Contributions to Discrete Mathematics (E-Journal, University of Calgary)
Not a member yet
    379 research outputs found

    Induced Subgraphs of Bounded Degree and Bounded Treewidth

    Get PDF
    We prove that for all integers kgeqtgeq0kgeq tgeq 0 and dgeq2kdgeq 2k, every graph GG with treewidth at most kk has a `large\u27 induced subgraph HH, where HH has treewidth at most tt and every vertex in HH has degree at most dd in GG. The order of HH depends on tt, kk, dd, and the order of GG. With t=kt=k, we obtain large sets of bounded degree vertices. With t=0t=0, we obtain large independent sets of bounded degree. In both these cases, our bounds on the order of HH are tight. For bounded degree independent sets in trees, we characterise the extremal graphs. Finally, we prove that an interval graph with maximum clique size kk has a maximum independent set in which every vertex has degree at most 2k2k

    On primitive symmetric association schemes with m_1=3

    Get PDF
    We classify primitive symmetric association schemes with m_1 = 3. Namely, it is shown that the tetrahedron, i.e., the association scheme of the complete graph K_4, is the unique such association scheme. Our proof of this result is based on the spherical embeddings of association schemes and elementary three dimensional Euclidean geometry

    Convolution over Lie and Jordan algebras

    Get PDF
    Given a ternary relation C on a set U and an algebra A, we present a construction of a convolution algebra A(U, C) of U = (U, C) over A. This generalises bothmatrix algebras and algebras obtained from convolution of monoids. To any class of algebras corresponds a class of convolution structures. Our study cases are the classes of commutative, associative, Lie, and Jordan algebras. In each of these classes we give conditions on (U, C) under which A(U, C) is in the same class as A. It turns out that in some situations these conditions are even necessary

    Classification of linear codes exploiting an invariant

    Get PDF
    We consider the problem of computing the equivalence classes of a set of linear codes. This problem arises when new codes are obtained extending codes of lower dimension. We propose a technique that, exploiting an invariant simple to compute, allows to reduce the computational complexity of the classification process. Using this technique the [13,5,8]_7, the [14,5,9]_8 and the [15,4,11]_9 codes have been classified. These classifications enabled us to solve the packing problem for NMDS codes for q=7,8,9. The same technique can be applied to the problem of the classification of other structures

    Best Simultaneous Diophantine Approximations under a Constraint on the Denominator

    Get PDF
    We investigate the problem of best simultaneous Diophantine approximation under a constraint on the denominator, as proposed by Jurkat. New lower estimates for optimal approximation constants are given in terms of critical determinants of suitable star bodies. Tools are results on simultaneous Diophantine approximation of rationals by rationals with smaller denominator. Finally, the approximation results are applied to the decomposition of integer vectors

    Uniquely circular colourable and uniquely fractional colourable graphs of large girth

    Get PDF
    Given any rational numbers rr2˘7>2r \geq r\u27 >2 and an integer gg, we prove that there is a graph GG of girth at least gg, which is uniquely rr-colourable and uniquely r2˘7r\u27-fractional colourable

    N-free extensions of posets. Note on a theorem of P.A.Grillet

    Get PDF
    Let SN(P)S_{N}(P) be the poset obtained by adding a dummy vertex on each diagonal edge of the NN\u27s of a finite poset PP. We show that SN(SN(P))S_{N}(S_{N}(P)) is NN-free. It follows that this poset is the smallest NN-free barycentric subdivision of the diagram of PP, poset whose existence was proved by P.A. Grillet. This is also the poset obtained by the algorithm starting with P0:=PP_0:=P and consisting at step mm of adding a dummy vertex on a diagonal edge of some NN in PmP_m, proving that the result of this algorithm does not depend upon the particular choice of the diagonal edge choosen at each step. These results are linked to drawing of posets

    Szemer\u27edi\u27s regularity lemma revisited

    Get PDF
    Szemer\u27edi\u27s regularity lemma is a basic tool in graph theory, and also plays an important role in additive combinatorics, most notably in proving Szemer\\u27edi\u27s theorem on arithmetic progressions . In this note we revisit this lemma from the perspective of probability theory and information theory instead of graph theory, and observe a variant of this lemma which introduces a new parameter FF. This stronger version of the regularity lemma was iterated in a recent paper of the author to reprove the analogous regularity lemma for hypergraphs

    Sum and product of different sets

    Get PDF
    Let A and B be two finite sets of numbers. The sum set and the product set of A, B are A + B = {a + b : a in A, b in B}, and AB = {ab : a in A, b in B}. $ We prove that A+B is as large as possible when AA is not too big. Similarly, AB is large when A+A is not too big. The methods rely on the Lambda_p constant of A, bound on the number of factorizations in a generalized progression containing A, and the subspace theorem

    310

    full texts

    379

    metadata records
    Updated in last 30 days.
    Contributions to Discrete Mathematics (E-Journal, University of Calgary) is based in Canada
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇