Pub Date : 2026-01-22DOI: 10.1016/j.dam.2026.01.023
Hui Gao
In this paper, we solve a conjecture by Szigeti in [Matroid-rooted packing of arborescences], which characterizes mixed hypergraphs for which there exists an orientation of such that for every subpartition of , where is an integer-valued, intersecting supermodular function on and a submodular function on . As a corollary, another conjecture in the same paper is confirmed, which characterizes mixed hypergraphs admitting a packing of mixed hyperarborescences such that their roots form a basis in a given matroid, each vertex belongs to exactly of them and is the root of at least and at most of them.
{"title":"Covering a supermodular-like function in a mixed hypergraph","authors":"Hui Gao","doi":"10.1016/j.dam.2026.01.023","DOIUrl":"10.1016/j.dam.2026.01.023","url":null,"abstract":"<div><div>In this paper, we solve a conjecture by Szigeti in [Matroid-rooted packing of arborescences], which characterizes mixed hypergraphs <span><math><mrow><mi>F</mi><mo>=</mo><mrow><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>∪</mo><mi>A</mi><mo>)</mo></mrow></mrow></math></span> for which there exists an orientation <span><math><mover><mrow><mi>E</mi></mrow><mo>⃗</mo></mover></math></span> of <span><math><mi>E</mi></math></span> such that <span><math><mrow><msub><mrow><mi>e</mi></mrow><mrow><mover><mrow><mi>E</mi></mrow><mo>⃗</mo></mover><mo>∪</mo><mi>A</mi></mrow></msub><mrow><mo>(</mo><mi>P</mi><mo>)</mo></mrow><mo>≥</mo><msub><mrow><mo>∑</mo></mrow><mrow><mi>X</mi><mo>∈</mo><mi>P</mi></mrow></msub><mi>h</mi><mrow><mo>(</mo><mi>X</mi><mo>)</mo></mrow><mo>−</mo><mi>b</mi><mrow><mo>(</mo><mo>∪</mo><mi>P</mi><mo>)</mo></mrow></mrow></math></span> for every subpartition <span><math><mi>P</mi></math></span> of <span><math><mi>V</mi></math></span>, where <span><math><mi>h</mi></math></span> is an integer-valued, intersecting supermodular function on <span><math><mi>V</mi></math></span> and <span><math><mi>b</mi></math></span> a submodular function on <span><math><mi>V</mi></math></span>. As a corollary, another conjecture in the same paper is confirmed, which characterizes mixed hypergraphs admitting a packing of mixed hyperarborescences such that their roots form a basis in a given matroid, each vertex <span><math><mi>v</mi></math></span> belongs to exactly <span><math><mi>k</mi></math></span> of them and is the root of at least <span><math><mrow><mi>f</mi><mrow><mo>(</mo><mi>v</mi><mo>)</mo></mrow></mrow></math></span> and at most <span><math><mrow><mi>g</mi><mrow><mo>(</mo><mi>v</mi><mo>)</mo></mrow></mrow></math></span> of them.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"385 ","pages":"Pages 72-76"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-22DOI: 10.1016/j.dam.2026.01.018
Weixing Zheng , Shuming Zhou , Lulu Yang
<div><div>The rapid expansion of multiprocessor systems in modern computing platforms has posed new challenges to ensure system reliability and fault resilience under complex and large-scale failure scenarios. Classical connectivity and diagnosability are two key parameters to evaluate the reliability and self-diagnostic capability of multiprocessor systems. As generalizations of traditional connectivity and diagnosability, <span><math><mi>g</mi></math></span>-extra connectivity and <span><math><mi>r</mi></math></span>-component connectivity, together with their corresponding diagnosabilities, offer a more refined characterization of fault tolerability. In this paper, we determine the fault tolerability of Cayley graphs <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> generated by transposition unicyclic graphs with a triangle. We show that the <span><math><mi>g</mi></math></span>-extra connectivity of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> is <span><math><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>n</mi><mo>−</mo><mfrac><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>2</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac></mrow></math></span> for <span><math><mrow><mn>2</mn><mo>≤</mo><mi>g</mi><mo>≤</mo><mo>|</mo><mi>M</mi><mo>|</mo><mo>+</mo><mn>2</mn></mrow></math></span>, where <span><math><mi>M</mi></math></span> is the maximum matching of the generating graph of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> with the removal of a 3-cycle. Furthermore, we show that the <span><math><mi>g</mi></math></span>-extra diagnosability of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> under both PMC and MM* models is uniformly <span><math><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>n</mi><mo>−</mo><mfrac><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>2</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac><mo>+</mo><mi>g</mi></mrow></math></span>. In addition, we prove that the <span><math><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></math></span>-component connectivity of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> is <span><math><mrow><mi>r</mi><mi>n</mi><mo>−</mo><mfrac><mrow><mi>r</mi><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac></mrow></math></span>, and <span><math><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></math></span>-component diagnosability of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></
{"title":"Fault tolerability of Cayley graphs generated by transposition unicyclic graphs with a triangle","authors":"Weixing Zheng , Shuming Zhou , Lulu Yang","doi":"10.1016/j.dam.2026.01.018","DOIUrl":"10.1016/j.dam.2026.01.018","url":null,"abstract":"<div><div>The rapid expansion of multiprocessor systems in modern computing platforms has posed new challenges to ensure system reliability and fault resilience under complex and large-scale failure scenarios. Classical connectivity and diagnosability are two key parameters to evaluate the reliability and self-diagnostic capability of multiprocessor systems. As generalizations of traditional connectivity and diagnosability, <span><math><mi>g</mi></math></span>-extra connectivity and <span><math><mi>r</mi></math></span>-component connectivity, together with their corresponding diagnosabilities, offer a more refined characterization of fault tolerability. In this paper, we determine the fault tolerability of Cayley graphs <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> generated by transposition unicyclic graphs with a triangle. We show that the <span><math><mi>g</mi></math></span>-extra connectivity of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> is <span><math><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>n</mi><mo>−</mo><mfrac><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>2</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac></mrow></math></span> for <span><math><mrow><mn>2</mn><mo>≤</mo><mi>g</mi><mo>≤</mo><mo>|</mo><mi>M</mi><mo>|</mo><mo>+</mo><mn>2</mn></mrow></math></span>, where <span><math><mi>M</mi></math></span> is the maximum matching of the generating graph of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> with the removal of a 3-cycle. Furthermore, we show that the <span><math><mi>g</mi></math></span>-extra diagnosability of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> under both PMC and MM* models is uniformly <span><math><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mi>n</mi><mo>−</mo><mfrac><mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mi>g</mi><mo>+</mo><mn>2</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac><mo>+</mo><mi>g</mi></mrow></math></span>. In addition, we prove that the <span><math><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></math></span>-component connectivity of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></span> is <span><math><mrow><mi>r</mi><mi>n</mi><mo>−</mo><mfrac><mrow><mi>r</mi><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></mrow><mrow><mn>2</mn></mrow></mfrac></mrow></math></span>, and <span><math><mrow><mo>(</mo><mi>r</mi><mo>+</mo><mn>1</mn><mo>)</mo></mrow></math></span>-component diagnosability of <span><math><mrow><mi>U</mi><msub><mrow><mi>G</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></math></","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"384 ","pages":"Pages 372-385"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146023532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-22DOI: 10.1016/j.dam.2026.01.022
Ajinkya Gaikwad, Soumen Maity
A defensive alliance in an undirected graph is a non-empty set such that every vertex has at least as many neighbours (including itself) in as it has in . In this paper, we consider the notion of global minimality. A defensive alliance is called a globally minimal defensive alliance if no proper subset of is a defensive alliance. Given an undirected graph and a positive integer , we study Globally Minimal Defensive Alliance, where the goal is to check whether has a globally minimal defensive alliance of size at least . This problem is NP-hard but its parameterized complexity has remained open until now. The goal of this paper is to provide new insight into the complexity of Globally Minimal Defensive Alliance, parameterized by the structure of the input graph. We show that the problem is fixed-parameter tractable (FPT) when parameterized by the neighbourhood diversity of the input graph. The result for neighbourhood diversity implies that the problem is FPT parameterized by vertex cover number also. We prove that the problem parameterized by the vertex cover number of the input graph does not admit a polynomial compression unless coNP NP/poly. Furthermore, we show that the problem is W[1]-hard parameterized by a wide range of fairly restrictive structural parameters such as the feedback vertex set number, pathwidth, treewidth and treedepth. Finally, we prove that, given a vertex , deciding whether has a globally minimal defensive alliance of any size that contains is NP-complete.
{"title":"Globally minimal defensive alliances: A parameterized perspective","authors":"Ajinkya Gaikwad, Soumen Maity","doi":"10.1016/j.dam.2026.01.022","DOIUrl":"10.1016/j.dam.2026.01.022","url":null,"abstract":"<div><div>A <em>defensive alliance</em> in an undirected graph <span><math><mrow><mi>G</mi><mo>=</mo><mrow><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></mrow></mrow></math></span> is a non-empty set <span><math><mrow><mi>S</mi><mo>⊆</mo><mi>V</mi></mrow></math></span> such that every vertex <span><math><mrow><mi>v</mi><mo>∈</mo><mi>S</mi></mrow></math></span> has at least as many neighbours (including itself) in <span><math><mi>S</mi></math></span> as it has in <span><math><mrow><mi>V</mi><mo>∖</mo><mi>S</mi></mrow></math></span>. In this paper, we consider the notion of global minimality. A defensive alliance <span><math><mi>S</mi></math></span> is called a <em>globally minimal defensive alliance</em> if no proper subset of <span><math><mi>S</mi></math></span> is a defensive alliance. Given an undirected graph <span><math><mi>G</mi></math></span> and a positive integer <span><math><mi>k</mi></math></span>, we study <span>Globally Minimal Defensive Alliance</span>, where the goal is to check whether <span><math><mi>G</mi></math></span> has a globally minimal defensive alliance of size at least <span><math><mi>k</mi></math></span>. This problem is NP-hard but its parameterized complexity has remained open until now. The goal of this paper is to provide new insight into the complexity of <span>Globally Minimal Defensive Alliance</span>, parameterized by the structure of the input graph. We show that the problem is fixed-parameter tractable (FPT) when parameterized by the neighbourhood diversity of the input graph. The result for neighbourhood diversity implies that the problem is FPT parameterized by vertex cover number also. We prove that the problem parameterized by the vertex cover number of the input graph does not admit a polynomial compression unless coNP <span><math><mo>⊆</mo></math></span> NP/poly. Furthermore, we show that the problem is W[1]-hard parameterized by a wide range of fairly restrictive structural parameters such as the feedback vertex set number, pathwidth, treewidth and treedepth. Finally, we prove that, given a vertex <span><math><mrow><mi>r</mi><mo>∈</mo><mi>V</mi><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span>, deciding whether <span><math><mi>G</mi></math></span> has a globally minimal defensive alliance of any size that contains <span><math><mi>r</mi></math></span> is NP-complete.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"385 ","pages":"Pages 86-99"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-22DOI: 10.1016/j.dam.2026.01.015
Dilson Lucas Pereira , Dilson Almeida Guimarães , Alexandre Salles da Cunha , Abilio Lucena
In this paper, we investigate the Chordless Cycle Problem (CCP), that asks for a maximum cardinality set of vertices whose induced subgraph is a cycle for a given connected undirected graph. In order to solve the CCP exactly, we propose an enhanced Lagrangian Relaxation Algorithm (LRA) and a Branch-and-bound algorithm, BBLAGSDP, that relies on the LRA. Enhancements come mostly from the fact that the matrix of Lagrangian multipliers attached to the semidefinite programming (SDP) constraint involved in our relaxation for the CCP is not only positive semidefinite, but also symmetric. For this reason, we are allowed to replace by its factorization , reformulate its accompanying Lagrangian Dual Problem (LDP) in terms of and, finally, avoid the need for computing an eigendecomposition of , that would otherwise be the most expensive step required for solving the LDP. On the one hand, our LRA approximates very well the exact SDP bounds, computed by a convex optimization solver from the literature. And it does so in significantly smaller computational times. On the other hand, our SDP bounds are also much stronger than the previously available Linear Programming (LP) bounds. Computational experiments conduced with 458 instances indicate that BBLAGSDP is by far the best performing algorithm, among the five exact methods we compare here, as the density of the input graph increases.
{"title":"Semidefinite programming bounds and a Branch-and-bound algorithm for the Chordless Cycle Problem","authors":"Dilson Lucas Pereira , Dilson Almeida Guimarães , Alexandre Salles da Cunha , Abilio Lucena","doi":"10.1016/j.dam.2026.01.015","DOIUrl":"10.1016/j.dam.2026.01.015","url":null,"abstract":"<div><div>In this paper, we investigate the Chordless Cycle Problem (CCP), that asks for a maximum cardinality set of vertices whose induced subgraph is a cycle for a given connected undirected graph. In order to solve the CCP exactly, we propose an enhanced Lagrangian Relaxation Algorithm (LRA) and a Branch-and-bound algorithm, <span>BBLAGSDP</span>, that relies on the LRA. Enhancements come mostly from the fact that the matrix <span><math><mi>Λ</mi></math></span> of Lagrangian multipliers attached to the semidefinite programming (SDP) constraint involved in our relaxation for the CCP is not only positive semidefinite, but also symmetric. For this reason, we are allowed to replace <span><math><mi>Λ</mi></math></span> by its factorization <span><math><mrow><mi>Λ</mi><mo>=</mo><mi>Γ</mi><msup><mrow><mi>Γ</mi></mrow><mrow><mi>T</mi></mrow></msup></mrow></math></span>, reformulate its accompanying Lagrangian Dual Problem (LDP) in terms of <span><math><mi>Γ</mi></math></span> and, finally, avoid the need for computing an eigendecomposition of <span><math><mi>Λ</mi></math></span>, that would otherwise be the most expensive step required for solving the LDP. On the one hand, our LRA approximates very well the exact SDP bounds, computed by a convex optimization solver from the literature. And it does so in significantly smaller computational times. On the other hand, our SDP bounds are also much stronger than the previously available Linear Programming (LP) bounds. Computational experiments conduced with 458 instances indicate that <span>BBLAGSDP</span> is by far the best performing algorithm, among the five exact methods we compare here, as the density of the input graph increases.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"383 ","pages":"Pages 387-408"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146023130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a spy network, when a particular spy is threatened, all associated partners in the surrounding vicinity may also be at risk. To better evaluate the reliability and security of the spy network, particularly in the context of the underground resistance movement, some early scholars introduced the concept of neighbor connectivity. This notion has recently been extended to assess the stability of interconnection networks, particularly in light of multi-processor or distributed computing systems. The topology of a network is typically modeled as a simple undirected graph. The neighbor connectivity of a graph , denoted as (resp. the edge neighbor connectivity, denoted as ), is defined as the minimum number of vertices (resp. edges) whose removal, along with their closed neighborhood, results in becoming disconnected, empty, or complete (resp. trivial). Bubble-sort star graphs possess several favorable properties, including bipartiteness, fault tolerance, and vertex transitivity, making them attractive as network structures. In this paper, we establish that for and for .
{"title":"Neighbor connectivity of bubble-sort star graphs","authors":"Liying Zhao , Shumin Zhang , Bo Zhu , Jou-Ming Chang","doi":"10.1016/j.dam.2026.01.027","DOIUrl":"10.1016/j.dam.2026.01.027","url":null,"abstract":"<div><div>In a spy network, when a particular spy is threatened, all associated partners in the surrounding vicinity may also be at risk. To better evaluate the reliability and security of the spy network, particularly in the context of the underground resistance movement, some early scholars introduced the concept of neighbor connectivity. This notion has recently been extended to assess the stability of interconnection networks, particularly in light of multi-processor or distributed computing systems. The topology of a network is typically modeled as a simple undirected graph. The neighbor connectivity of a graph <span><math><mi>G</mi></math></span>, denoted as <span><math><mrow><msub><mrow><mi>κ</mi></mrow><mrow><mtext>NB</mtext></mrow></msub><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span> (resp. the edge neighbor connectivity, denoted as <span><math><mrow><msub><mrow><mi>λ</mi></mrow><mrow><mtext>NB</mtext></mrow></msub><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span>), is defined as the minimum number of vertices (resp. edges) whose removal, along with their closed neighborhood, results in <span><math><mi>G</mi></math></span> becoming disconnected, empty, or complete (resp. trivial). Bubble-sort star graphs possess several favorable properties, including bipartiteness, fault tolerance, and vertex transitivity, making them attractive as network structures. In this paper, we establish that <span><math><mrow><msub><mrow><mi>κ</mi></mrow><mrow><mtext>NB</mtext></mrow></msub><mrow><mo>(</mo><mi>B</mi><msub><mrow><mi>S</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>)</mo></mrow><mo>=</mo><mrow><mo>⌊</mo><mfrac><mrow><mn>3</mn><mi>n</mi><mo>−</mo><mn>2</mn></mrow><mrow><mn>4</mn></mrow></mfrac><mo>⌋</mo></mrow></mrow></math></span> for <span><math><mrow><mi>n</mi><mo>≥</mo><mn>4</mn></mrow></math></span> and <span><math><mrow><msub><mrow><mi>λ</mi></mrow><mrow><mtext>NB</mtext></mrow></msub><mrow><mo>(</mo><mi>B</mi><msub><mrow><mi>S</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>)</mo></mrow><mo>=</mo><mn>2</mn><mi>n</mi><mo>−</mo><mn>3</mn></mrow></math></span> for <span><math><mrow><mi>n</mi><mo>≥</mo><mn>2</mn></mrow></math></span>.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"384 ","pages":"Pages 386-396"},"PeriodicalIF":1.0,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146023531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-21DOI: 10.1016/j.dam.2026.01.013
P. Leo Joshwa , R. Sundara Rajan , T.M. Rajalaxmi
The Sierpiński networks, , serves as an important model for multiprocessor interconnection systems due to its hierarchical and self-similar properties. Its extended variant, , further enhances these characteristics, making it highly relevant for applications in parallel computing and VLSI design. In this work, we address one of the open problems called the Maximum Subgraph Problem (MSP) for extended Sierpiński networks , , and posed by Joshwa et al. (2025). In addition, we use lexicographic ordering and propose a computational approach implemented in Sage to determine the maximum number of edges formed by vertices in where . Moreover, we investigate the minimum wirelength embedding of into structures such as paths, caterpillars, and 1-hierarchical caterpillars, contributing to the study of efficient graph embeddings in hierarchical systems.
{"title":"Maximum subgraph and wirelength analysis of extended Sierpiński networks in parallel computing","authors":"P. Leo Joshwa , R. Sundara Rajan , T.M. Rajalaxmi","doi":"10.1016/j.dam.2026.01.013","DOIUrl":"10.1016/j.dam.2026.01.013","url":null,"abstract":"<div><div>The Sierpiński networks, <span><math><mrow><mi>S</mi><mrow><mo>(</mo><mi>p</mi><mo>,</mo><mi>q</mi><mo>)</mo></mrow></mrow></math></span>, serves as an important model for multiprocessor interconnection systems due to its hierarchical and self-similar properties. Its extended variant, <span><math><mrow><msup><mrow><mi>S</mi></mrow><mrow><mo>+</mo><mo>+</mo></mrow></msup><mrow><mo>(</mo><mi>p</mi><mo>,</mo><mi>q</mi><mo>)</mo></mrow></mrow></math></span>, further enhances these characteristics, making it highly relevant for applications in parallel computing and VLSI design. In this work, we address one of the open problems called the Maximum Subgraph Problem (MSP) for extended Sierpiński networks <span><math><mrow><msup><mrow><mi>S</mi></mrow><mrow><mo>+</mo><mo>+</mo></mrow></msup><mrow><mo>(</mo><mi>p</mi><mo>,</mo><mi>q</mi><mo>)</mo></mrow></mrow></math></span>, <span><math><mrow><mi>p</mi><mo>≥</mo><mn>2</mn></mrow></math></span>, and <span><math><mrow><mi>q</mi><mo>≥</mo><mn>3</mn></mrow></math></span> posed by Joshwa et al. (2025). In addition, we use lexicographic ordering and propose a computational approach implemented in Sage to determine the maximum number of edges formed by <span><math><mi>r</mi></math></span> vertices in <span><math><mrow><msup><mrow><mi>S</mi></mrow><mrow><mo>+</mo><mo>+</mo></mrow></msup><mrow><mo>(</mo><mi>p</mi><mo>,</mo><mi>q</mi><mo>)</mo></mrow><mo>,</mo></mrow></math></span> where <span><math><mrow><mn>1</mn><mo>≤</mo><mi>r</mi><mo>≤</mo><msup><mrow><mi>q</mi></mrow><mrow><mi>p</mi></mrow></msup><mo>+</mo><msup><mrow><mi>q</mi></mrow><mrow><mi>p</mi><mo>−</mo><mn>1</mn></mrow></msup></mrow></math></span>. Moreover, we investigate the minimum wirelength embedding of <span><math><mrow><msup><mrow><mi>S</mi></mrow><mrow><mo>+</mo><mo>+</mo></mrow></msup><mrow><mo>(</mo><mi>p</mi><mo>,</mo><mi>q</mi><mo>)</mo></mrow></mrow></math></span> into structures such as paths, caterpillars, and 1-hierarchical caterpillars, contributing to the study of efficient graph embeddings in hierarchical systems.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"383 ","pages":"Pages 367-382"},"PeriodicalIF":1.0,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146023129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-21DOI: 10.1016/j.dam.2026.01.025
Wei Cao
Nica introduced the notion of nullity for finite sets and utilized it to refine the Combinatorial Nullstellensatz over structured grids. Inspired by Nica’s approach, we replace the concept of nullity with the support of polynomials, thereby obtaining further refinements of the Combinatorial Nullstellensatz.
{"title":"Refinements of Combinatorial Nullstellensatz via polynomial supports","authors":"Wei Cao","doi":"10.1016/j.dam.2026.01.025","DOIUrl":"10.1016/j.dam.2026.01.025","url":null,"abstract":"<div><div>Nica introduced the notion of nullity for finite sets and utilized it to refine the Combinatorial Nullstellensatz over structured grids. Inspired by Nica’s approach, we replace the concept of nullity with the support of polynomials, thereby obtaining further refinements of the Combinatorial Nullstellensatz.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"385 ","pages":"Pages 62-64"},"PeriodicalIF":1.0,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-21DOI: 10.1016/j.dam.2026.01.029
Kun Cheng
A well-known result of Chvátal and Erdős from 1972 states that a graph with connectivity not less than its independence number plus one is hamiltonian-connected. A graph is called an -graph if any induced subgraph of of order has size at least We prove that every -connected -graph is hamiltonian-connected except where and is an arbitrary graph of order . This generalizes the Chvátal–Erdős theorem.
{"title":"A generalization of the Chvátal–Erdős theorem","authors":"Kun Cheng","doi":"10.1016/j.dam.2026.01.029","DOIUrl":"10.1016/j.dam.2026.01.029","url":null,"abstract":"<div><div>A well-known result of Chvátal and Erdős from 1972 states that a graph with connectivity not less than its independence number plus one is hamiltonian-connected. A graph <span><math><mi>G</mi></math></span> is called an <span><math><mrow><mo>[</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>]</mo></mrow></math></span>-graph if any induced subgraph of <span><math><mi>G</mi></math></span> of order <span><math><mi>s</mi></math></span> has size at least <span><math><mrow><mi>t</mi><mo>.</mo></mrow></math></span> We prove that every <span><math><mi>k</mi></math></span>-connected <span><math><mrow><mo>[</mo><mi>k</mi><mo>+</mo><mn>1</mn><mo>,</mo><mn>2</mn><mo>]</mo></mrow></math></span>-graph is hamiltonian-connected except <span><math><mrow><mi>k</mi><msub><mrow><mi>K</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>∨</mo><msub><mrow><mi>G</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>,</mo></mrow></math></span> where <span><math><mrow><mi>k</mi><mo>≥</mo><mn>2</mn></mrow></math></span> and <span><math><msub><mrow><mi>G</mi></mrow><mrow><mi>k</mi></mrow></msub></math></span> is an arbitrary graph of order <span><math><mi>k</mi></math></span>. This generalizes the Chvátal–Erdős theorem.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"385 ","pages":"Pages 65-71"},"PeriodicalIF":1.0,"publicationDate":"2026-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-19DOI: 10.1016/j.dam.2025.12.056
Michael A. Henning , Paras Vinubhai Maniya , Dinabandhu Pradhan
A disjunctive dominating set of a graph is a set such that every vertex in has a neighbor in or has at least two vertices in at distance 2 from it. The disjunctive domination number of , denoted by , is the minimum cardinality among all disjunctive dominating sets of . In this paper, we show that if is a maximal outerplanar graph of order with vertices of degree 2, then , and this bound is sharp.
{"title":"Disjunctive domination in maximal outerplanar graphs","authors":"Michael A. Henning , Paras Vinubhai Maniya , Dinabandhu Pradhan","doi":"10.1016/j.dam.2025.12.056","DOIUrl":"10.1016/j.dam.2025.12.056","url":null,"abstract":"<div><div>A disjunctive dominating set of a graph <span><math><mi>G</mi></math></span> is a set <span><math><mrow><mi>D</mi><mo>⊆</mo><mi>V</mi><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span> such that every vertex in <span><math><mrow><mi>V</mi><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow><mo>∖</mo><mi>D</mi></mrow></math></span> has a neighbor in <span><math><mi>D</mi></math></span> or has at least two vertices in <span><math><mi>D</mi></math></span> at distance 2 from it. The disjunctive domination number of <span><math><mi>G</mi></math></span>, denoted by <span><math><mrow><msubsup><mrow><mi>γ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>d</mi></mrow></msubsup><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span>, is the minimum cardinality among all disjunctive dominating sets of <span><math><mi>G</mi></math></span>. In this paper, we show that if <span><math><mi>G</mi></math></span> is a maximal outerplanar graph of order <span><math><mrow><mi>n</mi><mo>≥</mo><mn>7</mn></mrow></math></span> with <span><math><mi>k</mi></math></span> vertices of degree 2, then <span><math><mrow><msubsup><mrow><mi>γ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>d</mi></mrow></msubsup><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow><mo>≤</mo><mrow><mo>⌊</mo><mfrac><mrow><mn>2</mn></mrow><mrow><mn>9</mn></mrow></mfrac><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mi>k</mi><mo>)</mo></mrow><mo>⌋</mo></mrow></mrow></math></span>, and this bound is sharp.</div></div>","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"385 ","pages":"Pages 24-61"},"PeriodicalIF":1.0,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-19DOI: 10.1016/j.dam.2026.01.004
Chuanye Zheng, Liqiong Xu
<div><div>As multiprocessor systems scale up in size and complexity to meet increasing computational demands, link or processor failures are inevitable. Thus reliability of multiprocessor systems needs to be considered. Restricting the surviving components within multiprocessor systems can enhance the evaluation of their reliability. Recently, Yang et al. introduced a new parameter called <span><math><mi>h</mi></math></span>-extra <span><math><mi>r</mi></math></span>-component edge-connectivity, which requires that for a connected graph <span><math><mi>G</mi></math></span> and an edge-cut <span><math><mi>F</mi></math></span> of <span><math><mi>G</mi></math></span>, there exist at least <span><math><mi>r</mi></math></span> components surviving in <span><math><mrow><mi>G</mi><mo>−</mo><mi>F</mi></mrow></math></span> and the order of each component is not less than <span><math><mi>h</mi></math></span>. In this paper, we consider the <span><math><mi>h</mi></math></span>-extra <span><math><mi>r</mi></math></span>-component edge-connectivity of the 3-ary <span><math><mi>n</mi></math></span>-cube <span><math><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup></math></span> and determine that <span><math><mrow><mi>c</mi><msubsup><mrow><mi>λ</mi></mrow><mrow><mn>4</mn></mrow><mrow><mi>h</mi></mrow></msubsup><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>=</mo><mn>6</mn><mi>n</mi><mi>h</mi><mo>−</mo><mn>3</mn><mi>e</mi><msub><mrow><mi>x</mi></mrow><mrow><mi>h</mi></mrow></msub><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>−</mo><mn>3</mn><mi>h</mi></mrow></math></span> for <span><math><mrow><mi>n</mi><mo>≥</mo><mn>5</mn></mrow></math></span> and <span><math><mrow><mn>1</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><mi>δ</mi><mi>⋅</mi><msup><mrow><mn>3</mn></mrow><mrow><mrow><mo>⌈</mo><mfrac><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></mfrac><mo>⌉</mo></mrow><mo>−</mo><mn>1</mn></mrow></msup><mo>−</mo><mn>1</mn></mrow></math></span> where <span><math><mrow><mi>δ</mi><mo>=</mo><mn>1</mn></mrow></math></span> if <span><math><mi>n</mi></math></span> is odd and <span><math><mrow><mi>δ</mi><mo>=</mo><mn>2</mn></mrow></math></span> if <span><math><mi>n</mi></math></span> is even, <span><math><mrow><mi>c</mi><msubsup><mrow><mi>λ</mi></mrow><mrow><mi>r</mi></mrow><mrow><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup></mrow></msubsup><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>=</mo><mrow><mo>(</mo><mi>r</mi><mo>−</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mn>2</mn><mi>n</mi><mo>−</mo><mn>2</mn><mi>k</mi><mo>)</mo></mrow><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>−</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mi>e</mi><msub><mrow><mi>x</mi></mrow><m
随着多处理器系统的规模和复杂性不断扩大,以满足不断增长的计算需求,链路或处理器故障是不可避免的。因此,需要考虑多处理器系统的可靠性。限制多处理机系统中幸存部件的数量可以提高对系统可靠性的评估。最近,杨等人提出了一个新的参数称为h-extra r-component edge,这要求一个连通图G和edge-cut F (G,存在至少r G−F幸存的组件,每个组件的顺序不小于h。在本文中,我们考虑h-extra r-component edge的3-ary n立方体Qn3和确定cλ4 h (Qn3) = 6 nh−3 exh (Qn3)−3 h n≥5和1 h≤≤δ⋅3⌈n2⌉−−1δ= 1如果n是奇怪和δ= 2如果n是偶数,cλr3k (Qn3) = (r−1)(2 n−2 k) 3 k 12 exr−−1 (Qn3)⋅3 k 1≤(r−1)3 k≤δ⋅3⌈n2⌉−1和cλ43 k (Qn3) = (2 n−2 k−1)3 k + 1 0≤k≤n−2。
{"title":"Assessing reliability of 3-ary n-cubes based on the h-extra r-component edge-connectivity","authors":"Chuanye Zheng, Liqiong Xu","doi":"10.1016/j.dam.2026.01.004","DOIUrl":"10.1016/j.dam.2026.01.004","url":null,"abstract":"<div><div>As multiprocessor systems scale up in size and complexity to meet increasing computational demands, link or processor failures are inevitable. Thus reliability of multiprocessor systems needs to be considered. Restricting the surviving components within multiprocessor systems can enhance the evaluation of their reliability. Recently, Yang et al. introduced a new parameter called <span><math><mi>h</mi></math></span>-extra <span><math><mi>r</mi></math></span>-component edge-connectivity, which requires that for a connected graph <span><math><mi>G</mi></math></span> and an edge-cut <span><math><mi>F</mi></math></span> of <span><math><mi>G</mi></math></span>, there exist at least <span><math><mi>r</mi></math></span> components surviving in <span><math><mrow><mi>G</mi><mo>−</mo><mi>F</mi></mrow></math></span> and the order of each component is not less than <span><math><mi>h</mi></math></span>. In this paper, we consider the <span><math><mi>h</mi></math></span>-extra <span><math><mi>r</mi></math></span>-component edge-connectivity of the 3-ary <span><math><mi>n</mi></math></span>-cube <span><math><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup></math></span> and determine that <span><math><mrow><mi>c</mi><msubsup><mrow><mi>λ</mi></mrow><mrow><mn>4</mn></mrow><mrow><mi>h</mi></mrow></msubsup><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>=</mo><mn>6</mn><mi>n</mi><mi>h</mi><mo>−</mo><mn>3</mn><mi>e</mi><msub><mrow><mi>x</mi></mrow><mrow><mi>h</mi></mrow></msub><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>−</mo><mn>3</mn><mi>h</mi></mrow></math></span> for <span><math><mrow><mi>n</mi><mo>≥</mo><mn>5</mn></mrow></math></span> and <span><math><mrow><mn>1</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><mi>δ</mi><mi>⋅</mi><msup><mrow><mn>3</mn></mrow><mrow><mrow><mo>⌈</mo><mfrac><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></mfrac><mo>⌉</mo></mrow><mo>−</mo><mn>1</mn></mrow></msup><mo>−</mo><mn>1</mn></mrow></math></span> where <span><math><mrow><mi>δ</mi><mo>=</mo><mn>1</mn></mrow></math></span> if <span><math><mi>n</mi></math></span> is odd and <span><math><mrow><mi>δ</mi><mo>=</mo><mn>2</mn></mrow></math></span> if <span><math><mi>n</mi></math></span> is even, <span><math><mrow><mi>c</mi><msubsup><mrow><mi>λ</mi></mrow><mrow><mi>r</mi></mrow><mrow><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup></mrow></msubsup><mrow><mo>(</mo><msubsup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msubsup><mo>)</mo></mrow><mo>=</mo><mrow><mo>(</mo><mi>r</mi><mo>−</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><mn>2</mn><mi>n</mi><mo>−</mo><mn>2</mn><mi>k</mi><mo>)</mo></mrow><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>−</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mi>e</mi><msub><mrow><mi>x</mi></mrow><m","PeriodicalId":50573,"journal":{"name":"Discrete Applied Mathematics","volume":"384 ","pages":"Pages 361-371"},"PeriodicalIF":1.0,"publicationDate":"2026-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}