247,746 research outputs found

    Monochromatic connected matchings in 2-edge-colored multipartite graphs

    Full text link
    A matching MM in a graph GG is connected if all the edges of MM are in the same component of GG. Following \L uczak,there have been many results using the existence of large connected matchings in cluster graphs with respect to regular partitions of large graphs to show the existence of long paths and other structures in these graphs. We prove exact Ramsey-type bounds on the sizes of monochromatic connected matchings in 22-edge-colored multipartite graphs. In addition, we prove a stability theorem for such matchings.Comment: 29 pages, 2 figure

    Continuum Percolation in the Intrinsically Secure Communications Graph

    Full text link
    The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present.Comment: Accepted in the IEEE International Symposium on Information Theory and its Applications (ISITA'10), Taichung, Taiwan, Oct. 201

    The edge slide graph of the n-dimensional cube : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Mathematics at Massey University, Manawatū, New Zealand

    Get PDF
    The goal of this thesis is to understand the spanning trees of the n-dimensional cube Qn by understanding their edge slide graph. An edge slide is a move that “slides” an edge of a spanning tree of Qn across a two-dimensional face, and the edge slide graph is the graph on the spanning trees of Qn with an edge between two trees if they are connected by an edge slide. Edge slides are a restricted form of an edge move, in which the edges involved in the move are constrained by the structure of Qn, and the edge slide graph is a subgraph of the tree graph of Qn given by edge moves. The signature of a spanning tree of Qn is the n-tuple (a1; : : : ; an), where ai is the number of edges in the ith direction. The signature of a tree is invariant under edge slides and is therefore constant on connected components. We say that a signature is connected if the trees with that signature lie in a single connected component, and disconnected otherwise. The goal of this research is to determine which signatures are connected. Signatures can be naturally classified as reducible or irreducible, with the reducible signatures being further divided into strictly reducible and quasi-irreducible signatures. We determine necessary and sufficient conditions for (a1; : : : ; an) to be a signature of Qn, and show that strictly reducible signatures are disconnected. We conjecture that strict reducibility is the only obstruction to connectivity, and present substantial partial progress towards an inductive proof of this conjecture. In particular, we reduce the inductive step to the problem of proving under the inductive hypothesis that every irreducible signature has a “splitting signature” for which the upright trees with that signature and splitting signature all lie in the same component. We establish this step for certain classes of signatures, but at present are unable to complete it for all. Hall’s Theorem plays an important role throughout the work, both in characterising the signatures, and in proving the existence of certain trees used in the arguments

    Percolation and Connectivity in the Intrinsically Secure Communications Graph

    Get PDF
    The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of: (i) percolation on the infinite plane, and (ii) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. The results help clarify how the presence of eavesdroppers can compromise long-range secure communication.Comment: Submitted for journal publicatio

    Flows and bisections in cubic graphs

    Get PDF
    A kk-weak bisection of a cubic graph GG is a partition of the vertex-set of GG into two parts V1V_1 and V2V_2 of equal size, such that each connected component of the subgraph of GG induced by ViV_i (i=1,2i=1,2) is a tree of at most k2k-2 vertices. This notion can be viewed as a relaxed version of nowhere-zero flows, as it directly follows from old results of Jaeger that every cubic graph GG with a circular nowhere-zero rr-flow has a r\lfloor r \rfloor-weak bisection. In this paper we study problems related to the existence of kk-weak bisections. We believe that every cubic graph which has a perfect matching, other than the Petersen graph, admits a 4-weak bisection and we present a family of cubic graphs with no perfect matching which do not admit such a bisection. The main result of this article is that every cubic graph admits a 5-weak bisection. When restricted to bridgeless graphs, that result would be a consequence of the assertion of the 5-flow Conjecture and as such it can be considered a (very small) step toward proving that assertion. However, the harder part of our proof focuses on graphs which do contain bridges.Comment: 14 pages, 6 figures - revised versio
    corecore