Algorithms In Combinatorial Design Theory - Lagout

2y ago
33 Views
2 Downloads
4.22 MB
347 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : River Barajas
Transcription

ALGORITHMS INCOMBINATORIAL DESIGN THEORY

NORTH-HOLLAND MATHEMAICS STUDIESAnnals of DiscreteMathematics(26)General Editor: bter L. HAMMERRutgers University, New Brunswick, NJ, U.S.A.Advisory EditorsC BERG6 Universit4de Paris, FranceM.A. HARRISON, University of California, Berkeley, CA, U.S.A.K KLEE, University of Washington, Seattle, WA, U.S.A.J -H. VAN LIN 6 CaliforniaInstituteof Technology,Pasadena, CA, c!S.A.G,-C.ROTA, Massachusetts Institute of Technology, Cambridge, MA, U.S.A.NORTH-HOLLAND -AMSTERDAM0NEW YORK0OXFORD114

ALGORITHMS INCOMBINATORIAL DESIGN THEORYedited byC. J. COLBOURN and M. J. COLBOURNDepartmentof Computer ScienceUniversityof STERDAMNEW YORKOXFORD

QElsevier SciencePublishersE.K, 1985All rights reserved. No part of thisJpublicationmay be reproduced, stored in a retrievalsystem,or transmitted, in any form or by any means, electronic, mechanical,photocopying, recording orotherwise, without thepriorpermission of the copyright owner.ISBN: 0444878025Publishers:ELSEVIER SCIENCE PUBLISHERS B.V.P.O. BOX 19911000 BZ AMSTERDAMTHE NETHERLANDSSole distributorsforthe U.S.A. and Canada:ELSEVIER SCIENCE PUBLISHING COMPANY, INC.52 VANDER BILT AVENUENEW YORK, N.Y. 10017USA.Lihrar? of Congrcrr Calaloging in Publication DalaMain entry under t i t l e :Algorithms in combinatorial &sign theory.(Annals of discrete mathematics ; 26) (Horth-Hollaudmathematics studies ; 114)Include6 bibliographies.1. Combinatorial dcrigns and conrigurations--Dataprocessing. 2. Algorithms. I. Colbourn, C. J.(Cbsrles J. ), 1953XI. Colbourn, W. J. (MarleneJones), 1953111. Series. IV. Series: Northd ma emat s studies * 114.&W225.Aik1&5111.b65-10371ISM 0-444-87802-5 (U.8.). .PRINTED IN THE NETHERLANDS

VPREFACERecent years have seen an explosive growth in research in combinatorics and graph theory.One primary factor in this rapid development has been the advent of computers, and theparallel study of practical and efficient algorithms. This volume represents an attempt tosample current research in one branch of combinatorics, namely combmatorial designtheory,which is algorithmicin nature.Combmatorial design theory is that branch of combinatorics which is concerned with theconstruction and analysis of regular f h t e configurations such as projective planes, Hadamard matrices, block designs, and the like. Historically, design theory has borrowed toolsfrom algebra, geometry and number theory to develop direct constructions of designs.o n s ,are in fact algorithmsThese are typically supplemented by recursive n s t t iwhichfor constructing larger designs from me smaller ones. This lent an algorithmic flavourto the construction of designs, even before the advent of powerful computers.Computers have had a definite and long-lastingimpact on research in combinatorial designtheory. Rimarily, the speed of present day computershas enabled researchers to constructmany designs whose discovery by hand would have been difficuit if not imposslile. Asecond important consequence has been the vastly improved capability for anu&sis ofdesigns. This includes the detection of isomorphism, and hence gives us a vehicle foraddressing enumeration questions. It a h includes the determination of various properties of designs; examples include resolvability, colouring, decomposition, and subdesigns.Although in principle all such properties are computable by hand, research on designs withadditional properties has burgeoned largely because of the availability of computationalassistance.Naturally, the computer alone is not a panacea. It is a well-known adage in design theorythat computational assistance enables one to solve one higher order (only) than could bedone by hand. This is a result of the “combinatorial explosion”, the massive growth ratein the size of many combinatorial problems. Thus, research has turned to the developmentof practical algorithms which exploit computational assistance to its best advantage. Thisbrings the substantial tools of computer science, particularly analysis of algorithms andcomputationalcomplexity, to bear.Current research on algorithms in combinatorial design theory is diverse. It spans the manyareas of design theory, and involves computer science at every level from low-level implementation to abstract complexity theory. This volume is not an effort to survey the fsldexhaustively; rather it is an effort to present a collection of papers which involve designsand akorithms in an interesting way.

viReficeIt is our intention to convey the f m conviction that combinatorial design theory andtheoretical computer science have much to contribute to each other, and that there is avast potential for continued research in the area. We would like to thank the contributorsto the volume for helping us to illustrate the connections between the two disciplines.All of the papers were thoroughly refereed; we sincerely thank the referees, who are alwaysthe "unsung heroes and heroines" in a venture such as this. Finally, we would like especially to thank Alex Rosa,for helping in all stages from inception to publication.Charles J. Cofbourn and Marlene Jones ColbournWaterloo, CanadaMarch 1985

PrefaceVA.E. BROUWER and A.M. COHEN, Computation of some parameters of Liegeometries1M.CARKEET and P. EADES, Performance of subset generating aorithms49C.J. COLBOURN, MJ. COLBOURN, and D.R. STINSON, The computationalcomplexity of fuding subdesigns m combinatorialdesigns59M.J. COLBOURN, Algorithmic aspects of combinatorialdesigns: a sulvey67J.E. DAWSON, Algorithms to find directed packings137J.H. DINITZ and W.D. WALLIS, Four orthogonal one-factorizationson tenpints143D.Z. DU, F.K.HWANG and G.W.RICHARDS, A problem of lines andintersectionswith an application to switching networks151P.B. GIBBONS, A census of orthogonal Steiner triple systems of order 15165M.J. GRANNELL and T.S. GRINS, Derived Steiner triple systems of order 15183H.-D.O.F. CRONAU, A sulvey of results on the number o f t - (v, k, A) designs209J.J. HARMS, Directing cyclic triple systems221A.V. IVANOV, Constructive enumeration of incidence systems227E.S. KRAMER, D.W. LEAVITT, and S.S. MAGLIVERAS, Constructionprocedures for tdesigns and the existence of new simple 6designs247R MATHON and A. ROSA, Tables of parameters of BIBDs with r 41 includingexistence, enumeration, and resolvability results275A. ROSA and S.A. VANSTONE, On the existence of strong Kirkman cubesof order 39 and block size 3309

viiiCbntentsD.R. STINSON, Hill-climbing algorithms for the constructionof combinatodal&signs321

Annals of Discrete Mathematics 26 ( 1985) 1-480 Elsevier Science Publishers B.V. (North-Holland)IComput,ationof Some Parameters of Lie GeometriesA.E. Brouwr and A.M.CohcnCentre for Mathematics and Computer ScienceKruislaan 4131098 SJ AmsterdamTHE N E T H E R L A M ) SAbstractIn this note we show how one may compute the parameters of a finite Liegeometry, and we give the results of such computations in the mostinteresting cases. We also prove a little lemma that is useful for showingthat thick finite buildings do not have quotients which are (1ocalIy) Titsgeometries of spherical type.1. IntroductionThe finite Lie geometries give rise to association schemes whose parametersarc closely related to corresponding parameters of their associated Weyl groups.Though the parameters of the most common Lie geometries (such as projectivespaces and polar spaces) are very well known, we have not come across areference containing a listing of the corresponding parameters for geometries ofExceptional Lie type. Clearly, for the combinatorial study of these geometriesthe knowledge of these parameters is indispensible. The theorem in this paperprovides a formula for those parameters of the asociation scheme that appearin the distance distribution diagram of the graph underlying the geometry. As aconsequence of the theorem, we obtain a simple proof that the conditions inlemma 5 of 121 are fulfilled for the collinearity graph of any finite Lie geometryof type A,,, D,,, or Em,6SmS8. (See remark 3 in section 4. The proof for theother spherical types, i.e. C,,F,,and C2is similar.) By means of the formula inthe theorem, we have computed the parameters of the Lie geometries in themost interesting open cases for diagrams with single bonds only (A,, and 0, arewell known, and are given as examples). The remaining cases follow similarly,but the complete listing of all parameters would take too much space.

2A. E, Brouwer and A.M. a h e n2. InfroduetSon to Geometrler (following TSts [lo])A geometry over a set A (the set of types) is a triple (r,*,t) where r is a set(the set of objects of the geometry), * is a symmetric relation on r (theincidence relation) and t is a mapping (the type mapping) from I' into A, suchthat for x, y r we have (t(x) t(y) & x*y) if and only if x y. (Anexample isprovided by the collection r of all (nonempty proper) subspaces of a finitedimensional projective space, with t: r 4 N , the rank function, and *symmetrized inclusion (i.e., x*y iff x C y or y C x).)Often we shall refer t o the geometry as I' rather than as (r,*,t).A flag is a collection of pairwise incident objects. The residue Res(F) of aflag F is the set of all objects incident to each element of F. Together with theappropriate restrictions of * and t, this set is again a geometry.The rank of a geometry is the cardinality of the set of types A. Thecorank of a:flag F is the cardinality of A\t(F). A geometry is connected if andonly if the (looped) graph (r,*)is connected. A geometry is reeidually connectedwhen for each flag of corank 1, Res(F) is nonempty, and for each flag of coranka t least 2, Res(F) is nonempty and connected.A (Buekenhout-Tile) diagram is a picture (graph) with a node for eachelement of A and with labelled edges. It describes in a compact way a set ofaxioms for a geometry I' with set of types A as follows: whenever an edge( d l d 2 ) is labelled with D, where D is a class of rank 2 geometries, then eachresidue of type {d,,d2} of r must be a member of D . (Notice that a residue oftype {d,,d,}iis the residue of a flag of type A\{d1,d2}.) In the following we needonly two classes of rank 2 geometries. The first is the class of all projectiveplanes, indicltted in the diagram by a plain edge. The second is the class of allgeneralized digons, that is, geometries with objects of two types such that eachobject of one'type is incident with every object of the other type. Generalizeddigons are indicated in the diagram by an invisible (i.e., absent) edge.For example, the diagramis an axiom system characterizing the geometry of points, lines, and planes ofprojective &space. Note that the residue of a l i e (i.e., the points on the l i eand the planes containing the line) is a generalized digon. Usually, one choosesone element of A and calls the objects of this type pointe. The residues of thistype are called linee. Thus lines are geometries of rank 1, but all that matters isthey constitute subsets of the point set. In the diagram the node correspondingto the points is encircled.

Some parameters of Lie geometries3As an example, the principle of duality in projective 3-space asserts theisomorphism of the geometriesGrassmannians are geometries like(Warning: points are objects of the geometry but lines are sets of points, andgiven a line, there need not be an object in the geometry incident with the sameset of points.)Let us write down some diagrams (with nodes labelled by the elements ofA) for later reference.1122n33n-2n-19'Eoo-ouo-o12345

A.E. Brouwer and A.M. Cohen40'E7125436Q8E8(Warning: in different papers different labellings of these diagrams are used.)If one wants to indicate the type corresponding to the points, it is added asa subscript. For example, D,,, denotes a geometry belonging to the diagram0123It is possible to prove that if I' is a finite residually connected geometry of ranka t least 3 belonging to one of these diagrams having at least three points oneach line then the number of points on each l i e is g 1 for some prime power g,and given a prime power g there is a unique geometry with given diagram andg 1 points on each line. We write X,,(g) for this unique geometry, where X,, isthe name of the diagram (cf. Tits [9] Chapter 8, and 121).F o r example, A,,(g) is the geometry of the proper nonempty subspaces ofthe projective space PG(n,g). Similarly, D,,(g) is the geometry of the nonemptytotally isotropic subspaces in PG(2n 1,g) supplied with a nondegeneratequadratic form of maximal Witt index. Finally, DnJg) is an example of a polarspace.] -

Some parameters of Lie geometriesA remark on notation:5‘: ’ means “is by definition equal to” or “is definedas,’.8. Distance Distribution Diagrams for h c i a t i o n SchemerAn association scheme is a pair (X,{Ro1.,R,})where X is a set and the R;X such that {Ro,.,Ru} is a partition of X X Xsatisfying the following requirements:( 0 5 i 5 . 9 ) are relations on(i) Ro 1, the identity relation.(ii) for all i , there exists an i’such that RT Rp(iii) Given z,y X with ( Z J ) R;, then the number pi3 112: (z,z) Rjand ( y , ) Rk}I does not depend on z and y but only on i .Usually we shall write u for the total number of points of the associated scheme,i.e. u 1x1. The obvious example of an association scheme is the situationwhere a group G acts transitively on a set X . In this case one takes for{ Rol.lRu}the partition of X X X into C-orbits, and requirements (i)-(iii) areeasily verified.Assume that we have an association scheme with a fixed symmetricnonidentity relation R1 (Le., RT Rl). Clearly ( X , R l )is a graph. Now onemay draw a diagram displaying the parameters of this graph by drawing a circlefor each relation Rj, writing the number A;. I { z : ( 2 , ) R;)I p: where z X is arbitrary inside the circle, and joining the circles for R; and Rj by a linecarrying the number p i l a t the (Ri)-end whenever p i l # 0. (Note that &;pil kjpil so that p j , is nonzero iffis nonzero.) When i j , one usually omitsthe line and just writes the number pi’, next to the circle for R;.pilFor example, the Petersen graph becomes a symmetric association scheme,i.e., one for which RT R; for all i when we define ( Z J ) R; iff d(z,y) ifor i 0,1,2. We find the diagram2More generally, a graph is called distance regular when ( 2 , ) .Ri iff d(z,y) i (,OSiSdiam(G)) defines an association scheme.When ( X , R l ) is a distance regular graph, or, more generally, when thematrices I, A , A*,., A’ are linearly independent (where A is the 0-1 matrix ofR1, i.e., the adjacency matrix of the graph), then the p i l suffice to determine allpi3. On the other hand, when the association scheme is not symmetric but R1is, then clearly not all Rj can be expressed in terms of R l .

A.E. Brouwer and A.M. Cohen6In this note our aim is t o compute the parameters pf for the Liegeometries XmIn(q)where X,,, is a (spherical) diagram with designated 'point'type n, and the association echeme structure is given by the group of (typepreserving) automorphisms of X,,,,n(9) essentially a Chevalley group. In thenext section we shall give formulas valid for all Chevalley groups and in theappendix we l i t results in some of the more interesting cases. Let us do someexamples explicitly. (References to words in the Weyl group will be explained inthe next section.)Usually we give only the pil ; the general case follows in a similar way.-Example 1.41 -0-()--- 123nThe collinearity graph of points in a projective space is a clique: any two pointsare adjacent (collinear). Thus our diagram becomesExample 2.123nNow we have the graph of the projective lines in a projective space, twoprojective lines being adjacent whenever they are in a common plane (and havea projective point in common).[N.B.: the limes of this geometry are pencils of 9 1 projective lines in acommon plane and on a common projective point.]Our diagram becomesWeyl words:""2""2312"

Some parameters of Lie geometriesX q- 1 q2 q* qn-2-1q-1qn-1- 1 q n - 2 - 1 d ,q2-1q-1For q 1 (the 'thin' case) this becomes the diagram for the triangular graph:k2 -n-1[Clearly Xi: pfi k- z p f i . Often, when X i does not have a particularly nicej*iform, we omit this redundant information.]Notice how easily the expressions for u,k,k2,X can be read off from theBuekenhout-Tits diagram: for example, X X(z,y) first counts the q - 1 points onthe line zy, then the remaining q2 points of the unique plane of type {1,2}containing this line and finally the remaining q2 points of the planes of type{2,3} containing this line.Example 3.This is the graph of the j-flats (subspaces of dimension j) in projective n-space,two j-flats being adjacent whenever they are in a common ( j 1)-flat (and havea (j-I)-flat in common). The graph is distance regular with diametermin (j,n 1 j). Parameters are(qn l-l)(,p- 1).(,p 2-i- -U (qj-l)(qj-l- I).(q- 1)Q

A.E. Brouwer and A.M. Cohen8bi: pf,i l q z i l l ; i 1 9I.-j;i ]9The parameters for the thin case have q l and binomial instead of Gaussiancoefficients; we find the Johnson scheme(nfl).The Weyl words (minimal double coset representatives in the Weyl group)have the following shape: for double coset i in A,,j the representative iewi: " , j 1,.,j i- 1,j- 1,j ,.,j i - 2 ,.,,j - i 1,j - i 2 ,.,jNote that wi has length i2, the power of g occurring in ki.Example 4.Dn.1a-012n-2n-1(n23;Dz,l is the direct product AlllXAlI1,i.e., a ( g l ) X ( q l ) grid.)1n-l-l)() Q Dn-l,l'gDiagram:9-1n-2 1)'!

Some parameters of Lie geometriesThin case:u 2n ,A 2n-22n - 4This is K2, minus a complete matching.The Weyl words are:'I"for double coset 0,"1" for double coset 1, andn -3 n - 2 n n"1 2 3 *Example 5.12-1 n-2 - - -1" for double coset 2.9

A.E. Brouwer and A.M. Cohen10Diagram (for n 4):nDouble coset 1 contains adjacent points, i.e., lines of the polar space in acommon plane. Shortest path in the geometry: 2-3-2 (unique).Double coset 2 contains the points a t ‘polar’ distance two, belonging t o theWeyl word ”2312”, i.e., in a polar space AS12. (Le., lines of the polar space in acommon t.i. subspace). ThusShortest path in the geometry: 2-42 (unique). Double coset 3 contains pointsincident with a common 1-object, so that the Weyl word is the one for doublecoset 2 in On- (relabelled):“23n-3n-2nn-ln-22”.(These are intersecting lines not in a common t.i. plane.) Thus- S AI,I (D1,1) (q 1)q2n-4*Shortest path in the geometry: 2-1-2 (unique).Double coset 4 contains points with shortest path 2-1-3-2 (unique); theWeyl word is“2 3* * *n-3 n-2 n n - 1 n-2-* -3 12’:the reduced form of the product of the word we found for double coset 3 and theword “212” describing adjacency in A2,2. Thus

11Some parameters of Lie geometriesk, on- 2 , 1 q 2 ( 1 0 n - 1.1 - (q 1)-! o,-s,l) n-2,U ( q n - S l)(qq-1 l)q2"-SDouble coset 5 contains the remaining g4"-' points (the lines of the polarspace in general position). Shortest path in the geometry: 2-1-2-1-2 (notunique). The Weyl word is" 2 3 . n - 1 1 2 3 * n-2 n n-2 . . 2 1 n - 1* 3 2". .of length 4n - 7.- --The thin case is:u 2n(n - l ) ,Example 6.k 4(n -2)--

A.E. Brouwer and A.M. Cohen12D4,29'04-0213As before we findand k g ( g 1)'.This time the thin diagram isv 24,-k 8and we see that the number of classes is one higher than before. This is causedby the fact that we can distinguish here between shortest paths 2-4-2 and 2-3-2,while in the general case (n25) both 2-n-2 and 2-(n-1)-2 are equivalentto 2-3-2. Thus,our previous double coset 2 splits here into two halves.

13Some parameters of Lie geometriesDouble cosetWeyl ”“2432”“24312”“231242132”Q(Q Q‘(Q 1)Q‘(Q 1)Q‘(Q 1)Q5(4 6Shortest path gram:Example 7.9’1We have23n-1

A.E. Brouwer and A.M. Cohen14u ( q " - '

of practical algorithms which exploit computational assistance to its best advantage. This brings the substantial tools of computer science, particularly analysis of algorithms and computational complexity, to bear. Current research on algorithms in

Related Documents:

strong Combinatorial Chemistry /strong in Drug Research strong Combinatorial chemistry /strong and rational drug design Structure-based and computer-assisted design and virtual screening (LUDI, FlexX et al.) of protein ligands supplement strong combinatorial chemistry /strong . strong Combinatorial /strong design of drugs The necessary tools are already available but scoring functions have to be improved.

In this course we study algorithms for combinatorial optimization problems. Those are . and so it is unlikely that we can design exact e cient algorithms for them. For such problems, we will study algorithms that are worst-case e cient, but that output . make us give a second look at the theory of linear programming duality. Online Algorithms.File Size: 832KB

In this paper we give the fist polynomial-time combinatorial algorithms1 for the generalized circulation problem.The importance of designing such algorithms for this problem is twofold. Combinatorial methods may lead to algorithms that are more efficient, both in theory and in practice, than al

Introduction to the Theory of Computation (2nd year) Combinatorics (3rd year, Prof Behrend) Coding Theory (3rd year, Dr Aliev) Algorithms and Heuristics (3rd year, Dr Lewis) Combinatorial Optimisation (3rd year) Combinatorial and Analytic Number Theory (4th year, Dr Lettington) Graph Theory

F14 CSE550 45 Combinatorial Algorithms and Intractability S14 CSE 555 46 Advanced Theory of Computation S14 CSE591/MAT591 40 Combinatorial Design Theory F13 CSE 355 82 Intro Theory of Computation F13 CSE 552 32 Randomized and Approximation Algorithms S13 CSE 555 30 Advanced Theory of Computation S1

Our approach blends combinatorial design theory with optimization and compu-tation paradigms. We model di erence methods as Constraint Programming (CP) problems, and leverage on state-of-the-art algorithms to nd the combinatorial so-lutions. We were abl

1 Introduction to Combinatorial Algebraic Topology Basic Topology Graphs to Simplicial Complexes Posets to Simplicial Complexes 2 Permutation Patterns Introduction and Motivation Applying Combinatorial Algebraic Topology Kozlov, Dimitry. Combinatorial algebraic topology. Vol. 21. Springer Science & Business Media, 2008.

topology and di erential geometry to the study of combinatorial spaces. Per-haps surprisingly, many of the standard ingredients of di erential topology and di erential geometry have combinatorial analogues. The combinatorial theories This work was partially supported by the National Science Foundation and the National Se-curity Agency. 177