Browsing by Subject "Combinatorial analysis"
Now showing items 120 of 104

A branchandprice algorithm for the Aperiodic MultiPeriod Service Scheduling Problem
(Elsevier, 20171216)
Article
Restricted access  publisher's policyThis paper considers the multiperiod service scheduling problem with an aperiodic service policy. In this problem, a set of customers who periodically require service over a finite time horizon is given. To satisfy the ... 
A combinatorial method for the evaluation of yield of faulttolerant systemsonchip
(2003)
Conference report
Open AccessIn this paper we develop a combinatorial method for the evaluation of yield of faulttolerant systemsonchip. The method assumes that defects are produced according to a model in which defects are lethal and affect given ... 
A connection between Inverse Problems and Nonstandard Analysis
(Universitat Politècnica de Catalunya, 201810)
Master thesis
Restricted access  author's decisionNonstandard analysis was born in the decade of 1960 an attempt to give a formal context to the Leibniz approach to differential calculus, in particular in order to provide a rigorous foundation to the notions of infinitesimal ... 
Activities and coefficients of the Tutte polynomial
(Universitat Politècnica de Catalunya, 201901)
Master thesis
Open AccessMatroids are combinatorial objects that capture abstractly the essence of dependence. The Tutte polynomial, defined for matroids and graphs, has a numerous amount of information about these structures. In this thesis, we ... 
A finite version of the Kakeya problem
(20160602)
Article
Open AccessLet L be a set of lines of an affine space over a field and let S be a set of points with the property that every line of L is incident with at least N points of S. Let D be the set of directions of the lines of L considered ... 
Algebraic characterizations of bipartite distanceregular graphs
(Iniciativa Digital Politècnica, 2011)
Conference report
Open AccessBipartite graphs are combinatorial objects bearing some interesting symmetries. Thus, their spectra—eigenvalues of its adjacency matrix—are symmetric about zero, as the corresponding eigenvectors come into pairs. Moreover, ... 
An algebraic fractal approach to Collatz Conjecture
(Universitat Politècnica de Catalunya, 201905)
Bachelor thesis
Open AccessThe Collatz conjecture is one of the most easytostate unsolved problems in Mathematics today. It states that after a finite number of iterations of the Collatz function, defined by C(n) = n/2 if n is even, and by C(n) = ... 
An algebraic framework for DiffieHellman assumptions
(201701)
Article
Open AccessWe put forward a new algebraic framework to generalize and analyze Di eHellman like Decisional Assumptions which allows us to argue about security and applications by considering only algebraic properties. Our D`;kMDDH ... 
Analytic combinatorics of chord and hyperchord diagrams with k crossings
(20140507)
Article
Open AccessUsing methods from Analytic Combinatorics, we study the families of perfect matchings, partitions, chord diagrams, and hyperchord diagrams on a disk with a prescribed number of crossings. For each family, we express the ... 
An analogue of Vosper's theorem for extension fields
(20171101)
Article
Open AccessWe are interested in characterising pairs S, T of Flinear subspaces in a field extension L/F such that the linear span ST of the set of products of elements of S and of elements of T has small dimension. Our central result ... 
A novel model for arc territory design: promoting Eulerian districts
(20150101)
Article
Open AccessThe problem of district design for the implementation of arc routing activities is addressed. The aim is to partition a road network into a given number of sectors to facilitate the organization of the operations to be ... 
An ROBDDbased combinatorial method for the evaluation of yield of defecttolerant systemsonchip
(200902)
Article
Open AccessIn this paper, we develop a combinatorial method for the evaluation of the functional yield of defecttolerant systemson chip (SoC). The method assumes that random manufacturing defects are produced according to a model ... 
A sufficient degree condition for a graph to contain all trees of size k
(Springer Verlag, 201101)
Article
Restricted access  publisher's policyThe ErdősSós conjecture says that a graph G on n vertices and number of edges e(G) > n(k− 1)/2 contains all trees of size k. In this paper we prove a sufficient condition for a graph to contain every tree of size k ... 
Bijections for Baxter families and related objects
(201104)
Article
Open AccessThe Baxter number can be written as $B_n = \sum_0^n \Theta_{k,nk1}$. These numbers have first appeared in the enumeration of socalled Baxter permutations; $B_n$ is the number of Baxter permutations of size $n$, and ... 
Binary labelings for plane quadrangulations and their relatives
(2010)
Article
Open AccessMotivated by the bijection between Schnyder labelings of a plane triangulation and partitions of its inner edges into three trees, we look for binary labelings for quadrangulations (whose edges can be partitioned into two ... 
cCritical graphs with maximum degree three
(John Wiley and Sons, Inc., 1995)
Part of book or chapter of book
Restricted access  publisher's policyLet $G$ be a (simple) gtoph with maximum degree three and chromatic index four. A 3edgecoloring of G is a coloring of its edges in which only three colors are used. Then a vertex is conflicting when some edges incident ... 
Characterizations of classes of graphs by forbidden minors
(Universitat Politècnica de Catalunya, 2011)
Master thesis
Open AccessEn aquest treball tractem el problema de descriure classes de grafs especificades per un menor prohibit. Concretament, presentem resultats de Wagner que caracteritzen grafs sense K5 o bé K3,3 com a menor. També donem ... 
Classical and modern approaches for Plünnecketype inequalities
(Universitat Politècnica de Catalunya, 201509)
Bachelor thesis
Open AccessThe main objective of this thesis is to present and prove Plünnecke's Inequality, a theorem that gives bounds for sumsets in commutative groups. An introduction to the theory of set addition is presented. Three different ... 
Combinatorics in the Art of the Twentieth Century
(2017)
Conference report
Open AccessThis paper is motivated by a question I asked myself: How can combinatorial structures be used in a work of art? Immediately, other questions arose: Whether there are artists that work or think combinatorially? If so, what ... 
Corrigendum to"On the limiting distribution of the metric dimension for random forests" [European J. Combin. 49 (2015) 6889]
(20170722)
Article
Open AccessIn the paper ”On the limiting distribution of the metric dimension for random forests” the metric dimension ß(G) of sparse G(n, p) with p = c/n and c < 1 was studied (Theorem 1.2). In the proof of this theorem, for the ...