首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 993 毫秒
1.
In this paper, the geometric meaning of (α,β)-norms is made clear. On this basis, a new class of Finsler metrics called general (α,β)-metrics are introduced, which are defined by a Riemannian metric and a 1-form. These metrics not only generalize (α,β)-metrics naturally, but also include some metrics structured by R. Bryant. The spray coefficients formula of some kinds of general (α,β)-metrics is given and the projective flatness is also discussed.  相似文献   

2.
Short proofs of the following results concerning a bounded conformal map g of the unit disc D are presented: (1) logg belongs to the Dirichlet space if and only if the Schwarzian derivative Sg of g satisfies Sg(z)(1−2|z|)∈L2(D); (2) loggVMOA if and only if 2|Sg(z)|3(1−2|z|) is a vanishing Carleson measure on D. Analogous results for Besov and Qp,0 spaces are also given.  相似文献   

3.
Pavol Hell 《Discrete Mathematics》2009,309(18):5703-5373
A sequence 〈d1,d2,…,dn〉 of non-negative integers is graphical if it is the degree sequence of some graph, that is, there exists a graph G on n vertices whose ith vertex has degree di, for 1≤in. The notion of a graphical sequence has a natural reformulation and generalization in terms of factors of complete graphs.If H=(V,E) is a graph and g and f are integer-valued functions on the vertex set V, then a (g,f)-factor of H is a subgraph G=(V,F) of H whose degree at each vertex vV lies in the interval [g(v),f(v)]. Thus, a (0,1)-factor is just a matching of H and a (1, 1)-factor is a perfect matching of H. If H is complete then a (g,f)-factor realizes a degree sequence that is consistent with the sequence of intervals 〈[g(v1),f(v1)],[g(v2),f(v2)],…,[g(vn),f(vn)]〉.Graphical sequences have been extensively studied and admit several elegant characterizations. We are interested in extending these characterizations to non-graphical sequences by introducing a natural measure of “near-graphical”. We do this in the context of minimally deficient (g,f)-factors of complete graphs. Our main result is a simple linear-time greedy algorithm for constructing minimally deficient (g,f)-factors in complete graphs that generalizes the method of Hakimi and Havel (for constructing (f,f)-factors in complete graphs, when possible). It has the added advantage of producing a certificate of minimum deficiency (through a generalization of the Erdös-Gallai characterization of (f,f)-factors in complete graphs) at no additional cost.  相似文献   

4.
We describe a connection between the combinatorics of generators for certain groups and the combinatorics of Helly's 1913 theorem on convex sets. We use this connection to prove fixed point theorems for actions of these groups on nonpositively curved metric spaces. These results are encoded in a property that we introduce called “property FAr”, which reduces to Serre's property FA when r=1. The method applies to S-arithmetic groups in higher Q-rank, to simplex reflection groups (including some nonarithmetic ones), and to higher rank Chevalley groups over polynomial and other rings (for example SLn(Z[x1,…,xd]), n>2).  相似文献   

5.
We give explicit constructions of sets S with the property that for each integer k, there are at most g solutions to k=s1+s2,siS; such sets are called Sidon sets if g=2 and generalized Sidon sets if g?3. We extend to generalized Sidon sets the Sidon-set constructions of Singer, Bose, and Ruzsa. We also further optimize Kolountzakis’ idea of interleaving several copies of a Sidon set, extending the improvements of Cilleruelo, Ruzsa and Trujillo, Jia, and Habsieger and Plagne. The resulting constructions yield the largest known generalized Sidon sets in virtually all cases.  相似文献   

6.
S. Mishra  S.B. Rao 《Discrete Mathematics》2006,306(14):1586-1594
In this paper we consider a graph optimization problem called minimum monopoly problem, in which it is required to find a minimum cardinality set SV, such that, for each uV, |N[u]∩S|?|N[u]|/2 in a given graph G=(V,E). We show that this optimization problem does not have a polynomial-time approximation scheme for k-regular graphs (k?5), unless P=NP. We show this by establishing two L-reductions (an approximation preserving reduction) from minimum dominating set problem for k-regular graphs to minimum monopoly problem for 2k-regular graphs and to minimum monopoly problem for (2k-1)-regular graphs, where k?3. We also show that, for tree graphs, a minimum monopoly set can be computed in linear time.  相似文献   

7.
Let G be a graph of order n and S be a vertex set of q vertices. We call G,S-pancyclable, if for every integer i with 3≤iq there exists a cycle C in G such that |V(C)∩S|=i. For any two nonadjacent vertices u,v of S, we say that u,v are of distance two in S, denoted by dS(u,v)=2, if there is a path P in G connecting u and v such that |V(P)∩S|≤3. In this paper, we will prove that if G is 2-connected and for all pairs of vertices u,v of S with dS(u,v)=2, , then there is a cycle in G containing all the vertices of S. Furthermore, if for all pairs of vertices u,v of S with dS(u,v)=2, , then G is S-pancyclable unless the subgraph induced by S is in a class of special graphs. This generalizes a result of Fan [G. Fan, New sufficient conditions for cycles in graphs, J. Combin. Theory B 37 (1984) 221-227] for the case when S=V(G).  相似文献   

8.
In this paper we shall study Hardy spaces of analytic functions in a strip S. Our main result is on one hand an intrinsic characterization of the spaces and on the second that polynomials are dense. We also present an orthogonal (in H2(S)) basis of polynomials.  相似文献   

9.
Let IP(N) stand for an ideal containing finite sets. We discuss various kinds of statistical convergence and I-convergence for sequences of functions with values in R or in a metric space. For real valued measurable functions defined on a measure space (X,M,μ), we obtain a statistical version of the Egorov theorem (when μ(X)<∞). We show that, in its assertion, equi-statistical convergence on a big set cannot be replaced by uniform statistical convergence. Also, we consider statistical convergence in measure and I-convergence in measure, with some consequences of the Riesz theorem. We prove that outer and inner statistical convergences in measure (for sequences of measurable functions) are equivalent if the measure is finite.  相似文献   

10.
Maria Monks 《Discrete Mathematics》2009,309(16):5196-1883
All continuous endomorphisms f of the shift dynamical system S on the 2-adic integers Z2 are induced by some , where n is a positive integer, Bn is the set of n-blocks over {0, 1}, and f(x)=y0y1y2… where for all iN, yi=f(xixi+1xi+n−1). Define D:Z2Z2 to be the endomorphism of S induced by the map {(00,0),(01,1),(10,1),(11,0)} and V:Z2Z2 by V(x)=−1−x. We prove that D, V°D, S, and V°S are conjugate to S and are the only continuous endomorphisms of S whose parity vector function is solenoidal. We investigate the properties of D as a dynamical system, and use D to construct a conjugacy from the 3x+1 function T:Z2Z2 to a parity-neutral dynamical system. We also construct a conjugacy R from D to T. We apply these results to establish that, in order to prove the 3x+1 conjecture, it suffices to show that for any mZ+, there exists some nN such that R−1(m) has binary representation of the form or .  相似文献   

11.
We make some comparisons concerning the induced infinitesimal Kobayashi metric, the induced Siegel metric, the L2 Bergman metric, the Teichmüller metric and the Weil-Petersson metric on the Teichmüller space of a compact Riemann surface of genus g?2. As a consequence, among others, we show that the moduli space has finite volume with respect to the L2 Bergman metric. This answers a question raised by Nag in 1989.  相似文献   

12.
The problem addressed in this paper is to compare the minimum cost of the two randomized control policies in the M/G/1 queueing system with an unreliable server, a second optional service, and general startup times. All arrived customers demand the first required service, and only some of the arrived customers demand a second optional service. The server needs a startup time before providing the first required service until the system becomes empty. After all customers are served in the queue, the server immediately takes a vacation and the system operates the (T, p)-policy or (p, N)-policy. For those two policies, the expected cost functions are established to determine the joint optimal threshold values of (T, p) and (p, N), respectively. In addition, we obtain the explicit closed form of the joint optimal solutions for those two policies. Based on the minimal cost, we show that the optimal (p, N)-policy indeed outperforms the optimal (T, p)-policy. Numerical examples are also presented for illustrative purposes.  相似文献   

13.
Let f be a graph function which assigns to each graph H a non-negative integer f(H)≤|V(H)|. The f-game chromatic number of a graph G is defined through a two-person game. Let X be a set of colours. Two players, Alice and Bob, take turns colouring the vertices of G with colours from X. A partial colouring c of G is legal (with respect to graph function f) if for any subgraph H of G, the sum of the number of colours used in H and the number of uncoloured vertices of H is at least f(H). Both Alice and Bob must colour legally (i.e., the partial colouring produced needs to be legal). The game ends if either all the vertices are coloured or there are uncoloured vertices with no legal colour. In the former case, Alice wins the game. In the latter case, Bob wins the game. The f-game chromatic number of G, χg(f,G), is the least number of colours that the colour set X needs to contain so that Alice has a winning strategy. Let be the graph function defined as , for any n≥3 and otherwise. Then is called the acyclic game chromatic number of G. In this paper, we prove that any outerplanar graph G has acyclic game chromatic number at most 7. For any integer k, let ?k be the graph function defined as ?k(K2)=2 and ?k(Pk)=3 (Pk is the path on k vertices) and ?k(H)=0 otherwise. This paper proves that if k≥8 then for any tree T, χg(?k,T)≤9. On the other hand, if k≤6, then for any integer n, there is a tree T such that χg(?k,T)≥n.  相似文献   

14.
A kernel N of a digraph D is an independent set of vertices of D such that for every wV(D)−N there exists an arc from w to N. If every induced subdigraph of D has a kernel, D is said to be a kernel perfect digraph. D is called a critical kernel imperfect digraph when D has no kernel but every proper induced subdigraph of D has a kernel. If F is a set of arcs of D, a semikernel modulo F of D is an independent set of vertices S of D such that for every zV(D)−S for which there exists an (S,z)-arc of DF, there also exists an (z,S)-arc in D. In this work we show sufficient conditions for an infinite digraph to be a kernel perfect digraph, in terms of semikernel modulo F. As a consequence it is proved that symmetric infinite digraphs and bipartite infinite digraphs are kernel perfect digraphs. Also we give sufficient conditions for the following classes of infinite digraphs to be kernel perfect digraphs: transitive digraphs, quasi-transitive digraphs, right (or left)-pretransitive digraphs, the union of two right (or left)-pretransitive digraphs, the union of a right-pretransitive digraph with a left-pretransitive digraph, the union of two transitive digraphs, locally semicomplete digraphs and outward locally finite digraphs.  相似文献   

15.
Let G=(V,E) be a graph and let r≥1 be an integer. For a set DV, define Nr[x]={yV:d(x,y)≤r} and Dr(x)=Nr[x]∩D, where d(x,y) denotes the number of edges in any shortest path between x and y. D is known as an r-identifying code (r-locating-dominating set, respectively), if for all vertices xV (xV?D, respectively), Dr(x) are all nonempty and different. Roberts and Roberts [D.L. Roberts, F.S. Roberts, Locating sensors in paths and cycles: the case of 2-identifying codes, European Journal of Combinatorics 29 (2008) 72-82] provided complete results for the paths and cycles when r=2. In this paper, we provide results for a remaining open case in cycles and complete results in paths for r-identifying codes; we also give complete results for 2-locating-dominating sets in cycles, which completes the results of Bertrand et al. [N. Bertrand, I. Charon, O. Hudry, A. Lobstein, Identifying and locating-dominating codes on chains and cycles, European Journal of Combinatorics 25 (2004) 969-987].  相似文献   

16.
Different partial hypergroupoids are associated with binary relations defined on a set H. In this paper we find sufficient and necessary conditions for these hypergroupoids in order to be reduced hypergroups. Given two binary relations ρ and σ on H we investigate when the hypergroups associated with the relations ρσ, ρσ and ρσ are reduced. We also determine when the cartesian product of two hypergroupoids associated with a binary relation is a reduced hypergroup.  相似文献   

17.
In this paper, the solution of the nonlinear evolution inclusion problem of the form u(t)+B(t,u(t))∋f(t) is studied. In this problem, the operators are of type (M) or type (S+), which are different from those of pseudo-monotone operators that had been studied by many authors. At the same time, we study the perturbation problem. In fact, many kinds of evolution equations can be generalized by this problem. The former results are improved and generalized by our conclusions, and we will give more applications.  相似文献   

18.
Let G=(V,E) be a finite, simple and undirected graph. For SV, let δ(S,G)={(u,v)∈E:uS and vVS} be the edge boundary of S. Given an integer i, 1≤i≤|V|, let the edge isoperimetric value of G at i be defined as be(i,G)=minSV;|S|=i|δ(S,G)|. The edge isoperimetric peak of G is defined as be(G)=max1≤j≤|V|be(j,G). Let bv(G) denote the vertex isoperimetric peak defined in a corresponding way. The problem of determining a lower bound for the vertex isoperimetric peak in complete t-ary trees was recently considered in [Y. Otachi, K. Yamazaki, A lower bound for the vertex boundary-width of complete k-ary trees, Discrete Mathematics, in press (doi:10.1016/j.disc.2007.05.014)]. In this paper we provide bounds which improve those in the above cited paper. Our results can be generalized to arbitrary (rooted) trees.The depth d of a tree is the number of nodes on the longest path starting from the root and ending at a leaf. In this paper we show that for a complete binary tree of depth d (denoted as ), and where c1, c2 are constants. For a complete t-ary tree of depth d (denoted as ) and dclogt where c is a constant, we show that and where c1, c2 are constants. At the heart of our proof we have the following theorem which works for an arbitrary rooted tree and not just for a complete t-ary tree. Let T=(V,E,r) be a finite, connected and rooted tree — the root being the vertex r. Define a weight function w:VN where the weight w(u) of a vertex u is the number of its successors (including itself) and let the weight index η(T) be defined as the number of distinct weights in the tree, i.e η(T)=|{w(u):uV}|. For a positive integer k, let ?(k)=|{iN:1≤i≤|V|,be(i,G)≤k}|. We show that .  相似文献   

19.
In cooperative game theory, games in partition function form are real-valued function on the set of the so-called embedded coalitions, that is, pairs (S,π) where S is a subset (coalition) of the set N of players, and π is a partition of N containing S. Despite the fact that many studies have been devoted to such games, surprisingly nobody clearly defined a structure (i.e., an order) on embedded coalitions, resulting in scattered and divergent works, lacking unification and proper analysis. The aim of the paper is to fill this gap, thus to study the structure of embedded coalitions (called here embedded subsets), and the properties of games in partition function form.  相似文献   

20.
Proposing them as a general framework, Liu and Yu (2001) [6] introduced (n,k,d)-graphs to unify the concepts of deficiency of matchings, n-factor-criticality and k-extendability. Let G be a graph and let n,k and d be non-negative integers such that n+2k+d+2?|V(G)| and |V(G)|−nd is even. If on deleting any n vertices from G the remaining subgraph H of G contains a k-matching and each k-matching can be extended to a defect-d matching in H, then G is called an (n,k,d)-graph. In this paper, we obtain more properties of (n,k,d)-graphs, in particular the recursive relations of (n,k,d)-graphs for distinct parameters n,k and d. Moreover, we provide a characterization for maximal non-(n,k,d)-graphs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号