OCW/DMD 2003, Invited and Contributed Talks: Abstracts (36 talks) INVITED TALKS IN ORDER OF APPEARANCE (8 talks) Nick Wormald (University of Waterloo) Title: Two choices are better than one, but by how much? Abstract: Many structures have been studied which are built by the successive random insertions of elements. Examples include balls-in-bins situations and random graphs. If a structure is built by the arrival of items which have a choice of two random places to be inserted, rather than just one, then by choosing judiciously, one can alter the properties of a typical structure. This phenomenon has been investigated for some time in applications to hashing, routing, and load balancing of processors. I will discuss some recent problems which this idea has opened up for random graphs, and some of the methods which can be used to tackle them. Brian Alspach (University of Regina) Title: Poker and Mathematics Abstract: This is a talk aimed at a general audience discussing the interaction between poker and mathematics. Poker anecdotes will be mixed with an examination of the role of mathematics in poker, and some of the mathematical problems arising from poker. Sylvia Boyd (University of Ottawa) Title: Methods for hard combinatorial optimization problems -- a guided tour Abstract: Many combinatorial optimization problems of practical importance are known to be NP-hard, and thus no efficient techniques are currently known for solving them. A prime example is the Travelling Salesman Problem (TSP), which has applications in areas such as printed circuit board production, vehicle routing and genetic engineering. In this talk we will use the TSP as the example to give a "guided tour" of some of the techniques and approaches used to find provably good solutions for hard combinatorial optimization problems. Ram Murty (Queen's University) Title: Ramanujan Graphs Abstract: The theory of Ramanujan graphs has become significant in communication theory in that it solves an important extremal problem. However, their explicit construction is still shrouded in mystery. At present, all explicit constructions rely heavily on number theory, algebraic geometry and representation theory. In this talk, we will give a leisurely survey of this exciting area. The talk should be accessible to undergraduates. Bill Cunningham (University of Waterloo) Title: Even Factors in Digraphs Abstract: An even factor in a digraph is a set of even cycles including each vertex exactly once. If the digraph is symmetric, then it has an even factor if and only if the underlying undirected graph has a perfect matching. I will describe results on even factors that extend basic results on matching, and will also indicate some limitations, some useful techniques, and some further generalizations. This is based on joint work with Jim Geelen. Endre Szemerédi (Rutgers University) Title: Long Arithmetic Progressions in Sum-set sums. Abstract: Given a set A, define S_A = { \sum_{a \in B} a: B \subseteq A }. We are going to prove that if A is a subset of the first n integers with at least c n^{0.5} elements, then S_A contains an arithmetic progression of length n. As a corollary, we are going to present a proof for an old conjecture of Erdos and Folkman. This is join work with Van Vu. Clement Lam (Concordia University) Title: Block design existence -- when it rains, it pours Abstract: In some recent papers (JCTA, Vol. 92, p. 186-196 and JCD, Vol. 9, p. 363-376), a huge number of block designs with the classical parameters were constructed, starting from just a single design. The basic idea is that the single design can be partitioned into two parts, and that the parts can be combined together in an exponential number of ways. In this talk, we shall see examples of how this idea works, and speculate how it can be used in a computer enumeration. Brian Alspach (University of Regina) Title: Searching and Sweeping Graphs Abstract: A problem of practical importance is the following: Given an intruder in a graph, what must be done to find the intruder? For example, a person lost or hiding in a cave system fits into this model, or a piece of nasty software roaming through a computer network fits into the model. This talk will survey some of the work done on this problem as well as look at some new research. CONTRIBUTED TALKS IN ORDER OF APPEARANCE (28 talks) Julie Anne Cain (Dept. Mathematics and Statistics, University of Melbourne) Title: Load balancing as a random graph process Abstract: A simple example of a load balancing problem consists of a set of N discs in parallel and a set of M requests for data stored on the discs. It was shown by Azar, Broder, Karlin and Upfal that if we have 2 instead of 1 randomly distributed copies of each piece of data, and we sequentially allocate each request to the least loaded of the 2 discs containing a copy of the required data, then the maximum load is exponentially reduced from (when M = N) (1 + o(1)) ln N= ln ln N to ln ln N= ln 2 +O(1). In the case of 2 copies, an oine allocation algorithm can be represented as a random graph process. From a result of Pittel, Spencer and Wormald on the emergence of k-cores in random graphs we know that when the ratio c = M=N is less than the threshold for the existence of a k-core (for some integer k) then there is an allocation method which results in maximum load being at most k 1 a.a.s. as N ! 1. Further, if we make a little more eort with our assignment algorithm we can achieve the same maximum load for even larger c. This algorithm is analysed using a dierential equation method. Sebastian Cioaba (Department of Mathematics and Statistics, Queen's University) Title: Bounds on the Turan density of PG(3,2) Abstract: Bounds on the Turan density of PG(3,2) are presented. A lower bound of 27/32=0.84375 is obtained by a construction. Using a method of de Caen and Furedi for determining the Turan density of PG(2,2), an upper bound of 27/28=0.96428... is determined. Graeme Kemkes (Dept. of Combinatorics and Optimization, University of Waterloo) Title: Finding Hamilton Cycles in Random Graphs Abstract: No one knows of an efficient method for finding Hamilton Cycles in graphs. So, people are designing algorithms which can find Hamilton Cycles efficiently in "most graphs". We will talk about some of these algorithms and see how random graphs can be used to analyze their behaviour. Atefeh Mashatan (Dept. of Combinatorics and Optimization, University of Waterloo) Title: Asymptotics of Combinatorial Structures with Large Smallest Component Abstract: We study the probability of connectedness for structures of size $n$ when all components must have size at least $m$. In the border between almost certain connectedness and almost certain disconnectedness, we encounter a generalized Buchstab function of $n/m$. Marni Mishna (LaCIM, Université de Québec à Montréal) Title: New algorithms for symmetric functions useful in combinatorial enumeration Abstract: The vector space of symmetric functions possesses a well-known scalar product which has a variety of combinatorial applications. This scalar product has been used to express generating functions of combinatorial objects, and I. Gessel has determined some conditions to determine when these series are D-finite. That is, when do such series satisfy a differential equation with polynomial coefficients? We extend Gessel's work by providing algorithms that compute the differential equations these generating functions satisfy. More precisely, we will outline algorithms to compute the differential equation satisfied by the scalar product of two series of symmetric functions, under certain finiteness and D-finiteness conditions. These algorithms use Groebner bases in the algebra of differential operators. Applications of this algorithm include: x Enumeration of regular graphs, generalized involutions, latin squares...; x An effective inner product of symmetric functions, (also known as the tensor or Kronecker product) under similar initial conditions. More generally, we will discuss the potential uses of the theory of holonomy and D-finite functions in the realm of enumerative combinatorics. John P. Steinberger (Dept. of Combinatorics and Optimization, University of Waterloo) Title: Tilings of R and roots of unity Abstract: We shall give a brief introduction to tilings of the real line by translates of stacked clusters, and detail the connection between these tilings and vanishing sums of roots of unity. (A "stacked cluster" is a fancy word for a non-negative integer-valued function over the integers.) As time permits, we shall show some new constructions for stacked clusters with exotic tiling properties, and show a new visualization device for vanishing sums of roots of unity. Julian West (Malaspina University-College, University of Victoria) Title: Perfect matchings for the Gale-Robinson sequence Abstract: A domino is a rectangle of dimensions 1 by 2. An "Aztec diamond" of order n is a diamond-shape array of squares with height and width 2n. The number of different ways of covering an Aztec diamond of order n with dominos is 2^{n(n+1)/2}. (Alternatively this can be viewed as the number of perfect matchings in the dual graph.) There are a number of attractive proofs of this formula, notably the "condensation" proof used by Eric Kuo to verify the recursion formula. We will generalize this proof to the "Gale-Robinson" recurrences, which have the form a(n)a(n-m) = a(n-i)a(n-j) + a(n-k)a(n-l), where i+j=k+l=m. (The Aztec diamond recurrence corresponds to the case of i=j=k=l=1.) In the process, we construct graphs analogous to the Aztec diamonds and in which the number of perfect matchings are given by the appropriate term in the Gale-Robinson sequence. Joint work with Mireille Bousquet-Melou (Bordeaux), Jim Propp (Brandeis) Natasa Przulj (Dept. of Computer Science, University of Toronto) Title: $2$-tree probe interval graphs have a large obstruction set Abstract: Probe interval graphs are used as a generalization of interval graphs in physical mapping of DNA. $G=(V,E)$ is a \emph{probe interval graph (PIG)} with respect to a partition $(P,N)$ of $V$ if vertices of $G$ correspond to intervals on a real line and two vertices are adjacent if and only if their corresponding intervals intersect and at least one of them is in $P$; vertices belonging to $P$ are called \emph{probes} and vertices belonging to $N$ are called \emph{non-probes}. This definition gives rise to two PIG recognition problems, namely when the $(P,N)$ partition of $V$ is given, and when it is not. The first problem has been solved efficiently; however, the second remains open and is the subject of this paper. One common approach to studying the structure of a new family of graphs is to determine if there is a concise family of forbidden induced subgraphs. It has been shown that there are $2$ forbidden induced subgraphs that characterize tree PIGs. In this paper we show that having a concise forbidden induced subgraph characterization does not extend to $2$-tree PIGs; in particular we show that there are at least $62$ minimal forbidden induced subgraphs for $2$-tree PIGs. Anna Bretscher (Dept. of Computer Science, University of Toronto) Title: A Simple Linear Time LexBFS Cograph Recognition Algorithm Abstract: We introduce a new simple linear time algorithm to recognize cographs (graphs without an induced). Unlike other cograph recognition algorithms, the new algorithm is based on Lexicographic Breadth First Search (LexBFS), and uses a new variant of LexBFS, called LexBFS , operating on the complement of the given graph G and breaking ties with respect to an initial LexBFS. The algorithm uses an initial LexBFS and two LexBFS-sweeps to produce the cotree of G or identify an induced. Marina Sokolova (S.I.T.E., University of Ottawa) Title: The Decision List Machine with Half-Spaces Abstract: We examine the decision list machine (DLM) when it uses data-dependent alf-spaces for its set of features. The algorithm allows a trade-off between raining accuracy and complexity (classifier size). We introduce a compression scheme which enables us to bound the DLM's generalization error in terms of the number of training errors and he number of half-spaces it achieves on the training data. Furthermore, we how that our bound on the generalization error provides an effective guide or model selection. We also show that on some natural data sets the DLM provides a favor- ble alternative to such learning algorithms as the support vector machine nd the set covering machine with half-spaces. Compared to the support ector machine, the DLM with data-dependent half-spaces produces sub- tantially sparser classifiers with comparable (and sometimes better) gener- lization. Reza Naseras (Department of Mathematics, Simon Fraser University) Title: $K_5$-free Bound for the calss of Planar Graphs Abstract: We define $k$-{\rm diverse} coloring of a graph to be a proper vertex coloring in which every vertex $x$, sees $min \{ k, d(x)\}$ different colors in its neighbours. We show that for given $k$ there is an $f(k)$ for which every planar graph admits a $k$-diverse coloring using at most $f(k)$ colors. Then using this coloring we obtain a $K_5$-free graph $H$ for which every planar graph admits a homomorphism to it, thus another proof for the result of J. Ne\v set\v ril, P. O. De Mendez. Gabriel Verret (University of Ottawa) Title: Mobility of Graphs Abstract: Let $G$ be a graph and $g \in {\rm Aut}(G)$. The {\em mobility} of $g$, denoted by ${\rm Mob}(g)$, is defined as $\min_{v \in {\rm V}(G)}{\rm d}_G(v,g(v))$. The {\em (absolute) mobility} of the graph $G$, denoted by $ {\rm Mob}(G)$, is defined as $\min_{g \in {\rm Aut}(G)}{\rm Mob}(g)$. The {\em relative mobility} of the graph $G$ is ${\rm mob}(G) = \frac{{\rm Mob}(G)}{{\rm diam}(G)}$, where ${\rm diam}(G)$ denotes the diameter of $G$. A direct application of ``Burnside's Lemma" yields that vertex-transitive graphs have non-zero mobility. I will show that this bound is sharp; that is, for any $\varepsilon 0$, there exists a vertex-transitive graph with relative > mobility less than $\varepsilon$, and show how to construct a vertex-transitive graph of mobility $m$ and diameter $d$ for all integers $0