• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2308
  • 305
  • 268
  • 173
  • 136
  • 65
  • 28
  • 22
  • 18
  • 18
  • 17
  • 17
  • 17
  • 17
  • 17
  • Tagged with
  • 4176
  • 1512
  • 799
  • 496
  • 443
  • 437
  • 386
  • 379
  • 360
  • 349
  • 336
  • 334
  • 332
  • 284
  • 284
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Probabilistic methods and domination related problems in graphs

Harutyunyan, Ararat. January 2008 (has links)
A dominating set in a graph is a set S of vertices such that every vertex not in S is adjacent to a member S. A global defensive alliance in a graph is a dominating set S with the property that every vertex in S has in its closed neighborhood at least as many vertices in S as in V -- S. A global offensive alliance in a graph is a dominating set S with the property that every vertex in V -- S has in its closed neighborhood at least as many vertices in S as in V -- S. / We first study alliances in graphs. There are many results in this area. For example, it is known that every connected n-vertex graph G has a global offensive alliance of size at most 2n/3. Another result is that any global defensive alliance in G has size at least ( 4n+1 - 1)/2. Our study focuses particularly on trees and algorithms for finding alliances in trees. We find the cardinality of a minimum global offensive alliance for complete k-ary trees and the minimum cardinality global defensive alliance for complete binary and ternary trees. Also, we present a linear time algorithm for finding the minimum global offensive alliance in a tree. Additionally, for a general graph, an upper bound is given on the size of a minimum global offensive alliance in terms its degree sequence. The methods that we use in this part of the thesis are mainly algorithmic and deterministic. / Then we study independent dominating sets in graphs. An independent dominating set is a set of mutually nonadjacent vertices which is also a dominating set. This is a well-studied topic (see Haynes, Hedetniemi and Slater [22]). Our main result is to show that every d-regular graph of order n with girth at least 5 and satisfying d = o(1) and d2(log d)3/2 = o(n) contains an independent dominating set of size at most (1 + o(1)) nlogdd . This generalizes the results of Duckworth and Wormald [15] for random regular graphs. We construct the independent dominating set using recent probabilistic methods which resemble Rodl's semi-random method (see for example Alon and Spencer [1]).
42

Coloring girth restricted graphs on surfaces

Walls, Barrett Hamilton 08 1900 (has links)
No description available.
43

Finding a hamiltonian cycle in the square of a block

Lau, H. T. (Hang Tong), 1952- January 1980 (has links)
The subject of the thesis belongs to the theory of graphs. In 1966, C. St. J.A. Nash-Williams conjectured that the square of a block is hamiltonian. This conjecture quickly gained a wide popularity and, at the end of 1970, it was established by H. Fleischner. His proof of the existence of a hamiltonian cycle in the square of a block does not explicitly provide an algorithm for finding the cycle. The thesis will describe such an algorithm, with a running time O(n('2)) on every input with n vertices. For the most part, our algorithm follows closely the original lines of Fleischner's proof. The main difference occurs at the part where Fleischner proves the existence of a certain spanning subgraph in every connected bridgeless graph: we replace Fleischner's argument by a radically different one. This is the main original result of our thesis.
44

Codes from uniform subset graphs and cycle products.

Fish, Washiela. January 2007 (has links)
<p>In this thesis only Binary codes are studied. Firstly, the codes overs the field GF(2) by the adjacency matrix of the complement T(n), ofthe triangular graph, are examined. It is shown that the code obtained is the full space F2 s(n/2) when n= 0 (mod 4) and the dual code of the space generated by the j-vector when n= 2(mod 4). The codes from the other two cases are less trivial: when n=1 (mod 4) the code is [(n 2), (n 2 ) - n + 1, 3] code, and when n = 3 (mod 4) it is an [(n 2), (n 2) - n, 4 ] code.</p>
45

Codes from uniform subset graphs and cycle products.

Fish, Washiela. January 2007 (has links)
<p>In this thesis only Binary codes are studied. Firstly, the codes overs the field GF(2) by the adjacency matrix of the complement T(n), ofthe triangular graph, are examined. It is shown that the code obtained is the full space F2 s(n/2) when n= 0 (mod 4) and the dual code of the space generated by the j-vector when n= 2(mod 4). The codes from the other two cases are less trivial: when n=1 (mod 4) the code is [(n 2), (n 2 ) - n + 1, 3] code, and when n = 3 (mod 4) it is an [(n 2), (n 2) - n, 4 ] code.</p>
46

On unique realizability of digraphs and graphs

Jameel, Muhammad. January 1982 (has links)
Thesis (Ph. D.)--Ohio University, August, 1982. / Title from PDF t.p.
47

Optimised grid-partitioning for block structured grids in parallel computing

Junglas, Daniel. Unknown Date (has links)
Techn. University, Diss., 2006--Darmstadt.
48

On the Erdős-Sós conjecture /

Tiner, Gary F. January 2007 (has links)
Thesis (Ph.D.) -- University of Rhode Island, 2007 / Typescript. Includes bibliographical references (leaf 99).
49

Layoutalgorithmen für hierarchische Graphen

Kern, Achim. January 2005 (has links)
Stuttgart, Univ., Diplomarbeit, 2005.
50

Various coloring problems on plane graphs

Li, Ching-man, January 2007 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2007. / Title proper from title frame. Also available in printed format.

Page generated in 0.0375 seconds