首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A subset S⊆VSV in a graph G=(V,E)G=(V,E) is a [j,k][j,k]-set if, for every vertex v∈V?SvV?S, j≤|N(v)∩S|≤kj|N(v)S|k for non-negative integers jj and kk, that is, every vertex v∈V?SvV?S is adjacent to at least jj but not more than kk vertices in SS. In this paper, we focus on small jj and kk, and relate the concept of [j,k][j,k]-sets to a host of other concepts in domination theory, including perfect domination, efficient domination, nearly perfect sets, 2-packings, and kk-dependent sets. We also determine bounds on the cardinality of minimum [1, 2]-sets, and investigate extremal graphs achieving these bounds. This study has implications for restrained domination as well. Using a result for [1, 3]-sets, we show that, for any grid graph GG, the restrained domination number is equal to the domination number of GG.  相似文献   

2.
A group-word ww is called concise if whenever the set of ww-values in a group GG is finite it always follows that the verbal subgroup w(G)w(G) is finite. More generally, a word ww is said to be concise in a class of groups XX if whenever the set of ww-values is finite for a group G∈XGX, it always follows that w(G)w(G) is finite. P. Hall asked whether every word is concise. Due to Ivanov the answer to this problem is known to be negative. Dan Segal asked whether every word is concise in the class of residually finite groups. In this direction we prove that if ww is a multilinear commutator and qq is a prime-power, then the word wqwq is indeed concise in the class of residually finite groups. Further, we show that in the case where w=γkw=γk the word wqwq is boundedly concise in the class of residually finite groups. It remains unknown whether the word wqwq is actually concise in the class of all groups.  相似文献   

3.
In this paper, we derive mixture representations for the reliability function of the conditional residual lifetime of a coherent system with nn independent and identically distributed (i.i.d.) components under the condition that at least jj and at most k−1k1 (j<kj<k) components have failed by time tt. Based on these mixture representations, we then discuss stochastic comparisons of the conditional residual lifetimes of two coherent systems with independent and identical components.  相似文献   

4.
It is shown that if a sequence of open nn-sets DkDk increases to an open nn-set DD then reflected stable processes in DkDk converge weakly to the reflected stable process in DD for every starting point xx in DD. The same result holds for censored αα-stable processes for every xx in DD if DD and DkDk satisfy the uniform Hardy inequality. Using the method in the proof of the above results, we also prove the weak convergence of reflected Brownian motions in unbounded domains.  相似文献   

5.
6.
A polychromatic     kk-coloring   of a map GG on a surface is a kk-coloring such that each face of GG has all kk colors on its boundary vertices. An even embedding     GG on a surface is a map of a simple graph on the surface such that each face of GG is bounded by a cycle of even length. In this paper, we shall prove that a cubic even embedding GG on the projective plane has a polychromatic proper 4-coloring if and only if GG is not isomorphic to a Möbius ladder with an odd number of rungs. For proving the theorem, we establish a generating theorem for 3-connected Eulerian multi-triangulations on the projective plane.  相似文献   

7.
The kk-domination number   of a graph is the minimum size of a set DD such that every vertex of GG is at distance at most kk from DD. We give a linear-time constant-factor algorithm for approximation of the kk-domination number in classes of graphs with bounded expansion, which include e.g. proper minor-closed graph classes, proper classes closed on topological minors and classes of graphs that can be drawn on a fixed surface with bounded number of crossings on each edge.  相似文献   

8.
A semicomplete multipartite or semicomplete cc-partite digraph DD is a biorientation of a cc-partite graph. A semicomplete multipartite digraph DD is called strongly quasi-Hamiltonian-connected, if for any two distinct vertices xx and yy of DD, there is a path PP from xx to yy such that PP contains at least one vertex from each partite set of DD.  相似文献   

9.
We give a combinatorial proof of the skew version of the K-saturation theorem. More precisely, for any positive integer kk, we give an explicit injection from the set of skew semistandard Young tableaux with skew shape kλ/kμkλ/kμ and type kνkν, to the set of skew semistandard Young tableaux of shape λ/μλ/μ and type νν.  相似文献   

10.
In this note we study distance-regular graphs with a small number of vertices compared to the valency. We show that for a given α>2α>2, there are finitely many distance-regular graphs ΓΓ with valency kk, diameter D≥3D3 and vv vertices satisfying v≤αkvαk unless (D=3D=3 and ΓΓ is imprimitive) or (D=4D=4 and ΓΓ is antipodal and bipartite). We also show, as a consequence of this result, that there are finitely many distance-regular graphs with valency k≥3k3, diameter D≥3D3 and c2≥εkc2εk for a given 0<ε<10<ε<1 unless (D=3D=3 and ΓΓ is imprimitive) or (D=4D=4 and ΓΓ is antipodal and bipartite).  相似文献   

11.
The Feedback Vertex Set problem asks whether a graph contains qq vertices meeting all its cycles. This is not a local property, in the sense that we cannot check if qq vertices meet all cycles by looking only at their neighbors. Dynamic programming algorithms for problems based on non-local properties are usually more complicated. In this paper, given a graph GG of clique-width cwcw and a cwcw-expression of GG, we solve the Minimum Feedback Vertex Set problem in time O(n22O(cwlogcw))O(n22O(cwlogcw)). Our algorithm applies dynamic programming on a so-called kk-module decomposition of a graph, as defined by Rao (2008) [29], which is easily derivable from akk-expression of the graph. The related notion of module-width of a graph is tightly linked to both clique-width and NLC-width, and in this paper we give an alternative equivalent characterization of module-width.  相似文献   

12.
The Longest Previous Factor   array gives, for each position ii in a string yy, the length of the longest factor (substring) of yy that occurs both at ii and to the left of ii in yy. The Longest Previous Factor array is central in many text compression techniques as well as in the most efficient algorithms for detecting motifs and repetitions occurring in a text. Computing the Longest Previous Factor array requires usually the Suffix Array and the Longest Common Prefix array. We give the first time–space optimal algorithm that computes the Longest Previous Factor array, given the Suffix Array and the Longest Common Prefix array. We also give the first linear-time algorithm that computes the permutation that applied to the Longest Common Prefix array produces the Longest Previous Factor array.  相似文献   

13.
14.
Let TT be a tree with ss ends and f,gf,g be continuous maps from TT to TT with f°g=g°ff°g=g°f. In this note we show that if there exists a positive integer m≥2m2 such that gcd(m,l)=1gcd(m,l)=1 for any 2≤l≤s2ls and f,gf,g share a periodic point which is a kmkm-periodic point of ff for some positive integer kk, then the topological entropy of f°gf°g is positive.  相似文献   

15.
Let GG be a group. Any GG-module MM has an algebraic structure called a GG-family of Alexander quandles. Given a 2-cocycle of a cohomology associated with this GG-family, topological invariants of (handlebody) knots in the 3-sphere are defined. We develop a simple algorithm to algebraically construct nn-cocycles of this GG-family from GG-invariant group nn-cocycles of the abelian group MM. We present many examples of 2-cocycles of these GG-families using facts from (modular) invariant theory.  相似文献   

16.
17.
This paper investigates two problems related to the determination of critical edges for the minimum cost assignment problem. Given a complete bipartite balanced graph with nn vertices on each part and with costs on its edges, kkMost Vital Edges Assignment consists of determining a set of kk edges whose removal results in the largest increase in the cost of a minimum cost assignment. A dual problem, Min Edge Blocker Assignment, consists of removing a subset of edges of minimum cardinality such that the cost of a minimum cost assignment in the remaining graph is larger than or equal to a specified threshold. We show that kkMost Vital Edges Assignment is NPNP-hard to approximate within a factor c<2c<2 and Min Edge Blocker Assignment is NPNP-hard to approximate within a factor 1.361.36. We also provide an exact algorithm for kkMost Vital Edges Assignment that runs in O(nk+2)O(nk+2). This algorithm can also be used to solve exactly Min Edge Blocker Assignment.  相似文献   

18.
We show that in a contest with a single prize, the expected effort made by the kkth highest valuation participant bounds the sum of the expected efforts made by all of the participants with valuations less than the kkth highest valuations. We also show that in the limit case of a contest with mm prizes, the expected effort made by the kkth highest valuation participant when the bidders are risk-neutral is greater than the expected effort in the risk-averse case.  相似文献   

19.
Let EE be a real Banach space, CC be a nonempty closed convex subset of EE and T:C→CT:CC be a continuous generalized ΦΦ-pseudocontractive mapping. It is proved that TT has a unique fixed point in CC.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号