). Carrington, Harary, and Haynes showed \( |V^0| \geq 2|V^+| \) where \( V^0 = \{u \in V: \gamma_{\leq 1}(G-v) = \gamma_{\leq 1}(G)\} \) and \( V^+ = \{v \in V: \gamma_{\leq 1}(G-v) > \gamma_{\leq 1}(G)\} \). This paper extends the result to distance-\( k \) domination, with the obvious change in definition of \( V^0 \) and \( V^+ \), to show \( |V^0| \geq \frac{2}{2k-1}|V^+| \). Extremal graphs are characterized when \( k = 1 \) and some progress is mentioned on the characterization problem when \( k > 1 \).

Zbigniew Lonc1,2, Victor W.Marek3
1Faculty of Mathematics and Information Science Warsaw University of Technology 00-661 Warsaw, Poland
2 Department of Computer Science University of Kentucky Lexington, KY 40506, USA
3Department of Computer Science University of Kentucky Lexington, KY 40506, USA
Abstract:

We investigate constraints in finite Boolean lattices \( \langle \mathcal{P}(X), \subseteq \rangle \) where \( X \) is a finite set. The constraints studied here are of the form \( \langle Z,k \rangle \) where \( Z \subseteq X \), \( 1 \leq k \leq |Z| \). A set \( I \subseteq X \) \({satisfies}\) \( \langle Z,k \rangle \) if \( |I \cap Z| \geq k \). We characterize the sets satisfying collections of such constraints as filters (final segments) in \( \langle \mathcal{P}(X) \rangle \). We find yet other characterizations of filters including one by means of families of sets indexed by elements of \( X \) so that the elements of the filter correspond to subfamilies with an empty intersection. Our characterizations are supported for algorithms. We also study the families of negated constraints and mixed families and find their characterizations. In the positive case, formulas built of constraints can be used to measure the complexity of filters (and thus also of antichains of their minimal elements). We find pathological filters with very simple descriptions when the disjunctions are allowed, but extremely complex descriptions when only conjunctions are allowed.

R.G. Stanton1
1Department of Computer Science University of Manitoba Winnipeg, Canada R3T 2N2
Abstract:

The number \( g_3^{(4)}(v) \) represents the minimum cardinality of a pairwise balanced design on \( v \) elements in which the largest block size is four and every pair occurs exactly three times. We give a survey of the results for this quantity.

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;