To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Frequency hopping sequences sets are required in frequency hopping code division multiple access systems. For the anti-jamming purpose, frequency hopping sequences are required to have a large linear span. In this paper, by using a permutation polynomial δ(x) over a finite field, we transform several optimal sets of frequency hopping sequences with small linear span into ones with large linear span. The exact values of the linear span are presented by using the methods of counting the terms of the sequences representations. The results show that the transformed frequency hopping sequences are optimal with respect to the Peng-Fan bound, and can resist the analysis of Berlekamp-Massey algorithm.
In a previous paper [L. Giambruno and S. Mantaci, Theoret. Comput. Sci.411 (2010) 1785–1792] a bideterministic transducer is defined forthe bidirectional deciphering of words by the method introduced by Girod [IEEECommun. Lett. 3 (1999) 245–247]. Such a method is defined usingprefix codes. Moreover a coding method, inspired by the Girod’s one, is introduced, and atransducer that allows both right-to-left and left-to-right decoding by this method isdefined. It is proved also that this transducer is minimal. Here we consider the number ofstates of such a transducer, related to some features of the considered prefix codeX. We find some bounds of such a number of states in relation withdifferent notions of “size” of X. In particular, we give an exact formulafor the number of states of transducers associated to maximal prefix codes. We moreoverconsider two special cases of codes: maximal uniform codes and a class of codes, that wename string-codes. We show that they represent, for maximal codes, the extreme cases withregard to the number of states in terms of different sizes. Moreover we prove that prefixcodes corresponding to isomorphic trees have transducers that are isomorphic as unlabeledgraphs.
A closed λ-term M is easy if, for anyother closed term N, the lambda theory generated byM = N is consistent. Recently, it has been introduceda general technique to prove the easiness of λ-terms through thesemantical notion of simple easiness. Simple easiness implies easiness and allows to proveconsistency results via construction of suitable filter models ofλ-calculus living in the category of complete partial orderings: givena simple easy term M and an arbitrary closed term N, itis possible to build (in a canonical way) a non-trivial filter model which equates theinterpretation of M and N. The question whether easinessimplies simple easiness constitutes Problem 19 in the TLCA list of open problems. In thispaper we negatively answer the question providing a non-empty co-r.e. (complement of arecursively enumerable) set of easy, but not simple easy, λ-terms.
Starting from late 90’s the public administration has started to employ a quite relevantamount of its budget in developing ICT solutions to better deliver services to citizens.In spite of this effort many statistics show that the mere availability of ICT basedservices does not guarantee per se their usage. Citizens have continued to largely accessservices through “traditional” means. In our study we suggest that the highlightedsituation is partly due to the fact that relevant domain dependent requirements, mainlyrelated to the delivery process of e-government digital services, are often ignored in thedevelopment of e-government solutions. We provide here a domain related quality frameworkand encoded it in a set of formal statements, so that we can apply automatic verificationtechniques to assess and improve ICT solutions adopted by public administrations. Thepaper discusses both the defined quality framework and the tool chain we developed toenable automatic assessment of ICT solutions. The tool chain is based on a denotationalmapping of business process modeling notation elements into process algebraic descriptionsand to the encoding of quality requirements in linear temporal logic formulas. Theresulting approach has been applied to real case studies with encouraging results.
This book presents the salient features of the general theory of infinite electrical networks in a coherent exposition. Using the basic tools of functional analysis and graph theory, the author examines the fundamental developments in the field and discusses applications to other areas of mathematics. The first half of the book presents existence and uniqueness theorems for both infinite-power and finite-power voltage-current regimes, and the second half discusses methods for solving problems in infinite cascades and grids. A notable feature is the invention of transfinite networks, roughly analogous to Cantor's extension of the natural numbers to the transfinite ordinals. The last chapter is a survey of application to exterior problems of partial differential equations, random walks on infinite graphs, and networks of operators on Hilbert spaces.
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws on ideas from algorithm design and analysis, computer systems, and statistics and data analysis. The wide-ranging discussion includes a tutorial on system clocks and CPU timers, a survey of strategies for tuning algorithms and data structures, a cookbook of methods for generating random combinatorial inputs, and a demonstration of variance reduction techniques. The book can be used by anyone who has taken a course or two in data structures and algorithms. A companion website, AlgLab (www.cs.amherst.edu/alglab) contains downloadable files, programs and tools for use in experimental projects.
A graph is claw-free if it does not contain an induced subgraph isomorphic to K1,3. Cycles in claw-free graphs have been well studied. In this paper we extend results on disjoint cycles in claw-free graphs satisfying certain minimum degree conditions. In particular, we prove that if G is claw-free of sufficiently large order n = 3k with δ(G) ≥ n/2, then G contains k disjoint triangles.
A spanning tree T of a graph G is called a homeomorphically irreducible spanning tree (HIST) if T does not contain vertices of degree 2. A graph G is called locally connected if, for every vertex v ∈ V(G), the subgraph induced by the neighbourhood of v is connected. In this paper, we prove that every connected and locally connected graph with more than 3 vertices contains a HIST. Consequently, we confirm the following conjecture due to Archdeacon: every graph that triangulates some surface has a HIST, which was proposed as a question by Albertson, Berman, Hutchinson and Thomassen.
Let k and ℓ be positive integers. With a graph G, we associate the quantity ck,ℓ(G), the number of k-colourings of the edge set of G with no monochromatic matching of size ℓ. Consider the function ck,ℓ: given by ck,ℓ(n) = max {ck,ℓ(G): |V(G)| = n}, the maximum of ck,ℓ(G) over all graphs G on n vertices. In this paper, we determine ck,ℓ(n) and the corresponding extremal graphs for all large n and all fixed values of k and ℓ.
Recently, the authors gave upper bounds for the size of 3-uniform hypergraphs avoiding a given odd cycle using the definition of a cycle due to Berge. In the present paper we extend this bound to m-uniform hypergraphs (for all m ≥ 3), as well as m-uniform hypergraphs avoiding a cycle of length 2k. Finally we consider non-uniform hypergraphs avoiding cycles of length 2k or 2k + 1. In both cases we can bound |h| by O(n1+1/k) under the assumption that all h ∈ ε() satisfy |h| ≥ 4k2.
In this paper, we consider pairs of forbidden subgraphs that imply the existence of a 2-factor in a graph. For d ≥ 2, let d be the set of connected graphs of minimum degree at least d. Let F1 and F2 be connected graphs and let be a set of connected graphs. Then {F1, F2} is said to be a forbidden pair for if every {F1, F2}-free graph in of sufficiently large order has a 2-factor. Faudree, Faudree and Ryjáček have characterized all the forbidden pairs for the set of 2-connected graphs. We first characterize the forbidden pairs for 2, which is a larger set than the set of 2-connected graphs, and observe a sharp difference between the characterized pairs and those obtained by Faudree, Faudree and Ryjáček. We then consider the forbidden pairs for connected graphs of large minimum degree. We prove that if {F1, F2} is a forbidden pair for d, then either F1 or F2 is a star of order at most d + 2. Ota and Tokuda have proved that every -free graph of minimum degree at least d has a 2-factor. These results imply that for k ≥ d + 2, no connected graphs F except for stars of order at most d + 2 make {K1,k, F} a forbidden pair for d, while for every connected graph F makes {K1,k, F} a forbidden pair for d. We consider the remaining range of , and prove that only a finite number of connected graphs F make {K1,k, F} a forbidden pair for d.
Let be a family of subsets of an n-element set. It is called intersecting if every pair of its members has a non-disjoint intersection. It is well known that an intersecting family satisfies the inequality || ≤ 2n−1. Suppose that ||=2n−1 + i. Choose the members of independently with probability p (delete them with probability 1 − p). The new family is intersecting with a certain probability. We try to maximize this probability by choosing appropriately. The exact maximum is determined in this paper for some small i. The analogous problem is considered for families consisting of k-element subsets, but the exact solution is obtained only when the size of the family exceeds the maximum size of the intersecting family only by one. A family is said to be inclusion-free if no member is a proper subset of another one. It is well known that the largest inclusion-free family is the one consisting of all -element subsets. We determine the most probably inclusion-free family too, when the number of members is .
Given a locally finite connected infinite graph G, let the interval [pmin(G), pmax(G)] be the smallest interval such that if p > pmax(G), then every 1-independent bond percolation model on G with bond probability p percolates, and for p < pmin(G) none does. We determine this interval for trees in terms of the branching number of the tree. We also give some general bounds for other graphs G, in particular for lattices.
Let G = G(d) be a random graph with a given degree sequence d, such as a random r-regular graph where r ≥ 3 is fixed and n = |G| → ∞. We study the percolation phase transition on such graphs G, i.e., the emergence as p increases of a unique giant component in the random subgraph G[p] obtained by keeping edges independently with probability p. More generally, we study the emergence of a giant component in G(d) itself as d varies. We show that a single method can be used to prove very precise results below, inside and above the ‘scaling window’ of the phase transition, matching many of the known results for the much simpler model G(n, p). This method is a natural extension of that used by Bollobás and the author to study G(n, p), itself based on work of Aldous and of Nachmias and Peres; the calculations are significantly more involved in the present setting.
A family of sets (and the corresponding family of 0–1 vectors) is called t-cancellative if, for all distinct t + 2 members A1,. . ., At and B, C ∈ ,Let ct(n) be the size of the largest t-cancellative family on n elements, and let ct(n, r) denote the largest r-uniform family. We improve the previous upper bounds, e.g., we show c2(n) ≤ 20.322n (for n > n0). Using an algebraic construction we show that c2(n, 2k) = Θ(nk) for each k when n → ∞.
A rainbow subgraph of an edge-coloured graph is a subgraph whose edges have distinct colours. The colour degree of a vertex v is the number of different colours on edges incident with v. Wang and Li conjectured that for k ≥ 4, every edge-coloured graph with minimum colour degree k contains a rainbow matching of size at least ⌈k/2⌉. A properly edge-coloured K4 has no such matching, which motivates the restriction k ≥ 4, but Li and Xu proved the conjecture for all other properly coloured complete graphs. LeSaulnier, Stocker, Wenger and West showed that a rainbow matching of size ⌊k/2⌋ is guaranteed to exist, and they proved several sufficient conditions for a matching of size ⌈k/2⌉. We prove the conjecture in full.
Let HG mean that every s-colouring of E(H) produces a monochromatic copy of G in some colour class. Let the s-colour degree Ramsey number of a graph G, written RΔ(G; s), be min{Δ(H): HG}. If T is a tree in which one vertex has degree at most k and all others have degree at most ⌈k/2⌉, then RΔ(T; s) = s(k − 1) + ϵ, where ϵ = 1 when k is odd and ϵ = 0 when k is even. For general trees, RΔ(T; s) ≤ 2s(Δ(T) − 1).
To study sharpness of the upper bound, consider the double-starSa,b, the tree whose two non-leaf vertices have degrees a and b. If a ≤ b, then RΔ(Sa,b; 2) is 2b − 2 when a < b and b is even; it is 2b − 1 otherwise. If s is fixed and at least 3, then RΔ(Sb,b;s) = f(s)(b − 1) − o(b), where f(s) = 2s − 3.5 − O(s−1).
We prove several results about edge-colourings of bounded-degree graphs that are related to degree Ramsey numbers of paths. Finally, for cycles we show that RΔ(C2k + 1; s) ≥ 2s + 1, that RΔ(C2k; s) ≥ 2s, and that RΔ(C4;2) = 5. For the latter we prove the stronger statement that every graph with maximum degree at most 4 has a 2-edge-colouring such that the subgraph in each colour class has girth at least 5.
In this paper we extend a classical theorem of Corrádi and Hajnal into the setting of sparse random graphs. We show that if p(n) ≫ (log n/n)1/2, then asymptotically almost surely every subgraph of G(n, p) with minimum degree at least (2/3 + o(1))np contains a triangle packing that covers all but at most O(p−2) vertices. Moreover, the assumption on p is optimal up to the (log n)1/2 factor and the presence of the set of O(p−2) uncovered vertices is indispensable. The main ingredient in the proof, which might be of independent interest, is an embedding theorem which says that if one imposes certain natural regularity conditions on all three pairs in a balanced 3-partite graph, then this graph contains a perfect triangle packing.