To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This volume contains nine survey articles based on the invited lectures given at the 24th British Combinatorial Conference, held at Royal Holloway, University of London in July 2013. This biennial conference is a well-established international event, with speakers from around the world. The volume provides an up-to-date overview of current research in several areas of combinatorics, including graph theory, matroid theory and automatic counting, as well as connections to coding theory and Bent functions. Each article is clearly written and assumes little prior knowledge on the part of the reader. The authors are some of the world's foremost researchers in their fields, and here they summarise existing results and give a unique preview of cutting-edge developments. The book provides a valuable survey of the present state of knowledge in combinatorics, and will be useful to researchers and advanced graduate students, primarily in mathematics but also in computer science and statistics.
Nominal sets provide a promising new mathematical analysis of names in formal languages based upon symmetry, with many applications to the syntax and semantics of programming language constructs that involve binding, or localising names. Part I provides an introduction to the basic theory of nominal sets. In Part II, the author surveys some of the applications that have developed in programming language semantics (both operational and denotational), functional programming and logic programming. As the first book to give a detailed account of the theory of nominal sets, it will be welcomed by researchers and graduate students in theoretical computer science.
A property of finite graphs is called non-deterministically testable if it has a ‘certificate’ such that once the certificate is specified, its correctness can be verified by random local testing. In this paper we study certificates that consist of one or more unary and/or binary relations on the nodes, in the case of dense graphs. Using the theory of graph limits, we prove that non-deterministically testable properties are also deterministically testable.
The traveling salesman problem (TSP) is one of the most fundamental optimizationproblems. We consider the β-metric traveling salesman problem(Δβ-TSP), i.e., the TSPrestricted to graphs satisfying the β-triangle inequalityc({v,w}) ≤ β(c({v,u}) + c({u,w})),for some cost function c and any three vertices u,v,w.The well-known path matching Christofides algorithm (PMCA) guarantees an approximationratio of 3β2/2 and is the best known algorithm for theΔβ-TSP, for 1 ≤ β ≤ 2. Weprovide a complete analysis of the algorithm. First, we correct an error in the originalimplementation that may produce an invalid solution. Using a worst-case example, we thenshow that the algorithm cannot guarantee a better approximation ratio. The example canalso be used for the PMCA variants for the Hamiltonian path problem with zero and oneprespecified endpoints. For two prespecified endpoints, we cannot reuse the example, butwe construct another worst-case example to show the optimality of the analysis also inthis case.
We provide an algorithm for listing all minimal 2-dominating sets of a tree of ordern in time 𝒪(1.3248n). This implies that every tree has at most1.3248n minimal 2-dominating sets. We also show that thisbound is tight.
We discuss how much space is sufficient to decide whether a unary given numbern is a prime. We show thatO(log log n) space is sufficient for a deterministicTuring machine, if it is equipped with an additional pebble movable along the input tape,and also for an alternating machine, if the space restriction applies only to itsaccepting computation subtrees. In other words, the language is a prime is inpebble–DSPACE(log log n) and also inaccept–ASPACE(log log n). Moreover, if the givenn is composite, such machines are able to find a divisor ofn. Since O(log log n) space is toosmall to write down a divisor, which might requireΩ(log n) bits, the witness divisor is indicated by theinput head position at the moment when the machine halts.
We give several new applications of the wreath product of forest algebras to the study oflogics on trees. These include new simplified proofs of necessary conditions fordefinability in CTL and first-order logic with the ancestor relation; asequence of identities satisfied by all forest languages definable inPDL; and new examples of languages outside CTL, alongwith an application to the question of what properties are definable in bothCTL and LTL.
The deductive method ruled mathematics for the last 2500 years, now it is the turn of the inductive method. We make a start by using the C-finite ansatz to enumerate tilings of skinny place regions, inspired by a Mathematics Magazine Problem proposed by Donald Knuth.
to be described below. In fact, more accurately, this article accompanies these packages, written by DZ and the many output files, discovering and proving deep enumeration theorems, done by SBE, that are linked to from the webpage of this article: http://www.math.rutgers.edu/~zeilberg/mamarim/mamarimhtml/ritsuf.html.
How it all started: April 5, 2012
During one of the Rutgers University Experimental Mathematics Seminar dinners, the name of Don Knuth came up, and two of the participants, David Nacin, who was on sabbatical from William Patterson University, and first-year graduate student Patrick Devlin, mentioned that they recently solved a problem that Knuth proposed in Mathematics Magazine [5]. The problem was:
1868. Proposed by Donald E. Knuth, Stanford University, Stanford, California.
Let n ≥ 2 be an integer. Remove the central (n − 2)2 squares from an (n + 2) × (n + 2) array of squares. In how many ways can the remaining squares be covered with 4n dominoes?
Many combinatorial problems can be formulated as “Can I transform configuration 1 into configuration 2, if only certain transformations are allowed?”. An example of such a question is: given two k-colourings of a graph, can I transform the first k-colouring into the second one, by recolouring one vertex at a time, and always maintaining a proper k-colouring? Another example is: given two solutions of a SAT-instance, can I transform the first solution into the second one, by changing the truth value one variable at a time, and always maintaining a solution of the SAT-instance? Other examples can be found in many classical puzzles, such as the 15-Puzzle and Rubik's Cube.
In this survey we shall give an overview of some older and some more recent work on this type of problem. The emphasis will be on the computational complexity of the problems: how hard is it to decide if a certain transformation is possible or not?
Introduction
Reconfiguration problems are combinatorial problems in which we are given a collection of configurations, together with some transformation rule(s) that allows us to change one configuration to another. A classic example is the so-called 15-puzzle (see Figure 1): 15 tiles are arranged on a 4 × 4 grid, with one empty square; neighbouring tiles can be moved to the empty slot. The normal aim is, given an initial configuration, to move the tiles to the position with all numbers in order (right-hand picture in Figure 1). Readers of a certain age may remember Rubik’s cube and its relatives as examples of reconfiguration puzzles (see Figure 2).
In 1982 Truemper gave a theorem that characterizes graphs whose edges can be labeled so that all chordless cycles have prescribed parities. The characterization states that this can be done for a graph G if and only if it can be done for all induced subgraphs of G that are of a few specific types, that we will call Truemper configurations. Truemper was originally motivated by the problem of obtaining a co-NP characterization of bipartite graphs that are signable to be balanced (i.e. bipartite graphs whose node-node incidence matrices are balanceable matrices).
The configurations that Truemper identified in his theorem ended up playing a key role in understanding the structure of several seemingly diverse classes of objects, such as regular matroids, balanceable matrices and perfect graphs. In this survey we view all these classes, and more, through the excluded Truemper configurations, focusing on the algorithmic consequences, trying to understand what structurally enables efficient recognition and optimization algorithms.
Introduction
Optimization problems such as coloring a graph, or finding the size of a largest clique or stable set are NP-hard in general, but become polynomially solvable when some configurations are excluded. On the other hand they remain difficult even when seemingly quite a lot of structure is imposed on an input graph. For example, determining whether a graph is 3-colorable remains NP-complete for triangle-free graphs with maximum degree 4 [92].
A map, that is, a cellular embedding of a graph on a surface, may admit symmetries such as rotations and reflections. Prominent examples of maps with a ‘high level of symmetry’ come from Platonic and Archimedean solids. The theory of maps and their symmetries is surprisingly rich and interacts with other disciplines in mathematics such as algebraic topology, group theory, hyperbolic geometry, the theory of Riemann surfaces and Galois theory.
In the first half of the paper we outline the fundamentals of the algebraic theory of regular and orientably regular maps. The second half of the article is a survey of the state-of-the-art with respect to the classification of such maps by their automorphism groups, underlying graphs, and supporting surfaces. We conclude by introducing the notion of ‘external symmetries’ of regular maps, going well beyond automorphisms, and discuss the corresponding ‘super-symmetric’ maps.
Introduction
Groups are often studied in terms of their action on the elements of a set or on particular objects within a structure. Examples of such situations are abundant and we mention here just a few. Since Cayley's time we know that every group can be viewed as a group of permutations on a set. The study of group actions on vector spaces gave rise to the vast area of representation theory. Investigation of automorphism groups of field extensions generated challenges such as the Inverse Galois Problem. In low-dimensional topology, group actions on trees and on graphs in general led to important findings regarding growth of groups.
Complete caps and saturating sets in projective Galois spaces are the geometrical counterpart of linear codes with covering radius 2. The smaller the cap/saturating set, the better the covering properties of the code. In this paper we survey the state of the art of the research on these geometrical objects, with particular emphasis on the recent developments and on the connections with algebraic curves over finite fields.
Introduction
Galois spaces, that is affine and projective spaces of dimension N > 2 defined over a finite (Galois) field Fq, are well known to be rich in nice geometric, combinatorial and group-theoretic properties that have also found wide and relevant applications in several branches of combinatorics, especially to design theory and graph theory, as well as in more practical areas, notably coding theory and cryptography.
The systematic study of Galois spaces was initiated in the late 1950's by the pioneering work of B. Segre [77]. The trilogy [53, 55, 58] covers the general theory of Galois spaces including the study of objects which are linked to linear codes. Typical such objects are plane arcs and their generalizations, especially caps, saturating sets and arcs in higher dimensions, whose code-theoretic counterparts are distinguished types of error-correcting and covering linear codes, such as MDS codes. Their investigation has received a great stimulus from coding theory, especially in the last decades; see the survey papers [56, 57].
The Twenty-Fourth British Combinatorial Conference was organised by Royal Holloway, University of London. It was held in Egham, Surrey in July 2013. The British Combinatorial Committee had invited nine distinguished combinatorialists to give survey lectures in areas of their expertise, and this volume contains the survey articles on which these lectures were based.
In compiling this volume we are indebted to the authors for preparing their articles so accurately and professionally, and to the referees for their rapid responses and keen eye for detail. We would also like to thank Roger Astley and Sam Harrison at Cambridge University Press for their advice and assistance.
Finally, without the previous efforts of editors of earlier Surveys and the guidance of the British Combinatorial Committee, the preparation of this volume would have been daunting: we would like to express our thanks for their support.
This is a brief survey of some open problems on permutation patterns, with an emphasis on subjects not covered in the recent book by Kitaev, Patterns in Permutations and words. I first survey recent developments on the enumeration and asymptotics of the pattern 1324, the final pattern of length 4 whose asymptotic growth is unknown, and related issues such as upper bounds for the number of avoiders of any pattern of length k for any given k. Other subjects treated are the Möbius function, topological properties and other algebraic aspects of the poset of permutations, ordered by containment, and also the study of growth rates of permutation classes, which are containment closed subsets of this poset.
Introduction
The notion of permutation patterns is implicit in the literature a long way back, which is no surprise given that permutations are a natural object in many branches of mathematics, and because patterns of various sorts are ubiquitous in any study of discrete objects. In recent decades the study of permutation patterns has become a discipline in its own right, with hundreds of published papers. This rapid development has not only led to myriad new results, but also, and more interestingly, spawned several different research directions in the last few years. Also, many connections have been discovered between permutation patterns and other research areas, both inside and outside of combinatorics, showcasing the fundamental nature of patterns in permutations and other kinds of words.
This paper gives an informal introduction to structure theory for minor-closed classes of matroids representable over a fixed finite field. The early sections describe some historical results that give evidence that well-defined structure exists for members of such classes. In later sections we describe the fundamental classes and other features that necessarily appear in structure theory for minorclosed classes of matroids. We conclude with an informal statement of the structure theorem itself. This theorem generalises the Graph Minors Structure Theorem of Robertson and Seymour.
Introduction
For the last thirteen years we have been involved in a collaborative project to generalise the results of the Graph Minors Project of Robertson and Seymour to matroids representable over finite fields. The banner theorems of the Graph Minors Project are that graphs are well-quasi-ordered under the minor order [34] (that is, in any infinite set of graphs there is one that is isomorphic to a minor of another) and that for each minor-closed class of graphs there is a polynomial-time algorithm for recognising membership of the class [32]. We are well on track to extend these theorems to the class of F-representable matroids for any finite field F.
It is important to point out here that day-to-day work along this track does not concern well-quasi-ordering or minor testing. The actual task and true challenge is to gain insight into the structure of members of proper minor-closed classes of graphs or matroids. The well-quasi-ordering and minor-testing results are consequences – not necessarily easy ones – of the structure that is uncovered. Ironically, while one may begin studying structure with the purpose of obtaining marketable results, in the end it is probably the structural theorems themselves that are the most satisfying aspect of a project like this. To acquire that structural insight is the bulk of the work and the theorems that in the end describe the entire structure are the main deliveries of a project like this.
The graph removal lemma states that any graph on n vertices with o(nh) copies of a fixed graph H on h vertices may be made H-free by removing o(n2) edges. Despite its innocent appearance, this lemma and its extensions have several important consequences in number theory, discrete geometry, graph theory and computer science. In this survey we discuss these lemmas, focusing in particular on recent improvements to their quantitative aspects.
Introduction
The triangle removal lemma states that for every ε > 0 there exists δ > 0 such that any graph on n vertices with at most δn3 triangles may be made triangle-free by removing at most εn2 edges. This result, proved by Ruzsa and Szemerédi [94] in 1976, was originally stated in rather different language.
The original formulation was in terms of the (6, 3)-problem. This asks for the maximum number of edges f(3)(n, 6, 3) in a 3-uniform hypergraph on n vertices such that no 6 vertices contain 3 edges. Answering a question of Brown, Erdὄs and Sós [19], Ruzsa and Szemerédi showed that f(3)(n, 6, 3) = o(n2). Their proof used several iterations of an early version of Szemerédi's regularity lemma [111].
This result, developed by Szemerédi in his proof of the Erdὄos-Turán conjecture on arithmetic progressions in dense sets [110], states that every graph may be partitioned into a small number of vertex sets so that the graph between almost every pair of vertex sets is random-like.
We study Maker/Breaker games on the edges of sparse graphs. Maker and Breaker take turns at claiming previously unclaimed edges of a given graph H. Maker aims to occupy a given target graph G and Breaker tries to prevent Maker from achieving his goal. We show that for every d there is a constant c = c(d) with the property that for every graph G on n vertices of maximum degree d there is a graph H on at most cn edges such that Maker has a strategy to occupy a copy of G in the game on H.
This is a result about a game-theoretic variant of the size Ramsey number. For a given graph G, $\hat{r}'(G)$ is defined as the smallest number M for which there exists a graph H with M edges such that Maker has a strategy to occupy a copy of G in the game on H. In this language, our result yields that for every connected graph G of constant maximum degree, $\hat{r}'(G) = \Theta(n)$.
Moreover, we can also use our method to settle the corresponding extremal number for universal graphs: for a constant d and for the class ${\cal G}_{n}$ of n-vertex graphs of maximum degree d, $s({\cal G}_{n})$ denotes the minimum number such that there exists a graph H with M edges where, for everyG ∈ ${\cal G}_{n}$, Maker has a strategy to build a copy of G in the game on H. We obtain that $s({\cal G}_{n}) = \Theta(n^{2 - \frac{2}{d}})$.