# Combinatorics (math.CO)

• Let $P^k_\ell$ denote the loose $k$-path of length $\ell$ and let define $f^k_\ell(n,m)$ as the minimum value of $\Delta(H)$ over all $P^k_\ell$-free $k$-graphs $H$ with $n$ vertices and $m$ edges. In the paper we study the behavior of $f^4_2(n,m)$ and $f^3_3(n,m)$ and characterize the structure of extremal hypergraphs. In particular, it is shown that when $m\sim n^2/8$ the value of each of these functions drops down from $\Theta(n^2)$ to $\Theta(n)$.
• In the game of Cops and Robbers, a team of cops attempts to capture a robber on a graph $G$. All players occupy vertices of $G$. The game operates in rounds; in each round the cops move to neighboring vertices, after which the robber does the same. The minimum number of cops needed to guarantee capture of a robber on $G$ is the cop number of $G$, denoted $c(G)$, and the minimum number of rounds needed for them to do so is the capture time. It has long been known that the capture time of an $n$-vertex graph with cop number $k$ is $O(n^{k+1})$. More recently, Bonato, Golovach, Hahn, and Kratochvíl (2009) and Gavenčiak (2010) showed that for $k = 1$, this upper bound is not asymptotically tight: for graphs with cop number 1, the cop can always win within $n-4$ rounds. In this paper, we show that the upper bound is tight when $k \ge 2$: for fixed $k \ge 2$, we construct arbitrarily large graphs $G$ having capture time at least $\left (\frac{\vert V(G) \vert}{40k^4}\right )^{k+1}$. In the process of proving our main result, we establish results that may be of independent interest. In particular, we show that the problem of deciding whether $k$ cops can capture a robber on a directed graph is polynomial-time equivalent to deciding whether $k$ cops can capture a robber on an undirected graph. As a corollary of this fact, we obtain a relatively short proof of a major conjecture of Goldstein and Reingold (1995), which was recently proved through other means (Kinnersley, 2015).
• We consider uniform random permutations in proper substitution-closed classes and study their limiting behavior in the sense of permutons. The limit depends on the generating series of the simple permutations in the class. Under a mild sufficient condition, the limit is an elementary one-parameter deformation of the limit of uniform separable permutations, previously identified as the Brownian separable permuton. This limiting object is therefore in some sense universal. We identify two other regimes with different limiting objects. The first one is degenerate; the second one is nontrivial and related to stable trees. These results are obtained thanks to a characterization of permuton convergence by convergence of expected pattern densities. The limit of expected pattern densities is then computed by using the substitution tree encoding of permutations and performing singularity analysis on the tree series.
• We prove that one-ended graphs whose end is undominated and has finite vertex degree have tree-decompositions that display the end and that are invariant under the group of automorphisms. This can be applied to prove a conjecture of Halin from 2000 and solves a recent problem of Boutin and Imrich. Furthermore, it implies for every transitive one-ended graph that its end must have infinite vertex degree.
• Inspired by Andrews' 2-colored generalized Frobenius partitions, we consider certain weighted 7-colored partition functions and establish some interesting Ramanujan-type identities and congruences. Moreover, we provide combinatorial interpretations of some congruences modulo 5 and 7. Finally, we study the properties of weighted 7-colored partitions weighted by the parity of certain partition statistics.
• Jun 27 2017 math.CO arXiv:1706.08188v1
Lists of equivalence classes of words under rotation or rotation plus reversal (i.e., necklaces and bracelets) have many uses, and efficient algorithms for generating these lists exist. In combinatorial group theory elements of a group are typically written as words in the generators and their inverses, and necklaces and bracelets correspond to conjugacy classes and relators respectively. We present algorithms to generate lists of freely and cyclically reduced necklaces and bracelets in free groups. Experimental evidence suggests that these algorithms are CAT -- that is, they run in constant amortized time.
• We compute the elementary divisors of the adjacency and Laplacian matrices of families of polar graphs. These graphs have as vertices the isotropic one-dimensional subspaces of finite vector spaces with respect to non-degenerate forms, with adjacency given by orthogonality.
• Let $\Lambda_3$ be the lattice graph whose vertex set is the lattice $\mathbb{Z}^3$ with exactly one edge between each two vertices if and only if their Euclidean distance is 1. We prove that there do not exist non-lattice-like perfect dominating sets in $\Lambda_3$ whose components are all squares, but that there exists exactly one lattice-like perfect dominating set in $\Lambda_3$ whose components are all squares.
• A convex polygon Q is circumscribed about a convex polygon P if every vertex of P lies on at least one side of Q. We present an algorithm for finding a maximum area convex polygon circumscribed about any given convex n-gon in O(n^3) time. As an application, we disprove a conjecture of Farris. Moreover, for the special case of regular n-gons we find an explicit solution.
• Let $F$, $G$ and $H$ be simple graphs. We say $F \rightarrow (G, H)$ if for every $2$-coloring of the edges of $F$ there exists a monochromatic $G$ or $H$ in $F$. The Ramsey number $r(G, H)$ is defined as $r(G, H) = min\{|V (F)|: F \rightarrow (G, H)\}$, while the restricted size Ramsey number $r^{*}(G, H)$ is defined as $r^{*}(G, H) = min\{|E (F)|: F \rightarrow (G, H) , |V (F) | = r(G, H)\}$. In this paper we determine previously unknown restricted size Ramsey numbers $r^{*}(P_3, C_n)$ for $7 \leq n \leq 12$. We also give new upper bound $r^{*}(P_3, C_n) \leq 2n-2$ for even $n \geq 8$.
• We prove that for any dimension function $h$ with $h \prec x^d$ and for any countable set of linear patterns, there exists a compact set $E$ with $\mathcal{H}^h(E)>0$ avoiding all the given patterns. We also give several applications and recover results of Keleti, Maga, and Mathe.
• We perform a systematic study in the computational complexity of the connected variant of three related transversal problems: Vertex Cover, Feedback Vertex Set, and Odd Cycle Transversal. Just like their original counterparts, these variants are NP-complete for general graphs. However, apart from the fact that Connected Vertex Cover is NP-complete for line graphs (and thus for claw-free graphs) not much is known when the input is restricted to $H$-free graphs. We show that the three connected variants remain NP-complete if $H$ contains a cycle or claw. In the remaining case $H$ is a linear forest. We show that Connected Vertex Cover, Connected Feedback Vertex Set, and Connected Odd Cycle Transversal are polynomial-time solvable for $sP_2$-free graphs for every constant $s\geq 1$. For proving these results we use known results on the price of connectivity for vertex cover, feedback vertex set, and odd cycle transversal. This is the first application of the price of connectivity that results in polynomial-time algorithms.
• Seymour's Splitter Theorem is a basic inductive tool for dealing with $3$-connected matroids. This paper proves a generalization of that theorem for the class of $2$-polymatroids. Such structures include matroids, and they model both sets of points and lines in a projective space and sets of edges in a graph. A series compression in such a structure is an analogue of contracting an edge of a graph that is in a series pair. A $2$-polymatroid $N$ is an s-minor of a $2$-polymatroid $M$ if $N$ can be obtained from $M$ by a sequence of contractions, series compressions, and dual-contractions, where the last are modified deletions. The main result proves that if $M$ and $N$ are $3$-connected $2$-polymatroids such that $N$ is an s-minor of $M$, then $M$ has a $3$-connected s-minor $M'$ that has an s-minor isomorphic to $N$ and has $|E(M)| - 1$ elements unless $M$ is a whirl or the cycle matroid of a wheel. In the exceptional case, such an $M'$ can be found with $|E(M)| - 2$ elements.
• In this paper we show how polynomial walks can be used to establish a twisted recurrence for sets of positive density in $\mathbb{Z}^d$. In particular, we prove that if $\Gamma \leq \operatorname{GL}_d(\mathbb{Z})$ is finitely generated by unipotents and acts irreducibly on $\mathbb{R}^d$, then for any set $B \subset \mathbb{Z}^d$ of positive density, there exists $k \geq 1$ such that for any $v \in k \mathbb{Z}^d$ one can find $\gamma \in \Gamma$ with $\gamma v \in B - B$. Our method does not require the linearity of the action, and we prove a twisted recurrence for semigroups of maps from $\mathbb{Z}^d$ to $\mathbb{Z}^d$ satisfying some irreducibility and polynomial assumptions. As one of the consequences, we prove a non-linear analog of Bogolubov's theorem -- for any set $B \subset \mathbb{Z}^2$ of positive density, and $p(n) \in \mathbb{Z}[n]$, with $p(0) = 0$ and $\operatorname{deg}(p) \geq 2$, there exists $k \geq 1$ such that $k \mathbb{Z} \subset \{ x - p(y) \, | \, (x,y) \in B-B \}$. Unlike the previous works on twisted recurrence that used recent results of Benoist-Quint and Bourgain-Furman-Lindenstrauss-Mozes on equidistribution of random walks on automorphism groups of tori, our method relies on the classical Weyl equidistribution for polynomial orbits on tori.
• Here we prove that Reed Conjecture is valid for P5, Flag_Complement-free graphs where FlagComplement is the complement of the Flag graph. Some of the known results follow as corollaries to our result. Reed conjecture is still open in general.

Mario Jun 08 2016 06:58 UTC

Too bad, the paper has been withdrawn due to a mistake :-/

Joshua Lockhart May 12 2016 12:14 UTC

Some of the figures in your bound entanglement paper look spookily like some of our graphs! Thanks for highlighting these connections Māris, I appreciate it.

Māris Ozols May 12 2016 07:07 UTC

You introduce some very interesting concepts in this paper! I just wanted to point out some connections that might be interesting to explore.

**Hamiltonian complexity**

The density matrix in your eq. (2) looks exactly like 2-local Hamiltonian that encodes classical computation in its ground state

...(continued)
Tom Wong Nov 09 2015 11:12 UTC

This resolves an open problem of whether the procedure of Emms et al (2006), which is based on quantum walks, can distinguish all non-isomorphic strongly regular graphs. Their conclusion: no, because they came up with an example where the procedure fails.

Zoltán Zimborás Sep 18 2015 04:26 UTC

I can only quote Derrick Stolee: 'Terry Tao just dropped a bomb'. :)

Omar Shehab Jul 01 2014 20:55 UTC

In the last paragraph of the first column of page 3 says,

> This space contains $2^{NU}$ strings, and we have just send that $N!$
> of these strings $p_\pi$ encode permutations $\pi$.

I have following confusions.

- First of all, $\pi$ is a single definite permutation. So the sentence says

...(continued)
Omar Shehab Jul 01 2014 19:16 UTC

I think I know what is going on there. $\pi_{i,j}$ is just 0 or 1 and will be the corresponding digit of the binary representation of $\pi_i$.

Omar Shehab Jul 01 2014 19:03 UTC

I am little confused about equation 3 on page 3. It is,

$\pi_i=\sum^{U-1}_{j = 0} \pi_{i,j}(2)^j$

I have no clue what $\pi_{i, j}$ is. Any idea from anyone? Let $\pi_i = 3$ and $U = 2$. What should be the values of $\pi_{i,0}$ and $\pi_{i,1}$?

TQC 2014 Program Committee Jun 03 2014 10:43 UTC

### Reviewer 1 ###

The paper investigates a generalization of the notion of quantum colorings, and their associated nonlocal games, to graph homomorphisms.

A homomorphism from a graph $X$ to a graph $Y$ is a mapping $f$ from the vertices of $X$ to the vertices of $Y$ that preserves edge relat

...(continued)
TQC 2014 Program Committee Jun 03 2014 10:31 UTC

### Reviewer 1 ###

The main topic of study is the zero-error capacity of a classical communication system with a noisy classical channel, complemented with side information passing via a perfect noiseless quantum channel, in the form of shared entanglement between sender and receiver.

The math

...(continued)