• Title/Summary/Keyword: extension graphs

Search Result 30, Processing Time 0.026 seconds

RIGHT-ANGLED ARTIN GROUPS ON PATH GRAPHS, CYCLE GRAPHS AND COMPLETE BIPARTITE GRAPHS

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Korean Journal of Mathematics
    • /
    • v.29 no.3
    • /
    • pp.577-580
    • /
    • 2021
  • For a finite simplicial graph 𝚪, let G(𝚪) denote the right-angled Artin group on the complement graph of 𝚪. For path graphs Pk, cycle graphs C and complete bipartite graphs Kn,m, this article characterizes the embeddability of G(Kn,m) in G(Pk) and in G(C).

AN EXTENSION OF SALLEE'S THEOREM TO INFINITE LOCALLY FINITE VAP-FREE PLANE GRAPHS

  • Jung Hwan-Ok
    • Journal of applied mathematics & informatics
    • /
    • v.22 no.1_2
    • /
    • pp.83-93
    • /
    • 2006
  • A graph is k-cyclable if given k vertices there is a cycle that contains the k vertices. Sallee showed that every finite 3-connected planar graph is 5-cyclable. In this paper, by characterizing the circuit graphs and investigating the structure of LV-graphs, we extend his result to 3-connected infinite locally finite VAP-free plane graphs.

On spanning 3-trees in infinite 3-connected planar graphs

  • Jung, Hwan-Ok
    • Communications of the Korean Mathematical Society
    • /
    • v.11 no.1
    • /
    • pp.1-21
    • /
    • 1996
  • In this paper the existence of spanning 3-trees in every 3-connected locally finite vertex-accumulation-point-free planer graph is verified, which is an extension of D. Barnette to infinite graphs and which improves the result of the author.

  • PDF

An Effective Method for Comparing Control Flow Graphs through Edge Extension (에지 확장을 통한 제어 흐름 그래프의 효과적인 비교 방법)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.317-326
    • /
    • 2013
  • In this paper, we present an effective method for comparing control flow graphs which represent static structures of binary programs. To compare control flow graphs, we measure similarities by comparing instructions and syntactic information contained in basic blocks. In addition, we also consider similarities of edges, which represent control flows between basic blocks, by edge extension. Based on the comparison results of basic blocks and edges, we match most similar basic blocks in two control flow graphs, and then calculate the similarity between control flow graphs. We evaluate the proposed edge extension method in real world Java programs with respect to structural similarities of their control flow graphs. To compare the performance of the proposed method, we also performed experiments with a previous structural comparison for control flow graphs. From the experimental results, the proposed method is evaluated to have enough distinction ability between control flow graphs which have different structural characteristics. Although the method takes more time than previous method, it is evaluated to be more resilient than previous method in comparing control flow graphs which have similar structural characteristics. Control flow graph can be effectively used in program analysis and understanding, and the proposed method is expected to be applied to various areas, such as code optimization, detection of similar code, and detection of code plagiarism.

SEMISYMMETRIC CUBIC GRAPHS OF ORDER 34p3

  • Darafsheh, Mohammad Reza;Shahsavaran, Mohsen
    • Bulletin of the Korean Mathematical Society
    • /
    • v.57 no.3
    • /
    • pp.739-750
    • /
    • 2020
  • A simple graph is called semisymmetric if it is regular and edge transitive but not vertex transitive. Let p be a prime. Folkman proved [J. Folkman, Regular line-symmetric graphs, Journal of Combinatorial Theory 3 (1967), no. 3, 215-232] that no semisymmetric graph of order 2p or 2p2 exists. In this paper an extension of his result in the case of cubic graphs of order 34p3, p ≠ 17, is obtained.

A NEW EXTENSION OF BESSEL FUNCTION

  • Chudasama, Meera H.
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.2
    • /
    • pp.277-298
    • /
    • 2021
  • In this paper, we propose an extension of the classical Bessel function by means of our ℓ-hypergeometric function [2]. As the main results, the infinite order differential equation, the generating function relation, and contour integral representations including Schläfli's integral analogue are derived. With the aid of these, other results including some inequalities are also obtained. At the end, the graphs of these functions are plotted using the Maple software.

MORE RELATIONS BETWEEN λ-LABELING AND HAMILTONIAN PATHS WITH EMPHASIS ON LINE GRAPH OF BIPARTITE MULTIGRAPHS

  • Zaker, Manouchehr
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.119-139
    • /
    • 2022
  • This paper deals with the λ-labeling and L(2, 1)-coloring of simple graphs. A λ-labeling of a graph G is any labeling of the vertices of G with different labels such that any two adjacent vertices receive labels which differ at least two. Also an L(2, 1)-coloring of G is any labeling of the vertices of G such that any two adjacent vertices receive labels which differ at least two and any two vertices with distance two receive distinct labels. Assume that a partial λ-labeling f is given in a graph G. A general question is whether f can be extended to a λ-labeling of G. We show that the extension is feasible if and only if a Hamiltonian path consistent with some distance constraints exists in the complement of G. Then we consider line graph of bipartite multigraphs and determine the minimum number of labels in L(2, 1)-coloring and λ-labeling of these graphs. In fact we obtain easily computable formulas for the path covering number and the maximum path of the complement of these graphs. We obtain a polynomial time algorithm which generates all Hamiltonian paths in the related graphs. A special case is the Cartesian product graph Kn☐Kn and the generation of λ-squares.

BINDING NUMBERS AND FRACTIONAL (g, f, n)-CRITICAL GRAPHS

  • ZHOU, SIZHONG;SUN, ZHIREN
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.5_6
    • /
    • pp.435-441
    • /
    • 2016
  • Let G be a graph, and let g, f be two nonnegative integer-valued functions defined on V (G) with g(x) ≤ f(x) for each x ∈ V (G). A graph G is called a fractional (g, f, n)-critical graph if after deleting any n vertices of G the remaining graph of G admits a fractional (g, f)-factor. In this paper, we obtain a binding number condition for a graph to be a fractional (g, f, n)-critical graph, which is an extension of Zhou and Shen's previous result (S. Zhou, Q. Shen, On fractional (f, n)-critical graphs, Inform. Process. Lett. 109(2009)811-815). Furthermore, it is shown that the lower bound on the binding number condition is sharp.

RIGIDITY AND NONEXISTENCE OF RIEMANNIAN IMMERSIONS IN SEMI-RIEMANNIAN WARPED PRODUCTS VIA PARABOLICITY

  • Railane Antonia;Henrique F. de Lima;Marcio S. Santos
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.1
    • /
    • pp.41-63
    • /
    • 2024
  • In this paper, we study complete Riemannian immersions into a semi-Riemannian warped product obeying suitable curvature constraints. Under appropriate differential inequalities involving higher order mean curvatures, we establish rigidity and nonexistence results concerning these immersions. Applications to the cases that the ambient space is either an Einstein manifold, a steady state type spacetime or a pseudo-hyperbolic space are given, and a particular investigation of entire graphs constructed over the fiber of the ambient space is also made. Our approach is based on a parabolicity criterion related to a linearized differential operator which is a divergence-type operator and can be regarded as a natural extension of the standard Laplacian.

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.