Utilitas Algorithmica (UA)
ISSN: xxxx-xxxx (print)
Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 79-85
- Published: 31/10/1993
Consider the problem of computing a stabber for polygonal objects. Given a set of objects \({S}\), an object that intersects with all of them is called the stabber of \({S}\). Polynomial time algorithms for constructing a line segment stabber for polygonal objects, if one exists, have been reported in the literature. We introduce the problem of stabbing polygonal objects by monotone chains. We show that a monotone chain that stabs the maximum number of given obstacles can be computed in \(O(n^2 \log n)\) time. We also prove that the maximum number of monotone chains required to stab all polygons can be computed in \(O(n^{2.5})\) time. The main tool used in developing both results is the construction of a directed acyclic graph induced by polygonal objects in a given direction. These results have applications for planning collision-free disjoint paths for several mobile robots in a manufacturing environment.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 65-77
- Published: 31/10/1993
A secret sharing scheme protects a secret (key) by distributing related information among a group of participants. This is done in such a way that only certain pre-specified groups of these participants (the access structure) can reconstruct the secret. In this paper, we introduce a new measure of the efficiency of a perfect secret sharing scheme and examine methods of producing new secret sharing schemes from existing ones. These constructions can be used to help determine the optimal information rates for certain access structures.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 61-64
- Published: 31/10/1993
In this paper, we prove that \(3\)-connected projective graphs with minimum valency \(5\) are edge reconstructible.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 39-60
- Published: 31/10/1993
A set of blocks which is a subset of a unique \(t\)-\((v,k,\lambda_t)\) design is called a \({defining \; set}\) of that design. Using known results, an algorithm for finding smallest defining sets of any \(t\)-\((v,k,\lambda_t)\) design is described. Then the results of this algorithm as applied to the two \(2\)-\((13,3,1)\) designs are given.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 33-37
- Published: 31/10/1993
The support of a \(t\)-design is the set of all distinct blocks of the design. The support size of a design is denoted by \(b^*\). In this paper, except for \(b^* = 23\), we completely determine the spectrum of support sizes of the case \(v = 10\), \(k = 5\), and \(t = 2\).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 15-32
- Published: 31/10/1993
The problem of task allocation in distributed systems has been studied by many researchers. Several approaches have been used to model and study the problem, including integer programming, heuristic methods, and graph theoretic models. These approaches considered only restricted forms of the general problem. In this paper, we introduce a new model to represent the problem of allocating tasks on heterogeneous distributed systems. The model consists of a complete split graph that represents the communication cost among tasks as well as the execution cost of each task on the system processors. This model allows the incorporation of various constraints into the allocation problem. We show that the task allocation problem is equivalent to the problem of weighted clique partitioning in complete split graphs, which we proved to be NP-complete. We present a clique partitioning algorithm that employs the properties of split graphs for solving the problem in its general form. We show that the algorithm generates optimal solutions in some cases, while performing fairly well in general.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 014
- Pages: 3-13
- Published: 31/10/1993
This paper discusses new Erdös-Gallai type necessary conditions for a sequence \(\prod\) of integers to be \(3\)-hypergraphic. Further, we show that some of the known necessary conditions for \(3\)-hypergraphic sequences are not sufficient.
- Research article
- Full Text
- Ars Combinatoria
- Volume 035
- Pages: 335-349
- Published: 30/06/1993
A graph \(G\) is a sum graph if there is a labeling \(o\) of its vertices with distinct positive integers, so that for any two distinct vertices \(u\) and \(v\), \(uv\) is an edge of \(G\) if and only if \(\sigma(u) +\sigma(v) = \sigma(w)\) for some other vertex \(w\). Every sum graph has at least one isolated vertex (the vertex with the largest label). Harary has conjectured that any tree can be made into a sum graph with the addition of a single isolated vertex. We prove this conjecture.
- Research article
- Full Text
- Ars Combinatoria
- Volume 035
- Pages: 325-333
- Published: 30/06/1993
An \(H\)-decomposition of a graph \(G\) is a representation of \(G\) as an edge disjoint union of subgraphs, all of which are isomorphic to another graph \(H\). We study the case where \(H\) is \(P_3 \cup tK_2\) – the vertex disjoint union of a simple path of length 2 (edges) and \(t\) isolated edges – and prove that a set of three obviously necessary conditions for \(G = (V, E)\) to admit an \(H\)-decomposition, is also sufficient if \(|E|\) exceeds a certain function of \(t\). A polynomial time algorithm to test \(H\)-decomposability of an input graph \(G\) immediately follows.
- Research article
- Full Text
- Ars Combinatoria
- Volume 035
- Pages: 315-323
- Published: 30/06/1993
In this paper we consider group divisible designs with equal-sized holes \((HGDD)\) which is a generalization of modified group divisible designs \([1]\) and \(HMOLS\). We prove that the obvious necessary conditions for the existence of the \(HGDD\) is sufficient when the block size is three, which generalizes the result of Assaf[1].




