IN GRAPHS. Hamideh Aram. Department of Mathematics Gareziaeddin Center, Khoy Branch Islamic Azad University, Khoy, Iran

Size: px
Start display at page:

Download "IN GRAPHS. Hamideh Aram. Department of Mathematics Gareziaeddin Center, Khoy Branch Islamic Azad University, Khoy, Iran"

Transcription

1 Discussiones Mathematicae Graph Theory 38 (018) doi: /dmgt.054 ETERNAL m-security BONDAGE NUMBERS IN GRAPHS Hamideh Aram Department of Mathematics Gareziaeddin Center, Khoy Branch Islamic Azad University, Khoy, Iran Maryam Atapour Department of Mathematics Faculty of Basic Sciences University of Bonab, Bonab, I.R. Iran and Seyed Mahmoud Sheikholeslami Department of Mathematics Azarbaijan Shahid Madani University Tabriz, I.R. Iran Abstract An eternal m-secure set of a graph G = (V,E) is a set S 0 V that can defend against any sequence of single-vertex attacks by means of multiple guard shifts along the edges of G. The eternal m-security number σ m (G) is the minimum cardinality of an eternal m-secure set in G. The eternal m- security bondage number b σm (G) of a graph G is the minimum cardinality of a set of edges of G whose removal from G increases the eternal m-security number of G. In this paper, we study properties of the eternal m-security bondage number. In particular, we present some upper bounds on the eternal m-security bondage number in terms of eternal m-security number and edge connectivity number, and we show that the eternal m-security bondage number of trees is at most and we classify all trees attaining this bound. Keywords: eternal m-secure set, eternal m-security number, eternal m- security bondage number. 010 Mathematics Subject Classification: 05C69.

2 99 H. Aram, M. Atapour and S.M. Sheikholeslami 1. Introduction Throughout this paper, G is a simple connected graph with vertex set V = V(G) and edge set E = E(G) and of order n and size m. For every vertex v V, the open neighborhood of v is the set N(v) = {u V(G) : uv E(G)} and the closed neighborhood of v is the set N[v] = N(v) {v}. The degree deg(v) of v is the number of edges incident with v or, equivalently, deg(v) = N(v). The degree sequence of G is (deg(v 1 ),deg(v ),...,deg(v n )), typically written in nondecreasing order. The minimum and maximum degree of vertices in V(G) are denoted by δ(g) and (G), respectively. Let E(A,B) denote the set of all edges with one endpoint in A and the other endpoint in B, e(a,b) be the cardinality of E(A,B), and E u denote the set of edges incident to u. A leaf of a graph G is a vertex of degree 1 and a support vertex of G is a vertex adjacent to a leaf. A support vertex is called strong support vertex if it is adjacent to at least two leaves. The distance between two vertices x and y is denoted by d(x,y) and the diameter of G is denoted by diam(g). A set S of vertices in a graph G is called a dominating set if every vertex in V iseitheranelementofs orisadjacenttoanelementofs. Thedomination number of G, denoted by γ(g), is the minimum cardinality of a dominating set of G. A γ(g)-set is a dominating set of G of size γ(g). For a more thorough treatment of domination parameters and for terminology not presented here see [5,11]. The bondage number b(g) of a graph G is the minimum cardinality of a set of edges of G whose removal from G increases the domination number of G. The bondage number was introduced by Fink et al. [] and was studied by several authors, for example [4,6,8 10]. For more information on this topic we refer the reader to the survey article by Xu [1]. An eternal 1-secure set of a graph G is a set S 0 V that can defend against any sequence of single-vertex attacks by means of single-guard shifts along the edges of G. That is, for any k and any sequence v 1,v,...,v k of vertices, there exists a sequence of guards u 1,u,...,u k with u i S i 1 and either u i = v i or u i v i E, suchthateachsets i = (S i 1 {u i }) {v i }isadominatingset. Itfollows that each S i can be chosen to be an eternal 1-secure set. The eternal 1-security number of G, denoted by σ 1 (G), is the minimum cardinality of an eternal 1-secure set. The eternal 1-security number was introduced by Burger et al. [1] using the notation γ. In order to reduce the number of guards needed in an eternal secure set, Goddard et al. [3] considered allowing more guards to move. Suppose that in responding to each attack, every guard may shift along an incident edge. The eternal m-security number σ m (G) is the minimum number of guards to handle an arbitrary sequence of single attacks using multiple guard shifts. A suitable placement of the guards is called an eternal m-secure set (EmSS). An EmSS of size σ m (G) is called a σ m (G)-set.

3 Eternal m-security Bondage Numbers in Graphs 993 The eternal m-security bondage number b σm (G) of a graph G is the minimum cardinality of a set of edges of G whose removal from G increases the eternal m- security number of G. Since in the study of eternal m-security bondage number the assumption σ m (G) < n is necessary, we always assume that when we discuss b σm (G), all graphs involved satisfy σ m (G) < n, i.e., all graphs are nonempty. An edge set B with σ m (G B) > σ m (G) is called the eternal m-secure bondage set. A b σm (G)-set is an eternal m-secure bondage set of G of size b σm (G). In this paper, we initiate the study of the eternal m-security bondage number in graphs and we establish some bounds on the eternal m-security bondage number in terms of vertex degree, eternal m-security number and edge connectivity number. We also show that the eternal m-security bondage number of trees is at most and we characterize all trees attaining this bound.. Preliminaries and Exact Values The proof of the following four results can be found in [3]. Proposition A. For any graph G, γ(g) σ m (G). A set P V(G) is called a k-packing if d(u,v) > k for each pair of vertices u,v P, u v. The k-packing number α k (G) is the cardinality of a maximum k-packing in G. Note that α 1 (G) = α(g) is the independence number of G. Proposition B. For any graph G, σ m (G) α(g). Proposition C. 1. σ m (K n ) = 1.. σ m (K r,s ) = for r,s 1,r +s σ m (P n ) = n. 4. σ m (C n ) = n 3. Proposition D. For any graph G, σ m (G) (diam(g)+1)/. Next results are immediate consequences of Propositions C and D. Corollary 1. For any graph G, σ m (G) = 1 if and only if G K n. Corollary. For n, we have b σm (K n ) = 1. Corollary 3. For n 5, b σm (C n ) = 1. { 1 if n is even, Corollary 4. For n 3, b σm (P n ) = if n is odd. Proposition E [7]. For any graph G, α (G) γ(g).

4 994 H. Aram, M. Atapour and S.M. Sheikholeslami Corollary 5. For any graph G, α (G) σ m (G). Observation 6. Let G be a graph and H be a spanning subgraph of G such that σ m (H) = σ m (G). If K = E(G)\E(H), then b σm (H) b σm (G) b σm (H)+ K. Proof. Let F be a b σm (H)-set. Then σ m (G) = σ m (H) < σ m (H F) = σ m (G (K F)), which implies that b σm (G) K F = K + F = b σm (H)+ K. Let now T be a b σm (G)-set. Then we have σ m (H) = σ m (G) < σ m (G T) σ m (H T). Thus b σm (H) T = b σm (G) and the proof is complete. Proposition 7. If G contains a vertex adjacent to at least three leaves, then b σm (G) = 1. Proof. Let u be adjacent to the leaves u 1,u,u 3. Consider the graph G obtained from G by deleting the edge uu 1. Let S be a σ m (G )-set which contains u (we may assume that S is a response to an attack on u). Obviously u 1 S and S \{u 1 } is an EmSS of G and so σ m (G) σ m (G ) 1. Hence, b σm (G) = 1. Next we determine the eternal m-security bondage number of complete bipartite graphs. Proposition 8. For m n, b σm (K m,n ) =. Proof. By Proposition C, σ m (K m,n ) =. If m = n =, then clearly b σm (K, ) =. Assume that m 3. It is not hard to see that for any edge e = uv E(G), the set S = {u,v} is an EmSS of K m,n e and so b σm (K m,n ). Now we show that b σm (K m,n ). Suppose that X = {u 1,...,u m } and Y = {v 1,...,v n } be the partite sets of K m,n and let F = {v 1 u 1,v 1 u }. Let S be a σ m (K m,n F)-set which contains u 1. To dominate v 1, we have v 1 S or u i S for some i 3. If v 1 S, then u is not dominated by {u 1,v 1 } and so S 3. Let v 1 / S. Assume without loss of generality that u 3 S. Then u is not dominated by {u 1,u 3 } and this implies that S 3. Hence, b σm (K m,n ) and the proof is complete. 3. Bounds on the Eternal m-security Bondage Number In this section, we present various bounds on the eternal m-security bondage number. We start with an observation. Observation 9. Let G be a connected graph. If σ m (G v) σ m (G) for some vertex v V(G), then b σm (G) deg(v).

5 Eternal m-security Bondage Numbers in Graphs 995 Proof. First, note that σ m (G E v ) σ m (G). If σ m (G E v ) > σ m (G), then we are done. Suppose σ m (G E v ) = σ m (G) and let S be a σ m (G E v )-set. Clearly, v S and S \{v} is an EmSS of G v. It follows that and the proof is complete. σ m (G E v ) 1 σ m (G v) σ m (G), Theorem 10. Let G be a connected graph and uv E(G). Then b σm (G) deg(u)+deg(v) 1 N(u) N(v). Proof. Let X be the set consisting of all edges incident with u and v with exception of the edges E(v,N(u)). Then X = deg(u) + deg(v) 1 N(u) N(v), u is an isolated vertex in G X and v is only adjacent to the vertices of N G (u) N G (v). Let S be a σ m (G X)-set which contains v (we may assume a response to an attack on v). It is easy to verify that S \ {u} is an EmSS of G and hence σ m (G) σ m (G X) 1. This completes the proof. Corollary 11. For any nonempty graph G, b σm (G) δ(g)+ (G) 1. Theorem 1. Let G be a connected graph with degree sequence (d 1,d,...,d n ). Then b σm (G) d α +d α+1 1, where α is the independence number of G. Proof. Let V(G) = {v 1,v,...,v n } and let deg(v i ) = d i for each i. Since the set {v 1,...,v α+1 }isnotindependent, thereisanedgev i v j forsome1 i < j α+1. It follows from Theorem 10 that b σm (G) deg(v i )+deg(v j ) 1 deg(v α )+deg(v α+1 ) 1, and the proof is complete. Theorem 13. Let G be a connected graph and u,v be two vertices of G with d(u,v) =. Then b σm (G) deg(u)+deg(v). Proof. Let w be a common neighbor of u and v and let X be the set consisting of all edges incident with u and v. Then X = deg(u) + deg(v) and u,v are isolated vertices in G X. Let S be a σ m (G X)-set which contains w (we may assume a response to an attack on w). Obviously u,v S and we can easily check that S \{u} is an EmSS of G and so σ m (G) < σ m (G X ). Thus b σm (G) X = deg(u)+deg(v) as desired.

6 996 H. Aram, M. Atapour and S.M. Sheikholeslami Corollary 14. Let G be a connected graph of order n with degree sequence (deg(v 1 ),deg(v ),...,deg(v n )). Then b σm (G) deg(v α )+deg(v α +1). Proof. Clearly, the set {v 1,...,v α +1} is not a -packing. Hence, d(v i,v j ) for some 1 i j α +1 and the result follows by Theorems 10 and 13. Next result is an immediate consequence of Corollaries 5 and 14. Corollary 15. If G is a connected graph with degree sequence (deg(v 1 ),deg(v ),...,deg(v n )), then b σm (G) deg(v σm )+d(v σm+1). Theorem 16. For any connected graph G, b σm (G) (σ m (G) α (G)+1) (G). Proof. By Corollary 5, α (G) σ m (G). Let s = σ m (G) α (G) + 1 and U = {u 1,...,u α } be a maximum -packing in G. Clearly, U V(G). Let T be asubsetofv(g) U ofsizesandletg bethegraphobtainedfromgbyremoving all edges incident to the vertices in T. Obviously, E(G) E(G ) s. Now we have σ m (G ) α (G ) α (G)+s = α (G)+σ m (G) α (G)+1 = σ m (G)+1 > σ m (G) and the proof is complete. The next result is an immediate consequence of Theorem 16. Corollary 17. If σ m (G) = α (G), then b σm (G) (G). The edge connectivity number κ (G) of a connected graph G is the minimum number of edges that have to be removed out of G to decompose G in two components. The inequality κ (G) δ(g) is immediate. Next result is an improvement of Corollary 11. Theorem 18. If G is a nontrivial connected graph, then b σm (G) (G)+κ (G) 1. Proof. Let K be a set of edges such that κ (G) = K and G K is disconnected. Assume that G 1 and G are the components of G K. It is easy to see that σ m (G) σ m (G 1 ) + σ m (G ) = σ m (G K). If σ m (G) < σ m (G 1 ) + σ m (G ), then b σm (G) κ (G) and we are done. Let σ m (G) = σ m (G 1 ) + σ m (G ). We claim that there is a vertex v V(G i ) such that v is incident to an edge of K and σ m (G i E v ) > σ m (G i ) for some i. In this case we have σ m (G K E v ) > σ m (G), which implies that b σm (G) deg(v)+κ (G) 1 (G)+κ (G) 1.

7 Eternal m-security Bondage Numbers in Graphs 997 Assume, to the contrary, that σ m (G 1 E v ) = σ m (G 1 ) for each vertex v V(G 1 ) incident to an edge of K and σ m (G E v ) = σ m (G ) for every vertex v V(G ) incident to an edge of K. Let u 1 u K where u i V(G i ) for i = 1,. Let S i be a σ m (G i E ui )-set for i = 1,. Clearly, u 1 S 1 and u S. It is easy to verify that S = S 1 S \{u 1 } is an eternal m-secure set of G which implies that σ m (G) σ m (G 1 E u )+σ m (G E v ) 1 = σ m (G 1 )+σ m (G ) 1 = σ m (G) 1, a contradiction. This completes the proof. Proposition 19. If σ m (G) =, then b σm (G) δ(g)+1. Proof. Let u V(G) be a vertex of minimum degree. If σ m (G u) σ m (G), then the result follows by Observation 9. Let σ m (G u) σ m (G) 1. Then obviously σ m (G u) = 1 and so G u is a complete graph. By Corollary, we have b σm (G) b σm (G u)+δ(g) = δ(g) Complete Multipartite Graphs In this section we determine the eternal m-security bondage number of complete multipartite graphs yielding that the eternal m-security bondage number can be arbitrary large. Theorem 0. Let t 3 and G = K n1,n,...,n t be the complete t-partite graph with n 1,n,...,n t. Then b σm (G) =. 3(t 1) Proof. Let X 1,X,...,X t be the partite sets of G and let X i = { x i } 1,...,xi n i for 1 i t. Clearly σ m (G) =. Assume { X = x 1 1x j 1,xs 1 x s+1 1 : j t, 1 s t 1 } if t is odd and { X = x 1 1x j 1,xs 1 x s+1 1,x 1 1x t : j t, 1 s t } when t is even. Obviously, X = 3(t 1). It is easy to see that for any eternal. m-securesets ofg X containingx 1 1, wehave S 3andsob σ m (G) 3(t 1) Now we show that b σm (G) 1 and let G = G F. 3(t 1) 3(t 1). Let F be a set of edges of size at most

8 998 H. Aram, M. Atapour and S.M. Sheikholeslami Claim. For each x V(G ), there exists a vertex x such that N G [x] N G [x ] = V(G ). Proof. Assume, to the contrary, that there exists a vertex x V(G ) such that N G [x] N G [v] V(G ) for each v V(G ). Without loss of generality we may assume that x = x 1 1. For i t, let F i = F { x 1 1 xi j : 1 j n i}. Let first F i = for each i t. Since N G [x 1 1 ] N G [v] V(G ) for each v V(G ), we have x 1 j v F for every v V(G )\X 1 and for some j n 1. This implies that F V(G )\X 1 t, a contradiction. Assume that F i for some i t. We consider two cases. Case 1. F i 1 for each i t. Let I {,...,t} be the set of all elements such that F i = 1 for each i I and let J = {,...,t}\i. Without loss of generality, assume that { [ x 1 1] xi 1 : i [ I} ] F. We estimate the number of edges in F as follows. Since N G x 1 1 NG x i 1 V(G ) for i I, there exists a vertex z i such that z i x i 1,zi x 1 1 / E(G ). Obviously, z i / X i ( j J X j). If z i X 1, then E i = { x 1 1 xi 1,xi 1 zi} F, and if z i X l for some l I {i}, then z i = x l 1 and E i = { x 1 [ ] [ 1 xi 1,xi 1 xl 1,x1 1 1} xl F. Since NG x 1 1 NG x j] s V(G ) for j J and 1 s n j, there exists a vertex zs j such that zsx j j s,zsx j 1 1 / E(G ). We note that ( ) (1) zs j X 1 i I X i for j J and 1 s n j. If zs j X 1, then x j szs j F \ ( i I E i), and if z j s X i for some i I, then zs j = x i 1 and xj szs j F \ ( i I E i) again. Since nj, we conclude that F { zsx j j } s : 1 s n j for each j J. By (1) we have { z j s x j } { s : 1 s n j z j s x j s : 1 s n j } = for j j. Hence, we have F i I E i + which is a contradiction. j J ( F 3 I + J 3 ( I + J ) = { }) zsx j j s : 1 s n j 3(t 1) Case. F i for some i t. Let I {,...,t} be the set of all elements i such that F i, J {,...,t} be the set of all elements j such that F j = 1 and R = {,...,t} \ (I J). Without loss of generality, assume that { x 1 1 x i 1,x1 1 xi,x1 1 xj 1 : i I, j J} F. We estimate the number of edges in F as follows. Obviously, i I F [ ] [ i I. Since N G x 1 1 NG x j 1] V(G ) for each j J, there exists a vertex z j such that z j x j 1,zj x 1 1 / E(G ). Obviously, z j / X j ( r R X r). If z j X i, for some i I, then E j = { x 1 1 xj 1,xj 1 zj} F, and if z j X l for some l J {j}, then z j = x l 1 and E j = { x 1 1 xj 1,xj 1 xl 1,x1 1 1} xl F.,

9 Eternal m-security Bondage Numbers in Graphs 999 As in Case 1, we can see that F { } zsx r r s : 1 s n r for each r R, and { z r s x r } { s : 1 s n r z r s x r s : 1 s n r } = for r r. Hence, we have F i I F i + j J E j + ( { }) j J F zsx j j s : 1 s n j I + 3 J + R 3 ( I + J + R ) = 3(t 1), which is a contradiction. Now, for each v V(G ), let x v V(G ) be a vertex such that N G [v] N G [x v ] = V(G ). We show that the set S v = {v,x v } is an EmSS of G. Obviously, S v is a dominating set of G. Consider an attack on a vertex u of V(G ). Then one of v or x v is adjacent to u. Let uv E(G ). If x u is adjacent to x v, then we can shift guards from v and x v to u and x u, respectively. Let x u x v / E(G ). Then x u v,ux v E(G ) and we can shift guards from v and x v to x u and u, respectively. Therefore, σ m (G ) = and this implies that b σm (G) Thus b σm (G) = and the proof is complete. 3(t 1) 3(t 1). 5. Trees In this section, we first prove that for any nontrivial tree T, b σm (T) and then we characterize all trees attaining this bound. Theorem 1. For any tree T of order n, b σm (T). Proof. If diam(t), then T is a star and the result is immediate. Let diam(t) 3. Suppose P := v 1 v v k is a diametral path in T and root T at v k. Obviously, k 4. If deg(v ) =, then b σm (T) by Theorem 10. Let deg(v ) 3. Then v is adjacent to a leaf v other than v 1. Since d(v 1,v ) =, Theorem 13 implies that b σm (T). This completes the proof. Next, we provide a constructive characterization of all trees attaining the bound of Theorem 1. For this purpose, we describe a procedure to build a family T of trees as follows. Let T be the family of trees such that a path P 3 is a tree in T and if T is a tree in T, then the tree T obtained from T by the following four operations which extend the tree T by attaching a tree to a vertex v V(T), called an attacher, is also a tree in T (see Figure 1). Operation T 1. If v V(T), then T 1 adds a path vxy to T. Operation T. If v V(T), then T adds a star K 1,3 with central vertex y and leaves x,w,z and joins x to v.

10 1000 H. Aram, M. Atapour and S.M. Sheikholeslami v x y v x y T 1 : T : z w T 3 : v leaf w x y z T 4 : v leaf x 1 x Figure 1. The four operations. Operation T 3. If v V(T) is a leaf, then T 3 adds a pendant edge vw and a star K 1, with central vertex x and leaves y,z and joins x to v. Operation T 4. If v V(T) is a leaf, then T 4 adds two new stars K 1, centered at x 1 and x, and joins v to x 1 and x. We start with some lemmas. Lemma. Let G be a graph and v V(G). If G is the graph obtained from G by attaching a path vxy, then σ m (G ) = σ m (G) + 1. In particular, b σm (G ) b σm (G). Proof. Clearly, addingxtoanyσ m (G)-setyieldsanEmSSofG andsoσ m (G ) σ m (G)+1. LetnowS beaσ m (G )-setcontainingy (wemayassumearesponseto an attack on y). If x S, then the set (S \{x,y}) {w}, where w N G [v]\s, is anemssofg. Ifx S, thens \{y}isanemssofg. Thusσ m (G) σ m (G ) 1 and so σ m (G ) = σ m (G)+1. Lemma 3. Let G be a graph and v V(G). If G is the graph obtained from G by adding a star K 1,3 with central vertex y and leaves x,w,z and joining x to v, then σ m (G ) = σ m (G)+. In particular, b σm (G ) b σm (G). Proof. Clearly, adding x and y to any σ m (G)-set yields an EmSS of G and so σ m (G ) σ m (G) +. Suppose now S is a σ m (G )-set containing z (we may assume a response to an attack on z). Since S is a dominating set, we must have S {y,w} 1. Ifx S thentheset(s \{x,y,z,w}) {u}, whereu N G [v]\s is an EmSS of G, and if x S then the set S \ {x,y,z,w} is an EmSS of G. Hence σ m (G) σ m (G ) and this implies that σ m (G ) = σ m (G)+. Lemma 4. Let G be a graph and let v V(G). If G is the graph obtained from G by adding a pendant edge vw and a star K 1, with central vertex x

11 Eternal m-security Bondage Numbers in Graphs 1001 and leaves y,z and joining x to v, then σ m (G ) = σ m (G) +. In particular, b σm (G ) b σm (G). Proof. Clearly, adding x,y to any σ m (G)-set containing v yields an EmSS of G and so σ m (G ) σ m (G) +. Assume now that S is a σ m (G )-set. As in the proof of Lemma 3, we may assume that y S and S {x,z} 1. Since S is a dominating set, we must have S {v,w} 1. If S {x,y,z,w} 3, then let S = (S \{x,y,z,w}) {u} where u N G [v]\s, and if S {x,y,z,w} =, then let S = S \{x,y,z,w}. Clearly, S is an EmSS of G and hence σ m (G) σ m (G ). Thus σ m (G ) = σ m (G)+. Lemma 5. Let G be a graph and let v V(G). If G is the graph obtained from G by adding two new stars K 1, centered at x 1,x and joining v to x 1,x, then σ m (G ) = σ m (G)+3. In particular, b σm (G ) b σm (G). Proof. Lety i,z i betheleavesadjacenttox i fori = 1,. Clearly,addingx 1,x,y 1 to any σ m (G)-set containing v yields an EmSS of G and so σ m (G ) σ m (G)+3. Let now S be a σ m (G )-set. As above we may assume that y 1 S, S {x 1,z 1 } 1 and S {x,y,z } 1. It is easy to see that S {x,y,z,v}. If S {x,y,z } =, then let S = (S {x 1,y 1,z 1,x,y,z }) {u} where u N G [v]\s, andif S {x,y,z } = 1, thenlets = S \{x 1,y 1,z 1,x,y,z }. Clearly, S is an EmSS of G and hence σ m (G) σ m (G ) 3. Thus σ m (G ) = σ m (G)+3. Lemma 6. Let T T and u V(T). If T is a tree obtained from T by adding a pendant edge uu, then σ m (T ) = σ m (T). Proof. Let T be a tree obtained from T by adding the pendant edge uu. If S is a σ m (T )-set, then let S = S if u S and S = (S {u }) {w}, where w N T [u]\s, whenu S. Clearly, S isanemssforgandsoσ m (T) σ m (T ). Now we show that σ m (T ) σ m (T). Let P 3 = v 1 v v 3 and let T be obtained from P 3 by successive operations T 1,...,T m, respectively, where T i {T 1,T,T 3,T 4 } for 1 i m, if m 1, and T = P 3 if m = 0. The proof is by induction on m. If m = 0, then clearly the statement is true. Assume m 1 and that the statement holds for all trees which are obtained from P 3 by applying at most m 1 operations. Suppose T m 1 is a tree obtained by applying the first m 1 operations T 1,...,T m 1 and let T be obtained from T m 1 by adding a new part to the attacher v. Assume that T m 1 is obtained from T m 1 by adding a pendant edge uu when u V(T m 1 ). We consider four cases. Case 1. T m = T 1. Then T is obtained from T m 1 by attaching a path vxy to v V(T m 1 ). If u V(T m 1 ), then by the inductive hypothesis, σ m (T m 1 ) = σ m (T m 1 ) and by Lemma we have σ m(t ) = σ m (T). Suppose u {x,y}. Let T = T {y,u }. Then, obviously, T is obtained from T m 1 by adding the

12 100 H. Aram, M. Atapour and S.M. Sheikholeslami pendant edge xv. By the inductive hypothesis, σ m (T ) = σ m (T m 1 ). Let S be a σ m (T )-set containing x. Then S {y} is an EmSS of T and by Lemma we have σ m (T ) σ m (T )+1 = σ m (T m 1 )+1 = σ m (T). Case. T m = T. Then T is obtained from T m 1 by adding a star K 1,3 with central vertex y and leaves x,w,z and joining x to v. If u V(T m 1 ), then the result follows from the induction hypothesis and Lemma 3. Assume that u {x,y,z,w}. Let T = T {y,z,w}. By the induction hypothesis, we have σ m (T ) = σ m (T m 1 ). Let S be a σ m (T )-set containing x. Then the set S {y,z} if u w and the set S {y,w} if u = w, is an EmSS of T and so σ m (T ) σ m (T )+. By Lemma 3, we obtain σ m (T ) σ m (T )+ = σ m (T m 1 )+ = σ m (T). Case 3. T m = T 3. Then T is obtained from T m 1 by attaching a pendant edge vw at v and adding a star K 1, with central vertex x and leaves y,z and joining x to v. If u V(T m 1 ), then we deduce from the induction hypothesis and Lemma 4 that σ m (T ) = σ m (T). If u = x or u = y (the case u = z is similar), then let T = T {u,x,y,z}. Obviously, T is obtained from T m 1 by adding the pendant edge vw at v. By the induction hypothesis, we have σ m (T ) = σ m (T m 1 ). Clearly, adding x,y to any σ m (T )-set yields an EmSS of T and so σ m (T ) σ m (T )+ = σ m (T m 1 )+ = σ m (T). If u = w, then let T = T {u,x,y,z}. Obviously, T is obtained from T m 1 by adding the pendant edge vw at v. By the inductive hypothesis, σ m (T ) = σ m (T m 1 ). Let S be a σ m (T )-set containing w. Then S {v,x} if v / S and S {x,y} if v S, is an EmSS of T and so σ m (T ) σ m (T )+ = σ m (T m 1 )+ = σ m (T). Case 4. T m = T 4. Then T is obtained from T m 1 by adding two stars K 1, with central vertices x 1 and x and joining x 1,x to v V(T m 1 ). Let y i,z i be the leaves adjacent to x i for i = 1,. If u V(T m 1 ), then the result follows from the induction hypothesis and Lemma 5. If u = x 1 (the case u = x is similar), then adding x 1,y 1,x to any σ m (T m 1 )-set containing v yields an EmSS of T and we deduce from Lemma 5 that σ m (T ) σ m (T m 1 )+3 = σ m (T). Assume that u = y 1 (the cases u = z 1,u = y,u = z are similar). Let T = T {x 1,y 1,z 1,u,y,z }. Obviously, T is obtained from T m 1 by adding pendant edge vx at v. By the inductive hypothesis, we have σ m (T ) = σ m (T m 1 ).

13 Eternal m-security Bondage Numbers in Graphs 1003 Clearly, adding x 1,y 1,y to any σ m (T )-set containing x, yields an EmSS of T and this implies that σ m (T ) σ m (T )+3 = σ m (T m 1 )+3 = σ m (T). Hence σ m (T ) σ m (T). Thus σ m (T ) = σ m (T) and the proof is complete. Theorem 7. If T T, then b σm (T) =. Proof. Let T T, e E(T) and T = T e. Clearly σ m (T ) σ m (T). Now we show that σ m (T ) σ m (T). Let P 3 := v 1 v v 3 and let T be obtained from P 3 by successive operations T 1,...,T m, respectively, where T i {T 1,T,T 3,T 4 } for 1 i m if m 1 and T = P 3 if m = 0. The proof is by induction on m. If m = 0, then the statement is true by Corollary 4. Assume m 1 and that the statement holds for all trees obtained from P 3 by applying at most m 1 operations. Suppose T m 1 is a tree obtained by applying the first m 1 operations T 1,...,T m 1. We consider four cases. Case 1. T m = T 1. Then T is obtained from T m 1 by attaching a path vxy at v V(T m 1 ). If e E(T m 1 ), then we deduce from the induction hypothesis and Lemma that σ m (T ) = σ m (T m 1 e)+1 = σ m (T m 1 )+1 = σ m (T). If e = vx, then clearly σ m (T ) = σ m (T m 1 )+1 = σ m (T). Assume that e = xy. Let T = T {y}. Then T is obtained from T m 1 by adding a pendant path vx at v. Clearly σ m (T ) = σ m (T )+1. It follows from Lemmas 6 and that σ m (T ) = σ m (T )+1 = σ m (T m 1 )+1 = σ m (T). Case. T m = T. Then T is obtained from T m 1 by adding a star K 1,3 with central vertex y and leaves x,w,z and joining x to v. If e E(T m 1 ), then by the inductive hypothesis and Lemma 3 we have σ m (T ) = σ m (T m 1 e)+ = σ m (T m 1 )+ = σ m (T). If e = vx, then clearly σ m (T ) = σ m (T m 1 ) + = σ m (T). If e = xy, then let T = T {y,z,w}. By Lemma 6, we have σ m (T ) = σ m (T m 1 ). Clearly σ m (T ) = σ m (T )+ and by Lemma 3 we have σ m (T ) = σ m (T )+ = σ m (T m 1 )+ = σ m (T). Assume that e = yz. Let T = T {z,w}. Then T is obtained from T m 1 by OperationT 1 andsot Tandσ m (T ) = σ m (T m 1 )+1. ByLemma6, wehave

14 1004 H. Aram, M. Atapour and S.M. Sheikholeslami σ m (T +yw) = σ m (T ). Now it is easy to check that σ m (T ) σ m (T +yw)+1 and by Lemma 3 we have σ m (T ) σ m (T )+1 = σ m (T m 1 )+ = σ m (T). Case 3. T m = T 3. Then T is obtained from T m 1 by adding a pendant edge vw at a leaf v V(T m 1 ) and adding a star K 1, with central vertex x and leaves y,z and joining x to v. If e E(T m 1 ), then we conclude from the induction hypothesis and Lemma 4 that σ m (T ) = σ m (T m 1 e)+ = σ m (T m 1 )+ = σ m (T). If e = vw, then let T = T {y,z,w}. Then we have σ m (T ) = σ m (T m 1 ) by Lemma 6. On the other hand, adding y,w to any σ m (T )-set containing x, yields an EmSS of T and we deduce from Lemma 4 that σ m (T ) σ m (T )+ = σ m (T m 1 )+ = σ m (T). If e {xv,xy,xz}, then let T = T {x,y,z}. Then T is obtained from T m 1 by attaching a pendant edge vw. By Lemma 6, we have σ m (T ) = σ m (T m 1 ). On the other hand, adding x,y to any σ m (T )-set yields an EmSS of T and it follows from Lemma 4 that σ m (T ) σ m (T )+ = σ m (T m 1 )+ = σ m (T). Case 4. T m = T 4. Then T is obtained from T m 1 by adding two stars K 1, with central vertices x 1 and x and joining x 1,x to a leaf v. Let y i,z i be the leaves adjacent to x i for i = 1,. If e E(T m 1 ), then by the inductive hypothesis and Lemma 5 we have σ m (T ) = σ m (T m 1 e)+3 = σ m (T m 1 )+3 = σ m (T). If e = x 1 v or e = x 1 y 1, then let T = T {x 1,y 1,z 1,y,z }. Then T is obtained from T m 1 by attaching a pendant edge vx at v. By Lemma 6, we have σ m (T ) = σ m (T m 1 ). On the other hand, adding x 1,y 1,y to any σ m (T )- set containing x yields an EmSS of T and it follows from Lemma 5 that σ m (T ) σ m (T )+3 = σ m (T m 1 )+3 = σ m (T). In the other cases, we can see that σ m (T ) σ m (T) as above. Hence σ m (T ) σ m (T). Thus σ m (T ) = σ m (T) and this implies that b σm (T). Now the result follows from Theorem 1. Now we are ready to prove the main theorem of this section.

15 Eternal m-security Bondage Numbers in Graphs 1005 Theorem 8. Let T be a tree of order n 3. Then b σm (T) = if and only if T T. Proof. According to Theorem 7, we only need to prove the necessity. We proceed by the induction on n. If n = 3, then the result is trivial. Assume that n 4 and the statement holds for all trees T of order less than n. Let T be a tree of order n with b σm (T) =. Since b σm (K 1,n 1 ) = 1, we have diam(t) 3. Suppose P := v 1 v k is a diametral path in T such that deg(v ) is as small as possible and root T at v k. If deg(v ) =, then let T = T {v 1,v }. By Lemma, we have σ m (T) = σ m (T ) + 1 and b σm (T ) =. It follows from the induction hypothesis that T T. Now T can be obtained from T by Operation T 1 and hence T T. Let deg(v ) 3. We conclude from Proposition 7 that deg(v ) = 3. Let w v 1 be a leaf adjacent to v. If deg(v 3 ) =, then let T = T {v 1,v,v 3,w}. By Lemma 3, we have σ m (T) = σ m (T ) + and b σm (T ) =. By the induction hypothesis, we obtain T T. Now T can be obtained from T by Operation T and so T T. Let deg(v 3 ) 3. We consider the following cases. Case 1. There exists a path v 3 xy in T such that x {v,v 4 }. By the choice of diametral path and Proposition 7, we have deg(x) = 3. If v 3 is a support vertex and u is a leaf adjacent to v 3, then it is not hard to see that deleting the edge v 3 u increases the eternal m-security number which leads to a contradiction. Suppose v 3 is not a support vertex. If v 3 is adjacent to a support vertex w other than x,v,v 4, then as above we may assume that deg(w) = 3. It is easy to see that deleting the edge v 3 w increases the eternal m-security number which leads to a contradiction. Hence, deg(v 3 ) = 3. Let T = T {v 1,v,w,x,y,z} where y and z are the leaves adjacent to x. Then σ m (T) = σ m (T )+3 and b σm (T ) = by Lemma 5. We deduce from the induction hypothesis that T T and so T can be obtained from T by Operation T 4. Hence T T. Case. Any neighbor of v 3, except v,v 4, is a leaf. Let u be a leaf adjacent to v 3. If deg(v 3 ) 4, then it is easy to see that deleting the edge v 3 u increases the eternalm-security number and sob σm (T) = 1, acontradiction. Thus deg(v 3 ) = 3. Let T = T {v 1,v,u,w}. By Lemma 4 we have σ m (T) = σ m (T ) + and b σm (T ) =. It follows from the inductive hypothesis that T T. By Operation T 3, T can be obtained from T and so T T. This completes the proof. References [1] A.P. Burger, E.J. Cockayne, W.R. Gröndlingh, C.M. Mynhardt, J.H. van Vuuren and W. Winterbach, Infinite order domination in graphs, J. Combin. Math. Combin. Comput. 50 (004)

16 1006 H. Aram, M. Atapour and S.M. Sheikholeslami [] J.F. Fink, M.S. Jacobson, L.F. Kinch and J. Roberts, The bondage number of a graph, Discrete Math. 86 (1990) doi: / x(90)90348-l [3] W. Goddard, S.M. Hedetniemi and S.T. Hedetniemi, Eternal security in graphs, J. Combin. Math. Combin. Comput. 5 (005) [4] B.L. Hartnell and D.F. Rall, Bounds on the bondage number of a graph, Discrete Math. 18 (1994) doi: / x(94) [5] T.W. Haynes, S.T. Hedetniemi and P.J. Slater, Fundamentals of Domination in graphs (New York, Marcel Dekker, Inc., 1998). [6] J. Huang and J. Ming Xu, The bondage numbers and efficient dominations of vertextransitive graphs, Discrete Math. 308 (008) doi: /j.disc [7] A. Meir and J.W. Moon, Relations between packing and covering numbers of a tree, Pacific J. Math. 61 (1975) doi:10.140/pjm [8] U. Teschner, The bondage number of a graph G can be much greater than (G), Ars Combin. 43 (1996) [9] U. Teschner, New results about the bondage number of a graph, Discrete Math. 171 (1997) doi: /s x(96) [10] U. Teschner, A counterexample to a conjecture on the bondage number of a graph, Discrete Math. 1 (1993) doi: / x(93)90317-m [11] D.B. West, Introduction to Graph Theory (Prentice-Hall, Inc., 000). [1] Jun-Ming Xu, On bondage numbers of graphs: a survey with some comments, Int. J. Combin. 013, article ID 59510, 34 pages. doi: /013/59510 Received 1 September 016 Revised 3 April 017 Accepted 3 April 017

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

Structure connectivity and substructure connectivity of twisted hypercubes

Structure connectivity and substructure connectivity of twisted hypercubes arxiv:1803.08408v1 [math.co] Mar 018 Structure connectivity and substructure connectivity of twisted hypercubes Dong Li, Xiaolan Hu, Huiqing Liu Abstract Let G be a graph and T a certain connected subgraph

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Variations on a theme by Weetman

Variations on a theme by Weetman Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

Strong Subgraph k-connectivity of Digraphs

Strong Subgraph k-connectivity of Digraphs Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai

More information

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Teaching Note October 26, 2007 Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Xinhua Zhang Xinhua.Zhang@anu.edu.au Research School of Information Sciences

More information

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Lewis Sears IV Washington and Lee University 1 Introduction The study of graph

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

A survey on the generalized connectivity of graphs arxiv: v2 [math.co] 11 Sep 2012

A survey on the generalized connectivity of graphs arxiv: v2 [math.co] 11 Sep 2012 A survey on the generalized connectivity of graphs arxiv:107.1838v [math.co] 11 Sep 01 Xueliang Li, Yaping Mao Center for Combinatorics and LPMC-TJKLC Nankai University, Tianjin 300071, P.R. China E-mails:

More information

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0)

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) Int. Journal of Math. Analysis, Vol. 8, 2014, no. 9, 415-426 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.312299 Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) W. Puninagool

More information

The skew-rank of oriented graphs

The skew-rank of oriented graphs The skew-rank of oriented graphs Xueliang Li a, Guihai Yu a,b, a Center for Combinatorics and LPMC-TJKLC arxiv:14047230v1 [mathco] 29 Apr 2014 Nankai University, Tianjin 300071, China b Department of Mathematics

More information

Minor Monotone Floors and Ceilings of Graph Parameters

Minor Monotone Floors and Ceilings of Graph Parameters Minor Monotone Floors and Ceilings of Graph Parameters Thomas Milligan Department of Mathematics and Statistics University of Central Oklahoma tmilligan1@uco.edu 13 July, 2012 2012 SIAM Annual Meeting

More information

Bounds on coloring numbers

Bounds on coloring numbers Ben-Gurion University, Beer Sheva, and the Institute for Advanced Study, Princeton NJ January 15, 2011 Table of contents 1 Introduction 2 3 Infinite list-chromatic number Assuming cardinal arithmetic is

More information

Fractional Graphs. Figure 1

Fractional Graphs. Figure 1 Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to

More information

arxiv: v1 [cs.dm] 4 Jan 2012

arxiv: v1 [cs.dm] 4 Jan 2012 COPS AND INVISIBLE ROBBERS: THE COST OF DRUNKENNESS ATHANASIOS KEHAGIAS, DIETER MITSCHE, AND PAWE L PRA LAT arxiv:1201.0946v1 [cs.dm] 4 Jan 2012 Abstract. We examine a version of the Cops and Robber (CR)

More information

Brouwer, A.E.; Koolen, J.H.

Brouwer, A.E.; Koolen, J.H. Brouwer, A.E.; Koolen, J.H. Published in: European Journal of Combinatorics DOI: 10.1016/j.ejc.008.07.006 Published: 01/01/009 Document Version Publisher s PDF, also known as Version of Record (includes

More information

On the Prime Labeling of Generalized Petersen Graphs P (n, 3) 1

On the Prime Labeling of Generalized Petersen Graphs P (n, 3) 1 Int. J. Contemp. Math. Sciences, Vol., 0, no., - 00 On the Prime Labeling of Generalized Petersen Graphs P (n, ) Kh. Md. Mominul Haque Department of Computer Science and Engineering Shahjalal University

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

Approximate Revenue Maximization with Multiple Items

Approximate Revenue Maximization with Multiple Items Approximate Revenue Maximization with Multiple Items Nir Shabbat - 05305311 December 5, 2012 Introduction The paper I read is called Approximate Revenue Maximization with Multiple Items by Sergiu Hart

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

On the Lower Arbitrage Bound of American Contingent Claims

On the Lower Arbitrage Bound of American Contingent Claims On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models

MATH 5510 Mathematical Models of Financial Derivatives. Topic 1 Risk neutral pricing principles under single-period securities models MATH 5510 Mathematical Models of Financial Derivatives Topic 1 Risk neutral pricing principles under single-period securities models 1.1 Law of one price and Arrow securities 1.2 No-arbitrage theory and

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

On Toponogov s Theorem

On Toponogov s Theorem On Toponogov s Theorem Viktor Schroeder 1 Trigonometry of constant curvature spaces Let κ R be given. Let M κ be the twodimensional simply connected standard space of constant curvature κ. Thus M κ is

More information

CS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0.

CS134: Networks Spring Random Variables and Independence. 1.2 Probability Distribution Function (PDF) Number of heads Probability 2 0. CS134: Networks Spring 2017 Prof. Yaron Singer Section 0 1 Probability 1.1 Random Variables and Independence A real-valued random variable is a variable that can take each of a set of possible values in

More information

CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n

CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n Chebyshev Sets A subset S of a metric space X is said to be a Chebyshev set if, for every x 2 X; there is a unique point in S that is closest to x: Put

More information

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper.

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper. FORCING AND THE HALPERN-LÄUCHLI THEOREM NATASHA DOBRINEN AND DAN HATHAWAY Abstract. We will show the various effects that forcing has on the Halpern-Läuchli Theorem. We will show that the the theorem at

More information

Cumulants and triangles in Erdős-Rényi random graphs

Cumulants and triangles in Erdős-Rényi random graphs Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability

More information

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs

A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs A Combinatorial Proof for the Circular Chromatic Number of Kneser Graphs Daphne Der-Fen Liu Department of Mathematics California State University, Los Angeles, USA Email: dliu@calstatela.edu Xuding Zhu

More information

More On λ κ closed sets in generalized topological spaces

More On λ κ closed sets in generalized topological spaces Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir More On λ κ closed sets in generalized topological spaces R. Jamunarani, 1, P. Jeyanthi 2 and M. Velrajan 3 1,2 Research Center,

More information

A Property Equivalent to n-permutability for Infinite Groups

A Property Equivalent to n-permutability for Infinite Groups Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

Cartesian Product of Two S-Valued Graphs

Cartesian Product of Two S-Valued Graphs Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 9, Number 3 (2017), pp. 347-355 International Research Publication House http://www.irphouse.com Cartesian Product of

More information

An effective perfect-set theorem

An effective perfect-set theorem An effective perfect-set theorem David Belanger, joint with Keng Meng (Selwyn) Ng CTFM 2016 at Waseda University, Tokyo Institute for Mathematical Sciences National University of Singapore The perfect

More information

Separation axioms on enlargements of generalized topologies

Separation axioms on enlargements of generalized topologies Revista Integración Escuela de Matemáticas Universidad Industrial de Santander Vol. 32, No. 1, 2014, pág. 19 26 Separation axioms on enlargements of generalized topologies Carlos Carpintero a,, Namegalesh

More information

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition. The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write

More information

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Fuzzy Optim Decis Making 217 16:221 234 DOI 117/s17-16-9246-8 No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Xiaoyu Ji 1 Hua Ke 2 Published online: 17 May 216 Springer

More information

ORDERED SEMIGROUPS HAVING THE P -PROPERTY. Niovi Kehayopulu, Michael Tsingelis

ORDERED SEMIGROUPS HAVING THE P -PROPERTY. Niovi Kehayopulu, Michael Tsingelis ORDERED SEMIGROUPS HAVING THE P -PROPERTY Niovi Kehayopulu, Michael Tsingelis ABSTRACT. The main results of the paper are the following: The ordered semigroups which have the P -property are decomposable

More information

Best response cycles in perfect information games

Best response cycles in perfect information games P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski

More information

4: SINGLE-PERIOD MARKET MODELS

4: SINGLE-PERIOD MARKET MODELS 4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period

More information

arxiv: v3 [cs.gt] 12 Apr 2017

arxiv: v3 [cs.gt] 12 Apr 2017 Multi-Player Diffusion Games on Graph Classes arxiv:1412.2544v3 [cs.gt] 12 Apr 2017 Laurent Bulteau 1, Vincent Froese 2, and Nimrod Talmon 3 1 IGM-LabInfo, CNRS UMR 8049, Université Paris-Est Marne-la-Vallée,

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

A Theory of Value Distribution in Social Exchange Networks

A Theory of Value Distribution in Social Exchange Networks A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical

More information

A Theory of Value Distribution in Social Exchange Networks

A Theory of Value Distribution in Social Exchange Networks A Theory of Value Distribution in Social Exchange Networks Kang Rong, Qianfeng Tang School of Economics, Shanghai University of Finance and Economics, Shanghai 00433, China Key Laboratory of Mathematical

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Forecast Horizons for Production Planning with Stochastic Demand

Forecast Horizons for Production Planning with Stochastic Demand Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December

More information

Level by Level Inequivalence, Strong Compactness, and GCH

Level by Level Inequivalence, Strong Compactness, and GCH Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth

More information

A class of coherent risk measures based on one-sided moments

A class of coherent risk measures based on one-sided moments A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

ON THE QUOTIENT SHAPES OF VECTORIAL SPACES. Nikica Uglešić

ON THE QUOTIENT SHAPES OF VECTORIAL SPACES. Nikica Uglešić RAD HAZU. MATEMATIČKE ZNANOSTI Vol. 21 = 532 (2017): 179-203 DOI: http://doi.org/10.21857/mzvkptxze9 ON THE QUOTIENT SHAPES OF VECTORIAL SPACES Nikica Uglešić To my Master teacher Sibe Mardešić - with

More information

The generalized 3-connectivity of Cartesian product graphs

The generalized 3-connectivity of Cartesian product graphs The generalized 3-connectivit of Cartesian product graphs Hengzhe Li, Xueliang Li, Yuefang Sun To cite this version: Hengzhe Li, Xueliang Li, Yuefang Sun. The generalized 3-connectivit of Cartesian product

More information

Two-lit trees for lit-only sigma-game

Two-lit trees for lit-only sigma-game Two-lit trees for lit-only sigma-game Hau-wen Huang July 24, 2018 arxiv:1010.5846v3 [math.co] 14 Aug 2012 Abstract A configuration of the lit-only σ-game on a finite graph Γ is an assignment of one of

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,

More information

arxiv: v4 [cs.gt] 1 Oct 2015

arxiv: v4 [cs.gt] 1 Oct 2015 Minority Becomes Majority in Social Networks Vincenzo Auletta Ioannis Caragiannis Diodato Ferraioli Clemente Galdi Giuseppe Persiano arxiv:1402.4050v4 [cs.gt] 1 Oct 2015 Abstract It is often observed that

More information

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1) Com S 611 Spring Semester 2015 Advanced Topics on Distributed and Concurrent Algorithms Lecture 5: Tuesday, January 27, 2015 Instructor: Soma Chaudhuri Scribe: Nik Kinkel 1 Introduction This lecture covers

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis Seller has n items for sale The Set-up Seller has n items

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

An Application of Ramsey Theorem to Stopping Games

An Application of Ramsey Theorem to Stopping Games An Application of Ramsey Theorem to Stopping Games Eran Shmaya, Eilon Solan and Nicolas Vieille July 24, 2001 Abstract We prove that every two-player non zero-sum deterministic stopping game with uniformly

More information

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network 8 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 8 WeC34 Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH

DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH DEPTH OF BOOLEAN ALGEBRAS SHIMON GARTI AND SAHARON SHELAH Abstract. Suppose D is an ultrafilter on κ and λ κ = λ. We prove that if B i is a Boolean algebra for every i < κ and λ bounds the Depth of every

More information

Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks

Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Costas Busch Rensselaer Polytechnic Inst. Troy, NY 12180 buschc@cs.rpi.edu Srikanth Surapaneni Rensselaer Polytechnic Inst. Troy,

More information

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2. li. 1. 6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY f \,«* Hamilton Emmons Technical Memorandum No. 2 May, 1973 1 il 1 Abstract The problem of sequencing n jobs on

More information

ON A PROBLEM BY SCHWEIZER AND SKLAR

ON A PROBLEM BY SCHWEIZER AND SKLAR K Y B E R N E T I K A V O L U M E 4 8 ( 2 1 2 ), N U M B E R 2, P A G E S 2 8 7 2 9 3 ON A PROBLEM BY SCHWEIZER AND SKLAR Fabrizio Durante We give a representation of the class of all n dimensional copulas

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

An Optimal Odd Unimodular Lattice in Dimension 72

An Optimal Odd Unimodular Lattice in Dimension 72 An Optimal Odd Unimodular Lattice in Dimension 72 Masaaki Harada and Tsuyoshi Miezaki September 27, 2011 Abstract It is shown that if there is an extremal even unimodular lattice in dimension 72, then

More information

Sequentially perfect and uniform one-factorizations of the complete graph

Sequentially perfect and uniform one-factorizations of the complete graph Sequentially perfect and uniform one-factorizations of the complete graph Jeffrey H. Dinitz Mathematics and Statistics University of Vermont, Burlington, VT, USA 05405 Jeff.Dinitz@uvm.edu Peter Dukes Mathematics

More information

Value of Flexibility in Managing R&D Projects Revisited

Value of Flexibility in Managing R&D Projects Revisited Value of Flexibility in Managing R&D Projects Revisited Leonardo P. Santiago & Pirooz Vakili November 2004 Abstract In this paper we consider the question of whether an increase in uncertainty increases

More information

Collective Profitability and Welfare in Selling-Buying Intermediation Processes

Collective Profitability and Welfare in Selling-Buying Intermediation Processes Collective Profitability and Welfare in Selling-Buying Intermediation Processes Amelia Bădică 1, Costin Bădică 1(B), Mirjana Ivanović 2, and Ionuţ Buligiu 1 1 University of Craiova, A. I. Cuza 13, 200530

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics

More information

BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES

BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES Journal of Science and Arts Year 17, No. 1(38), pp. 69-80, 2017 ORIGINAL PAPER BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES CAN KIZILATEŞ 1, NAIM TUGLU 2, BAYRAM ÇEKİM 2

More information

BETA DISTRIBUTION ON ARITHMETICAL SEMIGROUPS

BETA DISTRIBUTION ON ARITHMETICAL SEMIGROUPS Annales Univ Sci Budapest Sect Comp 47 (2018) 147 154 BETA DISTRIBUTION ON ARITHMETICAL SEMIGROUPS Gintautas Bareikis and Algirdas Mačiulis (Vilnius Lithuania) Communicated by Imre Kátai (Received February

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

Special M-Hyperidentities in Triregular Leftmost without Loop and Reverse Arc Graph Varieties of Type (2,0)

Special M-Hyperidentities in Triregular Leftmost without Loop and Reverse Arc Graph Varieties of Type (2,0) International Mathematical Forum, Vol. 7, 2012, no. 39, 1925-1940 Special M-Hyperidentities in Triregular Leftmost without Loop and Reverse Arc Graph Varieties of Type (2,0) Apinant Anantpinitwatna and

More information

PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES

PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES WILLIAM R. BRIAN AND ARNOLD W. MILLER Abstract. We prove that, for every n, the topological space ω ω n (where ω n has the discrete topology) can

More information