Spelling suggestions: "subject:"graph e"" "subject:"raph e""
41 |
Probabilistic methods and domination related problems in graphsHarutyunyan, Ararat. January 2008 (has links)
A dominating set in a graph is a set S of vertices such that every vertex not in S is adjacent to a member S. A global defensive alliance in a graph is a dominating set S with the property that every vertex in S has in its closed neighborhood at least as many vertices in S as in V -- S. A global offensive alliance in a graph is a dominating set S with the property that every vertex in V -- S has in its closed neighborhood at least as many vertices in S as in V -- S. / We first study alliances in graphs. There are many results in this area. For example, it is known that every connected n-vertex graph G has a global offensive alliance of size at most 2n/3. Another result is that any global defensive alliance in G has size at least ( 4n+1 - 1)/2. Our study focuses particularly on trees and algorithms for finding alliances in trees. We find the cardinality of a minimum global offensive alliance for complete k-ary trees and the minimum cardinality global defensive alliance for complete binary and ternary trees. Also, we present a linear time algorithm for finding the minimum global offensive alliance in a tree. Additionally, for a general graph, an upper bound is given on the size of a minimum global offensive alliance in terms its degree sequence. The methods that we use in this part of the thesis are mainly algorithmic and deterministic. / Then we study independent dominating sets in graphs. An independent dominating set is a set of mutually nonadjacent vertices which is also a dominating set. This is a well-studied topic (see Haynes, Hedetniemi and Slater [22]). Our main result is to show that every d-regular graph of order n with girth at least 5 and satisfying d = o(1) and d2(log d)3/2 = o(n) contains an independent dominating set of size at most (1 + o(1)) nlogdd . This generalizes the results of Duckworth and Wormald [15] for random regular graphs. We construct the independent dominating set using recent probabilistic methods which resemble Rodl's semi-random method (see for example Alon and Spencer [1]).
|
42 |
Coloring girth restricted graphs on surfacesWalls, Barrett Hamilton 08 1900 (has links)
No description available.
|
43 |
Finding a hamiltonian cycle in the square of a blockLau, H. T. (Hang Tong), 1952- January 1980 (has links)
The subject of the thesis belongs to the theory of graphs. In 1966, C. St. J.A. Nash-Williams conjectured that the square of a block is hamiltonian. This conjecture quickly gained a wide popularity and, at the end of 1970, it was established by H. Fleischner. His proof of the existence of a hamiltonian cycle in the square of a block does not explicitly provide an algorithm for finding the cycle. The thesis will describe such an algorithm, with a running time O(n('2)) on every input with n vertices. For the most part, our algorithm follows closely the original lines of Fleischner's proof. The main difference occurs at the part where Fleischner proves the existence of a certain spanning subgraph in every connected bridgeless graph: we replace Fleischner's argument by a radically different one. This is the main original result of our thesis.
|
44 |
Codes from uniform subset graphs and cycle products.Fish, Washiela. January 2007 (has links)
<p>In this thesis only Binary codes are studied. Firstly, the codes overs the field GF(2) by the adjacency matrix of the complement T(n), ofthe triangular graph, are examined. It is shown that the code obtained is the full space F2 s(n/2) when n= 0 (mod 4) and the dual code of the space generated by the j-vector when n= 2(mod 4). The codes from the other two cases are less trivial: when n=1 (mod 4) the code is [(n 2), (n 2 ) - n + 1, 3] code, and when n = 3 (mod 4) it is an [(n 2), (n 2) - n, 4 ] code.</p>
|
45 |
Codes from uniform subset graphs and cycle products.Fish, Washiela. January 2007 (has links)
<p>In this thesis only Binary codes are studied. Firstly, the codes overs the field GF(2) by the adjacency matrix of the complement T(n), ofthe triangular graph, are examined. It is shown that the code obtained is the full space F2 s(n/2) when n= 0 (mod 4) and the dual code of the space generated by the j-vector when n= 2(mod 4). The codes from the other two cases are less trivial: when n=1 (mod 4) the code is [(n 2), (n 2 ) - n + 1, 3] code, and when n = 3 (mod 4) it is an [(n 2), (n 2) - n, 4 ] code.</p>
|
46 |
On unique realizability of digraphs and graphsJameel, Muhammad. January 1982 (has links)
Thesis (Ph. D.)--Ohio University, August, 1982. / Title from PDF t.p.
|
47 |
Optimised grid-partitioning for block structured grids in parallel computingJunglas, Daniel. Unknown Date (has links)
Techn. University, Diss., 2006--Darmstadt.
|
48 |
On the Erdős-Sós conjecture /Tiner, Gary F. January 2007 (has links)
Thesis (Ph.D.) -- University of Rhode Island, 2007 / Typescript. Includes bibliographical references (leaf 99).
|
49 |
Layoutalgorithmen für hierarchische GraphenKern, Achim. January 2005 (has links)
Stuttgart, Univ., Diplomarbeit, 2005.
|
50 |
Various coloring problems on plane graphsLi, Ching-man, January 2007 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2007. / Title proper from title frame. Also available in printed format.
|
Page generated in 0.0476 seconds