Math.Subj.Class.(2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A 15.

Size: px
Start display at page:

Download "Math.Subj.Class.(2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A 15."

Transcription

1 UNIVERSITY OF LJUBLJANA INSTITUTE OF MATHEMATICS, PHYSICS AND MECHANICS DEPARTMENT OF THEORETICAL COMPUTER SCIENCE JADRANSKA 19, LJUBLJANA, SLOVENIA Preprint series, Vol. 40 (2002), 799 GENERALIZED CORES Vladimir Batagelj, Matjaž Zaveršnik ISSN First version: November 24, 2001 Math.Subj.Class.(2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A 15. Presented at Recent Trends in Graph Theory, Algebraic Combinatorics, and Graph Algorithms; September 24 27, 2001, Bled, Slovenia, Supported by the Ministry of Education, Science and Sport of Slovenia, Project J Ljubljana, December 29, 2001

2

3 Generalized Cores Vladimir Batagelj, Matjaž Zaveršnik University of Ljubljana, FMF, Department of Mathematics, and IMFM Ljubljana, Department of TCS, Jadranska ulica 19, Ljubljana, Slovenia vladimir.batagelj@uni-lj.si matjaz.zaversnik@fmf.unilj.si Abstract Cores are, besides connectivity components, one among few concepts that provides us with efficient decompositions of large graphs and networks. In the paper a generalization of the notion of core of a graph based on vertex property function is presented. It is shown that for the local monotone vertex property functions the corresponding cores can be determined in time. Key words: generalized cores, large networks, decomposition, algorithm. Math. Subj. Class. (2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A Cores The notion of core was introduced by Seidman in 1983 [6]. is the set of vertices and $ is the set of lines Let! #"%$'& be a simple graph. (edges or arcs). We will denote ()+*,-* and./0* $ *. A subgraph 12+!34"%$ *,35& induced by the set 376+ is a 8 -core or a core of order 8 iff 9;:=<>3@?BACEDF:G&5HI8 and 1 is a maximum subgraph with this property. The core of maximum order is also called the main core. The core number of vertex : is the highest order of a core that contains this vertex. we also often call it a core. Since the set 3 determines the corresponding core J The degree ACED;:& can be the number of neighbors in an undirected graph or in-degree, out-degree, in-degree K out-degree,... determining different types of cores. The cores have the following important properties:

4 2 L -cores 2 Figure 1: 0, 1, 2 and 3 core M The cores are nested: NPORQSUT 1-V 6W1YX M Cores are not necessarily connected subgraphs. In this paper we present a generalization of the notion of core from degrees to other properties of vertices. 2 Z -cores Let [/+! #"%$\"^] & be a network, where _`!P"%$a& is a graph and ]b?c$ed IR is a function assigning values to lines. A vertex property function on [, or a L function for short, is a function Lf:"hgi&, :j<), gb6k with real values. Examples of vertex property functions: : in graph n, and lm:"hg &ople:&uqrg, gs6k. 1. LUt:"hgi&opACEDGuv:& 2. L;wx:"hgi&o indegu :G& 3. L;yx:"hgi&o outdegu :& 4. Lz{:"hgi&o indegu :G&K outdegu :G& 5. L; x:"hgi&o~}=x ƒ E ubˆ ] :;"^ŠB&, where ]b?{$ed IR Œ 6. L; x:"hgi&opž x x ƒ E ubˆ ] :"^ŠB&, where ]b?c$ed IR 7. L :"hgi&o number of cycles of length 8 through vertex : Let lm:g& denotes the set of neighbors of vertex

5 2 L -cores 3 The subgraph 1 `!34"%$ *,35& induced by the set 3`6k is a L -core at level ã< IR iff M 9;:j< 3b?{ãš=Lf:" 3& M 3 is maximal such set. The function L is monotone iff it has the property 3\t œ 3aw\Tž9 :j<)0? Lf:;" 3\th&vš=Lf:;" 3awŸ&^& All among functions L t LB are monotone. For monotone function the L -core at level can be determined by successively deleting vertices with value of L lower than. 3I? ~ ; while : <)3b?EL :" 35&'O> do 3`? ~3W \ : ; Theorem 1 For monotone function L the above procedure determines the L -core at level. Proof: The set 3 returned by the procedure evidently has the first property from the L -core definition. Let us also show that for monotone L the result of the procedure is independent of the order of deletions. Suppose the contrary there are two different L -cores at level, determined by sets 3 and. The core 3 was produced by deleting the sequence Š#t, Š;w, Š y,..., Š ; and by the sequence :Gt, :xw, :xy,..., :{ª. Assume that «43ž. We will show that this leads to contradiction. Take any =<W «3. To show that it also can be deleted we first apply the sequence : t, : w, : y,..., : ª to get. Since R< _ 3 it appears in the sequence Š t, Š w, Š y,..., ŠB \I. Let g Œ ` and gfx# gfx±²t ³ Š;X. Then, since 9;N <W µ µ L? LfŠ X " gfx±²t¹& O, we have, by monotonicity of L, also 9;N'<e µ µ L=?L ŠBX "! ' º&»gfX¼±²t½& Op. Therefore also all ŠX <¾ ` 3 are deleted ` 3 a contradiction. Since the result of the procedure is uniquely defined and vertices outside 3 have L value lower than, the final set 3 satisfies also the second condition from the definition of L -core it is the L -core at level. À Corolary 1 For monotone function L the cores are nested t OW w T1YÁû6W1¾ÁÅÄ Proof: Follows directly from the theorem 1. Since the result is independent of the order of deletions we first determine the 1)ÁÅÄ. In the following we eventually delete some additional vertices thus producing 1 ÁÃÂ. Therefore 1 Áà6W1 ÁÅÄ. À

6 Ê 2 L -cores 4 Example of nonmonotone L function: where ]s?ó$ed Lf:;"hg &P ÇÇÆ È ÉÇÇ * le:;"hg &E* Ë x ƒ E ubˆ Consider the following L function ] :;"^ŠB& le:;"hg &P ÌxÍ%ÎCEÏ%Ð\Ñ Ò%C IR Œ on the network [/`!P"%$ "^] &,bs Ô;"¹ÕŸ"%ÖŸ"% "¹Øx"¹Ù, $ ÅÔ?cÕE&ÚÛÕ»?cÖ&ÚÅÖ»?Ó &ÚÛÕ»?ÓØŸ&ÜÛØi? ÙU& ] Ý Þ Þ We get different results depending on whether we first delete the vertex Õ or Ö (or Ø ) see Figure 2. Figure 2: Nonmonotone L function The original network is a L -core at level 2. Applying the algorithm to the network we have three choices for the first vertex to be deleted: Õ, Ö or Ø. Deleting Õ we get, after removing the isolated vertex Ô, the L -core 3 t ` ÖŸ"% "¹Øx"¹Ù at level 3. Note that the values of L in vertices Ö and Ø increased from 2 to 3.

7 3 Algorithms 5 Deleting Ö (or symmetrically Ø we analyze only the first case) we get the set 34w- Ô;"¹ÕŸ"¹Øx"¹Ù at level 2 the value at Õ increased to 2.5. In the next step we can delete either the vertex Õ, producing the set 3 y»` ŸØx"¹Ù at level 3, or the vertex Ø, producing the L -core 3 z s Ô;"¹Õ at level 4. As we see, the result of the algorithm depends on the order of deletions. The L -core at level 4 is not contained in the L -core at level 3. 3 Algorithms 3.1 Algorithm for ß -core at level à The L function is local iff Lf:"hgi&PRLf:;"%le:;"hg &^& The functions L t L from examples are local; LU is not local for 8áH>Ý. In the following we shall assume also that for the function L there exists a constant L Œ such that 9;:j<)0?hLf:;"¹ {&orl Œ For a local L function an â.~ž UÛã-"%ä ÌxDv( &^& algorithm for determining L -core at level exists (assuming that Lf:;"%le:;" 35&^& can be computed in â ÅACED;åa:&^& ). INPUT: graph ns`! #"%$'& represented by lists of neighbors and ṽ< IR OUTPUT: 3b6k, 3 is a L -core at level 1. 3b? ; 2. for : <) do Lfæ :cç? RLf:;"%le:;" 35&^& ; 3. Õ ŠNèÅ.ºN!( éøôlf:;"ålb& ; 4. while Lfæ ê LëçUO> do begin I? ~3 \ ìê LU ; 4.2. for :j<ylm ê¹l " 35& do begin Lfæ :{ç? RLf:"%lm:" 3&^& ; Š{L; ÓÔc ^Ø éøôl :"ÅLB& ; end; end; The step can often be speeded up by updating the L æ :{ç. This algorithm is straightforwardly extended to produce the hierarchy of L -cores. The hierarchy is determined by the core-number assigned to each vertex the highest level value of L -cores that contain the vertex.

8 Ê 3.2 Determining the hierarchy of L -cores Determining the hierarchy of ß -cores INPUT: graph ns`! #"%$'& represented by lists of neighbors OUTPUT: table Öhê í{ø with core number for each vertex 1. 3b? ; 2. for : <) do Lfæ :cç? RLf:;"%le:;" 35&^& ; 3. Õ ŠNèÅ.ºN!( éøôlf:;"ålb& ; 4. while în cøê Ù#Ûé;ØÔLB&aï do begin I? ~3 \ ìê LU ; 4.2. ÖhêŸí{ØÓæ ìê Lëç? elfæ ìê Lëç ; 4.3. for :j<ylm ê¹l " 35& do begin Lfæ :{ç? pž ^Lfæ ê¹lç!"ålf:"%lm:" 3&^&¹ ; Š{L; ÓÔc ^Ø éøôl :"ÅLB& ; end; end; Let us assume that ð is a maximum time needed for computing the value of Lf:"hgi&, : <>, g_6+. Then the complexity of statements is ñpt^±yò«â ( &fkkâjåð ( &fk âj(iä ÌxDP( &aiâ (¾ó Ž ²Åð "%ä ÌxDo( &^&. Let us now look at the body of the while loop. Since at each repetition of the body the size of the set 3 is decreased by 1 there are at most ( repetitions. Statements 4.1 and 4.2 can be implemented to run in constant time, thus contributing ñ zhô,t zhô w «â ( & to the loop. In all combined repetitions of the while and for loops each line is considered at most once. Therefore the body of the for loop (statements 4.3,1 and 4.3.2) is executed at most. times contributing at most ñfzhô y\k.õóåð K5âjÅä ÌxDa( &^& to the while loop. Often the value Lf:;"%le:;" 35&^& can be updated in constant time ð âj &. Summing up all the contributions we get the total time complexity of the algorithm ñ Wñ t^±y KRñ zhô,t zhô w KRñ zhô y ~â.@óžj ²Åð "%ä ÌxDo( &^&. For a local L function, for which the value of Lf:;"%le:;" 35&^& can be computed in âjåacedóå :&^& ), we have ðs â Ûãj&. The described algorithm is partially implemented in program for large networks analysis Pajek (Slovene word for Spider) for Windows (32 bit) [1]. It is freely available, for noncommercial use, at its homepage: A standalone implementation of the algorithm in C is available at For the property functions Lft L;z a quicker âj.r& core determining algorithm can be developed [4].

9 Ê 4 Example Internet Connections 7 Table 1: L -cores of the Routing Data Network at Different Levels. 8 ( 8 ( Example Internet Connections As an example of application of the proposed algorithm we applied it to the routing data on the Internet network. This network was produced from web scanning data (May 1999) available from It can be obtained also as a Pajek s NET file from It has ö Ý xøg vertices, ùxø öxù arcs (loops were removed), ã@ øg, and average degree is Þ µ Þ. The arcs have as values the number of traceroute paths which contain the arc. Using Pajek implementation of the proposed algorithm on 300 MHz PC we obtained in 3 seconds the LB -cores segmentation presented in Table 1 there are ( ú vertices with L -core number in the interval %ú ±²t "^ ìúç. The program also determined the L² -core number for every vertex. Figure 3 shows a L -core at level of the Internet network every vertex inside this core is visited by at least traceroute paths. In the figure the sizes of circles representing vertices are proportional to (the square roots of) their LU -core numbers. Since the arcs values span from 1 to they can not be displayed directly. We recoded them according to the thresholds ÊxÊxÊ arcs. ócö ú ±²t, 8 "¹ö "¹ÞaµEµEµ. These class numbers are represented by the thickness of the

10 4 Example Internet Connections 8 Figure 3: L -core of the Routing Data Network.

11 5 Conclusions 9 5 Conclusions The cores, because they can be efficiently determined, are one among few concepts that provide us with meaningful decompositions of large networks [5]. We expect that different approaches to the analysis of large networks can be built on this basis. For example, the sequence of vertices in sequential coloring can be determined by descending order of their core numbers (combined with their degrees). We obtain on this basis the following upper bound on the chromatic number of a given graph û º&ašsóK core º& Cores can also be used to localize the search for interesting subnetworks in large networks [3, 2]: M If it exists, a 8 -component is contained in a 8 -core. M If it exists, a 8 -clique is contained in a 8 -core. ü»º&aš core ¾&. Acknowledgment This work was supported by the Ministry of Education, Science and Sport of Slovenia, Project J It is a detailed version of the part of the talk presented at Recent Trends in Graph Theory, Algebraic Combinatorics, and Graph Algorithms, September 24 27, 2001, Bled, Slovenia,

12 REFERENCES 10 References [1] BATAGELJ, V. & MRVAR, A. (1998). Pajek A Program for Large Network Analysis. Connections 21 (2), [2] BATAGELJ, V. & MRVAR, A. (2000). Some Analyses of Erdős Collaboration Graph. Social Networks 22, [3] BATAGELJ, V., MRVAR, A. & ZAVERŠNIK, M. (1999). Partitioning approach to visualization of large graphs. In KRATOCHVÍL, Jan (ed.). Proceedings of 7th International Symposium on Graph Drawing, September 15-19, 1999, Štiřín Castle, Czech Republic. (Lecture notes in computer science, 1731). Berlin [etc.]: Springer, [4] BATAGELJ, V. & ZAVERŠNIK, M. (2001). An â.r& Algorithm for Cores Decomposition of Networks. Manuscript, Submitted. [5] GAREY, M. R. & JOHNSON, D. S. (1979). Computer and intractability. San Francisco: Freeman. [6] SEIDMAN, S. B. (1983). Network structure and minimum degree. Social Networks 5, [7] WASSERMAN, S. & FAUST, K. (1994). Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.

AN ALGORITHM FOR CORES DECOMPOSITION OF NETWORKS

AN ALGORITHM FOR CORES DECOMPOSITION OF NETWORKS UNIVERSITY OF LJUBLJANA INSTITUTE OF MATHEMATICS, PHYSICS AND MECHANICS DEPARTMENT OF THEORETICAL COMPUTER SCIENCE JADRANSKA 19, 1 000 LJUBLJANA, SLOVENIA Preprint series, Vol. 40 (2002), 798 AN ALGORITHM

More information

arxiv:cs/ v1 [cs.ds] 25 Oct 2003

arxiv:cs/ v1 [cs.ds] 25 Oct 2003 arxiv:cs/0310049v1 [cs.ds] 25 Oct 2003 An O(m) Algorithm for Cores Decomposition of Networks Vladimir Batagelj, Matjaž Zaveršnik University of Ljubljana, FMF, Department of Mathematics, and IMFM Ljubljana,

More information

A subquadratic triad census algorithm for large sparse networks with small maximum degree

A subquadratic triad census algorithm for large sparse networks with small maximum degree Social Networks 23 (2001) 237 243 A subquadratic triad census algorithm for large sparse networks with small maximum degree Vladimir Batagelj, Andrej Mrvar Department of Mathematics, University of Ljubljana,

More information

A subquadratic triad census algorithm for large sparse networks with small maximum degree

A subquadratic triad census algorithm for large sparse networks with small maximum degree A subquadratic triad census algorithm for large sparse networks with small maximum degree Vladimir Batagelj and Andrej Mrvar University of Ljubljana Abstract In the paper a subquadratic (O(m), m is the

More information

First Steps to Network Visualization with Pajek

First Steps to Network Visualization with Pajek First Steps to Network Visualization with Pajek Vladimir Batagelj University of Ljubljana Slovenia University of Konstanz, Analysis of Political and Managerial Networks May 1, 00, 16h, room C 44 V. Batagelj:

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

On vertex-coloring edge-weighting of graphs

On vertex-coloring edge-weighting of graphs Front. Math. China DOI 10.1007/s11464-009-0014-8 On vertex-coloring edge-weighting of graphs Hongliang LU 1, Xu YANG 1, Qinglin YU 1,2 1 Center for Combinatorics, Key Laboratory of Pure Mathematics and

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

Math 776 Graph Theory Lecture Note 1 Basic concepts

Math 776 Graph Theory Lecture Note 1 Basic concepts Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 158 (2010) 771 778 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Complexity of the packing coloring problem

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

Adorn. Slab Serif Smooth R E G U LAR. v22622x

Adorn. Slab Serif Smooth R E G U LAR. v22622x s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,

More information

-Colorability of -free Graphs

-Colorability of -free Graphs A B C -Colorability of -free Graphs C. Hoàng J. Sawada X. Shu Abstract A polynomial time algorithm that determines for a fixed integer whether or not a -free graph can be -colored is presented in this

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

Version /10/2015. Type specimen. Bw STRETCH

Version /10/2015. Type specimen. Bw STRETCH Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

On median graphs and median grid graphs

On median graphs and median grid graphs On median graphs and median grid graphs Sandi Klavžar 1 Department of Mathematics, PEF, University of Maribor, Koroška cesta 160, 2000 Maribor, Slovenia e-mail: sandi.klavzar@uni-lj.si Riste Škrekovski

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

arxiv: v1 [math.mg] 8 Aug 2008 M. Cencelj, D. Repovš and M. Skopenkov

arxiv: v1 [math.mg] 8 Aug 2008 M. Cencelj, D. Repovš and M. Skopenkov A SHORT PROOF OF THE TWELVE POINTS THEOREM arxiv:0808.1217v1 [math.mg] 8 Aug 2008 M. Cencelj, D. Repovš and M. Skopenkov Abstract. We present a short elementary proof of the following Twelve Points Theorem:

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

Polynomial-time Algorithm for Determining the Graph Isomorphism

Polynomial-time Algorithm for Determining the Graph Isomorphism American Journal of Information Science and Computer Engineering Vol. 3, No. 6, 2017, pp. 71-76 http://www.aiscience.org/journal/ajisce ISSN: 2381-7488 (Print); ISSN: 2381-7496 (Online) Polynomial-time

More information

The NP-Completeness of Some Edge-Partition Problems

The NP-Completeness of Some Edge-Partition Problems The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006

More information

The b-chromatic number of cubic graphs

The b-chromatic number of cubic graphs The b-chromatic number of cubic graphs Marko Jakovac Faculty of Natural Sciences and Mathematics, University of Maribor Koroška 60, 000 Maribor, Slovenia marko.jakovac@uni-mb.si Sandi Klavžar Faculty of

More information

Laurent Beaudou 1, Sylvain Gravier 1, Sandi Klavžar 2,3,4, Michel

Laurent Beaudou 1, Sylvain Gravier 1, Sandi Klavžar 2,3,4, Michel Laurent Beaudou 1, Sylvain Gravier 1, Sandi Klavžar 2,3,4, Michel Mollard 1, Matjaž Kovše 2,4, 1 Institut Fourier - ERTé Maths à Modeler, CNRS/Université Joseph Fourier, France 2 IMFM, Slovenia 3 University

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.

More information

124 DISTO pro 4 / pro 4 a-1.0.0zh

124 DISTO pro 4 / pro 4 a-1.0.0zh 0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0

More information

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha

More information

Adorn. Slab Serif BOLD. v x. user s gu ide

Adorn. Slab Serif BOLD. v x. user s gu ide Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions

More information

On competition numbers of complete multipartite graphs with partite sets of equal size. Boram PARK, Suh-Ryung KIM, and Yoshio SANO.

On competition numbers of complete multipartite graphs with partite sets of equal size. Boram PARK, Suh-Ryung KIM, and Yoshio SANO. RIMS-1644 On competition numbers of complete multipartite graphs with partite sets of equal size By Boram PARK, Suh-Ryung KIM, and Yoshio SANO October 2008 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Colorability in Orthogonal Graph Drawing

Colorability in Orthogonal Graph Drawing Colorability in Orthogonal Graph Drawing Jan Štola Department of Applied Mathematics, Charles University Malostranské nám. 25, Prague, Czech Republic Jan.Stola@mff.cuni.cz Abstract. This paper studies

More information

Schmidt Process can be applied, this means that every nonzero subspace of 8 has an orthonormal basis.

Schmidt Process can be applied, this means that every nonzero subspace of 8 has an orthonormal basis. 8The Gram-Schmidt Process The Gram-Schmidt Process is an algorithm used to convert any basis for a subspace [ of 8 into a new orthogonal basis for [. This orthogonal basis can then be normalized, if desired,

More information

arxiv:cs/ v1 [cs.ds] 20 Feb 2003

arxiv:cs/ v1 [cs.ds] 20 Feb 2003 The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1

More information

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

Cassandra: Distributed Access Control Policies with Tunable Expressiveness Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Math.3336: Discrete Mathematics. Chapter 10 Graph Theory

Math.3336: Discrete Mathematics. Chapter 10 Graph Theory Math.3336: Discrete Mathematics Chapter 10 Graph Theory Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall

More information

A New Game Chromatic Number

A New Game Chromatic Number Europ. J. Combinatorics (1997) 18, 1 9 A New Game Chromatic Number G. C HEN, R. H. S CHELP AND W. E. S HREVE Consider the following two-person game on a graph G. Players I and II move alternatively to

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

Online Scheduling for Sorting Buffers

Online Scheduling for Sorting Buffers Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102

More information

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra

[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph

More information

Minor-monotone crossing number

Minor-monotone crossing number Minor-monotone crossing number Drago Bokal, Gašper Fijavž, Bojan Mohar To cite this version: Drago Bokal, Gašper Fijavž, Bojan Mohar. Minor-monotone crossing number. Stefan Felsner. 2005 European Conference

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

Algorithmic complexity of two defence budget problems

Algorithmic complexity of two defence budget problems 21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

arxiv: v1 [cs.dm] 21 Dec 2015

arxiv: v1 [cs.dm] 21 Dec 2015 The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey

More information

arxiv: v1 [math.co] 5 Nov 2010

arxiv: v1 [math.co] 5 Nov 2010 Segment representation of a subclass of co-planar graphs Mathew C. Francis, Jan Kratochvíl, and Tomáš Vyskočil arxiv:1011.1332v1 [math.co] 5 Nov 2010 Department of Applied Mathematics, Charles University,

More information

On subgraphs of Cartesian product graphs

On subgraphs of Cartesian product graphs On subgraphs of Cartesian product graphs Sandi Klavžar 1 Department of Mathematics, PEF, University of Maribor, Koroška cesta 160, 2000 Maribor, Slovenia sandi.klavzar@uni-lj.si Alenka Lipovec Department

More information

Graphs: Introduction. Ali Shokoufandeh, Department of Computer Science, Drexel University

Graphs: Introduction. Ali Shokoufandeh, Department of Computer Science, Drexel University Graphs: Introduction Ali Shokoufandeh, Department of Computer Science, Drexel University Overview of this talk Introduction: Notations and Definitions Graphs and Modeling Algorithmic Graph Theory and Combinatorial

More information

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on

More information

Triangle Graphs and Simple Trapezoid Graphs

Triangle Graphs and Simple Trapezoid Graphs JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

The crossing number of K 1,4,n

The crossing number of K 1,4,n Discrete Mathematics 308 (2008) 1634 1638 www.elsevier.com/locate/disc The crossing number of K 1,4,n Yuanqiu Huang, Tinglei Zhao Department of Mathematics, Normal University of Hunan, Changsha 410081,

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

How can we lay cable at minimum cost to make every telephone reachable from every other? What is the fastest route between two given cities?

How can we lay cable at minimum cost to make every telephone reachable from every other? What is the fastest route between two given cities? 1 Introduction Graph theory is one of the most in-demand (i.e. profitable) and heavily-studied areas of applied mathematics and theoretical computer science. May graph theory questions are applied in this

More information

European Journal of Combinatorics. Homotopy types of box complexes of chordal graphs

European Journal of Combinatorics. Homotopy types of box complexes of chordal graphs European Journal of Combinatorics 31 (2010) 861 866 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Homotopy types of box complexes

More information

CMPT 470 Based on lecture notes by Woshun Luk

CMPT 470 Based on lecture notes by Woshun Luk * ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM

More information

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Jianping Li Email: jianping@ynu.edu.cn Department of Mathematics Yunnan University, P.R. China 11 / 31 8 ¹ 1 3

More information

COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES

COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES Volume 2, Number 1, Pages 61 66 ISSN 1715-0868 COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES MARCIN KAMIŃSKI AND VADIM LOZIN Abstract. Vertex and edge colorability are two graph problems

More information

Preimages of Small Geometric Cycles

Preimages of Small Geometric Cycles Preimages of Small Geometric Cycles Sally Cockburn Department of Mathematics Hamilton College, Clinton, NY scockbur@hamilton.edu Abstract A graph G is a homomorphic preimage of another graph H, or equivalently

More information

Math 778S Spectral Graph Theory Handout #2: Basic graph theory

Math 778S Spectral Graph Theory Handout #2: Basic graph theory Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible

More information

On Universal Cycles of Labeled Graphs

On Universal Cycles of Labeled Graphs On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

Graph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University

Graph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University Dec. 15 th, Presentation for Final Project Graph Vertex Colorability & the Hardness Mengfei Cao COMP-150 Graph Theory Tufts University Framework In General: Graph-2-colorability is in N Graph-3-colorability

More information

arxiv:math/ v1 [math.co] 20 Nov 2005

arxiv:math/ v1 [math.co] 20 Nov 2005 THE DISTANCE OF A PERMUTATION FROM A SUBGROUP OF S n arxiv:math/0550v [math.co] 20 Nov 2005 RICHARD G.E. PINCH For Bela Bollobas on his 60th birthday Abstract. We show that the problem of computing the

More information

Strengthened Brooks Theorem for digraphs of girth at least three

Strengthened Brooks Theorem for digraphs of girth at least three Strengthened Brooks Theorem for digraphs of girth at least three Ararat Harutyunyan Department of Mathematics Simon Fraser University Burnaby, B.C. V5A 1S6, Canada aha43@sfu.ca Bojan Mohar Department of

More information

Math 414 Lecture 2 Everyone have a laptop?

Math 414 Lecture 2 Everyone have a laptop? Math 44 Lecture 2 Everyone have a laptop? THEOREM. Let v,...,v k be k vectors in an n-dimensional space and A = [v ;...; v k ] v,..., v k independent v,..., v k span the space v,..., v k a basis v,...,

More information

arxiv: v1 [math.co] 7 Dec 2018

arxiv: v1 [math.co] 7 Dec 2018 SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential

More information

Extremal Graph Theory. Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay.

Extremal Graph Theory. Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay. Extremal Graph Theory Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay. Email: aad@cse.iitb.ac.in Basic Question Let H be a fixed graph. What is the maximum number of edges

More information

Bar k-visibility Graphs

Bar k-visibility Graphs Bar k-visibility Graphs Alice M. Dean Department of Mathematics Skidmore College adean@skidmore.edu William Evans Department of Computer Science University of British Columbia will@cs.ubc.ca Ellen Gethner

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

The Tractability of Global Constraints

The Tractability of Global Constraints The Tractability of Global Constraints Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM-CNRS, Montpelier, France. bessiere@lirmm.fr Cork Constraint Computation Center,

More information

Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem

Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Frank Neumann Institut für Informatik und Praktische Mathematik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany fne@informatik.uni-kiel.de

More information

Lecture 6: Graph Properties

Lecture 6: Graph Properties Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

A Graph-Theoretic Network Security Game

A Graph-Theoretic Network Security Game A Graph-Theoretic Network Security Game Marios Mavronicolas Vicky Papadopoulou Anna Philippou Paul Spirakis May 16, 2008 A preliminary version of this work appeared in the Proceedings of the 1st International

More information

The packing chromatic number of infinite product graphs

The packing chromatic number of infinite product graphs The packing chromatic number of infinite product graphs Jiří Fiala a Sandi Klavžar b Bernard Lidický a a Department of Applied Mathematics and Inst. for Theoretical Computer Science (ITI), Charles University,

More information

HoneyBee User s Guide

HoneyBee User s Guide HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is

More information

Graph Theory: Introduction

Graph Theory: Introduction Graph Theory: Introduction Pallab Dasgupta, Professor, Dept. of Computer Sc. and Engineering, IIT Kharagpur pallab@cse.iitkgp.ernet.in Resources Copies of slides available at: http://www.facweb.iitkgp.ernet.in/~pallab

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

On Structural Parameterizations of the Matching Cut Problem

On Structural Parameterizations of the Matching Cut Problem On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,

More information

Lecture Notes on GRAPH THEORY Tero Harju

Lecture Notes on GRAPH THEORY Tero Harju Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................

More information

Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games. 1 Introduction

Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games. 1 Introduction Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games Wayne Goddard School of Geological and Computer Sciences University of Natal, Durban South Africa Grzegorz Kubicki Department of Mathematics

More information

CHAPTER 5. b-colouring of Line Graph and Line Graph of Central Graph

CHAPTER 5. b-colouring of Line Graph and Line Graph of Central Graph CHAPTER 5 b-colouring of Line Graph and Line Graph of Central Graph In this Chapter, the b-chromatic number of L(K 1,n ), L(C n ), L(P n ), L(K m,n ), L(K 1,n,n ), L(F 2,k ), L(B n,n ), L(P m ӨS n ), L[C(K

More information

Characterisation of Restrained Domination Number and Chromatic Number of a Fuzzy Graph

Characterisation of Restrained Domination Number and Chromatic Number of a Fuzzy Graph Characterisation of Restrained Domination Number and Chromatic Number of a Fuzzy Graph 1 J.S.Sathya, 2 S.Vimala 1 Research Scholar, 2 Assistant Professor, Department of Mathematics, Mother Teresa Women

More information

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE

More information