To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The problem of properly coloring the vertices (or edges) of a graph using for each vertex (or edge) a color from a prescribed list of permissible colors, received a considerable amount of attention. Here we describe the techniques applied in the study of this subject, which combine combinatorial, algebraic and probabilistic methods, and discuss several intriguing conjectures and open problems. This is mainly a survey of recent and less recent results in the area, but it contains several new results as well.
Introduction
Graph coloring is arguably the most popular subject in graph theory. An interesting variant of the classical problem of coloring properly the vertices of a graph with the minimum possible number of colors arises when one imposes some restrictions on the colors available for every vertex. This variant received a considerable amount of attention that led to several fascinating conjectures and results, and its study combines interesting combinatorial techniques with powerful algebraic and probabilistic ideas. The subject, initiated independently by Vizing [51] and by Erdös, Rubin and Taylor [24], is usually known as the study of the choosability properties of a graph. In the present paper we survey some of the known recent and less recent results in this topic, focusing on the techniques involved and mentioning some of the related intriguing open problems. This is mostly a survey article, but it contains various new results as well.
I will review certain results and problems concerning the covering of the edge set of a graph with circuits or Euler tours. The areas I shall consider are:
Faithful circuit covers of weighted graphs.
Shortest circuit covers of bridgeless graphs.
Compatible circuit decompositions and Euler tours of Eulerian graphs.
Even circuit decompositions of Eulerian graphs.
I will describe interconnections between these areas and also indicate connections with other areas of combinatorics: matroids, isotropic systems, edge colouring of graphs, latin squares, nowhere-zero flows in graphs, and the Chinese postman problem.
Throughout this survey my graphs will be finite and without loops, although they may contain multiple edges. By a closed walk in a graph G, I will mean an alternating sequence of vertices and edges which starts and ends at the same vertex and is such that consecutive vertices and edges are incident. The length of the walk is the number of edges in the sequence. A tour is a closed walk which does not repeat edges. An Euler tour of G is a tour which traverses every edge of G. We shall say that a graph is Eulerian if it has an Euler tour. A tour decomposition of G is a partition of E(G) into (edge sets of) tours. We will consider an Euler tour of G to be a tour decomposition into exactly one tour. A circuit is a tour which does not repeat vertices, except when the first vertex is repeated as the last.
We consider graphs whose automorphism groups act transitively on the set of vertices and the stabilizer of a vertex preserves on the neighbourhood of the vertex a projective spaces structure and induces on it a flag-transitive action. Such a graph is said to possess a projective subconstituent. As an additional condition we assume that there is a short cycle in the graph (of length at most 8). The canonical examples of graphs possessing projective subconstituents and containing short cycles are related to finite Lie groups of type An,Dn and F4. There is also a remarkable “sporadic” series coming from the so-called P-geometries (geometries related to the Petersen graph). The automorphism groups of the graphs from this series are sporadic simple groups M22,M23,C02,J4,F2 and nonsplit extensions 3. M22, 323. C02 and 34371. F2. The classification of flag-transitive P-geometries was recently completed by S.V.Shpectorov and the author. The consequences of this classification for the graphs possessing projective subconstituents and containing short cycles are reported in the present survey in the context of the general situation in the subject.
Introduction.
The subject of the survey can be viewed in a general framework of local characterization of graphs. That is characterization by structure of the neighbourhoods of vertices. Usually this structure is described by the subgraph induced by the neighbourhood. If the vertex stabilizer in the automorphism group of the considered graph induces on the neighbourhood a doubly transitive permutation group the induced subgraph is trivial (either the complete graph or the null graph).
In this expository paper, we describe several applications of combinatorics (in particular, combinatorial designs) to cryptography. We look at four areas in cryptography: secrecy codes, authentication codes, secret sharing schemes, and resilient functions. In each of these areas, we find that combinatorial structures arise in a natural and essential way, and we present several examples of combinatorial characterizations of cryptographic objects.
Introduction
Recent years have seen numerous interesting applications of combinatorics to cryptography. In particular, combinatorial designs have played an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing schemes, and resilient functions. The purpose of this paper is to elucidate some of these connections. This is not intended to be an exhaustive survey, but rather a sampling of some research topics in which I have a personal interest.
Some other related surveys include applications of error-correcting codes to cryptography (Sloane [60]), applications of finite geometry to crpytography (Beutelspacher [6]) and applications of combinatorial designs to computer science (Colbourn and Van Oorschot [16]).
In this introduction we will define the relevant concepts from design theory that we will have occasion to use. Beth, Jungnickel and Lenz [4] is a good general reference on design theory.
Let 1 ≤ t ≤ k < v. An Sλ(t, k, v) is defined to be a pair (X, β), where X is a v-set (of points) and β is a collection of κ-subsets of X (called blocks), such that every t-subset of points occurs in exactly λ blocks. An Sλ(t, k, v) is called simple if no block occurs more than once in β.
ABSTRACT Submodular functions and related polyhedra play an increasing role in combinatorial optimization. The present survey-type paper is intended to provide a brief account of this theory along with several applications in graph theory.
INTRODUCTION
In 1960 C.St.J.A. Nash-Williams generalized the following easy but pretty result of H.E. Robbins [1939]: the edges of an undirected graph G can be oriented so that the resulting directed graph D is strongly connected if and only if G is 2-edge-connected.
To formulate the generalization let us call a directed graph [undirected graph] κ-edge-connected if there are κ edge-disjoint directed (undirected)) paths from each node to each other.)
WEAK ORIENTATION THEOREM 1.1 [Nash-Williams, 1960] The edges of an undirected graph G can be oriented so that the resulting directed graph is κ-edge-connected if and only if G is 2κ-edge-connected.
The neccessity of the condition is straightforward and the main difficulty lies in proving its sufficiency. Actually, Nash-Williams proved a stronger result. To formulate it, we need the following notation. Given a directed or undirected graph G, let λ(x, y; G) denote local edge-connectivity from x to y, that is, the maximum number of edge-disjoint paths from x to y.
Abstract. We introduce the concept of a weighted quasigroup. We show that, corresponding to any weighted quasigroup, there is a quasigroup from which it can be obtained in a certain natural way, which we term amalgamation. Not all commutative weighted quasigroups can be obtained from commutative quasigroups by amalgamation; however, given a commutative weighted quasigroup whose weights are all even, we give a necessary and sufficient condition for the existence of a commutative quasigroup from which it can be obtained by amalgamation. We also discuss conjugates of weighted quasigroups.
We also introduce the concept of a simplex zeroid, and relate this concept to that of a weighted quasigroup.
Weighted quasigroups.
Suppose that we have a finite set S with a closed binary operation. If a, b ε S, we shall denote the result of this binary operation acting on a and b by ab. If the binary operation has the two properties
(i) for each a, b ε S, the equation ax = b is uniquely solvable for x, and
(ii) for each a, b ε S the equation ya = b is uniquely solvable for y,
then S is a quasigroup. It is well-known, and easy to see, that S is a quasigroup if and only if its multiplication table is a latin square. The properties (i) and (ii) amount to the assertion that, in the multiplication table, each element of S occurs exactly once in each row and exactly once in each column.
It is illustrated how elementary properties of polynomials can be used to attack extremal problems in finite and euclidean geometry, and in combinatorics. Also a new result, related to the problem of neighbourly cylinders is presented.
Introduction
In this paper I will present a number of problems and for the most part recent results in combinatorics in general and finite geometry in particular. The property these problems share is the fact that they can all be attacked using some kind of polynomial trick. Unfortunately I am not able to give a characterization of the kind of problem that can be solved with these methods, but I am convinced that seeing how the polynomials work in a number of cases should give an impression of the type of problems that might be attacked.
The starting point is usually a combinatorial problem of the following form: Given a set of points (or vectors, or sets) that satisfy some property, we want to say something about the size or the structure of this set. The approach is then to associate to this set a polynomial, or a collection of polynomials, and use properties of polynomials to obtain information on the size or structure of the set.
The setup of this paper is roughly as follows. We consider a particular property of polynomials and give examples where this property can be used to attack the problem.
The fourteenth British Combinatorial Conference is to be held here in July 1993 and, as is usual, the British Combinatorial Committee has invited nine distinguished combinatorial mathematicians to give survey talks on the latest developments in their own fields. This volume contains the papers which they have agreed to submit in advance of their talks.
The quality of these contributions and the interest shown are encouraging signs that the fourteenth conference will be as successful as its predecessors.
The sixtieth birthday of Crispin Nash-Williams falls in 1993, and to mark his tremendous contribution to the growth of combinatorics both in Britain and the world, one day of the conference is to be ‘Nash-Williams day’. The talks by András Frank and Anthony Hilton on that day will be in his honour, as will be many of the contributed talks, and to him this volume is dedicated.
A special edition of Discrete Mathematics, edited by Douglas Woodall, will contain papers contributed to the conference.
I wish to thank the contributors and the referrees for their co-operation in meeting quite tight deadlines, Roger Astley of Cambridge University Press, and the London Mathematical Society and the Institute of Combinatorics and its Applications for their financial support.
The theory of random graphs has proved to be a success. It has provided many interesting questions, provoking the development of new techniques on the boundary between combinatorics and probability theory. Random graphs have also proved tremendously valuable in applications outside the theory: firstly in extremal questions, where bounds obtained by nonconstructive means are often the best known, and secondly in questions coming from computer science, or, for instance, from biology, which turn out to translate directly into natural questions about particular models of random graphs. It is not appropriate to give an extensive bibliography here, but the place to set off on a serious study of random graphs is the monograph by Bollobas [7].
Another basic combinatorial structure is that of finite partially ordered sets, and it is very natural to ask whether an equally successful theory of random partial orders can be developed. Regrettably, the simple answer will have to be “no”. One reason for this is perhaps that partial orders occur less often in applications than do graphs, but the more important problem is mathematical: the lack of “independence”.
To explain this, it is convenient to recall first the most basic model of random graphs. Let n be a positive integer, and p a real number strictly between 0 and 1. Set [n] = { 1, …, n}. For each pair (i, j) of integers from [n] with i < j, let Xij be a Bernoulli random variable with Pv(Xij = 1) = p, with all the Xij mutually independent.
Suppose that is a distribution of N points in the unit square U = [0, 1]2. For every measurable set B in U, let Z[; B] denote the number of ponts of in B, and write
In Euclidean d-space Ed we prove inequalities between the intrinsic volumes (i.e., normalized quermassintegrals) of convex bodies and the successive minima of arbitrary lattices. The inequalities are tight and they generalize earlier results of Hadwiger and Henk for the integer lattice ℤd.
We obtain explicit lower bounds on the lattice packing densities δL of superballs G of quite a general nature, and we conjecture that as the dimension n approaches infinity, the bounds are asymptotically exact. If the conjecture were true, it would follow that the maximum lattice-packing density of the Iσ-ball is 2−n(1+σ(1)) for each σ in the interval 1 ≤ σ ≤ 2.
In a previous paper (Grimshaw, 1990a) we showed that the resonant, or critical, flow of a rotating fluid past an axisymmetric obstacle placed on the axis of a cylindrical tube is described by a forced Korteweg-de Vries equation for the amplitude of the dominant resonant mode. Here we show that in the anomalous but important case when the oncoming flow is uniform with uniform angular velocity a different theory is required which leads to an evolution equation describing finite-amplitude waves. Some numerical solutions of this equation are described.
We present simple constructions of spaces which are countably K -determined, Čech analytic and not K-analytic. We prove that the statement “every uncountable K-analytic space contains an uncountable compact subset” is equivalent to b > ω, extending a result of the first author.
An oversight by the typesetters has led to the omission of the summation condition on the second summation of the first displayed equation on page 392 of [1]. The proof of Lemma 4.1 is consequently very difficult to follow. The expression for Ip(α) should read
In addition, we take this opportunity to note that on page 391, in the two displayed equations following equation (3.15), the summations involving ud+1 should read