首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In 2009, Kyaw proved that every n-vertex connected K1,4-free graph G with σ4(G)n?1 contains a spanning tree with at most 3 leaves. In this paper, we prove an analogue of Kyaw’s result for connected K1,5-free graphs. We show that every n-vertex connected K1,5-free graph G with σ5(G)n?1 contains a spanning tree with at most 4 leaves. Moreover, the degree sum condition “σ5(G)n?1” is best possible.  相似文献   

2.
3.
Let [Rn,k]n,k0 be an array of nonnegative numbers satisfying the recurrence relation Rn,k=(a1n+a2k+a3)Rn1,k+(b1n+b2k+b3)Rn1,k1+(c1n+c2k+c3)Rn1,k2 with R0,0=1 and Rn,k=0 unless 0kn. In this paper, we first prove that the array [Rn,k]n,k0 can be generated by some context-free Grammars, which gives a unified proof of many known results. Furthermore, we present criteria for real rootedness of row-generating functions and asymptotical normality of rows of [Rn,k]n,k0. Applying the criteria to some arrays related to tree-like tableaux, interior and left peaks, alternating runs, flag descent numbers of group of type B, and so on, we get many results in a unified manner. Additionally, we also obtain the continued fraction expansions for generating functions related to above examples. As results, we prove the strong q-log-convexity of some generating functions.  相似文献   

4.
5.
In this article, we study the structure of finitely ramified mixed characteristic valued fields. For any two complete discrete valued fields K1 and K2 of mixed characteristic with perfect residue fields, we show that if the n-th residue rings are isomorphic for each n1, then K1 and K2 are isometric and isomorphic. More generally, for n11, there is n2 depending only on the ramification indices of K1 and K2 such that any homomorphism from the n1-th residue ring of K1 to the n2-th residue ring of K2 can be lifted to a homomorphism between the valuation rings. Moreover, we get a functor from the category of certain principal Artinian local rings of length n to the category of certain complete discrete valuation rings of mixed characteristic with perfect residue fields, which naturally generalizes the functorial property of unramified complete discrete valuation rings. Our lifting result improves Basarab's relative completeness theorem for finitely ramified henselian valued fields, which solves a question posed by Basarab, in the case of perfect residue fields.  相似文献   

6.
《Discrete Mathematics》2022,345(9):112945
The coinvariant algebra is a quotient of the polynomial ring Q[x1,,xn] whose algebraic properties are governed by the combinatorics of permutations of length n. A word w=w1wn over the positive integers is packed if whenever i>2 appears as a letter of w, so does i?1. We introduce a quotient Sn of Q[x1,,xn] which is governed by the combinatorics of packed words. We relate our quotient Sn to the generalized coinvariant rings of Haglund, Rhoades, and Shimozono as well as the superspace coinvariant ring.  相似文献   

7.
《Discrete Mathematics》2019,342(5):1275-1292
A discrete function of n variables is a mapping g:X1××XnA, where X1,,Xn, and A are arbitrary finite sets. Function g is called separable if there exist n functions gi:XiA for i=1,,n, such that for every input x1,,xn the function g(x1,,xn) takes one of the values g1(x1),,gn(xn). Given a discrete function g, it is an interesting problem to ask whether g is separable or not. Although this seems to be a very basic problem concerning discrete functions, the complexity of recognition of separable discrete functions of n variables is known only for n=2. In this paper we will show that a slightly more general recognition problem, when g is not fully but only partially defined, is NP-complete for n3. We will then use this result to show that the recognition of fully defined separable discrete functions is NP-complete for n4.The general recognition problem contains the above mentioned special case for n=2. This case is well-studied in the context of game theory, where (separable) discrete functions of n variables are referred to as (assignable) n-person game forms. There is a known sufficient condition for assignability (separability) of two-person game forms (discrete functions of two variables) called (weak) total tightness of a game form. This property can be tested in polynomial time, and can be easily generalized both to higher dimension and to partially defined functions. We will prove in this paper that weak total tightness implies separability for (partially defined) discrete functions of n variables for any n, thus generalizing the above result known for n=2. Our proof is constructive. Using a graph-based discrete algorithm we show how for a given weakly totally tight (partially defined) discrete function g of n variables one can construct separating functions g1,,gn in polynomial time with respect to the size of the input function.  相似文献   

8.
Let (Zn)n0 be a branching process in a random environment defined by a Markov chain (Xn)n0 with values in a finite state space X. Let Pi be the probability law generated by the trajectories of Xnn0 starting at X0=iX. We study the asymptotic behaviour of the joint survival probability PiZn>0,Xn=j, jX as n+ in the critical and strongly, intermediate and weakly subcritical cases.  相似文献   

9.
10.
For a commutative ring R and an ADE Dynkin quiver Q, we prove that the multiplicative preprojective algebra of Crawley-Boevey and Shaw, with parameter q=1, is isomorphic to the (additive) preprojective algebra as R-algebras if and only if the bad primes for Q – 2 in type D, 2 and 3 for Q=E6, E7 and 2, 3 and 5 for Q=E8 – are invertible in R. We construct an explicit isomorphism over Z[1/2] in type D, over Z[1/2,1/3] for Q=E6, E7 and over Z[1/2,1/3,1/5] for Q=E8. Conversely, if some bad prime is not invertible in R, we show that the additive and multiplicative preprojective algebras differ in zeroth Hochschild homology, and hence are not isomorphic. In fact, one only needs the vanishing of certain classes in zeroth Hochschild homology of the multiplicative preprojective algebra, utilizing a rigidification argument for isomorphisms that may be of independent interest.In the setting of Ginzburg dg-algebras, our obstructions are new in type E and give a more elementary proof of the negative result of Etgü–Lekili [5, Theorem 13] in type D. Moreover, the zeroth Hochschild homology of the multiplicative preprojective algebra, computed in Section 4, can be interpreted as the space of unobstructed deformations of the multiplicative Ginzburg dg-algebra by Van den Bergh duality. Finally, we observe that the multiplicative preprojective algebra is not symmetric Frobenius if QA1, a departure from the additive preprojective algebra in characteristic 2 for Q=D2n, n2 and Q=E7, E8.  相似文献   

11.
For k given graphs G1,G2,,Gk, k2, the k-color Ramsey number, denoted by R(G1,G2,,Gk), is the smallest integer N such that if we arbitrarily color the edges of a complete graph of order N with k colors, then it always contains a monochromatic copy of Gi colored with i, for some 1ik. Let Cm be a cycle of length m and K1,n a star of order n+1. In this paper, firstly we give a general upper bound of R(C4,C4,,C4,K1,n). In particular, for the 3-color case, we have R(C4,C4,K1,n)n+4n+5+3 and this bound is tight in some sense. Furthermore, we prove that R(C4,C4,K1,n)n+4n+5+2 for all n=?2?? and ?2, and if ? is a prime power, then the equality holds.  相似文献   

12.
《Discrete Mathematics》2022,345(9):112977
Consider functions f:AAC, where A and C are disjoint finite sets. The weakly connected components of the digraph of such a function are cycles of rooted trees, as in random mappings, and isolated rooted trees. Let n1=|A| and n3=|C|. When a function is chosen from all (n1+n3)n1 possibilities uniformly at random, then we find the following limiting behaviour as n1. If n3=o(n1), then the size of the maximal mapping component goes to infinity almost surely; if n3γn1, γ>0 a constant, then process counting numbers of mapping components of different sizes converges; if n1=o(n3), then the number of mapping components converges to 0 in probability. We get estimates on the size of the largest tree component which are of order log?n3 when n3γn1 and constant when n3n1α, α>1. These results are similar to ones obtained previously for random injections, for which the weakly connected components are cycles and linear trees.  相似文献   

13.
14.
15.
Let (Yt)t0 be an ergodic diffusion with invariant distribution ν. Consider the empirical measure νn(k=1nγk)1k=1nγkδXk1 where (Xk)k0 is an Euler scheme with decreasing steps (γk)k0 which approximates (Yt)t0. Given a test function f, we obtain sharp concentration inequalities for νn(f)ν(f) which improve the results in Honoré et al. (2019). Our hypotheses on the test function f cover many real applications: either f is supposed to be a coboundary of the infinitesimal generator of the diffusion, or f is supposed to be Lipschitz.  相似文献   

16.
The Erd?s–Gallai Theorem states that every graph of average degree more than l?2 contains a path of order l for l2. In this paper, we obtain a stability version of the Erd?s–Gallai Theorem in terms of minimum degree. Let G be a connected graph of order n and F=(?i=1kP2ai)?(?i=1lP2bi+1) be k+l disjoint paths of order 2a1,,2ak,2b1+1,,2bl+1, respectively, where k0, 0l2, and k+l2. If the minimum degree δ(G)i=1kai+i=1lbi?1, then F?G except several classes of graphs for sufficiently large n, which extends and strengths the results of Ali and Staton for an even path and Yuan and Nikiforov for an odd path.  相似文献   

17.
18.
19.
20.
《Discrete Mathematics》2022,345(11):113059
Let Fq be the finite field of q elements and let D2n=x,y|xn=1,y2=1,yxy=xn?1 be the dihedral group of 2n elements. Left ideals of the group algebra Fq[D2n] are known as left dihedral codes over Fq of length 2n, and abbreviated as left D2n-codes. Let gcd(n,q)=1. In this paper, we give an explicit representation for the Euclidean hull of every left D2n-code over Fq. On this basis, we determine all distinct Euclidean LCD codes and Euclidean self-orthogonal codes which are left D2n-codes over Fq. In particular, we provide an explicit representation and a precise enumeration for these two subclasses of left D2n-codes and self-dual left D2n-codes, respectively. Moreover, we give a direct and simple method for determining the encoder (generator matrix) of any left D2n-code over Fq, and present several numerical examples to illustrative our applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号