Secure sets and defensive alliances faster algorithm and improved bounds. Amano, Kazuyuki; Oo, Kyaw May; Otach Author(s) Uehara, Ryuhei
|
|
- Emery Paul
- 5 years ago
- Views:
Transcription
1 JAIST Reposi Title Secure sets an efensive alliances faster algorithm an improve bouns Amano, Kazuyuki; Oo, Kyaw May; Otach Author(s Uehara, Ryuhei Citation IEICE Transactions on Information an E98-D(3: Issue Date Type Journal Article Text version publisher URL Rights Copyright (C2015 IEICE. Kazuyuki Am Oo, Yota Otachi, an Ryuhei Uehara, Transactions on Information an Syst D(3, 2015, Description Japan Avance Institute of Science an
2 VOL. E98-D NO. 3 MARCH 2015 The usage of this PDF file must comply with the IEICE Provisions on Copyright. The author(s can istribute this PDF file for research an eucational (nonprofit purposes only. Distribution by anyone other than the author(s is prohibite.
3 486 IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 2015 PAPER Special Section on Founations of Computer Science New Spirits in Theory of Computation an Algorithm Secure Sets an Defensive Alliances in Graphs: A Faster Algorithm an Improve Bouns Kazuyuki AMANO a, Member, Kyaw May OO b, Nonmember, Yota OTACHI c, an Ryuhei UEHARA, Members SUMMARY Secure sets an efensive alliances in graphs are stuie. They are sets of vertices that are safe in some senses. In this paper, we first present a fixe-parameter algorithm for fining a small secure set, whose running time is much faster than the previously known one. We then present improve boun on the smallest sizes of efensive alliances an secure sets for hypercubes. These results settle some open problems pause recently. key wors: secure set, efensive alliance, fixe-parameter tractability, hypercube 1. Introuction The concept of a efensive alliance in a graph is introuce by Kristiansen, Heetniemi, an Heetniemi [14]. Intuitively, a efensive alliance is a set of vertices that is safe from attacks by its neighborhoo. Later the concept of a secure set in a graph is introuce by Brigham, Dutton, an Heetniemi [1]. Roughly speaking, a secure set is a much safer set of vertices than a efensive alliance. As the reaers see from the formal efinitions in the next section, any secure set is a efensive alliance. The problem of fining a smallest secure set or a smallest efensive alliance is of interest. These concepts have been intensively stuie (see e.g. [1], [4], [5], [10], [14]. Recently, Isaak, Johnson, an Petrie [12], [16] have introuce fractional variants of secure sets. Jamieson, Heetniemi, an McRae [13] showe that the problem of eciing whether a graph has a efensive alliance of size at most given k is NP-complete. Fernau an Raible [9] showe that the problem is fixe-parameter tractable when parameterize by the size of a efensive alliance. Enciso an Dutton [6] later presente a fixeparameter algorithm with a better running time. To the best of our knowlege, the complexity of fining a smallest secure set is not known. It is known that given a Manuscript receive February 28, Manuscript revise June 28, The author is with the Depertment of Computer Science, Gunma University, Kiryu-shi, Japan. The author is with University of Computer Stuies, Yangon, No. 14/20, Than Lwin Roa, Bahan, Yangon, Myanmar. The authors are with School of Information Science, Japan Avance Institute of Science an Technology, Nomi-shi, Japan. a amano@cs.gunma-u.ac.jp b kmayoo19@gmail.com c otachi@jaist.ac.jp uehara@jaist.ac.jp DOI: /transinf.2014FCP0007 graph an a set of vertices, it is conp-complete to ecie whether the set is a secure set of the graph [3]. Enciso an Dutton [7] presente a fixe-parameter algorithm for solving the problem of eciing whether a given n-vertex graph has a secure set of size at most k in time O(2 k log 2k n. 1.1 Our Results In Sect. 3, we present a faster fixe-parameter algorithm with a running time of O(2 3k k 2 n for fining a secure set of size at most k. In Sect. 4, we present graph-theoretic contributions. For hypercubes, we first etermine exactly the efensive alliance number, an also the efensive alliance partition number as a corollary. We then generalize these results to Hamming graphs. Next we present a significantly improve lower boun of the security number of hypercubes. The previously known lower boun ue to Petrie [16] is 2 /2, an our lower boun is more than for large enough. 2. Preliminaries All graphs in this paper are finite, simple, an unirecte. For a graph G, we enote its vertex set an ege set by V(G an E(G, respectively. The (open neighborhoo N(v of a vertex v V(G istheset{u {u,v} E(G}. The egree of v V(G is N(v an enote by eg G (v. The close neighborhoo N[v]ofavertexv V(Gistheset{v} N(v. For a subset S V(G, we efine its close neighborhoo as N[S ] = v S N[v]. The subgraph inuce by S V(G is enote by G[S ]. The istance between u,v V(G, enote ist(u,v, is the length of a shortest u v path in G. The Cartesian prouct of graphs G an H, enote G H, is the graph with the vertex set V(G V(H an the ege set {{(g, h, (g, h } g V(G, {h, h } E(H} {{(g, h, (g, h} h V(H, {g, g } E(G}. Theth Cartesian power of a graph G, enote G, is efine as G 1 = G an G = G G 1 for 2. The Hamming graph K k is the th Cartesian power of the complete graph K k for some an k. The-imensional hypercube Q is the th Cartesian power of K 2 ; that is, Q = K 2. Let G be a graph. A non-empty set S V(G isa efensive alliance if for each s S, N[s] S N[s] \ S. The efensive alliance number a(g ofg is the size of a smallest efensive alliance of G. A non-empty set S V(G is a secure set if for each X S, N[X] S N[X]\S (see Copyright c 2015 The Institute of Electronics, Information an Communication Engineers
4 AMANO et al.: SECURE SETS AND DEFENSIVE ALLIANCES 487 [1]. The security number s(g ofg is the size of a smallest secure set of G. Clearly, a(g s(g for any graph G. 3. A Faster Fixe-Parameter Algorithm for Secure Sets Recall that the running time of the algorithm by Enciso an Dutton [7] is O(2 k log 2k n, where n is the number of vertices of G. Here we present an improve O(2 3k k 2 n-time algorithm. Theorem 3.1. The problem of eciing whether s(g k can be solve in time O(2 3k k 2 n. Proof. For any S V(G, the following claims follows from the efinitions (see [7]: Claim 3.2. If N[S ] > 2k, then there is no secure set S that satisfies S S an S k. Claim 3.3. If S S is a minimal secure set, then there is a vertex u S \ S such that u N[S ] \ S. Now we escribe our algorithm. See Algorithm 1. We first guess a vertex v V(G, an call Fin({v}, to fin a secure set containing v. ForS V(G an F N[S ]\S,the proceure Fin(S, F fins a secure set S of size at most k such that S S an F S =. IfS itself is secure, then Fin(S, F outputs S an stops. Assume S is not secure an there is a minimal secure set S S with S kan S F =. Clearly, S < k. Since F N[S ] \ S,wehave F S k. By Claim 3.2, N[S ] 2k. Hence, if not all the conitions are satisfie, then there is no such S. If all the conitions are satisfie, the proceure recursively fins such S. If S exists, then there is a vertex u S \ S such that u N[S ] \ (S F by Claim 3.3. Moreover, if u N[S ] \ (S F, then either u S \ S or u N[S ] \ S hols. We a u into S in the former case an into F in the latter case. To check both cases, we call Fin(S {u}, F an Fin(S, F {u}. Algorithm 1 Fin a secure set of G with size at most k. 1: for all v V(G o 2: Fin({v}, 3: proceure Fin(S, F 4: if Secure(S then 5: Output S, an stop. 6: if S < k an F kan N[S ] 2kthen 7: u := a vertex in N[S ] \ (S F 8: Fin(S {u}, F 9: Fin(S, F {u} 10: proceure Secure(S 11: for all X S o 12: if N[X] S < N[X] \ S then 13: return false 14: return true Next we show the running time. We first have n branches corresponing to the calls of Fin({v}, for all v V(G. Each call of Fin(S, F has no or two branches that correspon to the calls of Fin(S {u}, F an Fin(S, F {u} if S < k, F k, an N[S ] 2k. Therefore, the search-tree has epth at most 2k in which the root has n chilren, an other inner noes have two chilren for each. Thus it has at most 1 + n 2k 1 2i 2 2k n noes. Since the algorithm takes O(2 k k 2 time for checking whether S is secure for each noe of the search-tree, the total running time is O(2 3k k 2 n. 4. Improve Bouns for Hypercubes 4.1 Defensive Alliances in Hypercubes The efensive alliance partition number of G, ψ a (G, is efine to be the maximum number of sets in a partition of V(G such that each set is a efensive alliance [14]. Eroh an Gera [8] showe that ψ a (Q 2 /2, an aske whether the boun is tight. In this section, we first answer the question affirmatively. We then generalize the result to show similar results for Hamming graphs. The first result is an almost irect consequence of the following beautiful proposition. Proposition 4.1 (Chung, Fürei, Graham, an Seymour [2]. If G is a subgraph of a hypercube with average egree s, then V(G 2 s. Theorem 4.2. For any, a(q = 2 /2. Proof. Eroh an Gera [8] showe that a(q 2 /2. Thus we only show the lower boun. Let S be a efensive alliance of Q an v S. Since N[v] S N[v]\S an = N[v] S + N[v]\S 1, it follows that eg Q [S ](v = N[v] S 1 ( 1/2 = /2. Hence the average egree of Q [S ]is at least /2. Now, by Proposition 4.1, S 2 /2. The theorem above implies that ψ a (Q 2 /2 /2 = 2 /2. Combining this fact with the lower boun of Eroh an Gera [8], we have the following answer. Corollary 4.3. For any, ψ a (Q = 2 /2. Now we generalize the result. For Hamming graphs, the following fact is known. Proposition 4.4 (Squier, Torrence, an Vogt [17]. If G is a subgraph of K k with n vertices an m eges, then 2m (k 1n log k n. The proposition above can be seen as a generalization of Proposition 4.1. Corollary 4.5. If G is a subgraph of K k with average egree s, then V(G k s/(k 1. Proof. Assume that G has n vertices an m eges. Then s = 2m/n. By Proposition 4.4, 2m (k 1n log k n. Diviing each sie by (k 1n, we obtain s/(k 1 log k n. This implies k s/(k 1 n.
5 488 Theorem 4.6. For any an k, k /2 a(k k k /2. Proof. First observe that K k is (k 1-regular. To show the upper boun, take a subgraph isomorphic to K /2 k. Each vertex in the subgraph has (k 1 /2 neighbors in the subgraph, an (k 1 /2 neighbors outsie of the subgraph. Thus the vertex set of the subgraph, which is of size k /2, is a efensive alliance. Let S be a efensive alliance of K k.bythesameway as the one in the proof of Theorem 4.2, we can show that the egree of v S is at least (k 1/2. By Corollary 4.5, S k (k 1/2 /(k 1 k /2. Corollary 4.7. For any an k, k /2 ψ a (K k k /2. Proof. The upper boun ψ a (K k k /2 immeiately follows from the lower boun a(k k k /2 in Theorem 4.6, because ψ a (G V(G /a(g for any graph G. The lower boun ψ a (K k k /2 follows from the construction of size k /2 efensive alliances in the proof of Theorem 4.6. The vertices with fixe first /2 coorinates inuce K /2 k. Thus we can partition K k into k /2 isomorphic copies of K /2 k. 4.2 Secure Sets of Hypercubes Petrie [16] showe that 2 /2 s(q 2 1, an aske whether the bouns can be improve. In this section we present an improve lower boun on s(q which is roughly We only use the simple fact that S is not secure if S < N[S ] \ S. Harper [11] showe that the breath-first search orering gives sets S that minimize N[S ] \ S. Using this result, we show that S < N[S ] \ S for any S V(Q with 1 S ( ( 2/3 i. The following proposition follows from Program an Theorem 1 in Harper s paper [11]. Proposition 4.8 (Harper [11]. For any positive integer k 2, there exist a set S V(Q, a vertex u 0 V(Q, an an integer r, such that S = k, N[S ] \ S = min T V(Q, T =k N[T] \ T, an {v ist(u 0,v r} S {v ist(u 0,v r + 1}. Theorem 4.9. For 2, it hols that s(q > ( 2/3 ( i. Proof. First, we show a property of a partial sum over binomial coefficients. Claim For 2, ( r ( i < r+1 for r ( 2/3. We prove the claim by inuction on r. The case of r = 0 clearly hols. Assume ( r 1 ( i < r for some r with 1 r ( 2/3. The assumption r ( 2/3 implies r + 1 2r 1. Therefore, it hols that ( r 1 i < 1 2r 1 = r r + 1 r + 1 1, ( r which implies that r 1 ( < i IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 2015 ( ( ( r r r = r + 1 (. r Thus we have ( r ( i < r+1. Next, by using Proposition 4.8 an Claim 4.10, we can show the following. Claim For any subset S V(Q, if S, then N[S ] \ S > S. ( 2/3 ( i To prove the claim, let k ( ( 2/3 i.lets, u0, an r be the set, the vertex, an the integer in Proposition 4.8, respectively. Recall that {v ist(u 0,v = i} = ( i. Obviously, r ( 2/3. Hence, by Claim 4.10, we have ( r ( i < ( r+1.ifk = r i, then S = {v ist(u0,v r} an N[S ] \ S = {v ist(u 0,v = r + 1}. Thus, the claim hols in this case. In the following, we will focus on the case where k > ( r i. In this case, it hols that r ( 2/3 1 ( 5/3. Let S i S, ist(u 0,v = i}. Clearly, S = S r+1 + r = {v v ( ( < S r+1 +. (1 i r + 1 Let i = (N[S ] \ S {v ist(u 0,v = i}. Then N[S ] \ S = r+1 + r+2. Since S r is exactly the set {v ist(u 0,v = r}, it follows r+1 = ( r+1 Sr+1. Therefore, by (1, S < r S r+1. Now it suffices to show that 2 S r+1 r+2. For any v S r+1, N[v] r+2 = r 1. On the other han, for any v r+2, N[v] S r+1 r + 2. Thus, if F is the set of eges between S r+1 an r+2, then ( r 1 S r+1 = F (r + 2 r+2, which implies (( r 1/(r + 2 S r+1 r+2. Since r ( 5/3 means 2 ( r 1/(r+2, we have 2 S r+1 r+2. Claim 4.11 implies that there is no secure set of size at most ( ( 2/3 i. Therefore, the theorem follows. To see that the lower boun above is a significant improvement, we now show that ( ( 2/3 i > for large enough. (An explicit lower boun will be given in the proof. To this en, we nee the following lower boun of binomial coefficients. Proposition 4.12 (Mitzenmacher an Upfal [15, Corollary 9.3]. For 0 q 1/2, ( 2 H(q q + 1, where H(q is the binary entropy function H(q = q lg q (1 qlg(1 q. Corollary s(q > for large enough.
6 AMANO et al.: SECURE SETS AND DEFENSIVE ALLIANCES 489 Proof. We prove the statement for 652. By Theorem 4.9, it suffices to show that ( ( 2/3 > for 652. Observe that ( 5/3 > 0.33 since > 500, an hence ( ( ( > ( 2/3 ( 5/ , where the last inequality follows from Proposition 4.12 an the fact that H(0.33 > Thus ( ( 2/3 + 1 > It ( is easy to verify that 1.01 > + 1for 652. Hence ( 2/3 > In a similar way, one can show that for any ɛ>0, there is an integer 0 such that for 0, s(q > 2 (H(1/3 ɛ. Note that we nee ifferent argument to show a significantly better lower boun since H(1/3 = <0.92. [15] M. Mitzenmacher an E. Upfal, Probability an computing: Ranomize algorithms an probabilistic analysis, Cambrige University Press, [16] C. Petrie, (F, I-security in graphs, Discrete Appl. Math., vol.162, pp , [17] R. Squier, B. Torrence, an A. Vogt, The number of eges in a subgraph of a Hamming graph, Appl. Math. Lett., vol.14, pp , Kazuyuki Amano receive his M.E. an D.E. egrees in information sciences from Tohoku University in 1993 an 1996, respectively. Presently, he is a professor in Department of Computer Science, Gunma University, Kiryu, Japan. His research interests inclue the theory of computation an combinatorics. Acknowlegments This research was partially supporte by JSPS KAKENHI Grant Numbers , , , an by MEXT KAKENHI Grant Numbers , References [1] R.C. Brigham, R.D. Dutton, an S.T. Heetniemi, Security in graphs, Discrete Appl. Math., vol.155, pp , [2] F.R.K. Chung, Z. Fürei, R.L. Graham, an P.D. Seymour, On inuce subgraphs of the cube, J. Comb. Theory, Ser. A, vol.49, pp , [3] R.D. Dutton, The evolution of a har graph theory problem secure sets, A course material of COT 6410: Computational Complexity, University of Central Floria, Available at [4] R.D. Dutton, On a graph s security number, Discrete Math., vol.309, pp , [5] R.D. Dutton, R. Lee, an R.C. Brigham, Bouns on a graph s security number, Discrete Appl. Math., vol.156, pp , [6] R.I. Enciso an R.D. Dutton, Algorithms for efensive alliance problems, Available at renciso/da.pf [7] R.I. Enciso an R.D. Dutton, Parameterize complexity of secure sets, Congr. Numer., vol.189, pp , [8] L. Eroh an R. Gera, Alliance partition number in graphs, Ars Comb., vol.103, pp , [9] H. Fernau an D. Raible, Alliances in graphs: A complexitytheoretic stuy, SOFSEM (2, pp.61 70, [10] G.H. Fricke, L.M. Lawson, T.W. Haynes, S.M. Heetniemi, an S.T. Heetniemi, A note on efensive alliances in graphs, Bull. Inst. Combin. Appl., vol.38, pp.37 41, [11] L.H. Harper, Optimal numberings an isoperimetric problems on graphs, J. Combin. Theory, vol.1, pp , [12] G. Isaak, P. Johnson, an C. Petrie, Integer an fractional security in graphs, Discrete Appl. Math., vol.160, pp , [13] L.H. Jamieson, S.T. Heetniemi, an A.A. McRae, The algorithmic complexity of alliances in graphs, J. Combin. Math. Combin. Comput., vol.68, pp , [14] P. Kristiansen, S.M. Heetniemi, an S.T. Heetniemi, Alliances in graphs, J. Combin. Math. Combin. Comput., vol.48, pp , Kyaw May Oo receive her B.Sc. in Mathematics from Yangon University; M.I.Sc. from Institute of Computer Science an Technology (ICST; an Ph.D. in Information Science from University of Computer Stuies, Yangon (UCSY, Myanmar in 1994, 1996, an 2007 respectively. Currently, she is an associate professor in the Department of Computational Mathematics, UCSY, Myanmar. Her research interests inclue graph theory, an ata mining. Yota Otachi is an assistant professor of Japan Avance Institute of Science an Technology. He receive B.E., M.E., an Ph.D. egrees from Gunma University in 2005, 2007, an 2010, respectively. His research interests inclue graph algorithms, graph theory, an complexity theory. Ryuhei Uehara receive B.E., M.E., an Ph.D. egrees from the University of Electro- Communications, Japan, in 1989, 1991, an 1998, respectively. He was a researcher in CANON Inc. uring In 1993, he joine Tokyo Woman s Christian University as an assistant professor. He was a lecturer uring , an an associate professor uring at Komazawa University. He move to Japan Avance Institute of Science an Technology (JAIST in 2004 as an associate professor, an since 2011, he has been a professor in School of Information Science. His research interests inclue computational complexity, algorithms, an ata structures, especially, ranomize algorithms, approximation algorithms, graph algorithms, an algorithmic graph theory. He is a member of EATCS, ACM, an IEEE.
Ramsey numbers of some bipartite graphs versus complete graphs
Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationChromatic number for a generalization of Cartesian product graphs
Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional
More informationThe chromatic number of graph powers
Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department
More informationCombinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25
Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationLecture 5. Symmetric Shearer s Lemma
Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationAsymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs
Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the
More informationAcute sets in Euclidean spaces
Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of
More informationThe Study of Secure-dominating Set of Graph Products
The Study of Secure-dominating Set of Graph Products Hung-Ming Chang Department of Mathematics National Kaohsiung Normal University Advisor: Hsin-Hao Lai August, 014 Outline 1 Introduction Preliminary
More informationTwo formulas for the Euler ϕ-function
Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,
More informationTOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH
English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We
More information6 General properties of an autonomous system of two first order ODE
6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More informationREVISTA INVESTIGACIÓN OPERACIONAL VOL. 37, NO. 2, , 2016
REVISTA INVESTIGACIÓN OPERACIONAL VOL. 37, NO., 115-13, 016 COMPUTING THE STRONG ALLIANCE POLYNOMIAL OF A GRAPH W. Carballosa,, J. C. Hernández-Gómez,, O. Rosario, and Y. Torres-Nuñez, Cátedra CONACYT,
More informationDiscrete Mathematics
Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner
More informationOn Pathos Lict Subdivision of a Tree
International J.Math. Combin. Vol.4 (010), 100-107 On Pathos Lict Subivision of a Tree Keerthi G.Mirajkar an Iramma M.Kaakol (Department of Mathematics, Karnatak Arts College, Dharwa-580 001, Karnataka,
More informationExact distance graphs of product graphs
Exact istance graphs of prouct graphs Boštjan Brešar a,b Nicolas Gastineau c Sani Klavžar a,b, Olivier Togni c August 31, 2018 a Faculty of Natural Sciences an Mathematics, University of Maribor, Slovenia
More informationProof of SPNs as Mixture of Trees
A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a
More informationA Sketch of Menshikov s Theorem
A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p
More informationOn the minimum distance of elliptic curve codes
On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of
More informationSharp Thresholds. Zachary Hamaker. March 15, 2010
Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior
More informationLeaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes
Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,
More informationA new proof of the sharpness of the phase transition for Bernoulli percolation on Z d
A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition
More informationOn colour-blind distinguishing colour pallets in regular graphs
J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article
More informationA Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential
Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix
More information12.11 Laplace s Equation in Cylindrical and
SEC. 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential 593 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential One of the most important PDEs in physics an engineering
More informationUpper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials
Upper an Lower Bouns on ε-approximate Degree of AND n an OR n Using Chebyshev Polynomials Mrinalkanti Ghosh, Rachit Nimavat December 11, 016 1 Introuction The notion of approximate egree was first introuce
More informationLecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012
CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration
More informationArticle On the Additively Weighted Harary Index of Some Composite Graphs
mathematics Article On the Aitively Weighte Harary Inex of Some Composite Graphs Behrooz Khosravi * an Elnaz Ramezani Department of Pure Mathematics, Faculty of Mathematics an Computer Science, Amirkabir
More informationPermanent vs. Determinant
Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an
More informationarxiv: v1 [math.co] 15 Sep 2015
Circular coloring of signe graphs Yingli Kang, Eckhar Steffen arxiv:1509.04488v1 [math.co] 15 Sep 015 Abstract Let k, ( k) be two positive integers. We generalize the well stuie notions of (k, )-colorings
More informationPerfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs
Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite
More informationHilbert functions and Betti numbers of reverse lexicographic ideals in the exterior algebra
Turk J Math 36 (2012), 366 375. c TÜBİTAK oi:10.3906/mat-1102-21 Hilbert functions an Betti numbers of reverse lexicographic ieals in the exterior algebra Marilena Crupi, Carmela Ferró Abstract Let K be
More informationDiophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations
Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything
More informationarxiv: v1 [math.co] 13 Dec 2017
The List Linear Arboricity of Graphs arxiv:7.05006v [math.co] 3 Dec 07 Ringi Kim Department of Mathematical Sciences KAIST Daejeon South Korea 344 an Luke Postle Department of Combinatorics an Optimization
More informationNEERAJ KUMAR AND K. SENTHIL KUMAR. 1. Introduction. Theorem 1 motivate us to ask the following:
NOTE ON VANISHING POWER SUMS OF ROOTS OF UNITY NEERAJ KUMAR AND K. SENTHIL KUMAR Abstract. For xe positive integers m an l, we give a complete list of integers n for which their exist mth complex roots
More informationLecture 22. Lecturer: Michel X. Goemans Scribe: Alantha Newman (2004), Ankur Moitra (2009)
8.438 Avance Combinatorial Optimization Lecture Lecturer: Michel X. Goemans Scribe: Alantha Newman (004), Ankur Moitra (009) MultiFlows an Disjoint Paths Here we will survey a number of variants of isjoint
More informationIMFM Institute of Mathematics, Physics and Mechanics Jadranska 19, 1000 Ljubljana, Slovenia. Preprint series Vol. 50 (2012), 1173 ISSN
IMFM Institute of Mathematics, Physics an Mechanics Jaransa 19, 1000 Ljubljana, Slovenia Preprint series Vol. 50 (2012), 1173 ISSN 2232-2094 PARITY INDEX OF BINARY WORDS AND POWERS OF PRIME WORDS Alesanar
More informationd-dimensional Arrangement Revisited
-Dimensional Arrangement Revisite Daniel Rotter Jens Vygen Research Institute for Discrete Mathematics University of Bonn Revise version: April 5, 013 Abstract We revisit the -imensional arrangement problem
More informationSimilar Operators and a Functional Calculus for the First-Order Linear Differential Operator
Avances in Applie Mathematics, 9 47 999 Article ID aama.998.067, available online at http: www.iealibrary.com on Similar Operators an a Functional Calculus for the First-Orer Linear Differential Operator
More informationA note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz
A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae
More informationIterated Point-Line Configurations Grow Doubly-Exponentially
Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection
More informationarxiv: v1 [math.co] 29 May 2009
arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER. Włodzimierz Ulatowski
Opuscula Math. 33, no. 4 (2013), 763 783 http://dx.doi.org/10.7494/opmath.2013.33.4.763 Opuscula Mathematica ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER Włodzimierz Ulatowski Communicated
More informationInternational Journal of Pure and Applied Mathematics Volume 35 No , ON PYTHAGOREAN QUADRUPLES Edray Goins 1, Alain Togbé 2
International Journal of Pure an Applie Mathematics Volume 35 No. 3 007, 365-374 ON PYTHAGOREAN QUADRUPLES Eray Goins 1, Alain Togbé 1 Department of Mathematics Purue University 150 North University Street,
More informationUnit vectors with non-negative inner products
Unit vectors with non-negative inner proucts Bos, A.; Seiel, J.J. Publishe: 01/01/1980 Document Version Publisher s PDF, also known as Version of Recor (inclues final page, issue an volume numbers) Please
More informationNOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,
NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which
More informationA PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks
A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,
More informationOn the number of isolated eigenvalues of a pair of particles in a quantum wire
On the number of isolate eigenvalues of a pair of particles in a quantum wire arxiv:1812.11804v1 [math-ph] 31 Dec 2018 Joachim Kerner 1 Department of Mathematics an Computer Science FernUniversität in
More informationThe planar Chain Rule and the Differential Equation for the planar Logarithms
arxiv:math/0502377v1 [math.ra] 17 Feb 2005 The planar Chain Rule an the Differential Equation for the planar Logarithms L. Gerritzen (29.09.2004) Abstract A planar monomial is by efinition an isomorphism
More informationLecture notes on Witt vectors
Lecture notes on Witt vectors Lars Hesselholt The purpose of these notes is to give a self-containe introuction to Witt vectors. We cover both the classical p-typical Witt vectors of Teichmüller an Witt
More informationThe eccentric-distance sum of some graphs
Electronic Journal of Graph Theory an Applications 5 (1) (017), 51 6 The eccentric-istance sum of some graphs Pamapriya P., Veena Matha Department of Stuies in Mathematics University of Mysore, Manasagangotri
More informationarxiv: v1 [math.co] 27 Nov 2018
FURTHER RESULTS ON THE INDUCIBILITY OF -ARY TREES AUDACE A. V. DOSSOU-OLORY AND STEPHAN WAGNER arxiv:1811.11235v1 [math.co] 27 Nov 2018 Abstract. For a -ary tree every vertex has outegree between 2 an
More informationAttribute Reduction and Information Granularity *
ttribute Reuction an nformation Granularity * Li-hong Wang School of Computer Engineering an Science, Shanghai University, Shanghai, 200072, P.R.C School of Computer Science an Technology, Yantai University,
More informationLecture 2 Lagrangian formulation of classical mechanics Mechanics
Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,
More informationTractability results for weighted Banach spaces of smooth functions
Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March
More informationFLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction
FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number
More informationAn Improved Algorithm for Parameterized Edge Dominating Set Problem
An Improved Algorithm for Parameterized Edge Dominating Set Problem Ken Iwaide and Hiroshi Nagamochi Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan,
More informationRegular tree languages definable in FO and in FO mod
Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over
More informationLarge Triangles in the d-dimensional Unit-Cube (Extended Abstract)
Large Triangles in the -Dimensional Unit-Cube Extene Abstract) Hanno Lefmann Fakultät für Informatik, TU Chemnitz, D-0907 Chemnitz, Germany lefmann@informatik.tu-chemnitz.e Abstract. We consier a variant
More informationON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2. Bert L. Hartnell
Discussiones Mathematicae Graph Theory 24 (2004 ) 389 402 ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2 Bert L. Hartnell Saint Mary s University Halifax, Nova Scotia, Canada B3H 3C3 e-mail: bert.hartnell@smu.ca
More informationGLOBAL MINUS DOMINATION IN GRAPHS. Communicated by Manouchehr Zaker. 1. Introduction
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 2 (2014), pp. 35-44. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir GLOBAL MINUS DOMINATION IN
More informationEquilibrium in Queues Under Unknown Service Times and Service Value
University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University
More informationOne-dimensional I test and direction vector I test with array references by induction variable
Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationDECOMPOSITION OF POLYNOMIALS AND APPROXIMATE ROOTS
DECOMPOSITION OF POLYNOMIALS AND APPROXIMATE ROOTS ARNAUD BODIN Abstract. We state a kin of Eucliian ivision theorem: given a polynomial P (x) an a ivisor of the egree of P, there exist polynomials h(x),
More informationRobustness and Perturbations of Minimal Bases
Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important
More informationarxiv: v4 [math.pr] 27 Jul 2016
The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,
More informationCMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing
CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)
More informationNotes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk
Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie
More informationCHARACTERIZATION OF PSL(3,Q) BY NSE
CHARACTERIZATION OF PSL(,Q) BY NSE S. ASGARY an N. AHANJIDEH Communicate by Alexanru Buium Let G be a group an π e(g) be the set of element orers of G. Suppose that k π e(g) an m k is the number of elements
More informationAnti-Slide. Regular Paper. Kazuyuki Amano 1,a) Shin-ichi Nakano 1,b) Koichi Yamazaki 1,c) 1. Introduction
[DOI: 10.2197/ipsjjip.23.252] Regular Paper Anti-Slide Kazuyuki Amano 1,a) Shin-ichi Nakano 1,b) Koichi Yamazaki 1,c) Received: July 31, 2014, Accepted: January 7, 2015 Abstract: The anti-slide packing
More informationThe Wiener Index of Trees with Prescribed Diameter
011 1 15 4 ± Dec., 011 Operations Research Transactions Vol.15 No.4 The Wiener Inex of Trees with Prescribe Diameter XING Baohua 1 CAI Gaixiang 1 Abstract The Wiener inex W(G) of a graph G is efine as
More information7.1 Support Vector Machine
67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to
More informationOn the enumeration of partitions with summands in arithmetic progression
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics
More informationOn the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The
More informationLinear Algebra- Review And Beyond. Lecture 3
Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the
More informationMcMaster University. Advanced Optimization Laboratory. Title: The Central Path Visits all the Vertices of the Klee-Minty Cube.
McMaster University Avance Optimization Laboratory Title: The Central Path Visits all the Vertices of the Klee-Minty Cube Authors: Antoine Deza, Eissa Nematollahi, Reza Peyghami an Tamás Terlaky AvOl-Report
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationTHE EXPLICIT EXPRESSION OF THE DRAZIN INVERSE OF SUMS OF TWO MATRICES AND ITS APPLICATION
italian journal of pure an applie mathematics n 33 04 (45 6) 45 THE EXPLICIT EXPRESSION OF THE DRAZIN INVERSE OF SUMS OF TWO MATRICES AND ITS APPLICATION Xiaoji Liu Liang Xu College of Science Guangxi
More informationSummary: Differentiation
Techniques of Differentiation. Inverse Trigonometric functions The basic formulas (available in MF5 are: Summary: Differentiation ( sin ( cos The basic formula can be generalize as follows: Note: ( sin
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this
More informationHomotopy colimits in model categories. Marc Stephan
Homotopy colimits in moel categories Marc Stephan July 13, 2009 1 Introuction In [1], Dwyer an Spalinski construct the so-calle homotopy pushout functor, motivate by the following observation. In the category
More informationLEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS
Ann. Sci. Math. Québec 33 (2009), no 2, 115 123 LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS TAKASHI AGOH Deicate to Paulo Ribenboim on the occasion of his 80th birthay. RÉSUMÉ.
More informationWitt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]
Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states
More informationEstimation of the Maximum Domination Value in Multi-Dimensional Data Sets
Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.
More informationSecure Connected Domination in a Graph
International Journal of Mathematical Analysis Vol. 8, 2014, no. 42, 2065-2074 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.47221 Secure Connected Domination in a Graph Amerkhan G.
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationChapter 2 Derivatives
Chapter Derivatives Section. An Intuitive Introuction to Derivatives Consier a function: Slope function: Derivative, f ' For each, the slope of f is the height of f ' Where f has a horizontal tangent line,
More informationarxiv: v2 [math.pr] 27 Nov 2018
Range an spee of rotor wals on trees arxiv:15.57v [math.pr] 7 Nov 1 Wilfrie Huss an Ecaterina Sava-Huss November, 1 Abstract We prove a law of large numbers for the range of rotor wals with ranom initial
More informationApplied Mathematics Letters
Applied Mathematics Letters 23 (2010) 1295 1300 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: www.elsevier.com/locate/aml The Roman domatic number of a graph S.M.
More informationA Path Planning Method Using Cubic Spiral with Curvature Constraint
A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw
More informationACTIONS IN MODIFIED CATEGORIES OF INTEREST WITH APPLICATION TO CROSSED MODULES Dedicated to Teimuraz Pirashvili on his 60th birthday
Theory an Applications of Categories, Vol. 30, No. 25, 2015, pp. 882 908. ACTIONS IN MODIFIED CATEGORIES OF INTEREST WITH APPLICATION TO CROSSED MODULES Deicate to Teimuraz Pirashvili on his 60th birthay
More informationTechnion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.
Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion
More informationAnalogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph
Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More information