Utilitas Algorithmica (UA)
ISSN: xxxx-xxxx (print)
Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 81-87
- Published: 31/08/1996
The bondage number \(b(G)\) of a nonempty graph \(G\) was first introduced by Fink, Jacobson, Kinch, and Roberts [3]. In their paper they conjectured that \(b(G) \leq \Delta(G)+1\) for a nonempty graph \(G\). A counterexample for this conjecture was shown in [5]. Beyond it, we show now that there doesn’t exist an upper bound of the following form: \(b(G) \leq \Delta(G)+c\) for any \(c\in\mathbb{N}\).
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 65-79
- Published: 31/08/1996
It is shown that if \(t > 1\) and \(u \geq 5\), then the known necessary condition for the existence of a skew Room frame of type \(t^u\), is also sufficient with the possible exception of \((u, f)\) where \(u = 5\) and \(t \in \{11, 13, 17, 19, 23, 29, 31, 41, 43\}\).
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 49-63
- Published: 31/08/1996
The class of \(t-sc\) graphs constitutes a new generalization of self-complementary graphs. Many \(t-sc\) graphs exhibit a stable complementing permutation. In this paper, we prove a sufficient condition for the existence of a stable complementing permutation in a \(t-sc\) graph. We also construct several infinite classes of \(t-sc\) graphs to show the stringency of our sufficient condition.
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 33-48
- Published: 31/08/1996
A polyhex graph is either a hexagonal system or a coronoid system. A polyhex graph \(G\) is said to be \(k\)-coverable if for any \(k\) mutually disjoint hexagons the subgraph obtained from \(G\) by deleting all these \(k\) hexagons together with their incident edges has at least one perfect matching. In this paper, a constructive criterion is given to determine whether or not a given polyhex graph is \(k\)-coverable. Furthermore, a simple method is developed which allows us to determine whether or not there exists a \(k\)-coverable polyhex graph with exactly \(h\) hexagons.
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 17-31
- Published: 31/08/1996
A \((k, \lambda)\)-semiframe of type \(g^u\) is a group divisible design of type \(g^u\) \((\chi, \mathcal{G}, \mathcal{B})\), in which \(\mathcal{B}\) is written as a disjoint union \(\mathcal{B} = \mathcal{P} \cup \mathcal{Q} \) where \(\mathcal{P} \) is partitioned into partial parallel classes of \(\chi\) (with respect to some \(G \in \mathcal{G}\)) and \(\mathcal{Q} \) is partitioned into parallel classes of \(\chi\). In this paper, new constructions for these designs are provided with some series of designs with \(k = 3\). Cyclic semiframes are discussed. Finally, an application of semiframes is also mentioned.
- Research article
- Full Text
- Ars Combinatoria
- Volume 043
- Pages: 3-16
- Published: 31/08/1996
A solution of Dudeney’s round table problem is given when \(n\) is as follows:
- \(n = pq + 1\), where \(p\) and \(q\) are odd primes.
- \(n = p^e + 1\), where \(p\) is an odd prime.
- \(n = p^e q^f + 1\), where \(p\) and \(q\) are distinct odd primes satisfying \(p \geq 5\) and \(q \geq 11\), and \(e\) and \(f\) are natural numbers.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 021
- Pages: 235-254
- Published: 30/06/1996
We prove a very natural generalization of the Borsuk-Ulam antipodal theorem and deduce from it, in a very straightforward way, the celebrated result of Alon [1] on splitting necklaces. Alon’s result states that \(t(k-1)\) is an upper bound on the number of cutpoints of an opened \(t\)-colored necklace such that the segments obtained can be used to partition the set of vertices of the necklace into $k$ subsets with the property that every color is represented by the same number of vertices in any element of the partition. The proof of our generalization of the Borsuk-Ulam theorem uses a result from algebraic topology as a starting point and is otherwise purely combinatorial.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 021
- Pages: 223-234
- Published: 30/06/1996
Two classical theorems about tournaments state that a tournament with no less than eight vertices admits an antidirected Hamiltonian path and an even cardinality tournament with no less than sixteen vertices admits an antidirected Hamiltonian cycle. Sequential algorithms for finding such a path as well as a cycle follow directly from the proofs of the theorems. Unfortunately, these proofs are inherently sequential and cannot be exploited in a parallel context. In this paper, we propose new proofs leading to efficient parallel algorithms.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 021
- Pages: 217-222
- Published: 30/06/1996
In this article, we discuss the number of pairwise orthogonal Latin squares and obtain the estimate \(n_r < 8(r + 1)2^{4r}\) for \(r \geq 2\).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 021
- Pages: 207-215
- Published: 30/06/1996
In this paper, we present some results on the existence of balanced arrays (B-arrays) with two symbols and of strength four by using some inequalities involving the statistical concepts of skewness and kurtosis. We demonstrate also, through an illustrative example, that in certain situations, the results given here lead to sharper upper bounds on the number of constraints for B-arrays.




