SlideShare a Scribd company logo
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

THE RESULT FOR THE GRUNDY NUMBER ON P4CLASSES
Ali Mansouri1 and Mohamed Salim bouhlel 2
1

Department of Electronic Technologies of Information and Telecommunications Sfax,
Tunisia
2
Department of Electronic Technologies of Information and Telecommunications Sfax,
Tunisia

ABSTRACT
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works
attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the
form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation
of frequency
We study a new class of graphs, the fat-extended P4 graphs, and we give a polynomial time algorithm to
calculate the Grundy number of the graphs in this class. This result implies that the Grundy number can be
found in polynomial time for many graphs

KEYWORDS
Graph Theory, Grundy number, P4-classes, Total graph, Graph coloring, Wireless Network, Mobile
Network,

1. INTRODUCTION
We denoted a graph G by G = (V, E) and an order θ = v1, . . . , vn over V, for coloring the vertices
of G, we used the polynomial algorithm, we affected to vi the minimum positive integer that was
not affected to its neighborhood in the set {v1, . . . , v i−1}[10].
The execution of this algorithm for a graph give a coloring that we can gives name as a greedy
coloring.
The greedy coloring of a graph G is characterized by the maximum number of colors of, over all
the orders θ of V (G) is the Grundy number of G; we represented by Γ (G) the grundy number of
graph. [10]. the Grundy number is considered NP-complete [9]. We can show a graph G and an
integer r it is a coNP-complete problem to decide if the grundy number of G respect the
following condition Γ (G) ≤ χ + r [9] or if Γ (G) ≤ r × χ (G) or if Γ (G) ≤ c × ω (G) [2]. In the next
section, we study the polynomial time algorithms to determinate the Grundy number of many
classes of graphs like the cographs [4], the trees [5] and the k-partial trees [8].

DOI:10.5121/jgraphoc.2013.5402

19
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

2. RELATED WORKS
This parameter was introduced by Christen and Selkow [11] in 1979. They proved that
determining the Grundy number is NP-complete for general graphs (also studied by McRae in
1994 [AMC94]). In [SST84], Hedetniemi et al. gave a linear algorithm for the Grundy number of
a tree and established a relation between the chromatic number, the Grundy number and the
achromatic number: Ҳ (G) ≤Γ (G) ≤ Ψ (G), where the achromatic number Ψ (G) is the maximum
number of colors used for a proper coloring of G such that each pair of colors appears on at least
one edge of G.
In 1997, Telle and Proskurowski [12] gave an algorithm for the Grundy number of partial k-trees
in O (n3k2) and bounded this parameter for these graphs by the value 1 + k log2 n, where n is the
graph order. In 2000, Dunbar et al. used the Grundy number to bound new parameters that they
introduced in [13], the chromatic and the achromatic numbers of a fall coloring.
Recently, Germain and Kheddouci studied in [14], the Grundy coloring of power graphs. They
gave bounds for the Grundy number of the power graphs of a path, a cycle, a caterpillar and a
complete binary tree. Such colorings are also explored for other graphs like chessboard graphs
[15].
Hedetniemi et al. (1982 determinate an algorithm witch can gives a solution for this problem on
trees; and an algorithm on partial k-trees gives by Telle and Proskurowski (1997). The problem
was shown to be NP-complete on directed graphs Christen and Selkow (1979).

3. FAT EXTENDED P4-LADEN GRAPHS
In this section, we give some definitions. In first time, we denote G by G = (V, E) is a graph and S
is a subset of V (G) [10].The subgraph of G is represented by G[S]. The module of a graph G is
denoted or represented by M [10]. The sets V and {x}, for every x ∈ V, are trivial modules, the
last one being called as a singleton module.
We called graph prime if this graph have all of modules are trivial. M is considered like a strong
module of G if this condition is approved “|for every module M′ of G, either M′∩M = ∅ or M ⊂
M or M′⊂ M” [10].
We denoted by r an internal node of T(G), we denoted by M(r) the set of leaves of the sub tree of
T(G) , also we denoted by V (r) = {r1, . . . , rk} the children of r in T(G). After that, If G [M(r)] is
not connected, then we called r a parallel node and the graph G [M (r1)],. . . ,G M (rk)] are define
like its components. Now , If the graph G¯ [M(r)] is not connected , so we called r a set of set
node , G¯ [M (r1)],. . . ,G¯ [M(rk)] define the components of graph. Finally, r is define like a
neighbourhood node and M (r1), . . . , M(rk) is called the unique set of maximal submodules of
M(r) , if the graphs G [M(r)] is connected at G¯ [M(r)]. we denoted, by quotient graph of r, the
G(r), is G [v1, . . . , vk], where vi ∈ M(ri), for 1 ≤ i ≤ k. r is called a fat node, with simple
condition if M(r) is not a singleton module.
We called spider graph, a graph have vertex set can be devised into three sets S, K and R
We denoted a stable set by S, K represents a clique, the set of vertices of R are adjacent to all the
vertices of K and is not adjacent of the vertices of S

20
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

A graph is called a graph split if it is {C5, C4, C¯ 4}-free. [10] A pseudo-split graph is defined as
a {C4, C¯ 4}-free graph. Also, a split graph G = (S∪K, E), its vertex set can be devised into three
disjoint sets S (G), K (G) and R (G)
There is condition must be respected “S(G) ⊆ S and every vertex s ∈ S(G) is not adjacent to at
least one vertex in K, K(G) is the neighborhood of the vertices in S(G) and R(G) = V (G)S(G) ∪
K(G). [10]
Giakoumakis [3] defined a graph G as extended P4-laden graphs if, for all H ⊆ G such that |V
(H)| ≤ 6, then the following statement is true: if H contains more than two induced P4’s, then H is
a pseudo-split graph. We can define an extended P4-laden graph by its modular partition tree
Theorem 1 [3] we denote a graph G by G = (V, E), we denote by T (G) the modular partition tree
and by r the any neighborhood node of T (G),
Then G is extended P4-laden if and only if G(r) is isomorphic to:
(i) a P5 or a P¯ 5 or a C5, and each M(ri) is a singleton module; or
(ii) a spider H = (S∪K ∪R, E) and each M(ri) is a singleton module, except the one corresponding
to R and eventually another one which may have exactly two vertices; or
(iii) a split graph H, whose modules corresponding to the vertices of S(H) are independent sets
and the ones corresponding to the vertices of K(H) are cliques.
We say that a graph is fat-extended P4-laden if its modular decomposition satisfies the Theorem
1, except in the first case, where G(r) is isomorphic to a P5 or a P¯ 5 or a C5, but the maximal
strong modules M(ri), 1 ≤ i ≤ 5, of M(r) are not necessarily singleton modules.

4. GRUNDY NUMBER ON FAT EXTENDED P4-LADEN GRAPHS
From now, let G = (V, E) be a fat-extended P4-laden graph and T (G) its modular decomposition
tree. The modular partition tree T (G) can be determinate in polynomial time [7], we give an
algorithm to determinate Γ (G). We know that the Grundy number of the leaves of T (G) is equal
to one and we show in this section how to determine the Grundy number of G[M(v)], for every
inner node v of T(G), based on the Grundy number of its children.
First, observe that for every series node (resp. parallel node) v of T (G), the Grundy number of
G[M(v)] is equal to the sum of the Grundy number of its children (resp. the maximum Grundy
number of its children) [4]. Thus, we only need to prove that the Grundy number of G [M (v)] can
be found in polynomial time when v is a neighborhood node of T (G).
The following result is a simple generalization of a result due to Asté etal. [2] for the Grundy
number of lexicographic product of graphs:
Proposition 2: Let G, H1, . . . , Hn be disjoint graphs such that n = |V (G)| and let V (G) = {v1, . . .
, vn}. If G′is the graph obtained by replacing vi ∈ V (G) by Hi , then for every greedy coloring of
G′at most Γ(Hi) colors contain vertices of the induced subgraph G′[Hi] ⊆ G′, for all i ∈ {1, . . . ,
n}.
Lemma 3: Let v be a neighborhood node of T(G) isomorphic to a P5 or aC5 or a C¯ 5, v1, . . . , v5
be the children of v and Γi be the Grundy number of G[M(vi)], 1 ≤ i ≤ 5. Then Γ (G [M (v)]) can
be found in constant time.
21
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

Proof: (Sketch) Without loss of generality, suppose that v1, . . . , v5 label the children of v as
depicted in Figure 1 and Hi = Γ(G[M(vi)]). In order to simplify the notation, denote by θi an
ordering over M (vi) that induces a greedy coloring with Γ i colors, 1 ≤ i ≤ 5.
We calculate Γ (G [M (v)]) by verifying all the possible configurations for a greedy Γ (G [M
(v)])-coloring and by returning the greater value found between all the cases. Suppose that G (v)
is isomorphic to a P5. Let S = {S1, . . . , Sk} be a greedy Γ(G[M(v)])-coloring of G[M(v)].
We claim that if there exists a vertex u ∈ V (H1) colored by Sk, then Γ (G [M (v)]) = Γ1 + Γ2. This
fact holds because combining the observation that u has at least one vertex colored by S i , for all i
∈ {1, . . . , k −1}, with the proposition 2, we conclude that Γ(G[M(v)]) ≤ Γ1 + Γ2. On the other
hand, if we consider any ordering θ over G [M (v)] that has starts with θ 1 and θ2, we see that the
first-fit algorithm over this order will produce a greedy coloring with at least Γ1 + Γ2 colors. Using
the symmetry, we can also prove that if u ∈ V (H5), then Γ (G [M (v)]) = Γ4 + Γ5.
All the other cases use similar arguments, that is, by finding an upper bound based on the position
of a vertex colored Sk and a lower bound based in an ordering over M (v). The cases where G (v)
is isomorphic to C5 or P¯ 5 are also proved by using similar arguments [10].
Lemma 4 :Let v be a neighborhood node of T (G) isomorphic to a spider H = (S ∪ K ∪ R, E), fr
be its child corresponding to R, f2 be its child corresponding to the module which has eventually
two vertices and Γ(R) be the Grundy number of G[M(fr)]. Then Γ (G [M (v)]) can be found in
linear time.

Figure 1: Fat neighborhood nodes.

Proof: If M (f2) is singleton module, then G [M (v)] is a spider. In this case, we cannot have two
colors Si and Sj , j > i, such that both contain only vertices of S. For otherwise, since S is a stable
set, the vertices colored Sj would not any neighbor colored Si, a contradiction. Thus, Γ (G [M (v)]
) ≤ 1 + |K| + Γ (R). If R = θ , then an ordering over M (v) such that all the vertices of S come
before the vertices of K induces a greedy coloring with Γ (G[M(v)]) = 1 + |K| colors. If R 6= θ,
we will prove that Γ (G [M (v)] ) ≤ |K| + Γ (R). Observe first that there is at least one color Si
occurring in R. Consequently, Si does not occur in K. Thus, there is no order over M(v) whose
greedy coloring returns a color Sj containing only vertices of S, because a vertex of S colored Sj
would not be adjacent to a vertex colored Si. On the other hand, if θ R is an ordering that induces a
greedy Γ (R)-coloring of R, then any ordering over M(v) starting by θ R induces a greedy coloring
with at least |K| + Γ (R) colors.
The case where M (f2) is not a singleton module is proved using similar arguments. [10]
If G (v) is a split graph H and the factors corresponding to vertices of S (H) are independent sets
and the ones corresponding to vertices of K (H) are cliques, then we can use the same arguments
of Lemma 3.3 observing that S, K and R correspond to S (H), K (H) and R (H), respectively
.
22
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

Theorem 5: If G = (V, E) is a fat-extended P4-laden graph and |V | = n, then Γ (G) can be found
in O (n3).
Proof: The algorithm calculates Γ (G) by traversing the modular decomposition tree of G in a
postorder way and determining the Grundy of each inner node of T (G) based on the Grundy
number of the leaves. The modular decomposition tree can be found in linear time, the postorder
traversal can be done in O (n2) and the Grundy number of each inner node can be found in linear
time, because of Lemmas 3and 4 and the results of Gyarf´as and J.Lehel [4] for cographs.
Corollary 6: Let G be a graph that belongs to one of the following classes:
P4-reducible, extended P4-reducible, P4-sparse, extended P4-sparse, P4-extendible, P4-lite, P4tidy, P4-laden and extended P4-laden. Then, Γ (G) can be found in polynomial time.
Proof: According to definition of these classes [6], they are all strictly contained in the fatextended P4-laden graphs and so the corollary follows.

5. CONCLUSIONS
In the conclusion, we determinate, in first time, a new class of graphs, this class is called the fatextended P4-laden graphs, in second time; we calculate the Grundy number of the graphs in this
class by using a polynomial time algorithm. Finally, we can say that the Grundy number can be
calculated of each node in linear time, so, the total Grundy number of graph can be determinate
in polynomial time.

ACKNOWLEDGEMENTS
I think Mr. Julio Cesar Silva Araujo for his collaboration.

REFERENCES
[1]

J. C. Araujo., “Coloring graphs”,(2009). Master in Science Dissertation, in:
ww.lia.ufc.br/˜juliocesar/dissertacao.pdf (in Portuguese)”.
[2] M., F. Havet & C. Linhares Sales, (2008) “Grundy number and lexicographic product of graphs” in:
International Conference on Relations, Orders and Graphs and their Interaction with Computer
Science
[3] V. Giakoumakis., (1996) “p4-laden graphs: A new class of brittle graphs”, Information
Processing
Letters 60 pp, 29–36.
[4] A, Gyarf´as. & J. Lehel, (1988) “On-line and first fit colorings of graphs”, Journal of Graph Theory
pp. 217–227.
[5] T. Beyer S. M. & S. T. Hedetniemi, (1982) “A linear algorithm for the grundy number of a tree”,
Congressus Numerantium 36, pp. 351–363.
[6] Pedrotti, V, (2007) “Decomposi¸c˜ao modular de grafos n˜ao-orientados,” Master’s thesis,
Universidade Estadual de Campinas
[7] Tedder, M., D. Corneil, & C. Paul, (2007).” Simple, linear-time modular decomposition”.
[8] J, Telle A. & A. Proskurowski, (1997) “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10 pp. 529–550.
[9] M, Zaker, (2005) “Grundy number of the complement of bipartite graphs” Journal of Combinatorics
31 pp. 325––330.
[10] J. C. Silva Ara´ujo, C. L. Sales, (2009) “Grundy number on P4-classes”, Electronic Notes in Discrete
Mathematics, Volume 35, 1, Pages 21–27.
[11] M. Selkow C. & A. Christen (1979) “ Some perfect coloring properties of graphs”, Journal of
Combinatorial Theory B27 ,49-59.
23
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013
[12] A. Proskurowski, & J.A. Telle, (1997), “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10(4), 529-550.
[13] S.M. Hedetniemi, J.E. Dunbar, D.P. Jacobs & J. Knisely, (2000), “Colorings of Graphs”, Journal of
Combinatorial Mathematics and Combinatorial Computing 33 ,257-273.
[14] C. Germain and H. Kheddouci, “Grundy coloring for power caterpillars”, (2000), Proceedings of
International Optimization Conference INOC 2003, 243-247, Evry/Paris France.
[15] J. Rhyne&C. Parks (2002) “Grundy Coloring for Chessboard Graphs”, Seventh North Carolina MiniConference on Graph Theory,

24

More Related Content

What's hot

Chap4
Chap4Chap4
Chap4
nathanurag
 
445 colouring0
445 colouring0445 colouring0
445 colouring0
Praveen Kumar
 
On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs
政謙 陳
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
Tony Cervera Jr.
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Total Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph OperationsTotal Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph Operations
inventionjournals
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
ASPAK2014
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
Mathieu Dutour Sikiric
 
Dynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded TreewidthDynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded Treewidth
ASPAK2014
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
IAEME Publication
 
10.1.1.226.4381
10.1.1.226.438110.1.1.226.4381
10.1.1.226.4381
prakashpvms
 
Mathematicalfoundationofcomputerscience
MathematicalfoundationofcomputerscienceMathematicalfoundationofcomputerscience
Mathematicalfoundationofcomputerscience
jntuworld
 
Important Cuts
Important CutsImportant Cuts
Important Cuts
ASPAK2014
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
Madhumita Tamhane
 
Cs6702 GCC
Cs6702 GCCCs6702 GCC
Cs6702 GCC
stalinjothi
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
Fransiskeran
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signature
mmasdeu
 
Question bank
Question bankQuestion bank
Question bank
chandrashekardk
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
Alexander Decker
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
Hazratali Naim
 

What's hot (20)

Chap4
Chap4Chap4
Chap4
 
445 colouring0
445 colouring0445 colouring0
445 colouring0
 
On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Total Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph OperationsTotal Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph Operations
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
 
Dynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded TreewidthDynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded Treewidth
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
10.1.1.226.4381
10.1.1.226.438110.1.1.226.4381
10.1.1.226.4381
 
Mathematicalfoundationofcomputerscience
MathematicalfoundationofcomputerscienceMathematicalfoundationofcomputerscience
Mathematicalfoundationofcomputerscience
 
Important Cuts
Important CutsImportant Cuts
Important Cuts
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
 
Cs6702 GCC
Cs6702 GCCCs6702 GCC
Cs6702 GCC
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signature
 
Question bank
Question bankQuestion bank
Question bank
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
 

Viewers also liked

apple news app
apple news appapple news app
apple news app
Rick Tsao
 
Lina Cantero
Lina CanteroLina Cantero
2 e
2 e2 e
Power alusivo a blog
Power alusivo a blogPower alusivo a blog
Power alusivo a blog
arbolera
 
Computacion basica
Computacion basicaComputacion basica
Computacion basica
lucy997
 
2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan
Dwi Wisnu
 
Ejemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto FactibleEjemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto Factible
Universidad Panamericana del Puerto
 
12e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c412e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c4
asiehb
 
La playuki
La playukiLa playuki
La playuki
Nombre Apellidos
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
ijait
 
Ns30 laeg
Ns30 laegNs30 laeg
Ns30 laeg
buidinhvan
 
Socialización (básico)
Socialización (básico)Socialización (básico)
Socialización (básico)
hugorangel1950
 
BOSS Hoop It Up
BOSS Hoop It UpBOSS Hoop It Up
Entre rios listado de partidos
Entre rios listado de partidosEntre rios listado de partidos
Entre rios listado de partidos
Dirección Nacional Electoral de Argentina
 

Viewers also liked (15)

apple news app
apple news appapple news app
apple news app
 
Lina Cantero
Lina CanteroLina Cantero
Lina Cantero
 
2 e
2 e2 e
2 e
 
Templete
TempleteTemplete
Templete
 
Power alusivo a blog
Power alusivo a blogPower alusivo a blog
Power alusivo a blog
 
Computacion basica
Computacion basicaComputacion basica
Computacion basica
 
2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan
 
Ejemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto FactibleEjemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto Factible
 
12e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c412e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c4
 
La playuki
La playukiLa playuki
La playuki
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
Ns30 laeg
Ns30 laegNs30 laeg
Ns30 laeg
 
Socialización (básico)
Socialización (básico)Socialización (básico)
Socialización (básico)
 
BOSS Hoop It Up
BOSS Hoop It UpBOSS Hoop It Up
BOSS Hoop It Up
 
Entre rios listado de partidos
Entre rios listado de partidosEntre rios listado de partidos
Entre rios listado de partidos
 

Similar to THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES

On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
josephjonse
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and life
Milan Joshi
 
Ce31342345
Ce31342345Ce31342345
Ce31342345
IJMER
 
Am03102420247
Am03102420247Am03102420247
Am03102420247
ijceronline
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
GiselleginaGloria
 
X4102188192
X4102188192X4102188192
X4102188192
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
graphhoc
 
Ar25260265
Ar25260265Ar25260265
Ar25260265
IJERA Editor
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
Fransiskeran
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
graphhoc
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
ijceronline
 
graph theory
graph theorygraph theory
graph theory
Shashank Singh
 
Aj26225229
Aj26225229Aj26225229
Aj26225229
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
ICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptxICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptx
mathematicssac
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...
Alexander Decker
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
Alexander Decker
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
Alexander Decker
 

Similar to THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES (20)

On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and life
 
Ce31342345
Ce31342345Ce31342345
Ce31342345
 
Am03102420247
Am03102420247Am03102420247
Am03102420247
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
X4102188192
X4102188192X4102188192
X4102188192
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
Ar25260265
Ar25260265Ar25260265
Ar25260265
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
 
graph theory
graph theorygraph theory
graph theory
 
Aj26225229
Aj26225229Aj26225229
Aj26225229
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
ICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptxICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptx
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
graphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
graphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
graphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
graphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
graphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
graphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
graphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES

  • 1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 THE RESULT FOR THE GRUNDY NUMBER ON P4CLASSES Ali Mansouri1 and Mohamed Salim bouhlel 2 1 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia 2 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia ABSTRACT Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation of frequency We study a new class of graphs, the fat-extended P4 graphs, and we give a polynomial time algorithm to calculate the Grundy number of the graphs in this class. This result implies that the Grundy number can be found in polynomial time for many graphs KEYWORDS Graph Theory, Grundy number, P4-classes, Total graph, Graph coloring, Wireless Network, Mobile Network, 1. INTRODUCTION We denoted a graph G by G = (V, E) and an order θ = v1, . . . , vn over V, for coloring the vertices of G, we used the polynomial algorithm, we affected to vi the minimum positive integer that was not affected to its neighborhood in the set {v1, . . . , v i−1}[10]. The execution of this algorithm for a graph give a coloring that we can gives name as a greedy coloring. The greedy coloring of a graph G is characterized by the maximum number of colors of, over all the orders θ of V (G) is the Grundy number of G; we represented by Γ (G) the grundy number of graph. [10]. the Grundy number is considered NP-complete [9]. We can show a graph G and an integer r it is a coNP-complete problem to decide if the grundy number of G respect the following condition Γ (G) ≤ χ + r [9] or if Γ (G) ≤ r × χ (G) or if Γ (G) ≤ c × ω (G) [2]. In the next section, we study the polynomial time algorithms to determinate the Grundy number of many classes of graphs like the cographs [4], the trees [5] and the k-partial trees [8]. DOI:10.5121/jgraphoc.2013.5402 19
  • 2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 2. RELATED WORKS This parameter was introduced by Christen and Selkow [11] in 1979. They proved that determining the Grundy number is NP-complete for general graphs (also studied by McRae in 1994 [AMC94]). In [SST84], Hedetniemi et al. gave a linear algorithm for the Grundy number of a tree and established a relation between the chromatic number, the Grundy number and the achromatic number: Ҳ (G) ≤Γ (G) ≤ Ψ (G), where the achromatic number Ψ (G) is the maximum number of colors used for a proper coloring of G such that each pair of colors appears on at least one edge of G. In 1997, Telle and Proskurowski [12] gave an algorithm for the Grundy number of partial k-trees in O (n3k2) and bounded this parameter for these graphs by the value 1 + k log2 n, where n is the graph order. In 2000, Dunbar et al. used the Grundy number to bound new parameters that they introduced in [13], the chromatic and the achromatic numbers of a fall coloring. Recently, Germain and Kheddouci studied in [14], the Grundy coloring of power graphs. They gave bounds for the Grundy number of the power graphs of a path, a cycle, a caterpillar and a complete binary tree. Such colorings are also explored for other graphs like chessboard graphs [15]. Hedetniemi et al. (1982 determinate an algorithm witch can gives a solution for this problem on trees; and an algorithm on partial k-trees gives by Telle and Proskurowski (1997). The problem was shown to be NP-complete on directed graphs Christen and Selkow (1979). 3. FAT EXTENDED P4-LADEN GRAPHS In this section, we give some definitions. In first time, we denote G by G = (V, E) is a graph and S is a subset of V (G) [10].The subgraph of G is represented by G[S]. The module of a graph G is denoted or represented by M [10]. The sets V and {x}, for every x ∈ V, are trivial modules, the last one being called as a singleton module. We called graph prime if this graph have all of modules are trivial. M is considered like a strong module of G if this condition is approved “|for every module M′ of G, either M′∩M = ∅ or M ⊂ M or M′⊂ M” [10]. We denoted by r an internal node of T(G), we denoted by M(r) the set of leaves of the sub tree of T(G) , also we denoted by V (r) = {r1, . . . , rk} the children of r in T(G). After that, If G [M(r)] is not connected, then we called r a parallel node and the graph G [M (r1)],. . . ,G M (rk)] are define like its components. Now , If the graph G¯ [M(r)] is not connected , so we called r a set of set node , G¯ [M (r1)],. . . ,G¯ [M(rk)] define the components of graph. Finally, r is define like a neighbourhood node and M (r1), . . . , M(rk) is called the unique set of maximal submodules of M(r) , if the graphs G [M(r)] is connected at G¯ [M(r)]. we denoted, by quotient graph of r, the G(r), is G [v1, . . . , vk], where vi ∈ M(ri), for 1 ≤ i ≤ k. r is called a fat node, with simple condition if M(r) is not a singleton module. We called spider graph, a graph have vertex set can be devised into three sets S, K and R We denoted a stable set by S, K represents a clique, the set of vertices of R are adjacent to all the vertices of K and is not adjacent of the vertices of S 20
  • 3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 A graph is called a graph split if it is {C5, C4, C¯ 4}-free. [10] A pseudo-split graph is defined as a {C4, C¯ 4}-free graph. Also, a split graph G = (S∪K, E), its vertex set can be devised into three disjoint sets S (G), K (G) and R (G) There is condition must be respected “S(G) ⊆ S and every vertex s ∈ S(G) is not adjacent to at least one vertex in K, K(G) is the neighborhood of the vertices in S(G) and R(G) = V (G)S(G) ∪ K(G). [10] Giakoumakis [3] defined a graph G as extended P4-laden graphs if, for all H ⊆ G such that |V (H)| ≤ 6, then the following statement is true: if H contains more than two induced P4’s, then H is a pseudo-split graph. We can define an extended P4-laden graph by its modular partition tree Theorem 1 [3] we denote a graph G by G = (V, E), we denote by T (G) the modular partition tree and by r the any neighborhood node of T (G), Then G is extended P4-laden if and only if G(r) is isomorphic to: (i) a P5 or a P¯ 5 or a C5, and each M(ri) is a singleton module; or (ii) a spider H = (S∪K ∪R, E) and each M(ri) is a singleton module, except the one corresponding to R and eventually another one which may have exactly two vertices; or (iii) a split graph H, whose modules corresponding to the vertices of S(H) are independent sets and the ones corresponding to the vertices of K(H) are cliques. We say that a graph is fat-extended P4-laden if its modular decomposition satisfies the Theorem 1, except in the first case, where G(r) is isomorphic to a P5 or a P¯ 5 or a C5, but the maximal strong modules M(ri), 1 ≤ i ≤ 5, of M(r) are not necessarily singleton modules. 4. GRUNDY NUMBER ON FAT EXTENDED P4-LADEN GRAPHS From now, let G = (V, E) be a fat-extended P4-laden graph and T (G) its modular decomposition tree. The modular partition tree T (G) can be determinate in polynomial time [7], we give an algorithm to determinate Γ (G). We know that the Grundy number of the leaves of T (G) is equal to one and we show in this section how to determine the Grundy number of G[M(v)], for every inner node v of T(G), based on the Grundy number of its children. First, observe that for every series node (resp. parallel node) v of T (G), the Grundy number of G[M(v)] is equal to the sum of the Grundy number of its children (resp. the maximum Grundy number of its children) [4]. Thus, we only need to prove that the Grundy number of G [M (v)] can be found in polynomial time when v is a neighborhood node of T (G). The following result is a simple generalization of a result due to Asté etal. [2] for the Grundy number of lexicographic product of graphs: Proposition 2: Let G, H1, . . . , Hn be disjoint graphs such that n = |V (G)| and let V (G) = {v1, . . . , vn}. If G′is the graph obtained by replacing vi ∈ V (G) by Hi , then for every greedy coloring of G′at most Γ(Hi) colors contain vertices of the induced subgraph G′[Hi] ⊆ G′, for all i ∈ {1, . . . , n}. Lemma 3: Let v be a neighborhood node of T(G) isomorphic to a P5 or aC5 or a C¯ 5, v1, . . . , v5 be the children of v and Γi be the Grundy number of G[M(vi)], 1 ≤ i ≤ 5. Then Γ (G [M (v)]) can be found in constant time. 21
  • 4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 Proof: (Sketch) Without loss of generality, suppose that v1, . . . , v5 label the children of v as depicted in Figure 1 and Hi = Γ(G[M(vi)]). In order to simplify the notation, denote by θi an ordering over M (vi) that induces a greedy coloring with Γ i colors, 1 ≤ i ≤ 5. We calculate Γ (G [M (v)]) by verifying all the possible configurations for a greedy Γ (G [M (v)])-coloring and by returning the greater value found between all the cases. Suppose that G (v) is isomorphic to a P5. Let S = {S1, . . . , Sk} be a greedy Γ(G[M(v)])-coloring of G[M(v)]. We claim that if there exists a vertex u ∈ V (H1) colored by Sk, then Γ (G [M (v)]) = Γ1 + Γ2. This fact holds because combining the observation that u has at least one vertex colored by S i , for all i ∈ {1, . . . , k −1}, with the proposition 2, we conclude that Γ(G[M(v)]) ≤ Γ1 + Γ2. On the other hand, if we consider any ordering θ over G [M (v)] that has starts with θ 1 and θ2, we see that the first-fit algorithm over this order will produce a greedy coloring with at least Γ1 + Γ2 colors. Using the symmetry, we can also prove that if u ∈ V (H5), then Γ (G [M (v)]) = Γ4 + Γ5. All the other cases use similar arguments, that is, by finding an upper bound based on the position of a vertex colored Sk and a lower bound based in an ordering over M (v). The cases where G (v) is isomorphic to C5 or P¯ 5 are also proved by using similar arguments [10]. Lemma 4 :Let v be a neighborhood node of T (G) isomorphic to a spider H = (S ∪ K ∪ R, E), fr be its child corresponding to R, f2 be its child corresponding to the module which has eventually two vertices and Γ(R) be the Grundy number of G[M(fr)]. Then Γ (G [M (v)]) can be found in linear time. Figure 1: Fat neighborhood nodes. Proof: If M (f2) is singleton module, then G [M (v)] is a spider. In this case, we cannot have two colors Si and Sj , j > i, such that both contain only vertices of S. For otherwise, since S is a stable set, the vertices colored Sj would not any neighbor colored Si, a contradiction. Thus, Γ (G [M (v)] ) ≤ 1 + |K| + Γ (R). If R = θ , then an ordering over M (v) such that all the vertices of S come before the vertices of K induces a greedy coloring with Γ (G[M(v)]) = 1 + |K| colors. If R 6= θ, we will prove that Γ (G [M (v)] ) ≤ |K| + Γ (R). Observe first that there is at least one color Si occurring in R. Consequently, Si does not occur in K. Thus, there is no order over M(v) whose greedy coloring returns a color Sj containing only vertices of S, because a vertex of S colored Sj would not be adjacent to a vertex colored Si. On the other hand, if θ R is an ordering that induces a greedy Γ (R)-coloring of R, then any ordering over M(v) starting by θ R induces a greedy coloring with at least |K| + Γ (R) colors. The case where M (f2) is not a singleton module is proved using similar arguments. [10] If G (v) is a split graph H and the factors corresponding to vertices of S (H) are independent sets and the ones corresponding to vertices of K (H) are cliques, then we can use the same arguments of Lemma 3.3 observing that S, K and R correspond to S (H), K (H) and R (H), respectively . 22
  • 5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 Theorem 5: If G = (V, E) is a fat-extended P4-laden graph and |V | = n, then Γ (G) can be found in O (n3). Proof: The algorithm calculates Γ (G) by traversing the modular decomposition tree of G in a postorder way and determining the Grundy of each inner node of T (G) based on the Grundy number of the leaves. The modular decomposition tree can be found in linear time, the postorder traversal can be done in O (n2) and the Grundy number of each inner node can be found in linear time, because of Lemmas 3and 4 and the results of Gyarf´as and J.Lehel [4] for cographs. Corollary 6: Let G be a graph that belongs to one of the following classes: P4-reducible, extended P4-reducible, P4-sparse, extended P4-sparse, P4-extendible, P4-lite, P4tidy, P4-laden and extended P4-laden. Then, Γ (G) can be found in polynomial time. Proof: According to definition of these classes [6], they are all strictly contained in the fatextended P4-laden graphs and so the corollary follows. 5. CONCLUSIONS In the conclusion, we determinate, in first time, a new class of graphs, this class is called the fatextended P4-laden graphs, in second time; we calculate the Grundy number of the graphs in this class by using a polynomial time algorithm. Finally, we can say that the Grundy number can be calculated of each node in linear time, so, the total Grundy number of graph can be determinate in polynomial time. ACKNOWLEDGEMENTS I think Mr. Julio Cesar Silva Araujo for his collaboration. REFERENCES [1] J. C. Araujo., “Coloring graphs”,(2009). Master in Science Dissertation, in: ww.lia.ufc.br/˜juliocesar/dissertacao.pdf (in Portuguese)”. [2] M., F. Havet & C. Linhares Sales, (2008) “Grundy number and lexicographic product of graphs” in: International Conference on Relations, Orders and Graphs and their Interaction with Computer Science [3] V. Giakoumakis., (1996) “p4-laden graphs: A new class of brittle graphs”, Information Processing Letters 60 pp, 29–36. [4] A, Gyarf´as. & J. Lehel, (1988) “On-line and first fit colorings of graphs”, Journal of Graph Theory pp. 217–227. [5] T. Beyer S. M. & S. T. Hedetniemi, (1982) “A linear algorithm for the grundy number of a tree”, Congressus Numerantium 36, pp. 351–363. [6] Pedrotti, V, (2007) “Decomposi¸c˜ao modular de grafos n˜ao-orientados,” Master’s thesis, Universidade Estadual de Campinas [7] Tedder, M., D. Corneil, & C. Paul, (2007).” Simple, linear-time modular decomposition”. [8] J, Telle A. & A. Proskurowski, (1997) “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10 pp. 529–550. [9] M, Zaker, (2005) “Grundy number of the complement of bipartite graphs” Journal of Combinatorics 31 pp. 325––330. [10] J. C. Silva Ara´ujo, C. L. Sales, (2009) “Grundy number on P4-classes”, Electronic Notes in Discrete Mathematics, Volume 35, 1, Pages 21–27. [11] M. Selkow C. & A. Christen (1979) “ Some perfect coloring properties of graphs”, Journal of Combinatorial Theory B27 ,49-59. 23
  • 6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 [12] A. Proskurowski, & J.A. Telle, (1997), “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10(4), 529-550. [13] S.M. Hedetniemi, J.E. Dunbar, D.P. Jacobs & J. Knisely, (2000), “Colorings of Graphs”, Journal of Combinatorial Mathematics and Combinatorial Computing 33 ,257-273. [14] C. Germain and H. Kheddouci, “Grundy coloring for power caterpillars”, (2000), Proceedings of International Optimization Conference INOC 2003, 243-247, Evry/Paris France. [15] J. Rhyne&C. Parks (2002) “Grundy Coloring for Chessboard Graphs”, Seventh North Carolina MiniConference on Graph Theory, 24