To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The purpose of this paper is to describe a typical communications system and highlight the problems encountered when transmitting signals. We shall discuss how the signal is corrupted during transmission and examine the possibility of a telecommunications system within which the transmitting and receiving terminals continually adapt their strategies to optimise the use of the particular communications channel at their disposal.
There are many ways in which a signal can be corrupted during its transmission from a sending terminal to a receiving terminal. Figure 1 shows a generalised system and indicates where and in what way the signal can be corrupted and, in particular the various forms of noise that can be added to it. Within this generalised setting, the original signal may first be sent to a switching centre. The switching centre will also have a variety of other signals from other terminals arriving simultaneously and a common form of noise/interface is caused by ‘crosstalk’ which involves the ‘leakage’ of one signal to another. The next processing step will probably involve modulation.
There are two main reasons for using modulation. These are firstly to shift the message signal frequencies to a band which can be transmitted efficiently over the channel and secondly to enable the simultaneous transmission of several signals over a single transmission link. In order to understand the significance of this process one must appreciate that if the frequency domain of a time–varying signal is examined one normally finds that most of the information is contained in a finite portion of the frequency spectrum.
This is a review of certain aspects of flows through random media. We discuss discrete media only, rather than continuous media, and we represent such media as graphical networks. We are interested in two particular types of flow – network flows and electrical flows – and both of these involve the passage of indestructible, uncreatable matter. Rather than considering the case when the constraints on the flows are deterministic, we suppose that these constraints are random variables; thus we consider network flows with random capacities and electrical networks with random resistances, and we think of these either as being “typical networks” (in the sense of operations research) or as being models for randomly–impure physical bodies. In all cases we are concerned with the asymptotic behaviour of large networks in the limit as their sizes approach infinity, and almost all of our results deal with trees, complete graphs, or subsections of crystalline lattices (such as the square lattice).
INTRODUCTION
There are many situations in which the idea of a “flow” is important, such as
– fluid passing through a system of pipes,
– electrons moving along the wires of an electrical circuit,
– information or rumours spreading through a community,
– disease infecting the members of a population.
In all these examples are present the ideas of both space and time. Each requires a medium (generally a set of points with interconnections) and a permeating quantity (such as fluid or disease). In any particular example of one of these four situations, there is a set of rules which govern the consequent flow, and such sets of rules vary a great deal in their styles and degrees of complexity.
This volume contains eight of the nine invited lectures given at the tenth British Combinatorial Conference held in the University of Glasgow, 22 – 26 July, 1985. Although British in name and organisation, these biennial conferences are international in personnel, the nine invited speakers consisting of three from the U.K., three from Europe and three from North America.
Each of the invited speakers was asked to describe developments in a particular branch of combinatorics. The resulting volume provides a broad survey of many areas of contemporary research interest, both theoretical and applied, showing relation between combinatorics and number theory, probability and algebra. I should like to thank the authors for their cooperation in producing their typescripts in accordance with a tight schedule, thus enabling the preparation of this volume to proceed according to plan.
Contributed papers of the conference will be published in a special issue of Ars Combinatoria. This arrangement proved successful at the previous conference at Southampton in 1983.
Finally, thanks are due to the Cambridge University Press for their guidance and cooperation in the preparation of this volume, and to both the British Council and the London Mathematical Society for their financial support of the conference.
L. J. Rogers' paper (Rogers; 1894) which contains the Rogers–Ramanujan identities together with their proof was ignored for 20 years before Ramanujan came across it while leafing through old volumes of the Proceedings of the London Mathematical Society. In the interim, Ramanujan had discovered the Rogers–Ramanujan identities empirically, and they were making the rounds as major unsolved problems (cf. Hardy; 1940, p. 91). This is undoubtedly one of the very few times that a set of significant unsolved problems was solved 20 years before it was posed.
The most obvious reason Rogers' paper lay buried is that it is page after page of q–series identities with the Rogers–Ramanujan identities sneaking past in mild disguise on page 10 of this tour de force.
As more discoveries were made, the subject became even less readable. The Rev. F. H. Jackson was one of the early pioneer q–series researchers. His papers also read much like Rogers'. It is not surprising to read in Jackson's obituary (Chaundy (1962)); “Once (with a whimisical smile one imagines) he [Jackson] recounted the occasion of his quarrel with our Society [the L.M.S.]: he had read a paper when someone remarked: ‘Surely, Mr. President, we have heard all this before.’ He strode from the room and never darkened our pages again.” As it turned out this critical remark was directed at what was, in fact, Jackson's most valuable paper.
Abstract. We survey a number of results about minors of graphs which we have recently obtained. They are basically of three types:
(i) results concerning the structure of the graphs with no minor isomorphic to a fixed graph
(ii) results concerning a conjecture of K. Wagner. that for any infinite set of graphs one of its members is isomorphic to a minor of another. and
(iii) algorithmic results concerning the DISJOINT CONNECTING PATHS problem.
INTRODUCTION
There are two fundamental questions which motivate the work we report on here.
(A) (K. Wagner's well-quasi-ordering conjecture). Is it true that for every infinite sequence G1, G2, … of graphs, there exist i, j with i < j such that Gi is isomorphic to a minor of Gj?
[Graphs in this paper are finite and may have loops or multiple edges. A graph H is a minor of a graph G if H can be obtained from a subgraph of G by contracting edges.]
(B) (The DISJOINT CONNECTING PATHS problem). If k ≥ 0, is there a polynomially-bounded algorithm to decide, given a graph G and vertices s1, …, sk, t1, …, tk of G, whether there are k mutually disjoint paths P1, …, Pk of G where Pi has ends si, ti (1 ≤ i ≤ k)?
[Two paths are disjoint if they have no common vertices.] Some of the background to these questions is discussed in sections 2 and 3.
Suppose that f(z) is non-constant and meromorphic in the plane and that, for some k≥= 1, a0(z),…, ak(z) are meromorphic in the plane with
for j' = 0,…, k. Here, using standard notation from [3], S(r,f) denotes any quantity satisfying S(r,f) = o(T(r,f)) as r→ ∞, possibly outside a set of finite linear measure. Then, setting
we have ([3, p. 57])
Theorem A. Suppose that f(z) is non-constant and meromorphic in the plane, and thatψ (z) given by (1.2) and (1.1) and is non-constant. Then
where N0(r, l/ψ') counts only zeros of ψ' which are not zeros of ψ − 1, and thecounting functions count points without regard to multiplicity.
The asymptotic behaviour of a sequence of polynomials cm = cm(v) satisfying
is established. These polynomials occur in Hawkins' formula for the residues of a Bessel-zeta function at its possible poles in the left half plane. The results imply that cm(v)/cm(0) converges uniformly to cos πV on compact sets. This in turn implies that, for v not a half odd integer, all but finitely many of the possible poles are actual poles.
It is proved that the sequence is completely uniformly distributed modulo 1 for almost all real numbers x with |x|> 1, if (an) is an arbitrary sequence of distinct positive integers.