-
Automorphism groups of Cayley graphs generated by general transposition sets
Authors:
Dion Gijswijt,
Frank de Meijer
Abstract:
In this paper we study the Cayley graph $\mathrm{Cay}(S_n,T)$ of the symmetric group $S_n$ generated by a set of transpositions $T$. We show that for $n\geq 5$ the Cayley graph is normal. As a corollary, we show that its automorphism group is a direct product of $S_n$ and the automorphism group of the transposition graph associated to $T$. This provides an affirmative answer to a conjecture raised…
▽ More
In this paper we study the Cayley graph $\mathrm{Cay}(S_n,T)$ of the symmetric group $S_n$ generated by a set of transpositions $T$. We show that for $n\geq 5$ the Cayley graph is normal. As a corollary, we show that its automorphism group is a direct product of $S_n$ and the automorphism group of the transposition graph associated to $T$. This provides an affirmative answer to a conjecture raised by Ganesan in arXiv:1703.08109, showing that $\mathrm{Cay}(S_n,T)$ is normal if and only if the transposition graph is not $C_4$ or $K_n$.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Blocking sets, minimal codes and trifferent codes
Authors:
Anurag Bishnoi,
Jozefien D'haeseleer,
Dion Gijswijt,
Aditya Potukuchi
Abstract:
We prove new upper bounds on the smallest size of affine blocking sets, that is, sets of points in a finite affine space that intersect every affine subspace of a fixed codimension. We show an equivalence between affine blocking sets with respect to codimension-$2$ subspaces that are generated by taking a union of lines through the origin, and strong blocking sets in the corresponding projective s…
▽ More
We prove new upper bounds on the smallest size of affine blocking sets, that is, sets of points in a finite affine space that intersect every affine subspace of a fixed codimension. We show an equivalence between affine blocking sets with respect to codimension-$2$ subspaces that are generated by taking a union of lines through the origin, and strong blocking sets in the corresponding projective space, which in turn are equivalent to minimal codes. Using this equivalence, we improve the current best upper bounds on the smallest size of a strong blocking set in finite projective spaces over fields of size at least $3$. Furthermore, using coding theoretic techniques, we improve the current best lower bounds on strong blocking set.
Our main motivation for these new bounds is their application to trifferent codes, which are sets of ternary codes of length $n$ with the property that for any three distinct codewords there is a coordinate where they all have distinct values. Over the finite field $\mathbb{F}_3$, we prove that minimal codes are equivalent to linear trifferent codes. Using this equivalence, we show that any linear trifferent code of length $n$ has size at most $3^{n/4.55}$, improving the recent upper bound of Pohoata and Zakharov. Moreover, we show the existence of linear trifferent codes of length $n$ and size at least $\frac{1}{3}\left( 9/5 \right)^{n/4}$, thus (asymptotically) matching the best lower bound on trifferent codes.
We also give explicit constructions of affine blocking sets with respect to codimension-$2$ subspaces that are a constant factor bigger than the best known lower bound. By restricting to~$\mathbb{F}_3$, we obtain linear trifferent codes of size at least $3^{23n/312}$, improving the current best explicit construction that has size $3^{n/112}$.
△ Less
Submitted 9 May, 2024; v1 submitted 23 January, 2023;
originally announced January 2023.
-
Constructing Tree Decompositions of Graphs with Bounded Gonality
Authors:
Hans L. Bodlaender,
Josse van Dobben de Bruyn,
Dion Gijswijt,
Harry Smit
Abstract:
In this paper, we give a constructive proof of the fact that the treewidth of a graph is at most its divisorial gonality. The proof gives a polynomial time algorithm to construct a tree decomposition of width at most $k$, when an effective divisor of degree $k$ that reaches all vertices is given. We also give a similar result for two related notions: stable divisorial gonality and stable gonality.
In this paper, we give a constructive proof of the fact that the treewidth of a graph is at most its divisorial gonality. The proof gives a polynomial time algorithm to construct a tree decomposition of width at most $k$, when an effective divisor of degree $k$ that reaches all vertices is given. We also give a similar result for two related notions: stable divisorial gonality and stable gonality.
△ Less
Submitted 12 May, 2020;
originally announced May 2020.
-
Parallel Machine Scheduling with a Single Resource per Job
Authors:
T. Janssen,
C. Swennenhuis,
A. Bitar,
T. Bosman,
D. Gijswijt,
L. van Iersel,
S. Dauzére-Pérès,
C. Yugma
Abstract:
We study the problem of scheduling jobs on parallel machines minimizing the total completion time, with each job using exactly one resource. First, we derive fundamental properties of the problem and show that the problem is polynomially solvable if $p_j = 1$. Then we look at a variant of the shortest processing time rule as an approximation algorithm for the problem and show that it gives at leas…
▽ More
We study the problem of scheduling jobs on parallel machines minimizing the total completion time, with each job using exactly one resource. First, we derive fundamental properties of the problem and show that the problem is polynomially solvable if $p_j = 1$. Then we look at a variant of the shortest processing time rule as an approximation algorithm for the problem and show that it gives at least a $(2-\frac{1}{m})$-approximation. Subsequently, we show that, although the complexity of the problem remains open, three related problems are $\mathcal{NP}$-hard. In the first problem, every resource also has a subset of machines on which it can be used. In the second problem, once a resource has been used on a machine it cannot be used on any other machine, hence all jobs using the same resource need to be scheduled on the same machine. In the third problem, every job needs exactly two resources instead of just one.
△ Less
Submitted 16 November, 2018; v1 submitted 13 September, 2018;
originally announced September 2018.
-
Approximation Algorithms for Hard Capacitated $k$-facility Location Problems
Authors:
Karen Aardal,
Pieter van den Berg,
Dion Gijswijt,
Shanfei Li
Abstract:
We study the capacitated $k$-facility location problem, in which we are given a set of clients with demands, a set of facilities with capacities and a constant number $k$. It costs $f_i$ to open facility $i$, and $c_{ij}$ for facility $i$ to serve one unit of demand from client $j$. The objective is to open at most $k$ facilities serving all the demands and satisfying the capacity constraints whil…
▽ More
We study the capacitated $k$-facility location problem, in which we are given a set of clients with demands, a set of facilities with capacities and a constant number $k$. It costs $f_i$ to open facility $i$, and $c_{ij}$ for facility $i$ to serve one unit of demand from client $j$. The objective is to open at most $k$ facilities serving all the demands and satisfying the capacity constraints while minimizing the sum of service and opening costs.
In this paper, we give the first fully polynomial time approximation scheme (FPTAS) for the single-sink (single-client) capacitated $k$-facility location problem. Then, we show that the capacitated $k$-facility location problem with uniform capacities is solvable in polynomial time if the number of clients is fixed by reducing it to a collection of transportation problems. Third, we analyze the structure of extreme point solutions, and examine the efficiency of this structure in designing approximation algorithms for capacitated $k$-facility location problems. Finally, we extend our results to obtain an improved approximation algorithm for the capacitated facility location problem with uniform opening cost.
△ Less
Submitted 12 September, 2014; v1 submitted 19 November, 2013;
originally announced November 2013.
-
Violating the Shannon capacity of metric graphs with entanglement
Authors:
Jop Briet,
Harry Buhrman,
Dion Gijswijt
Abstract:
The Shannon capacity of a graph G is the maximum asymptotic rate at which messages can be sent with zero probability of error through a noisy channel with confusability graph G. This extensively studied graph parameter disregards the fact that on atomic scales, Nature behaves in line with quantum mechanics. Entanglement, arguably the most counterintuitive feature of the theory, turns out to be a u…
▽ More
The Shannon capacity of a graph G is the maximum asymptotic rate at which messages can be sent with zero probability of error through a noisy channel with confusability graph G. This extensively studied graph parameter disregards the fact that on atomic scales, Nature behaves in line with quantum mechanics. Entanglement, arguably the most counterintuitive feature of the theory, turns out to be a useful resource for communication across noisy channels. Recently, Leung, Mancinska, Matthews, Ozols and Roy [Comm. Math. Phys. 311, 2012] presented two examples of graphs whose Shannon capacity is strictly less than the capacity attainable if the sender and receiver have entangled quantum systems. Here we give new, possibly infinite, families of graphs for which the entangled capacity exceeds the Shannon capacity.
△ Less
Submitted 7 July, 2012;
originally announced July 2012.