3,579 research outputs found

    Hereditary Graph Classes: When the Complexities of Colouring and Clique Cover Coincide

    Full text link
    A graph is (H1,H2)(H_1,H_2)-free for a pair of graphs H1,H2H_1,H_2 if it contains no induced subgraph isomorphic to H1H_1 or H2H_2. In 2001, Kr\'al', Kratochv\'{\i}l, Tuza, and Woeginger initiated a study into the complexity of Colouring for (H1,H2)(H_1,H_2)-free graphs. Since then, others have tried to complete their study, but many cases remain open. We focus on those (H1,H2)(H_1,H_2)-free graphs where H2H_2 is H1\overline{H_1}, the complement of H1H_1. As these classes are closed under complementation, the computational complexities of Colouring and Clique Cover coincide. By combining new and known results, we are able to classify the complexity of Colouring and Clique Cover for (H,H)(H,\overline{H})-free graphs for all cases except when H=sP1+P3H=sP_1+ P_3 for s3s\geq 3 or H=sP1+P4H=sP_1+P_4 for s2s\geq 2. We also classify the complexity of Colouring on graph classes characterized by forbidding a finite number of self-complementary induced subgraphs, and we initiate a study of kk-Colouring for (Pr,Pr)(P_r,\overline{P_r})-free graphs.Comment: 19 Pages, 5 Figure

    Topological Graphic Passwords And Their Matchings Towards Cryptography

    Full text link
    Graphical passwords (GPWs) are convenient for mobile equipments with touch screen. Topological graphic passwords (Topsnut-gpws) can be saved in computer by classical matrices and run quickly than the existing GPWs. We research Topsnut-gpws by the matching of view, since they have many advantages. We discuss: configuration matching partition, coloring/labelling matching partition, set matching partition, matching chain, etc. And, we introduce new graph labellings for enriching Topsnut-matchings and show that these labellings can be realized for trees or spanning trees of networks. In theoretical works we explore Graph Labelling Analysis, and show that every graph admits our extremal labellings and set-type labellings in graph theory. Many of the graph labellings mentioned are related with problems of set matching partitions to number theory, and yield new objects and new problems to graph theory

    Text-based Passwords Generated From Topological Graphic Passwords

    Full text link
    Topological graphic passwords (Topsnut-gpws) are one of graph-type passwords, but differ from the existing graphical passwords, since Topsnut-gpws are saved in computer by algebraic matrices. We focus on the transformation between text-based passwords (TB-paws) and Topsnut-gpws in this article. Several methods for generating TB-paws from Topsnut-gpws are introduced; these methods are based on topological structures and graph coloring/labellings, such that authentications must have two steps: one is topological structure authentication, and another is text-based authentication. Four basic topological structure authentications are introduced and many text-based authentications follow Topsnut-gpws. Our methods are based on algebraic, number theory and graph theory, many of them can be transformed into polynomial algorithms. A new type of matrices for describing Topsnut-gpws is created here, and such matrices can produce TB-paws in complex forms and longer bytes. Estimating the space of TB-paws made by Topsnut-gpws is very important for application. We propose to encrypt dynamic networks and try to face: (1) thousands of nodes and links of dynamic networks; (2) large numbers of Topsnut-gpws generated by machines rather than human's hands. As a try, we apply spanning trees of dynamic networks and graphic groups (Topsnut-groups) to approximate the solutions of these two problems. We present some unknown problems in the end of the article for further research

    Homomorphisms of signed planar graphs

    Full text link
    Signed graphs are studied since the middle of the last century. Recently, the notion of homomorphism of signed graphs has been introduced since this notion captures a number of well known conjectures which can be reformulated using the definitions of signed homomorphism. In this paper, we introduce and study the properties of some target graphs for signed homomorphism. Using these properties, we obtain upper bounds on the signed chromatic numbers of graphs with bounded acyclic chromatic number and of signed planar graphs with given girth

    Unique colorability and clique minors

    Full text link
    For a graph G, let h(G) denote the largest k such that G has k pairwise disjoint pairwise adjacent connected nonempty subgraphs, and let s(G) denote the largest k such that G has k pairwise disjoint pairwise adjacent connected subgraphs of size 1 or 2. Hadwiger's conjecture states that h(G) is at least c(G), where c(G) is the chromatic number of G. Seymour conjectured that s(G) is at least |V(G)|/2 for all graphs without antitriangles, i. e. three pairwise nonadjacent vertices. Here we concentrate on graphs G with exactly one c(G)-coloring. We prove generalizations of (i) if c(G) is at most 6 and G has exactly one c(G)-coloring then h(G) is at least c(G), where the proof does not use the four-color-theorem, and (ii) if G has no antitriangles and G has exactly one c(G)-coloring then s(G) is at least |V(G)|/2

    Sigma-Adequate Link Diagrams and the Tutte Polynomial

    Full text link
    In this paper, we characterize the sigma-adequacy of a link diagram in two ways: in terms of a certain edge subset of its Tait graph and in terms of a certain product of Tutte polynomials. Furthermore, we show that the symmetrized Tutte polynomial of the Tait graph of a link diagram can be written as a sum of these products of Tutte polynomials, where the sum is over the sigma-adequate states of the given link diagram. Using this state sum, we show that the number of sigma-adequate states of a link diagram is bounded above by the number of spanning trees in its associated Tait graph. By combining results, we give a method to find all of the sigma-adequate states of a link diagram. Finally, we give necessary and sufficient conditions for a link diagram to be sigma-adequate and sigma-homogeneous (also called homogeneously adequate) with respect to a given state.Comment: 31 pages, 11 figure

    On colorful edge triples in edge-colored complete graphs

    Full text link
    An edge-coloring of the complete graph KnK_n we call FF-caring if it leaves no FF-subgraph of KnK_n monochromatic and at the same time every subset of V(F)|V(F)| vertices contains in it at least one completely multicolored version of FF. For the first two meaningful cases, when F=K1,3F=K_{1,3} and F=P4F=P_4 we determine for infinitely many nn the minimum number of colors needed for an FF-caring edge-coloring of KnK_n. An explicit family of 2log2n2\lceil\log_2 n\rceil 33-edge-colorings of KnK_n so that every quadruple of its vertices contains a totally multicolored P4P_4 in at least one of them is also presented. Investigating related Ramsey-type problems we also show that the Shannon (OR-)capacity of the Gr\"otzsch graph is strictly larger than that of the five length cycle.Comment: 15 page

    A generalization of Witsenhausen's zero-error rate for directed graphs

    Full text link
    We investigate a communication setup where a source output is sent through a free noisy channel first and an additional codeword is sent through a noiseless but expensive channel later. With the help of the second message the decoder should be able to decide with zero-error whether its decoding of the first message was error-free. This scenario leads to the definition of a digraph parameter that generalizes Witsenhausen's zero-error rate for directed graphs. We investigate this new parameter for some specific directed graphs and explore its relations to other digraph parameters like Sperner capacity and dichromatic number. When the original problem is modified to require zero-error decoding of the whole message then we arrive back to the Witsenhausen rate of an appropriately defined undirected graph.Comment: 27 pages, 4 figure

    Coloring (P5P_5, bull)-free graphs

    Full text link
    We give a polynomial-time algorithm that computes the chromatic number of any graph that contains no path on five vertices and no bull as an induced subgraph (where the bull is the graph with five vertices a,b,c,d,ea,b,c,d,e and edges ab,bc,cd,be,ceab,bc,cd,be,ce).Comment: 8 page

    Regarding two conjectures on clique and biclique partitions

    Full text link
    For a graph GG, let cp(G)cp(G) denote the minimum number of cliques of GG needed to cover the edges of GG exactly once. Similarly, let bpk(G)bp_k(G) denote the minimum number of bicliques (i.e. complete bipartite subgraphs of GG) needed to cover each edge of GG exactly kk times. We consider two conjectures -- one regarding the maximum possible value of cp(G)+cp(G)cp(G) + cp(\overline{G}) (due to de Caen, Erd\H{o}s, Pullman and Wormald) and the other regarding bpk(Kn)bp_k(K_n) (due to de Caen, Gregory and Pritikin). We disprove the first, obtaining improved lower and upper bounds on maxGcp(G)+cp(G)\max_G cp(G) + cp(\overline{G}), and we prove an asymptotic version of the second, showing that bpk(Kn)=(1+o(1))nbp_k(K_n) = (1+o(1))n
    corecore