- arXiv.org
- Popular Physics
- Space Physics
- Data Analysis, Statistics and Probability
- General Physics
- Optics
- Physics and Society
- Atomic and Molecular Clusters
- Fluid Dynamics
- Biological Physics
- History and Philosophy of Physics
- Geophysics
- Atomic Physics
- Plasma Physics
- Medical Physics
- Atmospheric and Oceanic Physics
- Instrumentation and Detectors
- Computational Physics
- Chemical Physics
- Classical Physics
- Accelerator Physics
- Physics Education

- Analysis of PDEs
- Statistics Theory
- Number Theory
- Information Theory
- History and Overview
- Algebraic Geometry
- Mathematical Physics
- Complex Variables
- Representation Theory
- Probability
- Group Theory
- Combinatorics
- Operator Algebras
- Metric Geometry
- Symplectic Geometry
- Quantum Algebra
- Differential Geometry
- Optimization and Control
- Dynamical Systems
- Numerical Analysis
- Geometric Topology
- General Topology
- Logic
- General Mathematics
- Spectral Theory
- Classical Analysis and ODEs
- Algebraic Topology
- Functional Analysis
- Rings and Algebras
- Commutative Algebra
- Category Theory
- K-Theory and Homology

- General Literature
- Symbolic Computation
- Information Retrieval
- Computational Complexity
- Information Theory
- Multiagent Systems
- Formal Languages and Automata Theory
- Other Computer Science
- Sound
- Social and Information Networks
- Databases
- Computer Vision and Pattern Recognition
- Learning
- Numerical Analysis
- Neural and Evolutionary Computing
- Programming Languages
- Operating Systems
- Software Engineering
- Emerging Technologies
- Computational Engineering, Finance, and Science
- Discrete Mathematics
- Distributed, Parallel, and Cluster Computing
- Systems and Control
- Hardware Architecture
- Computer Science and Game Theory
- Digital Libraries
- Artificial Intelligence
- Cryptography and Security
- Human-Computer Interaction
- Performance
- Mathematical Software
- Data Structures and Algorithms
- Robotics
- Multimedia
- Computation and Language
- Computational Geometry
- Networking and Internet Architecture
- Computers and Society
- Logic in Computer Science
- Graphics

- Jun 27 2017 math.CO arXiv:1706.08465v1Let $P^k_\ell$ denote the loose $k$-path of length $\ell$ and let define $f^k_\ell(n,m)$ as the minimum value of $\Delta(H)$ over all $P^k_\ell$-free $k$-graphs $H$ with $n$ vertices and $m$ edges. In the paper we study the behavior of $f^4_2(n,m)$ and $f^3_3(n,m)$ and characterize the structure of extremal hypergraphs. In particular, it is shown that when $m\sim n^2/8$ the value of each of these functions drops down from $\Theta(n^2)$ to $\Theta(n)$.
- In the game of Cops and Robbers, a team of cops attempts to capture a robber on a graph $G$. All players occupy vertices of $G$. The game operates in rounds; in each round the cops move to neighboring vertices, after which the robber does the same. The minimum number of cops needed to guarantee capture of a robber on $G$ is the cop number of $G$, denoted $c(G)$, and the minimum number of rounds needed for them to do so is the capture time. It has long been known that the capture time of an $n$-vertex graph with cop number $k$ is $O(n^{k+1})$. More recently, Bonato, Golovach, Hahn, and Kratochvíl (2009) and Gavenčiak (2010) showed that for $k = 1$, this upper bound is not asymptotically tight: for graphs with cop number 1, the cop can always win within $n-4$ rounds. In this paper, we show that the upper bound is tight when $k \ge 2$: for fixed $k \ge 2$, we construct arbitrarily large graphs $G$ having capture time at least $\left (\frac{\vert V(G) \vert}{40k^4}\right )^{k+1}$. In the process of proving our main result, we establish results that may be of independent interest. In particular, we show that the problem of deciding whether $k$ cops can capture a robber on a directed graph is polynomial-time equivalent to deciding whether $k$ cops can capture a robber on an undirected graph. As a corollary of this fact, we obtain a relatively short proof of a major conjecture of Goldstein and Reingold (1995), which was recently proved through other means (Kinnersley, 2015).
- We consider uniform random permutations in proper substitution-closed classes and study their limiting behavior in the sense of permutons. The limit depends on the generating series of the simple permutations in the class. Under a mild sufficient condition, the limit is an elementary one-parameter deformation of the limit of uniform separable permutations, previously identified as the Brownian separable permuton. This limiting object is therefore in some sense universal. We identify two other regimes with different limiting objects. The first one is degenerate; the second one is nontrivial and related to stable trees. These results are obtained thanks to a characterization of permuton convergence by convergence of expected pattern densities. The limit of expected pattern densities is then computed by using the substitution tree encoding of permutations and performing singularity analysis on the tree series.
- Jun 27 2017 math.CO arXiv:1706.08330v1We prove that one-ended graphs whose end is undominated and has finite vertex degree have tree-decompositions that display the end and that are invariant under the group of automorphisms. This can be applied to prove a conjecture of Halin from 2000 and solves a recent problem of Boutin and Imrich. Furthermore, it implies for every transitive one-ended graph that its end must have infinite vertex degree.
- Inspired by Andrews' 2-colored generalized Frobenius partitions, we consider certain weighted 7-colored partition functions and establish some interesting Ramanujan-type identities and congruences. Moreover, we provide combinatorial interpretations of some congruences modulo 5 and 7. Finally, we study the properties of weighted 7-colored partitions weighted by the parity of certain partition statistics.
- Lists of equivalence classes of words under rotation or rotation plus reversal (i.e., necklaces and bracelets) have many uses, and efficient algorithms for generating these lists exist. In combinatorial group theory elements of a group are typically written as words in the generators and their inverses, and necklaces and bracelets correspond to conjugacy classes and relators respectively. We present algorithms to generate lists of freely and cyclically reduced necklaces and bracelets in free groups. Experimental evidence suggests that these algorithms are CAT -- that is, they run in constant amortized time.
- We compute the elementary divisors of the adjacency and Laplacian matrices of families of polar graphs. These graphs have as vertices the isotropic one-dimensional subspaces of finite vector spaces with respect to non-degenerate forms, with adjacency given by orthogonality.
- Jun 27 2017 math.CO arXiv:1706.08165v1Let $\Lambda_3$ be the lattice graph whose vertex set is the lattice $\mathbb{Z}^3$ with exactly one edge between each two vertices if and only if their Euclidean distance is 1. We prove that there do not exist non-lattice-like perfect dominating sets in $\Lambda_3$ whose components are all squares, but that there exists exactly one lattice-like perfect dominating set in $\Lambda_3$ whose components are all squares.
- A convex polygon Q is circumscribed about a convex polygon P if every vertex of P lies on at least one side of Q. We present an algorithm for finding a maximum area convex polygon circumscribed about any given convex n-gon in O(n^3) time. As an application, we disprove a conjecture of Farris. Moreover, for the special case of regular n-gons we find an explicit solution.
- Jun 27 2017 math.CO arXiv:1706.08134v1Let $F$, $G$ and $H$ be simple graphs. We say $F \rightarrow (G, H)$ if for every $2$-coloring of the edges of $F$ there exists a monochromatic $G$ or $H$ in $F$. The Ramsey number $r(G, H)$ is defined as $r(G, H) = min\{|V (F)|: F \rightarrow (G, H)\}$, while the restricted size Ramsey number $r^{*}(G, H)$ is defined as $r^{*}(G, H) = min\{|E (F)|: F \rightarrow (G, H) , |V (F) | = r(G, H)\}$. In this paper we determine previously unknown restricted size Ramsey numbers $r^{*}(P_3, C_n)$ for $7 \leq n \leq 12$. We also give new upper bound $r^{*}(P_3, C_n) \leq 2n-2$ for even $n \geq 8$.
- We prove that for any dimension function $h$ with $h \prec x^d$ and for any countable set of linear patterns, there exists a compact set $E$ with $\mathcal{H}^h(E)>0$ avoiding all the given patterns. We also give several applications and recover results of Keleti, Maga, and Mathe.
- We perform a systematic study in the computational complexity of the connected variant of three related transversal problems: Vertex Cover, Feedback Vertex Set, and Odd Cycle Transversal. Just like their original counterparts, these variants are NP-complete for general graphs. However, apart from the fact that Connected Vertex Cover is NP-complete for line graphs (and thus for claw-free graphs) not much is known when the input is restricted to $H$-free graphs. We show that the three connected variants remain NP-complete if $H$ contains a cycle or claw. In the remaining case $H$ is a linear forest. We show that Connected Vertex Cover, Connected Feedback Vertex Set, and Connected Odd Cycle Transversal are polynomial-time solvable for $sP_2$-free graphs for every constant $s\geq 1$. For proving these results we use known results on the price of connectivity for vertex cover, feedback vertex set, and odd cycle transversal. This is the first application of the price of connectivity that results in polynomial-time algorithms.
- Jun 27 2017 math.CO arXiv:1706.08027v1Seymour's Splitter Theorem is a basic inductive tool for dealing with $3$-connected matroids. This paper proves a generalization of that theorem for the class of $2$-polymatroids. Such structures include matroids, and they model both sets of points and lines in a projective space and sets of edges in a graph. A series compression in such a structure is an analogue of contracting an edge of a graph that is in a series pair. A $2$-polymatroid $N$ is an s-minor of a $2$-polymatroid $M$ if $N$ can be obtained from $M$ by a sequence of contractions, series compressions, and dual-contractions, where the last are modified deletions. The main result proves that if $M$ and $N$ are $3$-connected $2$-polymatroids such that $N$ is an s-minor of $M$, then $M$ has a $3$-connected s-minor $M'$ that has an s-minor isomorphic to $N$ and has $|E(M)| - 1$ elements unless $M$ is a whirl or the cycle matroid of a wheel. In the exceptional case, such an $M'$ can be found with $|E(M)| - 2$ elements.
- In this paper we show how polynomial walks can be used to establish a twisted recurrence for sets of positive density in $\mathbb{Z}^d$. In particular, we prove that if $\Gamma \leq \operatorname{GL}_d(\mathbb{Z})$ is finitely generated by unipotents and acts irreducibly on $\mathbb{R}^d$, then for any set $B \subset \mathbb{Z}^d$ of positive density, there exists $k \geq 1$ such that for any $v \in k \mathbb{Z}^d$ one can find $\gamma \in \Gamma$ with $\gamma v \in B - B$. Our method does not require the linearity of the action, and we prove a twisted recurrence for semigroups of maps from $\mathbb{Z}^d$ to $\mathbb{Z}^d$ satisfying some irreducibility and polynomial assumptions. As one of the consequences, we prove a non-linear analog of Bogolubov's theorem -- for any set $B \subset \mathbb{Z}^2$ of positive density, and $p(n) \in \mathbb{Z}[n]$, with $p(0) = 0$ and $\operatorname{deg}(p) \geq 2$, there exists $k \geq 1$ such that $k \mathbb{Z} \subset \{ x - p(y) \, | \, (x,y) \in B-B \}$. Unlike the previous works on twisted recurrence that used recent results of Benoist-Quint and Bourgain-Furman-Lindenstrauss-Mozes on equidistribution of random walks on automorphism groups of tori, our method relies on the classical Weyl equidistribution for polynomial orbits on tori.
- Jun 27 2017 math.CO arXiv:1706.07906v1Here we prove that Reed Conjecture is valid for P5, Flag_Complement-free graphs where FlagComplement is the complement of the Flag graph. Some of the known results follow as corollaries to our result. Reed conjecture is still open in general.

Every Runner is Sometimes Lonely

Mario Jun 08 2016 06:58 UTCJoshua Lockhart May 12 2016 12:14 UTC

Some of the figures in your bound entanglement paper look spookily like some of our graphs! Thanks for highlighting these connections Māris, I appreciate it.

Māris Ozols May 12 2016 07:07 UTC

...(continued)You introduce some very interesting concepts in this paper! I just wanted to point out some connections that might be interesting to explore.

**Hamiltonian complexity**

The density matrix in your eq. (2) looks exactly like 2-local Hamiltonian that encodes classical computation in its ground state

Tom Wong Nov 09 2015 11:12 UTC

This resolves an open problem of whether the procedure of Emms et al (2006), which is based on quantum walks, can distinguish all non-isomorphic strongly regular graphs. Their conclusion: no, because they came up with an example where the procedure fails.

Zoltán Zimborás Sep 18 2015 04:26 UTC

I can only quote Derrick Stolee: 'Terry Tao just dropped a bomb'. :)

Omar Shehab Jul 01 2014 20:55 UTC

...(continued)In the last paragraph of the first column of page 3 says,

> This space contains $2^{NU}$ strings, and we have just send that $N!$

> of these strings $p_\pi$ encode permutations $\pi$.I have following confusions.

- First of all, $\pi$ is a single definite permutation. So the sentence says

Omar Shehab Jul 01 2014 19:16 UTC

I think I know what is going on there. $\pi_{i,j}$ is just 0 or 1 and will be the corresponding digit of the binary representation of $\pi_i$.

Omar Shehab Jul 01 2014 19:03 UTC

I am little confused about equation 3 on page 3. It is,

$\pi_i=\sum^{U-1}_{j = 0} \pi_{i,j}(2)^j$

I have no clue what $\pi_{i, j}$ is. Any idea from anyone? Let $\pi_i = 3$ and $U = 2$. What should be the values of $\pi_{i,0}$ and $\pi_{i,1}$?

TQC 2014 Program Committee Jun 03 2014 10:43 UTC

...(continued)### Reviewer 1 ###

The paper investigates a generalization of the notion of quantum colorings, and their associated nonlocal games, to graph homomorphisms.

A homomorphism from a graph $X$ to a graph $Y$ is a mapping $f$ from the vertices of $X$ to the vertices of $Y$ that preserves edge relat

TQC 2014 Program Committee Jun 03 2014 10:31 UTC

...(continued)### Reviewer 1 ###

The main topic of study is the zero-error capacity of a classical communication system with a noisy classical channel, complemented with side information passing via a perfect noiseless quantum channel, in the form of shared entanglement between sender and receiver.

The math