On the strictness of a bound for the diameter of Cayley graphs generated by transposition trees Ashwin Ganesan Department of Mathematics, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritanagar, Coimbatore 641112, India. [email protected],[email protected]

Abstract. Cayley graphs have been well-studied as a model for interconnection networks due to their low diameter, optimal fault tolerance, and algorithmic efficiency, among other properties. A problem of practical and theoretical interest is to determine or estimate the diameter of Cayley graphs. Let Γ be a Cayley graph on n! vertices generated by a transposition tree on vertex set {1, 2, . . . , n}. In an oft-cited paper [1], it was shown that the diameter of Γ is bounded as: ) ( n X diam(Γ ) ≤ max c(π) − n + distT (i, π(i)) , π∈Sn

i=1

where the maximization is over all permutations π in the symmetric group, c(π) denotes the number of cycles in π, and distT is the distance function in T . It is of interest to determine how far away this upper bound can be from the true diameter value in the worst case and for which families of graphs this bound should be utilized or not utilized. In this work, we investigate the worst case performance of this upper bound. We show that for every n, there exists a transposition tree on n vertices such that the maximum possible difference ∆n between the upper bound and the true diameter value is at least n−4. The lower bound we provide for ∆n is seen to be best possible, and an open problem is to determine an upper bound for ∆n . Key words: Cayley graphs; transposition trees; permutation groups; diameter; interconnection networks

1

Introduction

Cayley graphs generated by transposition trees were shown in the oft-cited paper by Akers and Krishnamurthy [1] to have diameter that is sublogarithmic in the number of vertices. This is one of the main reasons such Cayley graphs were considered to be a superior model to hypercubes for consideration as the topology of interconnection networks [15] [13]. It is now known that Cayley graphs possess additional desirable properties such as optimal fault-tolerance [2], algorithmic

2

A. Ganesan, On a bound for the diameter of Cayley graphs

efficiency [3], optimal gossiping protocols [5], and optimal routing algorithms [8], among others, and so have been widely studied in the field of interconnection networks and parallel and distributed computing [15]. The diameter of a network represents the maximum communication delay between two nodes in the network. The design and performance of bounds or algorithms that determine or estimate the diameter of various families of Cayley graphs of permutation groups is thus of much theoretical and practical interest. This diameter problem is difficult even for the simple case when the symmetric group is generated by cyclically adjacent transpositions (i.e. a set of transpositions whose transposition graph is a Hamilton cycle) [14]. When a bound is proposed in the literature for this problem, it is of interest to determine how far away this bound can be from the true diameter value in the worst case. The purpose of this present work is to investigate this strictness of a well-known upper bound on the diameter of Cayley graphs. A transposition is a permutation of the elements of a set that interchanges just two elements of the set. Let S be a set of transpositions of {1, 2, . . . , n}. The transposition graph T (S) is the simple, undirected graph with vertex set {1, 2, . . . , n} and with two vertices i, j being adjacent whenever the transposition (i, j) ∈ S. Let Γ denote the Cayley graph (also known as the Cayley diagram) generated by S. Thus, the vertex set of Γ is the permutation group generated by S and there is an arc in Γ from π to τ if and only if τ = π(i, j) for some (i, j) ∈ S [7] [6]. Since every transposition is its own inverse, we can assume that Γ is undirected. It is well known that a given set of transpositions S of {1, 2, . . . , n} generates the entire symmetric group Sn if and only if the transposition graph T (S) contains a spanning tree [4],[9]. When T (S) is a tree, it is called a transposition tree. Throughout this work, we focus on the case where T (S) is a tree. We often use the symbol T to denote both the tree as well as the set of transpositions S, and we use the symbol (i, j) for both an edge of the tree as well as a transposition in S. 1.1

Notations and prior work

We let Sn denote the symmetric group on the n-element set [n] := {1, 2, . . . , n}. We represent a permutation π ∈ Sn as an arrangement of [n], either in the form [π(1), π(2), . . . , π(n)] or in cycle notation. c(π) denotes the number of cycles in π, including cycles of length 1. We let inv(π) denote the number of inversions of π (cf. [4]). Thus, if π = [3, 5, 1, 4, 2] = (1, 3)(2, 5) ∈ S5 , then c(π) = 3 and inv(π) = 6. For π, τ ∈ Sn , πτ is the permutation obtained by applying τ first and then π. If π ∈ Sn and τ = (i, j) is a transposition, then c(τ π) = c(π) + 1 if i and j are part of the same cycle of π, and c(τ π) = c(π) − 1 if i and j are in different cycles of π; and similarly for c(πτ ). We assume throughout that n ≥ 5, since the problem is easily solved by using brute force for all smaller trees. Let distG (u, v) denote the distance between vertices u and v in an undirected graph G, and let diam(G) denote the diameter of G. Note that distΓ (π, σ) = distΓ (I, π −1 σ), where I denotes the identity permutation. Thus, the diameter of Γ is the maximum of distΓ (I, π) over π ∈ Sn .

On the strictness of a bound for the diameter of Cayley graphs

3

Throughout this work, Γ denotes the Cayley graph generated by a transposition tree T . We now recall the following two bounds from the literature: Theorem 1 [1] Let T be a tree and let π ∈ Sn . Let Γ be the Cayley graph generated by T . Then distΓ (I, π) ≤ c(π) − n +

n X

distT (i, π(i)).

i=1

By taking the maximum over both sides, it follows that Corollary 2 [12, p.188] diam(Γ ) ≤ max

π∈Sn

(

c(π) − n +

n X

)

distT (i, π(i))

i=1

=: f (T ).

In the sequel, we refer to the second upper bound f (T ) as the diameter upper bound. This bound was subsequently also derived in [17], and related work includes [18],[16]. 1.2

Summary of our results

The diameter upper bound from the oft-cited paper [1] is investigated in this work. It is of interest to determine how far away this upper bound can be from the true diameter value in the worst case, and it is of interest to know for what families of trees this bound gives a good estimate of the diameter or for what families of trees this bound should not be utilized. To this end, in this work we show that for every n, there exists a transposition tree on n vertices such that the maximum possible difference ∆n between the diameter upper bound and the true diameter value of the Cayley graph is at least n − 4. This result gives a lower bound on the strictness ∆n of the diameter upper bound. This n − 4 lower bound is seen to be best possible in the sense that it is attained for some values of n. We leave it as an open problem to determine an upper bound for this difference.

2

Strictness of the diameter upper bound

Define the worst case performance of the diameter upper bound by the quantity ∆n := max |f (T ) − diam(Γ )|, T ∈Tn

where Tn denotes the set of all trees on n vertices. In our proof, we will use the following result:

4

A. Ganesan, On a bound for the diameter of Cayley graphs

Theorem 3 [10] Let Γ be the Cayley graph generated by a transposition tree T . Then the diameter upper bound inequality ) ( n X distT (i, π(i)) = max fT (π) diam(Γ ) ≤ max c(π) − n + π∈Sn

π∈Sn

i=1

holds with equality if T is a path, and in this case equals Our main result is the following:

n 2

 .

Theorem 4 For every n ≥ 5, there exists a tree on n vertices such that the difference between the actual diameter of the Cayley graph and the diameter upper bound is at least n − 4; in other words, ∆n ≥ n − 4. Proof. Throughout this proof, we let T denote the transposition tree defined by the edge set {(1, 2), (2, 3), . . . , (n − 3, n − 2), (n − 2, n − 1), (n − 2, n)}, which is shown in Figure 1. For conciseness, we let d(i, j) denote the distance in T between vertices i and j. Also, for leaf vertices i, j of T , we let T − {i, j} denote the tree on n − 2 vertices obtained by removing vertices i and j of T . Our  proof is in two parts. In the first part we establish that f (T ) is equal to n2 − 2. In the second part we show that the diameter of the Cayley graph  generated by T is at most n−1 + 1. Together, this yields the desired result. We 2 now present the first part of the proof; we establish that f (T ), defined by ) ( n X distT (i, σ(i)) , f (T ) := max c(σ) − n + σ∈Sn

is equal to

 n 2

i=1

− 2. We prove this result by examining several sub-cases. Define

fT (σ) := c(σ) − n + ST (σ),

ST (σ) :=

n X

distT (i, σ(i)).

i=1

We consider two cases, (1) and (2), depending on whether 1 and n are in the same or different cycle of σ; each of these cases will further involve subcases. In most of these subcases, we show that for a given σ, there is a σ 0 such that  n 0 0 fT (σ) ≤ fT (σ ) and fT (σ ) ≤ 2 − 2. (1) Assume 1 and n are in the same cycle of σ. So σ = (1, k1 , . . . , ks , n, j1 , . . . , j` )ˆ σ. The different subcases consider the different possible values for s and `. (1.1) Suppose s = 0, ` = 0. So σ = (1, n)ˆ σ = (1, n)σ2 . . . σr . Then, fT (σ) = c(σ) − n + ST (σ) = r − n + 2(n − 2) + ST −{1,n}(ˆ σ ) = 2n − 5 + (r − 2) + (n − 2) + ST −{1,n} (ˆ σ ) = 2n − 5 + c(ˆ σ ) + (n − 2) + ST −{1,n} (ˆ σ ) = 2n − 5 + fT −{1,n} (ˆ σ) ≤   n 2n − 5 + n−2 = − 2, where by Theorem 3 the inequality holds with equality 2 2 for some σ ˆ . Thus, the maximum  of fT (σ) over all permutations that contain (1, n) as a cycle is equal to n2 − 2. It remains to show that  for all other kinds of permutations σ in the symmetric group Sn , fT (σ) ≤ n2 − 2.

On the strictness of a bound for the diameter of Cayley graphs

5

(1.2) Suppose s = 1, ` = 0. So σ = (1, i, n)σ2 . . . σr = (1, i, n)ˆ σ . We consider some subcases. (1.2.1) Suppose i = n− 1. Then, fT (σ) = r − n+ (2n− 2)+ ST −{1,n−1,n}(ˆ σ) =   n−3 n 2n − 4 + fT −{1,n−1,n} (ˆ σ ) ≤ 2n − 4 + 2 ≤ 2 − 2, where the inequality is by Theorem 3. (1.2.2) Suppose 2 ≤ i ≤ n−2; so σ = (1, i, n)ˆ σ . Let σ 0 = (1, n)(i)ˆ σ . It is easily 0 verified that fT (σ) ≤ fT (σ ), and so the desired bound follows from applying subcase (1.1) to fT (σ 0 ). (1.3) Suppose s = 0, ` = 1, so σ = (1, n, i)ˆ σ . Since fT (σ) = fT (σ −1 ), this case also is settled by (1.2). (1.4) Suppose s = 0, ` ≥ 2, so σ = (1, n, j1 , . . . , j` )ˆ σ . Let σ 0 = (1, n)(j1 , . . . , j` )ˆ σ. 0 Observe that fT (σ) ≤ fT (σ ) iff d(n, j1 ) + d(j` , 1) ≤ d(n, 1) + d(j` , j1 ) + 1. We prove the latter inequality by considering 4 subcases: (1.4.1) Suppose j1 < j` ≤ n − 2. Then, an inspection of the tree in Figure 1 shows that d(n, j1 ) + d(j` , 1) = d(n, 1) + d(j` , j1 ), and so the inequality holds. n−1 ... 1

... 2

... j1

j`

n−2 n

Fig. 1. Positions of j1 and j` arising in subcase (1.4.1).

(1.4.2) Suppose j1 > j` and j1 , j` ≤ n − 2. Then, d(n, j1 ) + d(j` , 1) ≤ d(1, n), and so the inequality holds. (1.4.3) Suppose j1 = n − 1. Then d(n, j1 ) = 2. Also, d(j` , 1) ≤ d(n, 1) and d(j` , j1 ) ≥ 1, and so the inequality holds. (1.4.4) Suppose j` = n − 1. Then, d(j` , 1) = d(n, 1) and d(n, j1 ) = d(j` , j1 ), and so again the inequality holds. (1.5) Suppose s = 1, ` = 1, so σ = (1, i, n, j)ˆ σ . Let σ 0 = (1, n)(i, j)ˆ σ. (1.5.1) If i = n − 1, by symmetry in T between vertices n and n − 1, this subcase is resolved by subcase (1.4). (1.5.2) Let 2 ≤ i ≤ n−2. Then d(1, i)+d(i, n) = d(1, n). So fT (σ) ≤ fT (σ 0 ) iff d(n, j)+d(j, 1) ≤ d(1, n)+d(i, j)+d(j, i)+1, which is true since d(n, j)+d(j, 1) ≤ d(1, n) + 2. (1.6) Suppose s = 1, ` ≥ 2. So σ = (1, i, n, j1 , . . . , j` )ˆ σ . Let σ 0 = (1, n)(i, j1 , . . . , j` )ˆ σ. It suffices to show that fT (σ) ≤ fT (σ 0 ), i.e., that d(1, i) + d(i, n) + d(n, j1 ) + d(j` , 1) ≤ d(1, n) + d(1, n) + d(i, j1 ) + d(j` , i) + 1. We examine the terms of this latter inequality for various subcases: (1.6.1) Suppose 2 ≤ i ≤ n − 2. Then d(1, i) + d(i, n) = d(1, n). (1.6.1a) If j` = n − 1, then d(j` , i) = n − i − 1 and d(i, j1 ) = |i − j1 |, and so the inequality holds iff −1 ≤ |j1 − i| + j1 − i, which is clearly true.

6

A. Ganesan, On a bound for the diameter of Cayley graphs

(1.6.1b) Suppose 2 ≤ j` ≤ n − 2. Then, the inequality holds iff d(n, j1 ) + j` − 1 ≤ n − 2 + |i − j1 | + |i − j` | + 1, which can be verified separately for the cases j1 = n − 1 and 2 ≤ j1 ≤ n − 2. (1.6.2) Suppose i = n − 1. By symmetry in T of the vertices n and n − 1, this case is resolved by (1.4). (1.7) Suppose s ≥ 2, ` = 0, so σ = (1, k1 , . . . , ks , n)ˆ σ . Since fT (σ) = fT (σ −1 ), this case is resolved by (1.4). (1.8) Suppose s ≥ 2, ` = 1, so σ = (1, k1 , . . . , ks , n, j1 )ˆ σ . Let σ 0 = (1, n)(k1 , . . . , ks , j1 )ˆ σ. We can assume that 2 ≤ k1 ≤ n − 2 since the k1 = n − 1 case is resolved by (1.4) due to the symmetry in T . To show fT (σ) ≤ fT (σ 0 ), it suffices to prove the inequality d(1, k1 ) + d(ks , n) + d(n, j1 ) + d(j1 , 1) ≤ d(1, n) + d(n, 1) + d(ks , j1 ) + d(j1 , k1 ) + 1. We prove this inequality by separately considering whether j1 = n − 1 or ks = n − 1 or neither: (1.8.1) Suppose j1 = n − 1. Substituting d(ks , n) = n − ks − 1, d(n, j1 ) = 2, d(j1 , 1) = j1 − 1, etc, we get that the inequality holds iff k1 ≤ |j1 − k1 | + n − 2, which is clearly true. (1.8.2) Suppose 2 ≤ j1 ≤ n − 2. Then d(n, j1 ) = n − j1 − 1, and so the inequality holds iff k1 + d(ks , n) + n − 3 ≤ 2n − 3 + d(ks , j1 ) + d(j1 , k1 ). If ks = n − 1, this reduces to j1 + k1 ≤ 2n − 3 + |j1 − k1 |, and is true, whereas if 2 ≤ ks ≤ n − 2, this reduces to k1 − ks ≤ 1 + |j1 − ks | + |j1 − k1 |, which is true due to the triangle inequality. (1.9) Suppose s, l ≥ 2, so σ = (1, k1 , . . . , ks , n, j1 , . . . , j` )ˆ σ. 0 Let σ = (1, k1 , . . . , ks , n)(j1 , . . . , j` )ˆ σ . It suffices to show that ST (σ) ≤ ST (σ 0 ) + 1, i.e., that d(n, j1 ) + j` ≤ n + d(j1 , j` ). (1.9.1) If j1 < j` , then j1 ≤ n − 2, and so d(n, j1 ) = n − j1 − 1 and d(j1 , j` ) = j` − j1 ; the inequality thus holds. (1.9.2) If j1 > j` , then d(j1 , j` ) = j1 − j` , and so it suffices to show that d(n, j1 ) ≤ n + j1 − 2j` . It can be verified that this holds if j1 = n − 1 and also if 2 ≤ j ≤ n − 2. (2) Now suppose 1 and n are in different cycles of σ. So let σ = (1, k1 , . . . , ks )(n, j1 , . . . , j` )ˆ σ.  (2.1) Suppose s = 0. Then fT (σ) ≤ n−1 − 2, by induction on n. 2 (2.2) Suppose s = 1. So let σ = (1, i)(n, j1 , . . . , j` )ˆ σ . By symmetry in T between vertices n and n − 1 and subcase (1.1), we may assume i 6= n − 1. Let σ 0 = (1, n)(i, j1 , . . . , j` )ˆ σ . It suffices to show that ST (σ) ≤ ST (σ 0 ). If ` = 0 this is clear since d(1, i) ≤ d(1, n). Suppose ` ≥ 2. Then, by the triangle inequality, d(n, j1 ) + d(j` , n) ≤ d(j1 , i) + d(i, n) + d(i, j` ) + d(i, n) = d(j1 , i) + d(i, j` ) + (n − i − 1)2. Also, d(1, n) = d(1, i) + d(i, n) = d(1, i) + n − i − 1. Hence, 2d(1, i)+ d(n, j1 )+ d(j` , n) ≤ 2d(1, n)+ d(i, j1 )+ d(j` , i). Hence, ST (σ) ≤ ST (σ 0 ). The case ` = 1 can be similarly resolved by substituting j1 for j` in the l ≥ 2 case here.  (2.3) Suppose s ≥ 2, ` = 0. Then, by Theorem 3, fT (σ) ≤ n−1 2 . (2.4) Suppose s ≥ 2, ` = 1, so σ = (1, k1 , . . . , ks )(n, j1 )ˆ σ . Let σ 0 = (1, n)(k1 , . . . , ks , j1 )ˆ σ. It suffices to show that d(1, k1 ) + d(1, ks ) + 2d(n, j1 ) ≤ 2d(1, n) + d(ks , j1 ) + d(k1 , j1 ). This inequality is established by considering the two subcases:

On the strictness of a bound for the diameter of Cayley graphs

7

(2.4.1) Suppose j1 = n − 1. Then the inequality holds iff 2ks + k1 ≤ 3n − 7 + |k1 − j1 |, which is true since k1 , k2 ≤ n − 2 and |k1 − j1 | ≥ 1. (2.4.2) Suppose j1 6= n − 1. Then the inequality holds iff k1 − j1 + ks − j1 ≤ |k1 − j1 | + |ks − j1 |, which is clearly true. (2.5) Suppose s, ` ≥ 2, so σ = (1, k1 , . . . , ks )(n, j1 , . . . , j` )ˆ σ. Let σ 0 = (1, n)(k1 , . . . , ks , j1 , . . . , j` )ˆ σ . To show fT (σ) ≤ fT (σ 0 ), it suffices to show that d(1, k1 )+d(ks , 1)+d(n, j1 )+d(j` , n) ≤ 2d(n, 1)+d(ks , j1 )+d(j` , k1 ). By symmetry in T between vertices n and n − 1, we may assume k1 , . . . , ks 6= n − 1, since these cases were covered in (1). We establish this inequality as follows: (2.5.1) Suppose j1 = n − 1. Then d(n, j1 ) = 2 and d(n, j` ) = n − j` − 1. So the inequality holds iff 2ks ≤ 2(n − 2) + |j` − k1 | + j` − k1 , which is true since ks ≤ n − 2 and |j` − k1 | + j` − k1 ≥ 0. (2.5.2) Suppose j1 6= n − 1. Then d(n, j1 ) = n − j1 − 1. If j` = n − 1, the inequality holds iff 2k1 ≤ 2(n−2)+j1 −ks +|j1 −ks |,which is true since k1 ≤ n−2. If j` 6= n − 1, the inequality holds iff ks − j1 + k1 − j` ≤ |ks − j1 | + |k1 − j` |, which is true. This concludes the first part of the proof. We now provide the second part of the proof.  Let Γ be the Cayley graph generated by T . We show that diam(Γ ) ≤ n−1 + 1. Let π ∈ Sn , and suppose 2 each vertex i of T has marker π(i). We show that all markers can be homed using at most the proposed number of transpositions. Since diam(T ) = n − 2, marker 1 can be moved to vertex 1 using at most n − 2 transpositions. Now remove vertex 1 from the tree T , and repeat this procedure for marker 2, and then for marker 3, and so on, removing each vertex from T after its marker is homed. Continuing in this manner, we eventually arrive at a star K1,3 , whose Cayley graph has diameter 4. Hence,  the diameter of Γ is at most [(n − 2) + (n − 3) + . . . + 5 + 4 + 3] + 4 = n−1 + 1. This completes the proof 2

3

Concluding remarks

Cayley graphs have been studied as a suitable model for the topology of interconnection networks, and a problem of both theoretical and practical interest is to obtain bounds for the diameter of Cayley graphs. In this work, we investigated an upper bound on the diameter of Cayley graphs generated by transposition trees. This bound was first proposed in the oft-cited paper [1]. We showed that for every n, there exists a transposition tree on n vertices such that the difference ∆n between the diameter upper bound and the true diameter value is at least n − 4. Such results are of interest because they give us insight as to how far away these bounds can be from the true diameter value in the worst case and sometimes tell us for which families of graphs this bound can be utilized or not utilized. The results in this paper along with the results in [10] imply that the n − 4 lower bound on ∆n is best possible in the sense that it is attained for some values of n; for example, it is attained for n = 5. Now consider the tree on 9 vertices consisting of the edges (1, 2), (2, 3), (3, 4), (4, 5), (5, 6), (6, 7), (6, 8), (6, 9). Then,

8

A. Ganesan, On a bound for the diameter of Cayley graphs

it can be confirmed (with the help of a computer) that the diameter of the Cayley graph generated by this tree is 24, and the diameter upper bound f (T ) for this tree evaluates to 30. Hence, this n − 4 lower bound is not the exact value of ∆n , and an open problem is to obtain an upper bound for ∆n .

References 1. S. B. Akers and B. Krishnamurthy. A group-theoretic model for symmetric interconnection networks. IEEE Transactions on Computers, 38(4):555–566, 1989. 2. B. Alspach. Cayley graphs with optimal fault tolerance. IEEE Transactions on Computers, 41(10):1337–1339, 1992. 3. F. Annexstein, M. Baumslag, and A. L. Rosenberg. Group action graphs and parallel architectures. SIAM Journal on Computing, 19(3):544–569, 1990. 4. C. Berge. Principles of Combinatorics. Academic Press, New York, 1971. 5. J. C. Bermond, T. Kodate, and S. Perennes. Gossiping in Cayley graphs by packets. In Proceedings of the Franco-Japanese conference Brest July 95, volume Lecture Notes in Computer Science, 1120, pages 301–315. Springer verlag, 1996. 6. N. L. Biggs. Algebraic Graph Theory, 2nd Edition. Cambridge University Press, Cambridge, 1994. 7. B. Bollob´ as. Modern Graph Theory. Graduate Texts in Mathematics vol. 184, Springer, New York, 1998. 8. B. Chen, W. Xiao, and B. Parhami. Internode distance and optimal routing in a class of alternating group networks. IEEE Transactions on Computers, 55(12):1645– 1648, 2006. 9. C. Godsil and G. Royle. Algebraic Graph Theory. Graduate Texts in Mathematics vol. 207, Springer, New York, 2001. 10. A. Ganesan. On a bound for the diameter of Cayley networks of symmetric groups generated by transposition trees. http://arxiv.org/abs/1111.3114v1. 2011. 11. The GAP Group. GAP – Groups, Algorithms, and Programming, Version 4.4.12, http://www.gap-system.org. 2008. 12. G. Hahn and G. Sabidussi (eds.). Graph Symmetry: Algebraic Methods and Applications. Kluwer Academic Publishers, Dordrecht, 1997. 13. M. C. Heydemann. Cayley graphs and interconnection networks. In Graph symmetry: algebraic methods and applications, pages 167–226. Kluwer Academic Publishers, Dordrecht, 1997. 14. M. Jerrum. The complexity of finding minimum length generator sequences. Theoretical Computer Science, 36:265–289, 1985. 15. S. Lakshmivarahan, J-S. Jho, and S. K. Dhall. Symmetry in interconnection networks based on Cayley graphs of permutation groups: A survey. Parallel Computing, 19:361–407, 1993. 16. J. H. Smith. Factoring, into edge transpositions of a tree, permutations fixing a terminal vertex. Journal of Combinatorial Theory Series A, 85:92–95, 1999. 17. T. P. Vaughan. Bounds for the rank of a permutation on a tree. Journal of Combinatorial Mathematics and Combinatorial Computing, 19:65–81, 1991. 18. T. P. Vaughan and F. J. Portier. An algorithm for the factorization of permutations on a tree. Journal of Combinatorial Mathematics and Combinatorial Computing, 18:11–31, 1995.

On the strictness of a bound for the diameter of Cayley ...

networks and parallel and distributed computing [15]. The diameter of a network represents the maximum communication delay between two nodes in the ...

121KB Sizes 1 Downloads 173 Views

Recommend Documents

Upper bound on the diameter of a total domination ...
They showed that the bound in Theorem A is best possible for each 3 ≤ k ≤ 8 by constructing a k-γt-critical graph attaining the bound. They also constructed a k-γt-critical graph with diameter 5k−7. 3 for each k ≡ 2(mod 3), and conjectured

The automorphism group of Cayley graphs on symmetric groups ...
May 25, 2012 - Among the Cayley graphs of the symmetric group generated by a set ... of the Cayley graph generated by an asymmetric transposition tree is R(Sn) .... If π ∈ Sn is a permutation and i and j lie in different cycles of π, then.

A Bound on the Label Complexity of Agnostic ... - Semantic Scholar
to a large pool of unlabeled examples, and is allowed to request the label of any .... Examples. The canonical example of the potential improvements in label complexity of active over passive learning is the thresholds concept space. Specifically ...

On the diameter of lattice polytopes
1-skeleton of P. We may write δ(u, v) instead of δP (u, v) when the polyhedron we are referring to is clear from the context. ... conv{(0, 0), (1, 0), (0, 1), (2, 1), (1, 2), (2, 2)}. For even d, let Hd = (H2)d/2, and for odd d, let Hd = Hd−1 ×

Alexandropoulou_S._et_al. The Likelihood of Upper-Bound ...
The Likelihood of Upper-Bound Construals among Different Modified Numerals.pdf. Alexandropoulou_S._et_al. The Likelihood of Upper-Bound Construals ...

Synchronized Blitz: A Lower Bound on the Forwarding ...
synchronization and its effect on the forwarding rate of a switch. We then present the ... Illustration of the Synchronized Blitz: (a) When the test starts, packet from port i is ... At the beginning of the mesh test, a packet. Synchronized Blitz: A

Approximations of the Cramer-Rao bound for multiple-target ... - Irisa
Jul 10, 2009 - Abstract: The study is concerncd with multiple target motion analysis (MTMA), when thc ... and sophisticated tools havc thus been developed.

Approximations of the Cramer-Rao bound for multiple-target ... - Irisa
... to: UR Rennes. Downloaded on July 10, 2009 at 11:33 from IEEE Xplore. Restrictions apply. ..... associated with the measurements of receiver 1 and recei-.

a bound on the proportion of pure strategy eouilibria in ...
An NE A = (A',..., A") G /C is a pure strategy NE if it is an extreme point .... In R'", Lin Zhou has suggested that using Brower's degree function deg(/ - g, R'", 0).

A Remark on Plotkin's Bound
trix, Goldbach conjecture, high distance binary block codes ... and minimum (Hamming) distance d. ... long standing Goldbach conjecture which states that any.

Active Contours for Measuring Arterial Wall Diameter of ... - CiteSeerX
Jason Deglint a. aVision and Image Processing Lab ... Waterloo, Ontario, Canada. Waterloo ... volves creating a smoothed edge map of the image and using ac-.

The Exact Distribution of the Hansen-Jagannathan Bound
confidence intervals for the constrained HJ bound (dotted lines) using the methodology described later in the paper. The confidence intervals in Figure 2 are quite wide, indicating that there is substantial uncertainty about the exact location of the

A SECOND EIGENVALUE BOUND FOR THE ...
will be presented in Section 5. .... 5 operators are defined by their quadratic forms. (5) h±[Ψ] = ∫. Ω. |∇Ψ(r)|2 ..... The first eigenfunction of −∆+V on BR is radi-.

The performance of an upper bound on the fractional ...
Feb 1, 2010 - Department of Information Technology, K. J. Somaiya College of .... + 1 colors, where ∆ is the maximum degree of a vertex in G. As we show ...

A note on constructing large Cayley graphs of given ...
Jul 7, 1997 - to determine the largest order of a graph with given degree and diameter. Many currently known largest graphs of degree ≤ 15 and diameter ≤ 10 have been found by computer search among Cayley graphs of semidirect products of cyclic g

Parallel sorting on cayley graphs - Springer Link
This paper presents a parallel algorithm for sorting on any graph with a ... for parallel processing, because of its regularity, the small number of connections.

Experimental Studies of Os 2: Observation of a Bound-Bound ... - naomib
Jul 17, 2000 - narrow shape resonance lying only 3.52(12) meV above the ground state detachment threshold, while the other is bound by 11.48(12) meV. Convincing evidence that these states have odd ... recent calculations [4], the knowledge of Os2 was

Deploying the BIG-IP System for Diameter Traffic Management
Jun 11, 2013 - Deploying the BIG-IP System for Diameter Traffic Management ... provide an Authentication, Authorization and Accounting (AAA) framework for applications ...... first install and configure the necessary server software for these.

A New Outer Bound for the Gaussian Interference ... - IEEE Xplore
Wireless Communications and Networking Laboratory. Electrical Engineering Department. The Pennsylvania State University, University Park, PA 16802.

Perspectives on the development of a magnetic navigation system for ...
Mar 17, 2006 - of this system for cardiac mapping and ablation in patients with supraventricular ... maximum field strength dropped from 0.15 T (Telstar) to.

Perspectives on the development of a magnetic navigation system for ...
Mar 17, 2006 - Development of the magnetic navigation system was motiv- ated by the need for accurate catheter manipulation during complex ablation ...

Edge-transitivity of Cayley graphs generated by ...
Abstract. Let S be a set of transpositions generating the symmetric group Sn (n ≥ 5). The transposition graph of S is defined to be the graph with vertex set {1,...,n}, and with vertices i and j being adjacent in T(S) whenever (i, j) ∈ S. In the

Active Contours for Measuring Arterial Wall Diameter of ... - CiteSeerX
volves creating a smoothed edge map of the image and using ac- tive contours to converge to the upper and lower vessel bound- aries. Preliminary results show ...

Existence of a spanning tree having small diameter
... Discrete Math. 312 (2012) 207–212. 21. Page 22. [5] B.Y. Wu and K.M. Chao, Spanning Trees and Optimization Problems, Chap- man & Hall/CRC (2004). 22.