00108
00108
DOUGLAS B. WEST
Zhejiang Normal University, China and University of Illinois, Urbana-Champaign
University Printing House, Cambridge CB2 8BS, United Kingdom
One Liberty Plaza, 20th Floor, New York, NY 10006, USA
477 Williamstown Road, Port Melbourne, VIC 3207, Australia
314–321, 3rd Floor, Plot 3, Splendor Forum, Jasola District Centre, New Delhi – 110025, India
79 Anson Road, #06–04/06, Singapore 079906
www.cambridge.org
Information on this title: www.cambridge.org/9781107058583
DOI: 10.1017/9781107415829
© Douglas B. West 2021
This publication is in copyright. Subject to statutory exception
and to the provisions of relevant collective licensing agreements,
no reproduction of any part may take place without the written
permission of Cambridge University Press.
First published 2021
Printed in the United Kingdom by TJ International Ltd, Padstow Cornwall
A catalogue record for this publication is available from the British Library.
ISBN 978-1-107-05858-3 Hardback
Additional resources for this publication at www.cambridge.org/west
Cambridge University Press has no responsibility for the persistence or accuracy of
URLs for external or third-party internet websites referred to in this publication
and does not guarantee that any content on such websites is, or will remain,
accurate or appropriate.
For my dear wife Ching
Contents
Preface xiii
Chapter 0 – Introduction. 1
Sets, Functions, and Relations: 2. Graphs: 3.
Discrete Probability: 6. Other Discrete Structures: 8. Complexity: 9.
Part I — Enumeration
vii
viii Contents
Part II — Graphs
Part IV — Methods
References 849
Author Index 929
Glossary of Notation 943
Subject Index 949
Preface
Combinatorics is now a mature discipline. Although some see it as a mael-
strom of isolated problems, it has central themes, techniques, and results that
make it a surprisingly coherent subject. Meanwhile, it still rewards its students
with endless discovery and delight.
This book introduces the reader to a substantial portion of combinatorics.
It is not exhaustive in topics, results, or bibliography. However, it is thorough
enough to equip the reader with the tools needed to read or do research in com-
binatorics or to apply combinatorics in other areas of mathematics and computer
science. It assumes the maturity and sophistication of graduate students with-
out assuming prior exposure to combinatorics. It assumes basic undergraduate
mathematics, such as elementary set theory, induction, equivalence relations,
limits, elementary calculus, and some linear algebra.
More advanced or specialized material is planned to appear in The Art of
Combinatorics, a four-volume series of texts intended for researchers and for ad-
vanced graduate courses in combinatorics. Nevertheless, there is enough here to
reward substantial study and investigation.
Despite its fundamental nature and its explosive growth in recent decades,
combinatorics still is not a standard part of mathematics instruction. Curricula
(and mathematicians) are slow to change.
Combinatorial ideas appear in courses on elementary discrete mathematics,
but such courses can be insubstantial. Serious undergraduate courses in combi-
natorics are seldom required for math majors. Graduate programs do not require
combinatorics. Nevertheless, it is an elegant and valuable subject.
In the mid-1980s, I began to teach graduate courses in combinatorics at the
University of Illinois. Excellent books existed for many topics, but every general
textbook omitted substantial areas. Gathering material for such a textbook, I
succumbed to the overabundance of riches before me. With so much beautiful ma-
terial in combinatorics, the project grew to become four rotating courses taught
from four books, now called The Art of Combinatorics.
xiii
xiv Preface
In 1996, I realized that this structure served only students already commit-
ted to focusing on combinatorics. For others, an overview of the subject could
have great value. An educated mathematical scientist should know some alge-
bra and analysis, and also such a person should be acquainted with fundamental
combinatorics and its relationships to other areas. Furthermore, disparities in
preparation of entering students make a core course worthwhile to establish a
common background before studying advanced material in combinatorics.
In 1997, I started a one-semester overview course to serve these goals. I ex-
tracted the fundamental material from The Art of Combinatorics and organized
it to emphasize connections among topics. This book is the result. However, with
so much beautiful combinatorics to choose from, I could not bring myself to cut
the book down to one semester. It can support a two-semester sequence, analo-
gous to fundamental two-semester sequences in classical areas of mathematics.
It can also support various one-semester courses, as discussed later.
Since the scope is large, I have also sought to make the book useful as a re-
search reference, rewarding further study after the courses are over. This leads to
a fair amount of optional material allowing the reader to probe farther into the
subject, plus remarks that provide statements and pointers to further results.
Nevertheless, I still aim to keep the material accessible to graduate students.
Organization
Usage
point of view for graduate students. Students with prior exposure to the subject
also benefit from this discussion. Classical topics in graph theory reside in Part
II, but interactions between graphs and other topics and techniques appear in
other chapters. Later topics are more independent, but the order of presentation
here works well. Part III can be viewed as a third introductory area; it considers
basic questions about sets and order relations. The methods of Part IV then apply
to questions about the combinatorial contexts introduced in Parts I–III.
When the second semester is optional, with the first being the exposure that
students from other areas will have to combinatorics, the first semester should be
broader. Such a course has goals like those in a one-semester core course leading
to multiple advanced courses in combinatorics. With this in mind, I have desig-
nated some sections and subsections as “optional”, and in others the items marked
“*” are optional. Such material is more technical or advanced and can be skipped
at first reading without loss of continuity. In such a course, optional or more dif-
ficult topics should be skipped in Chapters 1–9 in order to present highlights of
early portions of Chapters 10 and 12–14. I used this approach in a one-semester
introduction at the University of Illinois that served as a departmental gradu-
ate exam course in combinatorics and prepared combinatorics students for four
independent advanced courses.
That was a fast-moving course. I spent 16 lectures on enumeration (this can
be less), 12 on graphs, and several each on Ramsey theory, posets, probabilistic
methods, and designs, aiming in the latter topics mostly to introduce the basic
ideas. Thus I was quite brief about signed involutions, the pattern inventory,
and the magical properties of Young tableaux. Most students already had some
acquaintance with graph theory (the clientele included many computer science
students), so from Chapter 5 I presented just a few highlights and left the rest
as background reading. In Chapters 6–9 I covered mostly fundamentals. Gradu-
ate students should see a bit extra, so in Chapter 6 I proved Plesnı́k’s Theorem
instead of Petersen’s Theorem, in Chapter 7 I gave the lower bound on connec-
tivity of graph products, in Chapter 8 I approached Brooks’ Theorem through
list coloring (an important theme in modern graph theory), and in Chapter 9 I
explained discharging. I skipped the subsections marked optional and also the
proof of the Perfect Graph Theorem. In Section 9.3, one can present just enough
about discharging to convey the idea.
In Chapter 10, I then presented a few choice pigeonhole applications and the
main Ramsey theorem with several applications. In Chapter 12, the main goals
were Dilworth’s Theorem and LYM Orders for their connections with graph the-
ory. Chapter 14 came before Chapter 13 to provide more time for homework prob-
lems, reaching the Local Lemma and threshold functions. In Chapter 13 the goal
was the connection between latin squares and projective planes and the applica-
tion of projective planes to extremal problems in graph theory.
present Cayley ’s Formula (Section 1.3) and count isomorphism classes (Section
4.2). The discussion of chromatic polynomials in Section 4.1 using inclusion-
exclusion can be skipped. Part II can be skipped completely. In Part III, one
can skip graph-theoretic applications of the Pigeonhole Principle in Section 10.1,
graph Ramsey Theory in 10.2, and all of 11.1. The material of Chapters 12 and
13 (except for symmetric chain decomposition of LYM orders and graph-theoretic
applications of projective planes) is mostly accessible without graph theory.
I have used Part II for a graph theory course for masters students at Zhe-
jiang Normal University in China. Moving more slowly to accommodate language
difference, I did not go much beyond Part II. One would cover Part II except for
some optional material. It does not require Part I except for binomial coefficients
and simple bijective arguments (counting two ways). In Part III one can use
graph-theoretic pigeonhole examples and graph Ramsey theory, possibly adding
Section 11.1. The material on matroids in Section 11.3 generalizes results in
graph theory, but it takes substantial time to develop the properties. It is more
beneficial to include the basic material of Chapter 14, since probabilistic tech-
niques are so effective and important and easily illustrated with graphs.
When a school has separate graduate courses in basic enumeration and basic
graph theory, most likely most of the material from Parts III and IV will not be
included, depending on the needs of the students and choices by the instructor. A
subsequent course requiring the two basic courses can then cover topics from the
last two Parts. Although the text often mentions connections between chapters,
the chapters after Part II are relatively independent except for the background
of language from the early parts.
It is worth noting that a two-semester sequence at U. Nebraska has for about
10 years used Part I combined with supplementary material on coding and infor-
mation theory in the first semester, and Part II combined with selections from
Chapters 10–15 in the second semester.
Highlights
Indeed, the connections between topics are among the features of this book.
One aspect is pedagogical: we solve several fundamental problems repeatedly to
show the usefulness of various techniques.
For example, Cayley ’s Formula to count labeled trees is obtained bijectively
in Chapter 1, inductively in exercises, via generating functions and Lagrange In-
version in Chapter 3, and in Chapter 15 via the Matrix Tree Theorem and via
eigenvalues. Derangements are counted via recurrence, generating functions,
and inclusion-exclusion; Catalan numbers are also obtained repeatedly, includ-
ing from Young tableaux. Turán’s Theorem on the maximum number of edges
in a graph containing no (r + 1)-vertex complete graph is proved inductively in
Chapter 5, via extremality in Chapter 11, algebraically in exercises in Chapter
11, and probabilistically in Chapter 14. Planar graphs are characterized induc-
tively in Chapter 9, via matroids in Chapter 11, and via dimension of partial
orders in Chapter 16. The K önig–Egerváry max/min relation of Chapter 6 in-
volving matchings and vertex covers in bipartite graphs is shown to be equiva-
lent to Dilworth’s Theorem on posets in Chapter 12 and is a special case of the
Matroid Intersection Theorem in Chapter 11.
xviii Preface
Other connections arise when techniques from one context are used to solve
problems from other contexts. For example, common systems of distinct represen-
tatives (characterized in Chapter 7 using Menger ’s Theorem) are used to obtain
symmetric chain decompositions of LYM orders in Chapter 12. Extremal prob-
lems for diameter in Chapter 5 and for graphs without 4-cycles in Chapter 11
are attacked using projective planes in Chapter 13. The problem in Chapter 8 of
finding small triangle-free graphs with large chromatic number is discussed us-
ing Ramsey theory in Chapter 10. Probabilistic methods from Chapter 14 are
used to obtained good bounds on crossing numbers in Chapter 16. Bounds on the
graph connectivity parameter from Chapter 7 are obtained via eigenvalues in
Chapter 15. Bounds on the list chromatic number, introduced for a richer study
of graph coloring in Chapter 8, are obtained using the Discharging Method in
Chapter 9 and the Combinatorial Nullstellensatz in Chapter 15. Pym’s Theorem
from Chapter 7 is used to prove the Planar Separator Theorem in Chapter 9.
Finally, since this is a graduate textbook, it covers the standard material of
an elementary introduction efficiently in order to go beyond and offer the reader
more. This permits the inclusion of many jewels that a standard elementary
introduction at the undergraduate level cannot reach. Some of these were men-
tioned earlier in describing my overview course. Here are more of them.
In enumeration, we become familiar with the Delannoy numbers and the
Eulerian numbers as additional basic counting models. We explain techniques
such as Wilf ’s Snake Oil technique for evaluating sums, the Exponential For-
mula for obtaining generating functions, and Lagrange Inversion for extracting
coefficients. We explore the combinatorial aspects of Young tableaux, obtaining
not only the Hook-Length Formula and the Robinson–Schensted–Knuth Corre-
spondence, but also Greene ’s Theorem about the largest union of ¾ increasing
subsequences in a permutation.
In graph theory, Chapter 5 provides unusual applications of the number of
vertices of odd degree being even. Orientations with small outdegree, a beauti-
ful application of Hall’s Theorem by Hakimi in Chapter 6, are later applied to
list coloring in Chapter 15. Optional material for advanced courses includes the
proof of Tutte ’s º -Factor Theorem and the fast matching algorithm of Hopcroft
and K arp in Chapter 6, and in Chapter 7 the Nash-Williams Orientation Theo-
rem characterizing ¾-connected orientations (generalizing Robbins’ Theorem on
strong orientations). Also in Chapter 7, the standard sufficient conditions for
spanning cycles in graphs are studied extended to long-cycle versions. List col-
oring provides a modern approach to coloring in Chapter 8, and the full form
of Vizing ’s Theorem for multigraphs is proved. Chapter 9 includes a thorough
introduction to the Discharging Method and an accessible proof of the Planar
Separator Theorem.
In Part III on sets, we present many beautiful results that are not easy to
find in general textbooks. Again some will typically be options for further read-
ing. Chapter 10 includes the proof of the Stanley–Wilf Conjecture on pattern-
avoiding permutations and the construction of graphs with large girth and chro-
matic number. The application of Ramsey ’s Theorem to table storage in computer
science is unusual and makes use of allowing many colors. In Chapter 11, the Reg-
ularity Lemma of Szemerédi is presented, applied, and proved. Also, the notion
of discrete entropy is developed to obtain extremal bounds on set counting prob-
Preface xix
lems. The basic structural aspects of posets are given in Chapter 12, along with
important results about poset dimension, and the treatment of lattices leads to a
rigorous discussion of correlational inequalities. Beyond the basic results about
designs and projective planes, Chapter 13 includes the Multiplier Theorem for
difference sets and the disproof of the Euler Conjecture.
Part IV on methods provides tools to attack many problems. Chapter 14
on the Probabilistic Method has a scope similar to the popular textbook of Alon
and Spencer, including the basic methods, Dependent Random Choice, the Lo-
cal Lemma, threshold functions, and concentration inequalities. The scope of
Chapter 15 is similar to the well-known notes of Babai and Frankl on Linear Al-
gebra Methods in Combinatorics; we also include K astelyn’s use of permanents
to count perfect matchings in planar graphs and a discussion of Möbius inver-
sion on posets. The Combinatorial Nullstellensatz is pursued as far as the re-
cent strengthening of Thomassen’s famous 5-choosability of planar graphs by
Grytczuk and Zhu, show that every planar graph contains a matching whose
edge-deletion yields a 4-choosable subgraph. Chapter 16 discusses geometric em-
beddings of graphs, applications of the Borsuk–Ulam Theorem and its relatives
from combinatorial topology, and geometric aspects of partially ordered sets.
I hope this brief sampling whets the appetite for the delights ahead.
Acknowledgments
When C.L. Liu heard in the mid-1980s that I was accumulating text mate-
rial on combinatorics, he showed me the lecture notes he had published as Topics
in Combinatorial Mathematics (Math. Assoc. of America, 1972). These came from
a summer seminar at Williams College in 1972 and were used in the combina-
torics graduate course at the University of Illinois that I inherited from him. He
proposed that we work them into a polished textbook; thus began The Art of Com-
binatorics. As described earlier, that project grew beyond the confines of a single
volume, and the present text is closer to what he had in mind (but still more than
twice as big). I thank him for the suggestion that started the process.
Also worthy of mention is Liu’s earlier book Introduction to Combinatorial
Mathematics (McGraw-Hill, 1968), which in 1972 introduced me to combina-
torics. This book established the overall shape and subject matter for modern
courses in combinatorics. Before it (at least in the U.S.) there was not much
more than a compilation of chapters from eminent researchers who delivered a
short course for engineers at UCLA (Applied Combinatorial Mathematics, 1964).
Courses in elementary graph theory were initially shaped by the seminal text-
books of Berge (1962), Harary (1969), and Bondy and Murty (1976).
This text has benefitted by comments from many users and reviewers. Those
who used pre-publication versions of the text several times include Garth Isaak
(Lehigh U.), Art Benjamin (Harvey Mudd), Stephen Hartke, Christine Kelley,
Xavier P érez-Giménez, and Jamie Radcliffe (Nebraska), Jozsef Balogh (Illinois),
and Mark K ayll and Cory Palmer (Montana). John Ganci and Leen Droogendijk
each gave the book an extremely thorough reading, catching many glitches.
Other reviewers contributing insightful comments on early versions in-
cluded Martin Aigner, Mike Albertson, Lowell Beineke, Miklós Bóna, Graham
xx Preface
Brightwell, Lynne Butler, Ira Gessel, Jay Goldman, Jerry Griggs, Mike Jacob-
son, Jenő Lehel, Herbert Maier, Michael Molloy, Chris Rodger, Bruce Rothschild,
László Szekely, and Wal Wallis. Comments on particular chapters in later ver-
sions came from Noga Alon, Louis DeBiasio, Stefan Felsner, David Gunderson,
Hemanshu K aul, Sasha Kostochka, Cory Palmer, Pawel Prałat, Joel Spencer,
Tom Trotter, Peter Winkler, and G ünter Ziegler.
I also thank generations of students who labored with slowly evolving iter-
ations of this material. Those who found numerous typos include Shivi Bansal,
Alfio Giarlotta, Farzad Hassanzadeh, Bill K innersley, Darren Narayan, Radhika
Ramamurthi, Michael Santana, Prasun Sinha, and Reza Zamani. I apologize to
many others I have forgottten to mention over the long years of development.
At Cambridge University Press I thank my editor David Tranah for his pa-
tience through years of delays as I slowly refined the text. He accurately concluded
that I view the book as a “work of art ”, which is part of why it took so long (25
or 35 years, depending on how you count). Clare Dennison shepherded the book
through production, and Sarah Routledge gave it an incredibly thorough proof-
reading. All remaining errors, which I am sure exist, are solely my responsibility,
especially since I continued to squeeze in exercises and make other refinements for
months after she finished her job.
This book has been typeset using TEX. The scientific community owes a vast
debt to its creator, Donald E. Knuth. With brilliance, foresight, and generosity,
he has provided a common language for the publication and communication of
technical material that is now used all over the world. Besides its versatility and
free availability, its incredible genius is that it runs amazingly fast.
Chris Hartman taught me perl, which I used to convert earlier groff files
to TEX. The “millenial” fonts were developed by Stephen Hartke, who helpfully
made it possible to use them with plain TEX instead of LATEX so that I could have
greater control over spacing and placement of material. The references and in-
dexes were assembled through herculean effort by Thomas Mahoney, who wrote
scripts to handle most of the processing, built an effective computing environment
for me to use in both China and the U.S., and patiently helped me resolve all my
internet difficulties. Finally, I thank my wife, Ching Muyot, for her assistance,
patience, and understanding with the crunch of each year ’s edition, no matter
how many times I declared the book “essentially finished”.
Feedback
I eagerly welcome comments on all aspects of this book. This includes se-
lection and presentation of topics, errors made in mathematics or attribution or
typography, items missing from the index, suggestions of additional hints, ma-
terial that should be added if there is ever another edition, etc. Please send com-
ments to [email protected]. Errata will be listed at
http: / /www.math.uiuc.edu/ ∼west /coerr.html .
Enjoy!
Douglas B. West
[email protected]
Urbana, IL, and Jinhua, China
Chapter 0
Introduction
Combinatorial problems and arguments have a long history in mathematics,
but only in the last half of the 20th century did they become a coherent sub-
ject. The discipline was long viewed as a collection of isolated tricks, but now the
methods are more systematic, and the connections and applications between com-
binatorics and other areas of mathematics (in both directions) are being studied.
In this book we explore some of these connections and many fundamental re-
sults of combinatorics. We do not assume any prior exposure to combinatorics,
but we assume mathematical maturity and basic undergraduate mathematics,
including elementary set theory, induction, equivalence relations, limits, calcu-
lus, linear algebra, etc.
One can classify mathematical problems by the type of question, the object
being studied, the method used, etc. These various aspects make it hopeless to
impose a linear order of development in the study of mathematics. We emphasize
different aspects at different times.
Our questions are of three general types. Given constraints specified for an
object, does it exist? If such objects exist, how many are there? With respect
to some criterion, which one is the best? These are the problems of Existence,
Enumeration, and Extremality. We emphasize enumerative problems in Part I
and problems of existence and extremality in most of the rest of the text.
We study objects that are discrete structures of various types. The simplest
is a set. More complicated structures arise by imposing constraints or relations
on sets or families of sets. We study various arrangements in Part I and graphs
in Part II. In Part III we study structures such as hypergraphs, partially ordered
sets, combinatorial designs, and matroids.
Finally, we also study methods of combinatorics. Many techniques arise in
conjunction with particular structures, but some are used in many contexts and
are worthy of study in their own right. Our focus on techniques is clearest in
Part IV, where we discuss the probabilistic method, algebraic methods, and con-
nections with geometry, but many other methods appear in earlier parts.
In this brief introduction, we review definitions from elementary mathemat-
ics, introduce elementary concepts about graphs for use in Part I, introduce ele-
mentary notions of probability as background for questions throughout the text,
describe some additional discrete structures, and mention the basic notions of
complexity. This is background material to be consulted as needed.
1
2 Chapter 0: Introduction
Our most fundamental object is a set. We build other structures from sets and
relations. We use 0 for the set of nonnegative integers and for the set of pos-
itive integers, also called the natural numbers. We let [n] (pronounced “bracket
n”) denote the set {1 , . . . , n} of the first n natural numbers, with [0] = ∅. We take
as given the number systems , , , , (natural numbers, integers, rational
numbers, real numbers, complex numbers) and their elementary arithmetic and
order properties. Similarly we assume the elementary operations and notation
of sets, such as membership, containment, union, intersection, complement, and
difference. We write the difference of sets A and B as A − B, not A \ B.
A function from a set A to a set B, written : A → B, assigns each x ∈ A
an element (x) ∈ B. The set A is the domain; is defined on A. The image of
x ∈ A is (x), and { (x): x ∈ A} is the image of . The function is injective if
each y ∈ B is the image of at most one element of A. It is surjective if each y ∈ B
is the image of at least one element of A. It is a bijection if it is injective and
surjective, and then it provides a one-to-one correspondence between A and B.
A set S is finite if a bijection from S to [n] exists for some n ∈ 0 ; the value n
is then the size of S, written | S|. Counting a finite set means computing its size.
Two sets (finite or infinite) have the same cardinality if there is a bijection from
one to the other. For finite sets, “cardinality” is a synonym for “size”. A set with
the same cardinality as is countable.
A sequence is a function with domain (or 0); we write an for the im-
age of n, the nth term of the sequence. Usually one letter (such as ) denotes a
function; similarly we use ⟨a⟩ to denote the sequence with terms of the form an .
A list is a function defined on [n] for some n ∈ 0 ; this is the finite analogue
of a sequence. We write a list a of length n as an n-tuple (a1 , . . . , an). (Many au-
thors use “sequence” for an n-tuple; we try to use “sequence” only for functions
on .) A binary n-tuple or 0 , 1-list is a list with entries in {0 , 1}. Similarly,
a 0 , 1-matrix or binary matrix has entries in {0 , 1}. A ternary list has en-
tries in {0 , 1 , 2}. An n-ary list takes values from a specified set of size n. An
arithmetic progression is a list of equally spaced integers.
In contrast to a set, the order of elements in a list matters, and elements in
lists may repeat. A multiset differs from a set by allowing repeated elements,
but order remains unimportant. We can specify a multiset by specifying the set
of distinct elements and their multiplicities. Since the order is unimportant but
repetition is allowed, some authors refer to multisets as “unordered lists”.
A permutation of a finite set S is a bijection from S to itself. Since a func-
tion on [n] is a list, we may view a permutation of [n] as a function from [n] to
[n] or as a listing of [n] in some order a1 , . . . , an , with ai denoting (i). The latter
is the word form of the permutation. Both viewpoints will be useful.
We often discuss sets whose elements are also sets. To avoid confusion, we
use class and family as synonyms for “set ”. Instead of saying “a set in a set of
sets”, we say “a member of a family of sets”.
The cartesian product of sets S and T is the set S × T of ordered pairs
{(s , t): s ∈ S, t ∈ T}. A (binary) relation between S and T is a subset of the
cartesian product S × T . When S = T , we call this a relation on S. We say that
the pairs in a relation satisfy the relation.
Background Definitions 3
GRAPHS
0.5. Proposition. If all vertices in a finite graph G have degree at least 2, then
G contains a cycle.
Proof: Since V(G) is finite, G has a maximal path P. Let v be an endpoint of P.
Since d(v) ≥ 2, there is an edge vu not in P. Since P is maximal, u lies on P , and
vu completes a cycle with the u , v-path in P.
0.6. Proposition. Every tree with at least two vertices has at least two leaves.
Deleting a leaf from a tree yields a tree with one less vertex.
Proof: A connected graph with at least two vertices has no isolated vertices. A
tree has no cycle, so the endpoints of a maximal path in a tree with at least two
vertices have degree 1.
Given a leaf x in a tree G, obtain G from G by deleting x and its incident
edge. Since deleting a vertex creates no new subgraphs, G has no cycles. Hence
it suffices to show that G is connected. For distinct vertices u , v ∈ V(G ), there
a u , v-path P in G. Since internal vertices along a path have degree at least 2, P
does not contain x. Hence P is also a u , v-path in G .
6 Chapter 0: Introduction
0.7. Proposition. Every tree with n vertices has n − 1 edges. Furthermore, ev-
ery graph with n − 1 edges that arises from n isolated vertices by iteratively
adding an edge joining two components is a tree.
Proof: For the first statement, use induction on n. A 1-vertex tree has no edges.
For n > 1, Proposition 0.6 provides a leaf whose deletion yields a tree with n − 1
vertices. Since it has n − 2 edges, the original tree has n − 1 edges.
For the second statement, note first that each such edge addition creates no
cycles. Such a cycle would contain the new edge uv and another u , v-path from the
previous graph, which does not exist since u and v were in different components
in that graph. Also, each such edge addition reduces the number of components
by 1. Hence n − 1 additions reduce the number of components to 1. Thus the
resulting graph is acyclic and connected and is a tree.
DISCRETE PROBABILITY
B1 , . . . , B¾ is a partition of A. This follows from (c) above but does not imply it,
so we require the more general condition.
More general definitions of probability space allow the probability function to
be defined only on subsets of S with certain properties, but the simple definition
above suffices for our purposes. On the rare occasions where we mention continu-
ous probability spaces, we will be informal (that is, non-rigorous). For example,
when choosing a point at random from a region in the plane, we adopt the intu-
itive notion that the probability it lies in a particular subregion is proportional
to the area, with “regions” simple enough not to worry about measurability.
Background Definitions 7
In the last half of the 20th century, advanced techniques for studying prob-
ability spaces found many applications to difficult combinatorial problems. Com-
binatorial techniques show that a “good enough” object exists by constructing it,
but probabilistic methods are nonconstructive. An object with a desired property
must exist when the probability of that property is nonzero in an appropriate
probability space. Similarly, one can show the existence of an object with a large
value of a parameter X by showing that the expected value of X is that large
when the objects are randomly generated.
One reason for the influence of probabilistic methods is that exact counts are
both too difficult and unnecessary in large structures. Somehow the probabilistic
methods capture the most important aspects or most dominant terms. Probabilis-
tic methods are especially effective for extremal problems when it turns out that
“most ” instances are near the optimum.
0.14. Example. Digraphs and multigraphs. General binary relations are mod-
eled using directed graphs (digraphs); these differ from graphs in that the
edges are ordered pairs of vertices. In an edge from x to y, the first vertex is the
tail and the second is the head. We illustrate directed graphs by drawings that
use arrows (curves with direction) for the edges.
We sometimes allow edges in digraphs to be pairs of the form (x , x), called
loops. For example, the functional digraph of a function : A → A has vertex
set A; its edges are the pairs (x , (x)) for x ∈ A. The fixed points of become loops
in the functional digraph. A permutation is a bijection : A → A; its functional
digraph consists of disjoint (directed) cycles corresponding to its orbits.
We may modify a graph or digraph both by allowing loops (one-vertex edges)
and by allowing more than one edge with the same endpoints. Here E(G) becomes
a multiset. The resulting model is a multigraph or multidigraph.
COMPLEXITY
at least one computation path that returns YES. The class of decision problems
having nondeterministic polynomial-time solution algorithms is called “NP ”. Be-
cause a machine having the power to follow many computation paths in parallel
can also follow one, P ⊆ NP.
Most computer scientists believe P
= NP. In this context, a problem B
is as hard as a problem A if a polynomial-time algorithm for B would yield a
polynomial-time algorithm for A. This may involve using B as a subroutine in an
algorithm to solve A or providing a polynomial-time transformation that converts
an arbitrary instance of A into an instance of B such that the answer in B is YES
if and only if the answer in A was YES. In either case, an algorithm for B yields
an algorithm for A; we call this a reduction of A to B. A problem is NP-hard if
it is as hard as every problem in NP in this sense (every problem in NP reduces
to it). A problem belonging to NP is NP-complete if it is NP-hard.
Cook [1971] devised a generic transformation to reduce any problem in NP to
that of deciding whether an input logical formula is true under some truth assign-
ment for its variables. This problem is called SATISFIABILITY or SAT. Cook’s
result made SAT the first known NP-complete problem. To prove that a problem
B is NP-hard, we can reduce SAT to B. Every problem proved NP-complete can
then be used like SAT in this way. In practice, the known NP-complete problem in
most NP-completeness proofs is one of a few fundamental NP-complete problems,
such as those in K arp [1972].
A polynomial-time algorithm for any NP-complete problem could be used to
construct a polynomial-time algorithm for each problem in NP, yielding P =NP.
The conjecture that P
=NP is supported by the failure to find a polynomial-time
algorithm for any problem in the large class of NP-complete problems, despite
years of search.
Garey–Johnson [1979] gives a thorough and readable introduction to NP-
completeness. Nowadays, an NP-completeness proof is only a beginning. One
seeks to refine the boundary between P and NP by finding polynomial-time solu-
tion algorithms for large classes of inputs or by finding restricted classes of inputs
where the problem remains NP-hard.
Mostly we use NP-completeness as motivation. NP-completeness justifies the
study of heuristics that run quickly but do not obtain the optimal solution. It
also motivates extremal problems: we study bounds on optimization problems in
terms of various parameters of the input. A constructive proof of a bound for
graphs in a particular class yields an algorithm that may approximate the true
value of the parameter.
We hope that these few basic concepts suggest some of the underlying struc-
ture of this large subject. More thorough definitions and examples are given
where the concepts are explored in depth. With this as background, we are ready
to begin.
Chapter 1
Combinatorial Arguments
Enumerative questions are among the most natural in mathematics and have
been studied for eons. A simple way to count a set is to list its elements, but this
is inelegant and often impractical. We may view the study of enumeration as the
search for ways to avoid exhaustive listing.
In this chapter we use combinatorial arguments. We give no precise definition
of this term, but generally it refers to explicit counting arguments, “counting two
ways”, or the use of bijections to show that two sets have the same size.
Later chapters develop more sophisticated techniques. Combinatorial argu-
ments are elementary but can be hard to find. Studying them is worthwhile,
because elementary counting problems often serve as models or building blocks
in harder problems, and combinatorial arguments can yield more information.
Because we assume no prior experience in combinatorics, many results and
examples here appear also in undergraduate courses. Often we go farther, and
our treatment is more concise and assumes more mathematical maturity.
To avoid excessive formality, we may omit explicit declaration of variables
when the context is clear. The universe is the set of values where the resulting
objects make sense. This may happen with the set of natural numbers or the
set 0 of nonnegative integers. Examples include “for all n-vertex graphs” and
“for all odd n”. A similar convention sometimes omits the limits on summations.
What does it mean to solve a counting problem? The problem may be ex-
pressed in terms of a parameter (variable), and we want to solve it simultaneously
for each value of the parameter. With one parameter n, this yields a sequence ⟨a⟩
consisting of the values {an}∞ n=0 . We may seek various expressions for the answer.
A formula for an expresses it as a function of the parameter(s). Sometimes
we accept a finite sum as the answer. This is common when we use the inclusion-
exclusion principle (Section 4.1), a technique that alternately overcounts and un-
dercounts the desired set until each desired element is counted exactly once. An
asymptotic formula (Section 2.3) for an is a formula ½(n) such that ½(n)/an → 1 as
n → ∞. Computational considerations make asymptotic analysis important, and
asymptotic formulas may be preferable when exact solutions are too complicated.
An effective and fast procedure for computing individual terms or asymptotic
behavior may be a good answer. A recurrence relation (Chapter 2) for ⟨a⟩ expresses
an as a function of a0 , . . . , an−1 ; appropriate initial values are needed to specify
⟨a⟩ completely. Solving a recurrence means obtaining a formula for an .
13
14 Chapter 1: Combinatorial Arguments
ELEMENTARY PRINCIPLES
Our first two Principles are sometimes called “ad hoc” counting techniques.
Nothing sophisticated is involved; we merely organize the set to simplify counting
it, breaking the problem into smaller pieces.
n−1
1.1.3. Example. There are ∏i=0 (2n − 1 − 2i) ways to pair 2n people. The first
person can be paired with another in 2n − 1 ways. No matter how this choice
is made, we can take the least indexed unpaired person and choose a partner for
that person from the remaining people in 2n − 3 ways. Continuing through n
n−1
stages in this way produces ∏i=0 (2n − 1 − 2i) distinct pairings, and every pairing
is produced in this way. The 15 pairings for n = 3 appear below.
12 · 34 · 56 13 · 24 · 56 14 · 23 · 56 15 · 23 · 46 16 · 23 · 45
12 · 35 · 46 13 · 25 · 46 14 · 25 · 36 15 · 24 · 36 16 · 24 · 35
12 · 36 · 45 13 · 26 · 45 14 · 26 · 35 15 · 26 · 34 16 · 25 · 34
Section 1.1: Classical Models 15
1.1.4. Principle of Counting Two Ways: When two formulas count the same set,
their values are equal.
Hermann Weyl once described the property of getting the same answer no matter
how we count a finite set as one of the deepest theorems in mathematics. The
depth is not in its truth but rather in its myriad applications. The point is not
that we need to count a set twice; it is that we can prove equality of two formulas
by devising an appropriate set whose size is given by both formulas, counted in
different ways.
n−1
1.1.5. Example. ∑i=1 i = n(n − 1)/2. This formula is easily proved by induction
on n, but showing that both sides count the pairs of elements in [n] provides more
insight (recall from Chapter 0 that [n] = {1 , . . . , n}). The left side groups the
pairs by the larger element, applying the Sum Principle (i pairs have larger ele-
ment i + 1). The right side applies the Product Principle by picking two elements
successively and then dividing by 2 since order is irrelevant and we have counted
each pair exactly twice.
Interchanging the order of summation. This operation can be viewed as an
instance of counting two ways. Think of the value º (i , j) as the entry in row
i and column j of a matrix. The two sides of the identity ∑i=1 ∑ j =1 º (i , j) =
m n
1.1.6. Bijection Principle: If there is a bijection from one set to another, then they
have the same size.
Recall that a bijection is a function º : A → B such that for all b ∈ B exactly
one x ∈ A satisfies º (x) = b. The Bijection Principle is just the definition of equal
size, but we use it as a counting technique. Establishing a bijection º from a set
A of unknown size to a set B of known size computes | A| .
We use bijections when modeling part of a new problem as an instance of a
classical problem. A bijection maps instances of the new problem into instances of
the previously solved problem. When there is a bijection from A to B, we say that
objects of A “correspond” to objects of B. A bijection is a function from one set to
another, but a one-to-one correspondence between two sets puts them in pairs and
can be followed in either direction. The latter term is less formal.
1.1.7. Example. Within the set [n], the number of subsets with ¾ elements equals
the number of subsets with n − ¾ elements. Complementation of subsets within [n]
provides a bijection from one family to the other.
The number of binary lists of length n equals the number of subsets of [n]. Map
any subset A of [n] to the list a defined by ai = 1 if i ∈ A and ai = 0 if i ∈ / A.
The list a is the incidence vector of A. Any binary list a is the image of exactly
one subset of [n], namely the set {i: ai = 1}. Hence the map is a bijection. This
bijection enables us to view subsets as incidence vectors and vice versa.
In using bijective proofs to count sets, we need canonical sets of known sizes.
Modeling a piece of a counting problem as an instance of one of these classical
problems is a combinatorial argument.
Section 1.1: Classical Models 17
Words are simply lists; the term “word” is natural when we emphasize a par-
ticular finite alphabet from which they are formed. In contrast to sets, entries
in a list have specified positions. Also sets (and simple words) have no repeated
elements, while lists and multisets allow repetitions. The table above also lists
older equivalent terms parenthetically.
The easiest of these four counting problems is for ¾-words. A list of length ¾
can be viewed as a function º defined on [¾]. The function maps [¾] into the set
of entries allowed in the list, with º (i) being the entry in position i.
1.1.14. Remark. Subsets as functions and lists. Subsets of [¾] correspond to func-
tions from [¾] to {0 , 1}; there are 2¾ . Given A ⊆ [¾], let º A(i) = 1 if i ∈ A and
º A(i) = 0 if i ∈/ A. The function º A is the characteristic function of A (or, infor-
mally, the membership function). Since the domain of º A is [¾], we can write
º A as a list of length ¾ with entries in {0 , 1}, as described in Example 1.1.7.
Before solving the counting problems with repetition forbidden, we introduce
notation for certain products.
1.1.15. Definition. For n , ¾ ∈ 0 , we define the following products:
n−1
n factorial: n! = ∏i=0 (n − i).
¾ −1
falling factorial: n(¾) = ∏i=0 (n − i).
¾ −1
rising factorial: n(¾) = ∏i=0 (n + i).
1.1.16. Proposition. There are n(¾) simple ¾-words from an alphabet of size n.
Proof: We form a simple ¾-word from a set of size n one position at a time. Since
repetitions are forbidden, there are always n+1 − i ways to specify the ith element,
no matter how the earlier elements were specified. By the Product Principle, the
¾
word can be formed in ∏i=1 (n + 1 − i) ways.
For the number of ¾-subsets, notations used in the past instead of (¾n) include
C(n , ¾), Cn ,¾ , ¾ Cn , n C¾ , and Cn¾ ; these are obsolete and now have other meanings.
The numbers (¾n) are called binomial coefficients due to their role in the
Binomial Theorem. Our combinatorial definition of the symbol (¾n) makes it 0
unless 0 ≤ ¾ ≤ n. Hence we need not worry about limits on the summation in the
Binomial Theorem and many similar sums.
¾ in nonnegative integers.
The solution vectors for (n , ¾) = (3 , 4) appear below.
(4,0,0) (3,1,0) (1,3,0) (2,2,0) (2,1,1)
(0,4,0) (0,3,1) (0,1,3) (0,2,2) (1,2,1)
(0,0,4) (1,0,3) (3,0,1) (2,0,2) (1,1,2)
5 2 0 3
• • • • • | • • | | • ••
Since we can retrieve uniquely from each arrangement of dots and bars the
list of integers that yields it, we have established a bijection from the set of se-
lections with repetition to the set of lists of ¾ dots and n − 1 bars. The number of
solutions is thus (¾+n−n−1 1 ) (or (¾+n¾ −1 )), because the lists of dots and bars are specified
by choosing the positions for the bars (or the dots).
The alternative formulas (¾+n−n−1 1 ) and (¾+n¾−1 ) can be confusing, since the
model may arise with different (or reversed!) variables counting the objects and
the types. Thus it is more valuable to understand the argument than to memorize
the formula. The first formula emphasizes that the number of barriers between
types is one less than the number of types. The second emphasizes that ¾ is the
size of the multiset. What happens when we require x1 , . . . , x n to be positive?
The last column of the listing in Example 1.1.19 shows the three compositions
of 4 with three parts.
20 Chapter 1: Combinatorial Arguments
Proof 2: Consider the model of dots and bars. Bars split the row of ¾ dots into
segments, which become parts. To make each segment have at least one dot, no
two bars can be consecutive. Thus we select distinct places for the n − 1 bars from
the ¾ − 1 spaces between dots.
EXERCISES 1.1
Problems marked “(−)” are easier or shorter than most (given the material of the text),
while those marked “(+)” are harder than most. Problems marked “(♦)” are particularly
valuable or instructive, not necessarily harder.
1.1.1. (−) When rolling n dice, what is the probability that the sum is even?
1.1.2. (−) Count all the rectangles with positive area formed by segments in a grid of m
horizontal lines and n vertical lines.
1.1.3. (−) The roman alphabet has 21 consonants and 5 vowels. How many strings can be
formed using r consonants and s vowels?
1.1.4. (−) Count the possible outcomes of an election with 30 voters and four candidates.
Count those in which no candidate receives more than half of the votes.
1.1.5. (−) Prove that (n5 − 5n3 + 4n)/120 is an integer for every n ∈ .
1.1.6. (−) Count the orderings of a standard 52-card deck such that the 13 cards in the
spade suit occur consecutively.
1.1.7. (−) Compute the probability that a random set of five cards from a standard 52-card
deck has at least three cards with the same rank.
1.1.8. (−) Count the sets of six cards from a standard deck of 52 cards that have at least
one card in every suit.
1.1.9. (−) Count the integers from 0 through 99,999 such that each digit occurs at most
twice; leading zeros are counted as appearances of 0.
1.1.10. (−) In how many distinguishable ways can the letters in “Mississippi” be ordered?
1.1.11. (−) Given a bag with many marbles in each of four colors, count the ways to select
12 marbles. Count the distinguishable ways to put 12 of them in a row.
Exercises for Section 1.1 21
1.1.12. (−) New York City has about 7 million residents; suppose that each has 100 coins
in a jar. The coins come in five types (pennies, nickels, dimes, quarters, half-dollars). Two
jars are equivalent if they have the same number of coins of each type. Is it possible that
no two people have equivalent jars?
1.1.13. (−) Count the compositions of ¾ in which every part is even.
1.1.14. (♦) Families of subsets.
(a) Count the subsets of [n] that contain at least one odd number.
(b) Count the ¾-sets in [n] having no two consecutive integers.
(c) Count the lists of subsets A0 , A1 . . . A n of [n] such that A0 ⊂ A1 ⊂ · · · ⊂ A n . Count
the lists such that A0 ⊆ A1 ⊆ · · · ⊆ A n .
1.1.15. (♦) Prove that the exponent on a prime p in the prime factorization of (2n n
) is the
number of powers p¾ of p such that ⌊ 2n/p¾ ⌋ is odd. Use this to determine which primes di-
vide (18
9
) and which divide (10
20
). For example, for n = 3, (63) = 20 and 20 = 22 · 5. The claim
holds here, because ⌊ 6/2⌋ and ⌊ 6/4⌋ are odd, ⌊ 6/3⌋ is even, ⌊ 6/5⌋ is odd, and ⌊ 6/p¾ ⌋ = 0
for all other prime powers p¾ .
1.1.16. Given positive integers a and b, let v(a , b) = ((b−a1) , (ab) , (b+a1 )) . Prove that v(c , d)
cannot be a multiple of v(a , b) when (a , b) and (c , d) are distinct pairs of positive integers.
1.1.17. (♦) Count the lists of m 1s and n 0s that have exactly ¾ runs of 1s, where a run is
a maximal set of consecutive entries with the same value.
1.1.18. (♦) For S ⊆ [n], a run in S is a maximal set of consecutive integers in S (corre-
sponding to a run of 1s in the incidence vector). For example, {1 , 2 , 4 , 5 , 6 , 9} is a subset
of [9] with three runs; every element is in one run.
(a) Count the subsets of [n] having ¾ runs.
(b) Count the t-element subsets of [n] having ¾ runs.
(c) Let s1 , . . . , sm be distinct positive integers. Among the t-element subsets of [n] hav-
ing ¾ runs, count those having exactly ri runs with length si , for 1 ≤ i ≤ m. (Comment:
Note that ¾ = ∑i=1 ri and t = ∑i=1 ri si .)
m m
1.1.19. Determine the number of binary strings of length n in which the number of copies
of 00 is the same as the number of copies of 11. For example, 00011011 has two copies of
each. (Deutsch [2009])
1.1.20. Give a summation for the number of elements of [3]n with ¾ odd entries that do
not have a 1 next to a 3.
1.1.21. The chords of a convex n-gon are the segments that join two corners. Count the
pairs of chords that cross inside the n-gon.
• • •
• • •
• •
• •
• • • • • • • •
1.1.22. Count all triangles (not only the empty triangular regions) in the picture formed
by drawing all (n2) chords of a convex n-gon, given that no three chords have a common
internal point. When n is 4, 5, or 6, the answers are 8, 35, and 111.
1.1.23. We have six dice. Each has three red faces, two green faces, and one blue face.
Determine the probability that three red faces, two green faces, and one blue face appear
when the six dice are rolled.
22 Chapter 1: Combinatorial Arguments
1.1.24. Given a standard deck of playing cards with 52 cards in four suits of 13 values,
which is more likely in a random set of five cards: having all five cards in the same suit , or
having cards of five consecutive values?
1.1.25. A trapezoid is a quadrilateral with at least one pair of parallel sides. For n ≥ 4,
how many sets of four distinct points forming the vertices of a trapezoid exist among the
vertices of a regular n-gon? (Nicoaescu [1986])
1.1.26. (♦) For a permutation of [n], the displacement of is ∑i=1 |i − (i)| . Prove
n
that the largest displacement of a permutation of [n] is ⌊ n2/2⌋ . (Comment: The extremal
permutation is not unique when n is odd and at least 3.)
1.1.27. (♦) Let A n be the set of permutations of [n]. Let Bn be the set of n-tuples (b1 , . . . , bn)
such that 1 ≤ bi ≤ i for each i ∈ [n]. Construct a bijection from A n to Bn . Below we illus-
trate a possible correspondence for n = 3.
A3 321 231 213 312 132 123
B3 111 112 113 121 122 123
1.1.28. Using interchanges of two students, a professor wants to rearrange the n students
sitting in a row so that no two students originally adjacent remain adjacent. Determine
the minimum number of interchanges needed, given n ≥ 6. (W. So)
1.1.29. Count the 0 , 1-matrices with n2 rows and n2 columns such that (1) each row and
column has exactly one 1, and (2) when the matrix is partitioned into n2 blocks of n con-
secutive rows and n consecutive columns, each block contains exactly one 1. For example,
when n = 2 the answer is 16. (Pratt [2011])
1.1.30. (♦) Count the permutations of [n] with (i + 1) ≤ (i) + 1 for 1 ≤ i ≤ n − 1. Give
both a proof by induction and a bijective proof. (Deutsch [2001a])
1.1.31. (+) A permutation is graceful if the absolute differences between successive ele-
ments are distinct. Prove that if the set of elements in even-indexed positions of a grace-
ful permutation of [2n] is [n], then the first and last elements differ by n. For example,
54637281 is such a permutation. (Comment: The converse also holds.) (Klove [1995])
1.1.32. A necklace is a circular arrangement that can rotate and flip without being con-
sidered different. Thus only one necklace can be made from three beads. A crown, in
contrast , can rotate but not flip.
(a) Count the necklaces with n beads that can be made from n distinct beads.
(b) Count the crowns with n beads that can be made from a supply of types of beads,
given that n is prime (the types need not all be used).
1.1.33. Polynomial Principle in several variables. Let p be a polynomial in x1 , . . . , x¾ . For
1 ≤ i ≤ , suppose that the degree of p as a polynomial in xi is at most d i , and let Si be a set
¾
of d i + 1 values. Prove that if p is 0 at all points in ∏i=1 Si (that is, on {(x1 , . . . , x¾): xi ∈
Si for 1 ≤ i ≤ }), then p is zero everywhere. Conclude that if two polynomials in several
variables are equal at all positive integer values, then they are equal at all values. (Hint:
Assume the well-known statement that a polynomial of degree at most d in one variable
is identically zero if it is zero at more than d values.)
1.1.34. (♦) Give a combinatorial proof that the identity below for falling factorials holds
for all x , y ∈ .
n
(x + y)(n) = ∑ ( ) x(¾) y(n−¾) .
¾
Exercises for Section 1.1 23
n
(x + y)(n) = ∑ ( ) x(¾) y(n−¾) .
¾
¾
2 1 2 1
1 2 1 2 2 1 1 2
A B A B A B A B A B A B
1.1.36. Given n distinct flags (n ≥ 1) and many identical flagpoles, we want to put all the
flags on equally spaced flagpoles on a rotating circular platform. We may use any number
of poles, but each pole used must have at least one flag, and order of flags on a pole mat-
ters. Arrangements that can be rotated into each other are not distinguishable. Count the
distinguishable ways to arrange the n flags. (Comment: There is a very short solution.)
1.1.37. For p prime and n ∈ , give a combinatorial proof that n divides (n+pp−1) − (np).
1.1.38. A spinner has a pointer that is equally likely to point to each of n regions num-
bered 1 , 2 , . . . , n. When we spin it three times, what is the probability that the sum of
the selected numbers is n?
1.1.39. Prove the identity below by showing that both sides count the same set of ternary
lists. (Karaivanov–Vassilev in Holland [2014]; identity (3.121) in Gould [1972])
⌊n/2⌋
n+1 s n− ¾
∑ (2s + 1)(¾ ) = ( ¾
)2 n−2¾
s=¾
1.1.42. The Weights Problem. A balance scale tests whether the total weight put on the
left and right sides is the same. If one can specify ¾ known integer weights, what should
they be to maximize the value n such that every unknown object with weight in [n] can
be correctly weighed? What is this maximum n? (Example: when ¾ = 2 and the known
weights are {1 , 4}, one can weigh objects with weights in {1 , 3 , 4 , 5} but not 2. Using
{1 , 3}, one can balance every weight in [4].)
1.1.43. Consider a balance scale and positive integer weights w1 ≤ · · · ≤ w¾ . Let S0 = 0,
and let Sj = ∑i=1 wi for 1 ≤ j ≤ ¾ . Prove that it is possible to balance every integer weight
j
1.2. Identities
Using the Sum and Product Principles in a counting problem may produce
sums involving binomial coefficients. Standard formulas called identities can
help evaluate such sums.
Proofs of identities using induction or factorial formulas may involve tedious
manipulation. Combinatorial arguments can provide deeper understanding and
more information. Algebraic arguments (such as manipulating an identity) may
be easier to find; Graham–Knuth–Patashnik [1989] presents many. We focus
first on combinatorial arguments and introduce other techniques later.
An argument by counting two ways shows that both sides of an identity count
the same set. The difficulty is devising an appropriate set. Arguments for sums
involving n¾ often use the set of n-ary ¾-tuples (words of length ¾ from an alpha-
bet of size n). There are several equivalent models for a set counted by (¾n); an
argument using one can be translated into the others. We have discussed models
involving subsets and binary lists; next we introduce the lattice path model.
Section 1.2: Identities 25
1.2.2. Example. Lattice paths and binary lists. A lattice path from (0 , 0) to
(¾ , n − ¾) has length n, with ¾ horizontal steps. Recording 1 for each horizon-
tal step and 0 for each vertical step produces a binary n-tuple with ¾ 1s. The
path is determined by where the horizontal steps occur in the list, so exactly one
path yields each such n-tuple. This establishes a bijection from the set of these
lattice paths to the set of binary n-tuples with ¾ 1s.
↔ 101101 ↔ {1 , 3 , 4 , 6} ⊆ [6]
Many authors use the term “lattice path” more generally, allowing steps of
other forms, but the restriction is convenient for us. A lattice path may end with
a horizontal step or a vertical step. This proves the formula (¾n) = (n−¾ 1) + (¾n−−11),
called Pascal’s Formula in honor of Blaise Pascal (1623–1662). The array of
numbers with (0n) , . . . , (nn) in the nth row is called Pascal’s Triangle, though it
was known to Chinese mathematicians much earlier.
1
11
1 2 1
1 3 3 1
1 4 6 4 1
1 5 10 10 5 1
1 6 15 20 15 6 1
Proof: We give combinatorial proofs for these identities under the assumption
that the parameters are all nonnegative integers.
(1) Choosing ¾ positions for 1s or n − ¾ positions for 0s yields the same lists.
(2) Binary n-tuples with ¾ 1s end with a 0 or with a 1; equivalently, a lattice
path reaches (¾ , n − ¾) from (¾ − 1 , n − ¾) or (¾ , n − ¾ − 1).
(3) From n people, we form committees of size ¾ with a chair. On the left
we choose the committee and then select the chair; on the right the chair is cho-
sen first and then the rest of the committee. We call this the Committee-Chair
Identity. The generalization is the Subcommittee Identity: each side counts
committees of size ¾ with a subcommittee of size l. These are also the lists of
length n with l entries equal to A, ¾ − l equal to B, and n − ¾ equal to C. Be-
cause the positions for letters of each type can be chosen in various orders, there
are many products of two binomial coefficients that count this set.
¾−l
n l
n− ¾
(4) In the special case, both sides count all subsets of n elements. The gen-
eralization is the Binomial Theorem with x set to r and y set to 1; alternatively,
both sides count (r + 1)-ary lists of length n.
(5) For the special case, consider the (nr++11 ) binary (n + 1)-tuples with 1s in r + 1
positions. The left side counts them by the location of the rightmost 1; the ¾ th
term counts those where it is in position ¾ + 1. Alternatively, the left side counts
the lattice paths from (0 , 0) to (r + 1 , n − r) by the height at which the last hor-
izontal step occurs. We call this the Summation Identity. The generalization
counts binary (m + n + 1)-tuples with 1s in r + s + 1 positions by the position of
the (r + 1)th 1; the ¾ th term counts those where it is in position m + ¾ + 1. The
special case arises when m = s = 0.
(6) The general form is the Vandermonde Convolution; m = n = r yields
the special case. The left side counts r-sets from an (m + n)-set by how many el-
ements come from the first ¾ . Using lattice paths, the argument is that every
lattice path from (0 , 0) to (r, m + n − r) reaches the line x + y = m at some point
(¾ , m − ¾).
1.2.4. Definition. For ¾ ∈ 0 , the extended binomial coefficient (u¾ ) is the
polynomial in u of degree ¾ defined by
¾ −1
u 1
( )=
¾ ¾! ∏(u − i) .
i=0
Section 1.2: Identities 27
For u ∈ 0 , the formula agrees with the combinatorial definition of (¾u) in
Definition 1.1.12; the value is 0 unless 0 ≤ ¾ ≤ u. The polynomial viewpoint
leads to an extension of the Binomial Theorem that was proved by Isaac Newton
(1643–1727) for rational exponents.
Proof: By Taylor ’s Theorem (of calculus), the coefficient of x ¾/¾ ! in the expansion
of (1 + x)u as a power series in x is the ¾ th derivative of (1 + x)u with respect to x,
evaluated at x = 0. This value is u(¾) .
1.2.6. Remark. Negative binomial and multisets. In Section 3.1 we will give a
combinatorial interpretation of Theorem 1.2.5 in the case where u is a negative
integer. Invoking Definition 1.2.4 as a polynomial yields
−n n+ ¾ −1
( ) = (−1)¾ ( ).
¾ ¾
Thus the expansion of (1 + x)−n is closely related to selection of ¾ elements (with
repetition) from n types of elements.
There are many methods for evaluating sums. Pascal’s Formula (Theorem
1.2.3(2)) may allow us to prove binomial coefficient identities by induction (as
in Exercise 11). However, induction does not work unless we know the answer
in advance; other methods may both discover and prove the formula. Bijective
proofs may give more “refined” results (see Theorem 1.3.26 and Example 1.3.27,
for example). Instead of devising new combinatorial arguments, we may also use
identities already proved; indeed, this is the motivation for proving identities.
The coefficient of (ri ) in the expression for i¾ counts the groupings of the po-
sitions in [¾] into r labeled boxes. We will obtain a general formula for this in
Section 3.3. For now, it suffices that such coefficients exist, because ( xj) is a poly-
nomial in x of degree j , and hence (0x) , . . . , (rx) is a basis for the vector space of
polynomials in x of degree at most r.
28 Chapter 1: Combinatorial Arguments
Next we consider paths in the plane more general than lattice paths.
1.2.9. Example. Below we show the seven paths from (0 , 0) to (2 , 2) that arise in
addition to the (42) lattice paths; altogether, d2 ,2 = 13.
The Delannoy numbers were introduced by Henri Auguste Delannoy (1833–
1915). The two formulas for d m ,n that we discuss below appear in Delannoy
[1889]; Banderier–Schwer [2005] discusses the history. Sulanke [2003] presents
29 problems for which the central Delannoy numbers provide the solution.
Proof: Since we know there are (n+mm) paths from (0 , 0) to (m , n) using no diago-
nal steps, it makes sense to group the Delannoy paths by the number of diagonal
steps, j . To reach (m , n) there must also be m − j horizontal steps and n − j ver-
tical steps, in total n + m − j steps. Given the number of steps of each type, the
paths correspond to the orderings of the steps: the words with j copies of D, m − j
of H , and n − j of V . Forming the words in two stages yields (n+mm− j
)(mm− j ) as the
number of words.
Summing over the number j of diagonal steps completes the count. Grouping
instead by the number of horizontal steps, ¾ , yields the second expression (also
obtained from the first by substituting ¾ = m − j).
When no limits are given for the index parameter in a sum, as in the state-
ment of Proposition 1.2.10, all terms where the summand is nonzero are in-
cluded. When the summand involves binomial coefficients, the index values yield-
ing nonzero terms are usually clear.
Our next objects are closely related to Delannoy paths.
Section 1.2: Identities 29
•
• • •
• • • • •
• • •
•
A more combinatorial description for the lattice ball is the set of all inte-
ger n-tuples such that the absolute values of the entries sum to at most m. This
phrasing makes it easy to apply the integer equation model to count the points.
Proof: We count the integer n-tuples whose absolute values sum to at most m.
Group them by the number of nonzero coordinates, ¾ . We can pick these positions
in (¾n) ways and give signs to the nonzero entries in 2¾ ways. To finish building a
desired n-tuple, we give magnitudes to the ¾ nonzero entries by solving x1 + · · · +
x¾ ≤ m in positive integers.
Taking partial sums of such a list yields a ¾-element subset of [m], with the
j
jth element being ∑i=1 x i . To see that each ¾-set S in [m] arises exactly once,
write S as a1 , . . . , a¾ in increasing order and let x i = ai − ai−1 (with a0 = 0). Now
x1 , . . . , x ¾ is a solution to the inequality that yields S under the original map,
and it is the only solution that yields S. Hence the map is a bijection, and there
are (m ¾ ) solutions to the inequality.
Proof: Let A be the set of Delannoy paths to (m , n), and let B be the lattice ball
of radius m in n . By Propositions 1.2.10–1.2.12, the left side is | A| and the right
is | B| . We prove equality by a bijection º : A → B.
30 Chapter 1: Combinatorial Arguments
From a Delannoy path P to (m , n), we form an integer list (b1 , . . . , bn) with
∑i=1 |bi | ≤ m. Let |bi | be the number of horizontal or diagonal steps from the point
n
where P first reaches vertical coordinate i − 1 to the point where P first reaches
vertical coordinate i. The sign of bi is positive if the final step is vertical, negative
if it is diagonal. Let º (P) = b.
For every n-tuple b in the lattice ball, we show that º (P) = b for exactly one
Delannoy path P. Replace a nonnegative bi with bi horizontal steps and then one
vertical step. Replace a negative bi with −bi − 1 horizontal steps and then one
diagonal step. This produces a Delannoy path from (0 , 0) to (r, n), where r is the
sum of the absolute values in b. Complete P by adding m − r horizontal steps.
Since the portion of P between the lines y = i − 1 and y = i must yield bi , this is
the only way to form a Delannoy path that maps to b under º .
(0,5) (8,5)
0
−3
0
1
−2
(0,0) (8,0)
Using the Delannoy path and lattice ball models, Remark 2.1.11 gives an in-
ductive proof of Theorem 1.2.13 using recurrences. The equality can be proved
directly without these models by inventing a set counted by both sides. When
devising a set to be counted by sum of products, often one defines a set of pairs;
they can be counted by a two-step process, grouping the pairs according to one
coordinate. Exercise 39 requests a proof of Theorem 1.2.13 by this method.
We have given only a few identities; others appear in the exercises. H. Gould
[1972] listed more than 550 identities for binomial coefficients. Combinatorial
argument is not our only tool. Other techniques developed in the next several
chapters will enable us to prove identities or evaluate sums more systematically
(and maybe with less cleverness!).
Exercises for Section 1.2 31
EXERCISES 1.2
+ n m+¾
1.2.1. (−) Give combinatorial proofs of (¾+n1 ) = n−¾ n
¾ +1 ( ¾ ) and (m
m+¾ )( ¾ )
= (mm+n)(¾n).
1.2.2. (−) Evaluate ∑¾=0 ( m¾+¾) .
n
1.2.6. (−) Prove ∑¾=0 ( m+¾¾−1 ) = ∑¾=0 ( n+¾¾−1 ) and ∑¾ (n¾)(r+m¾ ) = ( nn++mr ).
n m
1.2.8. (−) Complete the proofs of the formulas in Application 1.2.7 for ∑i=1 i, ∑i=1 i2 , and
n n
1.2.12. (♦) When flipping 100 fair coins, is it more likely that the numbers of heads and
tails are equal or that they differ by two? Give an algebraic proof by manipulating formu-
las and a combinatorial proof by defining an injection.
1.2.13. (♦) Prove each identity below by counting a set in two ways. (One can count 3-tuples
with special properties or various geometric arrangements.) Then use the two identities
to obtain simple formulas that evaluate ∑i=1 ∑ j =1 min{i , j} and ∑i=1 ∑ j =1 max{i , j}.
n n n n
1.2.14. For m ∈ , let º (m) = ∑ j =1 (m − j)2 j −1 . Obtain a simple formula for
m
º (m) induc-
tively. Also give a combinatorial proof by counting a set in two ways.
1.2.15. (♦) Prove each identity below by counting a set in two ways. In each case, give a
single direct argument without manipulating the formulas.
(a) (2n
n)
= 2(2n−1
n−1 )
. (c) ∑¾=1 q¾−1 =
n q n −1
q−1
for q , n ∈ with q
= 1.
¾
(b) ∑¾ ( l )(¾) = ( )2 (d) ∑ i(n − i) = ∑
n− l n n
n n
l
. i =1 i =1
( ).
i
2
¾ −1
1.2.17. (♦) Use known identities to evaluate ∑¾=1 ∑i=1 (i − 1)(¾ − i − 1). Give a combina-
n
and give a combinatorial proof by devising a set that both sides count.
1.2.19. Use known identities to evaluate the sums below.
n
1 n n 1
(a) ∑ ( ). (b) ∑(−1)¾ ( ) .
¾+1 ¾ ¾ n+ 1 − ¾
¾ ≥0 ¾ =0
The formula for ∑¾=1 a¾ is rather simple; is there a direct combinatorial proof?
n
• • •
• • • • • •
• • • • • • • • •
• • • • • •
• • •
1.2.25. (♦) Prove ∑¾=1 ¾ · ¾ ! = (n + 1)! − 1 by induction and by counting two ways.
n
1.2.28. Give both an algebraic proof (using known identities) and a combinatorial proof
(counting a set in two ways) for the identity (n − r)( n+rr−1 )( nr) = n(n+2rr−1 )(2rr).
1.2.32. For the identity below, give a combinatorial proof, obtain the Summation Identity
(elementary form of Theorem 1.2.3(5)) as a special case, and apply a polynomial identity
from the text to express the general case as an instance of Vandermonde’s Theorem (the
polynomial version of Theorem 1.2.3(6)),
¾
a+ i−1 b+ ¾ − i−1 a+ b+ ¾ −1
∑( i
)(
¾−i
)=(
¾
).
i =0
1.2.33. (♦) For nonnegative integers m, n, r, and s, prove the identity below. (Ohtsuka–
Tauraso [2018])
s r
m+ r r + ¾ s m+ s s+ ¾ r
∑ ( n − ¾ )( ¾ )(¾) = ∑ ( n − ¾ )( ¾ )(¾)
¾ =0 ¾ =0
+s
1.2.34. (♦) For r ≥ m+ n, prove ∑¾ (mr+¾)(n+s ¾ ) = (r−rm+ n) , and use it to evaluate ∑¾ ¾ (¾ )(¾ ) .
a b
a(¾) −1
1.2.37. For a , b ∈ with b > a + 1, prove ∑¾≥0 b(¾)
= b−1
b−1 − a
. Use it to evaluate ∑¾≥0 ( n+n ¾) .
b−1 a(¾)
− ∑ ¾ =0
n
(Hint: First compute b−1 − a b(¾)
.)
1.2.38. Let cn = (⌊n/2⌋). Prove that ∑¾=0 (n¾)c¾ cn−¾ = cn cn+1 . (Bloom [2002]) (Comment: A
n n
combinatorial proof counts “balanced” teams of sizes n and n + 1 from n male/female pairs
and one extra male. An algebraic proof uses factorials and Exercise 1.2.20.)
n+¾
1.2.39. (♦) By Theorem 1.2.13, ∑¾ (m ¾ )( m ) = ∑j ( j )( j ) 2 . Ignoring that the two sides
n m j
count Delannoy paths and the lattice ball, give a direct combinatorial proof of the identity
by showing that both sides count the following set S. Let M and N be sets with sizes m
and n. Let S be the family of ordered pairs (A , B) such that A is a subset of M and B is an
m-subset of N ∪ A, as shown below.
M N
A B
34 Chapter 1: Combinatorial Arguments
1.2.40. (♦) For m , n ∈ 0 , generalize the argument of Exercise 1.2.39 to prove the follow-
ing polynomial identity by the Polynomial Principle:
m n+ ¾ ¾ m n
∑ ( ¾ )( m
) x = ∑ ( )( ) x m− j (1 + x) j .
j j
¾ j
1.2.43. (♦) Let A = {a1 , . . . , an} ⊂ , with a1 < · · · < an . For i ∈ [n], let Si be the family
of i-element subsets of A, and let i = ∑ B∈S max(B). For ∈ [n], prove
i
n
r−1
a¾ = ∑(−1)¾+r ( ) r. (Ash [2010])
−1
r =1
1.2.44. (+) Let n be the set of permutations of [n]. For positive real d1 , . . . , dn , prove
1 1
∑ d (1)(d (1) + d (2)) · · · (d (1) + · · · + d (n)) = d1 · · · d n
.
∈Ë n
Apply this to prove ∑v∈S(v1 · · · vn)−1 = ∑w∈ T (w1 · · · wn)−1 , where S = {v ∈ [N]n: ∑ vi ≤ N}
and T = {w ∈ [N]n: w1 , . . . , wn are distinct}. (Hill [2004], solution to Lubell [2003])
1.2.45. Given p , q ∈ , let d = gcd(p , q). By counting a geometric arrangement of points,
q−1
prove that 2 ∑i=1 ⌊ ip/q⌋ = (p − 1)(q − 1) + d − 1 .
1.2.48. (♦) Let I be the set of polynomials with rational coefficients that have integer val-
ues at all integers.
(a) Prove that every polynomial º of degree ¾ with rational coefficients can be ex-
¾
pressed in exactly one way as º (x) = ∑ j =0 bj ( xj) such that each bj is rational.
(b) Prove that º ∈ I if and only if the coefficients b0 , . . . , b¾ in part (a) are integers.
(Hint: Evaluate º at {0 , . . . , ¾}. Note that (00) = 1.)
1.2.49. By considering lists made from n − 2r copies of U (up) and n + 2r copies of D (down),
prove the identity below. (Hint: To explain the left side, view each list as a list of pairs of
successive elements; there are four types of pairs.)
n 2¾ 2n
∑ (2¾)(¾ − r)2n−2¾ = (n − 2r) . (Callan [2003a])
¾
1.2.50. (+) Prove the following identity by devising a set counted by both sides.
2m − ¾
n
2m + 1
∑ 2¾ ( m+ n
) = 4m − ∑ (
m+ j
). (Knuth [2007])
¾ ≥0 j =1
1.3. Applications
Proving identities provides plenty of opportunity for clever combinatorial ar-
guments, but often we want to count a new set rather than explain a given for-
mula. In this section we study several problems of this type.
A special case of Proposition 1.1.13 is that every ¾-element set has 2¾ subsets.
We apply this to count graphs (see Chapter 0 for basic definitions about graphs).
1.3.1. Corollary. There are 2(2) graphs with vertex set [n].
n
Proof: Each edge is an unordered pair of vertices, and a graph with a specified
vertex set is determined by choosing a family of vertex pairs as the edge set. There
are (n2) pairs of vertices to choose from.
We next count the trees (connected graphs without cycles) with vertex set [n].
Such trees have n − 1 edges and arise from a single vertex by iteratively adding a
new leaf with one old neighbor (see Chapter 0).
36 Chapter 1: Combinatorial Arguments
1.3.2. Example. Small trees. When n ∈ {1 , 2}, there is one tree with vertex set
[n]. With vertex set [3], there are three trees, pairwise isomorphic. They are
determined by choosing the central vertex, as shown below. With vertex set [4],
there are four “stars” and twelve paths; 16 trees in total. Case analysis yields
125 trees with vertex set [5].
3 1 2 1 2 3 1 3 2
• • • • • • • • •
Note that 1 , 3 , 16 , 125 fits the sequence ⟨a⟩ with an = nn−2 . To prove that
this is the formula, we seek a correspondence between the trees and the nn−2 lists
of length n − 2 with entries in [n]. We first view the lists as n-tuples by adding a
first entry 1 and last entry n. We then treat an n-tuple a with entries in [n] as a
function ºa : [n] → [n] defined by ºa(i) = ai for 1 ≤ i ≤ n. A function from a set to
itself has a useful graphical representation, which we use to define edges.
1.3.4. Theorem. (Cayley’s Formula; Cayley [1889]) There are nn−2 trees with
vertex set [n].
Proof: (Eğecioğlu–Remmel [1986]) There are nn functions º from [n] to [n].
Among these, nn−2 satisfy º (1) = 1 and º (n) = n. We establish a bijection from
this set to the set of trees with vertex set [n].
The functional digraph of º has vertex set [n] and n edges. Since each vertex
is the tail of exactly one edge, the digraph consists of cycles with directed trees
appended (iteration of º takes an element eventually to a cycle). Loops at 1 and
n are two of these cycles.
We modify the functional digraph of º to obtain a tree ( ). First place
the vertices of the cycles in on a horizontal line, with the least label in each
cycle appearing first (followed in order by its successive images). List the cy-
cles in decreasing order of their least elements. When n = 15, the n-tuple
(1 , 5 , 4 , 3 , 10 , 12 , 5 , 15 , 12 , 7 , 1 , 7 , 15 , 3 , 15) yields the diagram on the left.
15 5 10 7 3 4 1 15 5 10 7 3 4 1
• • • • • • • • • • • • • •
• •• 12• • •11 → • •• 12• • •11
13 8 2 14 13 8 2 14
• • • •
6 9 6 9
For each cycle, cut the edge from the last vertex to the first. Replace each
such edge (except for the last cycle) with an edge to the first vertex of the next
cycle. This destroys all cycles, reduces the number of edges by one, and connects
the pieces. Ignoring the directions on the edges yields a connected graph with no
cycles: a tree ( ) with vertex set [n]; see the outcome on the right above.
The vertices of the cycles in the functional digraph form a path P in ( )
from n to 1 along the horizontal line. A vertex on P began a cycle in if and only
if its label is less than all the labels that precede it on P. This is the key idea.
Section 1.3: Applications 37
For a tree T with vertex set [n], let P be the unique path from n to 1. Draw T
with P along a line. Orient edges not in P toward P , and orient P from n toward
1. For each vertex along P whose label is less than all preceding it, make it the
start of a new cycle by cutting the edge of P that reaches it and instead complete
the current cycle. Since n is first and 1 is last, these two become cycles of length
1. We obtain a functional digraph º of the desired form, so is surjective.
A vertex on the path from n to 1 in ( ) is the least element of a cycle in
if and only if it is less than all earlier labels. Hence is the only function with
( ) = T . Thus is also injective, and there are nn−2 trees with vertex set [n].
The idea used to arrange the cycles of this functional digraph will be used
again for the canonical cycle decomposition of a permutation in Section 3.1.
1.3.5.* Remark. Cayley ’s Formula has many proofs: Cayley [1889], K irch-
hoff [1847] (Exercise 15.2.4), Pr üfer [1918] (Exercise 12), P ólya [1937] (Theo-
rem 3.3.29), Moon [1967], Rényi [1970] (Theorem 15.2.9), Joyal [1981], Pitman
[1999], and others (Exercise 17). Equivalent results appeared earlier (Borchardt
[1860], Sylvester [1857]), but Cayley expressed the problem in terms of graph
theory and invented the term “tree”. Proofs also appear in Chapter 3 of Biggs–
Lloyd–Wilson [1976] and in Chapter 24 of Aigner–Ziegler [1999]. Moon [1970]
wrote a book on enumerating classes of trees.
MULTINOMIAL COEFFICIENTS
Proof 1: We can produce the arrangement by choosing positions for the letters
of the first type, then choosing positions for the second type, and so on. The re-
sulting product simplifies to the desired formula.
m m − 1 m − 1 − 2 m! (m − 1)! m!
( )( )( )··· = ··· =
1 2 3 1 !(m − 1)! 2 !(m − 1 − 2)! Π i !
1.3.7. Corollary. The number of trees with vertex set [n] in which vertices
1 , . . . , n have degrees d1 , . . . , d n , respectively, is (n − 2)!/ ∏i=1 (d i − 1)!.
n
38 Chapter 1: Combinatorial Arguments
Proof: In the functional digraph º for the list (1 , a2 , . . . , an−1 , n), one edge leaves
each i, and the number of edges entering i is the number of copies of i in the list.
For each i ∈ / {1 , n}, there is one incident edge in ( ) for each edge entering or
leaving i in . However, turning the cycles into a path loses the edge entering n
and the edge leaving 1.
After deleting the first and last term in the list, it becomes true for all i that
the degree of i in the tree ( ) is one more than the number of copies of i in the list
a2 , . . . , an−1 . Therefore, we count trees with each i having degree d i by counting
lists of length n − 2 with d i − 1 copies of i for each i. By Proposition 1.3.6, the
formula is as claimed.
1.3.8. Example. Trees with fixed degrees. Consider 7-vertex trees whose vertices
(n−2)!
have degrees 3 , 1 , 2 , 1 , 3 , 1 , 1. Here Π(d i −1)!
= 30. Each tree is of one of the three
types shown below. There are six ways to complete the first tree (pick from the
remaining four vertices the two adjacent to vertex 1) and twelve ways to complete
each of the others (pick the neighbor of vertex 3 from the remaining four, and
then pick the neighbor of the central vertex from the remaining three).
1 3 5 1 5 3 5 1 3
• • • • • • • • • • • • •
• • • • • • • •
¾
n
The number !/ ∏ i=1 i ! is written as (¾1 ,... )
,¾ n or P( ; 1 , . . . , n
). When n =
2, arranging the letters is the same as choosing positions for the first type, so
P(1 + 2 ; 1 , 2) = (¾1¾+1¾2 ). Due to the next result, the numbers (¾1 ,... ¾
)
,¾ n are called
multinomial coefficients.
with the sum on the right over (1 , . . . , n) ∈ 0n with sum .
Proof: In expanding (∑i=1 x i)¾ , the contributions to the coefficient of ∏i=1 x¾i i
n n
by setting each x i = 1.
By the Multinomial Theorem, the coefficient of ∏i=1 x¾i i in the expansion of
n
n n
(∑i=1 x i)p is p!/ ∏ i=1 i !. For each term of the form x i , the coefficient is 1; there
p
are n such terms. All other coefficients are divisible by p, since the denominator
in the formula for those multinomial coefficients has no divisor of p. Hence np =
(1 + · · · + 1)p ≡ n (mod p). (See Exercise 22 for another proof.)
Section 1.3: Applications 39
1.3.13. Theorem. (Bertrand [1887]) Among the lists formed from a copies of A
and b copies of B, where a ≥ b, there are ( a+a b) − (aa++1b) lists in which every
initial segment has at least as many As as Bs.
Proof: Lists consisting of a copies of A and b copies of B correspond to lattice
paths from the origin to (a , b). The total number of paths is ( a+a b), and the desired
lists correspond to the paths that never move above the line y = x. We count these
by subtracting the others from the total.
A path steps above the diagonal if it reaches (¾ , ¾ + 1) for some ¾ . Consider
the first such occurrence. Modify the list after this by changing As to Bs and Bs
to As. Now there are b − ¾ − 1 additional As and a − ¾ additional Bs, so the total
for the modified list is (b − 1 , a + 1).
7
(4,7)
6
5 (6,5)
(2,3)
(2,2)
0
0 4 5 6
40 Chapter 1: Combinatorial Arguments
The switch reflects the part of the path after (¾ , ¾ + 1) through the line
y = x + 1. The new path ends at (b − 1 , a + 1). Since a + 1 > b − 1, each path
ending at (b − 1 , a + 1) rises above the line y = x. Reflecting the part of such a
path after it first visits a point of the form (¾ , ¾ + 1) generates a path to (a , b).
The second map inverts the first, so the bad paths to (a , b) correspond bijectively
to all paths reaching (b − 1 , a + 1). Hence there are (aa++1b) bad paths.
Paths of Type C first step to the right or up. If right, then after (1 , 0) the
rest has length 2m − 1 and does not rise above y = x − 1. Setting l = 2m − 1,
the number of these paths is (2mm−1). The same number first step up, so the total
number of Type C paths is 2(2mm−1 ). The Committee-Chair and Complementation
2m−1 2m−1
m = 2m( m−1 = 2m( m
Identities yield m(2m) ) ), so 2(2mm−1) = (2m
m
).
Proof: There are 4n binary lists of length 2n; view them as lattice paths from
the origin. Since (2¾¾ ) is the number of lattice paths from the origin to (¾ , ¾), we
group the paths according to the point (¾ , ¾) where they last touch the line y = x.
Within such a path, the initial portion can combine with any path of 2n −
2 ¾ steps after (¾ , ¾) that does not return to y = x. By Lemma 1.3.14, there are
(2nn− 2¾
−¾ ) such paths. Hence the sum counts all paths with 2n steps, grouped by the
position of the last visit to the line y = x.
CATAL AN NUMBERS
1.3.17. Theorem. If p and q are relatively prime, then the number of lattice
paths from (0 , 0) to (p , q) that do not rise above the line py = qx is p+1 q ( p+p q).
Proof: Exactly ( p+p q) words consist of p 1s and q 0s. Put them in groups; grouped
with A are all words obtained by reading A cyclically from some starting point.
If the rotations of A are not distinct, then A is periodic, making p and q both
divisible by the number of periods. Since gcd(p , q) = 1, each group has size p + q.
There are thus p+1 q ( p+p q) sets of words. Since the words correspond bijectively
to the lattice paths to (p , q), it suffices to show that each set contains exactly one
word that corresponds to a good path.
• • (2p , 2q)
• •
• • •
P
• • •
(p , q) = (5 , 3)
• •
• • •
P
(0 , 0) • •
42 Chapter 1: Combinatorial Arguments
The numbers qn1+1 ((q+n1)n) are the generalized Catalan numbers or Fuss–
Catalan numbers (first studied by Fuss [1791]). See Goulden–Serrano [2003]
for other instances, also Exercises 43–45.
A related argument yields the same generalizations and others. We state the
result here and leave the proof and applications to Exercises 37–39.
The example above has (m , n , ¾) = (7 , 3 , 2), with the good position marked.
Theorem 1.3.20 provides a bijection from q-ballot lists (with an initial 1 added)
to cyclic arrangements with qn + 1 1s and n 0s. Since the number of such cyclic
arrangements is qn1+1 ((q+n1)n), Corollary 1.3.19 follows (see Peck [1989]).
Section 1.3: Applications 43
The root in a rooted tree has no parent; it is considered a leaf when it has
no children. Ordered trees have also been called rooted plane trees; the word
“plane” suggests the fixed ordering on the children when the tree is drawn in the
plane. In a binary tree, the left subtree and right subtree are the subgraphs
obtained by deleting the root r; they are rooted at the left and right children of r,
respectively. In some contexts in computer science, a vertex in a binary tree may
have exactly one child, designated “left ” or “right ”.
1.3.23. Theorem. The number of binary trees with n + 1 leaves is the nth Cata-
lan number, n+1 1 (2n
n ).
Proof: Using induction on n, we establish a bijection ºn from the set An of binary
trees with n + 1 leaves to the set Bn of ballot lists of length 2n (we know the latter
has size Cn). For n = 0, the 1-vertex tree corresponds to the empty ballot list.
Consider n > 0. A tree T in An has left and right subtrees T l and Tr with ¾
and n + 1 − ¾ leaves, for some ¾ ∈ [n]. Under the bijections º¾−1 and ºn−¾ provided
by the induction hypothesis, these subtrees yield ballot lists of lengths 2 ¾ − 2 and
2n − 2 ¾ . Let ºn(T) = (1 , º¾−1 (T l) , 0 , ºn−¾ (Tr)). The result is a ballot list of length
2n, since the sublists are ballot lists and the added 1 precedes the added 0.
To prove that ºn is a bijection, we argue that for a ballot list b of length 2n
exactly one binary tree T satisfies ºn(T) = b. This requires the initial 1 in b to
be paired with a 0 that occurs immediately after the ballot list corresponding to
T l and before the list corresponding to Tr . By the induction hypothesis, there is
exactly one choice for T l and one for Tr . Hence T is determined uniquely.
The key step for inductively producing the inverse of a bijection to the set of
ballot lists is to decompose the list using the unique 0 that “matches” the initial
1 by the first equality in the bits of each type (first return to the diagonal). In
Theorem 1.3.23, this discovers two smaller ballot lists to be used to find the in-
verse image (this is how one distinguishes the images of left and right subtrees
in a list like 10101010).
Bijections involving binary trees are especially easy to verify inductively.
This yields the next classical instance of the Catalan numbers.
• de •
(bc)(de)
a e
• •
a((bc)(de))
An argument like that of Theorem 1.3.23 counts ordered trees with n edges.
This bijection motivates our claim that bijective arguments give more infor-
mation than inductive proofs. We record 1 when an edge is traveled to a subtree,
then the subtree is traversed, then a 0 is recorded when following the edge back
up, and finally we continue to the next subtree. Each edge contributes a 1 and
later a 0. A 1 is followed immediately by its matching 0 if and only if the sub-
tree has only one vertex and is a leaf. Thus the number of leaves in the ordered
tree is the number of times that 0 follows 1 in the corresponding ballot list. Our
bijection is “refined” by describing the images of subsets of interest.
1.3.26.* Theorem. The number of ordered trees with n edges and ¾ leaves, called
the Narayana number Nn ,¾ , is 1¾ (¾−n1 )(¾n−−11).
Proof: As observed in Example 1.3.25, it suffices to count the ballot lists of length
2n that have ¾ runs of 1s (and ¾ runs of 0). Appending a 0 to the end of the list
yields a list whose corresponding path reaches (n , n + 1), still with ¾ runs of each
bit. As in Corollary 1.3.19, these are the paths reaching (n , n + 1) that do not
step above the line ny = (n + 1)x, and there is exactly one place to cut the cyclic
arrangement of any list with n 1s and n + 1 0s to obtain the list for such a path.
Hence it suffices to count the cyclic arrangements of these bits with ¾ runs
of each type. Consider starting at a run of 1s. The 1s form a composition of n
with ¾ parts, and the 0s form a composition of n + 1 with ¾ parts in the spaces
−1
following runs of 1s. By Corollary 1.1.22, there are (n¾− n
1 )(¾ −1 ) ways to form these
compositions. Starting at any one of the ¾ runs of 1s yields a cyclic rotation of the
same arrangement, so we divide by ¾ . Because n and n + 1 are relatively prime,
there is no periodicity, and each cyclic arrangement arises in ¾ ways.
The Narayana numbers are named after Narayana [1955], though they were
studied earlier (in more generality) by MacMahon [1916]; they arise again in Ex-
ercise 41 and in our last example.
We have noted that the Catalan numbers arise in many counting problems,
such as in these exercises. Also, the formula for Cn can be found in many ways.
Indeed, a theme of this text is the flexibility of using various techniques to solve a
46 Chapter 1: Combinatorial Arguments
EXERCISES 1.3
1.3.1. (−) A box has ¾i letters of type i, for 1 ≤ i ≤ n. Count the words (using all letters in
the box) that have no two letters of type n adjacent.
1.3.2. (−) Given positive integers ¾1 , . . . , ¾m , how many ways are there to partition a set
of n distinct objects so that there are ¾i blocks of size i, for 1 ≤ i ≤ m?
1.3.3. (−) Prove bijectively that the Catalan number Cn counts these sets:
(a) Nondecreasing functions º : [n] → [n] such that º (i) ≤ i for all i.
(b) Nonnegative integer sequences of length 2n + 1 starting and ending at 0 such that
consecutive entries differ by 1.
(c) Arrangements of 2n people in two rows of n such that heights increase in each row
and in each column.
1.3.4. (−) Generate a random list b1 , . . . , bn in the following way. For 1 ≤ ¾ ≤ n, choose b¾
to be any of the ¾ values in [¾], equally likely. Obtain a simple formula for the probability
that the resulting list is nondecreasing.
1.3.5. (−) In Bertrand’s Ballot Problem (Example 1.3.12) with outcome (a , b) and votes
counted in random order, suppose that a > b. What is the probability that A is always
ahead of B (after the start)?
1.3.6. (−) A fair coin is flipped 2n times, consecutively. Compute the probability that the
lead changes, given that the final total is n heads and n tails.
1.3.7. (−) Prove the identities below by counting in two ways. (Whitworth [1897])
2 ¾ 2n − 2 ¾
n
1 2n + 1 1 2 ¾ − 2 2n − 2 ¾ + 1 2n
(a) ∑ ( )( )=( ) . (b) ∑ ( )( )=( ).
¾
¾+1 ¾ n−¾ n ¾ ¾−1 ¾ =1
n−¾ n−1
1.3.8. (♦) Prove bijectively that the number of graphs with vertex set [n] in which all
n−1
vertices have even degree is 2( 2 ) .
1.3.9. Among the trees with vertex set [n], use Corollary 1.3.7 to count those having n − 2
leaves and those having two leaves.
1.3.10. (♦) Let º (d1 , . . . , d n) be the number of trees with vertex set [n] in which, for each i,
the degree of i is d i . Use induction on n to prove directly that º (d1 , . . . , d n) = ( d −1 n,...
−2
,d n −1
).
1
n−2
Use this to obtain Cayley’s Formula n for the number of trees with vertex set [n].
1.3.11. Let G be a graph with n vertices and (n2) − 1 edges. Use Cayley’s Formula to prove
that G has exactly (n − 2)nn−3 spanning trees.
1.3.12. (♦) For a tree T with vertex set [n], the Pr üfer code ½(T) is formed by repeatedly
deleting the least leaf in the remaining tree and recording its neighbor, n − 2 times.
(a) Prove that ½ is a bijection from the set of trees with vertex set [n] to the set [n]n−2 .
(Comment: Pr üfer ’s argument appears in Biggs–Lloyd–Wilson [1976].)
(b) Prove that a tree T with vertex set [n] has {n − 1 , n} as an edge if and only if the
last entry in ½(T) is n − 1 or n. Use this to solve Exercise 1.3.11.
Exercises for Section 1.3 47
1.3.13. For n ≥ 4, construct a tree T with vertex set [n] whose Pr üfer code ½(T) (Exercise
1.3.12) differs from the list º (2) , . . . , º (n − 1) corresponding to it in Theorem 1.3.4.
n−1
1.3.14. (♦) Prove that t n = ∑¾=1 ¾ (¾n−−12) t¾ t n−¾ , where t n is the number of trees with vertex
set [n]. (Dziobek [1917])
1.3.15. (♦) Let t n be the number of trees with vertex set [n]. Explain the identity below
n−1
in terms of t n . Prove it. Conclude that t n = 2n ∑¾=1 (¾n−−12) t¾ t n−¾ . (Comment: The result
appears in Lovász [1979]; the combinatorial argument is due to L. Smiley.)
n−1
n
2(n − 1)nn−2 = ∑ ( )¾ ¾−1 (n − ¾)n−¾−1
¾
¾ =1
1.3.16. Let S be the set of pairs consisting of a rooted tree with vertex set [n] and a marked
vertex of that tree. Count S in two ways to prove that
n−1
n
nn = ∑ ( ) ¾ ¾(n − ¾)n−¾−1 . (Rey [1997])
¾
¾ =0
n−1
(Comment: Using this on forests, Smiley proved n(n + 1)n−1 = ∑¾=0 (n¾)(¾ + 1)¾ (n − ¾)n−¾−1 ,
which appears in Riordan [1968, p. 116].)
1.3.17. (+) Cayley’s Formula generalized. A forest is a graph whose components are trees.
Let (n , ¾) be the set of rooted forests with vertex set [n] in which the roots of the com-
ponents are the vertices 1 , . . . , ¾ , and let an ,¾ = | (n , ¾)|. This exercise develops three
distinct proofs that an ,¾ = ¾ nn−¾−1 . The formula appears in Cayley [1889].
(a) Use induction on n, with basis an ,n = 1. (Hint: Delete the roots.) (David [2007])
(b) Prove (¾ + 1)!an ,¾ = ¾ !n¾ an ,¾+1 and use an ,n = 1. (Hint: The operation obtaining
members of (n , ¾ + 1) from members of (n , ¾) will need to be symmetrized by permuting
[¾ + 1].) (Lovász [1979, problem 4.14]).
(c) Generalize Exercise 1.3.12(a). For F ∈ (n , ¾), form a list by iteratively deleting
the largest (nonroot) leaf and recording its neighbor, until only the roots remain. Prove
that this establishes a bijection from (n , ¾) to [n]n−¾−1 × [¾].
1.3.18. (♦) Let F be a forest with vertex set [n] and t components having n1 , . . . , nt ver-
tices. Prove that exactly nt−2 ∏i=1 ni trees with vertex set [n] contain F . (Moon [1967])
t
1.3.19. (+) Let M be the set of pairings of [2n], and let T be the set of “unordered” binary
trees with leaf set [n + 1]. Each tree has n unlabeled nonleaf vertices and 2n edges; nonleaf
vertices have exactly two children. “Unordered” means that the tree is unchanged when
we exchange left and right subtrees at a vertex.
(a) Show that |M| = (2n)!/(n!2 n).
(b) Prove bijectively that |T| = |M|. (Hint: First extend the labeling of the leaves of
such a tree to the full vertex set. When 1 , . . . , r have been used, assign r + 1 to the unla-
beled vertex that , among those with two labeled children, has the child with the smallest
label.) (Schröder [1870], Erdős–Székely [1989])
1.3.20. Let p be a prime, and let the p-ary expansions of positive integers n and ¾ be given
by n = ∑ ai pi and ¾ = ∑ bi pi .
(a) Use (x + 1)p ≡ (x p + 1) (mod p) to prove (¾n) ≡ ∏ ( abii ) (mod p). (Lucas [1878])
(b) Use part (a) to determine when (¾n) is odd. Determine also for which n the binomial
coefficients (n0) , . . . , ( nn) are all odd.
48 Chapter 1: Combinatorial Arguments
(b) Prove that the number of terms in the expansion of (x1 + x2 + · · · + x m)n whose
a + m−1
coefficients are not divisible by p is ∏j ( j m−1 ) . (Howard [1974])
1.3.26. Generalize the formula of Exercise 1.3.25 by finding the number of regions in d
formed by n hyperplanes in general position. That is, no d + 1 of them have a common
point , and for ¾ ≤ d any ¾ of them intersect in a (d − ¾)-dimensional plane. (Schläfli [1852])
1.3.27. In an election where A receives a votes and B receives b votes, determine the prob-
ability that A never trails B by more than ¾ votes during the counting, assuming that all
orderings of the votes are equally likely.
1.3.28. (♦) Establish a direct bijection from the binary trees with n + 1 leaves to the or-
dered trees with n+ 1 vertices (Definition 1.3.21). Below are the instances of each for n = 2.
(Comment: By Theorem 1.3.23, the Catalan number Cn thus counts each set.) (Bernhart)
• • • •
• • • • • • •
• • • • •
1.3.29. (♦) The bijections in Exercise 1.3.28 and Example 1.3.25 show that there are
n+1 ( n )
1 2n
ordered trees with n + 1 vertices. Drawing them all yields a total of (2n
n)
vertices.
Prove that exactly half of these vertices are leaves in their trees. (Shapiro [1999])
1.3.30. Prove that the map suggested in Example 1.3.24 is a bijection from the set of tri-
angulations of a convex (n + 2)-gon to the set of binary trees with n + 1 leaves, thereby
showing that there are Cn such triangulations.
1.3.31. (♦) Place 2n points on a circle. Prove bijectively that the number of ways to pair
the points by drawing noncrossing chords equals the number of ballot lists of length 2n.
The possibilities for n = 3 appear below.
• • • • • • • • • •
• • • • • • • • • •
• • • • • • • • • •
1.3.32. (♦) Let En and On , respectively, be the number of Dyck n-paths (Example 1.3.27)
having an even or an odd number of peaks at even height. Compute En and On in terms of
the Catalan numbers. (Deutsch [2005])
Exercises for Section 1.3 49
1.3.33. (♦) Prove that the number of ballot lists of length 2n that are unchanged when
they are reversed and complemented is (⌈n/2⌉
n
).
1.3.34. (♦) Lattice walks in the plane. (See Definition 1.2.1; lattice walks can move in any
direction, while lattice paths only increase coordinates.)
(a) A positive lattice walk is a lattice walk that starts at the origin and never falls
below the horizontal axis. Prove that the number of positive lattice walks of length ¾ is
¾
∑ j =0 (¾j )(⌈ j/2⌉
j
)2¾− j . (Hint: Consider Lemma 1.3.14. Comment: This sum was shown com-
binatorially to equal (2¾¾+1 ) in Exercise 1.2.29 and will be evaluated by other means in both
Exercise 2.1.52 and Exercise 3.2.46.)
(b) In three dimensions, determine the number of walks of length n that start at the
origin and don’t fall below the horizontal plane. (Deutsch [2000])
1.3.35. (♦) Generalization of ballot paths.
(a) Prove that the number of lattice paths from (0 , 0) to (n , n + ¾) that never pass above
the line y = x + ¾ in the plane is n+¾+¾+1 1 (2nn+¾ ).
(b) A population grows from one individual of type ¾ in generation 0. For i ≥ 0, each
individual of type i in generation t produces one individual with each type 1 , . . . , i + 1 in
generation t + 1. For ¾ ≥ 0 and n ≥ 1, prove that the total number of individuals in gener-
ation n is the same as the answer in part (a). (Hint: Trace the ancestry of each individual.)
(See Kupka [1990], Beckwith [2006b])
1.3.36. For q ∈ , determine the number of lattice paths from (0 , 0) to (n , qn) not rising
above the line y = qx.
1.3.37. (♦) Prove the Cycle Lemma (Theorem 1.3.20). (Hint: Use induction.)
1.3.38. Apply the Cycle Lemma (Theorem 1.3.20) to solve Bertrand’s Ballot Problem (Ex-
ample 1.3.12).
1.3.39. For n ∈ , count the lists (a1 , . . . , an) of positive integers with a1 = 1 such
that ai − ai−1 is odd and at most 1 for i > 1. For example, for n = 5 the lists are
{12345 , 12343 , 12341 , 12323 , 12321 , 12123 , 12121}. (Deutsch [1999])
1.3.41. (♦) Noncrossing partitions of [n]. A partition of [n] is noncrossing if there are no
a , b , c , d with a < b < c < d such that a and c are in one block and b and d are in another.
Thus (14|25|3) is crossing and (15|234) is noncrossing.
A B A
• • •
B
C •
• • • • • • • • • •
1 2 3 4 5 1 2 3 4 5
Establish a bijection from the set of noncrossing partitions of [n] to the set of ballot lists
of length 2n. From the bijection, argue that the number of noncrossing partitions of [n]
with ¾ blocks equals the number of ballot lists of length 2n with ¾ runs of 1. Thus the
value is the Narayana number Nn ,¾ of Theorem 1.3.26, counting the ordered trees with n
edges and ¾ leaves. (Prodinger [1983])
50 Chapter 1: Combinatorial Arguments
1.3.42. For n , t ∈ , count the nondecreasing integer lists (a1 , . . . , an) such that 1 ≤ ai ≤
ti for 1 ≤ i ≤ n. (Deutsch [2004a])
1.3.43. Establish a bijection from the set of q-ballot lists of length (q + 1)n to the set of
ordered (q + 1)-ary trees with qn + 1 leaves. The trees correspond to groupings of qn + 1
items, combining q + 1 at a time, shown below for q = n = 2. (Sands [1978])
• • •
• • •
• • • • • • • • • • • • • • •
a b c d e a b c d e a b c d e
((abc)de) ↔ abc| de| (a(bcd)e) ↔ abcd| e| (ab(cde)) ↔ abcde||
1.3.44. Consider an election where A receives ¾ n votes and B receives n votes. Given that
the vote order is random, let p be the probability that throughout the counting the number
of votes recorded for A is always at most ¾ times the number of votes recorded for B. Let q
be the analogous probability with “at most ” replaced by “at least ”. Prove p = q.
1.3.45. (♦) Counting q-ballot paths by the number of turns.
(a) Let r and s be relatively prime positive integers. Prove that the number of lattice
paths from (0 , 0) to (r, s) that do not rise above the line ry = sx and turn exactly 2 ¾ − 1
times is 1¾ (¾r−−11 )(¾s−−11) .
(b) For q ∈ , prove that the number of lattice paths from (0 , 0) to (n , qn) that do not
rise above the line y = qx and turn exactly 2 ¾ − 1 times is 1¾ (n¾−−11 )(¾qn
−1 ) .
(Cigler [1987]; see
also Krattenthaler [1997])
1.3.46. (♦) Let x1 , . . . , x n be a cyclic arrangement of integers with sum 1.
(a) Prove that for all r ∈ [n], there is exactly one place to break the cycle into a lin-
ear arrangement with exactly r positive partial sums. Let pj be the position from which
j partial sums are positive. Show that if r > s, then the positions ending positive partial
sums from position pr include all the positions ending positive partial sums from ps . For
example, for [x1 , . . . , x5 ] = [3 , −4 , 1 , 2 , −1], we have (p1 , p2 , p3 , p4 , p5) = (2 , 5 , 1 , 4 , 3).
For the ending positions of the positive partial sums from each pi , we have p1 = 2: {1};
p2 = 5: {1 , 4}; p3 = 1: {1 , 4 , 5}; p4 = 4: {1 , 3 , 4 , 5}; p5 = 3: {1 , 2 , 3 , 4 , 5}.
(b) Let all lists of n As and n Bs be equally likely. Let X be the random variable
counting the values i such that the ith A precedes the ith B. Apply part (a) to prove that
Prob(X = l) = 1/(n + 1) for each l ∈ {0 , . . . , n}. (Chung–Feller [1949])
(Comment: Many results similar or equivalent to parts of (a) have appeared: see
Spitzer [1956], Raney [1960], Kierstead–Trotter [1988], Mont ágh [1991], Snevily–West
[1998], and Chapter 3 of Mohanty [1979].)
1.3.47. (♦) Consider : [n] → [n]. Drivers 1 , . . . , n in order enter a street with parking
spots 1 , . . . , n. Driver i starts looking for parking at spot (i) and takes the first open spot.
If none is open from (i) to n, then Driver i fails. The functions such that all drivers
succeed are parking functions. For example, if ([9]) = (6 , 4 , 4 , 3 , 6 , 8 , 3 , 1 , 1) in order,
then all nine drivers succeed, parking in order in spots (6 , 4 , 5 , 3 , 7 , 8 , 9 , 1 , 2). Prove that
is a parking function if and only if there is a permutation of [n] such that (i) ≤ (i)
for all i. (Riordan; see Knuth [1973, p. 545]) (Comment: More than 200 papers have been
written about parking functions and related topics; see Yan [2015] for a survey.)
1.3.48. (♦) Prove that the number of parking functions on [n] is (n + 1)n−1 (Pyke [1959],
Konheim–Weiss [1966]) (Hint: Add a position n + 1, which can be in the image of , and
move cars cyclically until they park; this proof is due to Pollak in the 1970s. Comment:
Foata–Riordan [1974] gave a correspondence with labeled trees.)
Chapter 2
Recurrence Relations
Often the solutions to a counting problem can be built from solutions to a
smaller problem of the same type. For example, let an count the 0 , 1-lists of length
n. A list of length n − 1 can extend by acquiring a 0 or a 1. The resulting lists are
distinct, and every list of length n arises in this way. Therefore, an = 2an−1 for
n ≥ 1. With a0 = 1 (there is one way to “do nothing ”), induction yields an = 2 n .
This example shows the steps in recursive solution of counting problems.
Combinatorial arguments express an in terms of earlier values and a function of
n. Along with initial values, this “recurrence” determines the sequence. “Solv-
ing ” the recurrence means obtaining an exact or asymptotic formula for an .
A solution formula for a recurrence can be verified by induction. When no
formula is apparent, solutions may arise by other techniques: the “characteristic
equation method” for special recurrences, a more general “generating function
method”, substitution techniques, special methods for asymptotic solutions, etc.
We first concentrate on recurrences with one (integer) parameter. We may
refer to the sequence of solutions to a counting problem as a counting sequence.
2.0.3. Remark. A recurrence relation does not by itself specify a sequence; for
example, every constant sequence satisfies an = an−1 . A recursive definition must
include initial values that enable the recursive computation to proceed. A recur-
rence of order ¾ requires ¾ initial values to specify a sequence. We say that the
51
52 Chapter 2: Recurrence Relations
recursive formula is valid for larger values. Initial values correspond to the basis
step in inductive proofs; verifying that an explicit formula for an gives the initial
values is the basis step in an inductive proof that the formula is correct for all n.
In some contexts ½(a0 , . . . , an) = 0 is a more natural form for recurrences.
Here a recurrence is an operator, and one finds the sequences annihilated by it (its
¾
“nullspace”). Linear recurrences of order ¾ then become ∑i=0 ½ i(n)an−i = º (n);
the signs in the coefficients have changed. This convention is useful in the theory
of solving recurrences, but in this text we emphasize the combinatorial aspects
of describing a set using “earlier ” instances. Thus we choose the “ an = ” form.
2.0.4.* Remark. When studying integer sequences, one should know about the
On-Line Encyclopedia of Integer Sequences (OEIS), developed by Neil J. A. Sloane
and located at http://oeis.org. It contains enormous amounts of information
about nearly every counting sequence in this book, including the Fibonacci num-
bers (sequence A000045), Catalan numbers (A000108), Derangement numbers
(A000166), central Delannoy numbers (A001850), and many others. Readers can
consult the OEIS for more information about special sequences and contribute
interesting sequences not yet among the more than 100,000 sequences in the
database. The welcome page describes the database and gives instructions for
many ways of interacting with it.
CL ASSICAL EX AMPLES
In the simplest situation, our problem has one parameter, and we seek a sin-
gle recurrence for the resulting counting sequence.
2
n
In a 1 , 2-list with sum n, the last element may be 1 or 2. There are F̂ n−1 ways
to fill the earlier part if the list is 1 and F̂ n−2 ways if it is 2. Thus F̂ n = F̂ n−1 + F̂ n−2
for n ≥ 2. Only the empty list has sum 0, and one list has sum 1, so F̂0 = F̂1 = 1.
Changing the initial conditions to F0 = 0 and F1 = 1 yields another sequence
⟨F⟩. Since F1 = F̂0 and F 2 = F̂1 , inductively F n = F̂ n−1 for n ≥ 1. The sequence
⟨F⟩ is the classical Fibonacci sequence introduced in 1202 by Leonardo of Pisa
(ca. 1170–1250), known as Fibonacci. The Fibonacci recurrence F n = F n−1 + F n−2
is a natural model for growth from two previous stages of a process and occurs fre-
quently in nature. The journal The Fibonacci Quarterly is devoted to the Fibonacci
numbers and related topics. Extensive material on their history, mathematics,
and applications appears in Koshy [2001]; we study them in Exercises 14–34.
Since F n = F̂ n−1 , both sequences use the same numbers, and we call ⟨ F̂⟩ the
adjusted Fibonacci numbers. Benjamin–Quinn [2003] also uses special nota-
tion to distinguish the adjusted and classical indexings, writing ºn for our F̂ n .
The initial conditions F0 = 0 and F1 = 1 are more common in the literature
and are appropriate in number theory due to divisibility properties (such as Ex-
ercise 22). Other initial conditions have been studied; the Lucas numbers arise
from the Fibonacci recurrence with initial conditions L1 = 1 and L2 = 3; see
Exercise 27. (The term “Fibonacci numbers” was popularized by Lucas.)
n ≥ 0. One can easily prove this by induction after replacing F̂ n+1 with F̂ n + F̂ n−1 .
Combinatorially, the product F̂ n F̂ n+1 counts the ways to choose two 1 , 2-lists,
with sums n and n + 1 (as in a parking lot with two rows). In a 1 , 2-list as a tiling
with segments of lengths 1 and 2, we view each partial sum as a “breakpoint ”. In
F̂ n2 of the pairs, both lists have a breakpoint at n; these are the pairs where the
second list ends with 1. Among those where the second list ends with 2, there are
F̂ n2−1 where both lists have a breakpoint at n − 1, and so on.
When the last common breakpoint is known, there is only one way to complete
the lists after that; it uses one 1 and the rest 2s. Thus there are exactly F̂ i2 pairs
where the last common breakpoint is at i, which proves the identity.
i n
2.1.4. Definition. The cycles of a permutation are the orbits of elements under
iteration of the permutation; these are the (ordered) vertex sets of the cycles
in the functional digraph. A fixed point is a cycle of length 1. A derange-
ment is a permutation with no fixed points. The number of derangements of
an n-set is denoted by Dn .
2.1.5. Example. Viewing 641253798 as a permutation of [9], the cycles are (163),
(24), (89), (5), and (7), with 5 and 7 being fixed points.
This recurrence needs more computation for each successive value; fixed or-
der is preferable. With D0 = 1 and D1 = 0 by inspection, we derive a second-order
recurrence valid for n ≥ 2. We count the ways to partition [n] into cycles of length
at least 2. There are two cases.
If the cycle containing the element n has length 2, then there are n − 1 ways
to pick its other element, and there are Dn−2 ways to derange the remaining el-
ements (that is, to put them into cycles of length at least 2). Hence there are
(n − 1)Dn−2 derangements of this type.
If the cycle containing n is longer, then skipping it in its cycle still leaves
cycles of length at least 2 and produces a derangement of [n − 1]. On the other
hand, every derangement of [n] with n in such a cycle arises from a derangement
of [n − 1] by inserting n immediately following some x ∈ [n − 1] on the cycle con-
taining x. Hence there are (n − 1)Dn−1 derangements of this type.
Derangements are studied in Exercises 40–46. The recurrences above are lin-
ear (Definition 2.0.1); our next recurrence is not.
(n , n)
n− ¾
(¾ , ¾)
n−¾
¾−1
¾−1
Every ballot path to (n , n) has some first return to the diagonal, say at (¾ , ¾).
The part up to (¾ , ¾) begins rightward and then does not rise above y = x − 1 until
it reaches (¾ , ¾ − 1). Hence the possible initial portions of the path correspond
bijectively to the ballot paths of length 2 ¾ − 2. The portion from (¾ , ¾) to (n , n)
is a translation of a ballot path of length 2n − 2 ¾ . Hence exactly C¾−1 Cn−¾ ballot
paths of length 2n first return to the diagonal at (¾ , ¾). Summing over the choices
for ¾ yields Cn = ∑¾=1 C¾−1 Cn−¾ for n ≥ 1, with initial condition C0 = 1. This
n
2.1.8. Remark. Catalan numbers. Exercises 47–56 study the Catalan numbers.
In Section 1.3 we used bijections to show that this sequence solves many counting
problems. Another method, often easier, is to prove that a new problem satis-
fies the Catalan recurrence and initial condition; the counting sequence ⟨a⟩ must
56 Chapter 2: Recurrence Relations
then also be the Catalan sequence. As in combinatorial arguments for sums, the
key step in proving an = ∑¾=1 a¾−1 an−¾ is interpreting the index of summation so
n
• •
• •
v0 vn+1
Showing a0 = 1 and an = ∑¾=1 a¾−1 an−¾ for n > 0 gives more than an = Cn .
n
We also obtain a bijection from the given problem to any sequence of sets counted
by the Catalan numbers. The bijection applies recursively to the objects with
index ¾ − 1 and n− ¾ combined to form an object with index n. Thus it also matches
the sets for the ¾ th term in the recurrences for the two problems. For example, in
Theorem 1.3.23 we used the position of the 0 that matches the initial 1 in a ballot
list to recursively invert the bijection that maps binary trees to ballot lists.
VARIATIONS
Problems having more than one parameter may lead to recurrences with more
than one index. As with derangements and Fibonacci numbers, often one can de-
rive recurrences for problems involving distinct objects or positions by studying
how the last object or position is used.
c(n , ¾): When we permute [n] using ¾ cycles, the element n may or may not
form a cycle by itself. There are c(n − 1 , ¾ − 1) permutations where it is alone.
Otherwise, there are n − 1 elements it can follow to turn a permutation of [n − 1]
with ¾ cycles into a permutation of [n] with ¾ cycles. (Compare this with the
argument in Example 2.1.6.)
Each of these recurrences is valid for n ≥ 1 and computes the value for (n , ¾)
using values for (n − 1 , ¾) and (n − 1 , ¾ − 1). Hence it suffices to specify initial
values for {(0 , ¾): ¾ ∈ 0}. In each case, there is one construction when ¾ = n = 0
and none when ¾ > n = 0. Thus inductively the values are 0 whenever ¾ > n.
Next we find a recurrence for the size of the lattice ball (Definition 1.2.11).
n ¾
The solution ∑ (m ¾ )(¾ )2 was found bijectively in Proposition 1.2.12. The first
proof illustrates a useful technique: sometimes a summation can be eliminated
from a recurrence by taking the difference of two instances of the recurrence. The
second more directly obtains the desired recurrence.
2.1.10. Proposition. The number of lattice points within m lattice steps from
the origin in n satisfies the recurrence lm ,n = lm ,n−1 + lm−1 ,n−1 + lm−1 ,n for
m , n > 0, with lm ,0 = l0 ,n = 1.
Proof: Here l0 ,n counts the all-0 vector and lm ,0 counts the vector with no entries.
Let Bm ,n = {(a1 , . . . , an) ∈ n : ∑i=1 | ai | ≤ m}.
n
Proof 1 Group Bm ,n by the last coordinate. There are lm−|¾| ,n−1 points in Bm ,n
with an = ¾ and lm−|¾| ,n−1 with an = −¾ . Thus lm ,n = lm ,n−1 + 2 ∑¾=1 lm−¾ ,n−1 .
m
m−1
The same argument yields lm−1 ,n = lm−1 ,n−1 + 2 ∑¾=1 lm−1−¾ ,n−1 . Subtracting the
second equation from the first yields lm ,n − lm−1 ,n = lm ,n−1 + lm−1 ,n−1 .
Proof 2 Among the groups in Proof 1, there are lm ,n−1 vectors with an = 0
and lm−1 ,n−1 with an = 1. We claim that lm−1 ,n vectors remain. For each re-
maining vector, bringing its last coordinate one unit closer to 0 yields a vector
in Bm−1 ,n . This produces each vector in Bm−1 ,n exactly once; for example the vec-
tors in Bm−1 ,n with last coordinate 0 correspond to the vectors in Bm ,n with last
coordinate −1. Thus there are lm−1 ,n vectors remaining, and we obtain lm ,n =
lm−1 ,n + lm ,n−1 + lm−1 ,n−1 .
2.1.11. Remark. Delannoy paths and lattice ball. Recall that the Delannoy
number d m ,n is the number of paths from (0 , 0) to (m , n) that move by one of
{(1 , 0) , (0 , 1) , (1 , 1)} at each step (Definition 1.2.8). The analogue of Pascal’s For-
mula for Delannoy numbers is the recurrence d m ,n = d m ,n−1 + d m−1 ,n + d m−1 ,n−1 ,
valid for m , n ≥ 1. Also d m ,0 = d0 ,n = 1.
Proposition 2.1.10 obtains the same recurrence and initial conditions for lm ,n .
This gives a short proof (without finding a bijection) that the Delannoy numbers
also count the points in the lattice ball, or a short proof of Theorem 1.2.13 that
∑¾ (m¾ )(nm+¾) = ∑¾ (m¾ )(¾n)2¾ if we instead counted the two sets separately as in
Proposition 1.2.10 and Proposition 1.2.12.
When a single recurrence for a sequence is not apparent, it may help to derive
a system of recurrence relations for several sequences. Manipulating the system
may then yield a recurrence for the original problem.
58 Chapter 2: Recurrence Relations
Let an count the binary n-tuples with no consecutive 1s. Let cn count those
ending in 1, and let bn count the rest. By definition, an = bn + cn . The lists ending
in 0 arise by appending 0 to a shorter good list, but those ending in 1 can append
1 only to lists ending in 0. This yields the expressions for bn and cn . Substituting
to eliminate b and c yields a single recurrence for a. It is the Fibonacci recurrence
an = an−1 + an−2 (obtained directly in Exercise 14).
Recurrences may be indexed by objects that are not numbers. Each object
must be evaluated in terms of objects evaluated earlier; finitely many computa-
tions must suffice to evaluate any object from the initial conditions. We consider
a recurrence on graphs that evaluates each in terms of graphs with fewer edges.
• • • • •
e + •
• • • • •
G G−e G·e
Exercises for Section 2.1 59
EXERCISES 2.1
2.1.1. (−) Obtain a recurrence relation for the number of ways to tile a 2-by-n checkerboard
with n identical dominoes.
2.1.2. (−) Obtain a recurrence for the number of pairings of 2n people.
2.1.3. (−) Fix r ∈ . Let an be the number of regions formed by n lines in the plane, given
that r of them are parallel, the other n − r lines each intersect n − 1 lines, and no three
lines have a common point. Obtain a recurrence for ⟨a⟩.
2.1.4. (−) Determine the number of binary n-tuples in which every run has odd length,
where a run is a maximal string of consecutive equal entries. (Beckwith [2014])
2.1.5. (−) Count the symmetric 1 , 2-lists with sum n (like 1221). (Alladi–Hoggatt [1975])
2.1.6. (−) A club grows as follows: at time 0 it has one man and no woman. At time t each
man selects one woman to join, and each woman selects one man and one woman to join.
What is the size of the club at time n, assuming that people never die?
2.1.7. (−) Let ⟨a⟩ satisfy an = an−1 + an−2 + an−3 for n > 3. Prove that an ≤ 2 n−2 for n ≥ 2
if ai = 1 for i ∈ {1 , 2 , 3}, and an < 2 n if ai = i for i ∈ {1 , 2 , 3}.
2.1.8. (−) Let an ,¾ = (2n
2¾
)/(¾n). Use the formula for the binomial coefficients to compute
an ,¾ recursively in terms of an ,¾−1 and in terms of an−1 ,¾ , including initial conditions.
2.1.9. (−) Let Dn be the number of derangements of [n], and let En be the number of per-
mutations of [n] having exactly one fixed point. Compute Dn − En as a function of n.
2.1.10. An arc diagram consists of a binary n-tuple plus arcs joining some pairs of posi-
tions. The arcs can only join positions with opposite values, and each position is the left
element of at most one arc. Below is an arc diagram of length 9. Determine the number
of arc diagrams of length n. (Callan [2008])
• • • • • • • • •
0 1 1 0 1 0 1 1 0
2.1.11. Fix r ∈ . Let an be the number of outcomes of n coin flips (in order) that contain
exactly r heads. Obtain a recurrence relation (in one variable!) for ⟨a⟩.
2.1.12. Let an count the binary n-tuples not having 0 , 1 , 1 consecutively. Find a system
of recurrences for an (see Example 2.1.12), and reduce it to a single recurrence for ⟨a⟩.
2.1.13. (♦) A Schröder n-path is a path from (0 , 0) to (2n , 0) in the first quadrant by steps
in {(1 , 1) , (2 , 0) ,(1 , −1)}. An uprun is a maximal upward segment; the example below has
two. One n-path has no uprun, and one has n. Let an and bn count the Schröder n-paths
having one uprun and n − 1 upruns, respectively (⟨a⟩ begins 0 , 1 , 4 , 11 , . . ., and ⟨b⟩ begins
0 , 1 , 4 , 9 , . . .). Derive first-order recurrence relations for ⟨a⟩ and for ⟨b⟩. (Deutsch [2004b])
•
• • • • •
• • •
2.1.14. For n ≥ 1, let an be the number of binary (n − 1)-tuples with no consecutive 1s.
Give two proofs that an = F̂ n , as follows.
(a) Show that ⟨a⟩ satisfies the same recurrence and initial conditions as F̂ n .
(b) Establish a bijection from the set of binary (n − 1)-tuples with no consecutive 1s to
the set of 1 , 2-lists with sum n.
60 Chapter 2: Recurrence Relations
2.1.15. Two adjacent panes of glass produce multiple images because some light reflects
each time a surface is encountered. Let an be the number of ways an image can reflect n
times from inner surfaces before emerging. As shown below, a0 = 1, a1 = 2, a2 = 3. Obtain
a recurrence relation for an . (Moser [1963])
0 reflections 1 reflection 2 reflections
2.1.16. For n ≥ 5, consider the digraph formed from n points around a circle by adding
an edge from each point to the next point and to the point after that. Count the cycles
(as subgraphs) in the digraph (cycles must follow arrows). In particular, when n = 5 the
answer is 12. (Juvan–Mohar–Škrekovski [1998b])
• •
• •
• •
• •
2.1.18. Give inductive and combinatorial proofs of (a). Use it to prove (b).
n 2n−1
2.1.19. (♦) Prove that the classical Fibonacci number F n counts the compositions of n using
odd parts and the compositions of n + 1 using parts greater than 1.
2.1.20. (♦) Cassini’s Identity. Prove F̂ n2 = F̂ n−1 F̂ n+1 + (−1)n for n ≥ 1, both induc-
tively and combinatorially. (Comment: For classical Fibonacci numbers, this is F m 2
=
F m−1 F m+1 +(−1)m−1 , proved by Cassini in 1680). Use the identity to explain Lewis Carroll’s
“proof ” of 64 = 65 (and larger analogues). (Weaver [1938])
2.1.21. (♦) For m , n ∈ 0 with m ≥ n, prove F̂ n F̂ m − F̂ n−1 F̂ m+1 = (−1)n F̂ m− n inductively
and combinatorially. (Comment: This identity generalizes Cassini’s Identity. When rein-
dexed and written using classical Fibonacci numbers as F n+1 F m − F n F m+1 = (−1)n F m− n , it
is known as d’Ocagne’s Identity.)
Exercises for Section 2.1 61
2.1.22. (♦) Prove bijectively that F̂ m+ n = F̂ m F̂ n + F̂ m−1 F̂ n−1 . Conclude for ¾ ∈ that F̂ n−1
divides F̂ ¾n−1 , and hence F n divides F ¾n .
2.1.23. For classical Fibonacci numbers, Exercise 2.1.22 says F m+ n+1 = F m+1 F n+1 + F m F n .
Use this and Cassini’s Identity (Exercise 2.1.20) to prove Catalan’s Identity for a < b:
F b2 − F b− a F b+ a = (−1)b− a F a2 . (Comment: See Melham–Shannon [1995] and Rao [1953].)
2.1.24. (♦) Vajda’s Identity. Consider r, s , t ∈ with r < s.
(a) Give a combinatorial proof of F̂ r F̂ s−1 − F̂ r−1 F̂ s = (−1)r F̂ s−r−1 .
(b) Give a combinatorial proof of F̂ r+ t F̂ s − F̂ r F̂ s+ t = (−1)r−1 F̂ t−1 F̂ s−r−1 .
(c) For classical Fibonacci numbers, conclude Vajda’s Identity for i , j , n ∈ :
F n+i F n+ j − F n F n+i+ j = (−1)n F i F j .
(Comment: This is a common generalization of d’Ocagne’s Identity and Catalan’s Iden-
tity; see Basin–Hoggatt [1963]. It was attributed by Dickson to Tagiuri [1900] and was
rediscovered in Everman–Danese–Venkannayah [1960].)
2.1.25. Extend classical Fibonacci numbers to negative indices via the recurrence. Prove
F− n = (−1)n−1 F n for n ∈ . (Graham–Knuth–Patashnik [1989, p. 279])
2.1.26. (♦) Prove that every positive integer has a unique expression as the sum of a set of
nonconsecutive Fibonacci numbers (1 and 2 cannot both be used). (Lekkerkerker [1952],
Zeckendorf [1972])
2.1.27. The Lucas numbers ⟨L⟩ satisfy the Fibonacci recurrence with L1 = 1 and L2 = 3.
Prove Ln = F n−1 + F n+1 . Conclude Ln = F 2n/F n .
2.1.28. Let an count the circular lists of n bits with no consecutive 1s (rotations are dis-
tinct , so a2 = 3 and a3 = 4). Compute an using Fibonacci numbers.
2.1.29. For n , d ∈ with d ≤ n, determine the number of partitions of [n] into arithmetic
progressions all having constant difference d and having length at least 1. Do the same
for length at least 2. (Getz–Jones [2003])
2.1.30. For n ∈ , let an = ∑¾=1 ¾ 21n−¾ , let bn = ∑¾=1 [¾ (¾n)]−1 , and let cn = 2− n+1 ∑¾ odd (¾n) 1¾ ,
n n
(b) Let bn count the partitions of the vertices into up/right lattice paths (b2 = 9, shown
n−1
below). Prove bn = ∏ j =1 F̂ 22 j +1 . (Stanley [1992] gives a more general result.)
• • • • • • • • • • • • • • • • • •
• • • • • • • • • • • • • • • • • •
2.1.32. (+) Consider cards labeled 1 through n in some order. If the top card is m, we
reverse the order of the first m cards. The process stops only when card 1 is at the top.
Prove that the process must stop. Let an be the maximum (over all initial orderings) of the
number of steps in the process. Prove an < F̂ n . (Hint: Prove that if ¾ distinct cards appear
at the top during the process, then there are at most F̂ ¾ − 1 steps.) (Knuth)
62 Chapter 2: Recurrence Relations
2.1.33. Generalized Fibonacci. Let an+1 = an + an−1 for n ≥ 3, with a1 and a2 fixed.
(a) Determine T so that an+2 an + (−1)n T = a2n+1 for all n ∈ . (Comment: T is the
only x such that an+2 an + (−1)n x is always square.) (Horadam [1961], Kantrowitz [1986])
(b) Prove an+1 = F n−1 a1 + F n a2 for n ≥ 2, using the classical Fibonacci numbers.
(t)
2.1.34. The Fibonacci numbers of order t are defined by F n = 2 n−1 if 1 ≤ n ≤ t, and
(t) (t) (t)
F n = ∑ j =1 F n− j . The binomial coefficient of order t, Cn ,¾ , counts the n-tuples with entries
t
2.1.36. Given c1 , . . . , c¾ ∈ , define ⟨a⟩ by an = ∑¾i=1 an−c i for n > 0, with a0 = 1 and an =
¾ ¾
0 for n < 0. Prove an = ∑(∑i=1 mi)!/ ∏i=1 mi !, where the sum runs over all nonnegative
¾
m1 , . . . , m¾ such that ∑i=1 ci mi = n. (Barra [2000])
2.1.37. Fix ¾ ∈ and let bn , j = n j (¾j ). Prove bn , j = ∑i=0 (¾j −−ii)bn−1 ,i . Give both a combina-
j
Process, after Moessner [1951]. Proofs appear in Perron [1951], Long [1966, 1982], and
Bender–Kochman–West [1990], generalized in Paasche [1956] and Long [1986].)
2.1.39. (+) Let a0 ,0 = 1, and let am ,n = 0 when m < 0 or n < 0. For m , n ∈ , let
am ,n−1 + am−1 ,n if m + n is even,
am ,n = {
am ,n−1 + 2am−1 ,n if m + n is odd.
By a combinatorial argument , obtain a summation for an ,n and prove that it equals the
central Delannoy number d n ,n . (Sulanke [2001])
2.1.40. Use the formula n! = ∑¾=0 (¾n) Dn−¾ of Example 2.1.6 to obtain the recurrence
n
2.1.41. (♦) Let d(n , ¾) count the derangements of [n] with ¾ cycles. Derive a recurrence.
2.1.42. Let Do(n) and De(n) be the numbers of derangements of [n] having an odd or an
even number of cycles, respectively. Compute Do(n) − De(n). (Stathopoulos [2012])
2.1.43. Determine the number of permutations of [n] that are derangements satisfying
the increase condition (i + 1) ≤ (i) + 1 for 1 ≤ i ≤ n − 1. (Deutsch [2001a])
Exercises for Section 2.1 63
2.1.44. (♦) Let A n be the set of permutations of [n] such that position i does not have ele-
ment i + 1, for 1 ≤ i ≤ n − 1. Let Bn be the set of those in which no element is followed imme-
diately by the next larger element. Thus A3 = {123 , 312 , 321} and B3 = {132 , 213 , 321}.
(a) Prove | A n| = Dn + Dn−1 for all n, where Dn is the number of derangements of [n].
(Hint: Consider the position of the element 1.)
(b) Obtain a second-order recurrence for | Bn | , and use it to conclude | Bn| = Dn + Dn−1
(Hint: Consider how the element n is used.)
(Comment: Thus | A n| = | Bn| ; a bijective proof is requested in Exercise 3.1.27.)
¾ min{n ,¾}
¾ ¾ ¾ + n− j
∑ ( ) D¾+n− j = ¾ !
j ∑ ( )(
j ¾
) Dn− j (Callan [1998])
j =0 j =0
2.1.47. (♦) Prove recursively (no bijections needed) that in each case below, an is the nth
Catalan number. (Comment: In each case, one can also prove the claim bijectively by es-
tablishing a bijection from the set being counted to the set of ballot lists of length 2n.)
(a) Let an be the number of ordered trees with n + 1 vertices (see Definition 1.3.21).
The ordered trees with four vertices appear below.
• • • • •
• • • • • • • • •
• • • • •
•
(b) Let an be the number of noncrossing pairings of 2n points on a circle. The non-
crossing pairings of six points appear below.
• • • • • • • • • •
• • • • • • • • • •
• • • • • • • • • •
(c) Let an be the number of configurations of pennies on a base row of n pennies, where
pennies can be added so that each one not in the base rests on two in the row immediately
below it. An example for n = 6 appears below. (Propp)
2.1.48. (♦) A stack stores numbers with only the most recent number (the top element)
accessible. A stack processes an input list as follows. Let x be the next input number (if
any), and let y be the top element of the stack (if any). Move x to the stack when x exists
and y does not or when x < y; otherwise move y to the output. Eventually all input ele-
ments move input to the stack and later to the output. A list is stack-sortable if the out-
put is in increasing order. For example, (1 , 5 , 4 , 2 , 3) is stack-sortable, but the output for
(3 , 5 , 1 , 2 , 4) is (3 , 1 , 2 , 4 , 5). Let an be the number of stack-sortable permutations of [n].
(a) Prove recursively that an is the Catalan number Cn .
(b) Prove that a list x1 , . . . , x n of distinct numbers is stack-sortable if and only if there
do not exist i , j , ¾ with i < j < ¾ such that x¾ < xi < xj .
64 Chapter 2: Recurrence Relations
2.1.49. Prove that the Catalan numbers satisfy the recurrence below.
n−1
2n 1 2n − 2 ¾
Cn = (
n
)−
2 ∑ C¾ ( n− ¾
).
¾ =0
2.1.50. (♦) Noncrossing partitions of [n]. A partition of [n] is noncrossing if there are no
a , b , c , d with a < b < c < d such that a and c are in one block and b and d are in another.
Thus (14|25|3) is crossing and (15|234) is noncrossing. Let an be the number of these.
A B A
• • •
B
C •
• • • • • • • • • •
1 2 3 4 5 1 2 3 4 5
(a) Prove recursively that an is the Catalan number Cn .
(b) Use the recurrence to obtain a bijection from noncrossing partitions of [n] to or-
dered trees with n edges (Definition 1.3.21). (Prodinger [1983])
(c) From the bijection in part (b), observe that the number of noncrossing partitions of
[n] with l blocks equals the number of ordered trees with n edges and l leaves. (Comment:
The sizes of these subsets are the Narayana numbers; see Theorem 1.3.26.)
2.1.51. (♦) Let an count the partitions of 3n points on a circle into n nonintersecting tri-
angles. Let bn count the lists of 2n 1s and n 0s such that every prefix has at least twice as
many 1s as 0s (2-ballot lists; Definition 1.3.18). Prove an = bn by showing that the satisfy
the same recurrence. (Comment: By Corollary 1.3.19, bn = 2n1+1 (3n n)
.)
2.1.52. (♦) A positive lattice walk in n starts at the origin, at each step changes one
coordinate by 1, and visits no point with last coordinate negative. Vertices and edges may
repeat. Let an be the number of such walks of length n in 2 ending on the horizontal axis.
(a) Obtain a recurrence for ⟨a⟩. Show that an is the Catalan number Cn+1 .
(b) Let wn be the total number of positive lattice walks of length n in 2 . Use part (a)
to obtain a recurrence for ⟨w⟩, and conclude wn = (2nn+1 ). (Guy [2000])
(c) Use part (b) to show that the total number of positive lattice walks of length n in
three dimensions is ∑¾=0 (¾n)(2¾¾+1 )2 n−¾ .
n
(Comment: Exercise 1.3.34 obtains another formula for wn . It and part (b) provide a
¾
combinatorial proof of ∑¾=0 (¾n)(⌈¾/2⌉ )2 n−¾ = (2nn+1). For the corresponding problem in three
n
¾
dimensions, part (c) and Exercise 1.3.34 yield ∑¾=0 (n¾)(⌈¾/2⌉ )4n−¾ = ∑¾=0 (¾n)(2¾¾+1 )2 n−¾ .)
n n
2.1.53. (+) Let Sn count the paths from (0 , 0) to (n , n) that never rise above y = x and use
steps in {(0 , 1) , (1 , 0) , (1 , 1)}. Note that (S0 , S1 , S2 , S3) = (1 , 2 , 6 , 22).
(a) Prove that Sn is divisible by 3 when n is positive and even. (Shapiro–Rogers [1989])
(b) Prove an = 6an−1 − an−2 − 2Sn−1 for n ≥ 2, where an is the nth central Delannoy
number d n ,n (see Definition 1.2.8). (Peart–Woan [2002])
(Comment: Sn is the nth “large” Schröder number (there are also “small” ones),
named for Ernst Schröder (1841–1902) after Schröder [1870]. These numbers satisfy
(n + 1)Sn = 3(2n − 1)Sn−1 − (n − 2)Sn−2 for n ≥ 2; Sulanke [1998] gave a bijective proof.
Also nan = 3(2n − 1)an−1 − (n − 1)an−2 for the Delannoy numbers.)
2.1.54. (♦) Shapiro n-paths are lattice paths from (0 , 0) to (2n , 2n) avoiding the odd
points (2i − 1 , 2i − 1) on the diagonal; let Sn be the number of these. Prove Sn = C2n .
2.1.55. (♦) A Dyck n-path is a path from (0 , 0) to (2n , 0) using steps that move by (1 , 1)
or (1 , −1) without falling below the x-axis. Show that the number of Dyck (2n)-paths that
avoid {(4 ¾ , 0): 1 ≤ ¾ ≤ n − 1} is twice the number of Dyck (2n − 1)-paths. (Callan [2003b])
Exercises for Section 2.1 65
2.1.56. Two teams play until one wins n games. Team A has probability p of winning any
game, independently. Let q = 1 − p. Let an be the expected number of games played.
n−1
(a) Prove an = n ∑¾=0 (n+¾ ¾ )(pn q¾ + p¾ qn).
n−1 2¾
(b) Prove an = n ∑¾=0 C¾ (pq)¾ , where C¾ = ¾ +1 ( ¾ ) .
1
(Shapiro–Hamilton [1993])
2.1.57. (♦) An up-down permutation alternates ascents and descents, an ascent first.
Let an be the number of up-down permutations of [n]; note (a0 , . . . , a4) = (1 , 1 , 1 , 2 , 5).
Let bn be the number of equivalence classes of permutations of [n] under “low-flip” oper-
ations that reverse x1 , . . . , x¾ if ¾ = n or if x¾+1 > max{x1 , . . . , x¾ }; two permutations
are equivalent if low-flips can turn one into the other. Prove an = bn for n ≥ 0. (Knuth
[2009]) (Comment: These are called secant-and-tangent numbers; see Lehmer [1935],
Knuth–Buckholtz [1967], Riordan [1968], Comtet [1970, 1974], Gould [1972], etc.)
n−1
2.1.58. For n ∈ , let T¾ (n) be the coefficient of (−1)¾ x n−¾ in the expansion of ∏i=0 (x − i).
(a) Give a combinatorial proof that T¾ (n) = T¾(n − 1) + (n − 1)T¾−1 (n − 1).
n−1
(b) Prove T¾(n) = ∑i=¾ iT¾−1 (i) for ¾ ≥ 1.
(c) Compute simple formulas for T¾(n) when ¾ ∈ {0 , 1 , 2}.
(d) Prove that T¾ is a polynomial of degree 2 ¾ .
2.1.59. Let the graph G n be the path ⟨x1 , . . . , x n ⟩ plus one vertex adjacent to all xi (shown
below for n = 5). Let an be the number of spanning trees in G n .
(a) Obtain a many-term recurrence for ⟨a⟩.
(b) Obtain a second-order recurrence for ⟨a⟩.
(c) Prove an = F 2n , where F ¾ is the ¾ th classical Fibonacci number.
• • • • •
(Comment: Relations for Fibonacci/Lucas numbers and counts of spanning trees in special
graphs have been studied in Sedláček [1970], Hilton [1972], Fielder [1974], Myers [1975],
Shannon [1978], Mikola [1980], and Exercises 60–61.)
2.1.60. A ¾-tree is a graph obtained from a complete graph with ¾ vertices by iteratively
adding a new vertex whose neighbors induce a complete graph with ¾ vertices. For ex-
ample, ordinary trees are 1-trees, and the graphs in Exercise 2.1.59 are 2-trees. A vertex
with degree ¾ in a ¾-tree is called a simplicial vertex. Prove that all n-vertex 2-trees hav-
ing exactly two simplicial vertices have the same number of spanning trees (this includes
the graphs in Exercise 2.1.59). (Comment: In fact , these 2-trees are the n-vertex 2-trees
with the most spanning trees.) (Xiao–Zhao [2013])
2.1.61. Form a graph G n from two n-vertex paths by making corresponding vertices adja-
cent as shown. Obtain a second-order recurrence for the number of spanning trees.
• • ··· • •
• • ··· • •
2.1.62. Let G be a graph with m spanning trees. Let G be the graph obtained by replac-
ing each edge of G with ¾ copies of that edge. Let G be the graph obtained by replacing
each edge uv ∈ E(G) with a u , v-path of length ¾ through ¾ − 1 new vertices. Determine
Ì(G ) and Ì(G ) in terms of m, ¾ , and Ì(G).
66 Chapter 2: Recurrence Relations
2.1.63. Let an be the number of domino tilings of a 4-by-n rectangle. Obtain a bounded-
order recurrence for ⟨a⟩. (Rymer [1979], Zhou [2005])
2.1.64. (♦) A Summation Identity for permutations. As in Example 2.1.9, let c(n , ¾) be the
number of permutations of [n] with ¾ cycles. For m ≥ ¾ , prove ∑ j =0 c(jj ,!¾) = c(m+m!
1 ,¾ +1)
m
.
(Hint: After multiplying by m!, there is both a direct bijective proof and an inductive proof
using a known identity.
2.1.65. Gambler’s Ruin. Player A starts with $r, B with $s. They flip a fair coin until one
goes broke. On a head, A pays B $1; on a tail, B pays A $1. (Kraitchik [1942])
(a) Prove that the probability of A winning is r+r s .
(b) Prove that the expected number of flips until the game ends is rs.
2.1.66. (+) A random walk starts at 0. On each step, it moves up or down by 1, each with
probability .5 (independent of earlier steps). Compute the expected number of steps until
the first time the walk is ¾ steps below the highest value it has reached. (Hint: Find a
recurrence for the expected number.) (Palacios [2012])
2.1.67. (+) The gambler and the devil play with n red balls and n + 1 blue balls. The
gambler starts with one unit of money (infinitely divisible). At each round, the gambler
bets some money (maybe 0), and the devil picks a remaining ball. When the ball is red,
the gambler loses the bet; when blue, the gambler gains that amount. The selected ball
is discarded. The gambler wants to maximize his money at the end, while the devil wants
to minimize it. If both play optimally, how much does the gambler end with? (Hint: Solve
the more general problem with r red balls and b blue balls.) (Pudaite [2000])
2.1.68. Compute det M , where M is the n-by-n matrix whose first row and column is all
1, and otherwise mi , j = mi−1 , j + mi , j −1 + xmi−1 , j −1 . (Bacher [2001])
2.1.70. Destructive testing. When dropped from the bth floor of a building, beanbags break.
From higher floors they also break, but from lower floors they survive and can be re-used.
Let º (t , ¾) be the largest value b that can be determined with certainty when ¾ beanbags
are available and up to t tests are permitted. Prove that º (t , 1) = t and that º (t , ¾) =
º (t − 1 , ¾ − 1) + º (t − 1 , ¾) + 1 for ¾ > 1. (G. Peterson)
2.2.3. Example. For the homogeneous recurrence an = 3an−1 − 2an−2 , the char-
acteristic equation is x 2 = 3x − 2, with roots 1 and 2. Hence every sequence of the
form an = A + B2 n satisfies the recurrence.
Setting n = 0 yields a0 = A + B, and n = 1 yields a1 = A + 2B. Given
the values for a0 and a1 as initial conditions, the system of two linear equations
determines A and B to complete the solution.
2.2.4. Example. The Fibonacci recurrence F̂ n = F̂ n−√1 + F̂ n−2 has the character-
√
istic equation x 2 − x − 1 = 0, with roots 1 = (1 + 5)/2 and 2 = (1 − 5)/2.
Requiring F̂0 = F̂1 = 1 in the general solution F̂ n = A1n + B2n yields 1 = A + B
and 1 = A1 + B2 . The solution is
68 Chapter 2: Recurrence Relations
√ n+1 √ n+1
1 ⎛1 + 5⎞ 1 ⎛1 − 5⎞
F̂ n = √ − √ .
5⎝ 2 ⎠ 5⎝ 2 ⎠
Lemma 2.2.5 suggests that the method used above finds all the solutions,
when the characteristic roots are distinct.
The next theorem finds the missing solutions. “General Solution” means that
all sequences satisfying the recurrence are described; a specific sequence arises
by choosing coefficients in the polynomials Pi to satisfy the initial conditions.
by x n−¾ yields
r
x n − c1 x n−1 − · · · − c¾ x n−¾ = x n−¾ ∏(x − i)
di
.
i=1
Section 2.2: Elementary Solution Methods 69
Using the product rule to differentiate the right side retains (x − i)d i −1 as a fac-
tor in each term. More generally, differentiating j times when j < d i retains
(x − i)d i − j as a factor in each term on the right; so the value at x = i remains 0.
Differentiating j times on the left, multiplying both sides by x j , and then setting
x = i yields
n−1 n−¾
n(j) n
i − c1 (n − 1)(j) i − · · · − c¾ (n − )(j) i =0.
Therefore, setting an = n(j) ni is a solution. Note that the falling factorial n(j) is a
polynomial in n of degree j . Every polynomial with degree less than d i is a linear
combination of {n(0) , . . . , n(di−1)}. Hence an = Pi(n) ni is a solution whenever Pi is
a polynomial of degree less than d i (Pi may have complex coefficients).
By linearity, every linear combination of such solutions from distinct roots is
also a solution. By Lemma 2.2.5, the set of sequences satisfying the recurrence
is a vector space of dimension . In the expression for the solution, there are
parameters (the coefficients in the polynomials). For a finite set of distinct pairs
( , r), Exercise 20 shows that the sequences defined by setting an = nr n are in-
dependent. Hence we have described a -dimensional space of solutions, which
consists of all solutions of the recurrence.
A direct proof that the sequences of the form nr n are independent involves
the Vandermonde determinant, which we have not derived. An alternative proof
using only the dimension of vector spaces will follow from Theorem 2.2.20.
Specifying initial conditions determines one sequence and hence the coef-
ficients of the polynomials P1 , . . . , Pr in the general solution. To find it, we use
the initial conditions to impose linear equations on the unknown coefficients.
For 0 ≤ i < , set n = i in the formula for an and equate this to the given value
ai . The system is uniquely solvable because the space of sequences (1) satisfying
the recurrence and (2) specified by the general solution are the same.
2.2.8. Example. Consider the recurrence an = 2an−1 − 2an−2 + 2an−3 − an−4 for
n ≥ 4, with (a0 , a1 , a2 , a3) = (1 , 3 , 5 , 5). The characteristic equation is x4 − 2x3 +
2x 2 − 2x + 1 = 0, which factors as (x2 + 1)(x − 1)2 = 0. The characteristic roots
are i , −i , 1 , 1. Thus the general solution is
an = A1 in + A2(−i)n + A3 1 n + A4 n1 n .
To determine these coefficients, we invoke the initial conditions:
n = 0: 1= A1 + A2 + A3
n = 1: 3 = i A1 − i A2 + A3 + A4
n = 2: 5 = − A1 − A2 + A3 + 2 A4
n = 3: 5 = −i A1 + i A2 + A3 + 3 A4
Summing the equations in pairs eliminates A1 , A2 to solve for A3 , A4 , and then
the first two yield A1 and A2 . The solution is (A1 , A2 , A3 , A4) = (−1/2 , −1/2 , 2 , 1),
which yields an = n + 2 − (in + (−i)n)/2.
In this problem, n rings on a peg must move to another peg, with a third peg
available as workspace. No ring can be placed upon a smaller ring. Let an be the
minimum number of steps needed to move the pile. The bottom ring can move
to the desired peg only when we have moved the rings above it to the third peg,
and then after moving the bottom ring we must move the other rings on top of
it. Thus an = 2an−1 + 1. It takes no steps to move no rings. The value more than
doubles with each increase in n, so the growth is exponential. This is a linear
first-order recurrence.
Lucas popularized this problem using the legend of the Tower of Benares:
monks were moving a pile of 64 heavy golden disks according to these rules, and
the world would end when they finished. In fact, there was no such legend; Lucas
made it up! (Singmaster [1998, p. 581]). An early solution is in Ball [1892].
Dozens of papers have studied variations on this problem, such as starting
from an arbitrary configuration of the disks, moving disks only cyclically, finding
the minimum number of moves when p pegs are available, etc. A discussion of
work on the p-peg problem appears in K lavžar–Milutinović–Petr [2002].
In the 3-peg recurrence, each value roughly twice the previous value, the so-
lution should be close to 2 n . In fact, with a0 = 0, it follows by induction that
setting an = 2 n − 1 solves the recurrence. Proof by induction works only when we
already know the answer. If not given the formula 2 n − 1, how can we find it?
¾
2.2.11. Theorem. Let R denote the recurrence an = ( ∑i=1 ci an−i) + F(n) n for
n ≥ , where F is a polynomial of degree d. If has multiplicity r as a char-
acteristic root of the homogeneous recurrence obtained by setting F(n) = 0
(r may be 0), then the recurrence has a solution of the form an = P(n)nr n ,
where P is a polynomial of degree at most d.
Proof: Since R generates a sequence from any initial conditions, particular solu-
tions exist. The key is to find a particular solution to R among the solutions of a
homogeneous recurrence S of higher order.
Let H denote the homogeneous recurrence obtained from R by eliminating the
inhomogeneous term, and let be the characteristic polynomial of H. Let S be the
homogeneous recurrence whose characteristic polynomial in x is (x − )d+1 (x).
Step 1: Every solution to R is a solution to S. From the expression for an given
by R, subtract times the expression for an−1 given by R:
¾
an − an−1 = ∑(ci an−i − ci an−i−1) + [F(n) − F(n − 1)] n
.
i=1
This new recurrence is still satisfied by ⟨a⟩, since we simply subtracted equalities
satisfied by ⟨a⟩. The recurrence has order + 1, since it relates an , . . . , an−¾−1 .
Its characteristic equation is
¾
x ¾+1 − x¾ = ∑(ci x¾+1−i − ci x¾−i)
i=1
Theorem 2.2.11 can also be proved by the generating function method (Exer-
cise 19). As remarked in the proof, we can force two polynomials to be equal by
equating the coefficients of corresponding powers or by requiring the values to be
equal at more points than the degree. The next example illustrates both methods.
2.2.12. Example. Regions among lines, again (Example 2.1.1). Let an = an−1 + n
for n ≥ 1, with a0 = 1. Using iteration, a recurrence of the form an = an−1 + (n)
has the solution an = a0 + ∑ i=1 (i). Since ∑i=1 i = (n+2 1 ), we obtain an = 1 + (n+2 1).
n n
2.2.13. Remark. The form of the inhomogeneous term in Theorem 2.2.11 seems
quite special, but the method extends to handle sums of such terms. When the in-
homogeneous term is (n) + (n), a particular solution can be found by summing
solutions obtained when the inhomogeneous term is (n) or (n) alone. This prop-
erty is called the superposition principle (see Exercise 10 and Exercise 14).
Section 2.2: Elementary Solution Methods 73
2.2.14. Definition. The generating function for a sequence ⟨a⟩ of complex num-
∞
bers is the formal power series ∑n=0 an x n ; the term is also used for any expres-
∞
sion A(x) with power series expansion ∑n=0 an x n . The coefficient operator
[x¾ ] extracts the coefficient of x ¾ in a (formal) power series in x, so [x¾ ] A(x) =
∞
a¾ when A(x) = ∑ n=0 an x n .
The word “formal” in “formal power series” indicates that x n serves not as a
number but rather as a placeholder for the coefficient an . At present we ignore
the distinction between power series and formal power series, because a Taylor
series expansion of a function (around 0) will also be its formal power series (we
return to this issue in Section 3.2).
2.2.15. Algorithm. The generating function method uses the following steps
to solve a recurrence for ⟨a⟩ (see the example below).
(1) Sum the recurrence over its “region of validity” (the values of the param-
eter where the recurrence holds) to introduce the generating function A(x) and
obtain an equation that A(x) satisfies.
(2) Solve this equation to express A(x) in terms of x.
(3) Find the formal power series expansion and set an = [x n] A(x).
2.2.16. Example. Regions among lines, yet again. Let an = an−1 + n for n ≥ 1,
with a0 = 1. Multiplying by x n and summing over n ≥ 1 yields
∑ an x n = ∑ an−1 x n + ∑ nx n .
n≥1 n≥1 n≥1
With A(x) = ∑n≥0 an x n , the first sum is missing the first term in the generat-
ing function and becomes A(x) − 1. The second needs x factored out to make the
subscript and exponent agree; it is thus x A(x).
∞
Since the geometric series yields ∑ n=0 x n = (1 − x)−1 , termwise differentiation
expresses the third sum as x dx d (1
− x)−1 . Hence our equation for A(x) becomes
A(x) − 1 = x A(x) + (1− x)2 , which simplifies to
x
1 x
A(x) = + .
1 − x (1 − x)3
Now an = [x n] ((1 − x)−1 + x(1 − x)−3 ). The first term contributes 1. For the
second term, we seek the coefficient of x n−1 in the expansion of (1 − x)−3 . We will
see in Lemma 2.2.17 that (1 − x)−3 = ∑ n=0 (n+2 2)x n . Hence the answer is an =
∞
Proof: In Theorem 1.2.5, Taylor ’s Theorem of calculus yields the power series
(1 + y)u = ∑n≥0 (un)y n , using the extended binomial coefficient. With y = −cx
and u = −¾ , we obtain (1 − cx)−¾ = ∑n≥0(−1)n(−n¾)cn x n , called the negative bi-
nomial expansion. By Definition 1.2.4, (−n¾ ) = 1
n! −¾)(n). As in Remark 1.2.6,
(
(−1)n (−n¾ ) = (¾+nn−1 ) = (n+¾−¾−1 1 ).
2.2.18. Application. We describe the general steps for applying the generating
function method to constant-coefficient linear recurrences of order ¾ ; it may be
helful to read the example below along with this.
¾
Suppose an = ∑i=1 ci an−i + (n) for n ≥ . To apply the generating function
method, we multiply by x n and sum over n with n ≥ . After factoring out ci x i ,
the term involving an−i becomes a multiple of A(x) with initial terms missing.
Moving multiples of A(x) to the left and the expressions for missing initial
¾
terms to the right yields Q(x)A(x) = P(x)+ R(x), where Q(x) = 1 − ∑ i=1 ci x¾ (a poly-
nomial), P is a polynomial arising from the initial terms, and R(x) is the formal
¾
power series for the inhomogeneous terms. Note that Q(x) = ∏i=1 (1 − i x), where
1 , . . . , ¾ are the roots of the characteristic polynomial, since Q(x) = x¾ (1/x).
How do we find R(x)? Consider the inhomogeneous term F(n)cn of Theorem
2.2.11 (with deg(F) = d), so R(x) = ∑n≥¾ F(n)cn x n . Since (n+j −j −1 1) is a polynomial
in n of degree j − 1, we can express R(x) as a linear combination of expressions of
the form (1 − cx)− j for 1 ≤ j ≤ d + 1.
We have written A(x) as P̂(x)/Q̂(x), where P̂ and Q̂ are polynomials, with Q̂(x)
inheriting a higher power of (1 − cx) from the denominator of R(x). A ratio of two
polynomials is called a rational function.
To expand a generating function A(x) that is a rational function, we first use
partial fractions to write the expression for A(x) as a linear combination of ex-
pressions of the form (1 − x)− j . We then extract [x n] A(x) by expanding these
expressions using Lemma 2.2.17.
The effect of the inhomogeneous term here explains (indeed, proves) the claim
of Theorem 2.2.11. The extra powers of (1 − cx) in the denominator produce the
same effect on the expansion (introducing cn times a higher-degree polynomial) as
the particular solution claimed in Theorem 2.2.11 (see Exercise 19).
The initial conditions determine P. The generating function method auto-
matically picks the one solution to the recurrence that satisfies the initial condi-
tions. To check for computational errors, it may be a good idea to show that the
resulting formula for an satisfies the recurrence.
Section 2.2: Elementary Solution Methods 75
The only part of the method we have not explained in detail is the partial
fraction expansion. This we illustrate before proving that it works.
1+x 4x 2 1 − x + 2x 2
A(x) = + = .
(1 − x)2 (1 − 2x)(1 − x)2 (1 − 2x)(1 − x)2
As in Example 2.2.12, there are two methods to compute the constants. Equating
coefficients yields three linear equations for {B , C, D}.
Alternatively, the Heaviside method (named for Oliver Heaviside) saves
work. It uses the fact that equal polynomials are equal at all values. To express
º (x)/∏(1 − i x) as ∑ bi/(1 − i x) when the roots are distinct, first clear fractions.
Letting x = 1/ i sets all but one term on the right to 0 and yields (1/ i) =
bi ∏j
=i(1 − j/ i). This computes bi directly. With repeated roots, the method
still computes the coefficients of the highest-power terms, and then evaluating at
other appropriate values simplifies computation of the other coefficients.
For example, setting x = 1 and x = 1/2 in (∗) yields 2 = − C and 1 = D/4.
Setting x = 0 yields 1 = B + C + D, and hence B = −1. Finally,
−1 −2 4
an = [x n] ( + + ) = −1 − 2(n + 1) + 4 · 2 n .
1 − x (1 − x)2 1 − 2x
After such a computation, it is a good idea to check that the resulting formula
agrees with the initial conditions!
√
1− 1 − 4x 1 2n
∑ an x = n
2x
, and an = ( ).
n+1 n
n≥0
n−1
Proof: Shift the index to rewrite the recurrence as an = ∑¾=0 a¾ an−1−¾ for n ≥ 1.
To apply the generating function method, multiply by x n and sum over n ≥ 1.
The left side becomes A(x) − 1, where A(x) = ∑m≥0 am x m .
∞ n−1
The right side becomes x ∑n=1 ( ∑¾=0 a¾ an−1−¾ ) x n−1 . Letting r = n − 1 writes
this as x[A(x)]2 using the formula for products of power series.
equation for A(x) is A(x) − 1 = x[A(x)]2 . By the quadratic for-
The resulting √
mula, A(x) = (1 ± 1 − 4x)/(2x). We claim that only the minus sign gives a valid
solution. By definition, the coefficient of x−1 in A(x) must be 0, so the constant
terms in the √ numerator must cancel. By the Extended Binomial Theorem (The-
orem 1.2.5), 1 − 4x = ∑¾≥0 (1/2 ¾ )(−4x) . The term for ¾ = 0 in this sum is 1;
¾
hence we must choose the negative sign to make the constants cancel.
The coefficient of x−1 is the only term affected by the 1 in the numera-
tor. Thus to compute an for n ≥ 0, we seek [x n] −21 (1 − 4x)1/2 x−1 , which equals
−1 [x n+1 ](1 − 4x)1/2 . We now have the tools to compute
2
(−1)2 n+1
n
1 1/2 1
an = − ( )(−4)n+1 = (−2)n+1 ∏ ( − i)
2 n+1 2(n + 1)! 2
i=0
(−1)2 n!n n
∏
n
i=1 (2i) ∏
n
i=1 (2i − 1) 1 2n
(n + 1)! n! ∏
= (2i − 1) = = ( ).
(n + 1)n!n! n+1 n
i=0
The generating function method is valid also with multiple indices. Fixing
one index defines a sequence of generating functions, say An(x) = ∑¾≥0 an ,¾ x¾ .
The recurrence for the coefficients yields a recurrence for this sequence. The gen-
erating function method in one variable can then yield a generating function for
the sequence of generating functions, say as B(x , y) = ∑n≥0 An(x)y n .
78 Chapter 2: Recurrence Relations
EXERCISES 2.2
To prove a formula by induction, one must already know the formula. Solutions found
non-inductively can be checked (for mistakes) using induction.
2.2.1. (−) Let ⟨a⟩ satisfy an = 2an−1 + 3an−2 for n ≥ 2.
(a) Prove that an is odd for all n ≥ 0 when a0 and a1 are odd.
(b) Solve for an in terms of a0 and a1 .
2.2.2. (−) Let ⟨a⟩ satisfy (n − 3)an = nan−1 − n2 − n for n ≥ 4, with a3 = 10. Prove an =
(n3) + 2(2n) + (1n) for n ≥ 3. Is there a simpler expression for an ?
2.2.3. (−) Let ⟨a⟩ satisfy an = an−4 for n ≥ 4. Use the characteristic equation method to
develop a single formula for an in terms of n and the initial conditions a0 , a1 , a2 , a3 .
2.2.4. (−) Let an = 3an−1 − 2an−2 + 1 for n ≥ 2, with a0 = 2 and a1 = 4. Obtain a simple
formula for an .
2.2.5. (−) At the start of each year, $100 is added to a savings account. At the end of the
year, 5% interest is added. Obtain and solve a recurrence for the account value at the end
of the nth year. The account is empty before the first year.
2.2.6. (−) A mortgage loan begins with $50,000 owed to the bank. During each year, 5%
of the unpaid loan amount is added as interest. At the end of each year, the borrower
pays $5,000. Obtain a recurrence for the unpaid amount at the end of the nth year. Use a
calculator to determine the number of years needed to pay off the mortgage. What happens
if the interest rate is 10% instead of 5%?
Exercises for Section 2.2 79
2.2.7. (−) Consider a set of n circles in the plane such that each intersects every other
(twice) and no three circles meet at a point. Obtain and solve a recurrence for the number
of regions into which the circles cut the plane.
2.2.8. (−) Let 1 , . . . , ¾ be integers, and let 1 , . . . , ¾ be real numbers. Let an =
¾
∑ i =1 i
i . Prove that if a0 , . . . , a¾ −1 are integers, then so is an for n ≥ 0.
n
2.2.9. (−) Let ⟨a⟩ satisfy an = c1 an−1 + c2 an−2 , with initial values a0 , a1 . Express the
generating function for a as a ratio of two polynomials.
2.2.10. (−) Let ⟨b⟩ and ⟨d⟩ satisfy inhomogeneous linear th-order recurrences given by
¾ ¾
an = ( ∑i=1 hi(n)an−i) + (n) and an = ( ∑i=1 hi(n)an−i) + (n), respectively. Prove that ⟨b⟩ +
¾
⟨d⟩ satisfies an = ( ∑i=1 hi(n)an−i) + (n) + (n).
2.2.11. (♦) Let an be the number of n-tuples in [4]n that have at least one 1 and have no
2 appearing before the first 1 (note that ⟨a⟩ begins 0 , 1 , 6 , . . .). Obtain and solve a recur-
rence for ⟨a⟩. Give a direct counting argument (without using summations) to prove the
resulting simple formula.
2.2.12. For m , n ∈ , let am ,n be the number of squares (of all sizes, with positive area)
formed by a grid of m horizontal and n vertical lines, given that the two sets of lines are
equally spaced by the same amount. Obtain and solve a recurrence for am ,n . Give a short
alternative argument for a different solution formula.
2.2.13. Example 2.2.12 solves a recurrence to show that the number of regions formed by
n pairwise intersecting lines in the plane is 1 + n + ( 2n) . Give a bijective counting argument
to prove this formula.
2.2.14. Solve the recurrences below, given a0 = a1 = 1.
(a) an = 4an−1 − 4an−2 − n + 6.
(b) an = 5an−1 − 6an−2 + 2n − 1 + 2 n .
2.2.15. The chords of a convex n-gon are the segments joining pairs of vertices. Let an
denote the number of pairs of chords that cross.
(a) Compute an − an−1 .
(b) Solve the recurrence relation in part (a) to obtain a formula for an . (Comment:
Exercise 1.1.21 requests a direct combinatorial argument for the answer.)
2.2.16. (♦) Choose n points on a circle so that no point inside the circle lies on three of the
(n2) chords. Let an be the number of regions formed inside the circle by the chords.
(a) Obtain the recurrence relation an = an−1 + (n) for n ≥ 1, where (n) = n − 1 +
n−1
∑i=1 (i − 1)(n − 1 − i), with initial condition a0 = 1.
(b) Solve the recurrence of part (a) to obtain a formula for an as a sum of three bino-
mial coefficients. (Hint: Avoid the characteristic equation method.)
2.2.17. Let an = n3 . Find a constant-coefficient first-order linear recurrence relation sat-
isfied by ⟨a⟩. Does there exist a homogeneous constant-coefficient higher-order linear re-
currence relation satisfied by ⟨a⟩?
¾
2.2.18. (♦) Suppose that ⟨a⟩ satisfies an = ( ∑i=1 ci an−i) + F(n) n , where F is a polynomial
of degree d. Prove that ⟨a⟩ satisfies the homogeneous recurrence whose characteristic poly-
nomial is (x − )d+1 (x), where (x) is the characteristic polynomial of the recurrence that
arises by setting F(n) = 0.
2.2.19. Use the generating function method to prove Theorem 2.2.11. That is, given the
¾
recurrence an = ( ∑i=1 ci an−i) + F(n)cn , where F is a polynomial of degree d and c has mul-
tiplicity r as a characteristic root , prove that there is a solution of the form an = P(n)nr cn ,
where P is a polynomial of degree at most d.
80 Chapter 2: Recurrence Relations
2.2.20. Given (j , ) with j ∈ 0 and ∈ , let an = n j n . The proof of Theorem 2.2.7 can
be completed by showing that for any finite set of distinct such pairs (j , ), the resulting
sequences are linearly independent in the vector space of sequences over , meaning that
no linear combination of these sequences gives the all-0 sequence.
(a) Show that in an equation of dependence, attention can be restricted to the pairs
with | | maximized, and among these to the pairs with j maximized.
(b) For 1 , . . . , m , the Vandermonde matrix is the m-by-m matrix with rs−1 in po-
sition (r, s). Its determinant is ∏i< j (j − i). Use this to complete the proof.
2.2.21. Let [x] denote the family of polynomials in x with complex coefficients. A set in
[x] is an ideal if it is closed under addition and under multiplication by any polynomial.
(a) Prove that every ideal in [x] has the form {p : p ∈ [x]} for some polynomial .
(b) Prove that if and have no common zeros, then there exist c , d ∈ [x] such
that c + d = 1. (Comment: This completes the proof of Theorem 2.2.20. Assume the
Fundamental Theorem of Algebra: every member of [x] is a product of linear factors.)
2.2.22. Prove that the Tower of Hanoi Problem with n rings (Example 2.2.9) is solved in
2 n − 1 moves as follows: On odd-indexed moves, move the smallest ring one peg rightward
(cyclically). On even-indexed moves, move a non-smallest ring. (Buneman–Levy [1980],
Walsh [1983])(Comment: The procedure is essentially unique, although there are other de-
scriptions, such as Hayes [1977], Wood [1981], Cull–Ecklund [1982], and Lavallée [1982].
In Walsh [1982], if we never move the same ring twice in a row, then it suffices to never
let two rings with indices of the same parity touch.)
2.2.23. (♦) For each recurrence below, valid for n ≥ 2 with a0 = a1 = 1, solve for an us-
ing both the characteristic equation method and the generating function method. What
changes if the initial conditions are a0 = 1 and a1 = 0?
(a) an = 3an−1 − 2an−2 + 2 n .
(b) an = 4(an−1 − an−2) + 2 n + 1.
2.2.24. Let an = 4an−1 − 5an−2 + 2an−3 + 2 n−2 for n ≥ 3, with (a0 , a1 , a2) = (1 , 2 , 7). Obtain
a simple formula for an .
2.2.26. (♦) Let an be the number of words of length n on the alphabet {0 , 1 , 2} such that
1 and 2 are never adjacent.
(a) Obtain a second-order recurrence relation for ⟨a⟩.
(b) Solve for an using both the characteristic equation method and the generating
function method.
2.2.27. The -Fibonacci numbers. Fix ∈ . Let F ¾ ,n = F ¾ ,n−1 + F ¾ ,n−2 for n ≥ 2, with
F ¾ ,0 = 0 and F ¾ ,1 = 1.
(a) Solve the recurrence to obtain a formula for F ¾ ,n .
(b) Use the formula for F ¾ ,n to obtain a simple expression for ∑i=0 (2ni+1 ) F ¾ ,2n+1 −2i .
n
2.2.28. The Fibonacci recurrence can be encoded in matrices as ( FFnn+1 ) = (11 10)( FF n ) . Use
n−1 √
this expression and matrix eigenvalues to prove F n = √1 ( n
− n),
where 1 = (1 + 5)/2
√ 5 1 2
¾
2.2.29. (♦) Characteristic roots from eigenvalues. Let ⟨a⟩ satisfy an = ∑i=1 ci an−i .
(a) Express (an , . . . , an−¾+1 )T in terms of (an−1 , . . . , an−¾)T using a matrix A.
(b) Derive the relationship between the roots of the characteristic polynomial of the
recurrence and the eigenvalues of A (with proof).
(c) Use A to determine limn→∞ an/an−1 .
2.2.30. (♦) Given an = 2an−1 + an−2 for n ≥ 2, with a0 = 1 and a1 = 2, use the generating
function method to prove that an = ∑ (i+i! jj +!¾¾!)! , summed over all nonnegative integer triples
(i , j , ¾) such that i + j + 2 ¾ = n. (Comment: This is again the Pell sequence obtained
combinatorially in Exercise 2.1.35.)
2.2.31. Let an ,¾ be the number of compositions of n with ¾ parts. Derive a recurrence and
use the generating function method to obtain ∑ n ,¾≥0 an ,¾ x n y ¾ and compute an ,¾ .
2.2.32. (♦) Let bn ,¾ be the number of ¾-subsets of [n] having no two consecutive integers.
(a) Obtain a recurrence relation in two indices for these numbers.
(b) Use the generating function method in two variables to compute bn ,¾ . (Hint: Fol-
low Example 2.2.23. Let B¾(x) = ∑n≥0 bn ,¾ x n , and use the recurrence of part (a) to obtain
a recurrence for this sequence of generating functions.)
2.2.33. (♦) Let an ,¾ be the number of ways to partition [n] into ¾ sets so that no two con-
secutive numbers are in the same set. (“Partition” means that the ¾ sets are nonempty
and unlabeled; for example, an ,2 = 1.) Define bn ,¾ similarly, except that for bn ,¾ also n is
forbidden to be in the same set with 1; for example bn ,2 is 1 if n is even, but 0 if n is odd.
(a) Obtain a recurrence relation for an ,¾ .
∞
(b) Let A¾(x) = ∑n=0 an ,¾ x n . Use the generating function method to express A¾(x) as
a ratio of polynomials.
(c) Obtain a recurrence for bn ,¾ involving the number an ,¾ . Use this and part (b) to
∞
express ∑n=0 bn ,¾ x n as a ratio of polynomials. (Knuth [2005])
2.2.34. (♦) The Delannoy numbers satisfy d m ,n = d m ,n−1 + d m−1 ,n−1 + d m−1 ,n for m , n ≥
1, with d m ,0 = d0 ,n = 1 for m , n ≥ 0. Find the generating function ∑ m≥0 ∑n≥0 d m ,n x m y n .
Using a clever factorization of the denominator, prove that d m ,n = ∑¾ 2 ¾ (m
¾ )(¾ ).
n
(Hint: Let
(1 − x) and (1 − y) be factors of the denominator. Comment: The combination of Proposition
1.2.10 and Theorem 1.2.13 yields this formula combinatorially.) (Callan [2003c])
2.2.35. (♦) A row of n lightbulbs, initially all off, must be turned on. Bulb 1 can be turned
on or off at any time. For i > 1, bulb i can be turned on or off only when bulb i − 1 is on and
all earlier bulbs are off. Let an be the number of steps needed to turn all on; note that ⟨a⟩
begins (0 , 1 , 2 , 5 , . . .). Let bn be the number of steps to turn on bulb n for the first time.
(a) Find a recurrence for ⟨b⟩ and solve it.
(b) Use ⟨b⟩ to find a recurrence for ⟨a⟩. (Tucker)
(c) Solve the recurrence for ⟨a⟩.
2.2.36. Let an be the number of domino tilings of [0 , 2n] × [0 , 4] in which dominos do not
cross the n − 1 vertical cuts from (2i , 2) to (2i , 4) shown as heavy lines below.
(a) Obtain and solve a second-order recurrence for ⟨a⟩. (Hint: It may be easiest to first
obtain a system of recurrences for ⟨a⟩ and another sequence ⟨b⟩.)
(b) Let C(m , j) be the set of nonnegative integer vectors (x0 , . . . , x j ) with sum m. Prove
¾
an = ∑¾=0 2 n−¾ ∑ x∈ C(n−¾ ,¾) ∏i=0 F̂ 2xi . (Tauraso [2006])
n
82 Chapter 2: Recurrence Relations
2.2.37. (+) Let an count the ways to add noncrossing chords to a fixed convex (n + 2)-gon.
The empty set is allowed, so (a0 , a1 , a2 , a3) = (1 , 1 , 3 , 11). Find a recurrence and obtain
the generating function for ⟨a⟩. (Schröder [1870], Stanley [1971])
2.2.38. (♦) Touchard’s Formula (Shapiro [1976]). Given n points on a circle, let t n count
the ways to pair some by noncrossing chords and color the others red or blue. (Given n
politicians at a circular table, those not in the red party or blue party are shaking hands
in a noncrossing pairing; n need not be even.)
(a) Show that t n = ∑¾≥0 (2n¾)2 n−2¾ C¾ , where Cn = n+1 1 (2n
n)
.
(b) Find a recurrence for t n , and use it to obtain ∑ t n x n .
(c) From parts (a) and (b), prove that Cn+1 = ∑¾≥0 (2n¾ )2 n−2¾ C¾ .
2.2.39. Let L be the L-shaped region of area 3 obtained from [0 , 2] × [0 , 2] by deleting
[1 , 2] × [1 , 2]. Let an count the ways to cut a 4-by-n rectangle into unit squares and unro-
tated translations of L. Express ∑ an x n as a ratio of two polynomials. (Deutsch [2001])
√
2.2.40. (+) Let á = (1 + á2 = á + 1. Let º (1) = 1, and for n ≥ 1 let
5)/2; note that
º (n + 1) = { ºº (n) + 2 if º (º (n) − n + 1) = n
(n) + 1 otherwise
Prove º (n) = ⌊ án⌋ , and determine when º (º (n) − n + 1)
= n. (Doster [1990])
The initial condition for ⟨b⟩ is b1 = a1 − a0 = −1. The recurrence then yields
bn = (−1)n/n!. Using the value of a0 and the solution for b¾ ,
n n
(−1)¾ (−1)¾
an = 1 + ∑ =∑ .
¾! ¾!
¾ =1 ¾ =0
The sum ∑¾=0(−1)¾/¾ ! is a partial sum of the series ∑¾≥0 x¾/¾ ! at x = −1. As
n
n grows, the probability of avoiding fixed points rapidly approaches the constant
e−1 , where e denotes the base of the natural logarithm. Other derivations of the
formula appear in Exercise 4, Corollary 3.3.17, and Theorem 4.1.13.
Substitutions can involve some guesswork. The principle of reducing to a
simpler recurrence can suggest helpful substitutions.
ASYMPTOTIC AN ALYSIS
Asymptotic analysis first seeks the most extreme behavior. This may be facto-
rial growth (or worse). Next is exponential behavior and then perhaps polynomial.
Finding substitutions to extract the extreme behavior may take some cleverness.
To avoid guessing, we make substitutions with parameters and then determine
the values of the parameters that simplify the unexplained behavior.
Section 2.3: Further Topics 85
Using the exponential series on eln W yields a series for W in powers of 1/n. We
obtain W = 1 + 2n1
+ 24n
7
2 + 16n3 +· · · . This yields
3
= 12 in the expansion for cn/cn−1 .
To further refine the analysis, define d n by cn = n1/2 d n . Substituting into
the recurrence for ⟨c⟩ yields the exact recurrence d n = e(1 − 1/n)n−1/2 d n−1 . Now
we hope that d n tends√to a constant C. If so, then undoing the substitutions so
far yields n! ∼ C(n/e)n n.
To prove this, let n = ln d n ; we show that n tends to a limit. By the Mono-
tone Convergence Theorem, it suffices to show that ⟨ ⟩ is decreasing and bounded
below. The recurrence for d n yields n = n−1 + 1 + (n − 1/2) ln(1 − 1/n). Note that
b1 = a1 = 1, d1 = c1 = e, and 1 = 1. Expanding the series for ln(1 − 1/n) shows
that the product (n − 1/2) ln(1 − 1/n) is less than −1; thus ⟨ ⟩ is decreasing, and
n < 1 for n > 1. To obtain a lower bound, we compute
n n
1 1 1 1 1 1
n = 1 + ∑ [1 + ( − ) ln (1 − )] = 1 + ∑ [1 − ( − ) ( + 2 + 3 +· · ·)]
=2
2 =2
2 2 3
n n
1 1 t−1
= 1 − ∑∑( − ) −t = 1 − ∑ −t
t + 1 2t 2t(t + 1) ∑
=2 t≥2 t≥2 =2
#∞
t − 1 −1 −t+1 ####
∞
t−1 −t 1
>1−∑ d = 1 − ∑ ###
2t(t + 1) ∫1 2 t(t + 1) t − 1 ###=1
t≥2 t≥2
1 1 1 1 1 3
=1− ∑ = 1 − ∑( − )= .
2 t(t + 1) 2 t t+1 4
t≥2 t≥2
86 Chapter 2: Recurrence Relations
√ n n 1 1 139
n! = 2 n ( ) [1 + + 2
− − · · ·] .
e 12n 288n 51840n3
√
2.3.9. Theorem. (Stirling’s Formula) n! ∼ nn e−n 2 n.
Proof: Let sn = nne−n!n n1/2 . The outcome of the asymptotic analysis in Application
2.3.8 is a proof that sn tends to a constant C. To compute the constant, we use the
∞
Wallis product, which expresses /2 as an infinite product: 2 = ∏=1 22− 1 22+ 1
√
(derived in Exercise 13). We combine the exact expression n! = sn(n/e)n n and
the fact that sn tends to a limit value C to compute
n
2 2 42n(n!)4
= lim∞ ∏ = lim∞
2 n→ 2 − 1 2 + 1 n→ (2n + 1)(2n)! 2
=1
√
42n(sn(n/e)n n)4 s4n n2 C4 C2
= lim∞ √ = lim∞ = = .
n→ (2n + 1)(s2n(2n/e)2n 2n)2 n→ (2n + 1)s2 · 2n 4C 2 4
2n
√
From this we conclude C = 2 .
Dividing√by 2 n tells us that the probability of equal numbers of heads and tails is
about c/ n, where c = (2/ )1/2 . For (nn), see Exercise 14.
Without knowing Stirling ’s Formula, we can still obtain the leading (expo-
n
nential) behavior of (n/2 ). We have observed that lim x n+1/x n = L yields exponen-
tial behavior of the form Ln . More precisely, lim x n+1/x n = L implies lim x1/n
n = L
(Exercise 15). Taking the ratio of successive middle binomial coefficients yields
n
2 n as the leading behavior of (⌊n/2⌋ ).
Section 2.3: Further Topics 87
The sum over G telescopes to G(n , B + 1) − G(n , A). Summing over all ¾ yields
the desired result when lim B→∞ G(n , B) = lim A→−∞ G(n , A) = 0.
2.3.13. Example. ∑¾ (¾n) = 2 n. Of course we know this, but let us see how the
WZ method proves it. Let F(n , ¾) = (n¾ )/2 n . If we set G(n , ¾) = −(¾−n1 )/2 n+1 , then
the behavior of the binomial coefficient yields lim¾→±∞ G(n , ¾) = 0, and we need
only verify the difference condition. The check is
+1 ,¾) ,¾ −1)
The difficulty is finding G(n , ¾). When F(n F(n ,¾)
and F(n
F(n ,¾)
both are rational
functions of n and ¾ , and ∑¾ F(n , ¾) = 1, usually there exists such a function G
of the form G(n , ¾) = R(n , ¾)F(n , ¾ − 1), where R(n , ¾) is a rational function of n
and ¾ . Moreover, there is an algorithm that finds such G when it exists or proves
that it does not exist. This is the advantage of computerizing the process, along
with the fact that computers can quckly perform manipulations that humans do
not even want to try.
The computation in the example above shows that R(n , ¾) = − 12 works when
F(n , ¾) = (¾n)/2 n . To prove ∑¾ (−1)¾ (¾n)(2¾¾ )4n−¾ = (2n n
), the magic expression is
2¾ −1 (see
R(n , ¾) = 2n +1 Exercise 19). The next one looks more complicated.
To seek the expression G(n , ¾) to mate with F(n , ¾), we treat n as a param-
eter, defining () = F(n + 1 , ) − F(n , ) for fixed n and seeking () such that
( + 1) − () = () to become G(n , ). Since summation is the inverse to differ-
¾
ence, we want () = ∑ j =0 (j) if the values are defined for ≥ 0. However, we
also want () in “closed form”.
n+1 n 1 n 2¾ − n − 1
º (¾) = ( )2−n−1 − ( )2−n = ( ) .
¾ ¾ 2 n+1 ¾ n + 1 − ¾
b(¾ − 1)h(¾)
G(n , ¾) = (F(n + 1 , ¾) − F(n , ¾)) .
c(¾)
Before concluding that the WZ method solves everything, note that our dis-
cussion of the method requires advance knowledge of the value of the sum. Oth-
erwise, we wouldn’t even know the expression F(n , ¾) that starts the process!
Fortunately, there are also methods to automate finding the sum. These stem
from an algorithm in the thesis of Sister Mary Celine Fasenmyer [1946]. The ba-
sic idea is to find a recurrence satisfied by the summand and then sum it to find
a recurrence satisfied by the sum. Fasenmyer ’s algorithm automates the search
for the first recurrence when the summand belongs to an appropriate class.
Zeilberger [1982, 1990, 1991] developed faster and more general algorithms.
Petkovšek [1991] automated the search for solutions of the resulting recurrences.
The algorithms find sums of hypergeometric terms or show that the sum has no
formula of a certain type. Again, see Petkovšek–Wilf–Zeilberger [1996].
Exercises for Section 2.3 91
EXERCISES 2.3
2.3.1. (−) Use the substitution method to solve the recurrences below.
(a) an = (1 − n+1 1 )an−1 for n ≥ 1, with a0 = 1.
(b) an = 23 (1 + 3 n2+1 )an−1 for n ≥ 1, with a0 = 1.
2.3.2. (−) Give the exact solution formula (for all n) for the recurrences below.
(a) an = a⌈n/2⌉ + 1 for n ≥ 2, with a1 = 0.
(b) an = a⌈(n−1)/2⌉ + 1 for n ≥ 2, with a1 = 1. (Comment: This is the recurrence for the
worst-case number of probes in binary search for an element in a sorted n-element list.)
2.3.7. (♦) Finding the max and min in a set S. When | S| = 1, the one element is both
answers. When | S| = 2, compare the two numbers and return the result. When | S| > 2,
split S into sets T and T of sizes ⌊ n/2⌋ and ⌈ n/2⌉ , apply the algorithm to T and T , and
compare the answers for the two subsets. Let an be the number of comparisons used when
| S| = n. Derive a recurrence for an . Use the substitution method to obtain a formula for
an when n is a power of 2.
2.3.8. (♦) In the game “High/low” , a number is chosen uniformly at random from [n],
where n is known. The player makes a guess, winning the prize if correct. Otherwise,
she learns whether the guess is high or low. When each guess is made randomly from
the remaining possible values, the expected numbers of guesses when n ∈ {0 , 1 , 2 , 3} are
0 , 1 , 3/2 , 17/9, respectively.
The harmonic number Hn is defined by Hn = ∑¾=1 1/¾ . Obtain a formula for the
n
expected number of guesses made to win the prize, using one harmonic number in the for-
mula. (Hint: Obtain a recurrence with many terms. Simplify via natural substitutions
and reduce to a first-order recurrence.) (Taylor [1991])
2.3.9. Let n(n − 3)an = (n − 1)(n2 − 3n + 1)an−1 − (n − 2)3 an−2 for n ≥ 4, with a2 = a3 = 1.
Use substitutions to obtain a simple formula for an . (Wilf [1997])
2.3.10. Let an = an−1 + an−2/(n − 1) for n ≥ 2, with a0 = and a1 = . Find a formula for
an (one summation may appear in the formula).
2.3.11. Let an+1 = (2n + 3)an − 2nan−1 + 8n for n ≥ 1, with a0 = 1 and a1 = 3. Use
substitutions to obtain an asymptotic formula for an . (Doster [1994])
2.3.12. (♦) Continuation of Application 2.3.8 for Stirling’s Formula. Given the recurrence
d n = e(1 − 1/n)n−1/2 d n−1 , let d n = e n(1 + /n) and choose so that e n/e n−1 = 1 + O(n−3).
/2
2.3.13. (♦) Let an = ∫ (sin x)n dx for n ∈ 0 .
0
(a) Use integration by parts to prove an = n−n1 an−2 for n ≥ 2.
∞
(b) Use the sequence ⟨a⟩ to prove the Wallis product: ∏n=0 2n 2n
2n−1 2n+1
= 2.
92 Chapter 2: Recurrence Relations
¾
2.3.14. Approximations for binomial coefficients. For ¾ fixed and n growing, (¾n) ∼ n¾ ! .
−n
n ( (1 − )1− )
(a) Using Stirling ’s Formula, prove ( )≈ √ .
n (1 − )2 n
(b) An ordinary deck of cards consists of 13 cards each in four suits. A bridge hand
distributes these randomly to four players around a table, each receiving 13 cards. Oppo-
site players are partners. To the nearest power of 10, approximate the probability that
some partnership will have all 13 cards of one suit.
−)!
2.3.17. Suppose an = 2an−1 + an−2 for n ≥ 2, with a0 = 1 and a1 = 2. Let cn ,i , = i!(n(n −i−2)! !
when i, , and n − i − 2 are all nonnegative; otherwise cn ,i , = 0.
(a) Prove cn ,i , = cn−1 ,i , + cn−1 ,i−1 , + cn−2 ,i ,−1 for n ≥ 2 and all i and .
(b) Use part (a) to prove an = ∑ (i+i! jj +!!)! , summed over nonnegative integer (i , j , ) with
i + j + 2 = n. (Comment: This is again the Pell sequence.) (Stockmeyer [2000])
2.3.18. (+) An usher seats n people in a row of n narrow seats, choosing a seat for each
arrival in turn. In order to seat a new arrival, the people neighboring that seat in each
direction up to the first empty seat must stand so they can sit together at one time. For
example, if seat 4 is next filled when seats 1 , 3 , 5 , 6 , 8 are already filled, then those in seats
3 , 5 , 6 must stand so that 3 , 4 , 5 , 6 all sit together. The usher wants to minimize the total
number of seatings, counting 1 each time any person sits. Let (n) be the optimal value;
for 1 ≤ n ≤ 5, the answers are 1 , 3 , 5 , 8 , 11. In general, filling the seats in order from one
end yields (n2 + n)/2 seatings (the worst!), but the optimum is asymptotic to n log 2 n.
(a) Let (n) = (n + 1) − 2 + 1, where = ⌈ log 2(n + 1)⌉ . Prove (n) = (⌊ (n − 1)/2⌋ ) +
(⌈ (n − 1)/2⌉ ) + n.
(b) Prove that (n) − (n − 1) is a nondecreasing function of n.
(c) Prove (n) = (n) for n ∈ . (Fredman–Knuth [1974], Vanden Eynden [1991])
n 2 2n
∑(−1) ()( )4n− = ( n ) .
2.3.20. Use the WZ Method with G(n , ) = −n F(n , ) to prove that
t −1
1 t 1 t+n
∑(−1) ( )=
n+ n
(
t
) . (Wilf)
=0
(Comment: Here F(n , ) is the summand divided by the right side; ∑ F(n , ) = 1 can also
be proved using Vandermonde’s Theorem and other familiar identities.)
Chapter 3
Generating Functions
∞
In Section 2.2, we called ∑n=0 an x n the generating function for a sequence
⟨a⟩ of complex numbers. There it was just a tool for solving recurrence relations,
but generating functions have deeper combinatorial aspects. They yield system-
atic solutions for many counting problems. Often we obtain an expression for the
generating function and a formula for an directly, without using recurrences.
There are many types of generating functions (see Stanley [1986]). We have
only mentioned the ordinary generating function (OGF), useful in studying multi-
sets and selection problems. A variation called the exponential generating function
(EGF) is useful for enumeration of “labeled” structures. We will also apply OGFs
to study partitions of integers.
3.1.2. Example. Let an be the number of binary lists of length n. The gener-
∞
ating function for ⟨a⟩ is ∑n=0 2 n x n ; it is the enumerator of binary lists, indexed
by length. We say “indexed by length” because the values of the weight function
index the terms in the sequence ⟨a⟩.
Next consider ¾-subsets of an n-set. We fix one parameter to form a generat-
ing function, writing a¾ = (¾n). In A(x) = ∑¾=0 (¾n)x¾ , the coefficient of x ¾ is the
n
93
94 Chapter 3: Generating Functions
number of ¾-subsets of [n]. Thus A(x), or more properly An(x), is the enumera-
tor of subsets of [n], indexed by size. Since the coefficient of x¾ in the expansion
of (1 + x)n is (¾n), we also say that (1 + x)n is the generating function for ⟨a⟩.
In a problem with several parameters, it may not be obvious which is most
useful as the index of summation in a generating function. We can also form a
∞ ∞
generating function in two variables: ∑ n=0 ∑¾=0 an ,¾ x n y ¾ .
The importance of generating functions arises from the way they model
counting arguments using the Sum and Product Principles, based on the behav-
ior of sum and product of formal power series. This allows generating functions
to model ad hoc counting for a sequence of counting problems all at once.
∞
3.1.4. Definition. The sum and product of formal power series ∑n=0 an x n and
∞
∑n=0 bn x n are defined as follows:
∞ ∞ n
sum : ∑(an + bn)xn product : ∑(∑ aj bn− j )x n .
n=0 n=0 j =0
The convolution of two sequences ⟨a⟩ and ⟨b⟩ is the sequence of coefficients
in the product of their generating functions. The term convolution is also
n
used for a sum of the form ∑ j =0 aj bn− j .
3.1.5. Example. Multisets from two types of objects. The formal power series
∞
∑¾=0 x¾ is the enumerator by size for multisets from one type of object. There is
exactly one multiset consisting of ¾ objects of the same type. Marbles of the same
color are indistinguishable, so there is only one way to have 10 white marbles.
With two types, such as black and white marbles, there are ¾ + 1 ways to form
a multiset of size ¾ , since the first type can contribute anywhere from 0 to ¾ ob-
jects. Thus the generating function is ∑¾=0(¾ + 1)x¾ . Alternatively, to reach size
∞
¾ , the first type contributes j and the second contributes ¾ − j , for some j . Hence
∞ 2
by the definition of product the generating function also equals ( ∑¾=0 x¾ ) .
Section 3.1: Ordinary Generating Functions 95
3.1.6. Example. Two types of coins. With ¾ coins on a table, each may show heads
or tails. The number of heads can be 0 through i, so there are i + 1 distinguishable
ways to have i coins. Thus the generating function for selections of coins, indexed
∞
by the number of coins, is ∑¾=0(¾ + 1)x¾ .
Now consider coins of two values, such as nickels and dimes. A selection with
¾ coins uses j nickels and ¾ − j dimes, for some j . If we also note how many of each
show heads or tails, then we have j + 1 ways to have j nickels and ¾ − j + 1 ways to
have ¾ − j dimes, and each choice for the nickels can be paired with each choice for
the dimes. Thus the generating function for distinguishable selections of nickels
¾
and dimes, indexed by the number of coins, is ∑¾≥0 [ ∑i=0(i + 1)(¾ − i + 1)] x¾ . By
∞ 2
the rule for multiplying formal power series, this is [ ∑¾=0(¾ + 1)x¾ ] .
We described this example in this way to illustrate that the coefficients in a
factor may be other than 0 or 1. In fact, we have just discussed the enumerator for
multisets from four types: head-nickels, tail-nickels, head-dimes, and tail-dimes.
∞ 4
The generating function is ( ∑¾=0 x¾ ) .
product. Each choice of a term from each factor generates one multiset and con-
tributes 1 to the coefficient of x n , where n is the total size of the multiset.
In fact, we already know the coefficients in the generating function for mul-
tisets from n types. In Theorem 1.1.20, we proved a¾ = (¾+n−n−1 1 ). Equating the two
expressions for the OGF yields a combinatorial proof of an algebraic identity (for
each n) about formal power series:
∞
n ¾ + n−1
(1 + x + x + · · ·) = ∑ (
2
)x¾ .
n−1
¾ =0
Formal power series are specified by their coefficients; two formal power series
are equal if and only if corresponding coefficients are equal. We need convenient
notation for a specified coefficient. We repeat the definition from Chapter 2.
3.1.10. Theorem. For n ∈ , the formal power series expansion of the generating
function (1 − x)−n is
∞
¾ + n−1
(1 − x)−n = ∑ ( )x¾ .
n−1
¾ =0
∞ ∞ n
Proof: The product of (1 − x) and ∑ j =0 x j is 1, so (1 − x)n ( ∑ j =0 x j ) = 1 n = 1, and
therefore (1 − x)−n = ( ∑ j =0 x j ) . Since [x¾ ]( ∑ j =0 x j ) = (¾+n−n−1 1 ) (Example 3.1.8),
∞ n ∞ n
For ordinary subsets, the choice for each type is omission or inclusion (S =
{0 , 1}), and the generating function is (1 + x)n .
When each type must be used, we cannot select none. The enumerator is then
(x + x 2 + x3 + · · ·)n , which equals ( 1−x x )n . Thus
x n ¾ − n+ n−1 ¾−1
[ x¾ ] ( ) = [ x ¾−n ](1 − x)−n = ( )=( ),
1−x n−1 n−1
1 x3 1 − x 5 x3 − x8
[ x 20 ] = [ x20 ]
1−x1−x 1−x (1 − x)3
¾+3−1 ¾+3−1 19 14
= [ x17 ] ∑ ( )x¾ − [ x12 ] ∑ ( )x¾ = ( ) − ( ).
3−1 3−1 2 2
¾ ¾
The notion of generating function extends naturally for problems with m pa-
rameters: the coefficient of the monomial x1¾1 · · · x¾mm is the number of objects in
which the value of the ith parameter is ¾i , for all i. For example, when flip-
ping nickels and dimes in Example 3.1.6, we could define a generating function
in which the coefficient of x r y s is the number of outcomes with r coins, of which
s show heads (see Exercise 16).
98 Chapter 3: Generating Functions
∞ ∞
3.1.13. Example. Let A(x , y) = ∑n=0 ∑¾=0 an ,¾ x¾ y n with an ,¾ = (¾n). Now
∞ ∞ ∞
n 1
A(x , y) = ∑ ∑ ( )x ¾ y n = ∑(1 + x)n y n = .
¾ 1 − y − xy
n=0 ¾ =0 n=0
PERMUTATION STATISTICS
There are n! permutations of [n], but we can group them by the value of some
parameter. Such parameters are permutation statistics. Natural statistics for
permutations include number of fixed points, number of cycles, etc. These param-
eters have important roles in algebraic combinatorics and in the theory of special
functions, but here we study only the counting problems.
We use n for the set of permutations of [n]. This “blackboard” font is re-
served for important sets with special algebraic structure, such as , , , for
number systems and q for the finite field of order q. The permutations of [n] form
a “group” under composition (see Section 4.2), called the symmetric group (on
n elements). Its fundamental role makes a special font appropriate; we use for
“symmetric”. The historical notation is S in Fraktur font, which is hard to read.
It may be hard to count subsets of n explicitly. Instead, we seek a generat-
ing function indexed by the relevant parameter. Our first example illustrates the
combinatorial approach of finding a generating function by describing the choices
made in building the objects.
We used this idea in the enumeration of trees in Theorem 1.3.4. Knuth [1968]
described the bijection as “An unusual correspondence”; it also appeared in Rényi
[1962] and Foata–Schützenberger [1970]. It yields short proofs for many enumer-
ative and probabilistic problems; see Exercises 23–31. We give one example.
3.1.19. Proposition. When permutations of [n] are equally likely, the distribu-
tion of the length of the cycle containing a fixed element is uniform, with
probability 1/n for each length.
Proof: By symmetry, it suffices to prove the claim when = 1. The length of
the cycle containing 1 in a permutation is n + 1 minus the position of 1 in the
canonical cycle representation of . By Lemma 3.1.18, this position is uniformly
distributed over all n positions.
3.1.20. Theorem. Let c(n , ) be the number of elements of Ën with cycles. The
enumerator of Ën by number of cycles, Cn(x), is given by
n
Cn(x) = ∑ c(n , )x¾ = x(n) .
¾ =1
as encoding the options when inserting element i to build the canonical cycle rep-
resentation of a permutation. We insert elements in increasing order as in Propo-
sition 3.1.15, but now the choices have different effects on the index parameter.
100 Chapter 3: Generating Functions
Again the factor for inserting i is independent of the choices made for earlier
elements, so the generating function is the product of these factors.
Choosing “ x” from (x + i − 1) means starting a new (leftmost) cycle in the
representation with i as least element. This increases the number of cycles, so
the objects built with this choice contribute to a term with higher exponent. The
number i − 1 counts the ways to make i follow a smaller number j in its cycle. For
example, the permutation of Example 3.1.17 is built as below. Here (i , x) indicates
an increase in the number of cycles by inserting i as the left, while (i , j) indicates
the insertion of i following the smaller number j .
(1 , x): (1) (4 , 1): (2)(143) (7 , 4): (5)(26)(1473)
(2 , x): (2)(1) (5 , x): (5)(2)(143) (8 , x): (8)(5)(26)(1473)
(3 , 1): (2)(13) (6 , 2): (5)(26)(143) (9 , 8): (89)(5)(26)(1473)
Since i is largest when inserted, it does not change left-to-right minima un-
less it is put first. When expanding the product, the exponent on x in a term is
the number of times the choice started a new cycle.
Each permutation is counted exactly once and with the correct exponent, be-
cause there is exactly one way to reconstruct the choices from the canonical cy-
cle representation of a permutation. To reconstruct the situation when i was
inserted, we discard all elements of the canonical cycle representation that are
larger than i; their insertion does not affect the cycle structure on the first i num-
bers. Now i is first if and only if the choice was made to start a cycle with i, and
otherwise i immediately follows the element it was chosen to follow.
3.1.23. Example. The permutation 791368452 has four runs (79, 1368, 45, and
2), three descents (at 2, 6, and 8), and five ascents. For ∈ Ën , the ascent set of
is [n − 1] − D( ). When has runs, it has − 1 descents and n − ascents, and
its reverse has − 1 ascents and n − descents.
The Eulerian numbers are the subject of the first chapter of Bóna [2004],
and there is an entire book about them (Petersen [2015]). Relevant surveys in-
clude Carlitz [1958–59], Foata–Schützenberger [1970], Knuth [1973], and Char-
alambides [2002]. The most common notation now is A(n , ), though An ,¾ is also
used. Knuth [1968] used ⟨ ¾n ⟩ for A(n , ), but this notation meant A(n , + 1) in
Graham–Knuth–Patashnik [1989], letting count descents rather than runs.
The Eulerian numbers are studied in Exercises 34–43. Many of the exercises
use a natural recurrence.
We obtain a formula for A(n , ) from the next result by using an inversion
relationship for generating functions.
Proof: (Gessel) When x ∈ , the left side counts functions from [n] to [x]. To turn
these into permutations, express them as distributions of [n] into x successive
bins, with each bin ended by a vertical bar. Write the elements of each bin in
increasing order. This produces a permutation of [n] with x bars inserted. There
is a bar at the end of each run and possibly in additional locations (empty bins
produce consecutive bars). Below we show two ways of distributing [9] into 6 bins
so that the resulting permutation is 791368452.
79 | 136 | 8 || 45 | 2 | and | 79 | 13 | 68 | 45 | 2 |
102 Chapter 3: Generating Functions
Barred permutations may have appeared first in the thesis of Gessel [1977];
see also Gessel–Stanley [1978]. Bóna [2004, p. 6] gives another combinatorial
proof of Worpitzky ’s Identity. The identity is sometimes used to define the Eule-
rian numbers. It expresses the power x n in terms of the Eulerian numbers; our
goal now is to invert this relationship to obtain a formula for A(n , ¾).
Let A(x) = ∑¾=0 A(n , ¾)x¾ and B(x) = ∑¾≥0 (¾+n n)x¾ ; note that n is fixed. Wor-
n
pitzky ’s Identity says C(x) = A(x)B(x), where C(x) = ∑r≥0 r n xr . Thus A(x) =
1
B(x)
C(x). Since B(x) = (1− 1x)n+1 , we have A(x) = (1 − x)n+1 C(x). By the product rule,
¾
A(n , ¾) = [x¾ ] A(x) = ∑ i=0(−1)i (n+i 1)(¾ − i)n .
An(x). The proof above used An(x) = (1 − x)n+1 ∑¾≥0 ¾ n x¾ . Euler defined An(x) this
way. Curiously, this expression for a polynomial involves an infinite sum!
Exercises for Section 3.1 103
EXERCISES 3.1
3.1.1. (−) Use generating functions to count the distinguishable selections of six marbles
from a pile consisting of three red marbles, four white marbles, and five blue marbles.
Verify the answer by describing the selections explicitly.
3.1.2. (−) Let r1 , . . . , rn and s1 , . . . , sn be natural numbers with ri ≤ si for all i. Let a¾ be
the number of multisets of size ¾ from n types of objects such that the number ei of objects
of the ith type satisfies ri ≤ ei ≤ si . Express the generating function for ⟨a⟩ as (1 − x)− n
times a product of polynomial factors.
3.1.3. (−) A child wants to buy candy. Four types of candy have prices two cents, one cent ,
two cents, and five cents per piece, respectively. Build the enumerator by total cost for the
number of ways to buy candy.
3.1.4. (−) Let an be the number of nonnegative integer solutions to 4e1 + 2e2 + e3 + 2e4 = n.
Find the generating function for ⟨a⟩.
3.1.5. (−) Let an ,¾ be the number of permutations of [n] having ¾ inversions (Proposition
3.1.15). Obtain a recurrence relation for these numbers.
3.1.6. (−) From Worpitzky’s Identity (Theorem 3.1.25), prove
n
x+¾−1
x n = ∑ A(n , ¾)( ).
n
¾ =0
3.1.7. (−) Compute the Eulerian number A(4 , ¾) for all ¾ from the definition and from
Theorem 3.1.26. Compute the congruence class of A(p − 1 , ¾) modulo p when p is prime.
3.1.8. (♦) Let bn ,¾ be the number of ¾-subsets of [n] with no consecutive integers. Let
B¾(x) = ∑n≥0 bn ,¾ x n . Build B¾(x) using combinatorial arguments. Use known generating
function expansions to obtain a formula for bn ,¾ .
3.1.9. Sicherman dice. When rolling dice, on any die each face is equally likely to be the
outcome. Two 4-sided dice labeled (1 , 2 , 2 , 3) and (1 , 3 , 3 , 5) have the same distribution of
sums as two normal 4-sided dice labeled (1 , 2 , 3 , 4).
(a) Use generating functions to prove that no other pair of 4-sided dice in positive in-
tegers has the same sum distribution as the normal dice.
(b) (+) Determine the pairs of 6-sided dice with positive integer labels that have the
same sum distribution as two normal 6-sided dice. (Broline [1979], Gallian–Rusin [1979])
3.1.10. (♦) A coin is flipped 14 times, and three flips are tails. Use a generating function
to determine the probability that no five consecutive flips are heads.
3.1.11. In Example 3.1.6, the enumerator for distinguishable flippings of pennies, nickels,
∞
and dimes by number of coins is ( ∑¾=0(¾ + 1)x¾) . Give both an algebraic argument and a
3
direct combinatorial argument to show that the generating function equals (1 − x)−6 .
3.1.12. A meeting has five delegates from each of 100 countries. How many ways are there
to form a committee of 25 delegates using at most one person from each country? What is
the enumerator for committees with at most three people from each country, indexed by
committee size? (Note: People are distinguishable.)
3.1.13. Ten pairs of socks are washed; the two socks in a pair are indistinguishable. Some
are lost; use a generating function to count the distinguishable ways that exactly eight
socks survive. Explain why these outcomes are not equally likely when all socks are equally
likely to survive. (Comment: Extracting the desired coefficient from the generating func-
tion requires computation.)
104 Chapter 3: Generating Functions
3.1.14. (♦) Let an be the number of ways to choose r ∈ 0 , roll one six-sided die r times,
and obtain outcomes with sum n. Express the generating function for ⟨a⟩ as the ratio of
two polynomials that each have at most three terms. Obtain a recurrence for ⟨a⟩ from the
generating function. Give a direct combinatorial argument for the recurrence.
3.1.15. (♦) Given an alphabet consisting of a vowels and c consonants, let bn be the number
of words of length n not having consonants in consecutive positions. Obtain the generating
function B(x) = ∑ bn x n as the ratio of two polynomials.
3.1.16. Given t types of coins, let an ,¾ be the number of distinguishable ways to have a
multiset of n coins on a table with ¾ showing heads. Find a closed-form expression (without
summations) for the generating function ∑ n ,¾ an ,¾ x n y ¾ .
3.1.17. Let an ,¾ be the number of ways to tile a 3-by-n rectangle using unit squares and
¾ copies of L, the 2-by-2 square missing the top right 1-by-1 corner (no rotation allowed).
Build the generating function ∑n ,¾≥0 an ,¾ x n y ¾ .
3.1.20. A -colored graph is a graph with its vertices partitioned into nonempty sets
V1 , . . . , V¾ such that adjacent vertices lie in different sets. Prove that the enumerator of
-colored graphs with vertex set [n], by number of edges, is
− ∑ n2i ) ,
∑ (n1 , . . . , n¾ )(1 + x) 2 (n
1 n 1 2
!
Explain how to obtain from this the generating function indexed by number of edges.
3.1.22. Given a -set S ⊆ [n], let (S) be the permutation consisting of S in increasing
order followed by [n] − S in increasing order. Letting the -sets be equally likely, determine
the expected number of inversions in (S). (Comment: Also the variance is exactly (n + 1)/6
times the expectation, for each .) (Deshpande–Laghate [2003])
3.1.23. (♦) Compute the expected number of cycles in a random permutation of [n],
(a) by using the generating function in Theorem 3.1.20, and
(b) by using Proposition 3.1.19 and linearity of expectation (the expectation of a sum
is the sum of the expectations). (Lovász [1979, p. 25])
3.1.24. (♦) Compute the probability that a random permutation of [n] has exactly two
cycles, in two ways:
(a) by using the generating function in Theorem 3.1.20, and
(b) by considering random canonical cycle representations (see Lemma 3.1.18).
Exercises for Section 3.1 105
3.1.25. Given S ⊆ [n], compute the probability that all elements of S are in the same cycle
in a random permutation of [n].
3.1.27. (♦) For n ≥ 1, view Ën as the set of permutations of [n] in word form. Let A n =
{ ∈ Ën : i
= i + 1 for 1 ≤ i ≤ n − 1}. Let Bn = { ∈ Ën : j +1
= j + 1 for 1 ≤ j ≤ n − 1}. Use
the canonical cycle representation to prove bijectively that | A n| = | Bn |. (Comment: The
sizes of A n and Bn were computed in Exercise 2.1.44.)
3.1.28. (♦) The keys to n boxes are put randomly in the boxes, one per box. The boxes are
locked by closing them (a box may contain its own key). Find the probability that breaking
open random boxes will allow unlocking the remaining boxes. (Hint: Consider canonical
cycle representations.) (Bognár–Mogyoródi–Prékopa–Rényi–Szász [1970, p. 56])
3.1.29. (♦) The reverse canonical representation of a permutation writes each cycle
with largest element first and puts the cycles in increasing order of those first elements.
Let n : Ën → Ën take each ∈ Ën to the permutation obtained by dropping the parentheses
in this representation of . Characterize and count the fixed points of n . (Deutsch [2008])
3.1.30. Put elements of Ë2n into E2n or O2n if their cycle lengths are all even or all odd,
respectively (| E4 | = |O4 | = 9). Prove | E2n | = |O2n| , bijectively. (Schmidt [1994])
3.1.31. (♦) Let Cn(x) be the enumerator of Ën by number of cycles, with c(n , ) = [x¾ ]Cn(x).
Theorem 3.1.20 proves combinatorially that Cn(x) = x(n) .
¾
(a) Use canonical cycle representations to prove c(n + 1 , m + 1) = ∑¾= m c(n , )( m
n
).
(b) Use part (a) to prove Theorem 3.1.20 by induction.
(c) By Example 2.1.9, c(n , ) = (n − 1)c(n − 1 , ) + c(n − 1 , − 1) for n , ≥ 1. Use this
and the generating function method to prove Theorem 3.1.20 again.
3.1.32. (♦) Create an array with row 0 being repeated copies of 1. To obtain row j + 1 from
row j , cross out the first element of row j , then the second subsequent entry, then the third
after that , and so on. Take partial sums of the remaining entries to form row j + 1, with
blanks under the deleted entries. Prove that the first entry in row j is j !. (Hint: The di-
agonal of the jth wedge sums to j!. Explain those values using Exercise 3.1.31. Comment:
Guy [1988] calls this an instance of Moessner ’s Process; see Exercise 2.1.38.)
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 2 3 4 5 6 7 8 9 10
2 6 11 18 26 35
6 24 50
24
3.1.33. Let F n() = ∑¾≥0 c( , n)¾/ !, where c( , n) is the number of permutations of []
with n cycles. Prove F n() = [− ln(1 − )]n/n!.
The remaining problems in this section involve the Eulerian numbers A(n , ), where
A(n , ) denotes the number of permutations of [n] with runs.
3.1.34. Substitute the expression for ( − r)n given by using Worpitzky’s Identity with
¾
x = − r into the sum ∑r=0(−1)r (n+r 1 )( − r)n to prove that the sum equals A(n , ).
106 Chapter 3: Generating Functions
¾
3.1.35. Prove A(n , ¾) = ∑r=0(−1)r (n+r 1 )(¾ − r)n from Proposition 3.1.24.
3.1.36. Eulerian numbers. There are A(n , ¾) permutations of [n] with ¾ runs.
(a) Show that ∑¾=1 A(n , ¾) = n! and A(n , ¾) = A(n , n + 1 − ¾).
n
(b) Prove ∑¾=1 ¾ A(n , ¾) = 12 (n + 1)! using the identities of part (a).
n
3.1.37. (♦) There are n! lists (b1 , . . . , bn) in n such that bi ≤ i for all i. Let B(n , ¾) be the
number that omit ¾ − 1 elements of [n]. Prove B(n , ¾) = A(n , ¾). (Bóna [2004, p. 31])
3.1.38. (♦) For n ∈ , prove that ∑¾≥0 ¾ n/2¾ is an integer. (Hint: Consider the proof of
Theorem 3.1.26.)
3.1.39. (♦) Two games begin with players A and B each having $1. On each play, A or
B wins $1. When A has $a and B has $b, the probability that A gets the next dollar is
a/(a + b) in Game 1, but in Game 2 it is b/(a + b). For 1 ≤ ¾ ≤ n, determine in each game
the probability that A has $ ¾ when the total is $(n + 1). (Comment: Game 1 has been
called P ólya’s Urn; see Johnson–Kotz [1977].)
3.1.40. (♦) An increasing tree is rooted with integer vertices, increasing along paths
from the root. Let T n be the set of increasing trees with vertices {0 , . . . , n}. For ∈ Ën ,
form by putting 0 before the word form of . For i ∈ [n], create the edge ji, where j is the
last element before i in that is less than i. Let ( ) be the resulting graph on {0 , . . . , n}.
(a) Prove that is a bijection from the set of permutations of [n] to T n .
(b) Prove that T n has c(n , ) elements whose root has degree , where c(n , ) counts
the permutations of [n] with cycles. (Hint: Consider canonical cycle representations.)
(c) Prove that T n has A(n , ) elements with (non-root) leaves.
(Comment: Elements of T n correspond to inclusion arrangements of n square envelopes
with distinct sizes. There are n! arrangements, of which c(n , ) have envelopes contained
in no others and A(n , ) have envelopes containing no others.)
3.1.41. (♦) For ∈ Ën , there is an excedance at i if (i) > i. For example, the excedances
in 791368452 are at {1 , 2 , 5 , 6}. Given , let ˆ denote the permutation whose word form
is obtained by dropping the parentheses in the canonical cycle representation of . Prove
that has an excedance at i if and only if ˆ has an ascent at i. Thus the number of permu-
tations of [n] with ascents is the number of permutations of [n] with excedances, and
A(n , ) permutations of [n] have n − excedances. (Foata–Schützenberger [1970])
3.1.42. (♦) For ∈ Ën , there is a weak excedance at i if (i) ≥ i. Use Exercise 3.1.41 to
prove that the number of permutations of [n] having weak excedances is A(n , ). (Hint:
Compare with its reverse complement ∗ , defined by ∗(i) = n + 1 − (n + 1 − i).) (Bóna
[2004, p. 32])
3.1.43. (+) Smith College Diploma Problem. By tradition, the graduating students form a
circle and diplomas are distributed at random. Students having their own diplomas leave;
each remaining student passes the diploma she holds to the student on her right to com-
plete the round. Maurer [1973] asked for the probability that the process takes rounds.
Don West [1974] used recurrence and induction; Gessel [2001] gave a bijective solution.
(a) For ∈ Ën , let s1 , . . . , sm be the non-fixed elements in increasing order. Let (si) =
(si+1 ) if i < m and (sm) = (s1 ). The fixed points of are also fixed points of . Prove
that if has excedances (Exercise 3.1.41), then has − 1 excedances. For example,
32514 → 52143 → 12345.
(b) Use part (a) and Exercise 3.1.41 to prove that the number of permutations of the
n diplomas that result in rounds for sorting is A(n , ).
Section 3.2: Coefficients and Applications 107
3.2.1. Definition. When A(x) is the generating function with expansion A(x) =
∞
∑n=0 an x n , evaluation at 0∞ is defined by setting A(0) = a0 . The ∞derivative
of a formal power series ∑ n=0 an x n is the formal power series ∑n=1 nan x n−1 ;
we write A (x) for the derivative of a formal power series A(x) in x.
Since the termwise behavior holds by definition, the sum and product rules
for differentiation of formal power series are easy to verify (Exercise 30). Gen-
erally we have the following statement, which motivates writing A (x) for the
derivative of a formal power series A(x):
The derivative of the formal power series expansion of A(x)
is the formal power series expansion of the derivative of A(x).
The occurrence of power series as formal power series is another excuse for our
(ab)use of the word “function” in the term generating function. Some formal power
series converge in a neighborhood of the origin when viewed as power series, but
some do not. Evaluation of A(x) at numerical values for x (such as x = 1) is allowed
when the sum converges (such as when A(x) is a polynomial in x).
Since the formal power series expansion of (1 − x)−1 is also the power series for
(1 − x)−1 , the correspondence between operations allows us to derive our favorite
formal power series expansion by differentiation.
108 Chapter 3: Generating Functions
3.2.3. Remark. Shifting the index. The negative binomial expansion often arises
as ∑¾≥0 (¾r )x¾ . We find the generating function by
¾ ¾ ¾+r xr
∑ ( r )x¾ = ∑ ( r )x¾ = ∑ ( )x ¾+r = .
r (1 − x)r+1
¾ ≥0 ¾ ≥r ¾ ≥0
Here we discard terms that are 0, then shift the index, then use the known ex-
pansion of (1 − x)−n . Lowering the starting value of the index (by r) is done by
adding r to each appearance of the index in the summand. We often do this to
introduce or remove a power of the formal variable.
Proof: (1,2) These are the definitions of arithmetic on formal power series (Defi-
nition 3.1.4). Convolution gives the coefficient of x n in a product of series.
(3) Multiplying by powers of the formal variable has the effect of shifting in-
dices in the sequence of coefficients.
(4) Differentiation of A(x) introduces a linear factor (Definition 3.2.1).
Section 3.2: Coefficients and Applications 109
These manipulations are useful in several ways. We can start with the expan-
sion of a known generating function and manipulate it to obtain a desired sum,
operating simultaneously on the generating function. We may also recognize the
sum as a coefficient in a generating function. We call these algebraic proofs for
evaluating summations. As with recurrence relations, discovering the value of
the sum may suggest a short combinatorial proof that was not initially apparent.
3.2.7. Example. Even coefficients. To sum the even coefficients in the expansion
of (1 + x)n , Proposition 3.2.5(6) first yields
n 1
∑ (2i)x2i = 2
[(1 + x)n + (1 − x)n].
i≥0
Setting x = 1 yields 2 n−1 when n > 0. When n = 0, both (1 + x)n and (1 − x)n equal
1, and setting x = 1 yields 1, not 1/2.
Combinatorially, the sum counts the even subsets of an n-set. The number
is 2 n−1 , since for each subset of [n − 1], including or omitting n yields one even
subset and one odd subset (when n > 0).
3.2.8. Example. Even minus Odd. Setting x = −1 in A(x) gives the sum of the
even coefficients minus the sum of the odd coefficients. If A(x) enumerates a set
having m0 objects with even index and m1 with odd index, then A(−1) = m0 − m1 .
For example, (1 + x)n enumerates subsets of [n] by size. Setting x = 1 yields
all 2 n subsets, and setting x = −1 proves equality between the numbers of subsets
with even size and odd size (if n > 0).
n−1 j
The generating function ∏ j =0 ∑i=0 x i enumerates permutations of [n] by
number of inversions (Proposition 3.1.15). Setting x = 1 yields all n! permuta-
tions, and setting x = −1 proves equality between the numbers of permutations
with even and odd numbers of inversions (if n > 1).
The generating function ∏ j =1 (x + j − 1) enumerates permutations of [n] by
n
r
m n m n
∑ ( ¾ )(r − ¾) = [ xr ] ∑ ( ¾ )x¾ ∑ (¾ )x¾
¾ =0 ¾ ¾
m+ n
= [ x ](1 + x) (1 + x) = [ x ](1 + x)m+n = (
r m n r
).
r
∑¾=0 a¾ bn−¾ . The generating function ∑¾≥0 ¾ x¾ is x/(1 − x)2 (see Example 3.2.9).
n
if n ≥ m .
m
x
= [x n] (1 − x)m = {1
(1 − x)m+1 0 if n < m
Section 3.2: Coefficients and Applications 111
¾
√xC(x), where
C(x) = ∑¾≥0 ¾+1 ¾
1
( 2
)x ¾ . In Theorem 2.2.22 we proved C(x) = (1 − 1 − 4x)/(2x).
Applying A(x) = dx d
xC(x) yields A(x) = (1 − 4x)−1/2 . Hence the OGF for the con-
volution is (1 − 4x)−1 , and the value of the sum is 4n .
Thus (X) = A (1) = 1−p p · (1−(11−−pp)1)2 = 1p .
112 Chapter 3: Generating Functions
SN AKE OIL
3.2.16. Example. Evaluating ∑¾≥0 (n−¾ ¾ ). Let an be the desired sum, with A(x) =
∑n≥0 an x n . Interchanging the order of summation allows us to perform the inner
sum as follows:
¾ ¾ 1
∑ ∑ (n − ¾)x n = ∑ x¾ ∑ (n − ¾ )x n−¾ = ∑ x¾(1 + x)¾ = 1 − x − x2 .
n≥0 ¾ ≥0 ¾ ≥0 n ¾ ≥0
The last expression enumerates 1,2-lists by their sum. Hence it is the OGF for
adjusted Fibonacci numbers (see Exercise 3.1.19), and an = F̂ n .
Had we known that we wanted F̂ n , we could have set i = n− ¾ at the beginning
to transform the sum to ∑i (n−i i), which evaluates to F̂ n by a pleasant combinato-
rial argument. Snake Oil did not require knowing the value of the sum.
Exercise 3.1.31 requests a bijective proof of the identity in the next example.
Snake Oil evaluates the sum without first knowing the value.
¾
) = c(n + 1 , m + 1). Here c(n , ¾) is the number
n
3.2.17. Example. ∑¾=m c(n , ¾)(m
of permutations of [n] with ¾ cycles; by Theorem 3.1.20, ∑¾=0 c(n , ¾)x¾ = x(n). We
n
¾
find the sum as a coefficient in a generating function. Since (m )x m is easy to sum
over m when ¾ is fixed, we introduce a generating function with index m. After
interchanging the order of summation, we use Theorem 3.1.20 to compute
¾ ¾
∑ ∑ c(n , ¾)(m)x m = ∑ c(n , ¾) ∑ (m)x m = ∑ c(n , ¾)(1 + x)¾ = (1 + x)(n) .
m ¾ ¾ m ¾
Snake Oil can succeed when the summand has several factors. The method
splits the summand to perform simpler sums over fewer factors. This is especially
promising when a parameter appears only once in the summand. We use it next
for a short proof of the equality of two formulas for the Delannoy numbers. Theo-
rem 1.2.13 and Exercise 1.2.39 give combinatorial arguments; here we show more
easily that both formulas give the coefficients in the same generating function.
n+¾
¾ )( m ) = ∑¾ ( ¾ )(¾ )2 . Snake Oil proves the identity by
m n ¾
3.2.18. Example. ∑¾ (m
showing that both sides have the same generating function, indexed by n. Mul-
tiply by x n , sum over n, and interchange the order of summation. On both sides
¾
we use ∑r≥0 (¾r )xr = (1−xx)¾+1 .
On the left we compute
m n + ¾ n+¾ m xm
∑ ( ¾ )x−¾ ∑ ( m
)x = ∑ ( )x−¾
¾ (1 − x)m+1
¾ n≥0 ¾
xm −1)m (1 + x)m
= (1 + x = .
(1 − x)m+1 (1 − x)m+1
+¾ n+¾
In evaluating ∑n≥0 (nm ¾ ) is 0 unless ¾ ≤
)x , we have used that the coefficient (m
m, so all the terms needed to form (1 − x)m+ 1
are present.
On the right we compute
m n 1 m x ¾
∑ ( ¾ )2¾ ∑ (¾ )x n = 1 − x ∑ ( ¾ )2¾ ( 1 − x )
¾ n≥0 ¾
1 2x m
(1 + x)m
= (1 + ) = .
1−x 1−x (1 − x)m+1
When a parameter in the sum appears more than once, Snake Oil may still
work after introducing an extra free variable. The desired sum then becomes a
special case of a more general sum.
2
3.2.19.* Example. ∑¾ (−1)n−¾ (2n ¾) = (2nn ). With n appearing so often in
n−
(−1) ( ¾ )(2n−¾), it is hard to perform the inner sum after multiplying by x n ,
¾ 2n 2n
EXERCISES 3.2
3.2.1. (−) Compute the coefficient of x10 in the following generating functions.
(a) (1 + x)3(1 − x)−3 . (b) (x2 + x3 + x4)4 . (c) (1 − 2x)−3 .
3.2.2. (−) Let a¾ = (⌊¾/2⌋
n
). Determine the generating function ∑¾≥0 a¾ x¾ .
3.2.3. (−) For n ∈ , let an = ∑¾=1
n 1
¾ 2 n−¾
. Find ∑ n≥1 an x n . (Comment: See Exercise 2.1.30
for alternative expressions of an .)
3.2.4. (−) Use generating functions to evaluate the sums below.
r n
n n n
(a) ∑(−1)¾ ( )( ) (b) ∑(−1)¾−1 ¾ ( )2 n−¾
¾ r−¾ ¾
¾ =0 ¾ =1
3.2.5. (−) Use generating functions to evaluate the sums below for all n ≥ 0, and give
combinatorial proofs of the resulting identities.
n 2
n n
(a) ∑ 2i( ) (b) ∑ ¾ ( )
2i ¾
i ¾ =0
3.2.6. (−) Prove that a formal power series ∑ n≥0 an x n has a multiplicative inverse if and
only if a0 =
0. Prove that the inverse is unique when it exists.
3.2.7. (−) Prove that the following four statements (each over all ¾ ∈ ) are equivalent.
¾ ¾
(a) b¾ = ∑i=0 (ni) a¾−i (c) a¾ = ∑i=0(−1)i (i+nn−−11 )b¾−i
¾ ¾
(b) b¾ = ∑i=0 (¾n−i) ai (d) a¾ = ∑i=0(−1)¾−i (¾−ni+−n1−1 )bi
3.2.8. (−) Prove that the following four statements (each over all ¾ ∈ ) are equivalent.
¾ ¾
(a) b¾ = ∑i=0 (i+nn) a¾−i (c) a¾ = ∑i=0(−1)i (n+i 1 )b¾−i
¾ ¾
(b) b¾ = ∑i=0 (¾−ni+ n) ai (d) a¾ = ∑i=0(−1)i (n¾+−1i )bi
3.2.9. Let º (x) be the generating function for ⟨a⟩, and let bn = ∑¾>n a¾ . Prove that the
generating function ½(x) for ⟨b⟩ is given by ½(x) = º (1)1−−ºx (x) .
3.2.10. (♦) Restricted multisets. Let n be even.
(a) Find the generating function (indexed by size) for multisets from [n] having odd
multiplicity of each odd number and even multiplicity of each even number. For example,
(1 , 1 , 1 , 2 , 2 , 3) is such a multiset of size 6 when n = 4.
(b) Extract the coefficient of x¾ in the generating function.
3.2.11. Let 1 −3x−−3x2x2 be the generating function for the sequence a0 , a1 , a2 , . . .. Without
obtaining a formula for a¾ , compute ∑¾=0 a¾ as a function of n.
n
3.2.15. (♦) Use generating functions to evaluate the sums below, and then prove the sec-
ond inductively.
¾
1 2¾ 1 2n − 2 ¾ n
(a) ∑ ( ) ( ) (b) ∑(−1)i ( )
¾+1 ¾ n− ¾ + 1 n− ¾ ¾−i
¾ i =0
3.2.16. Let bn = F̂ 2n and cn = F̂ 2n+1 , where ⟨ F̂⟩ is the adjusted Fibonacci sequence. From
the OGF for ⟨ F̂⟩, obtain the OGFs for ⟨b⟩ and ⟨c⟩, and use them to obtain recurrences for
these sequences.
3.2.18. (♦) Use generating functions to evaluate the sums below, and give combinatorial
proofs of the resulting identities.
¾ n
n+ ¾ − j −1 m+ j −1 1 2¾ 2n − 2 ¾
(a) ∑ ( )( ) (b) ∑ ( )( )
¾− j j ¾+1 ¾ n−¾
j =0 ¾ =0
3.2.19. (♦) Count the lattice paths that have endpoints in [n] × [n] and take only rightward
or upward unit steps (evaluate all sums). For n ∈ {1 , 2 , 3}, the values are 1, 10, 53.
¾ +1
3.2.21. Modified Catalan generating function. Let B(x) = ∑¾≥0 C¾ x¾+1 = ∑¾≥0 (2¾¾) x¾+1 .
(a) Prove B(x)B (x) = 12 (B (x) − 1), and use this to prove the identity below, where the
sum is over ¾ , l ∈ 0 with ¾ + l = n.
(b) Using lattice paths, give a bijective proof of the identity.
(2¾¾)(2ll++12) 2n + 2
∑ ¾ + 1 = 2( n ) (Dályay [2016])
n−1
3.2.22. (♦) Use OGFs to sum ∑¾=0 4 n−¾ ¾+1 1 (2¾¾) . (Whitworth [1897])
⌊(m−1)/2⌋
3.2.24. Let m!! = ∏¾=0 (m − 2 ¾). Evaluate ∑i=0 ( ni)(2i − 1)!!(2n − 2i − 1)!!. (Note that
n
n > (m + 1)/2, then P(m , n , r) > 0 and ∑r=0 P(m , n , r) = (mn+2). (Hint: Let F n ,r (x) =
n
3.2.27. (+) Let (n) be the number of binary words of length n in which the numbers of
occurrences of consecutive 00 and consecutive 01 are the same. Prove
∞
1 1 1 + 2t
∑ (n)t n = (
2 1−t
+√
(1 − t)(1 − 2t)(1 + t + 2t2)
). (Stanley [2011])
n=0
3.2.28. A gambler insists on playing until he is ahead by one game. Assume that he has
probability p of winning any single game, independently.
(a) Let be the probability that the match ends. Prove = 1 for p ≥ 1/2 and < 1
for p < 1/2. (Hint: Consider the Catalan generating function.)
(b) For p > 1/2, use generating function techniques to give an expression for the ex-
pected number of games in the match (do not compute the value).
(c) For p > 1/2, find an equation for the expected number of games in the match that
computes it directly and simply without using generating functions.
3.2.29. (+) For nonnegative integers m and n, prove the identity below. (Hint: Both sides
equal the coefficient of x m+ n in the same generating function. A direct combinatorial proof
was requested in Exercise 1.2.50.) (Keselman [2008], solution to Knuth [2007])
∞
2m −
n
2m + 1
∑ 2¾ ( m+ n
) = 4m − ∑ (
m+ j
).
¾ =0 j =1
Thus the ordinary formula for the derivative of [ A(x)]−1 with respect to x holds also for
differentiation of formal power series.
∞ ∞
3.2.31. Prove ∑¾=0 (¾+¾n−1 ) 2−¾ = 2 n , and apply this to evaluate ∑¾=1 2−¾ . Verify the re-
sult by using another method to evaluate the latter sum.
+ n m+ n
3.2.32. For m , n ∈ 0 , evaluate ∑(−1)¾ (m )(
m+ n+
).
¾∈
⌊m/2⌋
3.2.35. Prove the identity below. (Comment: The sums can be related to r rolls of a die
with b sides, where s and t are nonnegative integers with r + s + t = rb.) (Wardlaw [1989])
⌊s/b⌋ ⌊t/b⌋
r s + r − 1 − b r t + r − 1 − b
∑(−1)¾ ()( s − b
) = ∑(−1)¾ ( )(
t − b
)
¾ =0 ¾ =0
Exercises for Section 3.2 117
Exercises 36–49 use Snake Oil; those up to Exercise 39 are from Wilf [1990].
3.2.36. Let an = ∑¾≥0 (n−¾ ¾ )2 ¾ . Find the formula for an in terms of n (no summations).
3.2.42. (♦) Use Snake Oil to obtain the generating function ∑ am ,¾ x m y ¾ , where am ,¾ =
∑r (¾−r r)(mr) , and then give a combinatorial proof that this is the generating function.
3.2.43. (♦) Evaluate ∑¾=0(−1)¾ (¾n)(mn+−n¾−¾ ) twice: by convolutions and by Snake Oil.
n
3.2.44. Use Snake Oil to prove the identity below. (Hint: Compare with Example 3.2.18.
Comment: Exercise 1.2.31 requested a combinatorial proof.)
n 2¾ n 2¾
∑ (¾)( ¾ ) = ∑ (2¾)( ¾ )3n−2¾
¾ ≥0 ¾ ≥0
m− ¾ n+ ¾ m− ¾ −1 n+ ¾
∑( ¾
)(
2¾
)+ ∑(
¾
)(
2¾ + 1
)
¾ ≥0 ¾ ≥0
3.2.49. (+) Use Snake Oil to evaluate ∑0≤¾≤ n/3 2 ¾ n−n¾ (n2−¾¾) for n ≥ 1. (Hint: Use n
n−¾
=
1 + n−¾ ¾ to simplify the dependence on n.) (Gessel [1995])
118 Chapter 3: Generating Functions
3.3.2. Example. ¾ -ary words, indexed by length. There are ¾ n words of length n
consisting of letters from a set of size ¾ . The EGF for ¾-ary words, enumerated by
∞
length, is ∑n=0 ¾ n x n/n!. When x is a number, this is the power series expression
¾ x
for e , where again e denotes the base of the natural logarithm. As discussed
earlier for OGFs, the formal power series has the same behavior under addition
and multiplication as the exponential function given by e¾ x . Hence we say that
e¾ x is the exponential enumerator by length for n-ary words.
Words are the natural ordered analogue of multisets. An n-word uses a mul-
tiset of size n from [¾], but the elements are chosen in order.
When ¾ = 1, we obtain e x , so the EGF for ¾-ary words is the product of ¾
copies of the EGF for 1-ary words; that is, e¾ x = (e x)¾ . We need to understand the
combinatorial meaning of the product to explain why the ¾-fold product enumer-
ates the words from an alphabet of size ¾ .
The condition on the coefficients that characterizes when an EGF is the prod-
uct of two other EGFs arises from the definition of product for formal power series,
just as it does for OGFs.
3.3.3. Lemma. The EGF for a sequence ⟨c⟩ is the product of the EGFs for se-
quences ⟨a⟩ and ⟨b⟩ if and only if ⟨c⟩ is the binomial convolution of ⟨a⟩ and
⟨b⟩, meaning that for n ∈ 0 ,
n
n
cn = ∑ ( )aj bn− j .
j
j =0
Proof:
∞ ∞ ∞ n ∞ n
xn xn ⎛ a b ⎞ ⎛ n ⎞ xn
∑ an ∑ bn = ∑ ∑ j n− j x n = ∑ ∑ ( )aj bn− j .
n! n! ⎝ j! (n − j)! ⎠ ⎝ j ⎠ n!
n=0 n=0 n=0 j =0 n=0 j =0
Section 3.3: Exponential Generating Functions 119
form a word of length n. By the Binomial Theorem, the sum has value (5 + 21)n .
We have confirmed that the counting sequence for words from an alphabet
of size 26 is the binomial convolution of the sequences for words from alphabets
of sizes 5 and 21. Hence Lemma 3.3.3 ensures that the EGF for the compound
problem is the product of the EGFs for the two smaller problems. This provides
a combinatorial proof of e26x = e5x e21x .
Understanding the use of EGFs means understanding when the counting se-
quence for a compound problem is the binomial convolution of the sequences for
the component problems. The answer lies in “labels”.
For n-words (Example 3.3.4), the n positions are the labels. Letters may be
used repeatedly, but each label is used once. Words from a fixed alphabet form a
symmetric family. When putting a word from A into j positions and a word from
B in the other n − j positions, the number of ways depends only on j , not on which
j positions (labels) are used. In allocating the labels to the two subproblems, bi-
nomial convolution and EGF product both model the counting process.
presses ⟨c⟩ as the binomial convolution of ⟨a⟩ and ⟨b⟩, which by Lemma 3.3.3 is
the condition for the EGFs to satisfy C(x) = A(x)B(x).
In labeled enumeration, the labels are distinct and all used, and the index
in the EGF is the number of labels. We use products of EGFs when we build the
labeled structures in stages described by allocation of labels. With this in mind,
we return to the discussion of words.
3.3.8. Example. Words with restricted use of letters. The EGF e x models unre-
stricted multiplicity. As with OGFs for multiset problems, keeping terms for
allowed multiplicities solves many word-counting problems. When we must use a
particular letter, the factor for it is e x − 1, since there is no allowed word of length
0 formed using that letter.
When a letter must be used at most once, the factor for it is the EGF 1 + x
(note that x/1! = x). This describes simple words. The EGF for simple words from
an alphabet of size ¾ , indexed by length (the labels are the positions), is (1 + x)¾ .
To check this, note that
¾ ¾
¾ xj
(1 + x)¾ = ∑ ( )x j = ∑ ¾(j) .
j j!
j =0 j =0
The table below compares the analogous OGFs and EGFs for natural multi-
plicity conditions. The OGFs are enumerators by the total size of the multiset;
the EGFs are by the length of the word.
3.3.9. Example. Coefficients of EGFs. When the EGF can be expressed as a linear
combination of powers of e x , the coefficient of x n/n! is easy to extract. This can
occur with restrictions on the usage of certain letters in forming ¾-ary words,
which are the EGF analogue of multisets with restricted repetitions.
For example, when a letter must be used with even multiplicity, the factor
associated with it in building the EGF for the resulting words is 12 (e x + e− x). Sim-
ilarly, 12 (e x − e− x) when the multiplicity must be odd (see Proposition 3.2.5(6)).
Hence the EGF for ternary words with an even number of 0s, odd number of 1s,
and any number of 2s is 12 (e x + e− x) 12 (e x − e− x)e x , which simplifies to 14 (e3x − e− x).
The coefficient of x n/n! is 14 (3n − (−1)n).
An additive multiple of e0 affects only the constant term. For example, the
EGF for binary lists with the multiplicities of 0 and 1 both even is 14 (e x + e− x)2 ,
which equals 14 (e2x + 2 + e−2x). For n > 0, the coefficient of x n/n! is 2 n−2 + (−2)n−2 ,
but we must add 1/2 when n = 0 to get 1.
Enumerating words where each letter of the alphabet must be used leads
to a classical application. Recall that a partition of a set A is a set of disjoint
nonempty subsets with union A. The subsets are the blocks of the partition, and
the blocks are neither ordered nor labeled.
3.3.10. Definition. The Stirling number S(n , ¾) (or Sn ,¾) is the number of par-
titions of [n] into ¾ (nonempty) blocks. When the ¾ blocks are numbered 1
through ¾ , partitions become ordered partitions.
¾
1 ¾
3.3.11. Theorem. S(n , ¾) =
¾! ∑(−1)i ( i )(¾ − i)n.
i=0
Proof: Since nonempty blocks are distinguished by their members, each parti-
tion into ¾ blocks can be ordered in ¾ ! ways. Hence there are ¾ !S(n , ¾) ordered
partitions of [n]. Putting objects into blocks assigns a block name from [¾] to
each element of [n]. Ordered partitions are thus functions from [n] to [¾], or
words with [¾] as the alphabet and [n] as the set of positions (labels).
The condition that each block is nonempty requires each element of [¾] to
appear in the word. As in Example 3.3.8, the EGF (indexed by length) is (e x − 1)¾ ,
since the option of multiplicity 0 is prohibited for each type of letter. Thus
∞ n
x
∑ ¾ !S(n , ¾) n! = (e x − 1)¾ .
n=0
¾
Applying the Binomial Theorem to the EGF yields ∑ i=0(−1)i (¾i )e x(¾−i) , which
¾
expands to ∑i=0(−1)i (¾i ) ∑n≥0(¾ − i)n xn! . Interchanging the order of summation
n
yields the sum in the claimed expression as the coefficient of x n/n!. As we have
noted, S(n , ¾) is then obtained by dividing by ¾ !.
122 Chapter 3: Generating Functions
3.3.12. Definition. The signless Stirling number c(n , ¾) is the number of per-
mutations of [n] with ¾ cycles (see Theorem 3.1.20). The Stirling number
s(n , ¾) (of the first kind) is defined by s(n , ¾) = (−1)n−¾ c(n , ¾).
Knuth [1968] used { n¾ } for S(n , ¾) and [ ¾n ] for c(n , ¾). The two kinds of
Stirling numbers are related by forming inverse (infinite) matrices; that is,
∑¾≥0 S(n , ¾)s(¾ , m) = n ,m . We prove this by showing that the Stirling numbers
transform between two bases for the vector space of polynomials. Like {x n}n≥0 ,
the falling factorials {x(n)}n≥0 and the rising factorials {x(n)}n≥0 also form bases
for the space of polynomials since there is one of each degree.
Proof: By the Polynomial Principle, it suffices to prove the first identity for x ∈ .
The right side counts n-words from [x]. Alternatively, form words with distinct
letters by partitioning the n positions into blocks (in S(n , ) ways) and assigning
the blocks to letters in [x] (in x(¾) ways). Finally, sum over .
We already proved the nontrivial part of the second identity in Theorem
3.1.20, which is the middle equality below. We compute
n n
By Theorem 3.3.13, the values j!S( , j) are the coefficients used in writing
m¾ as a linear combination of (m
¾ ) , . . . , ( 0 ) (recall Application 1.2.7). That is,
m
¾ ¾
∑ j =0 S( , j)x(j) = x¾ becomes ∑ j =0 j!S( , j)( xj) = x¾ . The Summation Identity
n−1 ¾ −1 is a polynomial in n of degree
(Theorem 1.2.3(5)) then implies that ∑m =1 m
. Exercise 2.1.38 shows that the leading coefficient of this polynomial is 1/ ,
Section 3.3: Exponential Generating Functions 123
and the next coefficient is −1/2. The full story of the polynomial is told by the
Bernoulli numbers, named for Jakob Bernoulli (1654–1705), who discovered the
relationship. Exercise 24 derives the coefficients of the polynomial.
In general, the “connection coefficients” that relate two bases for the space
of polynomials are quite interesting. These behave nicely when the bases are se-
quences of polynomials satisfying a general form of the Binomial Theorem.
The ordinary powers, falling factorials, and rising factorials are sequences
of binomial type (Exercises 1.1.34–35; see also Exercise 29). The elegant theory
of such sequences gives many characterizations of them and associates a natural
linear operator with each sequence (the operator corresponding to {x n : n ≥ 0} is
differentiation). We refer interested readers to Mullin–Rota [1970], Roman–Rota
[1978], Aigner [1979, pp. 99–118], and Roman [1984].
We continue with applications of EGFs. Binomial convolution plays the role
for EGFs that convolution plays for OGFs (there are also analogues of the other
n
operations in Proposition 3.2.5). The sum ∑i=0 (ni)ai bn−i can be evaluated if we
can find the EGFs for ⟨a⟩ and ⟨b⟩ and find the coefficients of their product.
3.3.16. Example. To evaluate ∑¾=0 (n¾ )m¾ without the Binomial Theorem, let
n
The next application is more important and echoes Remark 3.2.14. In the
context of Example 3.3.16, it yields mn = ∑i=0(−1)¾ (¾n)(m + 1)n−¾ .
n
3.3.17. Theorem. The EGF and formula for derangement numbers are
e− x
n
(−1)¾
D(x) = and Dn = n! ∑ .
1−x ¾!
¾ =0
picking the fixed points and deranging the rest. The EGF for ⟨a⟩ when an = n!
is 1/(1 − x). From the binomial convolution, we obtain (1 − x)−1 = e x D(x), so
D(x) = e− x/(1 − x). To extract the coefficients, recall that multiplying by (1 − x)−1
sums the initial terms of a power series. Thus
e− x
n n
(−1)¾
Dn = [ x n/n!] = n! ∑[ x¾ ] e− x = n! ∑ .
1−x ¾!
¾ =0 ¾ =0
124 Chapter 3: Generating Functions
We can also view this analysis of n! = ∑ (¾n)Dn−¾ as the EGF analogue of the
generating function method for solving recurrences. Instead of x n , we multiply
by x n/n! before summing over n to introduce the EGF. To illustrate this approach,
we apply it also to the second order recurrence for derangements.
an instance of a general inversion formula like that for OGFs in Remark 3.2.14.
3.3.19. Theorem. (Binomial Inversion Formula) For sequences ⟨a⟩ and ⟨b⟩,
the following are equivalent
(A) an = ∑¾n=0 (n¾ )bn−¾ for all n ∈ 0 .
(B) bn = ∑¾n=0(−1)¾ (¾n)an−¾ for all n ∈ 0 .
Proof: Let A(x) and B(x) be the EGFs for ⟨a⟩ and ⟨b⟩. Multiplying by x n/n!
and summing over n converts statements (A) and (B) to A(x) = e x B(x) and
B(x) = e− x A(x), respectively, which are equivalent.
EGFs are useful for labeled enumeration because the binomial convolution
∑ ¾)a¾ bn−¾ introduces the factor (¾n) that counts allocations of labels to subprob-
( n
lems. The Exponential Formula generalizes this idea. We begin with a classical
application to motivate the general formula.
3.3.20. Example. General and connected graphs. There are 2(2) graphs with a
n
specified set of n vertices. Hence the EGF for graphs by number of vertices is
given by G(x) = ∑n≥0 2(2) x n/n!. By convention one graph has no vertices.
n
Section 3.3: Exponential Generating Functions 125
Let C(x) be the EGF for (labeled) connected graphs, indexed by number of
vertices. We relate C(x) to G(x). Each graph is formed from components. Con-
sider first a graph with exactly two components. If we temporarily index them as
first component and second component, then we form such a graph by partition-
ing the set of vertex labels into X and Y and placing a connected graph on label
set X and another on label set Y .
n−1
With n labels, we can do this in ∑ j =1 (nj)cj cn− j ways, where cn is the coefficient
of x n/n! in C(x). We divide by 2, since either component could be the “first ”, but
in graphs we do not number components. We can run the sum from 0 to n if c0 = 0.
Thus, we say that the one graph with no vertices is not connected. Now the EGF
n
for two-component graphs is ∑n≥0 12 (∑ j =0 (nj)cj cn− j ) x n/n!, which equals C(x)2/2.
For graphs with ¾ components, the argument is similar. Partition the n la-
bels into ¾ nonempty sets, form a connected graph on each set, and divide by ¾ !
since there are ¾ ! ways to index the components of a graph with labeled vertices.
By iterating the product rule for EGFs, we find that the EGF for graphs with ¾
components is C(x)¾/¾ !. This formula works also when ¾ = 0, since C(x)0 = 1 and
there is one graph with no vertices; by convention it has no components.
Summing over ¾ to count every graph yields G(x) = e C(x).
The formula G(x) = e C(x) expresses G(x) as the composition of two formal
power series. We pause to say precisely what composition means.
¾
3.3.22. Remark. For a formal power series C(x), let C¾ (x) = ∑ j =0 cj x j . In the
composition A(B(x)), we want to substitute B(x)n for y n in A(y) = ∑n≥0 an y n .
If this yields a formal power series in x, then it should equal lim¾→∞ A¾ (B¾ (x)).
When B(0) = 0, computing a coefficient in the composition is a finite process;
[x n] A¾ (B¾ (x)) is fixed for ¾ ≥ n. Hence the composition converges. This is why we
require C(0) = 0 in Example 3.3.20.
The composition A(B(x)) also converges when B is a polynomial; again
[x n] A¾ (B¾ (x)) is fixed when ¾ is large. Also, when B(0) = 0, the derivative agrees
with the ordinary chain rule: the derivative of A(B(x)) is A (B(x))B (x).
Since C(0) = 0 in Example 3.3.20, the composition e C(x) makes sense. More
generally, the relationship between EGFs C(x) and G(x) is valid whenever general
structures are formed from component structures as in Example 3.3.20. Recall
that symmetric in the statement below means that the number of structures with
a given label set depends only on the number of labels.
3.3.23. Theorem. (The Exponential Formula) Let G(x) and C(x) be the EGFs
for symmetric families of “general” and “component ” labeled structures.
Suppose that G(0) = 1 and C(0) = 0. If general structures are formed by
partitioning the set of labels and placing a component structure on the labels
in each block, then G(x) = e C(x).
126 Chapter 3: Generating Functions
Proof: By hypothesis, the one general structure with no elements has no compo-
nents, and every component structure has at least one element.
By the argument of Example 3.3.20, the EGF for general structures with ¾
components is C(x)¾/¾ !: partition the labels into set B1 , . . . , B¾ , choose a compo-
nent with each label set, and divide by ¾ ! to cancel the overcounting caused by
indexing the components. A general structure may have any number of compo-
nents, so G(x) = ∑¾≥0 C ¾(x)/¾ ! = e C(x). The term ¾ = 0 yields the specified value
for structures with no labels.
3.3.24. Example. Partitions of an n-set. The set of labels is [n]; each must be
used once. The “components” of a partition are its blocks. A set of labels forms
one block in one way (no ways if the set is empty), so the EGF for component struc-
tures is e x − 1. By the Exponential Formula, the EGF for set partitions, indexed
by the size of the set, is ee −1 . By convention, the one partition of ∅ has no blocks.
x
The total number of partitions of an n-set is the Bell number Bn , named for
Eric Temple Bell (unfortunately, Bell and Bernoulli have the same initial). Since
Bn = ∑¾=0 S(n , ¾), we have
n
∞ n n
x
∑ ∑ S(n , ¾) n! = ee −1 .
x
n=0 ¾ =0
3.3.26. Theorem. Let C(x) = ∑ cn x n/n! and G(x) = ∑ ½ n x n/n!. If G(x) = e C(x) ,
with ½ 0 = 1 and c0 = 0, then
n−1
n−1
cn = ½ n − ∑ ( )c¾ ½ n−¾ for n ≥ 1.
¾−1
¾ =1
We can therefore view G(x) and C(x) as EGFs for general and component struc-
tures, where we form a general structure by partitioning the labels, placing a
component structure on each block of the partition, and dividing by ¾ ! to elimi-
nate the indexing of the blocks.
This combinatorial relationship leads to a recurrence. In a general structure
with label set [n] for n > 1, the label n appears in a component of some size ¾ with
¾ ≥ 1. To complete the structure, we choose the labels belonging to the same com-
ponent as n, choose a component on these ¾ labels, and choose a general structure
−1
on the remaining n − ¾ labels. Thus ½ n = ∑¾=1 (n¾− 1 ¾ ½ n−¾ . The term for ¾ = n
n
)c
counts the n-element components, since ½ 0 = 1.
3.3.27. Example. Connected and general (labeled) graphs. Let C(x) and G(x) be
the EGFs for connected and general graphs by number of vertices. Since there
are 2(2) graphs with vertex set [n], we count connected graphs among them by
n
n−1
cn = 2(2) − ∑¾=1 (¾n−−11)2( 2 )c¾ .
n n− ¾
3.3.29. Theorem. (Cayley’s Formula) There are nn−2 trees with vertex set [n].
Proof: (P ólya [1937]) Let t n be the number of trees, and let T(x) be the EGF for
⟨t⟩. There are nt n rooted labeled trees with vertex set [n]. Letting y be the EGF
for rooted labeled trees, we have y(x) = xT (x). We obtain an equation relating x
and y and solve it for y using Lagrange inversion.
A rooted forest is a disjoint union of rooted trees. Let U(x) be the expo-
nential enumerator for rooted forests by number of vertices. By the Exponential
Formula (Theorem 3.3.23), U(x) = e y(x).
Next we show y = xU(x). A labeled rooted tree is formed by choosing a root
and joining it to the roots of a labeled rooted forest on the remaining n − 1 ver-
tices. Thus y enumerates labeled structures that consist of one labeled vertex
and a rooted forest, and the rule for multiplying EGFs yields y = xU(x) = xe y .
Rewriting this as x = y/e y , we apply Lagrange inversion to obtain
(e y)n e ny nn−1
[ x n ] y(x) = [ y n−1 ] = [ y n−1 ] = .
n n n(n − 1)!
Thus y(x) = ∑n≥0 nn−1 x n/n!, and nn−1 rooted trees have vertex set [n].
derive in the next theorem. The formula may look familiar; these are the Fuss–
Catalan numbers defined after Corollary 1.3.19 for the 2-ballot sequences. In
Exercise 2.1.51 we obtained the same recurrence for them that we obtain next for
the noncrossing trees; here we solve it using Lagrange Inversion.
v¾+ l
• • • •
• •
• • • • • •
• • • •
• • v¾ • •
• • • • • •
• •
• • • •
v0 vn
Section 3.3: Exponential Generating Functions 129
We usually say that OGFs are good for unlabeled enumeration and EGFs
for labeled enumeration, but why is the noncrossing tree problem unlabeled
when there are specified points on the circle? The key is the kind of convolu-
tion used when combining generating functions for parts of the problem. The
number of ways to assemble three trees in obtaining the recurrence is t¾ t l t m , not
(¾n,l−,m
2
)t¾ t l t m , because there was no allocation of labels to subproblems.
presents a proof via complex analysis. In that proof, a coefficient in a power se-
ries is studied by translating it into a complex integral. A change of variables is
performed, and then the translation is reversed to return to the context of series.
We present a direct and self-contained approach in the context of formal
power series. In his survey paper, Gessel [2016] attributes this proof to Jacobi
[1830]. Stanley [1999, pp. 38–39] presents a similar proof that he attributes to
Lagrange [1770]. Stanley also presents two combinatorial proofs based on count-
ing forests, due to Raney [1960] (simplified by Schützenberger [1971]) and to La-
belle [1981]. For further history, see Stanley [1999, p. 67].
To find the coefficient of x n in a power series in x, we can divide by x n+1 and
then take the coefficient of x−1 . We need series having terms with negative expo-
nents. The “residue” of such a series is the same notion as in complex analysis for
Laurent series around an isolated singular point.
3.3.35. Theorem. (Lagrange Inversion Formula) Let (y) and h(y) be formal
power series with [y0 ] (y) = 1. If x = y/ (y), then the coefficient of x n in the
expansion of h(y) as a power series in x is given by
1 n−1
[ x n ] h(y(x)) = [ y ] h (y) (y)n .
n
132 Chapter 3: Generating Functions
EXERCISES 3.3
3.3.1. (−) Let n be an even number. Find the exponential generating function Bn(x) for
lists from [n] such that each odd number is used an odd number of times and each even
number is used an even number of times.
3.3.2. (−) Use an EGF to determine the number of ways to distribute 10 people into three
rooms so that each room has at least one person.
3.3.3. (−) Cards are dealt in a row from a standard 52-card deck, and the values are
recorded (suits are ignored). Build an EGF for these lists, indexed by length.
3.3.4. (−) Build an EGF for the ways to put distinct objects into ¾ distinct boxes with at
least m objects in each box, indexed by the number of objects. How does this change if the
boxes are not distinguishable?
3.3.5. (−) The people in a club arrive for a movie showing. A subset S gets in early with
special coupons. Another subset T waits in a queue to get in. The remaining people give
up and go home. Let an be the number of ways this can all happen when the club has n
people. Obtain a simple expression for the EGF of ⟨a⟩.
3.3.6. (−) Use binomial convolution to evaluate ∑¾=0 ¾ (n¾).
n
3.3.7. (−) Apply Binomial Inversion to the explicit formula for the Stirling number S(n , ¾)
to obtain the formula for ¾ n as a linear combination of the binomial coefficients {(¾i ): 0 ≤
i ≤ ¾}. Explain the resulting formula combinatorially.
3.3.8. (−) Stirling Inversion. Use Corollary 3.3.14 to prove that the statements below are
equivalent.
(a) an = ∑¾=1 s(n , ¾)b¾ for all n ∈ .
n
(b) bn = ∑¾=1 S(n , ¾)a¾ for all n ∈ .
n
3.3.9. (−) Let cn be the number of ways that n children can be arranged in teams, with a
x
captain for each team chosen from the team members. Prove that the EGF for ⟨c⟩ is e xe .
(Stanley [1978] states this problem using idempotent functions.)
3.3.10. (−) Use the generating function method with EGFs to solve the recurrence an =
nan−1 + n! for n ≥ 1, with a0 = 1.
3.3.11. (−) Compute [x3 ](1 + x) by composing the series for e y
and ln(1 + x).
1 n
3.3.12. Let A , . . . , A and C be symmetric families of labeled structures such that ob-
jects in C[] correspond bijectively to distributions of the label set [¾] into n sets S1 , . . . , Sn
# #
and choices of elements from AiSi for 1 ≤ i ≤ ¾ . Let ai = ### A[i] ### and c = #### C[] ####. Prove that
# #
the EGF for ⟨c⟩ is the product of the EGFs for ⟨a1 ⟩ , . . . , ⟨an ⟩.
3.3.13. (♦) Let an be the number of words of length n from the alphabet {w, x , y , } such
that x appears an even number of times and y appears an odd number of times. Build the
EGF for ⟨a⟩ and use it to obtain a formula for an . Give a direct combinatorial argument
to explain the resulting formula.
n−
3.3.14. (♦) Evaluate ∑=0 (n)( m
m
− ) using binomial convolution, and give a bijective proof
of the resulting identity.
3.3.15. (♦) Let br,n be the number of ways to place n distinct flags on r distinct flagpoles,
each pole having at least one flag (order of flags on poles matters). For example, b2 ,4 = 72.
(a) Use generating function arguments to build the EGF Br(x) = ∑ br,n x n/n!.
(b) Use the EGF in part (a) to obtain a simple formula for br,n .
(c) Give a direct combinatorial proof of the formula in part (b).
Exercises for Section 3.3 133
3.3.16. (♦) Let an be the number of involutions on an n-element set. Derive a recurrence
for ⟨a⟩, and use it to obtain the EGF, which appears in Example 3.3.25.
3.3.17. (♦) A ranking of candidates in an election allows ties. Let an be the number of
rankings of n distinct candidates. Note a2 = 3 and a3 = 13.
(a) Obtain the EGF for ⟨a⟩.
(b) Using (a), prove that ∑¾≥0 ¾ n/2 ¾ is an integer (also in Exercise 3.1.38).
3.3.18. Use the Stirling numbers of the second kind to count the trees with vertex set [n]
that have exactly ¾ leaves. (Rényi [1959])
3.3.19. (♦) Prove that S(n − 1 , ¾ − 1) is the number of ways to partition [n] into ¾ sets with
no two consecutive values in the same set. (Hint: See Exercise 2.2.33.)
3.3.20. (♦) For 0 ≤ ¾ < n, give three proofs to evaluate ∑i=0(−1)i ( ni) i¾ .
n
(a) Use induction. (Hint: Use an identity to reduce the exponent on i.)
(b) Use OGFs.
(c) Use the Stirling numbers of the second kind.
(Comment: This yields ∑i=0(−1)i (ni) p(i) whenever p is a polynomial of degree less than n.)
n
3.3.21. Let P(m , n) be the set of nonnegative integer vectors a = (a1 , . . . , am+1) such that
∑ ai = n and ∑ iai = m + n.
(a) Find a direct combinatorial argument for
m+1
n 1
S(m + n , n) = ∑ (n + 1)(n + 2) · · · (n + m)(
a1 · · · am+1 ∏ i! ai
) .
a∈ P(m ,n) i= 2
m+1 ⌊m/i⌋
(b) Prove that (n + 1)(m) divides ∏ i= 2
i S(m + n , n). (Knuth [1993])
3.3.22. Count the partitions of proper subsets of [n] into ¾ blocks.
3.3.23. (♦) Identities for Stirling numbers.
(a) Prove bijectively that S(n + 1 , m + 1) = ∑¾ (¾n) S(¾ , m).
(b) Apply part (a) to prove ( mn
) = ∑¾ S(n + 1 , ¾ + 1)s(¾ , m).
3.3.24. (♦) Define the Bernoulli number Bn by B0 = 1 and ∑ j =0 (m+j 1 ) Bj = 0 for m ≥ 1.
m
(a) Prove that the EGF B(x) for the Bernoulli numbers is x/(e x − 1).
(b) Evaluate the sum of the (¾ − 1)th powers of the first n − 1 positive integers in terms
of the Bernoulli numbers by proving
n−1 ¾ −1
1 ¾
∑ m¾−1 = ¾ ∑ ( j ) Bj n¾− j .
m=1 j =0
there are ∑ j =1 2 A(n , j) ordered partitions of [n] (it is 3 for n = 2 and 13 for n = 3).
n j −1
3.3.26. Another inversion formula. Prove that the two statements below are equivalent.
(Recall that (u0) is the constant polynomial 1 as a polynomial in the real variable u.)
¾
(a) b¾ = ∑i=0 (¾n−−ii) ai for 0 ≤ ¾ ≤ n.
¾
(b) a¾ = ∑i=0(−1)¾−i (¾n−−ii)bi for 0 ≤ ¾ ≤ n.
¾
Conclude A(n , ¾) = ∑i=0(−1)¾−i (¾n−−ii)i!S(n , i) from (a) of Exercise 3.3.25. (Bóna [2004, p. 13])
134 Chapter 3: Generating Functions
3.3.29. (♦) Define a sequence of polynomials by letting pn(x) = ∑ j =0 S(n , j)x j for n ∈ 0 .
n
(These have been called both the Touchard polynomials and the exponential polyno-
mials; note p0(x) = 1.) Give a combinatorial proof of the polynomial identity
n
n
pn(x + y) = ∑ ( ) p¾(x)pn−¾ (y).
¾
¾ =0
3.3.30. (♦) A Stirling permutation linearly orders two copies of [n] so that for all i, all
entries between the two copies of i exceed i. Let a skyline be a Stirling permutation having
the additional property that no strictly increasing triple has its last two entries consec-
utive in the arrangement. For example, 122133 is a skyline. Let an be the number of
skylines of length 2n, and let A(x) = ∑n≥0 an x n/n!.
(a) Prove A (x) = e2x A(x), and conclude A(x) = e(e −1)/2 .
2x
(c) Obtain part (b) by establishing a correspondence between skylines of length 2n and
partitions of [n] with some elements marked. (Callan [2011])
3.3.31. (♦) The Bell number Bn is the total number of partitions of [n].
(a) Prove Bn+1 = ∑¾=0 (¾n) B¾ for n ≥ 0.
n
(b) Use part (a) to prove that the EGF for the Bell numbers is ee −1 .
x
(b) Conclude Dobiński’s Formula: Bn = e−1 ∑¾≥1 ¾ n/¾ !. (Dobi ński [1877])
(c) Conclude also that the difference between the number of partitions with an even
and an odd number of blocks equals e ∑¾≥1 (−1)¾ ¾ n/¾ !.
n(1 −1/ln n)
3.3.33. Bell numbers. For ¾ ∈ [n], prove Bn ≥ ¾ n−¾ . Conclude ( lnnn ) ≤ Bn ≤ nn .
3.3.34. Let S be a set of n marbles, consisting of two indistinguishable white marbles and
one each in n − 2 other colors. Prove that the number of distinguishable partitions of S is
(Bn + Bn−1 + Bn−2)/2, where Bm is the number of partitions of [m]. (When n = 3, there are
four: WWB , WW | B , W | BW, W | W | B.) (G. Beck)
3.3.35. A principal submatrix is a submatrix obtained by extracting the same set of
columns as rows. A symmetric matrix is positive semidefinite if all its principal subma-
trices have nonnegative determinant.
(a) A partial partition of a set X is a partition of a nonempty subset of X . Show that
the number of partial partitions of [n] is Bn+1 − 1.
(b) Prove that the number of positive semidefinite 0 , 1-matrices of order n is the Bell
number Bn+1 . (Schmidt [1995])
3.3.36. (+) Use the formula for the derangement numbers to give a combinatorial proof
of the identity below.
n 2l n
n (−1)m n
∑(−1)l ( l )(2l)! ∑ m! = ∑(−1)l ( l )2n−l(n + l)! (Yu [1997])
l =0 m=0 l =0
Exercises for Section 3.3 135
3.3.37. (♦) Derivation of the Eulerian polynomial from its EGF. The nth Eulerian polyno-
mial A n , written with t as the formal variable, is defined by A n(t) = ∑¾=1 A(n , ¾)t¾ , where
n
3.3.38. Let G(x) be the EGF for graphs, indexed by number of vertices. A graph is even if
x
all vertices have even degree. Prove that 1 + ∫ G(t)dt is the EGF for even graphs, indexed
0
x
by number of vertices, and that ln(1 + ∫ G(t)dt) is the EGF for connected even graphs.
0
3.3.39. Let bn be the number of unordered binary trees with n labeled leaves (interchang-
ing the left and right subtrees of a vertex does not change the tree). The non-leaf vertices
have no labels (when n = 1 the root is a leaf). Set b0 = 0. Let B(x) be the EGF for ⟨b⟩.
(a) Prove B(x) = x + 12 B(x)2 .
n−1
(b) Use part (a) to prove bn = ∏i=1 (2i − 1).
(Comment: Equality of bn with the number of pairings of [2n − 2] is requested bijectively
in Exercise 1.3.19.) (Schröder [1870]; see also Erdős–Székely [1989])
3.3.40. (♦) Let cn be the number of ways to arrange n children in circles (holding hands)
with one child standing alone inside each circle. Each circle has at least one child (not
counting the one inside). Prove that the EGF for ⟨c⟩ is (1 − x)− x . (Stanley [1978])
3.3.41. Let an be the number of distinct matrices expressible as the sum of an n-by-n per-
mutation matrix and its inverse. Prove ∑ an x n/n! = (1 − x)−1/2 e x/2+ x /4 . (Stanley [1978])
2
3.3.42. (♦) Let G(x) be the EGF for graphs where every vertex has degree 2, indexed by
number of vertices. Let F(x) be the EGF for permutations with no fixed points or 2-cycles.
(a) Use the Exponential Formula to prove
e− x/2− x /4 e− x− x /2
2 2
3.3.46. A block is a connected graph such that the subgraph obtained by deleting any
one vertex is connected. The blocks of a connected graph are the maximal such subgraphs
(Chapter 7). A 1-vertex graph is not a block, since we take the graph with no vertices to be
disconnected. Let bn and cn count the blocks and the connected graphs with vertex set [n].
Let B(x) = ∑¾≥2 bn x n/n! and C(x) = ∑¾≥1 cn x n/n!. A rooted graph marks one vertex.
(a) Let R¾ (x) be the EGF for rooted connected graphs whose root appears in ¾ blocks.
Prove R¾ (x)/x = (R1 (x)/x)¾/¾ !. (Hint: For what is R¾(x)/x the EGF?)
(b) Let R(x) be the EGF for rooted connected graphs, so R(x) = ∑¾≥0 R¾ (x). Prove
R1 (x)/x = ∑¾≥2 b¾ R(x)¾−1/(¾ − 1)!.
(c) Conclude B (xC (x)) = ln(C (x)), where is differentiation. (Riddell [1951], Ford–
Uhlenbeck [1956]; see Harary–Palmer [1973, pp. 9–11], Stanley [1999, pp. 119–120].)
3.3.47. (♦) Fix ¾ ∈ , and let an be the number of ¾-ary ordered trees with n vertices; ¾-
ary means each vertex has 0 or ¾ children (see Definition 1.3.21).
(a) Let y(x) be the OGF for ⟨a⟩. Obtain the functional equation y = x(1 + y ¾).
(b) Use Lagrange Inversion to obtain a simple expression for an . (Hint: Note that an
is nonzero only for some n.) (see Stanley [1999, p. 175])
(c) Use part (b) to prove the formula for the Catalan numbers (yet again).
3.3.48. Let º be a formal Laurent series in y, and let ½ be a formal power series in x such
that [x0 ]½(x) = · · · = [x m−1 ]½(x) = 0 and [x m]½(x)
= 0. Generalize Lemma 3.3.33:
1 −1
[ y−1 ] º (y) = [ x ] º (½(x))½ (x).
m
3.3.49. (♦) Prove the general Lagrange Inversion Formula (Theorem 3.3.35): If á(y) and
h(y) are formal power series in y with á(0) = 1, and x = y/á(y), then h(y) expands as a
power series in x as given below. (Hint: Mimic the proof of Theorem 3.3.34.)
1 n−1
[x n]h(y(x)) = [y ]h (y)á(y)n .
n
3.3.54. (+) Given an = ∑¾ ( n−¾ ¾)b¾ for n ≥ 0, use Theorem 3.3.35 for n ≥ 1 to prove
1 2n − ¾ − 1
) ¾ a¾ .
n∑
bn = (−1)n−¾ ( (Wilf [1990, pp. 140–141])
n−1
¾
Section 3.4: Partitions of Integers 137
3.4.1. Example. Distributions of bridge hands. A card deck has 13 cards each in
“spades”, “hearts”, “diamonds”, and “clubs”. A bridge hand consists of 13 cards.
Strategy depends heavily on the distribution of a player ’s cards among suits. A
hand having 5 spades, 4 hearts, 4 diamonds, and no clubs lies in an equivalence
class with one having 4 spades, no hearts, 5 diamonds, and 4 clubs. A “5440 distri-
bution” denotes a hand with five cards in one suit and four in each of two others.
The possible bridge distributions are the partitions of the integer 13 into at
most four parts (one or more suits may have no cards). Exercise 6 compares the
probabilities of bridge distributions.
3.4.3. Theorem. The OGFs for partitions using parts in {1 , . . . , ¾}, partitions
with largest part ¾ , and all partitions are, respectively,
¾ ¾ ∞
1 1 1
∏1−x , x¾ ∏ , ∏ 1 − xi .
i 1−x i
i=1 i=1 i=1
3
1 1 1 1 A
∏ 1 − x i = (1 − x)3 1 + x 1 + x + x2 = (1 − x)3 + other terms.
i=1
1 n+2 1 17 (−1)n 1
an ,3 = ( ) + (n + 1) + + + ( n
+ ).
2n
6 2 4 72 8 9
To obtain the partial fraction expansion and complete the analysis, we must fur-
ther factor the denominator into complex linear factors, as in Proposition 3.4.4.
Note the use there of the primitive cube roots of unity. In general, 1 − xr is the
product of 1 − x over all primitive dth roots of unity over all d that divide r. (For
¾
example, 1 − x4 = (1 − x)(1 + x)(1 − ix)(1 + ix).) When we factor ∏r=1 (1 − xr), we
obtain 1 − x as a factor ⌊ /d⌋ times if is a primitive dth root.
In the partial fraction expansion, we therefore have constant multiples of
(1− x) j for 1 ≤ j ≤ /d⌋ . The contribution of a fixed dth-root
1
⌊ to the coefficient
of x in the expansion of the generating function is thus p (n) n , where p is a
n
3.4.6. Remark. A lower bound. For fixed , the number of partitions of n us-
ing parts in [] is asymptotic to n−1/( !( − 1)!) as n → ∞. When grows
√ slowly
enough with n, the formula should still
√ √
be fairly
√
accurate. With = n,
√
by Stir-
ling ’s Formula it becomes roughly n n/( n/e)2 n , which simplifies to e2 n .
This lower bound seems reasonable; not many partitions can have very large
parts. Partitions of n with largest part correspond to partitions of n − into
parts no bigger than . When is large,
√ p(n − ) is much smaller than p(n), but
there are many terms between = n and = n, so the outcome is unclear.
The
√ intuition of Remark 3.4.6 is not bad; the actual upper bound is less than
2.565 n
e , so the order of growth of the logarithm is correct. For asymptotic anal-
ysis, we treat the generating function as a power series and worry about conver-
gence. The short proof of this upper bound is due to van Lint [1974].
140 Chapter 3: Generating Functions
Proof: Let P(x) = ∑n≥0 p(n)x n = ∏≥1 (1 − x)−1 . For 0 < x < 1, we obtain a
numerical bound on ln P(x) and then use it to bound ln p(n + 1). The idea behind
this comparison is the following, using that ⟨p⟩ is increasing:
x n+1
P(x) = ∑ p()x > ∑ p()x > p(n + 1) ∑ x = p(n + 1) . (∗)
1−x
≥0 >n >n
Since P(x) is a product, it is convenient to study ln P(x). The inner sum below
is bounded by an absolutely convergent geometric series, so we can interchange
the order of summation and evaluate the new inner geometric series ∑≥1 (x j ) .
∞ ∞ ∞ ∞
x j 1 xj
ln P(x) = − ∑ ln(1 − x) = ∑ ∑ =∑ .
j j 1 − xj
=1 =1 j =1 j =1
xj x jx j −1 1 x
= < .
1 − xj j 1 − xj j1−x
∞
Since 1−x x is independent of j , we have ln P(x) < 1−x x ∑ j =1 j −2 = 6 1−x x .
2
Now combine (∗) with the bound on ln P(x) (also set u = 1−x x , so x−1 = 1 + u):
P(x)(1 − x) 2
x 1 1−x
ln p(n + 1) < ln < · + n ln + ln
xn · x 6 1−x x x
2
1
< · + nu + ln u.
6 u
√
Here we have also used ln(1 + u)√< u. Choosing u = / 6n to make the bound
small, we obtain ln p(n + 1) < 2 n/6 + ln u, as desired.
3.4.8.* Remark. Analytic methods. Various methods from complex analysis shed
light on the coefficients. If a formal power series A(x) converges absolutely when
the argument is set to some complex number in a neighborhood of the origin,
then the function is analytic in that neighborhood. Now [x n] A(x) is the residue
of A(x)/x n+1 , and the Cauchy Integral Formula yields an = 21 i ∫ C xA(x)
n+1 dx , where
C is a simple closed curve around the origin. The partition function is analytic
for | x| < 1 and has singularities at every complex root of unity on the unit cir-
cle. This leads to the asymptotic analysis of p(n). These notions are explored in
Andrews [1976, Chapter 6] and Wilf [1990, Chapter 5].
Section 3.4: Partitions of Integers 141
FERRERS DIAGRAMS
We have an OGF for the partitions of n with largest part ¾ . What about the
partitions of n with ¾ parts? In fact, these sets have the same size. This and
many combinatorial identities arise from a geometric view of partitions.
When drawn with boxes instead of dots, Ferrers diagrams are called Young
diagrams. We can cut and reassemble a diagram to turn a partition of one type
into a partition of another type. When this yields a bijection, the two types of
partitions are equinumerous. For example, we can count dots by columns instead
of by rows. This maps the partition 5,3,1,1 shown above into 4,2,2,1,1.
By Proposition 3.4.11, the OGFs for partitions with largest part ¾ and par-
titions into ¾ parts are equal. Similarly, partitions with parts in [¾] correspond
to partitions with at most ¾ parts.
Euler [1748] proved the following identity algebraically (Exercise 13):
∞ ∞
The left side is the OGF for partitions into distinct parts, and the right side is
the OGF for partitions into odd parts. The natural bijective proof presented next
shows that corresponding coefficients are equal. See Sylvester–Franklin [1882],
Pak [2006], and Exercises 14–15 for extensions.
3.4.13. Theorem. The OGF for congruence classes of triangles with integer-
length sides, indexed by perimeter, is
x3
.
(1 − x2)(1 − x3)(1 − x4)
Proof: We show that 3-part partitions satisfying the strict triangle inequality
correspond to partitions with parts in {2 , 3 , 4} and at least one 3.
For a partition of the first type, the triangle inequality ensures that the first
row of the diagram exceeds the second row by less than the length of the third.
Therefore, moving the excess to a fourth row yields a new Ferrers diagram. The
new fourth row is strictly shorter than the third, so the conjugate partition has
a 3. Since we moved all the excess, the conjugate has no 1; it uses only parts in
{2 , 3 , 4}, with at least one 3.
3
7 • • • • • • •
5 • • • • •
3 • • •
Given a partition with conjugate of the second type, this process reverses to
yield the unique partition of the first type that maps to it. Since the conjugate
has at least one 3, the excess of the largest resulting part over the second part is
less than the third part, and hence the three parts satisfy the triangle inequality.
Thus we have a bijection, and the two generating functions are the same.
Many other bijections for partitions can be found in the survey by Pak [2006];
see also Sylvester–Franklin [1882]. We close with a classical such argument to
prove another famous identity that Euler proved algebraically.
Section 3.4: Partitions of Integers 143
Proof: (possibly due to Durfee) We prove that both expressions enumerate self-
conjugate partitions (those unchanged by transposing the diagram). To do this,
we cut the diagram of a self-conjugate partition in two ways.
The coefficient of x n in ∏(1 + x2i−1) counts partitions of n into distinct odd
parts. In a self-conjugate partition, grouping dots by the smaller coordinate cuts
the Ferrers diagram into L-shapes as on the left below. Corresponding rows and
columns have the same length and share a diagonal dot, so each piece has odd size.
Also, the sizes are distinct. Conversely, a partition into distinct odd parts yields
the self-conjugate partition that generates it by bending each part in the middle.
Hence ∏(1 + x 2i−1) is the OGF for self-conjugate partitions.
• • • • • • • • • • • • • • • •
• • • • • • • • • • • •
• • • • • • • • • • • •
• • • • • • • • • •
• • • • • • • •
• • • • • •
• •
• •
Each self-conjugate partition has some number ¾ of dots on the diagonal. The
largest square in the diagram (the “Durfee square”) has ¾ 2 dots. In the example
above, ¾ = 4. The number of dots at any distance to the right of the Durfee square
is the same as the number below it, so grouping the remaining dots by distance
from the square partitions them into even parts. These parts do not reach the
diagonal, so they are at most 2 ¾ . Thus the OGF for self-conjugate partitions with
Durfee square of size ¾ is the term for ¾ on the right side of the identity (¾ = 0
yields the one partition of 0). Summing over ¾ completes the proof.
garian”) from the set of partitions of n to itself. Since the set is finite, repeated
moves must eventually reach a cycle.
When n is a triangular number (having the form (¾+2 1 )), it is easy to see that
the partition ¾ , ¾ − 1 , . . . , 1 is fixed under B, and such partitions are the only
fixed points (Exercise 48). More surprising is that when n = (¾+2 1 ) this is the only
cycle. Brandt [1982] proved this and described all the cycles for all values of n (we
will count them in Application 4.2.22). Akin–Davis [1985] discussed the proof in
terms of dynamical systems.
Similar processes studied in Akin–Davis [1985], Cannings–Haigh [1992],
Yeh [1995], Servedio–Yeh [1995], Broline–Loeb [1995], and Griggs–Ho [1998]
were called Austrian solitaire, Montreal solitaire, Carolina solitaire, etc.
3.4.17. Example. The key to understanding B is to form the diagram for B(ë) in
another way. A slant in the diagram is a set of positions (i , j) having the same
value of i + j (the top left position is (1 , 1)). The ¾ th slant, counting from the
upper left, has ¾ possible positions.
Consider B(7 , 6 , 3 , 3) = (6 , 5 , 4 , 2 , 2). When T has s rows, B(T) gains s as a
part. We can produce the new diagram by putting the dots taken from the start
of each row as a new top row. We then move each subsequent column up by one
row (see the middle diagram below), and s appears as a part in the correct position
(indicated by the circled dot). Since dots moved from the left to the top, all dots
in the first s columns that were in the ¾ th slant remain in the ¾ th slant, and dots
in the later columns move to the (¾ − 1)th slant. One can equivalently say that
every slant rotates down by one position, except that when this leaves dots with
a gap above them they move up into the previous slant.
• • • •
• • • • • • • • • • • • • • • • • • •
• • • • • • • • • • • • • • • •
• • • → • • • • • •
• • • • • • •
• •
Section 3.4: Partitions of Integers 145
Many of the classical counting problems can be phrased in the context of dis-
tributions of objects into boxes. There are conditions on the objects, the boxes,
and the allowed distributions. We use a uniform notation with ¾ being the num-
ber of objects and n being the number of boxes.
A distribution of ¾ distinct objects into n distinct boxes is a function º : [¾] →
[n], assigning a box to each object. We use all ¾ objects, but boxes may be empty.
It suffices to list º (1) , . . . , º (¾) in order. Thus the distributions correspond to
words of length ¾ from n letters.
When the order of letters is unimportant, words using the same multiset of
letters are equivalent, and we count the equivalence classes (the multisets). The
word model is now less natural than the distribution model using ¾ indistinguish-
able (or “identical”) objects.
Making boxes indistinguishable yields another equivalence relation: a distri-
bution groups the objects without labels on the groups. This yields partitions of
the set [¾] into (at most) n blocks. When the objects also are identical, a distri-
bution just groups ¾ identical dots and forms a partition of the integer ¾ into (at
most) n parts. The number of blocks or parts is exactly n when we restrict to dis-
tributions that use all the boxes. We can also restrict distributions by allowing
only one object in each box.
We obtain twelve distribution problems, in an array called “ The Twelvefold
Way”. Indexing the rows, distributions may be Unrestricted, Injective (at most
one per box), or Surjective (no box empty). Indexing the columns, objects may be
Distinct or Identical, and boxes may be Distinct or Indistinguishable, Stanley
[1986] publicized the table, attributing the idea to G.-C. Rota and the term to
Joel Spencer, suggested by the Eightfold Way of Buddhism. Where possible, we
146 Chapter 3: Generating Functions
References
In the second part of the table (below), our model here of distributing ¾ ob-
jects into n boxes exchanges the meanings of n and ¾ that were used in the text
for surjective distributions or partitions of integers. For Stirling numbers of the
second kind, we thus write S¾ ,n here; written in second position, n is the num-
ber of blocks. For partitions of an integer with a restricted number of parts, the
first argument is always the integer being partitioned.
Section 3.4: Partitions of Integers 147
∑¾≥0 B¾ x¾/¾ ! = ee − 1
x 1
∑¾≥0 p¾ ,n x¾ = Πin=1 (1 − xi)
¾ −1
B¾ = ∑i=0 (¾−i 1) Bi p¾ ,n = p¾− n ,n + p¾ ,n−1
I 1 way if ¾ ≤ n 1 way if ¾ ≤ n
≤1 0 ways if ¾ > n 0 ways if ¾ > n
≥1 ∑¾≥0 S¾ ,n x¾/¾ ! = 1
n!
(e x − 1)n
xn
x n
∑¾≥0 p¾ ,n x¾ = Πin=1 (1 − xi)
∑¾≥0 S¾ ,n x¾ = Πn (1 − ix)
i =1
S¾ ,n = S¾−1 ,n−1 + nS¾−1 ,n p¾ ,n = p¾− n ,n + p¾−1 ,n−1
References
UDI: Exercise 3.3.31 UII Theorem 3.4.3
IDI: trivial III: trivial
SDI: Theorem 3.3.11 SII: Theorem 3.4.3
Bogart [1990] expanded the table to 18 cells by also considering the order of
distinct elements within a box. Arrangements of ¾ flags on n flagpoles, counted
by the rising factorial n(¾) , are distributions of ¾ distinct objects into n distinct
boxes (cell UDD), where in addition order of objects within the boxes matters.
Similarly, permutations of [¾] with n cycles arise by putting ¾ distinct ob-
jects surjectively into n identical boxes (cell SDI) and then cyclically arranging
within each box. Hence c(¾ , n) is not in our table.
Permutations of [¾] with n runs (Theorem 3.1.26) can be viewed as surjec-
tive distributions of ¾ objects into n boxes, but the largest object in one box must
exceed the smallest object in the next. When constraints involve more than one
box, the distribution language is not very useful.
Proctor [2006] suggested increasing the number of cells to 24 and then 30.
His first augmentation allowed an arbitrary number of boxes, thus introducing
the Bell numbers and the total number of partitions of an integer. His other
augmentation, suggested by Brylawski, specified multiplicities within boxes, in-
troducing multinomial coefficients.
A summary of Proctor ’s table with links to the relevant counting sequences
appears in the index of Sloane ’s On-Line Encyclopedia of Integer Sequences at
http://oeis.org. We consider only the Twelvefold Way because we seek only an
overview of basic results to show some of the relationships among them.
148 Chapter 3: Generating Functions
EXERCISES 3.4
3.4.1. (−) Count the partitions of 30 into 1s and 3s using an odd number of 3s. Express
the answer using generating functions. Verify the answer by describing these partitions
explicitly.
3.4.2. (−) In how many ways can a roll of five ordinary six-sided dice of different colors
sum to 20? How many distinguishable ways if the dice are identical? (It suffices to give
answers using generating functions.)
3.4.3. (−) Build a generating function to count the positive integer solutions to ∑i=1 ei = ¾
n
(c) Obtain the generating function for ⟨a⟩ from the recurrence.
3.4.20. With an as in Exercise 3.4.19, prove an = an−2 + ⌊ n/3⌋ − ⌊ n/4⌋ for n ≥ 2. Find the
generating function ∑n≥0 ⌊ n/¾ ⌋ x n , and use it to find the generating function ∑ n≥0 an x n .
∞ ∞
3.4.22. Let A(x) = ∑n=0 an x n/n! and B(x) = ∑n=1 bn x n/n!. Given a partition ë of the
integer n, let ei be the number of parts equal to i in ë. Prove
∞
n! ∏ bë j ⎞ x n
n
⎛
A(B(x)) = a0 + ∑ ∑ a¾ · ∑ ,
n=1
⎝ ¾ =1 ∏i(i!)ei (ei !) ⎠ n!
where the inner sum is over partitions ë of n with ¾ parts.
3.4.23. (♦) Let an be the total number of 2s over all partitions of n. Let bn be the total
number of nonrepeated parts over all partitions of n − 1. For n ≥ 1, both sequences begin
(0 , 1 , 1 , 3 , 4 , . . .). Prove an = bn for all n by showing that for each sequence the OGF is
∞
1 − x 2 ∏ i =1 1 − x i
x2 1
. (Deutsch [2006])
150 Chapter 3: Generating Functions
∞ ¾ + 1 −1 ∞
3.4.24. (♦) Use partitions to prove ∑¾=0 x2 ∏ j =¾+1 (1 + x2 −1) =
j x
1− x
. (GCHQ Problem
Solving Group [2018])
3.4.25. (♦) Prove ∑ ∏ j ≥1 ( ëë j ) = 2 n−1 , where the sum is over all partitions ë of n (when
j +1
ë has ¾ parts, by convention ë ¾+1 = 0). (Beckwith [2011])
3.4.26. For a partition ë, let m(ë) denote the total number of parts, and let mi(ë) denote
the number of parts equal to i. Prove
m(ë)!
∑∏ mi ( ë)!
= 2n − Fn ,
i
where the sum is over all partitions of n + 1 having at least one 1 and F n is the nth classical
Fibonacci number. (Merca [2014a])
3.4.27. (♦) Let p(n , m) be the number of partitions of n with m parts, and let H(x , t) =
∑m ,n p(n , m)xn tm .
∞
(a) Prove H(x , t) = ∏¾=1 1 −1x¾ t .
(b) Let º (n) be the sum, over all partitions ë of n, of the number of parts in ë. Let
¾
F(x) = ∑n≥0 º (n)x n . Prove F(x) = ∑¾≥1 1 −x x¾ P(x), where P(x) = ∑n≥0 p(n)x n with p(n)
being the number of partitions of n. (Stanley [2014])
3.4.28. (♦) A double-partition of the integer n consists of two partitions ë and Þ such
that min{ ë i , Þi } ≥ max{ ë i+1 , Þi+1 } for all i (trailing zeros added as needed) and ∑ ë i +
∑ Þi = n. Note that the numbers of nonzero parts in ë and Þ must differ by at most 1.
Interchanging ë and Þ yields a different double-partition when ë and Þ are distinct. Let
a¾ ,n be the number of double-partitions of n such that ë and Þ each have at most ¾ parts.
∞ ¾ 2¾
Let A¾(x) = ∑n=0 a¾ ,n x n . Prove A¾(x) = ∏i=1 (1 + x2i−1)/ ∏i=1 (1 − xi). (Hint: Use induction
on ¾ .) (Corteel–Savage)
3.4.29. (♦) Let ë and Þ be integer partitions, and let ë∗ and Þ∗ be their conjugates. By
counting a set in two ways, prove ∑i , j min{ ë i , Þj } = ∑¾ ë∗¾ Þ∗¾ .
3.4.30. (+) Let n be a positive integer. For each positive integer ¾ , let q¾ = ⌊ n/¾⌋ , let
r¾ = n − ¾ q¾ , and let º (¾) = ( q2¾ )¾ + r¾ q¾ . Prove combinatorially that º (¾) ≥ º (¾ + 1) for all
¾ ∈ . (Hint: For each ¾ , create a Ferrers diagram for a partition of n in which º (¾) counts
something. Transform the diagram for ¾ into the diagram for ¾ + 1 by small changes that
don’t increase º .) (Griggs)
3.4.32. (♦) Prove the variation of Euler ’s Identity for all partitions.
∞
x¾
2
1
∏ 1 − xi =1+∑
(1 − x)2(1 − x2)2 · · · (1 − x¾)2
i =1 ¾ ≥1
3.4.33. (♦) Prove the variation of Euler ’s Identity for partitions into distinct parts.
∞
x¾(¾+1)/2 y ¾
∏(1 + xi y) = 1 + ∑ (1 − x)(1 − x2) · · · (1 − x¾)
i =1 ¾ ≥1
Exercises for Section 3.4 151
3.4.34. With mi being the number of copies of i in a partition , let ( ) = 1 / ∏i≥1 mi !imi .
Prove for n ∈ that the sum of ( ) over partitions of n equals 1. (Stanley [1986])
3.4.35. Rogers–Ramanujan partitions are partitions into distinct parts that do not
use two consecutive integers as parts. For n > 1, prove that at least half of the Rogers–
Ramanujan partitions of n do not use 1 as a part. (Andrews [1997a])
n−1
3.4.36. (♦) For n ∈ , let P(n) = ∑i=0 p(i), where p(i) counts all partitions of i.
(a) Consider a set S of marbles consisting of one black marble and n − 1 white marbles.
White marbles are indistinguishable from one another. Prove that P(n) is the number of
distinguishable partitions of S.
(b) Prove that P(n) is the sum, over all partitions of n, of the number of distinct parts
in the partition. The count is one for 4, 2 + 2, and 1 + 1 + 1 + 1, and it is two for 3 + 1 and
2 + 1 + 1, so the sum is 7 when n = 4. (G. Beck)
3.4.37. (+) In a Dyck n-path (Example 1.3.27), a peak is a consecutive pair UD; its height
is the y-coordinate reached between its U and D. Counting the peak heights with multi-
plicity yields the peak multiset: for example, the peak multiset of UDUDUD is {1 , 1 , 1}.
Prove that the number of distinct multisets that occur as peak multisets of Dyck n-paths
n−1
is 2 n − 1 − ∑¾=1 p(), where p() is the number of partitions of . (Callan–Deutsch [2012])
• • • • • • • • •
• •
• • • • • • • • • • •
• • • •
• • • • • • • • • • •
• • • • •
• • • • • •
m−1
(Comment: “Pentagonal Number Theorem” arises from writing (m) as ∑ j =0 (3 j + 1). The
sum counts dots arranged pentagonally as on the right above, so (m) is a pentagonal num-
m−1 m−1
ber. Similarly, ∑ j =0 (j + 1) is a triangular number and ∑ j =0 (2 j + 1) is a square number.)
(Hint: For n ≥ 0, let an be p(n) minus the right side of the identity. Prove ∑n≥0 an x n = 1.)
(b) Prove ∑ j ≥1 (−1) j qj (n − (j)) = 0, where qj () is the number of partitions of not
having j or 2 j as a part. (For n = 9, we compute − q1(9) + q2(6) − q2(0) = −4 + 5 − 1 = 0.)
(Andrews [1997b])
152 Chapter 3: Generating Functions
n+ j
3.4.40. (♦) The Gaussian polynomial [mm+ n] q is defined by [ mm+ n]q = ∏ j =1 11−−qq j .
m
(a) Let pm ,n; ¾ be the number of partitions of ¾ into at most m parts of size at most n.
Prove pm ,n; ¾ = pm−1 ,n; ¾ + pm ,n−1; ¾− m .
(b) For fixed m and n, prove ∑¾ pm ,n; ¾ q¾ = [mm+ n] . Conclude that [ mm+ n] is a polynomial
q q
and is symmetric in m and n.
3.4.41. Letting mi be the number of parts equal to i in a partition , prove for n ∈ that
∏ ë (∏¾≥1 m¾ ) = ∏ ë (∏ j ≥1 mj !) , where each outer product is over all partitions of n. For
example, the values of both sides for 1 ≤ n ≤ 4 are 1 , 2 , 6 , 96, respectively. (Hint: Show
that the logarithms of both sides are equal.) (Kirdar–Skyrme [1982], Hoare [1986])
3.4.42. (♦) A corner of a partition is a dot in its Ferrers diagram that is the last dot in its
row and in its column. Let ( ) denote the number of corners in a partition , and let (n)
denote the set of all partitions of n.
(a) Prove ∑ ë∈(n) ( ) = |(n − 1)| + ∑ ë∈(n−1) ( ).
(b) Conclude ∑n≥0 ∑ ë∈(n) ( )x n = 1 −x x ∏i≥1 1 −1xi . (Pak [2006])
3.4.43. (♦) Let and be conjugate partitions, with trailing zeros added. Prove that the
infinite multisets { i + i: i ≥ 1} and { i + i: i ≥ 1} are the same. (Knuth [2018])
3.4.44. (+) Prove that the number of partitions of n equals the number of partitions (of all
integers) into distinct parts whose odd-indexed parts sum to n. For example, the partitions
of 4 are 4, 3 + 1, 2 + 2, 2 + 1 + 1, and 1 + 1 + 1 + 1, and the partitions into distinct parts
whose odd-indexed parts sum to 4 are 4, 4 + 3, 4 + 2, 4 + 1, and 3 + 2 + 1. (Schmidt [1997])
3.4.45. (+) Let t(n) be the number of unordered factorizations of n into divisors greater
∞
than 1 (for example, t(12) = 4). Prove ∑n=2 t(n)/n2 = 1. (Beckwith [1998])
3.4.46. Let A be an m-by-n integer matrix. Given 1 , . . . , m with n ≥ 1 ≥ · · · ≥ m ≥ 0,
ë
let A( ) = ∑i=1 ∑ j =i 1 ai , j . A move subtracts 1 from some entry and adds 1 to the next
m
entry rightward or below or to no entry. Prove that some sequence of moves reduces A to
the zero matrix if and only if A( ) ≥ 0 for all such . (Bennett [1992])
3.4.47. Let be a function defined on the subsets of [n] by letting (S) = S ∪ {1} if 1 ∈
/S
and (S) = [n] − { − 1: ∈ S} if 1 ∈ S. Show that 2 has a unique fixed point S∗ reached
by iterating from any initial set S. (Huang–Scully [2003])
3.4.48. (♦) Determine all the partitions that are fixed points in Bulgarian solitaire.
3.4.49. (♦) Determine the number of steps in Bulgarian solitaire needed to turn the posi-
tion consisting of a single pile of size n into a position on a cycle. For example, 5 → 41 →
32 → 221 → 311 → 32, so the answer is 2 when n = 5. (Cranston–West [2013])
3.4.50. For ≥ 3, let be the partition of (¾+2 1 ) whose parts are two copies of − 1, two
copies of 1 , and one copy each of 2 through − 2. Prove that Bulgarian solitaire takes
( − 1) steps to reach the “staircase” partition from . (Griggs–Ho [1998])
3.4.51. For a partition , let d( ) be the number of moves of Bulgarian solitaire needed to
reach a partition that lies on a cycle when starting from .
(a) Prove that if the Ferrers diagram for is contained in the Ferrers diagram for ,
then d( ) ≤ d(). (Akin–Davis [1985])
(b) As stated in Remark 3.4.16, d( ) ≤ ( − 1) when is a partition of (¾+2 1 ) (Exercise
3.4.50 shows that this is sharp). Conclude that d( ) ≤ ( − 1) when is a partition of n
with (¾2) < n < (¾+2 1 ). (Igusa [1985], Bentz [1987], Etienne [1991], Griggs–Ho [1998])
Chapter 4
Further Topics
The topics in this chapter exhibit common themes of indirect counting
techniques and applications to permutations and lattice paths. The Inclusion-
Exclusion Principle gives a combinatorial explanation for many alternating sums,
while the P ólya–Redfield method counts equivalence classes of objects made indis-
tinguishable by symmetry operators. Young tableaux, which arise in the theory
of representations of symmetric groups, have surprising connections to permuta-
tions and sorting.
The first column overcounts each element in more than one Ai . An element in any
two sets is cancelled by subtracting the intersection, but this completely cancels
elements in all three sets. We correct by adding back the number of elements in
all three sets. Now every element of the union is counted exactly once.
For example, the derangements of [n] are the permutations of [n] with no
fixed points. If Ai is the set of permutations that fix element i, then Dn =
### n A ###. Similarly, surjective distributions of objects into boxes are the distri-
##⋂i=1 i ##
butions with no box empty, and the numbers in [m] relatively prime to m are the
numbers not divisible by any prime factor of m. We will discuss all of these.
Consider the Venn diagram of sets A1 , . . . , An in a universe U. In addition
to counting the elements in the region outside all the circles, we may want to
count the elements in any given cell. The cell corresponding to the index set T
for T ⊆ [n] consists of the elements that are in Ai for i ∈ T and are not in Ai for
i∈/ T . We introduce precise notation for these concepts.
U
A3 º (∅)
º (3)
º (13) º (23)
º (123)
A1 A2
º (1) º (12) º (2)
The notation here echoes the meaning. Often A1 , . . . , An are defined by spec-
ified properties for the elements, so P(x) indexes the Properties satisfied by x.
Also, º (T) counts the elements with a º ixed property set T , while ½(S) counts
those whose property set is ½ reater than or equal to S. We drop set brackets and
commas in the arguments of º and ½ when specifying a particular subset of [n].
Section 4.1: The Inclusion-Exclusion Principle 155
The relationship between ½ and is (S) = ∑ T ⊇S (T). That is, ⋂i∈S Ai con-
sists of the elements of U belonging to Ai for i ∈ S and possibly to other sets
also. Thus (1) = | A1 | = (1) + (12) + (13) + (123) and (12) = | A1 ∩ A2 | =
(12) + (123) when n = 3 and the sets are A1 , A2 , A3 . We use (S) and ####⋂i∈S Ai ####
# #
interchangeably.
In many settings, #####⋂i∈S Ai ##### is easy to compute directly but (T) is not. For
# #
example, in the derangements problem ####⋂i∈S Ai #### = (n − | S|)!, because after fixing
the elements indexed by S we can permute the remainder arbitrarily, not caring
whether other elements also become fixed points.
When (S) is easy to compute, we want to invert the relationship (S) =
∑ T ⊇S (T) to compute (T) using values of (S). This is like inversion princi-
ples in Chapter 3 for sequences ⟨a⟩ and ⟨b⟩; now values are indexed by subsets of
[n] instead of by 0 . (Notation such as N(S) and N ∗(S) or N=(S) and N≥(S) has
been used, but and better suggest the more general context of inversion.)
The next theorem provides a formula for the inversion. The proof uses the
observation that a nonempty finite set has the same number of subsets of even
size and odd size.
Most applications need (∅), given by (∅) = ∑S⊆[n](−1)| S| #####⋂i∈S Ai #####. We start
# #
with | U | and next subtract the sizes of the sets Ai , letting ####⋂i∈∅ Ai #### = |U |. Treat-
ing ⋂i∈∅ Ai as U makes sense because intersection over no sets should be the “in-
tersective identity” U ; every element is in all of “none of the sets”.
One of the earliest applications counts the elements of [m] relatively prime
to m (the number 1 is included). The resulting value (m) is the Euler totient;
the function is studied extensively in number theory (see Exercises 15–16).
Proof: Within the universe [m], let Ai be the set of multiples of pi . The numbers
relatively prime to m are those in none of A1 , . . . , An . To apply the inclusion-
exclusion formula, we compute #####⋂i∈S Ai #####. The numbers divisible by all of {pi : i ∈
# #
S} are those divisible by ∏i∈S pi , and thus ####⋂i∈S Ai #### = m/∏i∈S pi .
4.1.5. Remark. (1) In the PIE formula, the sets with a given size all contribute
with the same sign. Letting h¾ be the sum of #####⋂i∈S Ai ##### over all S with size , we
can write the formula as (∅) = ∑¾=0 (−1)¾ h¾ .
n
(2) With h¾ defined in this way, the value h¾ does not equal the number of el-
ements lying in at least of the sets. The sum overcounts elements lying in more
than sets.
(3) In many applications (not Proposition 4.1.4), ####⋂i∈S Ai #### depends only on | S|.
# #
The sets of size all make the same contribution, and the sum with 2 n terms
becomes a sum with n + 1 terms involving binomial coefficients. Letting ¾ be the
# #
common value of ####⋂i∈S Ai #### when | S| = reduces the formula to
n
n
(∅) = ∑(−1)¾ ( ) ¾ .
¾ =0
4.1.6. Example. Multisets with restricted usage. A girl has red, white, and blue
marbles and wants to bring 20 to school. In how many ways can she do this? When
20 marbles of each color are available, the multiset formula yields (202+2 ) ways. If
she has only seven of each, then we must discard multisets having at least eight
of the same color.
Let am ,n ,r be the number of multisets of size m from n types of elements using
fewer than r of each type. These correspond to the integer solutions to x1 + · · · +
x n = m such that 0 ≤ x i < r for each i.
Let U be the set of all multisets of size m from n types: | U | = (mn+−n1−1). For 1 ≤
i ≤ n, let Ai be the subset of U where type i violates its limit. These correspond to
x i ≥ r in the integer-sum model. Since the units being distributed are identical,
we can count such solutions by reserving r units for x i and distributing the rest
arbitrarily. Thus | Ai | = (m−nr−+1n−1). This may include distributions where other
constraints also are violated.
Violating constraints leaves m − r units to distribute. Thus ####⋂i∈S Ai #### =
# #
(m−|Sn|−r+1 n−1), which depends only on | S| . By inclusion-exclusion,
n m − r + n − 1
n
am ,n ,r = ∑(−1)¾ ( )( ).
¾ =0
n−1
4.1.7. Theorem. The formula for S(n , ¾), the number of partitions of an n-
element set into ¾ blocks, is
¾
1 ¾
S(n , ¾) =
¾! ∑(−1)i ( i )(¾ − i)n .
i=0
Proof: In each partition, the blocks are distinguished by their elements, so there
are ¾ ! distinguishable ways to index the blocks. Hence we can compute ¾ !S(n , ¾)
by counting surjective distributions of [n] into ¾ labeled blocks.
Altogether there are ¾ n distributions of [n] into ¾ labeled blocks with blocks
allowed to be empty. Let A j be the subset in which block j is empty. Given a set
S of blocks required to be empty, we distribute [n] arbitrarily into the remaining
# #
blocks. Hence ####⋂ j ∈S A j #### = (¾ − i)n whenever | S| = i. Combining the terms for sets
# #
of the same size yields, as desired,
¾
¾
¾ !S(n , ¾) = º (∅) = ∑(−1)i ( )(¾ − i)n .
i
i=0
4.1.8. Example. PIE evaluation of sums. Consider the sum ∑¾=0(−1)¾ (¾n)c¾ . If
n
the sum is the inclusion-exclusion formula for the number of elements outside
some sets A1 , . . . , An in a universe U , then counting those elements in another
way gives the value of the sum.
To fit this model, we need |U | = c0 and | Ai | = c1 ; we seek natural sets with
these sizes. Some creativity may be needed. The sets must be chosen so that also
c¾ = ####⋂i∈S Ai #### whenever | S| = ¾ .
# #
For example, when c¾ = 2 n−¾ , we seek a universe of size 2 n , such as the subsets
of [n]. To obtain | Ai | = 2 n−1 for 1 ≤ i ≤ n, let Ai consist of the subsets containing
# #
i. Now ####⋂i∈S Ai #### = 2 n−|S| , as desired. Hence the sum counts the subsets of [n] out-
side all of A1 , . . . , An . These are precisely the subsets containing no elements.
The only such set is the empty set, so ∑¾=0(−1)¾ (¾n)2 n−¾ = 1. (In the language of
n
the Binomial Theorem, we have just proved that (−1 + 2)n = 1.)
Similarly, in ∑¾=0(−1)¾ (n¾ ), each c¾ is 1. The sum counts by inclusion-
n
exclusion the items in a universe U of size 1 that belong to none of n sets each
equal to U. There is no such item if n > 0 and one such if n = 0, so the sum is 0 if
n > 0 and 1 if n = 0. We have counted a set both by PIE and directly.
Proof: (Stanley; see Bóna [2004, p. 8–9]) Let U be the universe of barred permu-
tations of [n] with bars, defined in the proof of Theorem 3.1.25 to be permu-
tations of [n] in word form with bars inserted, having at least one bar at the
end of each run. We showed there that |U | = n ; the elements correspond to dis-
tributions of [n] into boxes, since the numbers placed immediately before any
bar must be written in increasing order. The A(n , ) permutations with exactly
runs are the elements of U having one bar at the end of each run and no others.
A barred permutation with bars but fewer than runs may have excess
bars in any of the n + 1 positions. For 1 ≤ j ≤ n + 1, let A j be the set of elements
of U having at least one excess bar in the jth position. Since (∅) = A(n , ), it
suffices to show that the sum is the inclusion-exclusion computation for (∅).
For S ⊆ [n + 1], we count the barred permutations having at least one excess
bar in each position indexed by S. When | S| = i, form a barred permutation with
− i bars and then add one bar at each position indexed by S. Bars are identical,
so there is no distinction between the bars distributed in the two steps.
# #
For | S| ≤ , we have ####⋂ j ∈S A j #### = ( − | S|)n , since there are ( − i)n barred
# #
permutations of [n] with − i bars. When | S| > , the value is 0, because no
barred permutation with bars has excess bars in more than positions. Hence
the sum stops at even though we avoid n + 1 sets.
4.1.11.* Application. For a set S of edges in a graph G, let c(S) be the number of
components in the subgraph with vertex set V(G) and edge set S. For the number
G() of proper colorings of G using colors in [],
G() = ∑ (−1)| S| c(S) .
S ⊆ E(G)
Section 4.1: The Inclusion-Exclusion Principle 159
Proof: The universe U of unrestricted colorings is the set of all functions from
V(G) to [¾]; this has size ¾ n , where n = | V(G)|. Let Ai denote the set of colorings
in which the vertices of the ith edge have the same color. We want to count the
colorings belonging to none of these sets.
# #
To apply inclusion-exclusion, we compute ####⋂i∈S Ai ####. Let H be the subgraph of
G with vertex set V(G) and edge set S. A coloring in ⋂i∈S Ai makes each edge of H
monochromatic. If x and y are the ends of a path in H , then by transitivity x and
y have the same color. Thus all vertices of a component of H (a maximal connected
subgraph) have the same color. The color can be chosen in ¾ ways, independently,
# #
on each component of H. Thus ####⋂i∈S Ai #### = ¾ c(S) , as claimed.
In a graph G with n vertices and m edges, subgraphs with vertex set V(G)
are spanning subgraphs. Spanning subgraphs with one edge have n − 1 com-
ponents; those with more edges have fewer components. Thus Application 4.1.11
shows that G() is a polynomial in with leading terms n − m n−1 ; it is called
the chromatic polynomial of G. Exercises 36–38 concern chromatic polynomi-
als and their properties.
• •
RESTRICTED PERMUTATIONS
4.1.13. Theorem. The formula for Dn , the number of derangements of [n] (per-
mutations with no fixed points), is
n
(−1)¾
Dn = n! ∑ .
!
¾ =0
160 Chapter 4: Further Topics
4.1.17. Remark. The rook polynomial factors when a board B decomposes into
sub-boards B1 and B2 occupying distinct rows and distinct columns. Since ¾ rooks
on B must consist of j on B1 and ¾ − j on B2 , and rooks on the two sub-boards cannot
attack each other, the rule for multiplying OGFs yields RB(x) = RB1 (x)RB2(x). For
example, we compute RB(x) for the board in Example 4.1.14 as (1 + 3x + x2)(1 + 2x),
which equals 1 + 5x + 7x 2 + 2x3 .
To compute r¾ (B) in general, group rook placements by whether they occupy
a fixed square s in B. Deleting s from B yields a board B − s, and deleting the
entire row and column containing s yields a board we write as B · s. Counting the
placements of ¾ rooks by whether they use s yields r¾ (B) = r¾ (B − s) + r¾−1 (B · s).
Note that r0(B) = 1 for every board and r¾ (∅) = 0 for ¾ > 0. Multiplying by x¾
and summing where the recurrence is valid (¾ ≥ 1) yields RB(x) − 1 = RB− s(x) −
1 + xRB· s(x). Thus
RB(x) = RB− s(x) + xRB· s(x).
An extensive classical treatment of rook polynomials appears in Riordan
[1958]. See also Exercises 50–54.
∑ ºp x = ∑(x − 1)¾ h¾ .
p
p=0 ¾ =0
Proof: As in Theorem 4.1.3, we show that each element contributes the same
to both sides. For a ∈ U , the contribution of a to the left side is x p , where p =
|{i ∈ [n]: a ∈ Ai}|. Since the number of ¾-subsets of { A1 , . . . , An} whose intersec-
tion contains a is (¾p), element a contributes (¾p) times to h¾ . Hence a contributes
∑¾=0(x − 1)¾ (¾p) to the right side. Since (¾p) = 0 for ¾ > p, the sum is x p by the
n
Binomial Theorem.
4.1.21. Example. Problème des ménages (Lucas [1891]). The hosts of a party with
n male/female couples want to seat men and women alternately at a circular ta-
ble with no spouses adjacent. Index the couples 1 , . . . , n by the circular ordering
of sex A. Let position i be the position between Ai and Ai+1 . Neither Bi nor Bi+1
is allowed to sit there. Acceptable seatings of B1 , . . . , Bn now correspond to per-
mutations of [n] not having i or i + 1 in position i for any i (modulo n).
•
• 1 •
•4 2 •
• 3 • s
•
Section 4.1: The Inclusion-Exclusion Principle 163
To count the allowed seatings, compute r¾ (B) with this board of forbidden
positions. Applying the recurrence to the square s in the lower left yields two
zig-zag boards; we must place ¾ rooks on a board with 2n − 1 positions or ¾ − 1
rooks on a board with 2n − 3 positions.
Instead of continuing the recurrence, note that l non-attacking rooks on a zig-
zag board with m positions correspond to a 0 , 1-string of length m with l copies
of 1, no two consecutive. These strings arise from an all-0 string of length m − l
by choosing l distinct places to insert a 1. There are (m−ll+1) such choices.
With (m , l) set to (2n − 1 , ¾) or (2n − 3 , ¾ − 1), the computation yields r¾ (B) =
(2n¾−¾ ) + (2n¾−−¾1−1 ) = 2n2n−¾ (2n¾−¾ ). Having seated one sex, the enumerator of arrange-
ments by number of consecutively-seated couples is
n
2n 2n − ¾
∑ 2n − ¾ ( )(n − ¾)!(x − 1)¾ .
¾
¾ =0
SIGNED INVOLUTIONS
FÌ • • • • X+
GÌ • • • • X−
Interchanging the first two elements in the word form changes the parity.
Repeating the transposition changes it back. Thus we have a signed involution
with X = Ën , where X + and X − are the sets of even and odd permutations, re-
spectively. There are no fixed points unless n = 1.
where X is the set of ordered pairs (x , S) such that x ∈ U and S ⊆ P(x). The
contribution is +1 for even | S| and −1 for odd | S| . Partition X into X + and X − by
the parity of | S| . To apply Proposition 4.1.24, we need a signed involution with
respect to (X + , X −) whose fixed points lie in X + and correspond to the elements
of U outside all the sets (those with P(x) = ∅). Proposition 4.1.24 then proves the
inclusion-exclusion formula.
Given a pair (x , S) ∈ X , view the elements of S as marked elements of P(x).
Let Ì operate on elements of X by switching whether the largest element of P(x)
is marked, if any element of P(x) exists. That is,
⎧
⎪ (x , S) if P(x) = ∅ ,
Ì(x , S) = ⎪⎨⎪ (x , S − i)if i = max P(x) ∈ S,
⎪
⎩ (x , S ∪ i) if i = max P(x) ∈
/ S.
Applying Ì again acts on the same element of P(x) and returns us to (x , S).
Hence Ì is an involution. It is a signed involution relative to (X + , X −), be-
cause Ì changes the parity of | S| when it makes a change. The fixed points are
{(x , ∅): P(x) = ∅}. These lie in X + and correspond bijectively to the elements of
U outside all of A1 , . . . , An .
4.1.26. Proposition. (Deutsch [2005]) For a fixed convex n-gon, if e n and on count
the dissections by nonintersecting diagonals into an even or an odd number
of bounded regions, then e n − on = (−1)n .
Proof: Let the parity of a dissection be the parity of the number of regions. If a
signed involution Ì pairs dissections with opposite parity, then e n − on is the num-
ber of even fixed points minus the number of odd fixed points. Adding or deleting
one diagonal changes the parity; we want Ì to do this and repeating Ì to undo it
by changing the same diagonal.
Let v1 , . . . , vn be the vertices in order around the n-gon. If the diagonals
incident to vn are not all present, then let ¾ be the index before the first non-
neighbor of vn (if any exists), and let l be the index of the next actual neighbor
of vn . (For example, when no diagonals are present, there is only one region and
(¾ , l) = (1 , n − 1).) Define Ì by inserting v¾ vl if it is missing and removing v¾ vl if
it is present. When Ì inserts an edge, no existing edge crosses it, so the image is
indeed a dissection.
The dissection is unchanged by Ì if and only if ¾ and l are undefined, meaning
that vn is adjacent to all the other corners and there are n − 2 regions. When Ì
produces a change, the parity changes. Because Ì does not change the set of edges
incident to vn , the values ¾ and l for a dissection are the same as for its image
under Ì . Thus repeating Ì changes the presence of the same diagonal, restoring
the original dissection.
We have shown that Ì pairs even and odd dissections except for the one fixed
point, whose parity is the same as the parity of n.
vn v1
• •
• • v2
vl • • v¾
• •
4.1.27. Example. We know how to count lattice paths using binomial coefficients.
Consider disjoint pairs of lattice paths with specified endpoints. For example,
with initial points defined by x1 = (0 , 1) and x2 = (1 , 0), and terminal points
defined by y1 = (1 , 2) and y2 = (3 , 2), there are eight such pairs, shown below.
An x , y-path is a path from x to y. By computing the familiar binomial co-
efficients, the numbers of x i , y j -paths, arranged in a matrix for i , j ∈ {1 , 2}, are
(12 46). As it happens, the determinant of this matrix also equals 8. We will see
that this is no coincidence.
We defined the relevant concepts for directed graphs in the Introduction. Re-
call that each edge in a directed graph (digraph) G with vertex set V(G) and
edge set E(G) is an ordered pair (u , v) of vertices, abbreviated to uv. An edge is
directed from its first vertex (the tail) to its second vertex (the head). An x , y-
path consists of vertices that can be ordered as v0 , . . . , v¾ with v0 = x and v¾ = y
and edges {vi vi+1 : 0 ≤ i ≤ ¾ − 1}.
For example, we used functional digraphs in Chapter 1; this is the special
case where each vertex is the tail of exactly one edge. A path in the functional
digraph of follows repeated iteration of .
4.1.28. Example. Lattice paths can be modeled as paths in a digraph with grid
points as the vertices and allowed transitions as the edges. The ballot paths of
length 6 are the x , y-paths in the digraph on the left below.
•y y1 yj yn
• ··· • ··· •
• •
a1 ,1 an ,n
• • • ai , j
• ··· • ··· •
x• • • • x1 xi xn
4.1.30. Example. Determinants and path systems. For the weighted digraph on
the right in Example 4.1.28, the path matrix is the matrix A of order n that
provided the weights; there is exactly one x i , yj -path for each pair (i , j), and its
weight is ai , j . All the path systems are disjoint-path systems, and there is one
such system for each permutation .
In terms of permutations, det A = ∑ ∈Ën(sign ) ∏i=1 ai , (i) , where the sign
n
Our aim is to extend this formula to all disjoint-path systems in all digraphs.
Aigner wrote, “It is precisely this step to arbitrary graphs that makes the [The-
orem] so widely applicable — and what ’s more, the proof is stupendously simple
and elegant.”
To keep the sums finite, we consider only finite digraphs without cycles.
Proof: Let Q be the set of all X , Y-path systems, disjoint or not. We seek a
signed involution on Q whose fixed points are the disjoint-path systems and whose
systems paired in 2-cycles have the same weight and have associated permuta-
tions with opposite sign. This is a signed involution with X + and X − being the
sets of X , Y-path systems whose associated permutations are even or odd, re-
spectively. The paired contributions cancel in ∑∈Q(sign )w(), leaving just
∑∈P(sign )w(). The final step is to interpret the sum over all of Q as a deter-
minant, proving
x1 • • • •y (1) x1 • • • •y (3)
←→
x 2• • •y (2) x 2• • •y (2)
x 3• x 3•
168 Chapter 4: Further Topics
The switch transposes (i∗) and (j ∗) in the word form of to obtain . Trans-
positions reverse sign, so sign Ì() = −sign . Also (()) = , since paths re-
main unchanged before intersections, so selects the same intersection point and
pair of paths in () and undoes the switch.
For a disjoint-path system, no intersection is found and makes no change.
Always w() = w(()), since both systems use the same edges with the same
multiplicities. Thus is a signed involution having the desired properties, so
∑∈Q(sign )w() = ∑∈P(sign )w().
For the remaining step, recall that det A = ∑ (sign )a1 , (1) · · · an , (n) , where
ai , j is the sum of the weights of all x i , yj -paths. Each path system associated
with chooses one x i , y (i)-path for each i, and its weight is the product of their
n
weights. Hence ∏i=1 ai , (i) is the sum of the weights of all the path systems asso-
ciated with . Summing over yields ∑∈Q(sign )w(), as desired.
Aigner noted that basic properties of determinants follow easily from The-
orem 4.1.31. For example, det A T = det A follows by reversing the edges in the
digraph of Example 4.1.28. The path system associated with is associated with
−1 instead, but they have the same sign, so the computation of the determinant
is the same. Exercise 62 uses Theorem 4.1.31 to prove that a matrix with linearly
dependent rows has determinant 0.
Another application generalizes the product formula for determinants to
products of non-square matrices. We will apply this result in Chapter 15. This
proof is very easy; others require tedious manipulation or clever linear algebra.
When all disjoint- X , Y-path systems have the same associated permutation
, a determinant counts them. For this discussion, we return to the context of lat-
tice paths from Example 4.1.27 and name the initial points p1 , . . . , pn and termi-
nal points q1 , . . . , qn . The digraphs for lattice paths have edges oriented upward
and rightward as in Example 4.1.28.
Section 4.1: The Inclusion-Exclusion Principle 169
4.1.33. Corollary. (Gessel–Viennot [1985]) Let h((a , b) , (c , d)) = (d−cb−+ac− a). If ev-
ery lattice disjoint-path system from {p1 , . . . , pn} to {q1 , . . . , qn} matches pi
to qi for all i, then the number of such disjoint-path systems is the determi-
nant of the matrix with (i , j)-entry h(pi , qj ).
Proof: Form the digraph on 2 with edges for upward and rightward steps. The
number of paths from point p to point q is h(p , q). By Theorem 4.1.31, the spec-
ified determinant sums the signed weights of all disjoint-path systems from the
initial points to the terminal points. Under the given conditions, the only such
systems use the identity permutation, which has positive sign. The weight of ev-
ery path system is 1, since all the edge weights are 1, so the sum of the weights
is the number of disjoint-path systems.
h((a , b) , (c , d)) = ∑ ∏ x¾ .
i
b≤¾1 ≤···≤¾c− a ≤ d
Setting all x i = 1 yields the previous value (d−cb−+ac− a) that counts each path once.
In Example 4.1.27, the resulting generating function is
R • y3 y2
• • y1
• • •
• • •
• • •
• • •
• • •
• • •
• • •
x3• • • •
•
L x2 •
x1
These edges belong to the graph on the right above; orient them from lower
left to upper right to form a digraph G. The edge crossing an unshaded rhombus
continues a path that enters it at the lower left, so the chosen edges form paths
from L to R. Each rhombus has only one entrance and one exit, so the paths are
disjoint. Thus the unshaded rhombi yield a disjoint-path system from x1 , . . . , x n
to y1 , . . . , yn in G.
The map is a bijection; each edge in a disjoint-path system bisects one rhom-
bus, which is the unshaded rhombus that generates it in the corresponding tiling.
(The path system has n2 steps up and n2 steps rightward, so every tiling has n2
rhombi with each orientation.)
Hence it suffices to count the disjoint-path systems in G. They all consist of
paths from x i to yi for i ∈ [n] and have positive sign. By Theorem 4.1.31, the num-
ber of disjoint-path systems is the determinant of the matrix whose (i , j)-entry
is the number of paths from x i to yj . This is (n+2ni− j
), the ordinary count of lattice
paths from (0 , 0) to (n + i − j , n + j − i).
EXERCISES 4.1
4.1.1. (−) How many ways are there to place 10 distinct people within three distinct rooms?
How many ways are there to place 10 distinct people within three distinct rooms so that
every room receives at least one person? How many decimal n-tuples contain at least one
each of {1 , 2 , 3} (leading 0s allowed)?
4.1.2. (−) Two distinct dice are rolled (together) n successive times. What is the probabil-
ity that each roll of doubles (two 1s , . . ., two 6s) appears?
4.1.3. (−) 13 cards are chosen at random from a standard deck of 52 cards. Compute the
probability of each event below.
(a) At least one card in each suit.
(b) No cards in some suit.
(c) Some four cards with the same value.
4.1.4. (−) Given the special case º (∅) = ∑ S⊆[n](−1)| S| ½(S) of Theorem 4.1.3, prove the gen-
eral formula for º (T) by reducing it to the special case for º (∅).
4.1.5. (−) How many natural numbers in [252] are relatively prime to 252?
4.1.6. (−) How many natural numbers in [200] have no divisor in {6 , 10 , 15}?
4.1.7. (−) Given pennies, nickels, dimes, quarters, and half-dollars, how many ways can
one select n coins so that no type of coin is selected more than four times?
4.1.8. (−) How many permutations of [n] leave no odd number fixed?
4.1.9. (−) Use inclusion-exclusion to prove that ∑(−1)¾ (¾n)(n − ¾)n = n!.
4.1.10. (−) A 6-sided die is rolled repeatedly until the numbers 1 through 5 have appeared
at least once each. What is the probability that this happens in the first n rolls? Use a
calculator to find the least n where the probability exceeds .5.
4.1.11. (−) Compute the rook polynomial of the board below.
172 Chapter 4: Further Topics
4.1.12. (−) Compute the rook polynomials for all boards with at most four squares.
4.1.13. (−) Using Theorem 4.1.31 and the example of lattice paths with initial points
{(1 , 0) , (0 , 1)} and terminal points {(2 , 2) , (3 , 3)}, explain the role of the assumption in
Corollary 4.1.33 that disjoint-path systems occur only with the identity permutation. In
general, what happens when that condition fails?
4.1.14. Given fixed positive integers s1 , . . . , sn , let an ,¾ be the number of integer solutions
to 1 + · · · + n = such that 0 ≤ i < ri for each i.
(a) Obtain the generating function ∑ an ,¾ x¾ (as a ratio of polynomials).
(b) Without using (a), compute an ,¾ as a finite sum.
(c) Explain why the answers to (a) and (b) are equivalent.
4.1.15. Prove that ∑¾|n () = n, where is the Euler totient function. (Gauss)
4.1.16. (♦) Let denote the Euler totient function.
(a) For m ∈ , prove that (m) = m ∏ p∈ P(m)(1 − 1/p), where P(m) is the set of distinct
prime factors of m.
(b) For n ∈ with n > min{m/2 , m − (m)}, prove that ∑i=1 (−1)i (ni) im is divisible by
n
4.1.27. A number n ∈
is a power if it equals am for some a , m ∈
with m ≥ 2. For
S ⊆ , let l(S) be the least common multiple of the elements of S. For x ≥ 4, prove that
the number of powers in the interval [1 , x] is ∑S(−1)| S|+1 ⌊ x1/l(S) ⌋ , where the sum is over
all nonempty subsets of the integer interval [2 , ⌊ log 2 x⌋ ]. (Nyblom [2004])
4.1.28. (♦) Let t n be the number of triangles in the drawing of the equilateral triangular
grid with side length n, shown below for n = 3. Note that t1 = 1, t2 = 5, and t3 = 13.
Use PIE to derive a third-order recurrence for ⟨t⟩. Solve it by the characteristic equation
method. (Hint: Express the inhomogeneous term using exponentials.)
4.1.29. (♦) Given m , n , r ∈ 0 , evaluate each sum below using generating functions, and
give inclusion-exclusion proofs of the resulting identities. In part (c), m ≥ n.
n n
n n m− ¾
(a) ∑(−1)¾ ( )(n − ¾) (c) ∑(−1)¾ ( )( )
¾ ¾ r
¾ =0 ¾ =0
m n
n− ¾
n n r + n− ¾ −1
(b) ∑(−1)¾ ( )( ) (d) ∑(−1)¾ ( )( )
¾ m− ¾ ¾ r
¾ =0 ¾ =0
4.1.30. For n ≥ t, apply Theorem 4.1.3 directly to prove the identity below. (Hint: Con-
sider the universe of n-sets in [2n], and do not shift the index of summation. Comment:
Shifting the index and additional substitutions can turn this identity into part (c) of Ex-
ercise 4.1.29; instead we seek a direct proof.)
n
n− t 2n − r n
∑(−1)r−t ( r − t )( n − r ) = (n − t)
r= t
4.1.31. (♦) For n ∈ , use inclusion-exclusion to give a combinatorial proof of the identity
below. (Beckwith [2006a])
n
n 2n − 2 ¾
∑(−1)¾ (¾ )( n−1
)=0
¾ =0
4.1.32. (♦) For n , ¾ ∈ , evaluate the sum below, both by using generating functions and
by using inclusion-exclusion. (Cox–Thieu [2015])
¾
¾ ¾ n − in
∑(−1)i ( i )( ¾+1
)
i =0
4.1.33. Evaluate the sum below. Use inclusion-exclusion to prove the resulting identity.
r −1
r−1 n− ¾
∑(−1)¾ ( ¾
)(
r−¾
)
¾ =0
4.1.34. Let b , r, s , t be nonnegative integers such that r + s + t = rb > 0. Prove the identity
below using constrained compositions of integers. (Wardlaw [1989])
174 Chapter 4: Further Topics
⌊s/b⌋ ⌊t/b⌋
r s + r − 1 − b¾ r t + r − 1 − b¾
∑(−1)¾ (¾)( s − b¾ ) = ∑(−1)¾ (¾)( t − b¾ )
¾ =0 ¾ =0
# #
4.1.35. Let A1 , . . . , A¾ be finite sets. For J ⊆ [¾], let NJ = ###⋃j ∈ J Aj ### , and let Sm =
# #
∑| J|=m NJ . Let Tm be the number of elements that belong to exactly m of the sets
¾
A1 , . . . , A¾ . Prove T m = ∑i=1 (−1)¾+i+ m+1 (¾−i m) Si . (Sofair [2014])
4.1.36. Every tree with n vertices has n − 1 edges, and the cycle with n vertices has n
edges. Use the inclusion-exclusion formula to derive the chromatic polynomials of trees
with n vertices and cycles with n vertices.
4.1.37. In a proper coloring of a graph G, the vertices receiving a particular color must
form an independent set (a set of pairwise nonadjacent vertices). Hence another formula
for the chromatic polynomial is ∑r=1 ¾(r) pr(G), where pr(G) denotes the number of parti-
n
n i −1
n
n(x) = ∑ ( )(− x)n−i ∏(x + j)
i
i =0 j =0
4.1.43. (♦) Count the -subsets of [n − 1] having exactly r runs of consecutive elements.
Use this to obtain a double summation for the number of permutations of [n] in which no
two numbers differing by 1 are adjacent (in word form).
4.1.44. (+) Squares on an n-by-n chessboard alternate black and white. How many sets of
white squares and n − black squares have no two in a row or column? Interpret the
result in terms of permutations. (Andrews–Wang [1988])
Exercises for Section 4.1 175
4.1.45. (+) Let (j) denote the number of positions having 1 in the binary expansion of j .
2 n −1
Prove that ∑j =0 (−1)n− (j) j r is 0 when r < n and is n!2 n(n−1)/2 when r = n. (Callan [1999])
4.1.46. (♦) Prove the identity below, where s(m , ) is the signed Stirling number of the
first kind (recall that s(m , ) = (−1)n− c(n , ), where c(n , ) is the number of permutations
of [m] having cycles). (Kauers [2011])
n n
2n
∑(−1) ( n+
) s(n + , ) = ∏(2i − 1)
=0 i =1
example, with = (3 , 1) and n = 3, both sides equal x2(x + 1). (Comment: The resulting
polynomial is called the factorial polynomial of B.) (Goldman–Joichi–White [1975])
4.1.53. (♦) Two boards are equivalent if their rook polynomials are equal. They are com-
plementary if they can be expressed as a partition of a rectangular board.
(a) For complementary boards B and B in an m-by-n rectangle, prove
n− j m− j
r (B ) = ∑(−1) j rj (B)( )( )( − j)! .
− j − j
j =0
(b) Prove that two boards are equivalent if they have equivalent complements in some
rectangular board. Conclude that the boards below are equivalent. Using the rook polyno-
mial, find a third board equivalent to them that cannot be obtained from them by rotations
and/or permutations of rows and/or columns.
176 Chapter 4: Further Topics
4.1.54. (+) For a board B, let R∗B(x) = ∑¾ r¾(B)x(n−¾) , where x(n−¾) denotes the falling
factorial. Let B and B be complementary boards in an n-by-n square. Prove R∗B (x) =
(−1)n R∗B(− x − 1). (Hint: For x ∈ 0 , add x extra rows to the square.) (Chow [1996])
4.1.55. (♦) Give three proofs of the identity below: by identities, by Snake Oil, and by
Theorem 4.1.18.
n
¾ n n
∑(−1)¾−p( p)(¾)2n−¾ = ( p) .
¾= p
4.1.56. A mathematics department has m students, of which n are male. All m students
want to take the combinatorics course, limited to l students and graded pass/fail. Assume
that l , n ≤ m. Define a signed involution on the set of all possible grade reports to prove
the identity below. (Comment: There are also other proofs.) (West–Wiedemann [1988])
l i
m− i n m− n m− n
∑ ∑(−1)j (m − l)( j )( i − j ) = 2 l( l
).
i =0 j =0
4.1.57. (♦) Let X be the set of all partitions of n. For i ∈ {0 , 1}, let pi(n) be the number
of elements of X whose number of even parts is congruent to i modulo 2. Prove that the
number of partitions of n into distinct odd parts equals p0(n) − p1(n). (Gupta [1976])
4.1.59. (♦) Colored balls 1 through m are put in boxes 1 through so that no box is empty
and no box has two balls with the same color. The coloring of the balls is fixed, and they
do not all have the same color. Let Pm() be the number of such arrangements. Prove
¾
∑¾=1 −¾1) Pm() = 0. (Schmuland [2013])
m (
(Hint: Define an involution on the set of arrangements of m unit squares and n − m domi-
noes in a row of length 2n − m.) (Knuth [1996])
4.1.61. (♦) Let T be a set of integer lattice points along a single lattice path from (0 , 0) to
(r, s), with (0 , 0) , (r, s) ∈
/ T . Let r,s(T) be the number of lattice paths from (0 , 0) to (r, s)
that avoid all of T .
(a) Use Corollary 4.1.33 to compute r,s(T).
(b) Use inclusion-exclusion to compute r,s(T).
(Comment: Together, (a) and (b) provide a combinatorial proof of an identity.)
4.1.62. (♦) Use Theorem 4.1.31 to prove that det A = 0 when a matrix A has linearly de-
n−1
pendent rows u1 , . . . , un . (Hint: Given un = ∑i=1 ci ui , form a digraph with vertex set
{x1 , . . . , x n} ∪ {y1 , . . . , yn} having edges xi yj for (i , j) ∈ [n − 1] × [n] and edges x n xi for
i ∈ [n − 1]. Define edge weights appropriately.) (Aigner [2001])
Exercises for Section 4.1 177
4.1.63. A path diagram is a Ferrers diagram with dots replaced by numbers such that the
number in position (i , j) is the number of paths from the bottom of column j to the right
end of row i, moving one box up or right at each step, always staying within the diagram.
Let M be the largest square matrix containing the upper left box (in bold below).
22 10 3 2 1 1
6 3 1 1 1
3 2 1
1 1 1
(a) Prove that for every path diagram, det M = 1. (Hint: Use Theorem 4.1.31.)
(Carlitz–Roselle–Scoville [1971]; Aigner [2001])
(b) Prove that the Catalan numbers form the only sequence ⟨a⟩ of real numbers such
that for all n ∈ 0 ,
⎛ a0 a1 · · · an ⎞ ⎛ a1 a2 · · · an+1 ⎞
⎜ a1 a2 · · · an+1 ⎟ ⎜ a2 a3 · · · an+2 ⎟
det ⎜ . .. .. .. ⎟ = det ⎜ .. . .. .. ⎟ = 1.
⎜ .. . . . ⎟ ⎜ . .. . . ⎟
⎝a an+1 · · · a2n ⎠ ⎝a an+2 · · · a2n+1 ⎠
n n+1
(Hint: Apply part (a). Comment: Matrices of this form are called Hankel matrices. Re-
lated work appears in Kellogg [1997] and Radoux [1997].)
4.1.64. (♦) For m ≥ 0 and n ≥ 1, prove the determinant identity below, where Sn ,¾ is the
Stirling number of the second kind. (Hint: Use a weighted digraph like that shown on
the right for the case (m , n) = (3 , 4). The diagonal edges have weight 1 and the horizontal
edges at height ¾ have weight ¾ .) (Aigner [2001])
• • • y4 = yn
•
· · · Sm+1 ,n ⎞ • • • • y3
•
⎛ Sm+1 ,1 Sm+1 ,2
⎜ Sm+2 ,1 Sm+2 ,2 · · · Sm+2 ,n ⎟ • • • • • y2
•
det ⎜ .. ⎟ = (n!)m
⎜ ... ..
.
..
. . ⎟ • • • • • • y1
•
⎝S · · · Sm+n ,n ⎠
m+ n ,1 Sm+ n ,2 • • • • • • • •
x n = x4 x3 x 2 x1 0 1 2 3=m
4.1.65. (+) Let S = {a1 , . . . , an} ⊆ . The GCD matrix A of S has (i , j)-entry gcd(ai , aj ).
Prove that if S is closed under taking divisors, then det A = ∏i=1 (ai), where is the
n
Euler totient function. (Hint: Form a digraph using three copies of S. For elements q , r ∈
S with q | r, add edges from r1 to q2 and from q2 to r3 , with w(r1 q2) = (q) and w(q2 r3) = 1.
Apply Theorem 4.1.31. Comment: The formula is due to Smith [1876]; this proof is from
Altinisik–Sagan–Tuglu [2005], generalized in Exercise 15.2.35.)
4.1.66. (♦) Monotone trees and alternating permutations. Let Mn be the set of n-vertex or-
dered trees with vertex labels [n] such that each vertex has at most two children and labels
increase along paths from the root. For T ∈ Mn with left subtree T1 , right subtree T2 ,
and root label a, recursively define (T) to be the concatenation (T1) , a , (T2).
(a) Prove that is a bijection from Mn to the set of permutations of [n].
(b) When = (a1 , . . . , an), the element ai is a climb, slide, peak, or valley if the values
move up-up, down-down, up-down, or down-up, respectively, in the triple (ai−1 , ai , ai+1).
Characterize each type in terms of whether ai has left and/or right children in −1().
(Set a0 = an+1 = 0, so a1 is a climb or a peak, and an is a slide or a peak.) (Stanley [1986])
(c) Let n be odd. In an alternating permutation of [n], odd positions are peaks and even
178 Chapter 4: Further Topics
4.1.67. (♦) Let G be the set of graphs with vertex set [n] and m edges. A graph is even if
every vertex has even degree. Let wn ,m be the number of even graphs in G. Let X be the
set of pairs (G , S) such that G ∈ G and S ⊆ V(G).
(a) Define a signed involution on X for which the set of fixed points consists of all pairs
(G , S) in which G is an even graph.
(b) Let a¾ ,l be the number of graphs in G such that l of the m edges join [¾] to [n] − [¾].
Use the involution in part (a) to prove wn ,m 2 n = ∑¾=0 (n¾) ∑ l=0(−1)l a¾ ,l .
n m
(c) Obtain the generating function for even graphs on [n] by number of edges:
n ¾(n−¾)
n 1−x
∑ wn ,m x + x)(2) ∑ ( ) (
n
− n(1
m
=2 ) .
¾ 1+x
¾ =0
4.1.68. Let A be a square matrix in which every entry not in the first row or column is
the sum of the two entries immediately above it and to its left. Prove that if every entry
in the first column of A is 1, then det(A) = 1. (Comment: The special case for binomial
coefficients is in Rupp [1930].) (Ionin [2014])
4.1.69. (+) The Condensation Method for determinants (Remark 4.1.36).
(a) For an n-by-n matrix A, let  I: J denote the matrix obtained by deleting from A
the rows indexed by I and the columns indexed by J. Prove
det A det Â1 ,n:1 ,n = det  n:n det Â1:1 − det  n:1 det Â1:n . (Dodgson [1866])
(Comment: Zeilberger [1997] gave a bijective proof.)
(b) For n , a , b ∈ , let Mn(a , b) be the n-by-n matrix with (i , j)-entry (aa−+i+b j ). Use part
n+ j +¾ −1
(a) to prove det Mn(a , b) = ∏ j =1 ∏¾=1
a b
j + ¾ −1
(see Zeilberger [1996]). (MacMahon [1916])
vertex permutation turns one into the other. Since bijections can be composed or
inverted, isomorphism is an equivalence relation. To view this as a “distinguish-
able colorings” problem, we view vertex pairs as colored by “edge” or “non-edge”.
Two simple examples introduce the technique.
Section 4.2: P ólya–Redfield Counting 179
BURNSIDE’S LEMMA
Two colorings of a set X are equivalent if we can move the underlying object
to turn one coloring into the other. Such a motion permutes X .
4.2.5. Remark. Note that “ turns into ” means that assigns to (x) the
same color that assigns to x, for all x ∈ X . Using identity, inverse, and closure
for G, indistinguishability is reflexive, symmetric, and transitive. Thus it is an
equivalence relation on the colorings; we want to count the equivalence classes.
Symmetries of an object permute the set X being colored and thereby per-
mute the set C of colorings. The group structure is the same: the permutation
of C induced by composing and is the composition of the permutations of C
induced by and . Thus we may view ∈ G as a symmetry operator, a permu-
tation of X , or a permutation of C. We use the same notation in each context.
When G is a group of permutations of a set C, and u ∈ C, the orbit of u is
{ (u): ∈ G}. The defining properties of a group imply that the orbits partition
C, and “in the same orbit ” is an equivalence relation. In our model, the orbit of
a coloring is the set of colorings equivalent to it.
When all elements of G map a coloring to distinct colorings, the orbit of
has size | G | , and dividing by | G | counts it as one class. The orbit is smaller when
two elements of G take to the same . Since every element of G maps to
some element of its orbit, summing the number taking to each element of its
orbit again counts the orbit | G | times, and then dividing the total by | G | counts
it once. A classical lemma of group theory will simplify the computation.
The sum ∑v∈ C (v) counts all pairs (v , ) such that (v) = v, grouped by the color-
ings. The sum ∑ ∈ G ( ) counts the same set, grouped by the operators. We just
interchanged the order of summation.
Section 4.2: P ólya–Redfield Counting 181
The last step in Lemma 4.2.7 is crucial for computations. We study questions
where the set X and group G acting on X are fixed, but the color set Y and thus
C varies. The computations for the baton and hat in Examples 4.2.1–4.2.2 were
those of the final step in Burnside ’s Lemma.
Although Lemma 4.2.7 is generally known as Burnside ’s Lemma, Wikipedia
says: “ William Burnside stated and proved this lemma, attributing it to Frobe-
nius [1887] in his 1897 book on finite groups. But even prior to Frobenius, the
formula was known to Cauchy in 1845. In fact, the lemma was apparently so well
known that Burnside simply omitted to attribute it to Cauchy. Consequently,
this lemma is sometimes referred to as the lemma that is not Burnside ’s.”
When counting colorings left fixed by , we use the observation that fixes
a coloring if and only if for all x ∈ X it assigns the same color to x and x. We
impose this requirement one cycle at a time.
4.2.8. Lemma. In the set of all colorings of X from a set of colors, the number
() of colorings left fixed by the action of on X is t , where t is the number
of cycles created by on X .
Proof: To be fixed by , a coloring must give the same color to all elements in a
cycle produced by on X . There are choices for that color, and the choice on
each cycle is made independently of the other choices.
4.2.9. Example. 4-bead necklaces. We model the problem as coloring X (the cor-
ners of a square) from a set of colors. The square has eight symmetries; four
rotations and four reflections. Rotations of 0◦ , 90◦ , 180◦ , and 270◦ have 4 , 1 , 2 , 1
cycles, respectively, as permutations of the corners. Non-diagonal flips have two
cycles of length 2; diagonal flips have one cycle of length 2 and two of length 1.
Among the eight permutations, 1 , 2 , 3 , 2 have 4 , 3 , 2 , 1 cycles, respectively.
By Burnside ’s Lemma, there are 18 ( 4 + 2 3 + 3 2 + 2 ) distinguishable colorings
of X . When = 2, the answer is 6. There are two monochromatic necklaces, two
where one color occurs once, and two with two beads of each color.
We can add constraints by applying Burnside ’s Lemma to restricted sets of
colorings. If adjacent beads must have distinct colors, then the only operators
that fix legal colorings are the identity, the 180◦ rotation, and the diagonal flips,
fixing two legal colorings each. Burnside ’s Lemma then yields 18 (2 + 2 + 2 + 2) as
the number of legal 4-bead necklaces.
By recording how many times each color is used, we can count the distin-
guishable patterns using each color a specified number of times. For this we need
the lengths of the cycles in the permutations of X . We represent a cycle of length
j by the variable x j .
182 Chapter 4: Further Topics
e
4.2.10. Definition. The cycle structure of a permutation on a set is ∏ x j j ,
where has e j cycles of length j . The cycle index ZG(x1 , x2 , · · ·) of a group
G of permutations is | G |−1 times the generating function that enumerates G
e
by cycle structure, meaning that the coefficient of ∏ x j j counts the elements
ej
of G having cycle structure ∏ x j as permutations of the set being colored.
The pattern inventory records the options instead of just the number of op-
tions. Instead of setting x j = in the cycle index, we let x j list the options
“ j blacks or j reds or j greens . . .” To do this, we set x j = y1j + y2j + y3j + · · · ,
in the usual way of building generating functions to model the listing of alter-
natives. The choice from the expression for x j records a contribution of j to the
exponent of the chosen color. This represents using that color on all j vertices of
the corresponding cycle.
a pair of opposite edges, and two about the axis through a pair of opposite ver-
tices. The groups we consider when coloring the vertices, faces, or edges of a cube
are isomorphic (each corresponds to the rigid motions of the cube), but the cycle
structures are different, because the set X being colored is different. The cycle
structures are listed below, with “multiplicity” being the number of motions of
the type indicated.
Axis Degrees Mult. Vertices Faces Edges
anywhere 0 1 x81 x61 x12
1
opp. faces 90,270 6 x42 x12 x4 x34
opp. faces 180 3 x42 x12 x22 x62
opp. verts. 120,240 8 x12 x32 x32 x43
opp. edges 180 6 x42 x32 x12 x52
The resulting cycle indices are
1
(x8
24 1 + 6x42 + 9x42 + 8x12 x32) for coloring vertices,
1 (x6
24 1 + 6x12 x4 + 3x12 x22 + 8x32 + 6x32) for coloring faces,
1
(x12
24 1 + 6x34 + 3x62 + 8x43 + 6x12 x52) for coloring edges.
Setting each x j to ¾ counts the equivalence classes of colorings when ¾ colors
¾
are available. Setting x j = ∑ i=1 yij forms the pattern inventory listing equiva-
lence classes by how many times each color is used.
[y3 ] 24
1
((1 + y)6 + 6(1 + y 2)(1 + y4) + 8(1 + y3)2 + 9(1 + y)2(1 + y 2)2 )
= 1
24 ((63) + 6 · 0 + 8(12) + 9(12)(12)) = 3.
4.2.17. Corollary. (Redfield [1927], P ólya (see Harary [1955b])) The number of
isomorphism classes of n-vertex graphs with m edges is the coefficient of y m
in the OGF obtained by letting x j = 1 + y j for each x j in the cycle index ZË(2)
n
of the pair group on n vertices.
Application 4.2.16 uses one color of weight 1 (edge) and one color of weight 0
(non-edge). We may have several colors of each weight.
4.2.19. Example. Given three types of paint that cost one dollar per use and an-
other that costs two dollars, the weight enumerator (by cost) is w(y) = 3y + y 2 .
To enumerate distinguishable colorings by total cost, set x j = w(y j ) in the cycle
index for each j , because using a color on a j-cycle uses it j times.
Similarly, with two types of red paint and two types of blue paint, costing $2
or $4 per face, let w(r, b) = r 2 + r4 + b2 + b4 . The coefficient of r i b j in the pattern
inventory counts the distinguishable paintings using $i of red paint and $ j of
blue paint. To compute it, set x j = w(b j , r j ) in the cycle index.
Section 4.2: P ólya–Redfield Counting 185
4.2.22. Application. Crowns with r missing jewels. A crown with places for
diamonds is missing r of them; how many distinguishable ways can this happen?
We are asking for the number of distinguishable cyclic arrangements of r 1s and
− r 0s under rotational symmetry.
The answer also counts the cycles in Bulgarian solitaire on partitions of n
when n = (¾2) + r (Theorem 3.4.18). The “move” in Bulgarian solitaire maps the
set of Ferrers diagrams with n dots to itself. We showed that the Ferrers diagrams
lying on cycles in the resulting functional digraph consist of − 1 full slants plus
r dots in the slant of size . Each move shifts these dots one step down the slant,
cyclically. Thus the number of cycles is again the number of cyclic arrangements
of r 1s and − r 0s.
Applying Example 4.2.21, our choices for x d in the pattern inventory are y0
d
or y to accumulate contributions by the number of 1s. Since the cycle structures
of permutations in Cn have the form x n/dd , we obtain contributions to the desired
term only when d divides both and r. Setting x d = (1 + y d)¾/d for all d, contri-
butions to the coefficient of y r arise when we take r/d of the /d cycles to have 1s.
Using the Binomial Theorem, the number of cyclic arrangements is
1 /d
∑ (d)(
r/d
).
d|gcd(¾ ,r)
186 Chapter 4: Further Topics
4.2.25.* Example. The pair group. The pair group Ën is the group of permu-
(2)
tations of the pairs in [n] induced by Ën . We used this in Application 4.2.16 and
Corollary 4.2.17. The cycle structure of the permutation in Ën induced by ∈ Ën
(2)
depends only on the cycle structure for . Pairs are of two types: those contained
in one cycle of and those consisting of elements from two cycles in .
For two elements on the same cycle, shifts each by one along the cycle, leav-
ing them separated by the same distance along the cycle. Thus a cycle of length
in generates ⌊( − 1)/2⌋ cycles of length among the pairs contained in it.
When is even it also generates one cycle of length /2; pairs with displacement
/2 return to themselves after /2 steps.
A pair of elements from distinct cycles of lengths r and s repeats after
lcm (r, s) iterations of . The induced permutation has gcd(r, s) cycles of length
lcm (r, s) on the rs pairs chosen from the two cycles.
Thus when has cycle structure ∏¾ x¾e¾ , the induced permutation in Ën has
(2)
cycle structure
e ¾ (¾ −1)/2 (¾/2−1) e ¾ (e2¾)¾
∏ x¾ ∏ x¾e¾ ∏ x¾ ∏ xlcm (r,s)
e r e s gcd(r,s)
x¾/2 .
odd ¾ even ¾ ¾ r
= s
Exercises for Section 4.2 187
EXERCISES 4.2
4.2.1. (−) A game is played on a table with 15 balls in a triangular array. The array can
slide on the table and rotate. There is a supply of three types of balls. How many distin-
guishable ways are there to arrange balls in the array?
4.2.2. (−) The clown of Example 4.2.2 wants to put flowers also on the edges of the tri-
cornered hat; the same ¾ types are available, and we count distinguishable patterns under
rotation. The number of patterns on edges alone is the same as the number on vertices
alone. Why is the number of patterns with flowers on both the edges and the vertices not
equal to the square of this?
4.2.3. (−) The n bands of a baton (Example 4.2.1) are to be painted under the additional
requirement that adjacent bands must not have the same color. With ¾ colors available,
how many distinguishable ways are there to paint the baton?
4.2.4. (−) Given that n is prime, count the distinguishable n-bead necklaces that can be
formed when ¾ colors of beads are available.
4.2.5. (−) For n = 6, n = 9, and n = 10, count the n-bead necklaces that can be formed
using three colors of beads.
4.2.6. (−) Determine the cycle indices for coloring the vertices, edges, or faces of a tetra-
hedron that can rotate in space.
4.2.7. (−) Determine the pattern inventory for colorings of the squares of a rotating 4-by-4
chessboard with two colors available.
4.2.8. (−) Let c(x) be the OGF for isomorphism classes of connected graphs, indexed by
number of vertices. Find the OGF for isomorphism classes of graphs with two components.
4.2.9. (−) A double domino is a solid 2-sided chip of wood such that each side consists
of two squares sharing an edge. Each of the four squares is marked with a number of dots
between 0 and ¾ − 1, inclusive. Determine the number of distinguishable double dominoes.
4.2.10. The squares of a 4-by-4 chessboard are to be painted (front only), with four colors
available for each square. Determine the number of distinguishable paintings that have
four squares of each color.
4.2.11. Determine the cycle index for coloring the vertices and the edges of an n-gon that
can rotate or flip (movement in space around any axis).
4.2.12. (♦) Caterpillars are trees in which the deletion of all leaves leaves a path. Prove
that the number of isomorphism classes of n-vertex caterpillars is 2 n−4 + 2⌊n/2⌋−2 if n ≥ 3.
(Harary–Schwenk [1973], Kimble–Schwenk [1981])
4.2.13. Lemma 4.2.6 states that when a group G acts on a set S, the number of permuta-
tions that map x to y is the same for all y in the orbit of x. Use this to count the ways to
pair up 2n people. (Hint: Let S be the set of pairings.)
4.2.14. (♦) Partitions of an integer n are obtained from compositions of n by ignoring the
order of the parts. Use Burnside’s Lemma and the symmetric group Ë3 to count the par-
titions of 9 into three parts. List the partitions explicitly to check the computation.
4.2.15. (♦) Let p , n , l be positive integers with p prime. Use Burnside’s Lemma to prove
l −1
that np − np is divisible by pl . (Chappell–Hartman)
l
4.2.16. With four colors of beads available, how many distinguishable 6-bead necklaces
are there in which no two adjacent beads have the same color?
188 Chapter 4: Further Topics
4.2.17. (♦) Consider distinguishable n-bead necklaces formed from three colors of beads.
Use the methods of this section to answer the following questions.
(a) For n = 4, how many have no two consecutive beads of the same color?
(b) For n = 6, how many have no two of the three colors used equally often?
(c) For n = 9, how many use all three colors three times each?
4.2.18. With three colors of beads available, how many distinguishable n-bead necklaces
are there with each color used at least once, for n = 4 and n = 7?
4.2.19. Determine the number of isomorphism classes of 4-vertex loopless multigraphs in
which each pair of vertices occurs as the set of endpoints of at most two edges. Use the
pattern inventory to compute the number of these classes that have six edges. Draw them
explicitly to check the computation.
4.2.20. (♦) A financial company is designing a new symbol: a regular tetrahedron built
from six metal bars of equal length. Given that the bars can be copper, silver, or gold,
determine the number of distinguishable ways there are to do this (the tetrahedron can
rotate in space but not reflect). How many ways are there using two bars of each type?
4.2.21. (♦) Pattern inventories for cubes.
(a) Count the distinguishable 17-dollar cubes that can be built using (as edges) $1 lead
bars, $2 silver bars, and $3 gold bars.
(b) Determine the number of distinguishable ways to paint the faces of a cube with
three colors so that each color is used twice. Describe them geometrically.
4.2.22. Use P ólya’s Theorem to count isomorphism classes of spanning subgraphs of K3 ,3 .
4.2.23. Use P ólya’s Theorem to count the isomorphism classes of 5-vertex graphs with
four edges.
4.2.24. Determine the number of terms in the pattern inventory for n-bead necklaces
with ¾ colors of beads available.
4.2.25. (♦) A rotating square table has a pocket at each corner. Each pocket may have
1, 2, or 3 balls. Compute the total number of distinguishable arrangements. Use P ólya’s
Theorem to compute the number of distinguishable arrangements with a total of 7 balls.
Describe how the computation would change if we have two colors of balls, but the balls
within a pocket must all have the same color.
4.2.26. An even graph is a graph whose vertex degrees are all even.
(a) Compute the weight enumerator for isomorphism classes of connected even graphs
with at most five vertices, indexed by number of vertices.
(b) Use part (a) and P ólya’s Theorem to enumerate, by number of vertices, the even
graphs with three components in which every component has at most five vertices. Check
your work by explicitly listing those with nine vertices.
4.2.27. Let e n and on count the isomorphism classes of graphs on n vertices whose number
of edges is even or odd, respectively. Prove that e n ≥ on for all n and that equality holds if
and only if n is congruent to 2 or 3 modulo 4. (Schmidt [1993])
4.2.28. (♦) The Ordinary Exponential Formula.
(a) By comparing coefficients, prove ∑n≥0 ZËn (x1 , x2 , · · ·) = e ¾≥1 x ¾/¾ .
¾
(b) Prove ½(x) = e ¾≥1 c(x )/¾
, where ½(x) and c(x) are the OGFs by number of vertices for
isomorphism classes of graphs and isomorphism classes of connected graphs. (Comment:
This unlabeled version of the Exponential Formula applies whenever a general labeled
structure consists of component structures and the symmetric group acts on the set of la-
bels to produce isomorphisms.)
¾ n−1
(c) For OGFs ½(x) and c(x) related by ½(x) = e ¾≥1 c(x )/¾ , prove cn = ½ n − 1n ∑¾=1 ¾c¾ ½ n−¾ .
Section 4.3: Permutations and Tableaux 189
4.2.29. Let r(x) be the OGF by number of vertices for isomorphism classes of rooted trees.
¾
(a) Use Exercise 4.2.28 to prove r(x) = xe ¾≥1 r(x )/¾ .
(b) Obtain a recurrence for the coefficients of r(x).
4.2.30. Let Tr(x) be the OGF by number of vertices for isomorphism classes of rooted trees
such that every vertex is reachable from the root by a path with at most r edges.
(a) Find a formula for Tr in terms of Tr−1 .
(b) In terms of these functions, find an expression for the OGF by number of vertices
for isomorphism classes of unrooted trees in which the longest path has d edges.
1357
248
69
The word “partition” indicates that the entries form a partition of their total,
“plane” suggests the geometric arrangement, and “reverse” refers to nondecreas-
ing instead of nonincreasing rows and columns. (Standard) Young tableaux were
introduced in Young [1901] to study matrix representations of permutations but
190 Chapter 4: Further Topics
actually were used earlier by Frobenius [1900]. They have many connections to
algebraic combinatorics and to combinatorial aspects of permutations. Much of
the subject (and the terminology) was developed by French mathematicians.
Let º ( ) be the number of Young tableaux of shape (the value needed in
the generalized ballot problem). The first formula for ( ) was found by Frobe-
nius [1900] using group representations. The modern formula uses the sizes of
particular subsets of the diagram.
4.3.2. Definition. In a tableau with shape , the hook Hi , j consists of all posi-
tions (i , s) and (r, j) with s ≥ j or r ≥ i. The hook length hi , j is the size of
Hi , j . A corner is a position in the Ferrers diagram with no item to its right
or below (an (i , i) with i > i+1).
i, j ←u→ i, ← v →
↑ ↑
x x
↓ ↓
, j ←u→ ,
↑
y
↓
A tableau puts [n] into a shape in one of n! ways. The result is a standard
Young tableau if and only if for each (i , j) the entry in position (i , j) is the least
entry in Hi , j . When Hi , j is filled randomly, position (i , j) is least with probability
1/hi , j . Knuth [1973] joked that we would like to multiply these values to obtain
1/ ∏ hi , j as the probability of being a Young tableau, but the events are far from
independent (consider h2 ,1 and h1 ,2 when = (2 , 2)).
Nevertheless, this formula is correct! The original proof used a determinant
for ( ) known to Frobenius [1900] and Young [1902] (Exercise 13). Another uses
the fundamental theorem of algebra (Bandlow [2008]). Ours is probabilistic.
ment n must occupy the last position in its row, we have the recurrence º( ) =
∑¾=1 ( ˆ ¾), where m is the number of rows in the shape.
m
F(ˆ ) 1
= ∑ Q(A , B) = ∑ p(A , B) = ( , ).
1
F() n n
4.3.5. Remark. The weighting of corner squares in this experiment lets us gen-
erate Young tableaux of a given shape with equal probability. First, run a trial
and put n in the corner location specified by the outcome. Delete this position,
run the experiment for the smaller shape, and place n − 1 in the resulting lo-
cation. Repeat until the entire tableau is filled. At each step, the weights for
placing are as they should be, given the placement of + 1 , . . . , n.
Also, since it is the size of a set, n!/ ∏ hi , j is always an integer.
To count column-strict tableaux with shape and entries in [m], see Exer-
cise 14. Thrall [1952] introduced a variation called shifted tableaux, where the
shape has distinct parts and the rows start at positions (i , i) instead of (i , 1);
there is a counting formula using generalized hooks (Exercise 15).
Researchers long sought a simple bijective argument for the Hook-Length
Formula. There are n! ways to fill the shape with [n]. One would like to prove the
formula by grouping them into sets of size ∏ hi , j , each containing one standard
Young tableau. Complicated bijective proofs were found by Franzblau–Zeilberger
[1982], Remmel [1982], Zeilberger [1984], and Krattenthaler [1995]. Novelli–
Pak–Stoyanovskii [1997] found a bijection that maps each permutation into a
pair consisting of a standard Young tableaux of shape and an element of a set
of size ∏ hi , j . Generating a random permutation and applying this bijection pro-
vides another way to generate a random standard tableau with shape .
If cells 1 through l (in RL order) are increasing in rows and columns and we
bubble the entry in cell l + 1, then cells 1 through l + 1 of the resulting tableau
will be increasing in rows and columns. Hence successively bubbling the elements
in cells 1 through n produces a standard Young tableau.
During this process, we develop a hook function, starting with º (i , j) = 0 for
all (i , j). When a bubbles from position (i , j) in a tableau with hook function º ,
it comes to rest in a new position (i , j ) with i ≥ i and j ≥ j . We modify the
hook function, changing values only in column j . The value in row i of column
j becomes j − j . The values that were in rows i + 1 through i (if any) move one
position higher and decrease by 1. Since the higher cell has one more cell below
it than the lower one, and position (i , j) has at least j − j positions to its right,
the result is again a hook function.
Below we apply the bijection to the permutation 123456 in shape (2 , 2 , 2).
Bubbling 1 from the corner produces no change. In each figure, we underscore
the element next to bubble. To complete the proof, we must prove that every pair
consisting of a standard tableau and a hook function with that shape arises from
exactly one permutation by this map. The probabilistic proof remains shorter,
but the bijection is useful.
6 3 0 0 6 3 0 0 6 1 0 -2
→ 5 2 0 0 → 5 1 0 -1 → 5 2 0 -1
4 1 0 0 4 2 0 0 4 3 0 0
6 1 0 -2 6 1 0 -2 1 4 -1 -2
→ 5 2 0 -1 → 2 4 0 -1 → 2 5 0 -1
3 4 1 0 3 5 1 0 3 6 1 0
4.3.7. Example. For n = 4, the sum yields 10 involutions. They appear be-
low, using the two-line notation for permutations. Also shown are the 10 Young
tableaux, using the correspondence we will develop.
1234 1234 1234 1234 1234
1234 2134 3214 4231 1324
1234 134 14 13 124
2 2 2 3
3 4
4.3.9. Example. When processing a permutation, the pairs are inserted in in-
creasing order of the values of qi . If = 617258934, then the situation when we
insert the next-to-last pair (8 , 3) is
P Q P Q
12589 13567 1 2389 13567
67 24 → 57 24
6 8
Here 3 bumps 5, 5 bumps 6, and 6 is inserted at the end of row 3. Hence Q ac-
quires 8 in a new position at the end of row 3. To complete P( ) , Q( ), we insert
(9 , 4). Here 4 bumps 8 to row 2, and the ninth new position is at the end of row 2.
Section 4.3: Permutations and Tableaux 195
In the generalized input allowing any multiset of pairs as input, the insertion
order is lexicographic on the pairs (qi , pi). For example, with (q , p) = (211246133
133444555
)
(written with qi above pi), the last insertion is
P Q P Q
11136 13444 11133 13444
224 355 → 2246 3555
This algorithm grows the common shape in one location; the end of the row
where insertion succeeds without bumping. If (q , p) was the pair being inserted,
then we add q to the current tableau Q in the new location to obtain the new Q .
This new position receiving q is the end of a row. Since we want nondecreasing
rows, we INSERT input pairs {(qi , pi)} in increasing order of qi . For permuta-
tions, this reduces to inserting as pi the values 1 . . . n in order. We write qi first
in generalized input pairs to agree with the 2-line notation for permutations.
4.3.10. Definition. The RSK Correspondence is the map that takes a gener-
alized input to the pair (P( ) , Q( )) of tableaux generated by successively
INSERTing input pairs (qi , pi) in lexicographic order (nondecreasing order in
q, and nondecreasing in p among pairs with the same q). In the output, P( )
is the P-symbol and Q( ) is the Q-symbol of the input .
4.3.11. Lemma. Let pi and pi+1 be values successively INSERTed into a column-
strict tableau P , creating positions A and B, respectively.
(a) The successive values bumped when inserting pi form a strictly in-
creasing sequence. The successive column indices of the bumped positions
(and the new position) form a nonincreasing sequence.
(b) B is in a column to the right of A if and only if pi+1 ≥ pi .
Proof: (a) An element bumps only a larger element, so the values strictly in-
crease. If in row i the element x in column j is bumped, then x cannot enter a
column past j in row i + 1, because the columns of P are strictly increasing.
(b) We use induction on the number of rows. Whether it bumped or not, pi
is in row 1 when we start to INSERT pi+1 . If pi+1 enters without bumping, then
pi+1 ≥ pi , a new rightmost position is created, and B is farther right than A. If
pi does not bump but pi+1 bumps, then pi+1 < pi and B is not farther right than
A, since no later row reaches the column of A.
In the remaining case, pi bumps some p i and pi+1 bumps some p i+1 . Now
pi+1 ≥ pi if and only if p i+1 ≥ p i . Since A and B are the positions created when
p i and p i+1 are inserted in the tableau P consisting of the remaining rows, the
induction hypothesis completes the proof.
196 Chapter 4: Further Topics
4.3.14. Definition. A permutation of [n] (in word form) has an ascent at posi-
tion i if (i + 1) > (i); otherwise there is a descent at i. It has an advance
at value x if value x + 1 is rightward of x; otherwise there is a retreat at x.
Reading the word form from left to right and writing + or − for ascents or
descents produces the up-down sequence. Following the values from low to high
and writing + or − for advances or retreats produces the right-left sequence.
A tool used to prove P( ) = Q( −1) will allow us to obtain the maximum length
of an increasing sublist of .
4.3.17. Definition. In the 2-line input (q , p), the pair (qi , pi) belongs to class t
if pi initially enters P in the tth position of the first row. We refer to pi or qi
as a class t element or to (qi , pi) as a class t pair.
q 123456789
p 617258934
t 112234534
198 Chapter 4: Further Topics
4.3.19. Lemma. In the class t pairs (qi1 , pi1 ) , . . . , (qim , pim), the second coordi-
nates are strictly decreasing, and the first coordinates are strictly increas-
ing. Also, these pairs are those for which the longest nondecreasing sublist
of p ending at this position has t elements.
Proof: Each pi in class t bumps the previous element in class t, and thus in order
they are strictly decreasing. The lexicographic input order then implies that the
corresponding qi ’s are strictly increasing.
The top left element is always the least yet seen; thus the longest nondecreas-
ing sublist ending at a class 1 element is just that element. By induction on t and
the number of elements seen, the current element in position t of row 1 is always
the least element yet seen that ends a nondecreasing sublist of length t.
Schensted noted that the second statement follows from the first by revers-
ing the permutation. Later we prove much stronger statements than Corollary
4.3.20. Note that the elements of the first row in P( ) need not themselves form
an increasing subsequence of ; in Example 4.3.18, the first row of P( ) is 12349,
but the only increasing sequence of length 5 in is 12589.
4.3.21. Lemma. The pair (q¾ , p¾) belongs to class t of (q , p) if and only if the pair
(p¾ , q¾) belongs to class t of (p , q).
Proof: If (q¾ , p¾) is in class t of (q , p), then by Lemma 4.3.19 some nondecreas-
ing subsequence pi1 , . . . , pit ends with p¾ . From the lexicographic input order,
qi1 , . . . , qit is also nondecreasing. When p and q are interchanged and re-ordered
lexicographically, the indices of these pairs remain in the same order. Thus q¾
will appear at the end of a nondecreasing subsequence of length at least t. By
Lemma 4.3.19, (p¾ , q¾) belongs to class t or higher in the (p , q) input. The same
argument applies when the switch is repeated, so the pairs (q¾ , p¾) from (q , p)
and (p¾ , q¾) from (p , q) belong to the same class in their respective processing.
created; it is the qi from the first pair in class t. Lemma 4.3.21 says that the pairs
in class t are the same (with coordinates reversed) when we transpose the input
A; Lemma 4.3.19 says that they are processed in opposite order. Together these
facts imply that transposing A interchanges the first rows of P and Q.
We have proved the basis step for induction on the number of rows. The rows
below row 1 are formed by applying the same algorithm to a modified input. The
modified input consists of the pairs (qi , pj) such that pi bumps pj from row 1. We
need only show that the modified input creating the pair of tableaux below the
first row for (p , q) is the transpose of the modified input that does so for (q , p).
If pi bumps pj from position t of row 1, then (qj , pj ) is the class t pair before
(qi , pi). By Lemmas 4.3.19–4.3.21, (pi , qi) and (pj , qj) are successive class t pairs
for A T , and qj bumps qi from position t when we insert (pj , qj ). Thus (pj , qi) is in
the modified input for A T whenever (qi , pj ) is in the modified input for A.
1 2 1 2 1 1 1 3 2
9 • 1
8 • ◦ 2
7 • ◦ 2
6 • ◦ × 3
p 5 • ◦ 2
4 • 1
3 • 1
2 • 1
1 • 1
1 2 3 4 5 6 7 8 9
q
Geometrically, consider light shining from the left and below. The outstand-
ing line is the outline of the shadow of M. Alternatively, it is the outline of the
set of points in the plane that dominate points of M.
The outstanding line changes direction at 2 ¾ − 1 points. Of these, ¾ form M ;
the other ¾ − 1 we place in the skeleton of T( ), denoted S( ). The full skele-
ton consists of these points plus the skeleton of T( ) − M. Thus we find the first
outstanding line, put the inside turning points in the skeleton, delete the mini-
mal points M from T( ), and iterate until no points remain. If T( ) has n points,
then S( ) has n − 1 points, where 1 is the number of outstanding lines.
In the diagram of Example 4.3.23, we have iterated the process of finding the
skeleton. The solid points are T( ), with solid outstanding lines. The open points
are the skeleton S( ), with dashed outstanding lines. The skeleton of the skeleton
has only the one point denoted × and one outstanding (dotted) line. An outstand-
ing line receives label where it exits the diagram if it arises when forming the
skeleton the th time. The creation of the skeleton has the same effect as bump-
ing, and the labels of the lines give the rows of the elements in P( ) and Q( )!
(2) By (1), it suffices to prove this for ¾ = 1 and apply induction on the number
of rows. As observed in proving Theorem 4.3.22, the value in position t of row
1 of P is the p-coordinate of the last class t pair in the input, and the value in
position t of the first row of Q is the q-coordinate of the first class t pair, placed
when the position is created. Since the tth outstanding line visits the class t pairs
in order, these two values are the horizontal and vertical lines on which the tth
outstanding line exits the planarization diagram. Being an outstanding line of
T( ), the label is 1, correctly placing these elements in row 1 of P( ) and Q( ).
When the input pairs are not restricted to be distinct, several outstanding lines
may exit at the same value.
(3) Transposing the input means reflecting the planarization diagram through
the line x = y, which interchanges rows and columns.
When the entries are distinct, the “first l positions” are those of the l smallest
values. In the partial tableau T( ) obtained by writing the elements of a permu-
tation diagonally from lower left to upper right, nondecreasing sequences are
the same as increasing sequences in ; this motivates Definition 4.3.25. To prove
Greene ’s Theorem, we need
(1) T( ) and P( ) have the same Greene numbers, and
(2) in P( ) the first rows form a largest -sequence.
We will move from T( ) to P( ) using a class of partial tableaux containing both.
4.3.26. Example. Three partial tableaux and their Greene numbers. Let =
617258934. The diagonal tableau T( ) puts the values in order of the word form.
As noted above, G ¾ ,n(T( )) is the maximum size of the union of increasing se-
quences in . The other tableaux below are obtained by sliding elements; all three
have the same Greene numbers.
202 Chapter 4: Further Topics
In R (in fact, it is P( )), the first two rows form a largest 2-sequence, as do
1234 and 6789. Also T( ) has 1234 and 6789 as a 2-sequence of size 8, but it
cannot be found greedily; the only increasing sequence of length 5 is 12589, and
deleting it leaves no increasing triple.
We will slide elements to move from T( ) to P( ).
T( ) strip shape R = P( )
4
3
9
8 34 12349
5 2589 578
2 17 6
7 6
1
6
l
G ¾ ,l 1 23456789
1 1 23444445
2 1 23455678
3 1 23456789
4.3.27. Definition. Given two partitions and such that i ≥ i for all i, a
skew tableau of shape ( , ) is a partial tableau filling the positions in the
diagram of that are outside the diagram of . A hole in such a tableau is
an unfilled position within the skew tableau shape: outside but inside .
In Example 4.3.26, the strip shape arises from T( ) by FILL operations that
compare consecutive elements of . This leaves i+1 rightward of i if i+1 ≥ i
(by a vertical SHIFT) and i+1 above i if i+1 < i (by a horizontal SHIFT). After
comparing i and i+1 , a horizontal SHIFT is followed by SHIFTing the later ele-
ments left (by FILLing each later corner of the current ), while a vertical SHIFT
is followed by SHIFTing the earlier elements up (by FILLING each earlier corner
of the current . The resulting strip shape encodes the up-down sequence of .
Further FILLing transforms the strip shape to a tableau R, which in Exam-
ple 4.3.26 we see is P( ) from Example 4.3.15. Jeu de Taquin is the process of
successively FILLing corners of , in some order. We will show Jeu de Taquin
always produces a column-strict tableau from T( ) and that it is always P( ).
Jeu de Taquin was invented by Schützenberger [1977]. Our motivation here
is the purely combinatorial result of Greene. Viennot called the tableau R( )
resulting from Jeu de Taquin the redressé of the original, meaning “straight-
ened”; we use the English word reduction.
The plan. We show first that Jeu de Taquin can reduce the diagonal tableau
T( ) to P( ) by modeling the bumping procedure with SHIFTs. Next, in a column-
strict tableau with n elements, G ¾ ,n is just the sum of the lengths of the first
rows. The fact that every reduction R( ) equals P( ) follows because the Greene
numbers determine exactly one column-strict tableau and each SHIFT in Jeu de
Taquin preserves the Greene numbers. Greene ’s Theorem is then a corollary.
4.3.29. Lemma. For an input , some instance of Jeu de Taquin reduces the
diagonal tableau T( ) to the P-symbol P( ).
Proof: We model the bumping procedure, by induction on the length of . No
SHIFT is needed when has length 1. Otherwise, form from by ignoring the
last element x and inductively transform T( ) into P( ) using Jeu de Taquin.
FILLing corners now can move P( ) up from below and x in from the right to
obtain a partial tableau where consists of one part equal to the length of the
first row in P , with x immediately to its right and P( ) below it.
We now model the bumping procedure to insert x into P( ). Apply SHIFT to
the left of x until x slides left no farther. Now we have P( ) plus x sitting above
the element x that x bumps when inserted into P( ). SHIFTs into the other
positions of row 1 (in decreasing order) now produce the first row of P( ), with x
above x . Now x sits alone in row 2, ready to enter the tableau below the first
row of P( ). In particular, since the list of column indices of bumped positions is
nonincreasing (Lemma 4.3.11a), the newly bumped element y is no farther left
than where it should enter the next row. By the induction hypothesis, we can
perform the rest of the bumping procedure with further SHIFTs.
We have not made these SHIFTs in the order of Jeu de Taquin, but they can
be reordered to express the process (after the induction hypothesis) as FILLing
row 1 from right to left. As x moves in, the rest of each FILL pulls up an element
from row 2 behind it. After x reaches its resting place, the first SHIFT in each
fill to its left pulls up the element from row 2. Instead of performing these imme-
diately, we can postpone them to subsequent FILLs, since they are not disturbed
by FILLING the hole to the left of x. The induction hypothesis similarly permits
reordering the other SHIFTs to complete each FILL in the first row.
204 Chapter 4: Further Topics
4.3.31. Lemma. The shape of a column-strict tableau and the placement of its
multiset of entries is determined by the Greene numbers.
Proof: Let T and T be column-strict tableaux with the same elements. If T
=
T , then let l be the least integer such that the subtableaux T l and T l formed by
the first l values in T and in T differ (repeats of a single value are taken in order
from left to right to form the first l values).
Note that T l and T l differ only in where the last element is, say in row ¾ in
T l and row ¾ in T l . We may assume ¾ < ¾ by symmetry. By Lemma 4.3.30,
G ¾ ,l(T) = º¾ (T l) > º¾ (T l ) = G ¾ ,l(T ). Thus distinct tableaux with the same en-
tries cannot have the same Greene numbers.
4.3.32. Lemma. If T is a skew tableau with one hole, and T is obtained from
T by a SHIFT into the hole, then their Greene numbers are the same:
G ¾ ,l(T ) = G ¾ ,l(T) for all ¾ and l.
Proof: A horizontal SHIFT does not change the sets of entries forming ¾-
sequences, so here G ¾ ,l(T ) = G ¾ ,l(T) holds trivially. Vertical SHIFTs can change
¾-sequences. We prove G ¾ ,l(T ) ≥ G ¾ ,l(T) for this case and leave the similar in-
equality G ¾ ,l(T) ≥ G ¾ ,l(T ) as Exercise 17.
Let S of size G ¾ ,l(T) be a largest ¾-sequence among the first l elements in T .
Suppose that T arises by SHIFTing y from row j to row j − 1. The set S is still
a ¾-sequence unless y lies in a sequence A in S with elements to its right in row
j . Let A = aybc, where b is the part after y in row j .
Since T has only one hole, all positions in row j − 1 above elements of b are
filled; let b be this list above b in row j − 1. Since max b < max b, we have
max b < min c; also y ≤ min b since y SHIFTs up. If no element of b appears in
S, then we can modify A by replacing b with b to obtain G ¾ ,l(T ) ≥ G ¾ ,l(T).
Section 4.3: Permutations and Tableaux 205
Various cases in the proof of Lemma 4.3.32 change lists. Although G ¾ ,l does
not change, the previous largest -sequence may no longer be a -sequence. We
already saw that the top line of P( ) need not be a nondecreasing sequence in .
EXERCISES 4.3
4.3.1. (−) Find the P-symbol and Q-symbol for the permutation 596134278. Find the two-
line generalized input such that the RSK Correspondence yields the results below.
P( ) = 11122 Q( ) = 11233
233 223
4.3.2. (−) Use Young tableaux to prove the Erdős–Szekeres Theorem: every list of n2 + 1
distinct numbers has a monotone subsequence of length n + 1.
4.3.3. (−) How many permutations of [n] have element 2 in the first row of P( )?
4.3.4. The Non-Messing-Up Theorem. Consider a matrix such that in each row the en-
tries appear in increasing order. Prove that after sorting the entries of each column into
increasing order, the entries of the rows are still in increasing order.
4.3.5. (♦) Find the minimum and maximum of the number of comparisons between ele-
ments when applying the RSK Correspondence to a permutation of [n].
4.3.6. A riffle shuffle of a permutation cuts into initial and final segments and then
merges them. Let c( ) be the minimum number of riffle shuffles that can sort into order.
Let d( ) be the number of descents in . Prove c( ) = ⌈ log 2(1 + d( ))⌉ . (Schwenk [1986])
4.3.7. Show that the number of ways to label the vertices of an n-vertex ordered tree (Def-
inition 1.3.21) with [n] so that each label is less than those on its descendants is n! divided
by the numbers of vertices in each subtree rooted at a single vertex. (Knuth)
n−1
4.3.8. Prove combinatorially that (n2)! is divisible by nn ∏i=1 [i(2n − i)]i .
4.3.9. A tableau with shape is a drawing with ∑ i squares in the plane. The corners
of the squares have degrees 2, 3, or 4 in the drawing. In terms of 1 , , and the number
of distinct parts in , count the corner points with odd degree. (Stanley [2014])
4.3.10. Obtain a simple formula for the number of permutations of [rs] having no increas-
ing sublist with s + 1 terms and no decreasing sublist with r + 1 terms. (Schensted [1961])
4.3.11. (♦) Permutations with forbidden patterns.
(a) Establish a one-to-one correspondence between tableaux consisting of two rows of
length n each and pairs of n-element same-shape tableaux with at most two rows.
(b) Conclude that the number of permutations of [n] having no decreasing sublist of
length 3 is the Catalan number Cn .
(c) Exercise 2.1.48 shows that Cn also counts the permutations of [n] having no triple
i < j < such that () < (i) < (j). Conclude that for each of the six orderings of three
elements, the set of permutations of [n] whose triples avoid that pattern has size Cn .
4.3.12. (♦) Show that the number of fixed points in an involution is the number of columns
having odd length in its P-symbol. (Schützenberger [1963])
Exercises for Section 4.3 207
n
( ) = ∑ (sign )( 1 + (1) − 1 , . . . , m + (m) − m
),
∈Ë m
4.3.15. (+) For a partition with distinct parts, the shifted shape is the set of locations
{(i , j): i ≤ j ≤ i + i − 1}; row i starts with the diagonal position (i , i). With distinct parts,
no row extends past the previous row. A standard shifted tableau fills the positions in
a shifted shape of size n with the elements of [n], increasing in both rows and columns.
Thrall [1952] proved that the number of standard shifted tableaux with shape is
∏ i< j ( i − j )
n! ,
∏i i ! ∏i< j ( i + j)
(a) For a position (i , j) in the shifted shape, define the shifted hook Hi∗, j by
Below we show the hook H1∗ ,2 in the shape (5 , 3 , 2). Use part (a) of Exercise 4.3.13 to show
# #
that Thrall’s formula equals n!/ ∏i , j ### Hi∗, j ### (for (5 , 3 , 2), both formulas yield 54).
# #
(b) Prove Thrall’s formula for the number of shifted tableaux. (Hint: Prove that the
formula and the number of shifted tableaux satisfy the same recurrence. Comment: Other
proofs appear in Stanley [1972] and Sagan [1980]; the latter is probabilistic.)
4.3.16. Consider a zig-zag skew shape with n boxes, two in each row (except one in the first
row if n is odd), as shown below. Let an be the number of skew tableaux of this shape with
entries [n] (these correspond to permutations with up-down sequence + − + − · · · , called
alternating permutations; see Stanley [2010] for a survey).
208 Chapter 4: Further Topics
A graph is defined “on” its vertex set by specifying the edges. It is finite if its
vertex set and edge set are finite. Our graphs are finite unless stated otherwise.
5.1.2. Definition. A path with n vertices is a graph whose vertices can be named
v1 , . . . , vn so that the edges are {vi vi+1 : 1 ≤ i ≤ n − 1}. We write ⟨v1 , . . . , vn ⟩
to specify a path having vertices v1 , . . . , vn in order.
A cycle with n vertices is a graph whose vertices can be named v1 , . . . , vn
so that the edge set is {vi vi+1 : 1 ≤ i ≤ n − 1} ∪ {vn v1 }. We write [v1 , . . . , vn]
to specify this cycle. The length of a path or cycle is the number of edges. A
cycle is an odd cycle [even cycle] if its length is odd [even].
209
210 Chapter 5: First Concepts for Graphs
The paths ⟨v1 , . . . , vn⟩ and ⟨vn , . . . , v1 ⟩ are the same graph. The square brack-
ets used to denote a cycle suggest “closing ” it. Since the starting point and direc-
tion do not matter, Definition 5.1.2 gives 2n ways to specify any n-vertex cycle.
5.1.4. Example. Every cycle of length n contains n paths with n vertices; these
are not induced subgraphs. However, a cycle of length n does contain (n − 1)-
vertex paths as induced subgraphs. The graph below has 49 subgraphs (we list
three); 16 are induced subgraphs. Its only cycle is an odd cycle.
The only spanning induced subgraph of a graph G is G itself.
•
w• •
x
•y
vertex edge spanning induced
set set subgraph? subgraph?
w, x , y, xy , y yes no
x , y, xy , y no no
x , y, xy , y , x no yes
5.1.6. Definition. A complete graph is a graph whose vertices are pairwise ad-
jacent. A set of pairwise adjacent vertices is a clique; it is a -clique when
it has size . A set of pairwise nonadjacent vertices is an independent set,
also called a stable set. The complement of a graph G is the graph G with
vertex set V(G) defined by uv ∈ E(G) if and only if uv ∈ / E(G).
5.1.8. Example. A graph is 1-partite if and only if it has no edges, such as the
complement of a complete graph. Every graph is ¾-partite for some ¾ , since indi-
vidual vertices are independent sets. When l ≥ ¾ , every ¾-partite graph is also
l-partite, since independent sets may be empty. The complement of a complete
bipartite graph consists of two disjoint complete graphs.
The vertices of a path or cycle in a bipartite graph must alternate between
the parts. Hence every cycle in a bipartite graph is an even cycle. Below are three
drawings of a complete bipartite graph with three vertices in each part. The
fourth drawing also has six vertices, all of degree 3, but it cannot be a drawing of
a bipartite graph because it has an odd cycle.
• • • • • • • • •
• • • • • •
• • • • • • • • •
We draw a graph on paper by assigning each edge a curve joining points as-
signed to the endpoints of the edge. We require that curves for distinct edges have
only finitely many common points. Since the incidence relation associating each
curve with its endpoints is the incidence relation of the graph, we think of the
drawing as the graph. More precisely, it is a member of the isomorphism class of
the graph, which brings us to the next topic.
ISOMORPHISM
To specify a graph, we must specify the vertices and edges. We can list edges
or neighborhoods. Also matrix representations can be useful.
5.1.10. Example. Below are two adjacency matrices and an incidence matrix for
the 4-vertex path ⟨w , x , y , ⟩ with edges e1 , e2 , e3 in order.
w x y w y x e1 e 2 e3
w⎛ 0 1 0 0⎞ w⎛ 0 0 0 1⎞ w⎛ 1 0 0 ⎞
x ⎜ 1 0 1 0⎟ y ⎜ 0 0 1 1⎟ x ⎜1 1 0⎟
⎜ ⎟ ⎜ ⎟ ⎜ ⎟
y ⎜0 1 0 1⎟ ⎜ 0 1 0 0⎟ y ⎜0 1 1⎟
⎝ 0 0 1 0⎠ x ⎝ 1 1 0 0⎠ ⎝0 0 1⎠
212 Chapter 5: First Concepts for Graphs
The complete graph K n has n! automorphisms, but its structure is not very
interesting, and it has too many edges for practical applications. The cycle Cn
has only n edges, but also only 2n automorphisms. We next discuss a 10-vertex
graph that is almost as sparse as C10 but has many more automorphisms and rich
structure. It is an important example in many contexts, and there are many fam-
ilies in which this is the smallest or the only graph. An entire book was devoted
to topics involving it (Holton–Sheehan [1993]).
5.1.16. Example. The Petersen graph. The graphs below are isomorphic (more
precisely, any two of them are isomorphic). We refer to any graph isomorphic
to these as the Petersen graph. A structural description of the Petersen graph
names its vertices as the 2-element subsets of [5] (we write the vertex names with-
out set brackets). Two vertices form an edge in this graph if and only if as 2-sets
from [5] they are disjoint. Although the graph is named for Petersen [1891], it
appeared earlier (using the rightmost drawing) in Kempe [1886, p. 11].
12
• • • • •
• • • •
45• 13 •35 34
• • • • • • • • • • • • •
41• •
52
• • •
• •
24
• • • •
23• •51 • • •
5.1.18. Proposition. The Petersen graph G is 3-regular, and any two nonadja-
cent vertices in it have exactly one common neighbor. Also it has girth 5 but
no spanning cycle.
Proof: View the vertices as 2-sets in [5], with adjacency being disjointness. There
are three ways to select two elements of [5] − {a , b}, so every vertex has degree 3.
If ab and cd are nonadjacent, then they have a common element. Their union
omits one pair in [5], which is their unique common neighbor.
A 3-cycle requires three pairwise disjoint pairs in [5], which don’t exist. A 4-
cycle thus requires nonadjacent vertices with two common neighbors, also forbid-
den. Hence every cycle has length at least 5, and [12 , 34 , 51 , 23 ,45] is a 5-cycle.
Suppose that G contains a spanning cycle C. The remaining edges must be
chords of C. Since G has girth 5, chords can only join vertices that are opposite
or nearly-opposite on C. Making two consecutive vertices of C adjacent to the
vertices opposite them creates a 4-cycle. By symmetry, we may therefore assume
v0 v4 ∈ E(G), where C = [v0 , . . . , v9 ]. Now every way of giving v9 another neighbor
creates a cycle of length at most 4.
214 Chapter 5: First Concepts for Graphs
In fact, the Petersen graph is the only 3-regular graph with 10 vertices that
has girth at least 5 and has no spanning cycle (Exercise 32). The structural de-
scription immediately makes it vertex-transitive and edge-transitive. Every per-
mutation of [5] permutes the pairs in [5] and preserves the disjointness relation;
this generates 120 automorphisms of the Petersen graph. In fact, these are all
the automorphisms (Exercise 33).
Our next family of graphs has many applications in computer science.
010 110
• •
011 • • 111
001 • • 101
• •
000 100
5.1.22. Definition. The union of graphs G and H is the graph G ∪ H with vertex
set V(G) ∪ V(H) and edge set E(G) ∪ E(H). We use G + H for the disjoint
union when V(G) and V(H) are disjoint; ¾ G is the disjoint union of ¾ copies
of G. The join of G and H , denoted G H , is obtained from G + H by adding
edges to make all of V(G) adjacent to all of V(H).
5.1.23. Example. Union and join. Using the natural vertex names, G ∪ G is
a complete graph. The notation G + H for disjoint union (usually for unlabeled
graphs) is convenient for making “arithmetic of graphs” consistent with ordinary
arithmetic: mG = G + · · · + G. The symbol “ ” illustrates the graph K 2 K 2 ,
with the interior “ + ” reflecting the additivity of the sizes of the vertex sets. This
is consistent with the notation “ ” for cartesian product.
Using G = K 1 ,2 and H = K 3 , we illustrate below their disjoint union, their
join, and their union in the case where the vertices are named so that the end-
points of G are two of the vertices of H.
We can express K r,s using K r,s = K r + K s or K r,s = (rK 1) (sK 1). More gener-
ally, G + H = G H. Using the word “ join” in “u and v are joined by an edge” is
consistent with the definition of the join of two graphs.
• • • • •
• • • • • •
• • • • •
G+H G H G∪H
5.1.24.* Remark. There is no standard notation for the order and size as graph
parameters. Textbook authors have tried: (G) , (G) (Bondy–Murty [1976]);
v(G) , e(G) (Bondy–Murty [2008]); | G | , e(G) (Bollobás [1978, 1998]); n(G) , e(G)
(West [1996, 2001]); | G | , G (Diestel [1997, etc.]). Conflicts arise with us-
ing v and e as a specific vertex and edge and using n as an integer variable.
Reserving special characters has problems when there are several graphs un-
der discussino: p , q (Harary [1969], Gould [1988]); v , e (Wallis [2000]); n , m
(Chartrand–Lesniak [1986, etc.], Volkmann [1991, 1996], Buckley–Lewinter
[2002]). Although | G | , G avoids these problems, internet respondents disliked
them. V. Strehl suggested #V(G) , #E(G); this avoids the difficulties but is not in
common use.
We therefore introduce no notation for these operators, but we often say “let
G be an n-vertex graph” or “let n = | V(G)| ”. Thus we encourage using n for the
order of a particular graph, with no global definition (this is common in computer
science). We similarly often let m = | E(G)| , reserving “ e” for a specific edge.
216 Chapter 5: First Concepts for Graphs
EXERCISES 5.1
5.1.5. (−) Let G be a graph with rs vertices that decomposes into rK s and sK r . Prove
G∼ = K r K s . Construct infinitely many examples to prove that in general a graph with rs
vertices may decompose into rH and sF , where r = | V(F)| and s = | V(H)| , without being
isomorphic to F H .
5.1.6. (−) Determine which pairs of graphs below are isomorphic.
d
• •c v• • • •
• •
h• • u• •y
e• • t• •x
• •
a
• •b s• •w • •
5.1.8. (−) Let G be a graph with adjacency matrix A and incidence matrix M . What do
the entries in position (i , j) of A2 and MM T say about G?
5.1.9. (−) In terms of a known enumerative problem, find the number of isomorphism
classes of X , Y -bigraphs such that | X | = m and | Y | = n and every vertex of X has degree 1.
5.1.10. (−) In terms of the numbers of vertices and edges in a graph G, count the vertices
and edges in the cartesian product G · · · G with factors all isomorphic to G.
5.1.11. (−) Prove that if (G) ≥ 3, then some cycle in G has a chord. (Czipzer [1963])
5.1.12. Let G n be the graph whose vertices are the permutations of [n], with two permu-
tations a1 , . . . , an and b1 , . . . , bn adjacent if they differ by switching two entries. Prove
that G n is bipartite.
Exercises for Section 5.1 217
5.1.13. Determine the least number of vertices in a graph in which the minimum length
of an even cycle is r and the minimum length of an odd cycle is s. (Harary–Kovacs [1982])
5.1.14. (+) Determine all r such that Cr K 2 can be expressed as the union of two cycles.
• • • •
• • • •
• • • •
• • • •
• • •
• •
• • • • •
• •
•• • •
• •
• •
• • • •
• • • • •
• • • • • • •
• • • • • •
• • ••
• • • • • •
• • • •
• • • •
• • • • • •
• • • • • • •
• • • • • •
• • • • • •
• •
• • • • • •
• •
• • • • • •
• • • • • •
• • • • • • •
• • • • • • • •
• • • • •
• •
• • • • • • •
• • • • • • • •
218 Chapter 5: First Concepts for Graphs
5.1.21. (♦) Determine which pairs of graphs below are isomorphic, presenting the proof
by testing the fewest possible pairs.
• • • • • • • • • • • • • • • •
• •• • • •• • • •
• • • • • • • • • • • • • •
• • • • • • • • • • • • • •
• •• • • •• • • •
• • • • • • • • • • • • • • • •
5.1.34. Count the independent sets of size 4 and the independent sets of size 3 in the Pe-
tersen graph. Find all smallest sets whose deletion eliminates all independent 4-sets.
5.1.35. Let e and e be non-incident edges in the Petersen graph. Prove that e and e lie
in a 5-cycle or in a 6-cycle. Determine the number of pairs of nonincident edges that lie in
a 5-cycle and the number that do not.
5.1.36. The Odd graph O¾ is the disjointness graph on the ¾-subsets of [2 ¾ + 1] (O2 is the
Petersen graph). For ¾ > 2, determine the girth of O¾ .
5.1.37. For the Heawood graph below, determine all cycle lengths and find a second
spanning cycle.
• •
• •
• •
• •
• •
• •
• •
5.1.38. For even n, determine the minimum number of distinct cycle lengths in an n-
vertex graph with minimum degree n/2.
5.1.39. Determine the smallest bipartite graph that is not a subgraph of the ¾-dimensional
cube Q¾ for any ¾ .
5.1.40. Define a graph Q ¾ with vertex set {0 , 1}¾ by uv ∈ E(Q¾ ) if and only if u and v agree
in exactly one coordinate. Prove that Q ¾ ∼
= Q¾ if and only if ¾ is even. (D.G. Hoffman)
5.1.41. For ¾ ∈ , let G be the subgraph of Q2¾+1 induced by the vertices in which the num-
ber of ones and zeros differs by 1. Prove that G is vertex-transitive and edge-transitive,
and compute the order, size, and girth of G.
5.1.42. Prove that Q¾ has exactly ¾ !2 ¾ automorphisms.
5.1.43. A subcube of dimension r in Q¾ is a subgraph induced by 2 r vertices that agree
on some ¾ − r coordinates.
(a) Prove that every cycle of length 2r in Q¾ lies in a subcube of dimension at most r.
Prove that this subcube is unique when r = 2 or r = 3 but need not be unique when r = 4.
(b) Count the 4-cycles and 6-cycles in Q¾ .
5.1.44. (♦) Regular graphs with no short cycle.
(a) Prove that every ¾-regular graph with girth at least 4 has at least 2 ¾ vertices.
Determine all such graphs where equality holds.
(b) Prove that every ¾-regular graph with girth at least 5 has at least ¾ 2 + 1 vertices.
Find examples where equality holds when ¾ is 2 or 3.
5.1.45. (♦) Prove that every ¾-regular graph with girth at least 6 has at least 2 ¾ 2 − 2 ¾ + 2
vertices. (Comment: The Heawood graph of Exercise 5.1.37 achieves equality when ¾ = 3.)
5.1.46. (+) Fix n , ¾ ∈ with 1 < ¾ < n − 1. Let G be an n-vertex graph such that every ¾-
vertex induced subgraph of G has m edges. For l ≥ ¾ , prove that every induced subgraph
of G with l vertices has m(¾l )/(¾l−−22) edges. Use this to prove G = K n or G = K n .
5.1.47. (+) A (¾ , ½)-cage is a smallest ¾-regular graph with girth ½ . For ¾ ≥ 2 and ½ ≥ 3,
prove that there exists a ¾-regular graph with girth ½ . (Hint: For ½ ≥ 5, construct such
a graph from a (¾ − 1)-regular graph H with girth ½ and a graph with girth ⌈ ½/2⌉ that is
regular with degree | V(H)|.) (Erdős–Sachs [1963])
220 Chapter 5: First Concepts for Graphs
Proof: Grouped by edges, there are 2m pairs (v , e) such that e is an edge incident
to vertex v. Grouped by vertices, there are ∑v∈V(G) d(v) pairs.
Thus a ¾-regular n-vertex graph has ¾ n/2 edges (Q¾ has ¾ 2¾−1 edges).
5.2.2. Corollary. Every graph has an even number of vertices of odd degree, and
thus no regular graph of odd degree has an odd number of vertices.
5.2.3. Example. The Petersen graph has twelve 5-cycles. The Petersen graph has
15 edges (it is 3-regular with ten vertices). We claim that every edge lies in four
5-cycles. If so, then 4 · 15 counts every edge in every 5-cycle; since a 5-cycle has
five edges, there must thus be 12 of them.
A 5-cycle through edge e contains a copy of P4 with central edge e. The end-
points of such a path are nonadjacent, since the girth is 5. Nonadjacent vertices
have one common neighbor, so each copy of P4 extends to one 5-cycle. Since e has
two incident edges at each end, and there are no triangles, e is the central edge
of exactly four copies of P4 . Thus e lies in four 5-cycles.
Proof: Translate one corner of R to the origin, as illustrated below. Form a bi-
partite graph G whose two parts are the subrectangles and the integer lattice
points, with Ri adjacent to (r, s) if (r, s) is a corner of Ri .
R2
2• • R1 R2 R3 R4 R5
R4 • • • • •
R3
1 R1 • •
• • • • • •
R5 (0,0) (0,2) (2,2) (2,1) (3,1) (3,0)
0• •
0 1 2 3
Since each subrectangle has a side of integer length, it has an even number
of integer corners; hence each vertex Ri has even degree in G. An integer point
is the corner of an even number of subrectangles if it is internal or on the side
of R, but it is a corner of only one subrectangle if it is a corner of R. Hence any
vertex of odd degree in G is an integer corner of R. Since the origin is one such
corner, Corollary 5.2.2 yields another. Hence R has a side of integer length.
DEGREE LISTS
We may ask whether some graph in a given class has specified values of cer-
tain parameters? For example, consider the vertex degrees. We can ask this about
the class of all n-vertex graphs.
5.2.5. Definition. The degree list or degree sequence of a graph G is the list
of its vertex degrees, usually written in nonincreasing order. A list of inte-
gers is graphic if it is the degree list of some graph G; then G realizes it.
When v ∈ V(G), vertex deletion yields the graph denoted G − v by delet-
ing v and all its incident edges from G.
5.2.6. Theorem. (Havel [1955], Hakimi [1962]) For n > 1, a nonnegative integer
list d of size n is graphic if and only if d is graphic, where d is the list of
size n − 1 obtained from d by deleting its largest element ¾ and subtracting
1 from its ¾ next largest elements.
Proof: If d = 3322211, for example, then d = 211211. Given a list d and a graph
G with degree list d , we add a new vertex adjacent to vertices in G having de-
grees that were reduced in forming d from d. The resulting graph G realizes d
and proves that the condition is sufficient.
222 Chapter 5: First Concepts for Graphs
• S
x
•
w• • •y
•
w w w w
• • • •
• •••• •••• •••• • ••••
• S → S → S ← S
• G H
•
•
G G∗ H∗ H
Section 5.2: Vertex Degrees 223
EXTREMALITY
5.2.9. Theorem. Every graph G with m edges has a bipartite subgraph with at
least m/2 edges.
Proof: Among all bipartite subgraphs of G, let H be one having the most edges.
We may assume that H has bipartition X , Y with X ∪ Y = V(G), and every edge
of G having endpoints in both X and Y belongs to H.
• •
X • • • Y
v• •
If some vertex v contributes fewer than half of its incident edges to H , then
v has more neighbors in its own part of the bipartition than in the opposite part.
Moving v to the other part puts more edges into H than it deletes from H , yield-
ing a larger bipartite subgraph.
Since H is a bipartite subgraph with the most edges, we conclude that
d H (v) ≥ d G(v)/2 for every v ∈ V(G). Summing over all vertices and applying
the Degree-Sum Formula yields | E(H)| ≥ | E(G)| /2.
We could also start with a spanning bipartite subgraph and move vertices to
gain edges until we reach the desired degree property. Choosing a largest bipar-
tite subgraph skips directly to that point. Many proofs by extremality have equiv-
alent inductive or algorithmic versions; using extremality is usually shorter. We
next use extremality by choosing a vertex of largest degree.
5.2.11. Theorem. (Tur án’s Theorem; Turán [1941]) The largest n-vertex
K r+1 -free graph is T n ,r . For the triangle-free case r = 2, it has ⌊ n2/4⌋ edges.
Proof: (Erdős [1970]) Every r-partite graph is K r+1 -free, since any r + 1 vertices
have two in the same part, which are not adjacent. A largest r-partite graph is a
complete r-partite graph. If two parts differ in size by more than 1, then moving
a vertex from the larger part to the smaller part gains more edges than it loses.
Hence the graph described is the unique largest r-partite graph with n vertices.
It thus suffices to prove that when G is K r+1 -free, there is an r-partite graph
H with V(H) = V(G) such that d H (v) ≥ d G(v) for all v ∈ V(G) (and therefore
| E(H)| ≥ | E(G)|). We prove this by induction on r, trivial for r = 1.
224 Chapter 5: First Concepts for Graphs
Mantel [1907] (jointly with others!) proved the case r = 2. We will revisit
Turán’s Theorem in Chapters 11 and 14 to study other techniques.
DIRECTED GRAPHS
The term digraph was introduced by Harary [1955a] at the request of P ólya
(as told in Harary [1989]). It is natural to allow loops in digraphs, such as in
the functional digraphs of permutations. For the analogue of vertex degrees, we
count entering and exiting edges separately.
5.2.13. Definition. For a vertex x in a digraph G, the indegree d−G(x) and out-
degree d+G(x) are the number of edges entering x or leaving x, respectively.
The out-neighborhood NG+(x) is {y: x → y}; the in-neighborhood NG−(x)
is {w: w → x}. Subscripts may be dropped. A vertex with indegree 0 is a
source; one with outdegree 0 is a sink.
Given a vertex ordering v1 , . . . , vn , the adjacency matrix A of a di-
graph is the 0 , 1-matrix defined by Ai , j = 1 if and only if vi → vj . With edges
e1 , . . . , e m , the incidence matrix M of a loopless digraph has Mi , j = 1 if vi
is the tail of e j , Mi , j = −1 if vi is the head of e j , and Mi , j = 0 otherwise.
Section 5.2: Vertex Degrees 225
5.2.14. Example. Compare the matrices for the digraph below with those for P4
in Example 5.1.10.
w x y a b c d
x
w⎛ 0 1 0 0⎞ • c • w ⎛ +1 0 0 0 ⎞
x ⎜0 0 1 0⎟ x ⎜ −1 +1 −1 0 ⎟
⎜ ⎟ a d ⎜ ⎟
y ⎜0 1 0 0⎟ y ⎜ 0 −1 +1 −1 ⎟
⎝0 0 1 0⎠ • b •y ⎝ 0 0 0 +1 ⎠
w
A(G) G M(G)
In drawing a digraph, we view the curve for an edge as an “arrow” from its
tail to its head. Basic properties of digraphs are like those of graphs, so we focus
primarily on graphs. For example, definitions of sub(di)graphs and isomorphism
are the same as those for graphs. Nevertheless, interesting problems for digraphs
arise when we consider orientations of graphs.
EXERCISES 5.2
5.2.14. (♦) For n ≥ 2, determine whether an n-vertex graph can have n distinct vertex
degrees. In an n-vertex graph with n − 1 distinct vertex degrees, what are the possibilities
for the repeated and missing degrees?
5.2.15. (+) Let G be a graph such that | N(x) ∩ N(y)| is odd for all x , y ∈ V(G). Prove that
| V(G)| is odd. (Engel [1998], Royle [2010], Silwal [2018])
Exercises for Section 5.2 227
5.2.16. (♦) Let d be a list of n nonnegative integers with even sum that differ by at most
1 and all are at most n − 1. Prove that d is graphic.
5.2.17. Given a nonincreasing list d of nonnegative integers, let d be obtained by deleting
d ¾ and subtracting 1 from the d ¾ largest elements remaining in the list. Prove that d is
graphic if and only if d is graphic. (Wang–Kleitman [1973])
5.2.18. Let a1 , . . . , a¾ be integers such that 0 < a1 < · · · < a¾ .
(a) Construct a graph with a¾ + 1 vertices whose set of distinct vertex degrees is
a1 , . . . , a¾ . (Kapoor–Polimeni–Wall [1977])
(b) Prove that when a1 = 1, the construction is unique if and only if there is a unique
graph on fewer than a¾ vertices with degree set {a2 − 1 , . . . , a¾−1 − 1}.
5.2.19. Let G and H be graphs with V(G) = V(H) and d G(v) = d H (v) for all v ∈ V(G).
Use induction on number of edges belonging to exactly one of G and H to prove that G
can be turned into H by using 2-switches. (Comment: This yields an alternative proof of
Theorem 5.2.8.)
5.2.20. Let p and q be nonnegative integer lists, with p = (p1 , . . . , pr) and q = (q1 , . . . , qs).
The pair (p , q) is bigraphic if some bipartite graph has p1 , . . . , pr as the vertex degrees in
one part and q1 , . . . , qs as the degrees in the other. When ∑ pi > 0, prove that (p , q) is bi-
graphic if and only if (p , q ) is bigraphic, where (p , q ) is obtained from (p , q) by deleting
the largest element ¾ from p and subtracting 1 from the ¾ largest elements of q.
5.2.21. Let A and B be r-by-s matrices with entries in {0 , 1}, having the same vector of
row sums and the same vector of column sums. Prove that A can be transformed into B
via steps in which the 0s and 1s are interchanged in a 2-by-2 permutation submatrix (that
is, submatrices (01
10
) and (10
01
) can be substituted for each other). (Ryser [1957])
5.2.22. An expansion of a graph replaces two edges with paths of length 2 through two
new vertices joined by an edge. Erasure is the inverse. Prove that a 2-switch can be per-
formed using expansions and erasures. Use this to show that every 3-regular graph arises
from K4 by expansions and erasures.
• • • •
expansion
• • • •
erasure
• • • •
5.2.23. Given an X , Y -bigraph G and edges x1 y1 and x2 y2 with x1 , x2 ∈ X and y1 , y2 ∈ Y ,
say that a bridging operation deletes x1 y1 and x2 y2 and adds two new vertices x3 and y3
with N(x3) = {y1 , y2 , y3 } and N(y3) = {x1 , x2 , x3 }. Prove that every 3-regular bipartite
graph can be obtained from a graph whose components are isomorphic to K3 ,3 by repeated
bridging operations. (Kotzig [1966a])
5.2.24. For m > 0, prove that every graph with m edges has a bipartite subgraph with
strictly more than m/2 edges. Construct a sequence of graphs (with m > 0) whose largest
bipartite subgraphs tend to half the number of edges.
5.2.25. Prove that the maximum number of edges in a bipartite subgraph of the Petersen
graph is 12. (Comment: Bondy–Locke [1986] proved that every triangle-free graph with
maximum degree 3 has a bipartite subgraph with at least 4/5 of its edges.)
5.2.26. Prove or disprove: Every graph has a vertex partition into two nonempty sets such
that each vertex has at least half of its neighbors in its own set.
5.2.27. (♦) For a graph G with no isolated vertices, prove that V(G) can be partitioned
into sets of size at least 2 whose induced subgraphs each have a spanning star. (Winkler)
228 Chapter 5: First Concepts for Graphs
5.2.28. A directed graph is unipathic if for all vertices x and y there is at most one (di-
rected) x , y-path. Let T n be the tournament with vertex set [n] such that i → j if and only
if i < j . What is the maximum number of edges in a unipathic subgraph of T n ? How many
unipathic subgraphs have that size? (Maurer–Rabinovitch–Trotter [1980])
5.2.29. (♦) Two inductive proofs of Mantel’s Theorem (the case r = 2 of Theorem 5.2.11).
(a) Given adjacent vertices x and y in an n-vertex graph, prove that xy lies in at least
d(x) + d(y) − n triangles. Use this to prove by induction on n that every n-vertex graph
with more than n2/4 edges contains a triangle.
(b) Prove that an n-vertex graph G with more than n2/4 edges has a vertex v such that
G − v has more than (n − 1)2/4 edges, again yielding Mantel’s Theorem by induction.
5.2.30. (♦) Strengthening Mantel’s Theorem (the case r = 2 of Theorem 5.2.11).
(a) For a vertex v in an n-vertex graph G, let º (v) be the maximum size of an inde-
pendent set contained in N(v). Prove ∑v∈V(G) º (v) ≤ n2/2, and determine which graphs
achieve equality. (Hint: Consider a largest independent set in G.)
(b) Use part (a) to obtain the case r = 2 of Theorem 5.2.11. (Galvin [1999])
5.2.31. (♦) Let G be an n-vertex graph having an orientation in which every triangle is ori-
ented cyclically. Prove that | E(G)| ≤ n2/3 and that this is sharp. (Brown–Harary [1970])
5.2.32. The game “bridge” has two teams of two partners each. Consider a club in which
four players cannot play if two of them have previously been partners that night. One
night 15 members arrive, but one wants to study graph theory. The other 14 play until
each has partnered with four others. After six more games (12 partnerships), they cannot
find four players with no pair of previous partners. Prove that adding the graph theorist
allows at least one more game to be played. (adapted from Bondy–Murty [1976, p. 111])
5.2.33. (♦) Let tr(n) be the number of edges in the n-vertex r-partite Turán graph, and let
G be an n-vertex graph not containing K r+1 . Prove that if tr(n) − | E(G)| ≤ s, then G can
be made into an r-partite graph by deleting at most s edges. (Hint: Consider the proof of
Turán’s Theorem (Theorem 5.2.11).) (Füredi [2015])
5.2.40. (♦) Let G and H be tournaments on a vertex set V . Prove that d+G(v) = d+H (v) for
all v ∈ V if and only if G can be turned into H using direction-reversals on cycles of length
3. (Hint: Consider the graph of edges oriented differently in G and H .) (Ryser [1964])
Section 5.3: Connection and Decomposition 229
5.3.1. Definition. A u , v-path is a path with first and last vertices u and v, called
its endpoints; other vertices are internal vertices. A graph G is con-
nected if it contains a u , v-path for all u , v ∈ V(G). The components of G
are its maximal connected subgraphs.
The connection relation on the vertex set of a graph G is the set of
pairs u , v ∈ V(G) such that G has a u , v-path; we say “u is connected to v”
or “u and v are connected by a path”. A connected set of vertices is a set S
such that the induced subgraph G[S] is connected.
To state the stronger property that u and v are adjacent, we avoid ambigu-
ity by saying “u and v are joined by an edge”, not “u and v are connected”. For
digraphs, we use a stronger notion of connection.
For example, the digraph in Example 5.2.14 has three strong components,
with vertex sets {w}, {x , y}, and { }.
We need more general notions of movement. The definitions and results hold
for both graphs and digraphs, with edges in digraphs being ordered pairs.
230 Chapter 5: First Concepts for Graphs
5.3.3. Definition. A walk is a vertex list ⟨v0 , . . . , v¾ ⟩ such that each vi vi+1 is an
edge. The length of ⟨v0 , . . . , v¾ ⟩ is ¾ , the number of edges “traversed”. A
walk or cycle is odd or even when its length is odd or even. A walk with first
vertex u and last vertex v is a u , v-walk; these are its endpoints. A walk is
closed if its endpoints are the same.
u• • • • •v → u• • • • •v
5.3.6. Remark. Proving connectedness for a graph can be nontrivial. For exam-
ple, given numbers d1 , . . . , d n , let S be the set of graphs with vertices v1 , . . . , vn
in which the degree of vi is d i , for each i. Define a graph with vertex set S by
making two vertices adjacent if one can be obtained from the other by a 2-switch.
Theorem 5.2.8 proves that every such graph is connected. Exercise 20 is another
problem of this type. For undirected graphs, Corollary 5.3.5 implies that for
connectedness it suffices to show that there are paths from a single vertex to all
others. Connected graphs are those having one component.
Lemma 5.3.4 has an analogue for closed walks. Note that a single vertex
forms a closed walk of length 0, but this is not a cycle.
5.3.8. Lemma. Every odd closed walk contains the vertices of an odd cycle (in
order) as a sublist.
Section 5.3: Connection and Decomposition 231
Proof: Given an odd closed walk W , let W be a minimal odd closed walk contained
in W (viewing W cyclically, without a fixed beginning vertex). If some vertex re-
peats in W , then it splits W into portions of odd and even positive lengths, each
of which is closed. The odd portion is a shorter odd closed walk contained in W .
Hence no vertex repeats, and the vertices of W in order traverse a cycle.
• • • • •
v
• • •
• • • • • •
5.3.9. Theorem. (K önig) A graph is bipartite if and only if it has no odd cycle.
Proof: A walk in a bipartite graph must alternate between the parts. Hence
every closed walk (including every cycle) has even length.
Conversely, when G has no odd cycle, we construct a bipartition of each com-
ponent H of G. Choose any v ∈ V(H). If for some vertex x there is both an even
v , x-walk and an odd v , x-walk, then they combine to form a closed odd walk, which
by Lemma 5.3.8 contains an odd cycle. Hence we can label each x ∈ V(H) as “odd”
or “even” by the parity of the v , x-walks in H. This is a bipartition of H , because
appending the edge xy to a v , x-walk shows that x and y have opposite parity.
Deleting parts of a graph can increase the number of components. Recall that
G − v denotes the subgraph of G obtained by deleting a vertex v. We denote edge
deletion similarly; we need to know whether we are deleting a vertex or an edge.
5.3.12. Corollary. Every graph with n vertices and ¾ edges has at least n − ¾
components. Every connected n-vertex graph has at least n − 1 edges, which
is sharp for paths.
Proof: With n vertices and no edges, there are n components. Each added edge
reduces the number of components by at most 1.
5.3.13. Proposition. Every nontrivial graph has at least two vertices that are
not cut-vertices.
Proof: Let u be an endpoint of a maximal (nonextendible) path P. Since P − u
is connected and N(u) ⊆ V(P), the neighbors of u lie in one component of G − u.
Hence u is not a cut-vertex.
• • •u
The reader deserves an apology about “even” and “odd”. An odd cycle is an
even graph, and a graph that is not an even graph is not called an odd graph.
Given a family , we can ask whether an input graph G decomposes into
graphs in . Decomposing a complete graph into copies of a smaller complete
graph is the central topic of Design Theory (Chapter 13). A complete graph de-
composes into two copies of a graph F if and only if F is self-complementary.
Hajós conjectured that every n-vertex even graph decomposes into at most
⌊ n/2⌋ cycles, and Gallai conjectured that every connected n-vertex graph decom-
poses into at most ⌈ n/2⌉ paths. These have been open for many years; see Exercise
48 for complete graphs. Lovász [1968a] proved that every n-vertex graph decom-
poses into at most ⌊ n/2⌋ subgraphs when both paths and cycles are allowed.
Section 5.3: Connection and Decomposition 233
The exercises pose many decomposition problems. For example, does the Pe-
tersen graph decompose into copies of P4 ? Does it decompose into copies of K 1 ,3 ?
The center of a star with at least two edges is its vertex of maximum degree.
EULERIAN CIRCUITS
5.3.18. Example. The Königsberg Bridge Problem. It is said that graph theory
began in K önigsberg. Located on the Pregel river at the island of Kneiphopf,
K önigsberg had seven bridges as shown on the left below. The citizens wondered
whether it was possible to take a stroll crossing each bridge exactly once.
x
•
X e1 e6
1 2 e2
6 e5
W 5 Y w• •y
7
3 4 e4
e3 e7
Z
•
We model this problem by shrinking the land masses to single points to ob-
tain the diagram of connections shown on the right above. We want to traverse
the edges once each. However, the diagram has multiple edges joining vertices.
This suggests a model more general than graphs.
The convention that a loop contributes twice to the degree of its vertex ex-
tends the Degree-Sum Formula (and its consequences). A loop would arise in Ex-
ample 5.3.18 from a bridge whose endpoints lie in the same land mass. We treat
loops and paired multiedges in a multigraph as cycles of lengths 1 and 2.
234 Chapter 5: First Concepts for Graphs
5.3.20. Remark. Graphs vs. multigraphs. Many definitions and results for
graphs hold also for multigraphs (with the same proofs). Exceptions are state-
ments that need distinctness of the other endpoints of the edges incident to a
given vertex. The underlying graph of a loopless multigraph is the graph hav-
ing the same edges, but with multiplicity 1.
In the adjacency matrix of a multigraph, entry Ai , j counts the edges with
endpoints vi and vj . A loopless multigraph can be viewed as a complete graph
with a nonnegative integer weight function giving edge multiplicities. An iso-
morphism is a vertex bijection that preserves edge multiplicities.
When moving from vertex to vertex in a multigraph, there may be a choice
of edges. For technical precision, one should thus define a walk as an alternating
list v0 , e1 , v2 , . . . , e¾ , v¾ of vertices and edges. In the absence of multiedges, list-
ing only the vertices is precise. Extending elementary concepts to multigraphs is
straightforward, so we will not be formal about notation for walks.
Graphs have no loops or multiedges. We may emphasize this by calling a
graph a simple graph, particularly when also discussing multigraphs. When
an object under discussion is a multigraph, the term “subgraph” refers to any
multigraph contained in it; we avoid the awkward term “submultigraph”.
Of course, the digraph model also extends to allow multiedges.
In the K önigsberg problem, the people wanted a special walk in the multi-
graph of Example 5.3.18. Such walks are named in honor of Euler ’s paper about
the problem and its generalizations.
5.3.21. Definition. A trail is a walk that traverses each edge at most once (ver-
tices may repeat). A circuit is a closed trail, viewed cyclically regardless of
the starting vertex (it is an equivalence class of closed trails with the same
cyclic ordering of edges). An Eulerian trail in a multigraph G is a trail
traversing all edges of G. An Eulerian circuit is a closed Eulerian trail.
The difference between a trail and the subgraph consisting of its edges is that
the trail specifies an order on the edges.
The K önigsberg multigraph has no Eulerian trail. Each visit of a trail to a
vertex contributes twice to the degree by its entrance and exit. Only at the start
and end can the degree be odd. Thus a graph with an Eulerian trail has at most
two vertices of odd degree, and only even graphs can have Eulerian circuits. Eu-
ler [1736] observed that this condition is also sufficient for graphs with only one
nontrivial component, but the first published full proof was by Hierholzer [1873].
EXERCISES 5.3
5.3.1. (−) Prove that the complement of any disconnected graph is connected.
5.3.2. (−) Let ¾ , l , n be nonnegative integers with ¾ + l = n. Find necessary and sufficient
conditions on (¾ , l , n) such that there exists a connected n-vertex graph with ¾ vertices of
even degree and l vertices of odd degree.
5.3.3. (−) Prove or disprove the following statements about graphs.
(a) Every union of two distinct u , v-walks contains a cycle.
(b) Every union of two distinct u , v-paths contains a cycle.
(c) A circuit contains a cycle through each of its vertices.
(d) If (G) ≥ 2, then every vertex of G belongs to some cycle.
5.3.4. (−) Prove that every finite digraph with no vertex of outdegree 0 contains a cycle.
5.3.5. (−) Prove that the number of vi , vj -walks of length in a graph is entry (i , j) in A¾ ,
where A¾ is the th power (multiplication) of the adjacency matrix.
5.3.6. (−) Prove that a multigraph G is bipartite if and only if every subgraph H of G has
an independent set consisting of at least half of V(H).
5.3.7. (−) The Möbius ladder M¾ is the graph formed by adding to a 2 -cycle a set of
edges joining opposite vertices on the cycle. Determine all such that M¾ is bipartite.
(Comment: Why is this graph called a “Möbius ladder ”?)
236 Chapter 5: First Concepts for Graphs
5.3.8. (−) Let D1 , . . . , D¾ be the strong components of a digraph D. Let D∗ be the loopless
digraph with vertices v1 , . . . , v¾ such that vi → vj if and only if i
= j and D has an edge
from Di to Dj . Prove that D∗ has no cycle. Conclude that in every digraph, some strong
component has no entering edges, and some strong component has no exiting edges.
• • •
D • • • D∗
• • •
5.3.9. (−) Determine all ¾ such that the hypercube Q¾ decomposes into 4-cycles.
5.3.10. (−) Prove that in a connected graph that is not a complete graph, every vertex
belongs to an induced copy of P3 . Does the same conclusion hold for every edge?
5.3.11. (−) Decompose Q3 into copies of K1 ,3 and into copies of P4 . Does the Petersen graph
decompose into copies of P4 ? Does it decompose into copies of P6 ?
5.3.12. (−) Prove or disprove: A 3-regular graph with more than six vertices cannot de-
compose into three paths.
5.3.13. (−) Characterize the pairs of positive integers r, s such that K r,s decomposes into
two isomorphic subgraphs.
5.3.14. (−) Let G be a disconnected graph with n vertices. Find the maximum possible
value of (G). When (G) = , find the maximum possible value of (G).
5.3.15. (−) Let G and H be two disconnected graphs with the same vertex set. Prove that
some two vertices are in different components in both G and H .
5.3.16. (−) Prove or disprove the following statements.
(a) No connected Eulerian graph has odd size and even order.
(b) If e and are incident edges in an Eulerian graph G, then e and appear consec-
utively in some Eulerian circuit of G.
5.3.17. (−) Two Eulerian circuits are equivalent if they have the same pairs of consecutive
edges, viewed cyclically. For example, a cycle has only one equivalence class of Eulerian
circuits. How many equivalence classes of Eulerian circuits are there in K 2 ,r ?
5.3.18. (−) For , r ∈ , define G on the set of integer -tuples by uv ∈ E(G) if and only if
∑ |ui − vi | = r. Prove that G is disconnected when r is even and bipartite when r is odd.
5.3.19. Let G be the graph defined on all binary -tuples by making x and y adjacent if
they differ in exactly two positions. Determine the number of components of G.
5.3.20. Let G n be the graph whose vertices are the permutations of [n] in word form,
with permutations a1 , . . . , an and b1 , . . . , bn adjacent if they differ by interchanging two
consecutive entries. Prove that G n is connected.
5.3.21. Let G be a connected graph with no induced subgraphs that are paths or cycles of
length 3. Prove that G is a complete bipartite graph.
5.3.22. For n ≥ 6, prove that the minimum number of edges that must be deleted from
K n to obtain a graph having a decomposition into two disconnected subgraphs without iso-
lated vertices is 4. (Hint: Use induction. Comment: This result strengthens the easy fact
that the complement of a disconnected graph is connected.) (Caro–Roditty [2004])
5.3.23. Given vertices u and v in a connected graph G, prove that there is a unique parti-
tion of V(G) into sets A and B inducing connected subgraphs such that u ∈ A, v ∈ B, and
every edge joining A and B is incident to v. (Liu [1985])
Exercises for Section 5.3 237
5.3.24. (♦) In a connected graph G, let P and Q be two paths chosen to maximize the sum
of their lengths. Prove that P and Q have a common vertex.
5.3.25. (♦) Prove that a connected graph G with at least three vertices has two vertices x
and y such that (1) G − {x , y} is connected and (2) x and y are adjacent or have a common
neighbor. (Hint: Consider a longest path.)
5.3.26. (♦) For integer weights on E(K n), not all even, prove the following equivalent.
(A) Every cycle has even total weight.
(B) Every triangle has even total weight.
(C) The edges with odd weight form a spanning complete bipartite subgraph.
5.3.28. (♦) Let D be a strongly connected orientation of a graph G. Prove that if G has
an odd cycle, then D has an odd cycle.
5.3.29. (+) For a strong digraph D, let º (D) be the length of the shortest closed walk
visiting every vertex. Prove that the maximum of º (D) over all n-vertex strong digraphs
is ⌊ (n + 1)2/4⌋ if n ≥ 2. (Vizing–Goldberg [1969], Cull [1980])
5.3.30. Let G be an oriented graph with | V(G)| ≥ 3. Prove that edges can be added to
extend G to a strongly connected oriented graph if and only if V(G) contains no nonempty
proper subset S such that xy ∈ E(G) for all x ∈ S and y ∈ S. (Boesch–Tindell [1980],
Farzad–Mahdian–Mahmoodian–Saberi–Sadri [2006])
5.3.31. (+) For a graph G, let c(G) denote the least ¾ such that every edge lies in a cycle
of length at most ¾ (infinite when G has a cut-edge). Prove√ for n ≥ 3 that the minimum of
| E(G)| + c(G), over n-vertex connected graphs, is n + ⌈ 2 n − 1 ⌉ . (Butler–Mao [2007])
5.3.32. Let W be a nontrivial closed walk that does not contain a cycle. Prove that some
edge of W occurs twice in succession (once in each direction).
5.3.33. Let C be a closed walk in a graph G, and let H be the subgraph of G whose edges
are those used an odd number of times in C. Prove that H is an even graph.
5.3.34. (♦) A parity subgraph of a graph G is a spanning subgraph H such that d G(v) ≡
d H (v) (mod 2) for all v ∈ V(G). Prove that a parity subgraph contains every cut-edge of G.
5.3.36. (+) Determine the maximum number of cut-edges in a connected 3-regular graph
with n vertices. (O–West [2010] determined this for (2r + 1)-regular n-vertex graphs.)
5.3.39. (♦) Non-bipartite graphs have short odd cycles. Let G be a non-bipartite triangle-
free n-vertex graph, and let ¾ = (G). Let C be a shortest odd cycle in G, with length l.
(a) Prove that every vertex not in V(C) has at most two neighbors in V(C).
(b) Prove that l ≤ 2n/ . (Campbell–Staton [1991])
(c) Prove that the inequality of part (b) is best possible when is even.
5.3.40. (♦) Prove that some loopless multigraph has degree list d1 , . . . , d n if and only if
∑ di is even and no value is more than half the total. (Hakimi [1962])
5.3.41. Prove that there is a connected multigraph whose vertex degrees are the positive
integers d1 , . . . , d n if and only if ∑ d i is even and at least 2n − 2.
5.3.42. Prove that the degree list of any loopless multigraph has a realization whose un-
derlying graph has no cycle or has one cycle, with length 3. (Will–Hulett [2004])
5.3.43. (+) Let G be a graph with 2r + 1 vertices in which any r vertices have a common
neighbor. Prove that some vertex is adjacent to all others. (Burungale [2006])
5.3.44. (+) Suppose that n wires run from the top to the bottom of a tall building through
a tube. The correspondence between the tops and the bottoms is unknown. The inspector
has a battery and a lamp. When a circuit is completed using battery, lamp, and wires, the
lamp lights. Prove that the inspector can match up the ends using only one trip up and
down the building. The inspector can link some pairs of wires at the bottom, go up and
make similar links and tests, and finally return to the bottom to complete the analysis.
5.3.45. (♦) Prove that K n decomposes into three isomorphic subgraphs if and only if n + 1
is not divisible by 3.
5.3.46. Decompose the Petersen graph into three isomorphic connected subgraphs.
5.3.47. Let G be a -regular graph, where is odd. Prove that in any decomposition of G
into paths, the average length of the paths is at most .
5.3.48. (♦) Prove that K n decomposes into ⌈ n/2⌉ paths. Prove that K n decomposes into
⌊ n/2⌋ cycles when n is odd. (Walecki, in Lucas [1892])
5.3.49. (♦) Prove that every connected graph has an orientation with at most one vertex of
odd outdegree. Conclude that a connected graph with an even number of edges decomposes
into paths with two edges. (Rotman [1991])
5.3.50. Use induction on to prove that a connected graph with 2 edges decomposes into
paths with two edges. Is this true without the hypothesis of connectedness?
5.3.51. (♦) Nash-Williams [1970] conjectured that when n is sufficiently large, an n-vertex
even graph G with | E(G)| divisible by 3 decomposes into triangles if (G) ≥ 43 n. Use the
graph Ht to prove that the degree threshold is sharp, where Ht is formed from C4 by ex-
panding each vertex into K t and each edge into K t ,t .
5.3.52. Let G be an n-vertex graph with (G) ≥ n/4, no cut-edge, and | E(G)| divisible by
3. Barát–Thomassen [2006] proved that G decomposes into copies of K1 ,3 . Prove that this
is sharp using a graph formed from 4K n/4 by one edge for each pair of components.
Section 5.4: Trees and Distance 239
5.3.53. Prove that the edges of every n-vertex graph can be covered using at most ⌊ n2/4⌋
edges and triangles, with equality needed only for K⌊n/2⌋ ,⌈n/2⌉ . (Erdős–Goodman–P ósa
[1966]) (Comment: Bollobás [1976a] generalized to coverings by edges and copies of K r .)
5.3.54. (+) The broom Bn ,r is the n-vertex graph formed from the union of the path Pn−r
and the star K1 ,r by letting the center of the star be an endpoint of the path. Prove that if
K n decomposes into copies of Bn ,r , then n is even and n ≥ 4r − 2. (Kovář–Kubesa–Meszka
[2012]) (Comment: the condition is also sufficient , except for (n , r) = (6 , 2).)
¾
5.3.55. (+) For a graph G, let (G) = max{r: K r ⊆ G}. Prove ∑i=1 (G i) ≤ n + (¾2) for any
decomposition (G1 , . . . , G ¾) of K n . Provide a construction to show that the bound is best
possible when n ≥ (¾2) . (Füredi–Kostochka–Škrekovski–Stiebitz–West [2005])
5.3.56. (♦) Prove or disprove each statement below.
(a) Every graph G has an orientation D such that for every v ∈ V(G), the numbers of
edges entering v and leaving v in D differ by at most 1.
(b) Every graph G has an orientation D such that for every S ⊆ V(G), the numbers
of edges entering S and leaving S in D differ by at most 1.
5.3.57. (♦) Let G be a connected graph having | E(G)| even and an even number of vertices
of each odd degree. Prove that G decomposes into two spanning subgraphs with the same
degree list. Show that the last condition is needed. (Choi–Ozkahya–West [2010])
5.3.58. Eulerian digraphs. Let D be a digraph with no isolated vertex.
(a) Prove that D has an Eulerian circuit if and only if d+(v) = d−(v) for each vertex v
and the underlying graph is connected.
(b) Suppose that d−(v) = d+(v) for every vertex v, except that d+(x) − d−(x) = =
d−(y) − d+(y). Prove that D contains edge-disjoint x , y-paths.
5.3.59. (♦) de Bruijn cycles. For , l ∈ , form a digraph G with V(G) = [] l (called the
de Bruijn graph) as follows. For u , v ∈ [] l , create an edge uv if the last l − 1 positions
in u form the same (l − 1)-tuple as the first l − 1 positions in v.
(a) Prove that the de Bruijn graph is an Eulerian digraph. (de Bruijn [1946])
(b) Prove that there is a cyclic arrangement of l+1 characters chosen from [] such
that the l+1 strings of length l + 1 are distinct. (Good [1946], Rees [1946])
5.3.60. (+) Alternative characterization of Eulerian graphs.
(a) For uv ∈ E(G) when G is Eulerian, prove that an odd number of u , v-trails in G − uv
reach v only at the end, and that an even number of these are not paths. (Toida [1973])
(b) Let v be a vertex of odd degree in a graph G. Prove that for some edge incident to
v, the number of cycles through it is even.
(c) Use parts (a) and (b) to show that a nontrivial connected graph is Eulerian if and
only if every edge belongs to an odd number of cycles. (McKee [1984])
PROPERTIES OF TREES
5.4.2. Proposition. Every nontrivial tree has at least two leaves. Deleting a
leaf from a tree yields a tree.
Proof: Nontrivial trees have no isolated vertices. Since trees are acyclic, the
endpoints of every maximal path are leaves.
Deleting a vertex cannot create a cycle. A leaf v in a graph G cannot be a cut-
vertex of G, since v can have a neighbor only in one component of G − v. Thus if
v is a leaf of a tree G, then G − v is acyclic and connected and hence is a tree.
Proposition 5.4.2 implies that each tree with n + 1 vertices arises from a tree
with n vertices by adding an edge to a new vertex. This justifies inductive proofs
about trees that perform the induction step by “growing a new leaf ” from an ar-
bitrary vertex of an arbitrary smaller tree.
The fact that the number of edges in a tree is one less than the number of
vertices is one of the most fundamental properties of a tree.
5.4.3. Proposition. For a graph G with n vertices, any two of the following three
properties implies the third (and hence characterize trees).
(a) G is acyclic.
(b) G is connected (that is, G has one component).
(c) G has n − 1 edges.
Proof: Adding an edge to a graph reduces the number of components (by 1) if
and only if it joins vertices from distinct components and hence creates no cycle.
Starting with no edges, we thus conclude that a graph with ¾ edges has exactly
n − ¾ components if and only if it has no cycles.
Therefore, an acyclic graph has one component if and only if it has n− 1 edges,
and a graph with n − 1 edges and one component must be acyclic.
Various other properties also characterize the graphs that are trees. It is
efficient to prove a cycle of implications.
5.4.4. Proposition. For each property below, a graph G is a tree if and only if it
satisfies that property.
(a) G is connected and every edge is a cut-edge.
(b) G contains exactly one u , v-path whenever u , v ∈ V(G).
(c) G has no cycle, and adding any edge creates exactly one cycle.
Section 5.4: Trees and Distance 241
e
• •
U • • e • • U
• •
w w w w
• • • •
u
• • • •
• • • • • • • •
• • • •
u
T
• Type 1
• • Type 2
•
Spanning trees S and S that are vertices of H are adjacent in H if and only
if each tree has exactly one edge not belonging to the other. Thus a neighbor S
of S is obtained from S by adding one edge of S and deleting one edge of S.
One endpoint of the added edge increases in degree; call it v. If S is Type 1,
then v = w. If S is Type 2, then v must be the vertex u such that d S(u) = d T (u)− 1.
Since u is not isolated in S, in both cases v is not a leaf in T . Hence the number of
choices for the added edge is odd when S is Type 1 and is even when S is Type 2.
Let vx be the added edge, where x ∈ NG(v)− NS(v). Adding vx creates a unique
cycle with edges of S. The degree of x must not increase, because already degree
is increasing at v. Hence the edge deleted to form S must be the edge reaching
x along the v , x-path in S. The resulting tree S has vertex degrees putting it in
V(H); it is Type 1 if y = w and Type 2 otherwise.
We have proved d H (S) = d G(v) − d S(v) and shown that the degree is odd when
S is Type 1 and even otherwise. Hence the number of Type 1 trees is even.
v=w • • • y v=u • • • y (= w?)
• S • • S •
S ← S S ← S
• •
Type 1 x x Type 2
A famous result of Smith (see Tutte [1946]) states that in a 3-regular graph
the number of spanning cycles containing a particular edge is even. A stronger
version of this follows easily from Theorem 5.4.7.
In a connected graph, each vertex can be reached from every other; how many
steps are needed? The concept is valid for graphs or digraphs.
5.4.10. Definition. The diameter of a graph G is max u ,v∈V(G) d(u , v). The ec-
centricity (u) of a vertex u is max v∈V(G) d(u , v). The radius of G equals
minu∈V(G) (u). The center of G is the set of vertices with least eccentricity.
The diameter is the largest vertex eccentricity. The term “diameter ” comes
from geometry, where diameter is the greatest distance between two vertices in
a set. When G is not connected, the diameter, the radius, and each eccentricity
are infinite. The graph below has three vertices in its center; we have labeled
each vertex with its eccentricity.
5• •5 4• •5
5•
3
• • • •4
4 3
5• 3•
5.4.11. Theorem. (Jordan [1869]) The center of a tree consists of one vertex or
two adjacent vertices.
Proof: Let d be the diameter of a tree T . Let S be the central vertex or edge on a
path P of length d in T . The vertices of S have eccentricity ⌈ d/2⌉ , since a vertex
at distance greater than ⌈ d/2⌉ from v ∈ S would combine with half of P to form
a path longer than P.
All vertices outside S have eccentricity larger than ⌈ d/2⌉ , by the uniqueness
of paths in trees. From a vertex u, follow a path to P , and then add at least ⌈ d/2⌉
edges to reach the farther end of P , with equality in the last step only if the first
vertex reached on P is in S.
Theorem 5.4.11 also has an easy inductive proof (Exercise 44) and a proof us-
ing the Pigeonhole Principle (Exercise 10.1.24).
Beyond trees, small diameter remains desirable for efficiency of communi-
cation. A complete graph has diameter 1, while the star K 1 ,n−1 has diameter 2
with only n − 1 edges, but physical constraints may limit the maximum degree.
The problem of finding the smallest diameter among n-vertex graphs with maxi-
mum degree can be solved by instead determining for all and d the maximum
number of vertices in a graph with diameter d and maximum degree at most .
244 Chapter 5: First Concepts for Graphs
5.4.12. Proposition. (Moore bound) Graphs with maximum degree ¾ and di-
ameter d have at most 1 + ¾ (¾−¾1) −1
d
−2 vertices.
Proof: Let G be a graph with maximum degree ¾ and diameter d. From a vertex
v, at most ¾(¾ − 1)i−1 vertices have distance i in G, and all vertices are within
distance d. Thus G has at most ¾ ∑ i=1 (¾ − 1)i−1 vertices other than v. Evaluating
d
• •
• •
• • • • •
•
• • • • • • • •
• • • • • • • • • • • • • •
When d(v) < ¾ for some vertex v, starting the search at v multiplies the bound
by the fraction d(v)/¾ . Thus graphs within a fraction 1/¾ of the bound must be
¾-regular. Equality requires adding edges among the leaves of the search tree to
establish distance at most d for all vertex pairs. As shown above, the Petersen
graph accomplishes this when d = 2 and ¾ = 3 (further motivating study of the
Petersen graph!).
Equality in the Moore bound requires the full tree grown from a vertex and
hence girth at least 2d + 1. This is best possible; every graph of diameter d that
is not a tree has girth at most 2d + 1 (Exercise 9).
For diameter 2, the least number of edges in an n-vertex graph with maxi-
mum degree ¾ is known √ exactly when ¾ ≥ (n + 1)/2 (Erdős–Rényi–Sós [1966]) and
asymptotically
√ when n − 1 ≤ ¾ ≤ n/2 (Bollobás [1971]).
Why n − 1? The Moore bound requires √ n ≤ 1 + ¾ 2 for diameter 2. Graphs
with diameter 2 and maximum degree near n don’t look much like trees. We
can get close with a cartesian product.
√
5.4.14. Example. Diameter 2 with degree as small as 2 n. Given n = m2 , let
G m = K m K m . Thus V(G m) = {(i , j): 1 ≤ i , j ≤ m}, with (i , j) and (¾ , l) adjacent
if i = ¾ or j = l. Each vertex has degree 2m − 2, and non-adjacent vertices (i , j)
and (¾ , l) have common neighbors (i , l) and (¾ , j). √
√
However, G m is regular of degree 2 n − 2, not n − 1. Reducing the degree
√
to approximately n − 1 requires finite projective planes, which can be obtained
Section 5.4: Trees and Distance 245
from finite fields; see Chapter 13. For values of n having the form q2 + q + 1 (where
q is a power of a prime), the result is a√nearly-regular graph of diameter 2 with
maximum degree q + 1, which equals ⌈ n − 1⌉ (some vertices have degree q).
• • • •
• • • •
• • • •
• • • •
• 9 •
1 8 2 4
• 7 • 6 •
11 10 5 3
• •
12
Other early algorithms were Bor u̇vka [1926], Jarnı́k [1930], and Prim [1957]
(Exercise 67). Modern improvements use clever data structures to merge compo-
nents quickly. Fast versions appear in Tarjan [1984] when the edges are pre-
sorted by cost and in Gabow–Galil–Spencer–Tarjan [1986] when they are not.
For further discussion and references, see Ahuja–Magnanti–Orlin [1993, Chap-
ter 13]. More recent developments appear in K arger–K lein–Tarjan [1995].
5.4.18. Example. In the example below, shortest paths from u are found to the
other vertices in the order a , b , c , d , e, with distances 1 , 3 , 5 , 6 , 8, respectively.
To obtain the paths, we only need the edge on which each reaches its destina-
tion, because the earlier portion of a shortest u , -path that reaches along v is
a shortest u , v-path. Here the final edges on the paths to a , b , c , d , e generated
by the algorithm are ua , ub , ac , ad , de, respectively; these are the edges of the
spanning tree generated from u.
a• 5 •d
1 4 2
u• •e
4
3 6
b• 5
•c
Exercises for Section 5.4 247
• •v •
u• • S •
t(v) ≤ t()
• •
EXERCISES 5.4
5.4.1. (−) Prove that each property below characterizes the class of forests.
(a) Every induced subgraph has a vertex of degree at most 1.
(b) Every connected subgraph is an induced subgraph.
(c) If two paths have a common vertex, then their intersection is a path.
5.4.2. (−) Prove that a tree with 2 ¾ vertices of odd degree decomposes into ¾ paths.
248 Chapter 5: First Concepts for Graphs
5.4.3. (−) Prove that a tree with maximum degree ¾ has at least ¾ leaves. For n > ¾ > 1,
construct an n-vertex tree having maximum degree ¾ and exactly ¾ leaves.
5.4.4. (−) Determine the number of vertices in a tree with average degree a.
5.4.5. (−) Determine the possible numbers of vertices in a tree with each degree in {1 , ¾}.
5.4.6. (−) Prove that every nontrivial tree has at least two maximal independent sets,
with equality only for stars. (Note: maximal
= maximum.)
5.4.7. (−) Count the isomorphism classes of n-vertex trees with diameter 3.
5.4.8. (−) Decompose the graph below into two isomorphic spanning trees.
•
• •
• • •
• •
•
5.4.9. (−) Prove that a connected graph G with a cycle has girth at most 2 diam(G) + 1.
For ¾ ∈ , exhibit a graph with diameter ¾ and girth 2 ¾ + 1.
5.4.10. (−) Prove or disprove: If T is a tree in which every vertex adjacent to a leaf has
degree at least 3, then T has two leaves with a common neighbor.
5.4.11. (−) Given a graph G, let G be the graph with vertex set V(G) such that xy ∈ E(G )
if and only if d G(x , y) ∈ {1 , 2}. Prove diam (G ) = ⌈ diam(G)/2⌉ .
5.4.12. (−) Find the least radius among spanning trees of the ¾-dimensional hypercube.
5.4.13. (−) In the graph K1 C4 , assign weights (1 , 1 , 2 , 2 , 3 , 3 , 4 , 4) to the edges in two
ways: one way so that the minimum-weight spanning tree is unique, and another way so
that the minimum-weight spanning tree is not unique.
5.4.14. Let G be an n-vertex graph such that deleting any one vertex of G yields a tree.
Determine the number of edges in G, and use this to determine G itself.
5.4.15. For ¾ > 2, prove that if the vertices of a ¾-regular graph can be partitioned into
sets A and B that each induce a tree, then | A| = | B|. (X. Lv)
5.4.16. (♦) Let d1 , . . . , d n and c1 , . . . , cn be positive integers.
(a) Prove that some n-vertex tree has degrees d1 , . . . , d n if and only if ∑ d i = 2n − 2.
(b) Prove that some 2n-vertex tree has degrees d1 , . . . , d n in one part of the biparti-
tion and c1 , . . . , cn in the other if and only if ∑ d i = ∑ ci = 2n − 1. (Hollingsworth [2013])
5.4.17. (♦) Let T be a tree with ¾ edges. Prove that if G is a graph with minimum degree
at least ¾ , then T ⊆ G. (Comment: By Exercise 5.2.10, the same conclusion follows when
G has average degree at least 2 ¾ . The Erdős-Sós Conjecture states that it suffices to have
average degree more than ¾ − 1, or equivalently more than n(¾ − 1)/2 edges.)
5.4.18. Prove for n > ¾ that every tree with ¾ edges is a subgraph of every n-vertex graph
with more than n(¾ − 2) − (¾2) edges. (Comment: The Erdős-Sós Conjecture implies this.)
5.4.20. (+) Let G be a graph such that the degrees of any two vertices that are distance 2
apart sum to at least 2 ¾ (and there is at least one such pair). Prove that G contains every
tree with ¾ edges. (T. Jiang)
5.4.21. (♦) Prove that if K n decomposes into ¾ spanning connected subgraphs, then n ≥ 2 ¾ .
Show that this bound is sharp by decomposing K 2¾ into ¾ spanning double-stars, where a
double-star is a tree of diameter 3. (Hint: Use double-stars whose central edges share no
vertices.) (Lovász [1966], Palumb íny [1973])
5.4.22. (♦) For 2 ≤ d < n, determine the maximum number of edges in an n-vertex graph
having diameter d, and find all the extremal graphs. (Ore [1968], Qiao–Zhan [2019])
5.4.23. Let G be a tree. Prove that V(G) can be split into two nonempty sets such that
each vertex has at least half its neighbors in its own set if and only if G is not a star.
5.4.24. Let U be the set of nonleaf vertices in a forest G with ¾ nontrivial components.
Prove that G has 2 ¾ + ∑u∈U [d(u) − 2] leaves. In terms of r alone, determine the number
of vertices in a tree whose nonleaf vertices are one of degree i for each i with 2 ≤ i ≤ r.
5.4.25. Let e be an edge in a connected multigraph G. Prove that e is a cut-edge of G if
and only if e belongs to every spanning tree of G. Prove that e is a loop if and only if e
belongs to no spanning tree of G.
5.4.26. (♦) Prove that a connected n-vertex multigraph has exactly one cycle if and only
if it has exactly n edges.
5.4.27. (♦) Let G be an n-vertex graph with m edges, where n ≥ 4 and m ≥ 2n − 3.
√ the same length. (Comment: Chen–Lehel–Jacobson–Shreve
Prove that G has two cycles of
[1998] proved that m ≥ n + 2n − 4 − 1 suffices and is asymptotically sharp.)
5.4.28. Let T be a tree of even order. Prove that T has exactly one spanning subgraph in
which every vertex has odd degree.
5.4.29. (♦) A parity subgraph of a graph G is a graph H contained in G such that
d H (v) ≡ d G(v) (mod 2) for all v ∈ V(G).
(a) Prove that every spanning tree of a connected graph G contains exactly one parity
subgraph of G. (Itai–Rodeh [1978])
(b) Hajós conjectured that every even graph with n vertices decomposes into at most
⌊ n/2⌋ cycles. Prove that if this conjecture is true, then every n-vertex graph decomposes
into fewer than 3n/2 cycles and edges. (Pyber [1984, 1992], Dean [1987])
5.4.30. (♦) Let e1 , . . . , e¾ be distinct edges in a graph G having ¾ edge-disjoint spanning
trees. Prove that G has edge-disjoint spanning trees T1 , . . . , T¾ with ei ∈ Ti for 1 ≤ i ≤ ¾ .
5.4.31. (♦) Let G be a tree with ¾ leaves. Prove that G is the union of paths P1 , . . . , P⌈¾/2⌉
such that Pi ∩ Pj
= ∅ for all i
= j . (Ando–Kaneko–Gervacio [1996])
5.4.32. Let G be an n-vertex graph having a decomposition into ¾ spanning trees. Suppose
also that (G) = (G) + 1. For 2 ≥ n, show that this is impossible. For 2 < n, determine
the degree list of G in terms of n and .
5.4.33. (+) Spanning trees with fixed degrees.
(a) Let G be a graph decomposing into trees S and T . Prove that the number of de-
compositions of G into trees S and T with (d S (v) , d T (v)) = (d S(v) , d T (v)) for all v ∈ V(G)
is even. (Berman [1986], Cameron–Edmonds [1999])
(b) Let G be 4-regular, with e , e ∈ E(G). Prove that G has an even number of decom-
positions into spanning cycles with e in the first and e in the second. (Thomason [1978])
5.4.34. Let x and y be the endpoints of a maximal path P in a graph G, and let l be the
length of P. Prove that d(x , y) ≤ max{2 + l − d(x) − d(y) , 2}. (Tracy [2000])
250 Chapter 5: First Concepts for Graphs
5.4.44. Theorem 5.4.11 states that the center of a tree consists of one vertex or two adja-
cent vertices. Give two more proofs of this fact , as follows:
(a) By induction on the number of vertices.
(b) By showing directly that any two vertices in the center of a tree must be adjacent.
5.4.45. (♦) Let the weight of a vertex v in a tree T be the maximum order of a component
of T − v. A centroid is a vertex of smallest weight. Prove that a tree has one centroid or
two adjacent centroids, the latter only when each has weight | V(T)| /2. (Jordan [1869])
5.4.46. Prove that every tree T has a vertex v such that for all e ∈ E(T), the component
of T − e containing v has at least ⌈ | V(T)| /2⌉ vertices. Prove that v is unique or there are
two adjacent such vertices.
5.4.47. (♦) For v ∈ V(G), let s(v) = ∑w∈V(G) d(v, w). The set of vertices minimizing s(v) is
called the barycenter of G.
(a) Prove that if G is a tree with edges xy and y , then 2s(y) < s(x) + s( ). Use this to
prove that the barycenter of a tree consists of one vertex or two adjacent vertices.
(b) Let G be a tree of diameter d. Determine the maximum possible distance in G
between the center and the barycenter.
5.4.48. Let T be a tree with n vertices, leaves, and maximum degree . Determine the
maximum and minimum possible values of diam T .
5.4.49. (♦) The Kneser graph K(n , ) (Kneser [1955]) is defined on the -element subsets
of [n], with two -sets adjacent if and only if they are disjoint. For example, the Petersen
graph is K(5 , 2). Prove diam(K(n , )) = 2 for n ≥ 3 − 1. Prove diam(K(2 + 1 , )) = .
(Comment: In general, diam(K(n , )) =⌈ n¾−−21¾ ⌉ + 1; see Valencia-Pabon & Vera [2005].)
5.4.50. (♦) For a connected n-vertex graph, the average distance is the average of all (n2)
distances between pairs of vertices. Determine the average distance in Pn , and prove that
every connected n-vertex graph other than Pn has smaller average distance.
5.4.51. Determine the average distance between points in the -dimensional hypercube
Q¾ (averaged over all pairs of points).
5.4.52. Let G be a connected graph of order n and minimum degree , with 2 ≤ ≤ n − 3.
Prove diam G ≤ 3 ¾n−+12 − 1. Prove that equality can hold whenever ≥ 2 and ¾n+−12 is an
integer greater than 1. (Moon [1965a])
| E(H)|
5.4.53. Let F1 , . . . , F ¾ be forests whose union is G. Prove that ≥ max H ⊆ G ⌈ | V(H) |−1 ⌉
.
(Comment: Chapter 11 has a proof using matroids that equality holds for some decompo-
sition into forests.) (Nash-Williams [1964], Edmonds [1965a])
5.4.54. Let G be a graph having edge-disjoint spanning trees. Prove that for any par-
tition of V(G) into r parts, there are at least (r − 1) edges of G whose endpoints are in
different parts of the partition. (Comment: Chapter 11 has a proof using matroids that
the condition is also sufficient.) (Tutte [1961a], Nash-Williams [1961], Edmonds [1965b].)
5.4.55. (♦) Prove that a graph G is a forest if and only if for every set of pairwise inter-
secting paths in G, some vertex belongs to all the paths in the set.
5.4.56. (+) Prove that every n-vertex tree other than K1 ,n−1 is contained in its comple-
ment. (Burns–Schuster [1978])
5.4.57. Let S be an n-element set , and let A1 , . . . , A n be n distinct subsets of S. Prove that
S has an element x such that the sets A1 ∪ {x} , . . . , A n ∪ {x} are distinct. (Hint: Define a
graph G with vertices a1 , . . . , an such that ai aj ∈ E(G) if and only if Ai and Aj differ by
one element. Use that element as a label on the edge. Prove that some forest contains all
the labels that occur on edges, and use it to obtain the desired element x.) (Bondy [1972a])
252 Chapter 5: First Concepts for Graphs
5.4.58. (+) Let G be a graph with fewest vertices among ¾-regular graphs with girth at
least ½ , where ¾ ≥ 2 and ½ ≥ 3. (By Exercise 5.1.47, such graphs exist.) Prove that G has
diameter at most ½ . (Hint: If d G(x , y) > ½ , then obtain from G a smaller ¾-regular graph
with girth at least ½ .) (Erdős–Sachs [1963])
5.4.59. (♦) Moore graphs.
(a) For ¾-regular connected graphs (with ¾ ≥ 3), prove that any two of the three prop-
erties {diameter d, girth 2d + 1, order 1 + ¾[(¾−¾−1)2 −1] } imply the third.
d
(b) The Hoffman–Singleton graph with 50 vertices is the graph G formed by adding
to ten disjoint 5-cycles Q0 , . . . , Q4 and R0 , . . . , R4 a 5-regular bipartite graph as follows.
Let the vertex sets of the 5-cycles be copies of 5 in order. Make i ∈ V(Qj ) and l ∈ V(R¾)
adjacent if and only if 2l ≡ i + 2 j ¾ (mod 5). Use part (a) to prove that G has diameter 2.
5.4.60. For odd d, prove that the maximum number of vertices in a tree with diameter d
(d+1)/2 (d+1)/2
and maximum degree ¾ is ∑i=1 (¾ − 1)i−1 + ∑i=1 (¾ − 1)i−1 .
5.4.61. Let G be a graph with order n, size m, maximum degree ¾ , and diameter d. Prove
m ≥ (n2)/ ∑i=1 (¾ − 1)i−1 . (Hint: Count paths starting at each edge.) (Erdős–Rényi [1962])
d
5.4.62. Let G be a connected graph with distinct edge weights. Without Kruskal’s Algo-
rithm, prove that G has only one minimum-weight spanning tree.
5.4.63. Suppose that in the hypercube Q¾ , each edge whose endpoints differ in coordinate
i is given weight 2 i . Compute the minimum weight of a spanning tree.
5.4.64. (♦) Let G be a connected n-vertex graph. Define a graph G on the set of spanning
trees of G by putting TT ∈ E(G ) if and only if T and T have exactly n − 2 common edges.
Prove that G is connected. Obtain a formula for d G (T , T ).
5.4.65. (♦) Let T be a spanning tree in a graph G with minimum-weight spanning tree
T . Prove that T can transform into T by steps exchanging one edge of T for one edge of
T so that the edge set is always a spanning tree and the total weight never increases.
5.4.66. A minimax or bottleneck spanning tree is a spanning tree in which the maxi-
mum of the edge weights is as small as possible. Prove that every minimum-weight span-
ning tree is a minimax spanning tree.
5.4.67. (♦) Prim’s Algorithm grows a spanning tree from a given vertex of a connected
weighted graph, iteratively adding the cheapest edge between a vertex already absorbed
and a vertex not yet absorbed, finishing when all the vertices have been absorbed. (Ties are
broken arbitrarily.) Prove that Prim’s Algorithm produces a minimum-weight spanning
tree. (Jarnı́k [1930], Prim [1957], Dijkstra [1959], independently).
5.4.68. (♦) In a connected weighted graph, iteratively delete a heaviest non-cut-edge until
no cycle remains. Prove that what remains is a minimum-weight spanning tree.
5.4.69. A greedy algorithm for minimum-weight spanning path iteratively selects the
edge of least weight so that the edges chosen so far form a disjoint union of paths. After n −
1 steps, a spanning path is obtained. Prove that this algorithm always gives a minimum-
weight spanning path, or give an infinite family of counterexamples where it fails.
5.4.70. Breadth-First Search for distances from a vertex u0 in an unweighted graph. Place
the initial vertex u0 on a queue, and declare its distance from u0 to be 0. While there re-
mains a vertex in the queue, remove the oldest vertex v from the queue, declare its neigh-
bors that have not yet been reached to have distance d(u0 , v) + 1 from u0 , and add them
to the queue. When the queue is empty, say that any unreached vertices have infinite
distance from u0 . Prove that this algorithm computes distances from u0 to all vertices.
Chapter 6
Matchings
Can we fill jobs using qualified applicants from an applicant pool? Can we
pair students as roommates with all pairs compatible? How do we find a strategy
for playing Tic-Tac-Toe? These are all questions about matchings in graphs.
6.1.1. Remark. We can restate the job-filling problem using sets. For the ith job,
there is a set Ai of qualified applicants. The problem is to find a system of dis-
tinct representatives (SDR) of the sets A1 , . . . , An , meaning distinct elements
1 , . . . , n such that i ∈ Ai for all i.
The two problems are equivalent; an SDR of a family of sets corresponds to
a matching covering X in a natural bipartite graph. The incidence graph of a
family A1 , . . . , An is the X , Y -bigraph with X = { A1 , . . . , An} and Y = ⋃i∈[n] Ai
such that Ai ∈ X is adjacent to y ∈ Y if and only if y ∈ Ai . An SDR with i
representing Ai for all i corresponds to the matching { Ai i : i ∈ [n]}; we use this
correspondence freely.
253
254 Chapter 6: Matchings
HALL’S THEOREM
X −S T S
• • • • • • • • X
G2 G1
• • • • • • • • Y
Y− N(S) NG 2(T) N(S)
6.1.4.* Remark. A closer look at the argument of Theorem 6.1.3 yields a quan-
titative result (M. Hall [1948]): if G is an X , Y -bigraph satisfying Hall’s Condi-
min{ ,n}
tion, then at least ∏i=1 ( + 1 − i) matchings in G cover X , where n = | X | and
= min x∈ X d(x) (Exercise 34). That is, when Hall’s Condition holds there tend to
be many matchings covering X . For example, K r,s has ∏i=1 (s + 1 − i) matchings
r
6.1.5. Corollary. (Hakimi [1965]) For d ∈ , a graph G has an orientation in
which each vertex has outdegree at most d if and only if every subgraph H
of G has at most d |V(H)| edges.
Proof: Necessity: If some subgraph H has more than d |V(H)| edges, then in any
orientation some vertex of H is the tail of more than d edges.
Sufficiency: Form an X , Y -bigraph G in which X = E(G) and Y consists of
d copies of V(G). For each v ∈ V(G), we have vertices v1 , . . . , vd ∈ Y . For each
uv ∈ X , make uv adjacent to all copies of u and v in Y .
• • • • copies of u
•
xuv • • • •
•
• • • • copies of v
•
• • • •
X • Y
• • • •
256 Chapter 6: Matchings
S X
¾ | S|
N(S) Y
If the entries in a doubly stochastic matrix M are rational, then we can mul-
tiply M by the least common multiple of the denominators (call it ¾) to obtain
Section 6.1: Matching in Bipartite Graphs 257
a nonnegative integer matrix whose rows and columns all have sum ¾ . As we
have just observed, this is the biadjacency matix of a ¾-regular bipartite multi-
graph G, and the matrix can be expressed as a sum of permutation matrices. Let
P1 , . . . , Pr be the permutation matrices used, and let ci be the number of times Pi
is used. By letting the coefficient i of Pi be ci/ , we have M = ∑ i=1 i Pi . This ex-
r
In fact, the full strength of the theorem (for any real entries) can be proved
by induction on the number of nonzero entries using Hall’s Theorem (Exercise
25). One may wonder about the size of the coefficients. Is it possible to find a
permutation matrix whose 1s correspond to entries in M that are not too small?
1 b a c a b c
1 ⎛ .5 .25 .25 ⎞
2 b a c
2 ⎜ .5 .25 .25 ⎟
3⎝ 0 .5 .5 ⎠
3 b c
when they have common area at least . It suffices to prove that G satisfies Hall’s
Condition. Let (A) denote the area of A.
For Hall’s Condition, consider a set S of ranches, and let R be their union.
We need farms that each intersect some ranch in S with area at least . If
(F ∩ R) ≥ n+11−¾ for some farm F , then F intersects some ranch in S with area
at least ¾(n+11−¾) and hence at least . We show that there are at least such farms.
Index the farms F1 , . . . , F n so that (F1 ∩ R) ≥ · · · ≥ (F n ∩ R). Let
a = (F ¾ ∩ R). Since (F i ∩ R) ≤ 1 for i < and (F i ∩ R) ≤ a for i ≥ ,
n
− 1 + a(n + 1 − ) ≥ ∑ (F i ∩ R) = (R) = .
i=1
Simplifying yields a ≥ 1
n+1−¾ . We conclude that N(S) contains F1 , . . . , F ¾ , and
Hall’s Condition holds.
6.1.11. Definition. Let (G) denote the maximum size of a matching in a graph
G. For an X , Y -bigraph G, the defect df(S) of a set S ⊆ X is | S| − | N(S)|.
One would like to call df(S) the “deficiency” and write def(S), but we use that
term and notation later to discuss matching in general graphs.
6.1.13. Definition. A vertex cover is a set of vertices having at least one end-
point of every edge; the stars centered at these vertices cover the edges. The
minimum size of a vertex cover in a graph G is denoted (G).
Proof: No vertex can cover more than one edge of a matching, so (G) ≥ (G). We
seek a vertex cover of size (G). Let G be an X , Y -bigraph. By Corollary 6.1.12,
there is a set T ⊆ X such that (G) = | X | − | T | + | N(T)|. Since N(T) ∪ (X − T) is
a vertex cover, (G) ≤ | N(T)| + | X − T | = (G).
X−T T
Y − N(T) N(T)
• • •
• • •
Just as no vertex covers two edges of a matching, no edge contains two ver-
tices of an independent set. Again we have a dual covering problem.
6.1.15. Definition. An edge cover of G is a set of edges that cover the vertices of
G (only graphs without isolated vertices have edge covers). We list notation
for related optimization parameters:
maximum size of independent set (G)
maximum size of matching (G)
minimum size of vertex cover (G)
minimum size of edge cover (G)
We use (G) for minimum vertex cover due to its interaction with maximum
matching. We put the “prime” on (G) rather than on (G) because (G) counts
a set of vertices and (G) counts a set of edges.
Always (G) ≥ (G). We now prove the min-max relation.
matching M of size | Q|. Since Q covers every edge, M matches R into Y − S and
S into X − R, and each edge of M covers one vertex of (Y − S) ∪ (X − R). Adding
one edge to cover each remaining vertex of (Y − S) ∪ (X − R) completes an edge
cover of size | Y − S| + | X − R|. Furthermore (Y − S) ∪ (X − R) is an independent
set, so we have produced an edge cover and an independent set of the same size;
they are a smallest edge cover and largest independent set.
6.1.17. Remark. Every n-vertex graph G satisfies (G) + (G) = n, since the
complement of any independent set of vertices is a vertex cover. Surprisingly, the
edge parameters satisfy the same equality: Gallai’s Theorem (Gallai [1959])
states that (G) + (G) = n for every n-vertex graph G without isolated vertices.
For bipartite graphs, this follows from the proof of Theorem 6.1.16, where
we produced an edge cover of size n − (G). It was a smallest edge cover since we
produced an independent set of the same size. For non-bipartite graphs this is
not enough: Exercise 50 requests a proof of the full statement.
EXERCISES 6.1
6.1.1. (−) Prove (G) ≥ (G)/2 for every graph G. Prove (G) ≥ (G) for every bipartite
graph G. In each case, give infinitely many examples where equality holds.
6.1.2. (−) A cycle-factor of a digraph is a set of (directed) cycles such that each vertex
lies on exactly one of the cycles. Prove that a digraph D has a cycle-factor if and only if
| N +(S)| ≥ | S| for all S ⊆ V(D). (Ore [1962])
6.1.3. (−) Let T be an n-vertex tree with independence number . Determine (T).
6.1.4. (−) Prove that a graph G is bipartite if and only if (H) = (H) for all H ⊆ G.
6.1.5. (−) Prove that (G) ≥ m/ (G) when G is a bipartite graph with m edges.
6.1.6. (−) Prove that (G) ≤ n/2 when G is a nontrivial regular n-vertex graph. Prove
that equality holds if and only if G is bipartite.
6.1.7. (−) Prove n
(G)+1 ≤ (G) ≤ n − (G) for every n-vertex graph G.
6.1.8. Prove that a bipartite graph G has a perfect matching if and only if | N(S)| ≥ | S| for
all S ⊆ V(G), and present an infinite class of examples to prove that this characterization
does not hold for all graphs.
6.1.9. Let G be a bipartite graph having a perfect matching. For r < | V(G)|/2, prove that
if every matching of size r extends to a perfect matching, then also every matching of size
r − 1 extends to a perfect matching.
6.1.10. Given n red and n blue points in the plane, with no three on a line, prove that
there is a matching of all red points to blue points by straight line segments so that no two
of the segments cross.
6.1.11. Let M be a matching in the hypercube Q¾ such that the vertices covered by M
induce no edges other than M. Prove that M is contained in a perfect matching of Q¾ .
(Vandenbussche–West [2009])
6.1.12. The hypercube Q¾ has vertex set {0 , 1}¾ ; the weight of a vertex is the number of
nonzero positions. Let M be a perfect matching in Q¾ . For each i, compute the number of
edges of M whose endpoints have weights i and i + 1.
Exercises for Section 6.1 261
¾− 2
6.1.13. For ¾ ≥ 2, prove that Q¾ has at least 2 2 perfect matchings.
6.1.14. Let A and B be disjoint independent sets in a graph G, with | A| = (G). Prove
that G[ A ∪ B] contains a matching of size | B|.
6.1.15. (♦) Let G be an X , Y -bigraph with no isolated vertices and with | X | ≤ | Y | .
Prove that Hall’s Condition (| N(S)| ≥ | S| for all S ⊆ X) is equivalent to the statement
“ | T | − | N(T)| ≤ | Y | − | X | for all T ⊆ Y ”.
6.1.16. (♦) Let G be a connected regular bipartite graph. Prove that any graph obtained
from G by deleting one vertex from each part has a perfect matching. Conclude that every
edge in G appears in some perfect matching. For ≥ 2, construct a -regular bipartite
graph having two nonincident edges that do not appear together in a perfect matching.
6.1.17. Let G be an X , Y -bigraph. Prove that there exists x ∈ X such that every edge
incident to x belongs to some maximum matching.
6.1.18. (♦) Prove that a multigraph G with m edges has an orientation with specified out-
degree d i at each vertex vi if and only if ∑vi ∈V(G) d i = m and ∑vi ∈U d i ≥ | E(G[U])| for every
U ⊆ V(G). (Hakimi [1965]) (Comment: The special case G = K n was proved in Landau
[1953], characterizing “score sequences” of tournaments (Exercise 5.2.39). Hall’s Theo-
rem was used to prove that result in Bang–Sharp [1979].)
6.1.19. (♦) Consider a deck of mn cards with n suits and m values; each value appears on
one card in each suit. The cards are placed randomly in a grid with n rows and m columns.
(a) Prove that it is possible to choose one card from each of the m columns so that the
values are all distinct.
(b) Use part (a) to prove that it is possible to iteratively exchange positions of two cards
of equal value so that eventually each suit appears in each column. (Enchev [1994])
6.1.20. (♦) Let T be a set of permutations of [n]. Prove that if ≤ n/2, then some per-
mutation of [n] disagrees in every position with every member of T . Prove that if > n/2,
then there may be no such permutation. (K ézdy–Snevily; see Cameron–Wanless [2005])
6.1.21. A travel club is planning vacations. Trips t1 , . . . , t n are available, but trip ti has
capacity ci . Each person likes some trips and will take at most one. In terms of which
people like which trips, derive a necessary and sufficient condition for being able to fill all
trips (to capacity) with people who like them.
6.1.22. Let G be an X , Y -bigraph having a matching that covers X . Given S, T ⊆ X such
that | N(S)| = | S| and | N(T)| = | T | , prove that | N(S ∩ T)| = | S ∩ T | .
6.1.23. (♦) Let G be an X , Y -bigraph with no isolated vertices, with d(x) ≥ d(y) when-
ever xy ∈ E(G) with x ∈ X and y ∈ Y . Prove that G has a matching covering X . (Hint:
Consider a smallest set violating Hall’s Condition.) (F. Galvin)
6.1.24. A positional game consists of a set X of positions and a family W1 , . . . , Wm of
winning sets of positions (Tic-Tac-Toe has nine positions and eight winning sets). Two
players alternately choose positions; the player who first occupies the positions of a win-
ning set wins. Let a be the minimum size of a winning set , and let b be the maximum
number of winning sets containing a given position. Prove that Player 2 can force a draw
if a ≥ 2b. (Comment: More generally, Player 2 can force a draw in d-dimensional Tic-Tac-
Toe when the sides are long enough, given the appropriate definition of winning sets. For
fixed side-length, Player 1 can win if the dimension is large enough; see Chapter 10.)
6.1.25. Prove the Birkhoff–von Neumann Theorem (Theorem 6.1.8) that every doubly
stochastic matrix can be written as a convex combination of permutation matrices. (Hint:
Use induction on the number of nonzero entries.)
262 Chapter 6: Matchings
6.1.26. Let M be a nonnegative integer matrix of order n in which every row and column
has sum t. Determine the least value r such that if t ≥ r, then M must contain a set of n
entries, with one in each row and each column, that all exceed 2. (Stanley [2015b])
6.1.28. Use the K önig–Egerváry Theorem to prove both the Marriage Theorem and Hall’s
Theorem.
6.1.32. Let A1 , . . . , A m be -sets such that each element of the union lies in at most sets.
Prove that there exist disjoint B1 , . . . , Bm of size ⌊ /⌋ such Bi ⊆ Ai for all i. (T. Jiang)
6.1.34. (♦) Let G be an X , Y -bigraph with m = | X | and = min x∈ X d(x). Prove that if
G satisfies Hall’s Condition for X , then at least ∏i=1
min{ ,m}
( + 1 − i) matchings in G cover
X . (Hint: Follow the method of Theorem 6.1.3, proving this lower bound instead of mere
existence. Multiedges are forbidden.) (M. Hall [1948])
6.1.35. Exhibit a perfect matching in the graph drawn below or give a short proof that it
has none. (Lovász–Plummer [1986, p. 7])
• •
• • • •
• • • • • • •
• • • • • • • •
• • • • • • • •
• • • • • • •
• • • •
• •
6.1.36. Determine the maximum number of edges in a bipartite graph that has no match-
ing with edges and contains no star with l edges. (Isaak)
Exercises for Section 6.1 263
6.1.37. (♦) Prove that every subgraph of K n ,n with more than (¾ − 1)n edges has a matching
of size at least ¾ .
6.1.38. Prove that in a bipartite graph G, a vertex belongs to some smallest vertex cover
if and only if it is covered by every maximum matching.
6.1.39. For ¾ ≤ r ≤ s, characterize the maximal subgraphs of K r,s that have no matching
of size ¾ , and determine which have the most edges.
6.1.40. (♦) Let G be an X , Y -bigraph with (G) = | X | = r. Prove that at most (2r ) edges
of G lie in no maximum matching. Show that this is sharp for every r.
6.1.41. (♦) Determine the largest number b such that every maximal matching in every
3-regular graph G has size at least b | V(G)|.
6.1.42. (+) Let G be a bipartite graph, and let G be a minimal spanning subgraph of G
such that (G ) = (G). Prove that G has no two incident edges, and use this to prove the
K önig–Egerváry Theorem. (Lovász [1975])
6.1.43. (♦) Let G be an n-vertex graph with m edges. Prove (G) ≤ n/2 + m/6, with equal-
ity only when every component of G is K3 or K4 . (Hint: Consider cases depending on (G).)
(Henning–Yeo [2013a])
6.1.44. Let G be a nonbipartite graph having exactly one cycle, C. Prove that (G) ≥
(n − 1)/2, with equality if and only if G − V(C) has a perfect matching.
6.1.45. (♦) Let G be a graph with vertex cover number .
(a) Build a vertex cover R greedily as follows: iteratively select a vertex of maximum
degree in the remaining graph, add it to R, and delete it , until the remaining graph has
no edges. Prove that the final set R may be as large as ln − O(). (Hint: Construct an
¾
X , Y -bigraph with | X | = and | Y | = ∑i=2 ⌊ /i⌋ so that the algorithm chooses all of Y .)
(b) Another algorithm adds to R the vertices of a remaining edge and deletes them.
Prove that this always produces a vertex cover of size at most 2 .
6.1.46. (♦) Build an independent set S greedily as follows: iteratively select a vertex v of
minimum degree in the remaining graph, add it to S, and delete {v} ∪ N(v). Prove that
the final independent set S has size at least ∑u∈V(G) d (u)
1
+1 .
(Caro [1979], Wei [1981])
G
6.2.1. Example. Odd cycles. Note that (C2¾+1) = (C2¾+1) = , but (C2¾+1) =
(C2¾+1) = + 1. That is, the min-max relations fail. Also Hall’s Theorem fails:
although C2¾+1 satisfies “ | N(S)| ≥ | S| for all S ⊆ V(G)” (see Exercise 6.1.8), it has
no perfect matching.
Nevertheless, we still seek a necessary and sufficient condition for the exis-
tence of a perfect matching in a general graph.
6.2.2. Definition. For ∈ , a -factor in a graph G is a -regular spanning
subgraph of G. In the context of factors, let an odd component of a graph
be a component of odd order (odd number of vertices). We use o(H) to denote
the number of odd components of a graph H.
odd odd
S
even even
Section 6.2: Matching in General Graphs 265
Tutte ’s Theorem has many proofs, including Gallai [1950, 1963, 1964],
Maunsell [1952], Kotzig [1959–60], Edmonds [1965c], Anderson [1971], Lovász
[1975], Mader [1973]. Like Hall’s Theorem, Tutte ’s Theorem leads to a min-max
relation for the maximum size of a matching. Every matching must leave an un-
covered vertex in at least o(G − S) − | S| odd components of G − S. This yields
an upper bound on (G); the Berge–Tutte Formula is the statement that equal-
ity holds. This can be proved from Tutte ’s Theorem by a proof like our proof
of Ore ’s Defect Formula from Hall’s Theorem (see Exercise 4). The forced uncov-
ered amount max{o(G − S) −|S|} is analogous to the notion of “defect ” in bipartite
matching, and again we have a special term for it.
6.2.6. Remark. The Parity Lemma aids in proving Tutte ’s Condition when
|V(G)| is even. To prove o(G − S) ≤ | S| , it then suffices to prove o(G − S) < |S| + 2,
since two integers with the same parity cannot differ by 1.
6.2.7. Lemma. Let T be a maximal subset of V(G) among those having largest
deficiency. If u is a vertex of an odd component C of G − T , then C − u satisfies
Tutte ’s Condition. Also, G − T has no even components.
266 Chapter 6: Matchings
Proof: Subscripts on def denote the relevant graph. For S ⊆ V(C − u), the odd
components of C − u − S are in C − u. Comparing o(G − T − u − S) to o(G − T), we
lose one odd component (C) and gain odd components in C − u − S. Thus
def G(T ∪ {u} ∪ S) = o(G − T − u − S) − (| T | + 1 + | S|)
= o(G − T) − 1 + o(C − u − S) − | T | − 1 − |S|
= def G(T) − 2 + def C−u(S).
Since T is a maximal set of maximum deficiency and T ∪ {u} ∪ S contains T ,
we have def G(T ∪ {u} ∪ S) < def(T). Thus def C−u(S) < 2. Since C − u has even
order, def C−u(S) is even, by the Parity Lemma. We conclude that def C−u(S) ≤ 0
for all S ⊆ V(C − u), which is Tutte ’s Condition.
If G − T has an even component C, then let T = T ∪ {v}, where v is a leaf of
a spanning tree of C. We have | T | = | T | + 1 and o(G − T ) = o(G − T) + 1. Hence
def G(T ) = def G(T), which contradicts the choice of T .
Proof: We know (G) ≤ 12 (n − def(S)) for all S ⊆ V(G). Hence it suffices to con-
struct a matching leaving only d vertices uncovered. We use induction on n; the
claim is trivial for n = 0. For n > 0, let T be a maximal set with deficiency d.
By Lemma 6.2.7, G − T has no even components, and C − u satisfies Tutte ’s
Condition when u is a vertex in an odd component C of G − T . Since C − u has
fewer vertices than G, the induction hypothesis yields a perfect matching in C − u.
Since this holds for any vertex u in any component C of G − T , and there are | T |+ d
such components, it suffices to cover T using edges to | T | distinct components of
G − T . The resulting matching leaves only d uncovered vertices.
Let Y be the set of components of G − T . To match T into Y , we define an
auxiliary T, Y-bigraph H. Let H have an edge ty for t ∈ T and y ∈ Y if and only
if t is adjacent in G to some vertex of the component of G − T corresponding to y.
To obtain a matching that covers T , we apply Hall’s Theorem to H.
For S ⊆ T , the vertices of Y outside NH (S) remain as odd components when
only T − S is deleted. Using also def(T − S) ≤ d and | Y | = | T | + d, we compute
| NH (S)| ≥ | Y | − o(G − (T − S))
= | Y | − (def(T − S) + | T − S|) ≥ | Y | − d − | T | + |S| = |S| .
Since this is true for every subset S of T , Hall’s Condition holds, and Hall’s
Theorem guarantees the needed matching in H.
• •
• Y
T S •
• NH (S)
• •
Section 6.2: Matching in General Graphs 267
•
• • •
• • • • • •
• • • • • •
6.2.9. Corollary. (Petersen [1891]) Every 3-regular graph with no cut-edge has
a 1-factor.
Proof: Given any vertex subset S, let m be the number of edges joining S to G − S.
Since G is 3-regular, m ≤ 3 | S| . Since any odd component H of G − S must have
even degree-sum, H is joined to S by an odd number of edges. This number is
at least 3 since G has no cut-edge. Hence m ≥ 3o(G − S), so o(G − S) ≤ | S| , and
Tutte ’s Theorem applies.
A more careful look at the argument yields various strengthenings. For ex-
ample, every edge lies in some 1-factor (Schönberger [1934]). Extensions to ¾-
regular graphs were proved by Bäbler [1938] and Berge [1973] (see also Exercise
25 and Exercise 32). Most of these follow from Theorem 6.2.10 (even the hypoth-
esis here can be weakened; see Exercise 29). The condition of even order in the
statement is included to cover the case of even ¾ .
Lemma 6.2.5 and Lemma 6.2.7 also lead to the Gallai–Edmonds Structure
Theorem describing the structure of maximum matchings (Exercise 40).
6.2.12. Definition. Given a graph G and º : V(G) → 0 , an º -factor of G is a
spanning subgraph H such that d H (v) = º (v) for all v ∈ V(G).
Recall that for ¾ ∈ , a ¾-factor of G is a ¾-regular factor; this is the special
case of º -factor when º (v) = ¾ for all v. Petersen found a sufficient condition for
2-factors, which we prove using only Eulerian circuits and bipartite matching.
We observed in Chapter 5 that even graphs decompose into edge-disjoint cycles.
For regular graphs, these cycles can be grouped into 2-factors.
1
• U W
1• •1
5• •2 2• •2
3• •3
4• •4
4• •3 5• •5
Section 6.2: Matching in General Graphs 269
The general º -factor problem specifies the degree at each vertex. Multiedges
are irrelevant for 1-factors but becomes important for º -factors. Tutte [1952]
found a necessary and sufficient condition for a multigraph to have an º -factor
(proved earlier by Belck [1950] for regular factors). Tutte ’s first proof was quite
difficult; later [1954] he reduced the problem to checking for a 1-factor in a related
graph. We describe this construction. It is a beautiful example of transforming
a graph problem into a previously solved problem.
3 1 • • ••
• • • •
• •
• A(v)•
G 3•
v
•2 • •• • •
• • H
• • B(v)
• •
2
• •1 • • •
• • • •
By Theorem 6.2.16, any algorithm to test for 1-factors can be used to test for
an º -factor. Nevertheless, we still seek a necessary and sufficient condition in
terms of the structure of G. Applications of the resulting Tutte º -Factor The-
orem include a proof of the Erdős–Gallai [1960] characterization of degree lists
of graphs (Exercise 43). The theorem can be proved by translating the statement
of Tutte ’s 1-Factor Condition for the blow-up into a structural condition for G.
First we show necessity of the condition directly.
270 Chapter 6: Matchings
6.2.17. Definition. Given disjoint sets Q , T ⊆ V(G), let Q , T denote the num-
ber of edges in G with one endpoint each in Q and T . When º : V(G) → 0 ,
let º (S) = ∑v∈S º (v). Similarly, d H (S) = ∑v∈S d H (v).
6.2.18. Example. The º -factor condition. Given disjoint vertex sets S and T
in G, the condition states a bound on the contributions to º (T) in a hypothetical
º -factor F . Thus º (T) cannot exceed that bound. The necessary condition is
º (T) ≤ º (S) + d G−S(T) − q(S, T) ,
where q(S, T) is the number of components of G − S − T such that º (Q) + Q , T
is odd, where Q denotes the vertex set of the component.
Consider how the edges of an º -factor can contribute to º (T). At most º (S)
can join S to T , each contributing once to º (T). The remaining contribution at
each vertex v ∈ T is bounded by d G−S(v), so º (T) ≤ º (S) + d G−S(T). However, sat-
isfying this is not sufficient (Chvátal gave a 13-vertex example of insufficiency).
We can tighten the bound further by subtracting 1 for some components G[Q]
of G − S − T . If the º -factor uses any edge from Q to S, then that edge reduces
the contribution from º (S) in the bound on º (T) by 1. If no such edge is used,
and the º -factor uses all edges joining T to Q, then these edges plus the edges
used within Q form a subgraph H of F . Since no edge from Q to S is used, the
quantity º (Q) + Q , T counts each edge of H twice, and hence it must be even.
If it is odd, then the edges joining T to Q cannot all be used, which reduces the
contribution to the bound from d G−S(T). Hence when º (Q) + Q , T is odd we get
one way or another a reduction of at least 1 in the bound on º (T).
• x•∈ C
y C
Bv • • • •
Av • • • • • • • • •
x x∈C
Given a minimal Tutte set C, let T, S, R be the subsets of V(G) consisting of
the Type 1, Type 2, and Type 3 vertices, respectively. For v of each type, Bv and
Av are distributed to C and V(H) − C as listed below.
size v∈T v∈S v∈ R
Bv e(v) C V(H) − C V(H) − C
Av d(v) V(H) − C C V(H) − C
We claim that o(H − C) > | C| violates (∗) for this choice of R , S, T . By con-
struction, | C| = ∑v∈S d(v) + ∑v∈ T e(v) = d G(S) + d G(T) − (T). In the figure below,
edges of H − C are in bold. Let R be the family of vertex sets of components of
G[R]. The components of H − C are of four types:
Description of component Order Number with odd order
y ∈ Bv with v ∈ S 1 ∑v∈S e(v)
y with y ∈ Au , ∈ Av , uv ∈ E(G[T]) 2 none
y ∈ Av for each edge uv ∈ [S, T] 1 T, S
one for each Q ∈ R large q(S, T)
• •R
• • •
• •
R• T
• •
C
• • • • •
C
• • •
S T
Consider the large component of H − C corresponding to some connection class
Q ∈ R. It has ∑v∈ Q(d(v) + e(v)) + Q , T vertices, since it gains one vertex for each
edge from Q to T . Since e(v) = d(v) − (v), this quantity has the same parity
as (Q) + Q , T . By definition, the number of components of G[R] for which
(Q) + Q , T is odd is q(S, T).
Now we rewrite o(H − C) > | C| as
q(S, T) + ∑v∈S [d(v) − (v)] + T, S > d G(S) + d G(T) − (T).
When we cancel d G(S) and rearrange what remains, we have
q(S, T) + (T) > (S) + (d G(T) − T, S).
The final quantity in parentheses equals d G−S(T), so (∗) fails.
272 Chapter 6: Matchings
EXERCISES 6.2
6.2.1. (−) Let M be a perfect matching in a ¾-regular graph G, where ¾ is odd. Prove that
M contains every cut-edge of G.
6.2.2. (−) Find maximum matchings in the graph G below and in the graph G obtained
by adding the edge xy. For each prove optimality using “duality”.
•
• • •
•
x y
• • • • • •
•
•
• • •
•
6.2.3. (−) Let G be a (2r − 1)-regular graph. Prove that G decomposes into r factors whose
components are paths or cycles. For example, the Petersen graph decomposes into a perfect
matching and 2C5 .
6.2.4. Prove the Berge–Tutte Formula (Theorem 6.2.8) from Tutte’s 1-Factor Theorem
(Theorem 6.2.3).
6.2.5. (♦) Prove that a tree T has a perfect matching if and only if o(T − v) = 1 for every
v ∈ V(T). (Chungphaisan)
6.2.6. (♦) Minimal Tutte sets.
(a) Let S be a minimal Tutte set in a graph G. Prove that every vertex in S has neigh-
bors in at least three odd components of G − S.
(b) Let G be a connected graph with | V(G)| even. Prove that if G does not contain K1 ,3
as an induced subgraph, then G has a 1-factor. (Sumner [1974], Las Vergnas [1975])
(c) Use part (b) to prove that every connected graph with | E(G)| even decomposes into
3-vertex paths. (Chartrand–Polimeni–Stewart [1973])
6.2.7. Example 5.2.3 shows that every edge in the Petersen graph lies in four 5-cycles.
Use this to count the perfect matchings.
6.2.8. Derive a formula for the number of 1-factors in K n ,n that do not match xi to yi for
any i, and for the number of 1-factors in K 2n that do not match x2i−1 to x2i for any i. No
simple closed formulas are known.
6.2.9. For each ¾ ∈ except ¾ = 1, construct a ¾-regular graph with no 1-factor.
6.2.10. For ¾ ∈ with ¾ ≥ 2, construct a 2 ¾-regular connected graph having no spannning
subgraph in which at most ¾ − 2 vertices have degree 2 ¾ and the rest have degree 2 ¾ − 1.
6.2.11. (♦) Let G be a graph with (G) = .
(a) Determine the maximum possible value of (G).
(b) Determine the minimum possible size of a maximal matching in G.
6.2.12. Let G be a graph with (G) = . Prove that G has at most ( − 1) edges that
belong to no maximum matching. Construct examples to show that this bound is best pos-
sible for every . (F. Galvin)
Exercises for Section 6.2 273
6.2.13. Obtain sufficiency in Hall’s Theorem (Theorem 6.1.3) from Tutte’s Theorem.
(Hint: Transform an X , Y -bigraph G into a graph G that has a 1-factor if and only if
G has a matching that covers X .)
6.2.14. Let T be a set of vertices in a graph G. Prove that G has a matching that covers
T if and only if for all S ⊆ V(G), the number of odd components of G − S contained in G[T]
is at most | S|. (Lovász [1965], extended to a min-max relation in Bollobás [1978])
6.2.15. (♦) Let G be a graph of even order not having K1 ,r+1 as an induced subgraph
(K1 ,r+1 ⊆ G is allowed). Prove that if G − S is connected whenever S ⊆ V(G) with | S| < r,
then G has a 1-factor. (Sumner [1976])
6.2.16. Given graphs G and H , the tensor product G ∗ H is the graph with vertex set
V(G) × V(H) having (u , v) adjacent to (u , v ) if and only if uu ∈ E(G) and vv ∈ E(H).
Prove that the following conditions are equivalent for G (George [1991]):
(A) For every graph H , the graph G ∗ H has no 1-factor.
(B) G ∗ K 2 has no 1-factor.
(C) There exists S ⊆ V(G) such that G − S has more than | S| isolated vertices.
6.2.17. (♦) For a 3-regular graph G with n vertices and c cut-edges, prove (G) ≥ n/2 − c/3.
(Chartrand–Kapoor–Lesniak–Schuster [1984])
6.2.18. (+) Let i(H) be the number of isolated vertices in a graph H ; always i(H) ≤ o(H).
For m ≥ 2, prove that a graph G has a factor whose components are nontrivial stars with
at most m edges if and only if i(G − S) ≤ m| S| for all S ⊆ V(G). (Amahashi–Kano [1982])
6.2.20. (♦) Use induction on n to determine the maximum number of edges in a 2n-vertex
graph having no 1-factor.
6.2.21. For even n, prove that the maximum number of edges in an n-vertex graph having
a Tutte set of size is (¾2) + (n − ) + (n−22¾−1 ). Use this to find the maximum number of
edges in an n-vertex graph with no 1-factor. (Erdős–Gallai [1961])
6.2.22. (♦) Prove (G) ≥ min{(G) , ⌊ n/2⌋ } when G has n vertices. (Erdős–P ósa [1962])
6.2.24. Prove that a 3-regular graph G has a 1-factor when all its cut-edges lie on one
path (Petersen [1891]). Conclude that the minimum number of cut-edges in a 3-regular
graph with no 1-factor is 3. (Comment: More generally, every (2r + 1)-regular graph with
at most 2r cut-edges has a 2-factor, and this is sharp (Hanson–Loten–Toft [1998]).)
6.2.25. (♦) Sharpness of the connectivity threshold for 1-factors in regular graphs. Let be
an integer at least 3, and let l be the least odd number greater than .
(a) Construct a -regular graph G of even order that has no 1-factor and remains con-
nected whenever fewer than − 2 edges are deleted. (Hint: Use (l + 1) − 2 vertices.)
(b) Prove that every answer to part (a) has at least (l + 1) − 2 vertices. (Hint: For a
Tutte set S, treat the large odd components and small odd components of G − S differently.)
(See Niessen–Randerath [1998] for a more general result.)
274 Chapter 6: Matchings
6.2.26. (♦) Let G be a 3-regular graph. Prove that G has a 1-factor if and only if G decom-
poses into copies of P4 . (Comment: Favaron–Genest–Kouider [2010] conjectured that ev-
ery (2 ¾ + 1)-regular graph with a perfect matching decomposes into paths of length 2 ¾ + 1.)
(Kotzig [1957], Bouchet–Fouquet [1983])
6.2.27. The graph on the left below is the Heawood graph. Prove that every 2-factor in
this graph is a spanning cycle. Is this true also for the other graph?
•
• •
• • • • •
• •
• • • •
• • • •
• • • •
• •
• • • • • •
• •
6.2.28. Prove Corollary 6.2.11 directly from Tutte’s 1-Factor Theorem. That is, if xy
is an edge in a ¾-regular graph G of even order such that G cannot be disconnected by
deleting fewer than ¾ − 1 edges, then G − {x , y} has no Tutte set.
6.2.29. Weaken the hypothesis of Theorem 6.2.10 by requiring only that vertex sets of
odd size are not disconnected from the rest of G by deleting fewer than ¾ − 2 edges. Prove
that any G obtained from G by deleting at most ¾ − 1 edges has a 1-factor. (Cruse [1977])
6.2.30. Petersen’s proof of Petersen’s 2-Factor Theorem (Theorem 6.2.13).
(a) Prove that every 4-regular multigraph decomposes into two 2-factors.
(b) For ¾ > 2, prove by induction on | E(G)| that every multigraph G with (G) ≤ 2 ¾
decomposes into ¾ factors with maximum degree at most 2. (Petersen [1891])
6.2.31. (♦) A d-regular multigraph is primitive if it does not decompose into two regular
factors with degree less than d. By Petersen’s Theorem, no primitive multigraphs have d
even and d > 2. Let G be a d-regular n-vertex loopless multigraph with d odd.
(a) Construct an example where G is primitive with n = 3d + 1. (J.J. Sylvester)
(b) Prove (G) ≥ n/3.
(c) For (G) = n − s, prove that G has an odd-regular factor with degree at most 2s + 1.
Conclude that G cannot be primitive if n ≤ 3d − 3. (Petersen [1891]; see Mulder [1992])
6.2.32. (♦) A balloon in a graph G is a maximal subgraph without cut-edges that is inci-
dent to exactly one cut-edge of G; let b(G) be the number of balloons in G (Petersen [1891]
called such subgraphs “leaves”). Let G be a connected n-vertex 3-regular graph.
(a) Prove b(G) ≤ (n + 2)/6, with equality achievable when n ≡ 4 (mod 6).
(b) Prove (G) ≥ 2n − b(G)
3
. (Hint: Use the Berge–Tutte Formula.)
(b) Conclude (G) ≥ (4n − 1)/9. Show that equality can hold when n ≡ 16 (mod 18).
(Comment: For r ∈ , Henning–Yeo [2007] proved (G) ≥ n2 − 2r (2r+(2r −1)n+2
1)(2r 2 +2r−1)
for any
(2r + 1)-regular graph G with n vertices. O–West [2010] proved that equality holds if and
only if G arises from a tree with degrees 1 and 2r + 1 having all leaves on one side of the
bipartition by attaching a copy of P3 + rK 2 at each leaf; below is an example.)
• • •
• • • • • • •
• • • • • • • • • • • •
• • • • • • • • • • • •
Exercises for Section 6.2 275
6.2.33. (+) For ¾ ≥ 2 and ½ ≥ 2 with ½ even, construct a ¾-regular bipartite (multi)graph
with girth ½ . (Hint: Construct it from a (¾ − 1)-regular bipartite graph H with girth ½ and
a bipartite graph with girth ⌈ ½/2⌉ that is | V(H)|-regular. Comment: The requirement of
being bipartite strengthens the result of Erdős–Sachs [1963]; see Exercise 5.1.47.)
6.2.34. (+) Let G be a 2m-regular graph with girth ½ , and let T be a tree with m edges
and diameter d. Prove that if d < ½ , then G decomposes into copies of T . (Hint: Using
Theorem 6.2.13, produce inductively such a decomposition in which each vertex of G is
used once as an image of each vertex of T .) (Häggkvist)
6.2.35. (+) Let G be a 2n-vertex graph. Let P(c) be the statement “ | N(S)| ≥ c | S| whenever
S is a set of at most 2n/c vertices.” (Anderson [1973])
(a) Prove that P(4/3) implies that G has a 1-factor. (Hint: In applying Tutte’s
1-Factor Theorem, consider the cases | S| ≥ n/2 and | S| < n/2 separately.)
(b) Prove that P(c) does not imply that G has a 1-factor when 1 ≤ c < 4/3.
6.2.36. (♦) Let v be a vertex in a graph G. Prove def(G − v) ≤ def(G) + 1.
6.2.37. (♦) A graph is factor-critical if every subgraph obtained by deleting one vertex
has a 1-factor. Prove the following statements.
(a) Every factor-critical graph has odd order, is connected, and is not bipartite.
(b) A connected graph is factor-critical if and only if ∅ is its only Tutte set.
(c) A connected graph is factor-critical if and only if no vertex is in every maximum
matching. (Hint: Consider a Tutte set of maximum deficiency.) (Gallai [1963b])
6.2.38. Let v be a vertex in a factor-critical graph G. Let G be a connected graph obtained
from G by splitting v into two vertices whose neighborhoods form a nontrivial partition of
NG(v). Prove that G has a 1-factor.
6.2.39. Let G be a connected graph such that every edge is in a triangle and all cycles are
triangles. Suppose also that every vertex has degree 2 or 4.
(a) Prove that G is factor-critical.
(b) Prove that for every odd-sized set S of vertices having degree 2, G − S has a unique
perfect matching. (Lovász–Plummer [1986, p. 89]; see also Došlić–Rautenbach [2015])
6.2.40. (♦) In a graph G, let B be the set of vertices covered by every maximum match-
ing. Let A be the set of vertices in B having a neighbor outside B. Let C = B − A and
D = V(G) − B (see figure below). Let G1 , . . . , G ¾ be the components of G[D]. The Gallai–
Edmonds Structure Theorem (Gallai [1963b], Edmonds [1965c]) asserts the claims be-
low about every maximum matching M in G; prove them. (Hint: Let T be a maximal set
of maximum deficiency in G. Use Lemma 6.2.7 to find the sets A , C, D; see West [2011].)
(a) M covers C and matches A into distinct components of G[D].
(b) Each G i is factor-critical and has a near-perfect matching in M.
(c) If ∅
= S ⊆ A, then N(S) intersects at least | S| + 1 of G1 , . . . , G ¾ .
(d) def(A) = def(G) = ¾ − | A|.
G4 •
• • •
G3
• • • •
G2 • • •
• •
G1 • • • •
• •
D A C
276 Chapter 6: Matchings
6.2.42. (+) Let G be an even multigraph, and let assign an odd integer to each vertex.
Prove that G has an even number of -factors. (Cameron–Edmonds [1999])
6.2.43. (+) -Factor Theorem and graphic lists. The -Factor Theorem of Tutte [1952,
1954] (Theorem 6.2.19) states that a graph G has an -factor if and only if
for all disjoint sets S, T ⊆ V(G), where q(S, T) counts the components G[Q] of G − S − T
such that (Q) + Q , T is odd.
(a) The Parity Lemma. Let (S, T) = (T) − (S) − d G − S(T) + q(S, T). Prove that
(S, T) has the same parity as (V(G)) for disjoint sets S, T ⊆ V(G).
(b) Let (vi) = d i , where ∑ d i is even and d1 ≥ · · · ≥ d n . Use the -factor condition
¾
and part (a) to prove that K n has an -factor if and only if ∑i=1 d i ≤ (n − 1 − s) + ∑i= n+1 − s d i
n
6.2.44. Belck [1950] proved the special case of Tutte’s -Factor Theorem for regular fac-
tors, restricting to assign the same integer to all vertices. Use this result to prove that
if j , , l are three odd integers with j < < l and G has a j-factor and an l-factor, then G
also has a -factor. (Katerinis [1985])
6.2.45. For a graph G and a function : V(G) → 0 , say that G is -soluble if there ex-
ists w: E(G) → 0 such that ∑uv∈ E(G) w(uv) = (v) for all v ∈ V(G).
(a) Prove that G has an -factor if and only if the graph H obtained from G by sub-
dividing each edge twice and defining to be 1 on the new vertices is -soluble. (This
reduces testing for an -factor to testing -solubility.)
(b) Given G and an : E(G) → 0 , construct a graph H (with proof) such that G is
-soluble if and only if H has a 1-factor. (Tutte [1954])
AUGMENTING PATHS
• • •
• • •
• • • •
• • • •
• • • •
U S X −S
X • • • • • • • • •
Y • • • • • • • • •
T
y x d y
• • • •
• •
• • •a → • • •
u v u v A
•w •w
• •
b c
The running time of the algorithm is cubic in the number of vertices. With
another approach, describing a polyhedron whose vertices correspond to match-
ings, Edmonds [1965d] extended the result to weighted graphs.
Section 6.3: Algorithmic Aspects 279
Like the shortest path problem (Section 5.4), maximum matching generalizes
to weighted graphs. We assign weights to edges and seek the matching with max-
imum total weight. The maximum matching problem is the special case where
edges of G have weight 1 and edges not in G have weight 0. The dual notion of
vertex cover also extends. For bipartite graphs, we present a common solution to
the weighted matching and cover problems using augmenting paths.
When | X | = | Y | = n, the problem reduces to seeking a maximum-weight per-
fect matching in K n ,n with nonnegative edge weights. If G
= K n ,n , then we can
insert the missing edges with weight 0 without changing the answer; hence we
may assume G = K n ,n . We may also assume that all weights are nonnegative,
by changing negative weights to 0, solving the resulting problem, and deleting
chosen edges with weight 0.
6.3.7. Example. Weighted bipartite matching and its dual. A farming company
has n farms and n stores. Each farm can produce corn to supply one store. The
profit from sending the output of farm i to store j is wi , j . This yields a weighted
X , Y -bigraph with X = {x1 , . . . , x n} and Y = {y1 , . . . , yn}; the weight on edge
x i yj is wi , j . The company seeks the matching with maximum total weight.
The government offers to pay subsidies to reduce corn production. The gov-
ernment will pay ui if the company doesn’t use farm i and vj if it doesn’t use store
j . If ui + vj < wi , j , then the company makes more by using the edge x i yj than by
accepting the payments ui and vj . In order to stop all production, the government
must offer amounts such that ui + vj ≥ wi , j for all (i , j). The government wants
to find such values for {ui} and {vj } to minimize the cost ∑ ui + ∑ vj .
The observation that a matching and cover can have equal weight and cost
only by using edges covered with equality leads to an algorithm.
6.3.10. Definition. The equality subgraph G u ,v for the cover (u , v) is the span-
ning subgraph of K n ,n whose edges are {x i yj : ui + vj = wi , j }. In the cover
(u , v), the excess e i , j for the pair (i , j) is ui + vj − wi , j .
Y • • • • • • • • •
T
+
To seek an equality subgraph having a larger matching, we modify (u , v) to
introduce an edge from X − R to Y − T while maintaining equality on all edges of
M. Edges joining X − R and Y − T are not in G u ,v and thus have positive excess.
Let be the minimum among these; that is,
= min{e i , j : x i ∈ X − R , yj ∈ Y − T}.
Reducing ui by for all x i ∈ X − R maintains the cover condition for these edges
while bringing at least one into the equality subgraph. To maintain the cover
condition for the edges from X − R to T , increase vj by for y j ∈ T , as shown in
the figure above. Recompute the equality subgraph.
The algorithm proceeds by iteratively adjusting the cover to obtain a cover
whose equality subgraph contains a perfect matching.
Section 6.3: Algorithmic Aspects 281
We explained the adjustment step using the equality subgraph, but redraw-
ing a changing equality subgraph is awkward. More efficient is using the matrix
of excesses, called the excess matrix for the cover.
6.3.12. Example. Solving the Assignment Problem. The first matrix below lists
the weights (wi , j ). The others display a cover (u , v) and the corresponding excess
matrix. The 0s in an excess matrix correspond to edges in the equality subgraph
G u ,v ; an independent family of 0s (no two in a row or column) corresponds to a
matching in G u ,v . We underscore independent 0s to mark a maximum matching,
shown in bold in the equality subgraphs for the first two excess matrices.
A set of rows and columns covering the 0s in the excess matrix is a covering
set; these form a vertex cover in G u ,v . A covering set of size less than n yields
progress, since the next weighted cover costs less. For the 0s in the excess matrix,
we find an independent family and a covering set of the same size. In a small
matrix, we can do this by inspection.
0 0 0 0 0
⎛6 3 4 3 4⎞ 6 ⎛0 3 2 3 2⎞ R
8 ⎜3 0 2 2⎟ X • • • • •
⎜5 8 6 4 6⎟ 4
⎜ ⎟ ⎜ ⎟
⎜6
⎜ 2 3 4 1⎟
⎟
→ 6 ⎜0 4 3
⎜
2 5⎟
⎟
⎜3 7 6 5 0⎟ 7 ⎜4 0 1 2 7⎟
Y • • • • •
⎝4 5 8 2 3⎠ 8 ⎝4 3 0 6 5⎠R T T
T T
We use “ R” and “ T ” to label the rows and columns of the covering set and the
corresponding vertex cover in G u ,v . At each iteration, we compute the minimum
excess on the positions that are not in a covered row or column (in rows of X − R
and columns of Y − T). These uncovered positions have positive excess; that is,
the corresponding edges are not in the equality subgraph. As suggested earlier,
let be the minimum of these excesses. We reduce the label ui by on rows not
in R and increase the label vj by on columns in T . The outlined positions in the
diagram are the ones that change to reach the next matrix.
1 1 0 0 0 2 2 1 0 0
5⎛0 3 1 2 1⎞ 4⎛0 3 1 1 0⎞
7⎜3 0 1 3 1⎟ X• • • • • 6⎜3 0 1 2 0⎟
⎜ ⎟ ⎜ ⎟
→ 5⎜
⎜
0 4 2 1 4⎟
⎟ → 4⎜
⎜
0 4 2 0 3⎟
⎟
6⎜4 0 0 1 6⎟ 5⎜4 0 0 0 5⎟
Y • • • • •
8⎝5 4 0 6 5⎠ T T T 7⎝5 4 0 5 4⎠
T T T
In the example given, the first iteration reduces the cost of the cover but does
not increase the size of the maximum matching in the equality subgraph. The
second iteration produces a perfect matching. Using the first three columns as a
covering set in the first iteration would augment the matching immediately.
The transversal of 0s at the end identifies a perfect matching whose total
weight equals the cost of the final cover. Its edges have weights 6 , 8 , 8 , 5 , 4 in the
original data; they sum to 31. The labels 4 , 6 , 4 , 5 , 7 and 2 , 2 , 1 , 0 , 0 in the final
cover satisfy these edges exactly and also sum to 31. The value of the optimal so-
lution is unique, but the solution itself is not; this example has many maximum
weight matchings and many minimum cost covers, all summing to 31.
282 Chapter 6: Matchings
6.3.14. Remark. The algorithm also works with real-valued weights if we obtain
covers more carefully. Because M remains in the equality subgraph, the size of
the matching never decreases. Since it can increase at most n times, it suffices to
show that it must increase within n iterations.
If we find M using the Augmenting Path Algorithm, then the last iteration
produces a vertex cover by exploring M-alternating paths from the subset U of
uncovered vertices in X . With S and T being the sets of vertices reached in X
and Y , the vertex cover is R ∪ T , where R = X − S.
A step of the Hungarian Algorithm using this cover R ∪ T maintains equality
on M and all edges in M-alternating paths from U. Edges from T to R disappear
from the equality subgraph, but they don’t appear in M-alternating paths from
U. Introducing an edge from S to Y − T either creates an M-augmenting path or
increases T while leaving U unchanged. Since T can increase at most n times,
we obtain a larger matching in the equality subgraph within n iterations.
When running the Hungarian Algorithm with all inputs wi , j ∈ {0 , 1}, with
initial cover assigning 1 for each ui and 0 for each vj , the excesses always remain
0 or 1. Hence the values in the weighted cover are all integers. The algorithm
produces a minimum weighted cover, but it does not use integers larger than 1
(using nonnegative cover values). Thus in the special case of maximum matching,
the dual cover problem reduces to finding Î(G).
We have not discussed weighted matching in general graphs. Edmonds
[1965d] found an algorithm for this, which was implemented in time O(n3) by
Gabow [1975] and by Lawler [1976]. Faster algorithms appear in Gabow [1990]
and in Gabow–Tarjan [1989].
Section 6.3: Algorithmic Aspects 283
In a bipartite graph with n vertices and m edges, exploring all edges for each
augmentation could take time O(nm) to find a maximum matching, since (G)
may be linear in n. By looking first for√short augmenting paths, Hopcroft–K arp
[1973] reduced the running time to O( nm).
The idea is to explore M-alternating paths simultaneously from all M-
uncovered vertices of X , seeking disjoint M-augmenting paths of the same length
with one examination of the edge set. Subsequent augmentations must use longer
paths, so the procedure splits into phases finding paths of the same length. The
key is that not many phases are needed. The first remark follows from the proof
of Theorem 6.3.4.
Instead of total weight, we may consider other criteria for matchings. Given
n men and n women, we want to establish n “stable” marriages. If man x and
woman a are paired with other partners, but x prefers a to his current partner
and a prefers x to her current partner, then they might leave their current part-
ners and switch to each other. In this situation we say that the unmatched pair
(x , a) is an unstable pair.
In their paper “College admissions and the stability of marriage”, Gale and
Shapley proved that a stable matching always exists and can be found using a
relatively simple algorithm.
The proposal algorithm is asymmetric; which sex is happier? When the first
choices of the men are distinct, they all get their first choice, and the women re-
ceive whoever proposed. In Example 6.3.20, when women propose the algorithm
immediately yields the matching {xd , yb , a , wc}; all women receive their first
choices. In fact, among all stable matchings, every man is happiest in the one
produced by the male-proposal algorithm, and every woman is happiest under the
female-proposal algorithm (Exercise 24). Societal conventions thus favor men.
The algorithm is used in another setting. Each year, the graduates of medical
schools submit preference lists of hospitals where they want to be residents. The
hospitals also have preferences; a hospital with multiple openings acts as several
hospitals with the same preference list. Chaos in the market for residents (then
called interns) forced hospitals to devise and implement the algorithm ten years
before the Gale–Shapley paper defined and solved the problem! The result was
the National Resident Matching Program, a non-profit corporation established
in 1952 to provide a uniform appointment date and matching procedure.
Since the medical organizations ran the algorithm, it is not surprising that
initially they did the proposing and were happier with the outcome. This is even
286 Chapter 6: Matchings
clearer in another setting; students applying for jobs have preferences, but the
employers make the proposals, called “ job offers”. Unhappiness with the NRMP
caused the system to be changed in 1998 to a student-proposing algorithm. In
1998 the system processed 35,823 applicants for 22,451 positions. Additional de-
tails are at nrmp.aamc.org /nrmp/mainguid/ on the World Wide Web.
There may be stable matchings other than those found by the two versions
of the proposal algorithm. To seek a “fair ” stable matching, we could give each
person a number of points with which to rate preferences. The weight for the pair
xa is then the sum of the points that x gives to a and a gives to x. The Hungarian
Algorithm would yield a matching of maximum total weight, but this might not
be a stable matching (Exercise 23). Other approaches appear in the books Knuth
[1976b] and Gusfield–Irving [1989] on stable marriages and related topics.
EXERCISES 6.3
6.3.1. (−) Given a graph G, suppose that S ⊆ V(G) is covered by some matching. Prove or
disprove each statement below:
(a) S is covered by some maximum matching.
(b) S is covered by every maximum matching.
6.3.2. (−) Use the symmetric difference operation to give an alternative proof that if x
and y are vertices in a tree G, then G has exactly one x , y-path.
6.3.3. (−) Using nonnegative edge weights, construct a 4-vertex weighted graph in which
the matching of maximum weight is not a matching of maximum size.
6.3.4. (−) Show how to use the Hungarian Algorithm to test for the existence of a perfect
matching in a bipartite graph.
6.3.5. (−) Give an example of the stable matching problem with two men and two women
in which there is more than one stable matching.
6.3.6. (−) Determine the stable matchings resulting from the Proposal Algorithm with
men proposing and with women proposing, given the preference lists below.
Men {u , v , w , x , y , } Women {a , b , c , d , e , }
u: a>b>d>c>>e a: >x> y>u>v>w
v: a>b>c>> e> d b: y> >w>x>v>u
w: c>b>d>a>>e c: v> x>w> y>u>
x: c>a>d>b>e> d: w> y>u> x> >v
y : c> d>a>b>> e e: u>v> x>w> y>
: d>e>>c>b>a : u>w> x>v> > y
6.3.8. (♦) Two people play a game on a graph G by alternately selecting vertices v1 , v2 , · · ·
such that for i > 1, vertex vi is adjacent to vi−1 and has not previously been chosen. The last
player able to select a vertex wins. Prove that the second player has a winning strategy
if G has a perfect matching and that the first player has a winning strategy if G has no
perfect matching.
6.3.9. Prove that every nontrivial tree has a maximum matching that covers every non-
leaf vertex plus at least one leaf. Determine which trees have a matching covering at least
two leaves. (Lih–Lin–Tong [2006])
6.3.10. Let G be an X , Y -bigraph with | X | ≤ | Y | . Prove that G has a maximal path with
an endpoint in Y . (K ündgen–Ramamurthi [2002])
6.3.12. Let G be an X , Y -bigraph, not necessarily finite. Prove that if G has a matching
covering X and a matching covering Y , then G has a perfect matching. (J. Zaks)
6.3.13. (♦) Given a function º : V(G) → 0 on a graph G, an º -matching in G is a subset
M of E(G) having at most º (v) edges incident to each vertex v. An M-augmenting trail is
a trail that alternates between edges outside and in M , beginning and ending with edges
outside M at vertices having “excess capacity”. Use the transformation in Example 6.2.15
to prove that an º -matching M in G is a maximum-sized º -matching if and only if G has
no M-augmenting trail. (Gondran–Minoux [1984])
6.3.14. (+) Let G be a connected X , Y -bigraph with girth at least 2s. Prove that if the
distance between any two vertices of X having degree 1 is at least 2s, then every subset of
X with size at most s is covered by some matching in G. (Hint: Consider a smallest subset
of X that cannot be covered.) (Horák–Tuza)
6.3.17. (♦) Find a transversal of maximum total sum (weight) in each matrix below. Prove
that there is no larger weight transversal by exhibiting a solution to the dual problem.
Explain why this proves that there is no larger transversal.
6.3.18. Given a connected graph G with nonnegative edge weights, the Chinese Post-
man Problem (posed in Guan [1962]) is the problem of finding the shortest closed walk
that includes all the edges. Reduce this problem to a problem of finding a perfect matching
of minimum total weight in a complete graph with weights on the edges.
288 Chapter 6: Matchings
6.3.19. Find a minimum-weight transversal in the matrix below, and use duality to prove
that the solution is optimal. (Hint: Use a transformation of the problem.)
⎛4 5 8 10 11 ⎞
⎜7 6 5 7 4 ⎟
⎜8 6 ⎟
⎜ 5 12 9 ⎟
⎜6 6 13 10 7 ⎟
⎝4 5 7 9 8 ⎠
6.3.20. (♦) The Bus Driver Problem. Suppose that bus drivers are paid overtime for the
time by which their routes in a day exceed t. Let there be n bus drivers, n morning routes
with durations x1 , . . . , x n , and n afternoon routes with durations y1 , . . . , yn . The objec-
tive is to assign one morning route and one afternoon route to each driver to minimize the
total overtime. Express this as a weighted matching problem. Prove that overtime is min-
imized by giving the ith longest morning route and ith shortest afternoon route to the
same driver, for each i. (R.B. Potts)
6.3.21. Let the entries in matrix A have the form wi , j = ai bj , where a1 , . . . , an are num-
bers associated with the rows and b1 , . . . , bn are numbers associated with the columns.
Determine the maximum weight of a transversal of A. What happens when wi , j = ai + bj ?
(Hint: In each case, guess the general pattern by examining the solution when n = 2.)
6.3.22. (♦) A mathematics department offers ¾ seminars in different topics to its n stu-
dents. Each student will take one seminar; the ith seminar will have ¾i students, where
∑ ¾i = n. Each student submits a preference list ranking the ¾ seminars. An assignment
of the students to seminars is stable if no two students can both obtain more preferable
seminars by switching their assignments. Show how to find a stable assignment using
weighted bipartite matching. (Isaak)
6.3.23. Consider n men and n women, each assigning n − i points to the ith person in his or
her preference list. Let the weight of a pair be the sum of the points assigned by those two
people. Construct an example where no maximum weight matching is a stable matching.
6.3.24. (♦) Prove that if man x is paired with woman a in some stable matching, then
a never rejects x in the Proposal Algorithm with men proposing. Conclude that among
all stable matchings, every man is happiest in the matching produced by this algorithm.
(Hint: Consider the first occurrence of such a rejection.)
6.3.25. In the Stable Roommates Problem, each of 2n people has a preference ordering on
the other 2n − 1. A stable matching is a perfect matching such that no unmatched pair
prefers each other to their current roommates. Prove that the preferences below do not
permit a stable matching. (Gale–Shapley [1962])
a: b > c > d b: c > a > d c: a > b > d d: a > b > c
6.3.26. In the Stable Roommates Problem, let each individual declare a top portion of
the preference list as “acceptable”. Define the acceptability graph to be the graph whose
vertices are the people and whose edges are the pairs who rank each other as acceptable.
Prove that all sets of rankings with acceptability graph G lead to a stable matching if and
only if G is bipartite. (Abeledo–Isaak [1991]).
Chapter 7
SEPARATING SETS
A non-complete graph G has a separating set, and (G) is the minimum size
of such a set. In this case, the neighborhood of a vertex of minimum degree is
a separating set, and hence (G) ≤ (G). Also, if a graph G is -connected, and
> 0, then G is also ( − 1)-connected, by the definition.
7.1.2. Example. Connectivity of K n and K r,s . A complete graph has no separat-
ing set. By requiring -connected graphs to have more than vertices, we obtain
(K n) = n − 1. This allows general connectivity results (such as (G) ≤ (G)) to
hold also for K n . A graph with more than two vertices has connectivity 1 if it is
connected and has a cut-vertex. A graph with more than one vertex has connec-
tivity 0 if and only if it is disconnected. Unfortunately, K 1 is an anomaly; it is
connected but has connectivity 0.
Every induced subgraph of K r,s having at least one vertex from each part is
connected. Hence every vertex cut contains a full part, and (K r,s) = min{r, s}
(the convention for K 2 is consistent with this).
289
290 Chapter 7: Connectivity and Cycles
Since (G) is an upper bound on (G), it is natural to ask when equality holds.
Such graphs have been called maximally connected. Our first family with this
property also solves the extremal problem for the minimum number of edges in a
-connected graph G with n vertices. Since (G) ≥ , the Degree-Sum Formula
requires at least ⌈ n/2⌉ edges; this is achieveable whenever n > .
5 5
• • 4 •
• • 4
• •6 • •6
3• •7
• • 3• •7
• •8
• • • •8 2
• 2
• •
1
•9
1
The first general method for proving a graph -connected is the definition:
consider a separating set S and prove | S| ≥ . For the Harary graphs, we will use
another tool for the last case; we postpone it until after the main proof.
7.1.4. Theorem. (Harary [1962a]) (H¾ ,n) = , and hence the minimum number
of edges in a -connected graph on n vertices is ⌈ n/2⌉ .
Proof: Let r = ⌊ /2⌋ and G = H¾ ,n . Since (G) = , it suffices to prove (G) ≥ .
Let S be a separating set; we prove | S| ≥ .
Choose x , y ∈ V(G) − S. Deleting x and y from the circular arrangement of
vertices leaves two maximal segments A and B of consecutive vertices. In G − S,
we have the potential for traveling from x to y in a clockwise or a counterclockwise
direction, through A or B.
Since each vertex is adjacent to the next r vertices in each direction, there is
an x , y-path in G − S via A or B unless S contains r consecutive vertices both in
A and in B. Thus | S| ≥ unless is odd and S consists exactly of r consecutive
vertices in A and r consecutive vertices in B.
In this case, when n is even we find an x , y-path in G − S using the diagonal
edge at x or y. Let x and y be the neighbors of x and y along these edges, respec-
tively. Label A and B so | A| ≥ | B| ; now x , y ∈ A (see figure below). Since S has
r vertices between x and y in B, there are also r vertices between x and y in A.
Therefore, deleting r consecutive vertices in A leaves intact the x , y-path in A
or the x , y -path in A; adding xx or yy completes an x , y-path in G − S.
For odd n, the lack of rotational symmetry leads to annoying technical details
in such arguments. Instead, note that H¾ ,n is obtained from H¾ ,n−1 by using the
operation in Definition 7.1.5, which by Lemma 7.1.6 preserves -connectedness.
Section 7.1: Connectivity Parameters 291
The new vertices 1 and n each have degree ¾ , and each vertex that was adjacent
to the split vertex now has a neighbor in {1 , n}.
y
•
•x
•
x •
y
7.1.5. Definition. A vertex ¾-split forms a graph H from a graph G by delet-
ing one vertex x and replacing it with adjacent vertices x1 and x2 such that
NH (x1) ∪ NH (x2) = NG(x) ∪ {x1 , x2 } and d H (x i) ≥ ¾ .
• •x1
G • •x H
• •x2
Theorem 7.1.4 implies that ⌈ ¾ n/2⌉ edges and minimum degree ¾ are the
smallest values that allow an n-vertex graph to be ¾-connected. The smallest
value of the minimum degree that forces an n-vertex graph to be ¾-connected (for
1 ≤ ¾ < n) is much larger: ⌈(n + ¾ − 2)/2⌉ (Exercise 17).
Next we show that hypercubes are also maximally connected.
G1 G2
292 Chapter 7: Connectivity and Cycles
Hu • • Hu • •
Hu • • Hu • •
Case 1 Case 2
Equality holds when (G) = (G) and (H) = (G), since (G H) ≤ (G H) =
(G) + (H). However, (G H) can be large when (G) = (H) = 1 (Exercise
27). In fact, always (G H) = min{(G) + (H) , |V(G)| (H) , | V(H)| (G)}, stated
without proof by Liouville [1978] and proved by Špacapan [2008] (Exercise 28).
Section 7.1: Connectivity Parameters 293
EDGE CUTS
Edge deletion may be more relevant than vertex deletion. For example, per-
haps transmitters (vertices) are secure, but communication links (edges) can be
disrupted. In this setting, the redundancy of multiedges can be valuable.
Deleting any edge cut of a graph G disconnects it: G − [S, S] has no path from
S to S. In fact, all minimal disconnecting sets of edges have this form.
T
S S
Deleting one endpoint of each edge in an edge cut F deletes every edge of
F . Hence we expect that (G) ≤ (G), but we must avoid leaving a connected
subgraph by deleting all isolated vertices of G − F .
x•
•T
•
•T
S T• S
•
T•
•y
T•
When (G) < (G), no smallest edge cut isolates a vertex; in fact, both sides
of a smallest edge cut [S, S] must then be larger than (G). This follows from a
simple expression for the size of an edge cut.
We give a sufficient condition for equality in the trivial upper bound. Note
that diameter 2 does not imply (G) = (G); consider K 1 2K r .
BLOCKS
• •
• •
• • •
• •
• •
EXERCISES 7.1
7.1.1. (−) Prove that if G has more than ¾ vertices and is not ¾-connected, then G has a
separating set of size exactly ¾ − 1.
7.1.2. (−) Prove that G is ¾-connected if and only if G K r is (¾ + r)-connected.
7.1.3. (−) For ¾ , l , m ∈
(G
with ¾ ≤ l ≤ m, construct a graph G ¾ ,l ,m with (G ¾ ,l ,m) = ,
¾ ,l ,m) = l, and (G ¾ ,l ,m = m. (Chartrand–Harary [1968])
)
7.1.4. (−) Let M be a matching of size r in K r,s , where r ≤ s. Prove that the graph K r,s − M
is (r − 1)-connected unless (r, s) = (2 , 2).
7.1.5. (−) A cactus is a connected graph whose blocks are all edges or cycles. Prove that
a connected graph is a cactus if and only if no two vertices are joined by three internally
disjoint paths. Conclude that a connected graph with no even cycle is a cactus.
7.1.6. (−) Determine the smallest 3-regular graph with connectivity 1.
7.1.7. (−) Construct a graph with degree list 5543333 that is 3-connected. Prove that it is
3-connected by using vertex splits.
7.1.8. (−) For n , ∈ with n − odd and at least 3, show that the list with − 1 copies
of n − 1 and n − + 1 copies of is graphic but has no -connected realization. (F. Jao)
7.1.9. (−) Prove that every even graph has even edge-connectivity.
7.1.10. Determine (G), (G), and (G) for each graph G below. (Hint: For the graph on
the left , use Proposition 7.1.13 to establish the edge-connectivity.)
• • • •
• • • •
• • • • • •
• • • •
• • • •
296 Chapter 7: Connectivity and Cycles
7.1.11. A graph G is ¾ -expansive if for every set S ⊆ V(G) with | S| ≤ n− ¾ , there are at least
| S| + ¾ vertices of G whose neighborhood intersects S. Prove that every ¾-expansive graph
is ¾-connected. Provide infinitely many ¾-connected graphs that are not ¾-expansive.
7.1.12. For ¾ ≥ 2, prove that the only separating sets of size at most ¾ in the hypercube
Q¾ are vertex neighborhoods. (Ramras [2004])
7.1.13. Let G be an n-vertex graph such that (G) = (G) < n − 1. Prove that every
smallest edge cut consists of one edge incident to each vertex of a smallest separating set.
7.1.14. Prove that a connected graph is -edge-connected if and only if each of its blocks
is -edge-connected.
7.1.15. Use Proposition 7.1.13 to prove that the Petersen graph has an edge cut of size
if and only if 3 ≤ ≤ 12 (thus its edge-connectivity is 3).
7.1.16. Let G be an n-vertex triangle-free graph, with (G) ≥ 3. Prove that if n ≤ 11 ,
then G is 3-edge-connected. Prove sharpness by finding a 3-regular bipartite graph with
12 vertices that is not 3-edge-connected. (F. Galvin)
7.1.17. (♦) Let G be an n-vertex graph. Prove that if (G) ≥ (n + − 2)/2, where
1 ≤ ≤ n − 1, then G is -connected. Prove sharpness by constructing an n-vertex graph
with minimum degree ⌊ (n + − 3)/2⌋ that is not -connected.
7.1.18. (+) Let G be an n-vertex graph with n ≥ + l and (G) ≥ n+ll(+¾1−2) . Prove that if
G − S has more than l components, then | S| ≥ . Prove that the hypothesis on (G) is
sharp for n ≥ + l by constructing an appropriate n-vertex graph with minimum degree
⌊ n+ l(l¾+−12)−1 ⌋ . (Comment: This generalizes Exercise 7.1.17.)
7.1.19. (♦) Generalization of Exercise 5.3.37 to ( + 1)-connected graphs. (Bondy [1969])
(a) Let G have degrees d1 , . . . , d n in nondecreasing order, and suppose 0 ≤ ≤ n − 2.
Prove that if d j ≥ j + whenever j ≤ n − 1 − d n−¾ , then G is ( + 1)-connected.
(b) Prove sharpness by constructing an example for each to show that requiring
d j ≥ j + whenever j < n − 1 − d n−¾ does not imply (G) > .
7.1.20. (♦) Let G be an n-vertex graph with m edges. For ≥ 2, prove that if n ≥ 2 − 1 > 1
and m > (2 − 3)(n − + 1), then G has a -connected subgraph. Conclude that average
vertex degree a guarantees a subgraph with connectivity at least a/4. (Mader [1972])
7.1.21. Let G be an n-vertex graph.
(a) Prove that if (G) ≥ n − 2, then (G) = (G).
(b) For n ≥ 4, prove that part (a) is sharp by constructing an n-vertex graph with
minimum degree n − 3 and connectivity less than n − 3.
(c) Prove that if (G) = n − 3 and G contains no 4-cycle, then (G) = (G).
7.1.22. (♦) Let G be an n-vertex graph such that d(x) + d(y) ≥ n − 1 whenever xy ∈
/ E(G).
Prove that (G) = (G). As a function of n, determine the least such that (G) ≥
implies (G) = (G).
7.1.23. (♦) Prove that if G is a bipartite graph with diameter 3, then (G) = (G). (Hint:
Enhance the argument of Theorem 7.1.15.) (Plesnı́k–Znám [1989])
7.1.24. (♦) Let G be a graph with diameter 2.
(a) Prove that (G) = (G) when G has girth at least 5.
(b) Prove that part (a) is sharp by constructing an example with girth 4, diameter
2, and (G) < (G). (Hint: Create a 4-vertex cut S such that G − S = 2 K3 ,3 . Comment:
Soneoka–Nakada–Imase–Peyrat [1987] proved (G) = (G) for G with girth and diame-
ter at most 2⌈ /2⌉ − 3. Diameter at most 2⌈ /2⌉ − 2 guarantees (G) = (G).)
Exercises for Section 7.1 297
7.1.25. (♦) Let G be an n-vertex bipartite graph. Prove the following implications and
show that they are sharp.
(a) If (G) > n/4, then (G) = (G). (Volkmann [1988])
(b) If (G) ≥ n/3, then (G) = (G). For sharpness, construct for each odd integer a
bipartite graph G with (G) = and | V(G)| = 3 + 1 that is not -connected. (Kostochka)
7.1.26. (+) For ≥ 2, prove that every graphic list of integers with smallest value at least
is the degree list of some -edge-connected graph. (Hint: Consider a realization whose
smallest edge cut has size h. If h < , then find a 2-switch that produces a graph with
fewer edge cuts of size at most h.) (Edmonds [1964])
7.1.27. Theorem 7.1.8 states (G H) ≥ (G) + (H) for connected graphs G and H .
(a) Prove that the bound can be weak by computing (G H) when G = H = K1 2 K r .
(b) Prove that (G H) ≥ (G) + (H) when G and H are connected.
7.1.28. (+) Strengthen Theorem 7.1.8 by proving, for nontrivial graphs G and H ,
(G H) = min{ (G) + (H) , | V(G)| (H) , | V(H)| (G)}.
(Hint: Prove that if S is a separating set with | S| < min{| V(G)| (H) , | V(H)| (G)}, then S
has at least (G) + 1 vertices in some two copies of G and (H) + 1 vertices in some two
copies of H .) (Špacapan [2008]; also proved in Govorčin–Škrekovski [2014])
7.1.29. (♦) Let H be a spanning subgraph of a connected graph G. Prove that H is a span-
ning tree if and only if G − E(H) is a maximal subgraph containing no bond of G. (Com-
ment: Note that H is a spanning tree if and only if H is a maximal subgraph containing
no cycle. See Chapter 11 to relate the two statements.)
7.1.30. (♦) Prove that the edges of any edge cut can be partitioned into bonds.
7.1.31. (♦) Edge cuts and cycles.
(a) Let F be a nonempty set of edges in a graph G. Prove that F is an edge cut if and
only if F has an even number of edges in every cycle in G. (Hint: For sufficiency, find an
appropriate bipartition of the components of G − F .)
(b) A signing of a graph is a map : E(G) → {+1 , −1}. A signing is positive if each
cycle has an even number of negative edges. Prove that the number of positive signings of
any connected n-vertex graph is 2 n−1 . (See also Exercise 5.3.27 about signed graphs.)
7.1.32. For n ≥ , prove that an n-vertex graph with no -connected subgraph has at most
(n2) − (n−¾+31) −1 edges. (Matula [1983])
2
7.1.33. Prove that G is an even graph if and only if every block of G is Eulerian.
7.1.34. (♦) Let H be the block-cutpoint graph (Remark 7.1.18) of a graph G that has a cut-
vertex. (Harary–Prins [1966])
(a) Prove that H is a forest.
(b) Prove that at least two blocks of G contain only one cut-vertex of G.
(c) Prove that G has exactly + ∑v∈V(G)(b(v) − 1) blocks, where is the number of
components of G and b(v) is the number of blocks containing v.
(d) Prove that every graph has fewer cut-vertices than blocks.
7.1.35. Prove that a graph has no connected induced subgraph with three leaf blocks if
and only if it is claw-free and net-free, where the claw is K1 ,3 and the net is the graph
formed from K3 and K 3 by adding a matching joining them. (Kelmans [2006])
7.1.36. The cyclic edge-connectivity of a graph is the least number of edges whose dele-
tion leaves a disconnected graph with a cycle in each component. For m ≥ 6, prove that
Cm−2 2 K1 is 4-connected and has cyclic edge-connectivity m. (Plummer [1972])
298 Chapter 7: Connectivity and Cycles
MENGER’S THEOREM
When studying paths from one specified vertex to another, there is a natural
local version of separation, valid for both graphs and digraphs.
• •
• • •
• • • •
• • • •
x w
• • • •
X Z Y X Y
The line graph operation motivates our use of the “prime” for related param-
eters involving vertices or edges. We have (G) = (L(G)), and the next proof
shows that (G) is closely related to (L(G)).
Proof: Pym’s Theorem yields the first statement, as follows. For graphs, use
X = N(x) and Y = N(y), and add edges from x to X and from Y to y to complete
the desired paths. For digraphs, use X = N +(x) and Y = N −(y).
For the second statement, apply Pym’s Theorem to the line graph of G. Let
X be the set of edges incident to [leaving] x, and let Y be the set of edges incident
to [entering] y. The X , Y -link of size (x , y) in L(G) transforms into pairwise
edge-disjoint x , y-paths in G.
These edge statements extend without change to multi[di]graphs. Under the
line graph operation, multiedges become distinct vertices, and the application of
Pym’s Theorem is unchanged.
• x X
• y Y
Section 7.2: Properties of ¾-Connected Graphs 301
The next lemma gives another way (besides vertex -splits) to enlarge a graph
while preserving -connectedness.
Analogous conditions yield expansion lemmas for digraphs and for edge-
connectivity of multigraphs; see Exercise 23.
7.2.12. Lemma. (Fan Lemma; Dirac [1960]) A graph with more than vertices
is -connected if and only if it has an x , U-fan of size for each choice of x
and U with |U | ≥ and x ∈
/ U.
Proof: Let G be -connected, and construct G from G by adding a new vertex y
adjacent to all of U. Since G is -connected, the Expansion Lemma implies that
G is -connected, and by Menger ’s Theorem there is in G a set of independent
x , y-paths. Stopping these paths where they reach U produces an x , U-fan of size
in G, as illustrated below.
If G is not -connected, then G has a separating ( − 1)-set S (Exercise 7.1.1).
Choose x and y in distinct components of G − S, and let U = S ∪ {y}. There is no
x , U-fan, since every x , y-path intersects S.
302 Chapter 7: Connectivity and Cycles
G •
U
x• • •y
•
When ¾ ≥ 3, the converse does not hold, as shown when G is a cycle. Bondy–
Lovász [1981] proved the stronger result that for ¾ ≥ 3 in a ¾-connected graph
every set of ¾ vertices lies on an even cycle.
To apply Menger ’s Theorem, model a problem by defining a graph or digraph
whose paths yield the desired objects. Exercise 31 requests such proofs of Hall’s
Theorem and the K önig–Egerváry Theorem. (One can also prove Menger ’s Theo-
rem from those results, as K önig did to fill a gap in Menger ’s original proof.)
Ford and Fulkerson solved a more general problem. Recall that an SDR for a
family A1 , . . . , Am of sets consists of distinct elements 1 , . . . , m with i ∈ Ai .
7.2.14. Definition. Let A and B be two families of sets, each of size m. A com-
mon system of distinct representatives (CSDR) is a set of m elements
that form an SDR for A and also for B.
4
•
a3 b3
I • • J
3
•
s• • • •t
a2 2 b2
R • R
a1 b1
• •
1
•
A X B
7.2.16. Example. Digraph for CSDR. In the figure above, the elements are
{1 ,2 ,3 ,4}, with A = {12 , 23 , 31} and B = {14 , 24 , 1234}. When R contains
{a1 , a2 , b1 , b2 } but not a3 or b3 , we set I = J = {3}. Now R is an s , t-cut if
and only if it also contains {1 , 3}, which is ( ⋃i∈ I Ai ) ∩ ( ⋃ j ∈ J Bj ) .
Like many min-max relations, Menger ’s Theorem follows from the Max-Flow
Min-Cut Theorem of network flow theory. Conversely, Menger ’s Theorem implies
both the flow theorem (for rational capacities) and most of its combinatorial ap-
plications. For example, Theorem 7.2.15 above is usually proved in the language
of network flows, but Menger ’s Theorem suffices. We will apply Theorem 7.2.15
in Chapter 12.
304 Chapter 7: Connectivity and Cycles
Menger ’s Theorem characterizes ¾-connected graphs but does not say how to
construct them. Construction or decomposition procedures for a class of graphs fa-
cilitate the development of iterative algorithms and inductive proofs. For graphs
that are 2-connected or 3-connected, such procedures exist using vertex splits.
First we introduce an inverse operation.
• • •u
x
• • •
H • • • H
y
• • → • ••
u v u w v
• Q0 •
Q4
• •
•
Weak ear decompositions are also called “closed-ear decompositions”. We use
“weak” to emphasize that the requirements for the decomposition are relaxed;
each added Qi may now be an ordinary ear or a closed ear.
Weak ear decompositions yield a short solution of the “one-way street ” prob-
lem. When can the streets of a road network all be made one-way and still permit
each location to reach every other? A strong orientation of a graph is an orien-
tation that is a strongly connected digraph (Definition 7.2.1).
For sufficiency, use a weak ear decomposition. Orient the initial cycle consis-
tently. Orient each subsequent ear or closed ear Q from one end (u) to the other
(v). By transitivity, the new digraph is strong: old vertices can reach u, which
can reach all new vertices, and new vertices can reach v, which can reach all old
vertices. After all of G is added, we have a strong orientation.
Note that (X) < ∑v∈ X d(v) when X is not an independent set. The (X) no-
tation makes it easy to compare the sizes of related edge cuts.
X
a
X∩Y X−Y
e
Y b c
Y−X X∪Y
d
308 Chapter 7: Connectivity and Cycles
Mader [1978] used his Shortcut Lemma to give another proof of the Strong
Orientation Theorem. Other proofs of the Orientation Theorem use polyhedral
combinatorics (see Frank [1980a], Frank–Tardos [1984]).
We close this section with the analogue of Lemma 7.2.29 for vertices. A min-
imal -connected graph is a graph from which the deletion of any edge destroys
-connectedness. Halin [1969, 1971] proved that every such graph has a vertex
of degree . Mader strengthened Halin’s result by showing that every cycle con-
tains a vertex of degree . We need a technical lemma.
B T Y
A
•
a• •y
S U
X
• D
x
Via a simple counting argument, Theorem 7.2.32 implies that almost half the
vertices of a minimal ¾-connected graph have degree ¾ .
Corollary 7.2.33 is almost the best possible bound. Mader [1979] (see Mader
[1996], a survey) proved that a minimal ¾-connected graph with n vertices has at
least (¾−21)n +2 ¾
¾ −1 vertices of degree ¾ . Equality holds for infinitely many examples,
such as those in Exercise 59.
EXERCISES 7.2
7.2.5. (−) A thread in a graph is a path that is maximal subject to the condition that the
internal vertices have degree 2. Prove or disprove: The last ear added in an ear decompo-
sition of a 2-connected graph G that is not a cycle can be any thread in G.
7.2.6. (−) Let G be a graph with at least three vertices, none isolated. Prove that G is
2-connected if and only if any two edges appear in a common cycle.
7.2.7. (−) Prove that a graph with at least three vertices is 2-connected if and only if for
every 3-tuple (x , y , ) of vertices, the graph has an x , -path through y. (Chein [1968])
7.2.9. (−) Prove that a graph G with at least four vertices is 2-connected if and only if for
every pair X , Y of disjoint vertex subsets with | X | , | Y | ≥ 2, there are two disjoint paths
from X to Y in G that have no internal vertex in X or Y .
7.2.11. (−) Show that Theorem 7.2.13 is best possible by constructing, for all ∈ with
≥ 3, a -connected graph having + 1 vertices that do not lie on a cycle.
7.2.12. (−) For ≥ 2, prove that a graph G with at least + 1 vertices is -connected if
and only if for disjoint S, T ⊆ V(G) with | S| = − 2 and | T | = 2, there is a cycle in G that
contains T and avoids S. (Lick [1973])
7.2.13. (−) Prove that a connected graph G with more than vertices is -connected if
and only if G(x , y) ≥ 2 whenever d(x , y) = 2. (Li [1994], Naatz [2000])
7.2.14. (−) Use Theorem 7.2.19 to prove that the Petersen graph is 3-connected.
7.2.15. (−) Let H be a -connected graph obtained by contracting the edges of a matching
in a graph H with (H) ≥ . Prove that H is -connected. (Savage–Zhang [1998])
7.2.16. (−) Let G be a 2-connected n-vertex graph with m edges. Prove that in every ear
decomposition of G, the number of ears after the initial cycle is m − n.
7.2.17. (−) Let G be a 2-connected graph. Prove that if G has an ear decomposition with
initial cycle length at least l where each added ear has length at least l − 1, then G has
girth at least l. Prove that the converse is not true (provide a counterexample). (Kelmans)
7.2.18. (−) Győri [1978] and Lovász [1977] proved that a graph G with more than ver-
tices is -connected if and only if for all distinct v1 , . . . , v¾ ∈ V(G) and n1 , . . . , n¾ ∈
summing to | V(G)| , there is a partition V1 , . . . , V¾ of V(G) such that each Vi has size ni ,
contains vi , and induces a connected subgraph. Show that the condition is sufficient.
7.2.19. Prove or disprove: If G is a 2-connected graph that is not a cycle, then G contains
a cycle C such that G − V(C) is connected.
7.2.20. For a graph G with x , u , v ∈ V(G), prove G(u , v) ≥ min{ G(x , u) , G(x , v)}. Does
the analogous inequality hold for G(u , v)?
7.2.21. (♦) The pinch operation subdivides edges of a digraph (each becomes a path of
length 2 through a new vertex) and merges the new vertices into a single vertex. Prove
that pinching a -edge-connected digraph always yields a -edge-connected digraph.
7.2.22. (♦) Prove that if G is an Eulerian graph, then G(x , y) is even for all x , y ∈ V(G).
(Comment: M. Ghorbani conjectured that the converse is true; this remains open.)
Exercises for Section 7.2 313
• •
• •
• •
• •
u• • •v
• •
7.2.27. (♦) Let G be an n-vertex graph with connectivity and diameter d. Prove both
n ≥ (d − 1) + 2 and (G) ≥ ⌈ (1 + d)/2⌉ . For , d ≥ 2, construct an example such that
equality holds in both bounds. (Watkins [1967])
7.2.28. Let G be a -connected graph. For sets S, T ⊂ V(G) with size at least , prove
that G has pairwise disjoint S, T-paths.
7.2.29. (♦) Let X and Y be disjoint sets of vertices in a -connected graph G. Let w be a
positive integer function on X ∪ Y such that ∑ x∈ X w(x) = ∑ y∈ Y w(y) = . Prove that there
are independent X , Y -paths such that for each vertex v ∈ X ∪ Y , the number of these
paths having an endpoint at v is w(v).
7.2.30. Assuming that (x , y) = (x , y) and (x , y) = (x , y) hold for digraphs (the latter
when xy is not an edge), derive the same statements for graphs.
7.2.31. (♦) Prove the K önig–Egerváry Theorem and Hall’s Theorem from Menger ’s The-
orem. Prove Hall’s Theorem from the Ford–Fulkerson CSDR Theorem.
7.2.32. (♦) Fix ≥ 2, and let G be a -connected graph with n vertices.
(a) For n ≥ 2 , prove that G has a cycle of length at least 2 .
(b) For n ≥ 3 , prove that G has a cycle of length at least 3 if C4
⊆ G. (Kostochka)
7.2.33. -contractible edges (see Martinov [1982]).
(a) Prove that a -connected -regular graph in which every edge lies in a triangle has
no -contractible edge. (Comment: This includes H¾ ,n of Example 7.1.3 for even .)
(b) The Harary graph H2 ,n is also denoted Cn2 . For n ≥ 7, prove that contracting some
two edges in Cn2 leaves Cn2−2 (multiedges after contraction are turned into simple edges).
7.2.34. (+) Prove that every triangle-free -connected graph has a -contractible edge.
(Thomassen [1981b])(Comment: Thomassen used this to prove that every ( + 3)-connected
graph has a cycle such that deleting its vertices leaves a -connected graph.)
314 Chapter 7: Connectivity and Cycles
7.2.35. Let S be a set of vertices in a graph G such that (x , y) ≥ for all x , y ∈ S. Prove
that if | S| ≤ + 1, then the vertices in S lie on a single path in G. Show this cannot be
guaranteed when | S| = + 2.
7.2.36. (♦) A graph is -linked if for every choice of distinct vertices s1 , . . . , s¾ and
t1 , . . . , t¾ , there exist disjoint paths P1 , . . . , P¾ such that Pi is an si , ti -path. Prove that
every -linked graph is (2 − 1)-connected. The graph below is 5-connected; prove that it
is not 2-linked (Watkins [1968]). For general , construct a (3 − 3)-connected graph that
is not -linked. (Comment: Thus () ≥ 3 − 2, where () is the least j such that every
j-connected graph is -linked. Thomassen [1980b] and Seymour [1980] proved (2) = 6.
The best general result is () ≤ 10 ; in fact , 2 -connected graphs with average degree at
least 10 are -linked (Thomas–Wollan [2005]).)
•
• • •
• •
• • • •
• •
• • •
•
7.2.37. Let G be a -edge-connected graph. Prove that the line graph L(G) is -connected
and (2 − 2)-edge-connected.
7.2.38. Use Tutte’s 1-Factor Theorem to prove that every connected line graph with an
even number of vertices has a perfect matching. Conclude that every connected graph
with an even number of edges decomposes into paths of length 2.
7.2.39. (♦) Let A1 , . . . , A m and B1 , . . . , Bm be two partitions of a set E such that all the
sets Ai and Bj have the same size. Prove that the two set systems have a common system
of distinct representatives. (Ryser [1963, p. 51])
7.2.40. Let G1 and G 2 be disjoint -connected graphs with ≥ 2. For i ∈ {1 , 2}, choose
vi ∈ V(G i) and let X i = NG i (vi). Let B be an X 1 , X 2 -bigraph that has no isolated vertex
and has a matching of size at least . Prove that (G1 − v1) ∪ (G 2 − v2) ∪ B is -connected.
7.2.41. (♦) Let (j) be the least such that any two vertices in a -connected graph are
joined by a path P such that G − V(P) is j-connected. Prove (1) = 3. (Tutte [1961])
(Comment: Lovász conjectured that (j) exists; Chen–Gould–Yu [2003] proved (2) ≤ 5.)
7.2.42. Let u be a vertex in a 3-connected graph G. Prove that G − u contains a cycle C
such that G − V(C) is connected.
7.2.43. Prove that applying the expansion operation of Exercise 5.2.22 to a 3-connected
graph yields a 3-connected graph. Obtain the Petersen graph from K4 by expansions.
(Comment: Tutte [1966] proved that all 3-regular 3-connected graphs arise this way.)
7.2.44. Prove that if every edge in a connected graph G is the unique common edge in some
pair of cycles, then G is 3-edge-connected. Prove this property for the Petersen graph.
7.2.45. Use induction on the distance between vertices to prove that a graph with at least
three vertices is 2-connected if and only if for any two vertices x and y there exist two
independent x , y-paths. (Whitney [1932a])
7.2.46. Let G be a graph having no induced subgraph that is C¾ for > 3 or K4− (five
edges). Prove that every block of G is a complete graph. (Lehel)
Exercises for Section 7.2 315
7.2.47. (♦) For a connected graph G with | V(G)| ≥ 3, prove the following equivalent.
(A) G is 2-edge-connected.
(B) Every edge of G appears in a cycle.
(C) G has a closed trail containing any specified pair of edges.
(D) G has a closed trail containing any specified pair of vertices.
7.2.48. Let v be a vertex of a 2-connected graph G. Prove that v has a neighbor u such
that G − u − v is connected. (Chartrand–Lesniak [1986, p. 51])
7.2.50. (♦) Let C be a cycle in a 2-connected graph G that is not a cycle. Prove that C
contains an ear of G whose deletion leaves a 2-connected subgraph. That is, removal of
ears in an ear decomposition of G can start by breaking any cycle.
7.2.51. (♦) Let s and t be vertices in a 2-connected graph G. Prove that the vertices of
G can be linearly ordered so that each vertex outside {s , t} has a neighbor that is ear-
lier in the order and a neighbor that is later in the order. (Hint: Use ear decompositions.
Comment: This is called an s , t-numbering of G.)
7.2.52. (♦) Let G be a 2-connected graph, and fix r ∈ V(G). Prove that G has two spanning
trees such that for every v ∈ V(G), the r, v-paths in the two trees are independent. (Hint:
Use ear decomposition to prove the stronger statement for each r that G has two trees and
a labeling of V(G) − {r} by real numbers such that in one tree the labels increase along
paths from r and in the other they decrease along paths from r.)
(Comment: Itai and Rodeh conjectured a ¾-connected graph always has ¾ such trees.
This was proved for ¾ = 3 in Itai–Zehavi [1989] and for ¾ = 4 in Curran–Lee–Yu [2006].)
7.2.53. (+) Alice and Bob play a game on a 2-connected n-vertex graph G. Alice picks ver-
tices u and v. Next Bob orients up to º (n) of the edges. Alice then orients the remaining
edges and selects an edge e, which may have been oriented by her or by Bob. If the orien-
tation contains a u , v-path through e, then Bob wins; otherwise, Alice wins. Prove that
the least º (n) such that Bob always has a winning strategy is 2n − 3. (Kerimov [2009])
7.2.57. Given vertices x and y in a minimal 2-connected graph G such that no x , y-path
has a chord, prove that every x , y-path has an internal vertex with degree 2 in G. Use
this to improve Corollary 7.2.33 by showing that every minimal 2-connected graph with n
vertices has at least (n + 4)/3 vertices of degree 2. (Dirac [1967], Plummer [1968])
7.2.58. (♦) Applications of Mader’s Theorem (Theorem 7.2.32).
(a) Prove: a minimal ¾-connected graph has at least ¾ vertices of degree ¾ .
(b) Let S be any ¾-set in a minimal ¾-connected graph G, and let C be a component of
G − S. Prove that C contains a vertex of degree ¾ in G (see Mader [1972]).
(c) Prove that a minimal ¾-connected graph G has at least ¾ + 1 vertices of degree ¾ .
(Comment: This improves Corollary 7.2.33 when | V(G)| ≤ 2 ¾ .)
7.2.59. Construct a graph G ¾ ,m as follows. Begin with mK ¾−1 ,¾ , having m(¾ − 1) vertices
yr, j and m¾ vertices xr,i such that yr, j and xr,i are adjacent for i ∈ [¾] and j , r ∈ [m]. Also
make xr,i and xr+1 ,i adjacent for i ∈ [¾] and r ∈ [m − 1]. Finally, add two vertices and of
degree having neighbors {x1 ,i } and {x m ,i }, respectively. Prove that G ¾ ,m is a minimal -
connected graph with (¾−21)n +2¾
¾ −1 vertices of degree . (Bollobás [1978, p. 25], Mader [1979])
Survey papers about Hamiltonian graphs and related topics include Bondy
[1978a, 1995], Gould [1991, 2003, 2014], Faudree [1996, 2001], Lesniak [1996],
K awarabayashi [2001], Yamashita [2004], Li [2013], K ühn–Osthus [2014], and
many others. We will not discuss analogues for directed graphs, surveyed in
Bermond–Thomassen [1981] and Zhang–Song [1991].
• • • •
•
• S •
• • •
• •
The necessary condition #(G − S) ≤ | S| for all nonempty S sounds like Tutte ’s
1-Factor Condition, but it is not sufficient for a spanning cycle.
7.3.3. Example. Necessary but not sufficient. The graph on the left below fails
the condition of Proposition 7.3.2, even though it is bipartite with parts of equal
size. Hence it is not Hamiltonian. (Tutte [1971] conjectured that all 3-connected
3-regular bipartite graphs are Hamiltonian; counterexamples were found with
96 vertices (Horton [1982]) and eventually only 50 vertices (Georges [1989]).
• • •
• •
• •
• •
• • • • •••
• •
• • •
• • • •
• •
In the graph on the right, the necessary condition holds, but there is no span-
ning cycle; both edges incident to any vertex with degree 2 must be used, which
forces three edges at the central vertex. Exercise 28 generalizes this example.
318 Chapter 7: Connectivity and Cycles
For regular graphs with even degree, one can study decompositions into span-
ning cycles, called Hamiltonian decompositions (we write “H-decomposition”).
The complete graph K 2r+1 has H-decompositions (Exercise 5.3.48). Sloane [1969]
asked whether every 4-regular graph with an H-decomposition has another.
SUFFICIENT CONDITIONS
7.3.6. Lemma. (Ore’s Lemma; Ore [1960]) Let x and y be distinct nonadjacent
vertices of an n-vertex graph G. If d(x) + d(y) ≥ n, then G is Hamiltonian if
and only if G + xy is Hamiltonian.
Proof: If G is Hamiltonian, then so is G + xy. If G + xy is Hamiltonian but G is
not, then xy lies in each spanning cycle in G + xy. Index the vertices from v1 to
vn along a spanning x , y-path in G.
If some neighbor of x immediately follows a neighbor of y on the path,
say vi+1 ∈ N(x) and vi ∈ N(y), then omitting vi vi+1 yields the spanning cycle
[x , vi+1 , vi+2 , . . . , y , vi , vi−1 , . . . , v2 ] in G shown below.
• • • •
x vi vi+1 y
To guarantee such a cycle, we prove that S and T have a common element,
where S = {i: vi+1 ∈ N(x)} and T = {i: vi ∈ N(y)}. Summing their sizes,
|S ∪ T | + |S ∩ T | = | S| + | T | = d(x) + d(y) ≥ n.
Neither S nor T contains the index n. Thus | S ∪ T | < n, and hence | S ∩ T | ≥ 1.
We conclude that G has a spanning cycle.
• u N(v) N(u) •v
iK 1 Ki K n−2i
• • •uj
aj
When a sufficient condition for spanning cycles fails slightly, we still expect
a long cycle. The maximum length of a cycle in G is its circumference, c(G).
We begin with the number of edges to force c(G) > q. We also consider long-cycle
versions of conditions for spanning cycles.
Section 7.3: Spanning Cycles 323
Therefore, G − W has n − d vertices and more than q(n − d − 1)/2 edges. Using
the induction hypothesis, c(G) ≥ c(G − W) > q.
v1 v¾ v¾+1 vl
• • • •
Theorem 7.3.16 is sometimes sharp; Kopylov [1977] gave the complete answer.
Next, the long-cycle result of Dirac [1952b] will follow from our later results.
• • • •
x = v1 vi vj y = vl
324 Chapter 7: Connectivity and Cycles
Q2 Q r −1
a t0 s2 t2 s4 t r −1 u b
1 s1 t1 s3 t3 sr tr l
Q1 Q3 Qr
When r is even, the path starting with xva reaches tr and ends with Ptr ,l , while
the other path reaches vb and ends with vb y.
Since si+1 ≥ t i−1 ,
s 1 < a ≤ t 0 ≤ s 2 < t 1 ≤ s3 < t 2 · · · < t r −1 ≤ u ≤ b < t r
Thus the two concatenations are x , y-paths forming a cycle. The definitions of a
and b yield N(x) ⊆ V(P1,s1 ∪ P a ,t0 ) and N(y) ⊆ V(Pu ,b ∪ Ptr ,l), so the cycle includes
x and y and their neighbors and has length exceeding d(x) + d(y).
• • • • • •
• • • • • •
Tian [1988] shortened the proof by applying Bondy ’s Lemma. Later, Tian
[2004] shortened it yet again, obtaining the needed longest path more directly.
This improvement uses the switching idea in the proof of Theorem 7.3.16.
The results of Dirac, Ore, and Chvátal are sharp but only begin the study
of cycles. Besides generalizing to long cycles as discussed above, we can consider
restricting G or modifying the hypotheses or conclusions in various ways.
326 Chapter 7: Connectivity and Cycles
7.3.24. Remark. Weakening the conditions for spanning paths. Spanning paths
are usually guaranteed by slight weakenings of sufficient conditions for spanning
cycles, since G has a spanning path if and only if G K 1 has a spanning cycle (Re-
mark 7.3.13). Dirac’s Condition, Ore ’s Condition, and the Chvátal–Erdős Con-
dition can be modified in this way to guarantee a spanning path in an n-vertex
graph G when (G) ≥ (n − 1)/2, or 2(G) ≥ n − 1, or (G) ≤ (G) + 1.
Viewing a spanning path as a restricted spanning tree leads to many gener-
alizations. A spanning path has maximum degree 2, no branch vertices, only two
leaves, etc. Weakening the conditions for a spanning path may guarantee sim-
ilarly weakened spanning trees. Ozeki–Yamashita [2011] provides a thorough
survey about such problems, including what we mention here (see also Kouider–
Vestergaard [2005]). Say that a spanning tree is -bounded if it has maximum
degree at most , -branched if it has at most branch vertices (vertices with
degree at least 3), and -ended if it has at most leaves.
For example, Gargano–Hammar–Hell–Stacho–Vaccaro [2004] proved that
(G) ≥ (n − 1)/3 guarantees a 1-branched spanning tree. Strengthening ear-
lier conjectures, Ozeki–Yamashita [2011] conjectured that (G) ≥ (n − )/( + 3)
guarantees a -branched spanning tree, which is sharp (Exercise 60); DeBiasio–
Lo [2017+] proved the conjecture asymptotically (that is, (G) ≥ ( ¾+1 3 + o(1))n is
sufficient). In fact, the conjecture asserts sufficiency of the Ore-type condition
that the sum of the degrees of any + 3 independent vertices is at least n − .
Recall from Remark 7.3.4 on toughness that #(G) denotes the number of com-
ponents of G. A -bounded spanning tree requires #(G − S) ≤ ( − 1) | S| + 1 for all
S ⊆ V(G) (Exercise 61). This necessary condition is almost sufficient: Win [1989]
proved that if #(G − S) ≤ ( − 2) |S| + 2 for all S ⊆ V(G), then G has a -bounded
spanning tree (Ellingham–Zha [2000] gave a short proof).
In terms of connectivity, (G) ≤ ( − 1)(G) + 1 guarantees a -bounded span-
ning tree (Neumann-Lara & Rivera-Campo [1991]). Win [1975] (proved below)
obtained an Ore-type condition: it suffices that any independent vertices have
degree-sum at least n − 1 (implied by (G) ≥ (n − 1)/). A “long-cycle” analogue
for -bounded subtrees appears in Caro–Krasikov–Roditty [1991].
For -ended spanning trees, a necessary condition is #(G − S) ≤ | S| + − 1
for all S ⊆ V(G) (Exercise 62). Also the Chvátal–Erdős and Ore conditions were
generalized: Win [1979] showed that (G) ≤ (G) + − 1 suffices, and Broersma–
Tuinstra [1998] proved that 2(G) ≥ (n − + 1)/2 suffices.
The notion of Hamiltonian-connected also generalizes to the setting of span-
ning trees. A graph G with more than vertices is -leaf-connected if for every
set S of vertices, there is a spanning tree whose set of leaves is S. A graph is
Hamiltonian-connected if and only if it is 2-leaf-connected. Gurgel–Wakabayashi
[1986] proved that G is -leaf-connected when 2(G) ≥ n + − 1, and Egawa–
Matsuda–Yamashita–Yoshimoto [2008] improved this: 2(G) ≥ n+ 1 suffices when
G is ( + 1)-connected.
328 Chapter 7: Connectivity and Cycles
We further consider d j (pi). The sets NT (y) − {y } for y ∈ Yj are pairwise dis-
joint and have size − 1. These sets, which have no neighbor of pi , cannot contain
pj , which is another nonneighbor of pi . However, x is in one of those sets if t j ∈ Yj .
Let = 1 if t j ∈ Yj ; otherwise, = 0. We obtain
d j (pi) ≤ nj − 1 − ( − 1) | Yj | + ≤ nj − 1 + − ∑ d j (pr).
r ∈[¾]−{ j}
¾
Thus ∑r=1 d j (pr) ≤ nj − 1 + . Since all neighbors of pr lie in T , summing
this inequality over j ∈ [] provides an upper bound on D, the sum of the degrees
of the independent vertices in S. If = 1 in the inequality for j , then all pi
for i
= j are not adjacent to x in G, and D ≤ ∑ nj = | V(T)| − 1. If = 0 in each
inequality, then vertices of S may be adjacent to x in G; now D ≤ ∑(nj − 1) + =
|V(T)| − 1. Since D ≥ n − 1 is given, T must be a spanning tree.
EXERCISES 7.3
7.3.3. (−) Prove that G has a Hamiltonian path only if for every S ⊆ V(G), the number of
components of G − S is at most | S| + 1.
7.3.4. (−) Prove that every ¾-regular ¾-edge-connected graph is 1-tough. (Comment:
Hence every such graph also has a 1-factor.)
7.3.5. (−) Prove or disprove: If an n-vertex graph G has an edge xy with the property that
d(x) + d(y) ≥ n + 2, then G is Hamiltonian if and only if G − xy is Hamiltonian.
7.3.6. (−) Let G be a 3-regular graph whose edge set has exactly one partition into three
perfect matchings. Prove that G is Hamiltonian. (Greenwell–Kronk [1973])
7.3.7. (−) Prove or disprove: If G is an n-vertex graph with n ≥ 3, and G has at least (G)
vertices of degree n − 1, then G is Hamiltonian.
7.3.8. A mouse eats its way through a 3 × 3 × 3 cube of cheese by eating all the 1 × 1 × 1
subcubes. If it starts at a corner subcube and always moves on to an adjacent subcube
(sharing a face of area 1), can it do this and eat the center subcube last? Give a method or
prove impossible. (Ignore gravity.)
7.3.9. (♦) Let x and y be vertices in a Hamiltonian bipartite graph G. Prove that G − x − y
has a perfect matching if and only if x and y lie in opposite sets of the bipartition. Use this
to conclude that an 8-by-8 chessboard with two missing unit squares can be partitioned
into 31 one-by-two rectangles if and only if the two missing squares have opposite colors.
7.3.10. Place n vertices around a circle. Let G n be the 4-regular graph obtained by making
each vertex adjacent to the two nearest vertices in each direction. For n ≥ 5, prove that
G n is the union of two Hamiltonian cycles.
7.3.11. For ≥ 3, let G ¾ be the graph obtained from two disjoint copies of K ¾ ,¾−2 by adding
a matching joining the independent -sets in the two copies. Determine all values of such
that G ¾ is Hamiltonian.
• •
• •
• • • •
• • • •
• • • •
• •
• •
7.3.12. (♦) For n ≥ 10 with n even, construct a 3-regular 3-connected graph that is not
Hamiltonian. (Hint: Start with the Petersen graph and expand vertices.)
7.3.13. (♦) Prove that the line graph of a graph G is Hamiltonian if and only if G has a
closed trail that contains at least one endpoint of each edge (this holds for the Petersen
graph). Use the Petersen graph to construct a 3-regular 3-connected graph whose line
graph is not Hamiltonian. (Hint: Make an appropriate substitution for each vertex of the
Petersen graph.) (Harary–Nash-Williams [1965])
7.3.14. Prove that if n is even, then K n ,n does not contain three perfect matchings such
that any two together form a spanning cycle. (Hint: Interpret each matching as a permu-
tation.) (Basavaraju–Chandran–Kummini [2010])
7.3.15. (♦) Prove that the cartesian product of two nontrivial graphs with spanning paths
fails to have a spanning cycle if and only if both graphs are bipartite and have odd order,
in which case the product has a spanning path. (Behzad–Mahmoodian [1969])
330 Chapter 7: Connectivity and Cycles
7.3.16. (♦) On a chessboard, a knight can move from one square to another that differs
by 1 in one coordinate and by 2 in the other coordinate (some such moves are shown be-
low). A knight ’s tour is a traversal of a rectangular board by knight ’s moves that visits
each square once and returns to the start. Prove that a 4-by-n chessboard cannot have a
knight ’s tour.
• • • • • •
• • • • • •
• • • • • •
• • • • • •
7.3.17. Let G be a claw-free graph (that is, G has no induced K1 ,3). Prove that the maxi-
mum t such that G is t-tough is (G)/2. (Matthews–Sumner [1984])
7.3.18. (♦) Prove that every 2-connected, claw-free, paw-free graph is Hamiltonian. (The
paw is obtained from the claw K1 ,3 by adding one edge.) (Goodman–Hedetniemi [1974])
7.3.19. (♦) Prove that a graph obtained by deleting one vertex from each part of the bi-
partite graph C2m K 2 is Hamiltonian (Stong [2003]). Conclude that deleting one vertex
of each parity from the hypercube Q¾ with ≥ 3 leaves a Hamiltonian graph. (Comment:
Locke [2001] asked whether deleting up to − 2 vertices of each parity from Q¾ always
leaves a Hamiltonian graph. Stong proved that asymptotically /2 of each can be deleted.)
7.3.20. (+) In the -dimensional hypercube Q¾ with ≥ 2, prove that every perfect match-
ing extends to a spanning cycle. (Hint: Prove the stronger statement that every perfect
matching in the complete graph with vertex set V(Q¾) extends to a spanning cycle by adding
a perfect matching in Q¾ .) (Fink [2007, 2009])
7.3.21. Prove that the -dimensional hypercube Q¾ has a spanning path whose endpoints
are complementary if and only if is odd. Prove that it has a spanning path with endpoints
differing in all but one position if and only if is even.
7.3.23. (+) For each odd , construct a ( − 1)-connected -regular bipartite graph that
is not Hamiltonian. (Comment: Nash-Williams conjectured that 4-connected 4-regular
graphs are Hamiltonian, but the 70-vertex Meredith graph disproves this (duplicate a
matching in the Petersen graph to obtain a 4-regular multigraph G, and then form the
blow-up graph H as in Example 6.2.15 that seeks a 1-factor in G). Tutte [1971 /2] con-
jectured that every 3-connected 3-regular bipartite graph is Hamiltonian; the first coun-
terexample was the Horton graph with 96 vertices (Bondy–Murty [1976, p. 240]). The
smallest known counterexample has 54 vertices (Ellingham–Horton [1983]).)
7.3.24. (♦) Determine which complete multipartite graphs are pancyclic. (Recall that an
n-vertex graph is pancyclic if it has cycles of all lengths from 3 to n.)
7.3.25. (+) Prove that every n-vertex Hamiltonian graph G with more than n2/4 edges is
pancyclic. (Bondy [1971a]) (Hint: Use induction on n (Thomassen). Consider separately
the cases when G does or does not contain a cycle of length n − 1. Comment: Bondy also
proved that n2/4 edges are sufficient unless G = K n/2 ,n/2 . From this it follows easily that
Dirac’s Condition and Ore’s Condition imply that G is pancyclic unless G = K n/2 ,n/2 .)
Exercises for Section 7.3 331
7.3.26. There is a subgraph of K n ,n with n(n − 1) + 1 edges that has no spanning cycle.
Prove that every subgraph of K n ,n having at least n(n − 1) + 2 edges has cycles of all even
lengths from 4 through 2n. (Entringer–Schmeichel [1988])
7.3.27. Determine whether the graph below has a spanning path.
• •
• • • •
• • • •
• • • • • • • •
• • • • • • • •
• • • •
• • • •
• •
7.3.28. (♦) The ¾ th power of a graph G is the graph G ¾ with vertex set V(G) and edge
set {uv: d G(u , v) ≤ ¾}.
(a) Prove that if a vertex x in G has exactly one neighbor in at least three nontrivial
components of G − x, then G 2 is not Hamiltonian.
(b) Prove that if G is connected and has at least three vertices, then G3 is Hamilto-
nian. (Sekanina [1960], Karaganis [1968]) (Comment: Fleischner [1974] proved that the
square of each 2-connected graph is Hamiltonian.)
7.3.29. Let G(¾ , t) be the class of connected ¾-partite graphs in which each part has size
t and each subgraph induced by two parts is a matching of size t.
(a) Show that every graph in G(3 , t) is a cycle and hence is Hamiltonian. (Comment:
Also every graph in G(¾ , 3) is Hamiltonian.)
(b) For ¾ ≥ 4 and t ≥ 4, construct a non-Hamiltonian graph in G(¾ , t). (Hint: Start
with a cycle spanning three parts, and make the other parts into cliques. Finish the con-
struction so that deleting some three vertices leaves four components.) (Ayel [1982])
7.3.30. (♦) The lollipop graph. (Thomason [1978])
(a) Let P be a u , -path in a multigraph G, and let S = V(P) − { }. Prove that G has
an even number of spanning paths that start along P and end at vertices whose degree
in G − S is even. (Hint: Define a graph H on the set of spanning paths beginning along
P , making a u , x-path Q and a u , y-path R in V(H) adjacent if and only if xv ∈ E(G) and
R = Q + xv − vy, where v is just before y on Q. Which vertices in H have odd degree?)
x•
u
• • v•
y•
(b) Let u and v be vertices in a multigraph G such that every vertex outside {u , v} has
odd degree. Prove that the number of spanning u , v-paths is even. Conclude that when
every vertex has odd degree, the number of spanning cycles through any edge is even.
(Comment: This was proved also in Corollary 5.4.8.)
7.3.31. Hamiltonian cycles through two incident edges. (Thomason [1978])
(a) Let uw and wv be edges in a multigraph G with | V(G)| ≥ 4 such that all vertices
outside {u , v , w} have odd degree. Use Exercise 7.3.30(a) to prove that if G − u is not Hamil-
tonian, then the number of Hamiltonian cycles in G using both uw and wv is even.
(b) For odd with > 1, prove that every -regular bipartite graph has an even num-
ber of Hamiltonian cycles. (For = 3, this was proved by Kotzig, as noted in Bosák [1967].)
332 Chapter 7: Connectivity and Cycles
7.3.32. Let G be the union of two spanning cycles C and C . Say that G is rearrangeable if
G can be expressed as the union of two other spanning cycles with the same intersection.
(a) Use Theorem 7.3.5 to show that G is rearrangeable if | E(C) ∩ E(C )| = 1.
(b) For n ≥ 5, construct an n-vertex example to show that G may not be rearrangeable
if | E(C) ∩ E(C )| = 2. (West [1978])
7.3.33. Let G be the union of m edge-disjoint spanning cycles. Use Theorem 7.3.5 to prove
that every edge of G lies in at least 3m − 2 spanning cycles. Conclude that G has at least
m(3m − 2) spanning cycles. (Thomason [1978])
7.3.34. (♦) Let G be a graph that is not a forest and has girth at least 5. Use Ore’s Theo-
rem to prove that G is Hamiltonian. (N. Graham)
7.3.35. (♦) Let G be an X , Y -bigraph with | X | = | Y | = n/2 > 1. (Moon–Moser [1963])
(a) Given x ∈ X and y ∈ Y with xy ∈ / E(G) and d(x) + d(y) > n/2, prove that G is
Hamiltonian if and only if G + xy is Hamiltonian (see Lemma 7.3.6).
(b) Prove that (G) > n/4 guarantees a spanning cycle in G and that this is sharp.
7.3.36. (♦) For n ≥ 2, give two proofs that the maximum number of edges in a non-
Hamiltonian n-vertex graph is ( n−2 1 ) + 1.
(a) Use induction on n. (Ore [1959])
(b) Use Chvátal’s Theorem. (Bondy [1972b])
7.3.37. Edge threshold for spanning cycles in terms of minimum degree.
(a) Let (i) = 2i2 − i + (n − i)(n − i − 1), and suppose n ≥ 6 . Prove that among i such
that ≤ i ≤ n/2, the maximum value of (i) is ().
(b) Let G be an n-vertex graph with minimum degree . Use part (a) and Chvátal’s
condition to prove that if G has at least 6 vertices and has more than ( n−2 ¾) + 2 edges,
then G is Hamiltonian. Is this always sharp? (Erdős [1962a])
7.3.38. Let G be a graph with vertex degrees d1 , . . . , d n such that d1 ≤ · · · ≤ d n .
(a) Prove that if d i ≥ i or d n+1 −i ≥ n − i whenever i < (n + 1)/2, then G has a spanning
path. (Hint: Use Theorem 7.3.11.) Construct an example based on Example 7.3.12 to show
that this result is best possible. (Chvátal [1972])
(b) Let d 1 , . . . , d n be the vertex degrees in G, indexed in nondecreasing order. Use
part (a) to prove that if d i ≥ d i for i ≤ n/2, then G has a spanning path. (Hence self-
complementary graphs have spanning paths.) (Clapham [1974])
7.3.39. (+) Let G be an X , Y -bigraph having | X | = | Y | = n/2 > 1 and vertex degrees
d1 , . . . , d n in nondecreasing order. Form G by adding edges to turn Y into a clique.
(a) Prove that G is Hamiltonian if and only if G is Hamiltonian, and describe the re-
lationship between d and the degree list of G .
(b) Prove that if d ¾ > or d n/2 > n/2 − whenever ≤ n/4, then G is Hamiltonian.
(Hint: Prove that Chvátal’s Condition holds for G .) (Chvátal [1972])
7.3.40. Prove that Ore’s Condition implies Chvátal’s Condition. Conclude that Theorem
7.3.11 (Chvátal’s Condition is sufficient for a spanning cycle) implies Corollary 7.3.7 (Ore’s
Condition is sufficient for a spanning cycle).
7.3.41. (♦) Use Ore’s Lemma to prove that a graph G and its closure C(G) have the same
circumference.
7.3.42. For n ≥ 3, prove that Chvátal’s Condition (Theorem 7.3.11) cannot hold for both
an n-vertex graph and its complement. (Kostochka–West [2006])
7.3.43. (+) By showing that their hypotheses imply the Chvátal–Erdős Condition, prove
that the Chvátal–Erdős Theorem implies each of the following. (Bondy [1978b])
(a) Ore’s Theorem (Corollary 7.3.7).
(b) For ∈ , every -regular graph with 2 + 1 vertices is Hamiltonian.
Exercises for Section 7.3 333
7.3.44. Let G be an n-vertex graph such that G has m edges. Prove that G is Hamiltonian
if m ≤ n − 3 and G is Hamiltonian-connected if m ≤ n − 4. (Ore [1963])
7.3.45. Let G be an n-vertex graph with m edges, where n ≥ 4.
(a) Prove that if G is Hamiltonian-connected, then m ≥ ⌈ 3n/2⌉ . Use C¾ K 2 to show
that the result is sharp when ¾ is odd. (Moon [1965b])
(b) Prove that G is Hamiltonian-connected if 2(G) ≥ n + 1. For > 1, construct a
2 -vertex graph with minimum degree that is not Hamiltonian-connected. (Ore [1963])
7.3.46. For a graph G with degrees d1 , . . . , d n in nondecreasing order, prove that G is
Hamiltonian-connected if d i > i + 1 or d n−i−1 ≥ n − i whenever i < (n − 1)/2. (Berge [1973])
7.3.47. For even n, prove that n − 1 is the least t such that 2 (G) ≥ t forces an n-vertex
graph G to have a perfect matching.
7.3.48. For even n, prove that if G has vertex degrees d1 , . . . , d n in nondecreasing or-
der, and d i ≥ i + t − 1 for 1 ≤ i ≤ n/2, then G has t edge-disjoint perfect matchings.
(Jahanbekam–West [2016])
7.3.49. (♦) Let G be an n-vertex graph with 2 (G) ≥ n + . Prove that any set of edges
forming a disjoint union of paths in G is contained in a Hamiltonian cycle. Construct an
example to show that 2(G) ≥ n + − 1 is not sufficient. (P ósa [1963/4])
7.3.50. (+) Las Vergnas’ Condition. Let G be a graph having a vertex ordering v1 , . . . , vn
for which there is no nonadjacent pair vi , vj such that i < j , d(vi) ≤ i, d(vj ) < j ,
d(vi) + d(vj ) < n, and i + j ≥ n. Las Vergnas [1970] proved that the closure of G is complete
(and hence G is Hamiltonian).
(a) Prove that Chvátal’s Condition for Hamiltonian cycles implies Las Vergnas’ Con-
dition. (Thus Las Vergnas’ Theorem strengthens Chvátal’s Theorem.)
(b) Prove that each of the graphs below fails Chvátal’s Condition but has a complete
graph as its Hamiltonian closure. Prove that the smaller graph satisfies Las Vergnas’
Condition but the larger one does not.
•
• • • • • •
• • • • • •
•
7.3.51. (♦) Let G be a connected n-vertex graph with 2 ≤ = (G) < n/2.
(a) Let P be a maximal path in G (not a subgraph of any longer path). Prove that if
P has at most 2 vertices, then the induced subgraph G[V(P)] has a spanning cycle (this
cycle need not have its vertices in the same order as P).
(b) Use part (a) to prove that G has a path with at least 2 + 1 vertices. Give an
example for each to show that G may have no cycle with more than + 1 vertices.
7.3.52. Use Theorem 7.3.17 that c(G) ≥ min{n , 2 (G)} when G is 2-connected to prove
that every -regular graph with 2 + 1 vertices is Hamiltonian. (Nash-Williams)
7.3.53. (♦) For r, ≥ 2, let G be a -connected graph with girth at least 2r − 1. Prove that
if G has at least r vertices, then G has a cycle of length at least r . (Kostochka)
7.3.54. (♦) Let G be an n-vertex
√ graph not having K1 ,t+1 as an induced subgraph, where
t ∈ . Prove that if (G) ≥ tn, then G is Hamiltonian. (Faudree)
7.3.55. Let G be a 4-regular multigraph that is a union of two spanning cycles. Form G
by subdividing one edge from each cycle and adding a double-edge joining the new vertices.
Show that G is also a union of two spanning cycles if | V(G)| ≤ 3. Conclude for 2 ≤ ≤ 4
that two longest cycles in a -connected graph have at least common vertices. (S. Smith)
334 Chapter 7: Connectivity and Cycles
7.3.56. (♦) Prove that if (G) ≥ 3 − 1, or if G is triangle-free and (G) ≥ 2 , then G con-
tains disjoint cycles. Show also that lower degree does not suffice. (Thomassen [1988])
7.3.57. (♦) Use Theorem 7.3.16 to prove that in an n-vertex graph with many edges,
one can cover at least half the edges using at most n/2 cycles. Conclude that every n-
vertex graph decomposes into at most O(n log n) cycles and edges. (Erdős–Gallai [1959])
(Comment: Erdős and Gallai conjectured that O(n) cycles and edges suffice. Conlon–Fox–
Sudakov [2014] reduced the bound to O(n log log n).)
7.3.58. Fouquet–Jolivet [1978] conjectured a long-cycle version of the Chvátal–Erdős
Theroem: for < a, every n-vertex -connected graph with independence number a has a
cycle of length at least ¾a (n + a − ). For a ≥ ≥ 2 and r ≥ 1, construct a -connected graph
with + ar vertices that has no longer cycle, thereby proving sharpness. (Comment: The
conjecture was proved in O–West–Wu [2011].)
7.3.59. The prism over a graph G is the cartesian product G K 2 . Prove that the prism
over K ¾ ,2¾+1 has no spanning cycle. (Comment: Ellingham–Salehi Nowbandegani [2018]
proved that if (G) ≤ 2 (G), then the prism over G is Hamiltonian.)
7.3.60. Ozeki–Yamashita [2011] conjectured that every n-vertex connected graph G with
(G) ≥ (n − )/( + 3) has a spanning tree with at most branch vertices. Prove sharpness
using a connected graph G formed from ( − 1)K t+1 + 2 K t ,t+1 by adding one path of length
. (Gargano–Hammar–Hell–Stacho–Vaccaro [2004], DeBiasio–Lo [2017+])
7.3.61. Prove that if G has a -bounded spanning tree (maximum degree at most ), then
#(G − S) ≤ ( − 1) | S| + 1 for all S ⊆ V(G). (Ozeki–Yamashita [2011])
7.3.62. (♦) Prove that if G has a spanning tree with no more than leaves, then
#(G − S) ≤ | S| + − 1 for all S ⊆ V(G). (Salamon–Wiener [2007])
7.3.63. (♦) Prove that every tournament has a Hamiltonian path and that every strong
tournament has a Hamiltonian cycle. (Rédei [1934], Camion [1959])
7.3.64. (♦) Let T be a strong n-vertex tournament. Suppose 3 ≤ ≤ n.
(a) For each u ∈ V(T), prove that u belongs to a cycle of length in T . (Hint: Use
induction on .)
(b) Prove that T has at least n − + 1 cycles of length . Construct an example for
each n to show that the bound is sharp for all , simultaneously. (Moon [1966])
7.3.65. Let T be a 7-vertex tournament in which every vertex has outdegree 3. Prove that
T has two disjoint cycles. (Hint: Use Exercise 7.3.64. Comment: Thomassen [1983] proved
that every digraph with minimum outdegree at least 3 has two disjoint cycles.)
7.3.66. (♦) A bipartite tournament is an orientation of a complete bipartite graph.
Prove that a bipartite tournament has a spanning path if and only if it has a spanning
subgraph whose components are all cycles except for possibly one path. (Comment: Gutin
[1993] proved this for all complete multipartite graphs.)
7.3.67. Let D be an n-vertex digraph having no loops and having at most one copy of each
ordered pair as an edge; such a digraph is strict.
(a) Prove that if min{ −(D) , +(D)} ≥ n/2, then D has a spanning cycle. (Hint: Con-
sider a longest cycle in D.) (Ghouilà-Houri [1960])
(b) Construct for each even n an n-vertex digraph D with loops that is not Hamiltonian
even though it satisfies all other conditions above.
Chapter 8
Coloring
When the edges of a graph represent vertex conflicts, we often seek the min-
imum number of conflict-free classes needed to partition the vertices. For exam-
ple, when scheduling examinations or committee meetings into the fewest time
slots, each course or committee is a set of people, and intersecting sets must have
different times. The time slots are “colors”, and the problem is to use the fewest
colors on the vertices of a graph so that adjacent vertices have different colors.
Because labeling to avoid conflicts is such a fundamental concept, coloring
theory is enormously broad. Texts and surveys with extensive material on color-
ing include Berge [1973], Bollobás [1978], Chartrand–Lesniak [1986, etc.], Toft
[1995], Jensen–Toft [1995], Molloy–Reed [2002], and Kubale [2004].
8.1.2. Example. In a proper coloring, each color class is an independent set. Thus
G is ¾-colorable if and only if G is ¾-partite. Thus G is 2-colorable if and only if
G has no odd cycle. The 5-cycle and the Petersen graph (below) are 3-chromatic.
a b
• a• •
•c
c• •b c• •a
•a
b• •b
b• •a •
a
•
c
335
336 Chapter 8: Coloring
We use (G) for the independence number and (G) for the maximum size
of a clique in G, called the clique number. As the first and last letters of the
Greek alphabet, they suggest the beginning and end of growing a graph.
8.1.3. Remark. Easy bounds. When G has n vertices, using distinct colors yields
(G) ≤ n. Since each color class is an independent set, (G) ≥ n/(G). Since
adjacent vertices require distinct colors, (G) ≥ (G). More generally, a proper
coloring of G must properly color its subgraphs, so (G) ≥ (H) when H ⊆ G.
Equality holds for K n in these bounds. Each can be very bad. Despite having
n vertices, K r,n−r is 2-colorable. Exercise 40(b) shows that (G) − n/(G) can be
large. Theorem 8.1.17 shows that (G) can be large when (G) = 2.
8.1.4. Example. Additivity under joins (Dirac). For odd cycles, (C2r+1) = 3 and
(C2r+1) = 2. This yields graphs with larger difference via the join operation (Def-
inition 5.1.22). Recall that the join G H is the graph obtained from the disjoint
union G + H by making every vertex of G adjacent to every vertex of H.
The edges that join V(G) and V(H) in G H force disjoint sets of colors; hence
(G H) = (G) + (H). Also, combining cliques from G and H yields (G H) =
(G) + (H). Thus, (G) = 3 and (G) = 2 when G is the join of odd cycles.
• •
• • • •
C5 C5
• • • •
A bound that is rarely sharp begs for improvement. Only complete graphs
achieve equality in (G) ≤ | V(G)| , so we focus first on improving this bound.
UPPER BOUNDS
8.1.5. Algorithm. For a graph G, the greedy coloring (or first-fit coloring)
with respect to a vertex ordering v1 , . . . , vn colors vertices in the order v1 , . . . , vn ,
giving vi the least-indexed color not used on its neighbors colored earlier.
•d b
b• •c •e • a d e
•a
•
c
The 1-degenerate graphs are precisely the forests. Some authors call the de-
generacy plus 1 the “coloring number ” of G; this causes some confusion since it
generally differs from the chromatic number but provides an upper bound. “Col-
oring bound” would be a less-confusing term.
The Gallai–Roy and Minty bounds give the chromatic number exactly on any
graph IF we guess the right orientation, as does greedy coloring if we guess the
right vertex ordering (Exercise 23).
Tuza [1992] strengthened Theorem 8.1.13 by showing that only some cycles
need be considered: if the ratio a/b in the orientation D is at most − 1 for every
cycle in G whose length is 1 modulo , then (G) ≤ . Thus if G is not -colorable,
then G has a cycle whose length is congruent to 1 modulo (Exercise 31).
Many open problems remain for bounds on (G). One of the most famous is
Reed ’s Conjecture (Reed [1998]) that (G) ≤⌈ (G)+2 (G)+1 ⌉ for every graph G, im-
proving the trivial bound (G) ≤ (G) + 1.
TRIANGLE-FREE GRAPHS
What forces chromatic number to be large? We know (G) ≥ (G), but almost
all graphs have large chromatic number but no large clique: when n is large, the
values of (G), (G), and (G) for almost all n-vertex graphs are approximately
340 Chapter 8: Coloring
2 log2 n, 2 log2 n, and n/(2 log2 n), respectively (see Chapter 14). Hence (G) is
usually a weak lower bound on (G), while n/(G) is usually a good lower bound.
There are many constructions of triangle-free graphs with large chromatic
number (see Sachs [1969] for a survey). Our first is perhaps the easiest to describe
and best known (see also Exercise 21).
8.1.16. Example. Mycielski [1955] actually considered only the sequence gener-
ated from K 2 using Definition 8.1.15, but the construction can be applied to any
graph. From K 2 , one application yields the 3-chromatic C5 . A second yields the
4-chromatic Gr ötzsch graph, drawn in two ways below.
• • •
•
• •
• • • • • • •w
•
w • •
• • • •
• • G U
EXERCISES 8.1
8.1.1. (−) Compute (G) and (G) for the graph G below.
• •
• • • •
• • • •
• •
8.1.2. (−) Let the blocks of G be G1 , . . . , G ¾ . Prove that (G) = maxi (G i).
8.1.3. (−) Find an optimal coloring of C5 C5 where sizes of color classes differ by at most 1.
8.1.4. (−) For each ∈
with ≥ 2, construct a -chromatic graph having no optimal
coloring using a color class of size (G).
8.1.5. (−) Prove or disprove: (G) ≤ 1 + a(G) for every connected graph G, where a(G) is
the average vertex degree in G.
8.1.6. (−) Prove or disprove: If G is an n-vertex graph, and n is sufficiently large, then
(G) ≤ (G) + n/ (G).
342 Chapter 8: Coloring
8.1.7. (−) Prove that (G) ≥ n− n(G) for every n-vertex graph G. Prove that there are in-
finitely many graphs (other than complete graphs) where equality holds.
8.1.8. (−) Use the Gallai–Roy Theorem (Corollary 8.1.14) to prove that every tournament
has a spanning path.
8.1.9. Let G be a graph without K1 ,t+1 as an induced subgraph. Prove (G) ≥ 1 + (G)/t.
For , t ∈ , construct a -chromatic example where equality holds. (Zaker [2011a])
8.1.10. Determine the largest possible minimum degree of an n-vertex -colorable graph.
8.1.11. (♦) Let G be a graph in which any two odd cycles have a common vertex. Prove
(G) ≤ 5. Construct a graph to show that the bound cannot be improved.
8.1.12. Suppose that every edge of a graph G appears in at most one cycle. Prove that
every block of G is an edge or a cycle. Use this to prove (G) ≤ 3.
8.1.13. (♦) Let G be the unit-distance graph in the plane; the vertices are all the points
in 2 , adjacent when their Euclidean distance is exactly 1. Prove 4 ≤ (G) ≤ 7. (Comment:
de Grey [2018] and Heule [2018] proved (G) ≥ 5; see Soifer [2008, 2019].)
8.1.14. (♦) Given a set of lines in the plane with no three meeting at a point , form a graph
G whose vertices are the intersections of the lines, with two vertices adjacent if they ap-
pear consecutively on one of the lines. Prove (G) ≤ 3. (Comment: This can fail when
three lines may meet at a point.) (H. Sachs)
• •
→ • •
• •
8.1.15. Given a spanning tree T in a graph G, let (G; T) denote the least such that G
has a proper coloring using colors in [] such that vertices adjacent in T have colors differ-
ing by at least 2. The backbone chromatic number of G is the minimum of (G; T) over
all spanning trees T . Prove that every nonbipartite graph has backbone chromatic num-
ber at least 4. (The concept originated in Broersma–Fomin–Golovach–Woeginger [2007].)
8.1.16. The integer simplex with dimension d and side-length m is the graph T md whose
vertices are the nonnegative integer (d + 1)-tuples summing to m, with two vertices adja-
cent when they differ by 1 in two positions and agree elsewhere. Determine (T md ).
8.1.17. (♦) The Kneser graph K(n , ) has vertex set ([n]
) , with two vertices are adjacent
when they are disjoint -sets (the Petersen graph is K(5 , 2)). Prove (K(n , )) ≤ n − 2 + 2.
Prove that this is optimal when n = 2 + 1. (Comment: Lovász [1978] proved Kneser ’s
conjecture that always (K(n , )) = n − 2 + 2; see Theorem 16.2.29.)
8.1.18. Let G be the intersection graph of a family of equal-sized squares in the plane,
all having horizontal and vertical sides. Prove that G has a vertex whose neighborhood is
covered by two cliques. Conclude that (G) ≤ 2(G) − 1.
8.1.19. For a graph G containing no 4-cycle, prove (G) ≤ (G) + 2. (Zaker [2011b])
8.1.20. Let G be a 3-regular K4 -free graph with m edges. Prove that G has a bipartite
subgraph with at least 97 m edges. (Hint: Use Brooks’ Theorem.)
8.1.21. The achromatic number of a graph G is the maximum number of colors in a
proper coloring of G such that all pairs of colors appear on adjacent vertices.
(a) Show that the achromatic number is well defined for every graph G.
(b) For n ≥ 3, determine the achromatic number of the cycle Cn .
Exercises for Section 8.1 343
8.1.22. Consider the coloring algorithm that iteratively chooses a maximal independent
set and gives it the next color. For ¾ ∈ , construct a 2-colorable graph on which this
algorithm may use ¾ colors.
8.1.23. (♦) Greedy coloring. Let G be a graph.
(a) Prove that G has a vertex ordering where greedy coloring uses (G) colors.
(b) For ∈ , construct a tree T¾ with maximum degree and an ordering of V(T¾)
such that greedy coloring with respect to uses + 1 colors. (Comment: Thus the perfor-
mance ratio of greedy coloring to optimal coloring can be ( (G) + 1)/2.) (Bean [1976])
8.1.24. Prove that 11 is the least number of vertices in a triangle-free 4-chromatic graph.
8.1.25. Prove that an n-vertex graph with chromatic number has at most n−¾ vertex
partitions into independent sets, with equality only for K ¾ + (n − )K1 .
8.1.26. The graph below has a proper 3-coloring with each color used twice. Prove that it
cannot arise from greedy coloring. (Fon-Der-Flaass)
•
•
• •
• •
r −1
8.1.27. Let G be an n-vertex graph that does not contain K r+1 . Prove (G) ≤ 2 r−1 n1 −1/2 .
(Comment: This generalizes Proposition 8.1.18.)
(G)+1
8.1.28. (♦) Prove that if G has no induced 2K 2 , then (G) ≤ ( 2
). (Hint: Cover the
vertices using ( (G)
2 )
+ (G) independent sets.) (Wagon [1980])
8.1.29. (♦) Let G be a -degenerate graph, and let a and b be positive integers such that
a + b = − 1. Prove that V(G) can be partitioned into sets A and B such that G[ A]
is a-degenerate and G[B] is b-degenerate. Prove that the vertex set of any graph G can
be partitioned into max H ⊆ G ⌈ (H)+1
d+1
⌉ sets inducing d-degenerate subgraphs. (Comment:
Proposition 8.1.12 is the case d = 0. The case d = 1 is in Chartrand–Kronk [1969].)
8.1.30. Let G be an n-vertex graph. Prove that if (G) = n − , then (G) ≥ n − 2 . For
even and n ≥ 5 /2, construct an n-vertex graph with chromatic number n − and clique
number at most n − 3/2.
8.1.31. (♦) Chromatic number and cycle lengths. Let G be a connected graph.
(a) Fix v ∈ V(G). Choose a spanning tree T to maximize ∑u∈V(G) d T (u , v). Prove that
the endpoints of any edge in G lie along a path in T that starts at v.
(b) Prove that if (G) > ≥ 2, then G has a cycle with length congruent to 1 modulo
. (Hint: Define a -coloring using the tree T of part (a). Comment: This generalizes the
characterization of bipartite graphs.) (Tuza [1992])
(c) Prove that a graph having no odd cycle of length more than 2 j − 1 is 2 j-colorable.
(Erdős–Hajnal [1966])
8.1.32. (♦) Prove that a graph is -colorable if every vertex lies in fewer than () odd cy-
2
cles. (Hint: Use induction on | V(G)|.) (Stong [2006])
8.1.33. Prove that (H) = (H) when H is bipartite.
8.1.34. Permutation graphs. Let G be the intersection graph of segments having end-
points on two parallel lines. Prove (G) = (G). (Pnueli–Lempel–Even [1971])
8.1.35. (♦) Let G and H be graphs. Prove (G H) = max{ (G) , (H)}. (Sabidussi [1957],
Vizing [1963], Aberth [1964], Behzad–Mahmoodian [1969])
344 Chapter 8: Coloring
8.1.36. (♦) Prove that an n-vertex graph G is r-colorable if and only if the cartesian prod-
uct G K r has an independent set of size n. (Plesnevič–Vizing [1965])
8.1.37. (♦) Prove that a graph G is 2 ¾ -colorable if and only if G is a union of ¾ bipartite
graphs. (Harary–Hsu–Miller [1977])
8.1.38. (♦) Prove that every ¾-chromatic graph has at least (¾2) edges. Conclude that if
√
G is the union of t copies of K t , then (G) < 1 + t t − 1. (Comment: This bound is near
tight , but see Conjecture 10.1.33.) (Horák–Tuza [1990])
√
8.1.39. Let G be an n-vertex graph. Prove (G) · (G) ≥ n and (G) + (G) ≥ 2 n. Prove
√
that equality can hold when n is an integer. (Nordhaus–Gaddum [1956], Finck [1968])
8.1.40. (♦) Let G be an n-vertex graph.
a) Prove (G) + (G) ≤ n + 1. (Nordhaus–Gaddum [1956])
(n+1)2
b) Using part (a), prove (G) · (G) ≤ (n + 1)2/4. From this, prove (G) ≤ 4 (G)
. For
(n+1)2
each odd n, construct G such that (G) = 4 (G)
. (Nordhaus–Gaddum [1956], Finck [1968])
8.1.41. For edge-disjoint graphs G and H on the same set of n vertices, let (G , H) =
(G)+ (H)− (G ∪ H). Determine max (G , H) and limn→∞ min n(G ,H) . (Hint: Use Exercise
8.1.40(a).) (Bloome–Johnson–Saritzky [2012])
8.1.42. (♦) Use the Gallai–Roy Theorem (Corollary 8.1.14) to prove that every n-vertex
digraph D has a path with at least n/(D) vertices. Conclude the following theorem of
Erdős–Szekeres [1935]: every list of rs + 1 distinct numbers has an increasing sublist of
size r + 1 or a decreasing sublist of size s + 1. (Schmeichel)
8.1.43. Paths and chromatic number in digraphs.
(a) Let G be the union of graphs F and H . Prove (G) ≤ (F) (H).
(b) Let D be an orientation of a graph G with (G) > rs. Assign each v ∈ V(D) a real
number (v). Use (a) and the Gallai–Roy Theorem to prove that D has a path ⟨u0 , . . . , ur ⟩
with (u0) ≤· · ·≤ (ur) or a path ⟨v0 , . . . , vs ⟩ with (v0) >· · ·> (vs).
(c) Use part (b) to conclude the Erdős–Szekeres Theorem (Exercise 8.1.42).
8.1.44. Prove that every digraph decomposes into two acyclic digraphs.
COLOR-CRITICAL GRAPHS
8.2.1. Definition. A graph G is color-critical if Ò(H) < Ò(G) for every proper
subgraph H of G. If also Ò(G) = ¾ , then G is ¾-critical.
8.2.4. Proposition. If v ∈ V(G) and (G − v) < (G) = , then G has a proper -
coloring having (v) only on v and the other − 1 colors all on N(v).
If e ∈ E(G) and (G − e) < (G) = , then every proper ( − 1)-coloring of
G − e gives the same color to the endpoints of e.
Proof: Let be a proper ( − 1)-coloring of G − v. If any color is not used in
N(v), then we can use it on v to complete a proper ( − 1)-coloring of G. This
contradicts (G) = , so the colors all appear on N(v), and extending to G by
letting (v) = completes the desired coloring.
If some proper ( − 1)-coloring of G − e gave distinct colors to the endpoints
of e, then it would also be a proper ( − 1)-coloring of G.
Remark 8.2.3 and Proposition 8.2.4 can be used to show that if G is color-
critical, then applying Mycielski’s Construction yields a color-critical graph with
larger chromatic number (Exercise 16). For -critical graphs, we strengthen
Proposition 8.2.2 to a lower bound on connectivity instead of minimum degree.
X2 X1 Y1 Y2
X Y
X3 X4 Y4 Y3
346 Chapter 8: Coloring
LIST COLORING
In graph coloring problems, some colors may be forbidden from certain ver-
tices, representing unavailable resources. Also, when extending partial color-
ings, the color on a colored vertex is forbidden from use on its neighbors. Such
applications lead to the more general model of “list coloring ”, introduced in Vizing
[1976] and Erdős–Rubin–Taylor [1979] and surveyed in Stiebitz–Voigt [2015].
Here the “lists” are actually sets; there is no order or multiplicity for the
colors. Nevertheless, the term “list ” is thoroughly entrenched for this model, and
“set coloring ” has other meanings. Exercises 30–39 concern list coloring.
One option for L is assigning all vertices the same list S, in which case an L-
coloring exists if and only if | S| ≥ Ò(G). Hence Ò l(G) ≥ Ò(G) for every graph G.
However, Ò l(G) may be much larger than Ò(G), even when G is bipartite.
We will prove l(G) ≤ (G) when G is connected and not a complete graph or
an odd cycle. This is stronger than Brooks’ Theorem, since l(G) ≥ (G).
8.2.9. Lemma. (Vizing [1976]) Given a connected graph G, let L be a list assign-
ment such that | L(v)| ≥ d(v) for all v.
(a) If | L(y)| > d(y) for some vertex y, then G is L-colorable.
(b) If G is 2-connected and some two lists differ, then G is L-colorable.
Proof: (a) Order the vertices by iteratively deleting leaves of a spanning tree
rooted at y; each vertex before y has a later neighbor. Choose colors for ver-
tices in this order. At a vertex v earlier than y, we have colored fewer than d(v)
neighbors (since v has a later neighbor), so a color remains available in L(v) for v.
Although y has no later neighbor, | L(y)| > d(y), so also at y a color is available.
(b) Since the lists are not identical and G is connected, we can find adjacent x
and y such that L(x) − L(y)
= ∅. Choose c ∈ L(x) − L(y). Define L on V(G − x) by
L (v) = L(v) if v ∈
/ N(x) and L (v) = L(v) − c if v ∈ N(x). We have | L (v)| ≥ d G− x(v)
for all v ∈ V(G − x), and | L (y)| > d G− x(y) (since c ∈
/ L(y)). Hence part (a) yields an
L -coloring of G − x, which extends to an L-coloring of G by using c on x.
•
y• •v
G H • •
• •
•
348 Chapter 8: Coloring
The chromatic number of a complete graph or odd cycle exceeds its degree, so
these graphs are not degree-choosable.
8.2.17. Theorem. (Dirac [1952a]) Every graph with minimum degree at least 3
contains a K 4-subdivision.
Proof: Say that a vertex is weak if it has degree less than 3. By induction on
n, we prove the stronger result that every nontrivial n-vertex graph G with at
most one weak vertex contains a K 4-subdivision. We need this stronger statement
because we will apply the induction hypothesis to graphs having a weak vertex.
For the base step, the only nontrivial graph with at most four vertices that has
at most one weak vertex is K 4 itself, which trivially contains a K 4-subdivision.
For S ⊆ V(G), only one S-lobe of G can contain a weak vertex of G not in S,
since G has only one weak vertex. All other S-lobes are good S-lobes. Let S be
a smallest vertex cut. When | S| ≤ 1, let G be a good S-lobe. The only possible
weak vertex in G is the vertex of S (when | S| = 1). By the induction hypothesis,
G contains a K 4-subdivision, which is also contained in G.
350 Chapter 8: Coloring
x
• • • •
S H
• • • •
y
If both x and y are weak in G , then each has exactly one neighbor outside S
in H. These neighbors are distinct, since (G) ≥ 2. Form G from G by contract-
ing the edge xy. The only weak vertex in G is the new vertex , so G contains
a K 4-subdivision H. Subdividing an edge incident to in H (if ∈ V(H)) yields a
K 4-subdivision in G . Again G contains a K 4-subdivision by replacing xy with a
path through another component of G − S, if xy is used.
Hence we may assume that G is 3-connected. Select x ∈ V(G). Since G − x is
2-connected, it has a cycle C of length at least 3. Since G is 3-connected, the Fan
Lemma (Lemma 7.2.12) yields an x , V(C)-fan of size 3 in G. These three paths
combine with C to form a K 4-subdivision in G.
•
G x • •y H
•
Section 8.2: Structural Aspects 351
8.2.20.* Remark. Better bounds can be proved with more detailed arguments.
When F is a tree with m edges, (G) ≥ m suffices (Exercise 5.4.17). For F = K ¾ ,
let () be the smallest (G) that forces a K ¾ -subdivision in G; Theorem 8.2.19
yields () ≤ 2(2). In fact, 18 2 < () < c 2 . Komlós–Szemerédi [1996] and Bol-
¾
lobás–Thomason [1998] proved the upper bound (the latter shows c ≤ 256); the
lower bound follows from K r,r with r about (¾/2 2 )
(Exercise 41).
Theorem 8.2.17 yields (4) = 3. Furthermore, (5) = 6. The icosahedron
(pictured in Exercise 9.3.32) yields (5) ≥ 6, since this graph is 5-regular and has
no K 5-subdivision (being planar). Equality holds because every n-vertex graph
with at least 3n − 5 edges contains a K 5-subdivision (conjectured by Dirac [1964]
and proved by Mader [1998]).
The chromatic number is unbounded not only for triangle-free graphs, but
in fact for the family graphs with any fixed girth, as shown in Chapter 10 and in
Chapter 14. Thus the only fixed graphs that must appear in graphs with large
chromatic number are forests.
Since G contains every -vertex tree when (G) ≥ − 1 (Exercise 5.4.17),
each -vertex tree appears in every -critical graph. To strengthen this, we seek
a given forest F as an induced subgraph. Equivalently, we want to show that
forbidding large cliques and induced copies of F bounds the chromatic number.
since forests are induced subgraphs of trees. The broom Br,s is the tree with r + s
vertices consisting of the path Pr plus s edges attached to one end. Gyárf ás [1985]
proved that Forb(Br,s) is -bounded. We present only a weaker earlier result.
H
• • • • G
v v
N(v)
8.2.24.* Remark. Other results toward Conjecture 8.2.22 are harder. Gyárf ás
[1985] proved that Forb(Bm ,n) is -bounded. K ierstead–Penrice [1994] proved
that Forb(T) is -bounded when T has radius 2 (Gyárf ás–Szemerédi–Tuza [1980]
had proved it weakly -bounded). The smallest non-broom tree not having radius
2 is the 7-vertex tree Q obtained by attaching an edge to a central vertex of P6 .
K ierstead–Penrice [1990] proved that Forb(Q) is weakly -bounded ( (G) ≤ 4 for
every triangle-free graph in Forb(Q)). K ierstead [1992] proved that Forb(T) is
weakly -bounded when T is the union of copies of P4 with a common endpoint.
K ierstead–Zhu [2004] further strengthened these results by proving that if
T is a tree of radius 3 obtained from a tree of radius 2 by subdividing every edge
incident to a central vertex, then Forb(T) is -bounded. In another direction,
Scott [1997] proved that for each tree T , there is a function T such that every
K ¾ -free graph with (G) > () contains a subdivision of T as an induced sub-
graph. Thus Forb(T) is -bounded when T is a subdivision of a star.
Exercises for Section 8.2 353
EXERCISES 8.2
8.2.1. (−) Let º be a proper -coloring of a -chromatic graph G. Prove that each color
class under has a vertex adjacent to vertices of all other colors.
8.2.2. (−) Suppose that (G − x − y) = (G) − 2 for all pairs x , y of distinct vertices. Prove
that G is a complete graph.
8.2.3. (−) Prove that the Petersen graph can be 2-colored so that the subgraph induced
by each color class has no vertex of degree exceeding 1.
8.2.4. (−) Prove (G) ≤ 1 + max H ⊆ G (H) for every graph G. (Matula [1969])
8.2.5. (−) A graph G is vertex-color-critical if (G − v) < (G) for all v ∈ V(G). Prove
that every 3-chromatic vertex-color-critical graph is an odd cycle (and thus color-critical).
Prove that the graph on the left below is vertex-color-critical but not color-critical.
•
•
• • •
• • • •
•
• • • • •
• •
8.2.6. (−) Prove that the graph on the right above is not 2-choosable.
8.2.7. (−) Given that minimum degree 3 forces a K4 -subdivision (Theorem 8.2.17), prove
that the maximum number of edges in an n-vertex graph with no K4 -subdivision is 2n − 3.
(Dirac [1964] conjectured and Mader [1998] proved that every n-vertex graph with at least
3n − 5 edges contains a subdivision of K 5 .)
8.2.8. Prove that the graphs below are 4-critical, thereby confirming that -critical
graphs need not be ( − 1)-connected.
• • • •
• • •
• • •
• •
• • •
• • • •
8.2.13. For j < ¾ < n − j , determine the least number of edges in an n-vertex ¾-chromatic
graph with minimum degree at least j .
8.2.14. For the graph G on the left below, obtain (G) and a (G)-critical subgraph.
• • • • • •
• • • • •
• • • • • •
• • • • •
• • • • • •
A X Y B
8.2.15. Dense 4-critical graphs. For odd m, form G m with V(G) = A ∪ X ∪ Y ∪ B as fol-
lows. Let G[ A] = G[B] = Cm , let G[X ∪ Y ] = K m ,m (an X , Y -bigraph), and add matchings
joining A to X and B to Y (G 5 appears above). Prove that G m is 4-critical. (Toft [1970])
8.2.16. (♦) Let G be a color-critical graph. Prove that the graph G generated from G by
Mycielski’s Construction (Definition 8.1.15) is also color-critical.
8.2.17. (♦) A special case of the Erdős–Lovász Tihany Conjecture (see Erdős [1968]) is that
if (G − x − y) = (G) − 2 for all xy ∈ E(G) and G is connected, then G is a complete graph.
Prove this for (G) ≤ 4. (Comment: For (G) = 5, see Stiebitz [1987] and Mozhan [1987].)
8.2.18. Let G be an n-vertex graph with m edges.
(a) Prove that if (G) ≤ r, then m ≤ (1 − 1/r)n2/2, and hence (G) ≥ n2/(n2 − 2m).
(Hint: Consider the neighborhood of a vertex of maximum degree.) (Myers–Liu [1972])
(b) Use part (a) to prove (G) ≥ ⌈ n/(d + 1)⌉ , where d is the average vertex degree of
G. (Erdős–Gallai [1961])
8.2.19. (♦) Let G be a ( + 1)-critical graph. Prove that every edge of G lies in at least
( − 1)! cycles whose lengths are congruent to 1 modulo . (Moore–West [2019])
8.2.20. (♦) Let G be the 12-vertex graph on the left below. Prove (G) = 4. Determine
whether G is 4-critical. (Hint: Consider the independent sets. Comment: G is the smallest
triangle-free 4-regular 4-chromatic graph.) (Chvátal [1970])
• G1 G2 G3
• • • • • • •
• • • • •
• •
• •
• • • • • • • • • • • • T
•
8.2.23. Let G be a graph, and let t = ⌈ ( (G) + 1)/j ⌉ . Prove that V(G) has a partition
V1 , . . . , Vt such that each G[Vi ] has no j-edge-connected subgraph. Prove that ⌈ (G)/j ⌉
classes do not suffice in the following cases: (1) G is a j-regular j-edge-connected graph,
(2) G = K n with n ≡ 1 (mod j), (3) j = 1 and G is an odd cycle. (Comment: Matula [1973]
generalized Brooks’ Theorem by showing that ⌈ (G)/j ⌉ suffices except in these cases.)
8.2.24. Hajós construction. For ¾ ≥ 3, let G and H be ¾-critical graphs sharing only
vertex v, with vu ∈ E(G) and vw ∈ E(H). Prove that (G − vu) ∪ (H − vw) ∪ uw is ¾-critical.
Use this to construct 4-critical n-vertex graphs for n ≥ 6. (Hajós [1961])
8.2.25. (♦) Generalized Hajós construction. Let G1 and G 2 be disjoint ¾-critical graphs.
Choose w ∈ v(G1 ) with d G 1 (w) = ¾ − 1, and partition NG 1 (w) into nonempty sets X and Y .
Given uv ∈ G 2 , form G from (G1 − w) + (G 2 − uv) by adding X to N(u) and Y to N(v).
(a) Prove that G is ¾-critical.
(b) For ¾ ≥ 3, apply this operation once to construct a ¾-critical n-vertex graph with
degree-sum n(¾ − 1) + ¾ − 3, where n = 2 ¾ − 1. (Comment: Every ¾-critical n-vertex non-
complete graph has degree-sum at least n(¾ − 1) + ¾ − 3 (Dirac [1957]). Kostochka–Yancey
[2014] proved a conjecture of Gallai [1963a] and almost a conjecture of Ore [1967] by show-
ing that every ¾-critical n-vertex graph has at least ⌈ (¾+1)(¾2(−¾2)n−¾(¾ −3)
−1) ⌉ edges.)
8.2.26. Let G be a connected graph that is not a complete graph or a cycle whose length
is an odd multiple of 3. Prove that every proper (G)-coloring of G has two vertices of the
same color with a common neighbor. (Tomescu [1990])
8.2.28. (+) Given a graph G, let 1 , . . . , ¾ be nonnegative integer functions on V(G) such
that ∑i i(v) > d G(v) for all v ∈ V(G). Prove that G has a coloring c: V(G) → [] such that
for all v ∈ V(G), fewer than c(v)(v) neighbors of v have color c(v). (Bernardi [1987])
8.2.29. Gallai’s Theorem: If G is a ( + 1)-critical graph, then every block of the subgraph
of G induced by the vertices of degree is an odd cycle or a complete graph. (Gallai [1963a])
(a) Use Theorem 8.2.13 to prove Gallai ’s Theorem.
(b) Gallai ’s Theorem can be proved without list colorings. Use Gallai ’s Theorem to
prove Brooks’ Theorem for chromatic number: Every connected graph G that is not (G)-
colorable is a complete graph or an odd cycle.
8.2.30. Prove that if every block of a graph G is a complete graph or an odd cycle, then G
is not degree-choosable. (Comment: This is the converse of Theorem 8.2.13.)
8.2.31. (♦) Let G be an n-vertex graph. Prove max H ⊆ G (H) + max H ⊆ G (H ) ≤ n − 1.
Conclude l(G) + l(G) ≤ n + 1. (Comment: This strengthens Exercise 8.1.40(a).)
8.2.32. (♦) Prove that K ¾ ,r is -choosable if and only if r < ¾ . (Vizing [1976])
8.2.33. (+) Small Pot Lemma. Let L(X) = ⋃ v∈ X L(v) for X ⊆ V(G).
(a) Prove that if G is not -choosable, then G is not L-colorable for some -uniform
lists L with | L(V(G))| < | V(G)|. (Galvin [1998], Kierstead [2000], Reed–Sudakov [2002])
(b) Let G be a complete -partite graph. Prove that if one part has size 4, the others
have size 2, and is even, then l(G) > (Enomoto–Ohba–Ota–Sakamoto [2002]) (Com-
ment: This graph is a sharpness example for the conjecture of Ohba [2002], proved in Noel–
Reed–Wu [2015], that -colorable graphs with at most 2 + 1 vertices are -choosable.)
356 Chapter 8: Coloring
8.2.34. (♦) Let G be the complete ¾-partite graph obtained by deleting a perfect matching
from K 2¾ . Prove l(G) = . (Erdős–Rubin–Taylor [1979])
8.2.35. Prove l(K3 ,3 ,1) = 3. (Comment: More generally, Gravier–Maffray [1998] proved
l(G) = (G) when G = K 3 ,3 ,2 ,... ,2 .)
8.2.36. (♦) Let K m∗¾ denote the complete -partite graph with m vertices in each part.
(a) Prove l(K m∗¾ ) ≥ ⌈ (m−1)(2m¾−1)+1 ⌉ . (Comment: The exact value is ⌈ 4¾3−1 ⌉ when m = 3
(Kierstead [2000]) and ⌈ 3¾2−1 ⌉ when m = 4 (Kierstead–Salmon–Wang [2014]).)
(b) Prove l(K m∗¾) > ( − 1) log m
log ¾
. (Noel–West–Wu–Zhu [2015]) (Hint: Consider m of
the form ((¾¾−j −1)j
1
). Comment: Alon [1992] proved l(K m∗¾ ) ∈ ( log m).)
8.2.37. For a graph G and list assignment L, let S = ⋃v∈V(G) L(v). Let H be the graph
with vertex set V(G) ∪ S consisting of G, a complete graph with vertex set S, and the edges
{vc: v ∈ V(G) , c ∈ S − L(v)}. Prove that G is L-colorable if and only if (H) ≤ | S|.
8.2.38. (♦) Reduction of L-colorability to independence number. For a graph G and list as-
signment L, let H be the graph with vertex set {vc : v ∈ V(G) , c ∈ L(v)} such that uc and
vc are adjacent if u = v or if uv ∈ E(G) and c = c . Prove that G is L-colorable if and only
if (H) = | V(G)|. (Vizing [1976])(Comment: This generalizes Exercise 8.1.36. A more gen-
eral model in which H allows any matching joining the cliques assigned to adjacent vertices
u and v in G was introduced in Dvořák–Postle [2018]; it is now called DP-coloring.)
8.2.40. (♦) Let G be a -colorable graph, and let P be a set of vertices in G such that
d(x , y) ≥ 4 whenever x , y ∈ P. Prove that every coloring of P with colors from [ + 1]
extends to a proper ( + 1)-coloring of G. (Albertson [1998])
8.2.41. (♦) Prove that K r,r contains a subdivision of K 2¾ if and only if r ≥ (¾+2 1 ) . Determine
the threshold on r for the existence of a K 2¾+1 -subdivision in K r,r .
8.2.42. Let G7 and G8 denote the graphs on the left and right below. Heavy edges in-
dicate that every vertex inside one circle is adjacent to every vertex inside another. For
∈ {7 , 8}, prove that (G ¾) = and that G ¾ has no K¾ -subdivision. (Comment: Thus
Hajós’ Conjecture is false for ∈ {7 , 8}.) (Catlin [1979])
• •
• • • •
• •
• • • • • • • •
G7 G8
• • • •
• • • • • • • •
Section 8.3: Edge-Coloring and Perfection 357
8.2.43. (+) Let F be a forest with m edges. Let G be a graph with at least | V(F)| vertices
such that (G) ≥ m. Prove F ⊆ G. (Brandt [1994])
8.2.44. (♦) Let G be a -chromatic graph with girth at least 5. Prove that G contains
every -vertex tree as an induced subgraph. (Hint: Reduce to the case (G) ≥ − 1 and
then use induction on .) (Gyárfás–Szemerédi–Tuza [1980])
8.2.45. (+) Forcing -colored subtrees in -chromatic graphs. Let be a proper -coloring
of a graph G, and let T be a tree with vertex set {w1 , . . . , w¾ }. Prove that there is a map
: V(T) → V(G) such that the images of adjacent vertices in T are adjacent in G and
((wi)) = i for all i. (Gyárfás–Szemerédi–Tuza [1980])
8.2.46. (+) Let G be a graph having a proper coloring in which no color class has size 1.
Prove that G has a proper (G)-coloring in which no color class has size 1. (Gallai [1963c])
SPECIAL CL ASSES
We have the greedy upper bound (G) ≤ 2 (G) − 1. For multigraphs, the
bound cannot be reduced below 3 (G)/2.
358 Chapter 8: Coloring
8.3.3. Example. The fat triangle. In the multigraph below, each edge is incident
to all others, so all edges must receive distinct colors, and Ò (G) = 3 (G)/2.
• •
Shannon [1949] proved that Example 8.3.3 is the worst in terms of (G) (Ex-
ercise 26). Vizing [1964] and Gupta [1966] both proved the more detailed bound
Ò (G) ≤ (G) + Þ(G), where Þ(G) is the largest edge-multiplicity. For a graph
G, this reduces to Ò (G) ≤ (G) + 1 (graph restricts edge-multiplicities to {0 , 1}).
There is standard terminology for the two alternatives when G is a graph.
To be Class 1, a regular graph must be colored with the edges of each color
forming a perfect matching. Thus regular graphs of odd order are Class 2.
8.3.6. Example. The cube and the Petersen graph. The d-dimensional cube is
Class 1. A 1-factorization is given by letting the ith 1-factor consist of the edges
joining the d-tuples that differ in the ith coordinate.
The Petersen graph is Class 2. Deleting a 1-factor always leaves a 2-factor,
and the Petersen graph has no 10-cycle (Proposition 5.1.18). Thus the 2-factor
that remains must be 2C5 , and this has no 1-factor.
Section 8.3: Edge-Coloring and Perfection 359
There are many proofs that bipartite graphs are Class 1 (see Exercise 18).
Perhaps the easiest uses the Marriage Theorem. The proof is also valid when
multiedges are allowed; indeed, that simplifies the proof.
Although (G) ≤ Ò (G) ≤ (G) + 1 for every graph G, deciding between the
two options is NP-complete (Holyer [1981]). Thus we seek conditions for Class 1
or Class 2. For example, regular graphs with cut-vertices are Class 2 (Exercise
13). For cartesian products, G H is Class 1 if G or H is Class 1 or if G and H
both have 1-factors (Exercise 25).
Vizing [1964, 1965] and Gupta [1966] proved Ò (G) ≤ (G) + Þ(G) for every
loopless multigraph G. Commonly known as Vizing’s Theorem, this has many
proofs and many extensions to stronger results.
For example, let Þ(x , y) denote the multiplicity of xy as an edge. In addition,
let Þ(v) = max x∈ N(v) Þ(x , v). Ore [1968] proved
Ò (G) ≤ max {d(v) + Þ(v)} ≤ (G) + Þ(G).
v∈ V(G)
360 Chapter 8: Coloring
8.3.10. Theorem. For q ∈ , let G be a multigraph having an edge yw such that
d(y) , d(w) ≤ q and G − yw is q-edge-colorable. If
d(x) + (x , y) + (y , ) + d() ≤ 2q + 1
whenever x and are distinct neighbors of y, then G is q-edge-colorable.
Proof of Theorem 8.3.9: We use induction on | E(G)| , with trivial basis. For
the induction step, let q be the bound computed in (∗), and let wy be an edge in
G. Since deleting edges cannot increase the computation in (∗), the induction
hypothesis implies that G − wy is q-edge-colorable. Also d(y) , d(w) ≤ (G) ≤ q.
When x and are distinct neighbors of y, we have ⟨x , y , ⟩ ∈ P. Also
d(x)+ (x , y)+ (y , )+ d() ≤ 2q + 1, since otherwise this path ⟨x , y , ⟩ contradicts
the computation of q in (∗). Now Theorem 8.3.10 applies and yields (G) ≤ q.
H
, ∈ O(w) , ∈ O(x) ∈ O(v) ∈/ O()
• • • •
w x v
G
•
y ∈ O(y)
Suppose (G) >q. We will show that the sets O(v) are disjoint for v ∈ X ∪ {y}.
We first show how this yields bounds on | E(H)| leading to a contradiction.
Counting argument: When the sets O(v) are disjoint, each color lies in O(x)
for at most one x ∈ X , so each edge of G with endpoints v and y generates at most
one edge of H entering v. Thus counting E(H) by heads yields
| E(H)| = ∑v∈ X d−H (v) ≤ (∑v∈ X (v , y)) − 1,
where we lose 1 from the sum because the edge yw is not in G .
Next we count by tails. For v ∈ X , each color in O(v) appears on one edge y
at y, which yields an edge v in H. Thus d+H (v) = |O(v)| = q − d G (v) for v ∈ X .
Again adjusting by 1 since d G (w) = d G(w) − 1, we have
| E(H)| = ∑v∈ X d+H (v) ≥ 1 + ∑v∈ X (q − d G(v)).
Combining the two bounds on | E(H)| and grouping by vertices yields
∑v∈ X (d G(v) + (v , y)) ≥ q | X | + 2.
Note that q ≥ d G(w) yields d+H (w) ≥ 1 and | X | ≥ 2. By the given hypothesis, the
two largest terms on the left sum to at most 2q + 1, with one of them being at
most q. Thus the other | X | − 2 terms are also bounded by q, and the total sum is
at most 2 | X | + 1. This contradiction yields (G) ≤ q if the sets O(v) are disjoint.
Disjointness argument: The definition of color fans yields O(y) ∩ O() = ∅
for ∈ X . If d() = (G) = q, then O() is empty and disjoint from all sets, so we
may consider ∈ O(y) and ∈ O(). Since appears at and does not, we can
follow a maximal path P from in colors and . Let u be the other end of P.
We claim u = y. If u
= y, then switching and on P changes the omitted
set only at and u. Let Q be a w , -path in H. The new coloring has a color fan
reaching a vertex where does not appear: u if u ∈ V(Q) (since ∈
/ O(u)), or if
u∈/ V(Q). Again changing colors along the fan extends the q-edge-coloring to G.
If ∈ O(v) ∩ O(v ), then the paths from v and v via and both reach y. The
vertex where they meet has two edges of the same color, a contradiction.
u• • •
w• x• •v •
∈ O()
y• ∈ O(y)
362 Chapter 8: Coloring
LIST EDGE-COLORING
8.3.13. Conjecture. (List Color Conjecture) (G) = (G) for any graph G.
8.3.14.* Remark. Bollobás–Harris [1985] proved l(G) < c (G) for each con-
stant c exceeding 11/6, when (G) is sufficiently large. This and subsequent
improvements used probabilistic methods. K ahn [1996] proved the conjecture
asymptotically: l(G) ≤ (1 + o(1)) (G). Häggkvist–Janssen [1997] sharpened the
√
error term, proving l(G) ≤ D + 23D2/3 log D), where D = (G). Molloy–Reed
[2000] further sharpened it to l(G) ≤ D + O(D1/2(log D)4).
The special case of the List Color Conjecture for G = K n ,n was posed by Dinitz
in 1979 (Janssen [1993] proved the LCC for K n ,n−1). The Dinitz Conjecture be-
came popular in its matrix formulation: If each position of an n-by-n grid contains
a set of size n, then one can choose one element from each set so that those chosen
in each row are distinct and those chosen in each column are distinct.
Galvin [1995] proved the List Color Conjecture for bipartite multigraphs
(generalizing the Dinitz Conjecture). Galvin wrote “ The proof is very simple,
and uses no new ideas”. We start with a fundamental tool for list coloring.
•
•
U−S S
•
•
V(D) − U
i−1 x
• • • • • • •
ê →← e
e 1 i ¾
←←
• • • • • • •
y y ¾−i
• • •x • S
• •
y
Theorem 8.3.20 implies that the degree bound of Shannon [1949] for edge-
chromatic number holds also for edge-choosability. Since the bound is sharp for
edge-chromatic number (Example 8.3.3), it is also sharp here. This direct proof
of Shannon’s bound through list edge-coloring does not require proving Vizing ’s
Theorem or any of its extensions.
PERFECT GRAPHS
8.3.22. Definition. A graph G is perfect if (H) = (H) for every induced sub-
graph H of G.
u
•
A S B x1 • G 1 S G 2 • x2
•
v
Many special families of perfect graphs are known. They may have a struc-
tural definition, a characterization by a decomposition or construction procedure,
a characterization using intersection graphs, fast algorithms for recognition and
for optimal coloring, etc. We present some of these families in the exercises.
Meanwhile, we return to the interpretation of our earlier min-max relations
in terms of perfection. In discussing independence and coloring, four optimiza-
tion parameters are natural. A short synonym for “independent set ” often used
in this context is stable set.
A clique and a stable set share at most one vertex, so always (G) ≥ (G) and
(G) ≥ (G); covering V(G) requires covering the biggest object of the dual type.
Since (G) = (G) and (G) = (G), the statement that (H) = (H) for every
induced subgraph H of G is just the statement that G is a perfect graph.
8.3.30. Example. Bipartite graphs and their line graphs. Bipartite graphs form
a hereditary class, and (G) = 2 = (G) for every nontrivial bipartite graph.
Hence bipartite graphs trivially are perfect.
Line graphs of bipartite graphs form another hereditary class (if G = L(G),
then every induced subgraph of G is the line graph of a subgraph of G ). A sta-
ble set in L(G) is a matching in G, and a clique in L(G) is a set of edges in G with
a common vertex (or a triangle in G). Hence (L(G)) = (G) (if G has no trian-
gles), and perfection for line graphs of bipartite graphs is just K önig ’s Theorem
(Theorem 8.3.7) that (G) = (G) when G is bipartite.
Consider the K önig–Egerváry Theorem ( (G) = (G) when G is bipartite).
We have (G) = (L(G)), and cliques in L(G) come from stars in G, so a vertex
cover in G provides a clique covering in L(G). Thus the K önig–Egerváry Theorem
says (L(G)) = (L(G)) when G is bipartite. This is another hereditary family, so
complements of line graphs of bipartite graphs are perfect.
Since (G) = 2, we have (G) = (G) when G is bipartite with no isolated
vertex. Thus K önig ’s Other Theorem ((G) = (G), Theorem 6.1.16) states that
complements of bipartite graphs are perfect.
Bipartite graphs and their line graphs are very special, but these and other
families suggest that the complement of every perfect graph is also perfect. Berge
conjectured this around 1960; many tried to prove it. Lovász [1972a,b] found the
first proof at the age of 22 (Berge–Ramírez-Alfonsín [2001] presents the history).
It is now known as the “Perfect Graph Theorem” (PGT). Fulkerson reduced it to
a claim he thought was too strong to be true. When Berge told him that Lovász
had proved the theorem, within hours he proved the claim, illustrating that a
theorem becomes easier to prove when known to be true.
Section 8.3: Edge-Coloring and Perfection 369
8.3.31. Remark. We proved perfection for each family in Example 8.3.30, but
the PGT makes this unnecessary. By the PGT, K önig ’s Other Theorem follows
from observing that bipartite graphs are perfect. Similarly, the K önig–Egerváry
Theorem and K önig ’s Theorem (bipartite graphs are Class 1) imply each other.
8.3.33. Lemma. If S is a stable set in a p-critical graph G, then (G) = (G − S).
Proof: Since G is p-critical, (G) > (G) and (G − S) = (G − S). Since G can
be colored by adding S as one class to an optimal coloring of G − S,
(G − S) + 1 ≥ (G) > (G) ≥ (G − S) = (G − S).
The two ends of the display differ by 1, so (G) − 1 = (G) = (G − S).
8.3.34. Theorem. (Lovász [1972b]) A graph G is perfect if and only if the in-
equality (H)(H) ≥ | V(H)| holds for every induced subgraph H.
Proof: (Gasparyan [1996]) Since (H) ≥ | V(H) |
(H) , having
(H) = (H) requires
(H)(H) ≥ | V(H)|. Since imperfect graphs have p-critical induced subgraphs,
for the converse it suffices to show (G)(G) < n when G is p-critical with n ver-
tices. Let a = (G) and w = (G).
Let S0 be a maximum stable set in G, with S0 = {x1 , . . . , x a}. By Lemma
8.3.33, each G − xr is w-colorable. Let {S(r−1)w+1 , . . . , Srw} be the stable sets in an
optimal coloring of G − xr . For 0 ≤ j ≤ aw, Lemma 8.3.33 yields (G − Sj) = w,
so a maximum clique Qj in G − Sj is a w-clique in G that avoids Sj .
We claim that Qj intersects Si when i
= j . The sets S(r−1)w+1 , . . . , Srw parti-
tion V(G − xr) into w stable sets, and Qj contains at most one vertex of each (since
Q j is a clique). If xr ∈/ Qj , then Qj must have exactly one vertex from each. If
xr ∈ Qj , then Qj has only w − 1 vertices other than xr and hence misses exactly
one of the sets in the coloring of G − xr . Since Qj can only have one vertex in S0 ,
at most one stable set in the entire list is missed by Qj . On the other hand, we
know that Qj misses Sj , since Qj was chosen as a maximum clique in G − Sj .
Let A and B be the n-by-(aw + 1) incidence matrices for the set families
{S0 , . . . , Saw} and {Q0 , . . . , Qaw}, respectively. Since | Si ∩ Qj | = 1 when i
= j ,
and | Sj ∩ Qj | = 0, we obtain A T B = J − I, where J is the all-1 square matrix of
order aw + 1. Since J − I is nonsingular, both A and B must have rank at least
aw + 1, and hence n ≥ aw + 1. We conclude (G)(G) < n.
8.3.36. Example. Odd cycles of length at least 5 are imperfect, since (C2¾+1) =
3 > 2 = (C2¾+1). They are p-critical, since proper induced subgraphs are bipar-
tite. By the PGT, C2¾+1 is also p-critical when ≥ 2.
Berge [1963] conjectured both the Perfect Graph Theorem and the Strong
Perfect Graph Theorem (SPGT): The odd cycles and their complements are the
only minimal imperfect graphs. Since the condition is self-complementary, the
SPGT implies the PGT.
The Strong Perfect Graph Conjecture remained open for more than 40 years.
It was proved in Chudnovsky–Robertson–Seymour–Thomas [2006] (announced in
2002). The paper is 178 pages long; we will not attempt to describe the proof.
Many survey articles and at least four books are devoted to perfect graphs
and related topics. Golumbic [1980, 2003] emphasizes algorithmic aspects and
special classes. Berge–Chvátal [1984] collects fundamental early papers that de-
veloped the theory of perfect graphs. Brandst ädt–Le–Spinrad [1999] provides a
thorough catalogue of properties of and relationships among nearly 200 classes
of perfect graphs. Ramírez-Alfonsín–Reed [2001] discusses classical and more
recent aspects, emphasizing the structure of perfect graphs. More recent dis-
cussions that emphasize the proof of the SPGT include Roussel–Rusu–Thuillier
[2009] and Trotignon [2015].
EXERCISES 8.3
8.3.1. (−) Prove that L(K r,s) = K r K s and that L(K 5) is the Petersen graph.
8.3.2. (−) Prove that if L(G) is connected and regular, then G is regular or is bipartite
with equal degree at vertices of the same part. (Ray-Chaudhuri [1967])
8.3.3. (−) Give an explicit edge-coloring to prove that K r,s is Class 1.
8.3.4. (−) Prove that the smallest graph with maximum degree 3 and edge-chromatic
number 4 has five vertices.
8.3.5. (−) Determine whether it is possible for a graph G to have more than (G) pairwise
disjoint maximum matchings. Determine whether it is possible to have more than (G)
pairwise disjoint maximal matchings.
8.3.6. (−) Let D be a directed multigraph (loops allowed) such that each indegree and each
outdegree is at most d. Prove that D has an edge-coloring with d colors such that edges
with a common head or a common tail have distinct colors.
8.3.7. (−) Let G be a Class 1 regular graph of even degree. Prove that | E(G)| is even.
8.3.8. (−) Given integers r and d with 0 ≤ r ≤ d, use Vizing ’s Theorem to prove that
every d-regular graph has a spanning subgraph in which every vertex has degree r or r + 1.
(Comment: This is generalized in Tutte [1978].)
8.3.9. (−) Compute (G) and (G) for the complement of an odd cycle.
8.3.10. (−) Show that an n-vertex chordal graph has at most n maximal cliques, with
equality if and only if it has no edges. (Fulkerson–Gross [1965])
Exercises for Section 8.3 371
8.3.11. (−) Clique identification preserves perfection. Prove that G ∪ H is perfect when G
and H are perfect graphs and G ∩ H is a complete graph.
8.3.12. Let G be a graph.
(a) Prove that the number of edges in the line graph L(G) is ∑v∈V(G) (d(v)
2
).
(b) Prove that G is isomorphic to L(G) if and only if G is 2-regular.
(c) Determine the graphs G such that | E(L(G))| < | E(G)| .
8.3.13. (♦) Prove that every regular graph having a cut-vertex is Class 2.
8.3.14. Use Brooks’ Theorem to prove that every graph with maximum degree 3 is 4-edge-
colorable. (This is a special case of Vizing ’s Theorem; do not use Vizing ’s Theorem.)
8.3.15. (♦) Prove that a 3-regular graph is 3-edge-colorable if and only if it is the union of
two even subgraphs.
8.3.16. Prove that every bipartite graph G has a (G)-regular bipartite supergraph (no
multiedges).
8.3.17. (♦) Greedy edge-coloring of a graph G produces a proper edge-coloring using at
most 2 (G) − 1 colors. For ¾ ∈ , construct a tree with maximum degree ¾ and an ordering
of its edges such that greedy edge-coloring uses 2 ¾ − 1 colors.
8.3.18. Use induction on | E(G)| to prove K önig ’s Theorem that Ò (G) = (G) for every
bipartite multigraph G. (K önig [1916])
8.3.19. The d-dimensional integer simplex of length m is the graph T md whose vertices
are the nonnegative integer (d + 1)-tuples summing to m, adjacent when they differ by 1
in two places and agree elsewhere. Compute Ò (T md ) for m > d. (Ma–West [2013])
8.3.20. Density Conditions for Class 2. Prove that if G is a graph with 2 ¾ + 1 vertices,
where ¾ ∈ , then Ò (G) > (G) under each condition below (with r ≥ 2).
(a) G has more than ¾ · (G) edges.
(b) G arises from an r-regular graph by deleting fewer than r/2 edges.
(c) G arises from an r-regular graph with 2 ¾ vertices by subdividing one edge.
8.3.21. Prove that the graph obtained by deleting one edge from the Petersen graph is
Class 2 but has no overfull subgraph with maximum degree 3.
8.3.22. (♦) Overfull Conjecture ⇒ 1-Factorization Conjecture (Remark 8.3.8).
(a) Prove that in a regular graph of even order, an induced subgraph is overfull if and
only if the subgraph induced by the other vertices is overfull.
(b) Let G be a ¾-regular graph of order 2m having an overfull subgraph. Prove ¾ < m
for odd m and ¾ < m − 1 for even m. Conclude that the Overfull Conjecture implies the
1-Factorization Conjecture.
8.3.23. Let G be the (m − 1)-regular connected graph formed from 2K m by applying a 2-
switch (Definition 5.2.7). Prove that G has no 1-factorization if m is odd and greater than
3. (Comment: This shows that the 1-Factorization Conjecture in Remark 8.3.8 is sharp.)
• •
• •
Km − e Km − e
8.3.26. Shannon’s Theorem. The edge-coloring theorem of Shannon [1949] states that
(G) ≤ 3 (G) for every loopless multigraph G.
2
(a) Prove Shannon’s Theorem from Vizing ’s Theorem (G) ≤ (G) + (G).
(b) Prove Shannon’s Theorem without Vizing ’s Theorem by showing that with 32 (G)
colors available, a partial edge-coloring can be augmented.
(c) Prove the same bound for even (G) from Petersen’s 2-Factor Theorem.
8.3.28. (+) Given an edge-coloring of a graph G, let c(v) be the number of distinct colors
on edges at v. An optimal coloring maximizes ∑v∈V(G) c(v) among -edge-colorings of G.
(a) Suppose that no component of G is an odd cycle. Prove that G has a 2-edge-coloring
in which both colors appear at each vertex of degree at least 2.
(b) Let be an optimal -edge-coloring of G in which color a appears at least twice at
u ∈ V(G) and color b does not appear at u. Let H be the subgraph of G consisting of edges
colored a or b. Prove that the component of H containing u is an odd cycle.
(c) Use part (b) to prove Vizing ’s Theorem for graphs. (Fournier [1973])
8.3.29. Let G ¾ be the graph consisting of three “parallel” -cycles {xi }, {yi }, { i } and
additional vertices {wi } such that N(wi) = {xi , yi , i } for each i. Obtain H¾ from G ¾ by
deleting x¾ x1 and y¾ y1 and adding x¾ y1 and y¾ x1 . (Comment: The graphs {H2 j + : j ≥ 2}
are called flower snarks. A snark is a 2-edge-connected 3-regular Class 2 graph that has
girth at least 5 and has no edge cut of size 3 that does not isolate a vertex.)
(a) Prove that G ¾ is Class 1.
(b) Prove that H¾ is Class 2 if is odd. (Isaacs [1975])
• •
•
•
• •
• •• •• •
• •
•• ••
• •
8.3.31. The generalized Petersen graph P(n , ¾) is the graph with vertices {u1 , . . . , un}
and {v1 , . . . , vn} and edges {ui ui+1 }, {ui vi }, and {vi vi+¾ }, where addition is modulo n. The
usual Petersen graph is P(5 , 2), with = 4.
(a) Prove that the subgraph of P(n , 2) induced by consecutive pairs {ui , vi } has a
spanning cycle if ≡ 1 (mod 3) and ≥ 4. (Comment: The figure below is a proper sub-
graph of P(n , 2) for n ≥ 10.)
(b) Use part (a) to prove (P(n , 2)) = 3 for n ≥ 6.
v1 v10
• • • • • • • • • •
• • • • • • • • • •
u1 u10
8.3.32. (♦) Given an edge-coloring of a graph G, for v ∈ V(G) let S(v) be the set of colors
used on edges incident to v. Let ¾(G) be the minimum number of colors in a proper edge-
coloring of G such that | S(x) ∩ S(y)| ≤ whenever xy ∈ E(G). Prove ¾(K r,s) ≥ ⌈ rs/ ⌉ .
(Comment: Borozan et al. [2015] proved ¾ (K r,s) = ⌈ rs/ ⌉ , plus 2(G) ≤ 6 for (G) ≤ 3 and
bounds for d-degenerate and complete graphs. Strong edge-coloring is the case = 1;
Erdős and Nešet řil conjectured 1 (G) ≤ 45 (G)2 , improving to 14 (5 (G)2 − 2 (G) + 1) when
(G) is odd, both achieved by expanding vertices of C5 into independent sets. The sharp
bound of 10 for (G) = 3 was proved in Andersen [1992] and Horák–He–Trotter [1993];
Cranston [2006] proved 1 (G) ≤ 22 when (G) = 4. See also Molloy–Reed [1997].)
8.3.33. A total coloring of G assigns a color to each vertex and each edge so that objects
adjacent or incident have different colors. Let (G) denote the number of colors needed.
(a) Prove (G) ≤ l(G) + 2 for every graph G.
(b) Prove (G) ≤ (G) + 2 when G is bipartite. (Rosenfeld [1971])
(c) Given the List Color Conjecture, prove (G) ≤ (G) + 3. (Bollobás–Harris [1985])
(Comment: The Total Coloring Conjecture is (G) ≤ (G)+2 for all G (Behzad [1965]).
It holds for (G) ≤ 3 (Rosenfeld [1971], Vijayaditya [1971]), (G) = 4 (Kostochka [1977]),
(G) = 5 (Kostochka [1996]), and complete multipartite graphs (Yap [1989]); see Exercise
13.3.5 for (K n). Hind–Molloy–Reed [1999] proved (G) ≤ (G) + 8 log8 (G) when (G)
is large. Geetha–Narayanan–Somasundaram [2018] surveys the topic.)
8.3.34. (♦) Prove the Total Coloring Conjecture (above) for 4-colorable Class 1 graphs.
8.3.35. (+) An interval coloring of G is a proper edge-coloring of G by integers such that
at each vertex, the incident colors form an interval of integers.
(a) Let G be an X , Y -bigraph in which every vertex of X has degree 2 and every ver-
tex of Y has degree 2 for some ∈ . Prove that G has an interval coloring. (Comment:
The statement also holds when vertices of Y have degree 2 + 1, using the result that a
(2 + 1)-regular graph with at most cut-edges has a 2-factor.) (Hansen [1992])
(b) Prove that K r,s has an interval coloring using r + s − gcd(r, s) colors. (Hint: Com-
bine solutions for the cases r = s and gcd(r, s) = 1. Comment: In fact , fewer colors cannot
suffice, but this is harder.) (Hanson–Loten–Toft [1998])
8.3.36. (♦) A parity edge-coloring of a graph G is an edge-coloring such that on every
path, some color appears an odd number of times. Prove that G is a subgraph of the hyper-
cube Q¾ if and only if G has a parity -edge-coloring such that on every cycle, every color
appears an even number of times. (Havel–Morávek [1972])
8.3.37. With parity edge-coloring defined as above, let p(G) denote the minimum number
of colors in a parity edge-coloring of G. Prove p(K 2 ,3) = 4 and p(K 5) = 7.
8.3.38. (♦) Give fast algorithms for computing (G), (G), (G), and (G) when supplied
with a simplicial elimination ordering of G.
374 Chapter 8: Coloring
8.3.51. (♦) An x , y-separator in a graph G is a set S of vertices such that x and y lie in
distinct components of G − S. A minimal vertex separator is a minimal x , y-separator
for some pair {x , y}. Every minimal separating set is a minimal vertex separator. In the
graph below, S is a minimal vertex separator (for {x , y}) but is not a minimal separating
set. Prove that a graph is chordal if and only if every minimal vertex separator is a clique.
•
•
x• •y
•
S
8.3.52. A -tree is a graph grown from K ¾ by iteratively adding a vertex whose neigh-
borhood is a -clique. Prove that a connected graph G is a -tree if and only if (1) G has a
-clique but no ( + 2)-clique and (2) Every minimal vertex separator of G is a -clique.
8.3.53. Let G be an n-vertex chordal graph with clique number r. Prove that G has at
most ( rj ) + ( rj −−11 )(n − r) cliques of size j , with equality only when G is an (r − 1)-tree.
8.3.54. A Meyniel graph is a graph in which every odd cycle has at least two chords;
such graphs are perfect (Meyniel [1976]).
(a) Prove that every chordal graph is a Meyniel graph.
(b) Prove that every P4 -free graph is a Meyniel graph.
(c) Find a comparability graph that is not a Meyniel graph.
8.3.55. (♦) Let G be a P4 -free graph, meaning that no induced subgraph of G is a 4-vertex
path. Prove that every maximal independent set in G intersects every maximal clique in
G. Use this to prove that G is perfect.
8.3.56. Let G be a nontrivial connected P4 -free graph. Prove that if Q is a maximal clique
in G, then Q contains a neighbor of every vertex of G. Conclude that every connected
triangle-free P4 -free graph is a complete bipartite graph.
8.3.57. Let G be a P4 -free graph. Prove that for every vertex ordering , the greedy
coloring algorithm with respect to uses (G) colors (such graphs are called perfectly or-
derable). (Hint: When greedy coloring with respect to uses colors, let i be the least
integer such that G has a clique whose vertices receive colors i through . Prove i = 1.)
8.3.58. (♦) A complement reducible graph (or cograph), is a graph reducible to a triv-
ial graph by successive complementation within components.
(a) Prove that a graph G is P4 -free if and only if it is a cograph.
(b) Use (a) and the PGT to prove P4 -free graphs are perfect. (Seinsche [1974])
(c) Prove that if G is P4 -free, then G and G are comparability graphs.
8.3.59. (♦) (Star-Cutset Lemma) A star-cutset of a graph G is a separating set S con-
taining a vertex x adjacent to all of S − {x}.
(a) Prove that if G has no stable set intersecting every maximum clique, and every
proper induced subgraph of G is (G)-colorable, then G has no star-cutset.
(b) Prove that no p-critical graph has a star-cutset. (Chvátal [1985b])
8.3.60. Find an imperfect graph G having a star-cutset S such that the S-lobes of G are
perfect graphs. (Comment: Thus identification at star-cutsets does not preserve perfec-
tion, although no p-critical graph has a star-cutset.) (T. Shermer)
8.3.61. A graph G is weakly chordal if neither G nor G has an induced cycle of length
at least 5. Prove that every chordal graph is weakly chordal. (Comment: Hayward [1985]
proved that if G and G are non-complete weakly chordal graphs, then G or G has a star-
cutset. Thus weakly chordal graphs are perfect , by the Star-Cutset Lemma.)
376 Chapter 8: Coloring
8.3.62. (♦) (Substitution Lemma) If V(G) = {v1 , . . . , vn}, and H1 , . . . , Hn are pairwise
disjoint graphs, then the composition G[H1 , . . . , Hn] is the graph H1 + · · · + Hn plus the
edges {xy: x ∈ V(Hi), y ∈ V(Hj ), vi vj ∈ E(G)}. Prove that every composition of perfect
graphs is perfect. (Hint: Use the Star-Cutset Lemma, Exercise 8.3.59) (Lovász [1972a])
v1 • •
•
• •
v2 • • v4 •
• • •
v3 •••
Planar Graphs
Topological graph theory studies layouts of graphs on surfaces. In the plane
this was stimulated by the famous Four Color Problem, asking whether the (con-
nected) regions of any map on the globe can be colored from four colors so that
regions sharing a nontrivial boundary have different colors. More recent motiva-
tion comes from circuit layouts on silicon chips. Crossing wires cause problems
in layouts, so we want to know which circuits can be laid out without crossings.
Many general texts treat planar graphs and topological graph theory at some
length, such as Chartrand–Lesniak [1986], Diestel [1997], and Gross–Yellen
[1999] (and more recent editions of all three). Gross–Tucker [1987] and Mohar–
Thomassen [2001] are devoted completely to topological graph theory.
• • • •
377
378 Chapter 9: Planar Graphs
We use standard concepts about curves and regions. We treat the formal def-
initions lightly, since the terms mean what one expects them to mean.
• •
• •
• •
9.1.3. Definition. In a drawing of a multigraph, a crossing of two edges is a com-
mon internal point. An embedding is a drawing without crossings. A multi-
graph that embeds in the plane is planar. A particular planar embedding
of a multigraph is a plane multigraph. A subgraph of a plane multigraph
inherits its embedding. The faces of a plane multigraph are the maximal
regions disjoint from the edges.
Every finite plane multigraph has one unbounded face. Computation with
faces uses the Jordan Curve Theorem: a simple closed curve cuts the plane into
two maximal regions (“inside” and “outside”). In topology this is a deep notion.
For finite graphs we may restrict drawings to use only polygonal curves (unions
of finitely many line segments). In this model the proof is not difficult, and it
provides a test for whether a point is inside or outside.
To distinguish the two sets, consider rays in the plane. For a ray Ô from a
point p not on C, let º (Ô) be the number of segments of C that Ô intersects. As
the direction changes, º (Ô) changes only when Ô visits an endpoint of a segment
of C, but the parity is the same before and after that direction. Let the parity of
p be the parity of º (Ô) for the rays not containing endpoints of segments in C.
A map on the plane or the sphere can be viewed as a plane multigraph. The
“boundary-sharing ” relation on the faces yields a natural “dual” multigraph.
9.1.6. Example. Below in bold we show a plane graph with four vertices, four
edges, and two faces. The two faces have three common boundary edges, and the
cut-edge has the same face on both sides. Hence the dual has a triple-edge and a
loop. We show it in solid edges, with four faces, four edges, and two vertices.
•
• • • •
•
380 Chapter 9: Planar Graphs
Every planar embedding of K 4 has four faces, and every two of them have a
common boundary edge. The dual is another copy of K 4 .
Every planar embedding of the cube Q3 has eight vertices, 12 edges, and six
faces. “Opposite” faces have no common boundary; the dual is an embedding of
K 2 ,2 ,2 , with six vertices, 12 edges, and eight faces.
9.1.7. Example. Two embeddings of a planar graph may have nonisomorphic du-
als. Each embedding shown below has three faces, so in each case the dual has
three vertices. In the embedding on the right, the dual vertex corresponding to
the unbounded face has degree 4. In the embedding on the left, no dual vertex
has degree 4, so the duals are not isomorphic.
In contrast, every 3-connected planar graph G has essentially only one em-
bedding; the duals of any two drawings of G are isomorphic. This follows from the
2-Isomorphism Theorem of Whitney [1933], which describes when planar graphs
have isomorphic duals.
• • • •
•
• • • • •
• • • •
9.1.9. Example. A cut-edge belongs to the boundary of only one face, and it con-
tributes twice to its length. Each graph in Example 9.1.7 has three faces. In the
embedding on the left the lengths are 3 , 6 , 7; on the right they are 3 , 4 , 9. The
sum of the lengths is 16 in each case, which is twice the number of edges.
Proof: Consider D ⊆ E(G), and let D∗ denote the set of edges in G ∗ corresponding
to the edges in D. Since a bond is a minimal edge cut, it suffices to show that D∗
contains an edge cut if and only if D contains a cycle.
If D is the edge set of a cycle in G, with S being the set of dual vertices corre-
sponding to faces inside the cycle, then the edge cut [S, S] consists of all the edges
of G ∗ that cross edges of D; this is the set D∗ (by the Jordan Curve Theorem, S
and S are nonempty).
If D contains no cycle in G, then D encloses no region. The unbounded face of
G is reachable from anywhere without crossing D. Hence G ∗ − D∗ is connected,
and D∗ contains no edge cut. Hence when D is a cycle the dual cut is minimal.
• • • •
D w∗ D w∗
• • • • • • • • • • • •
• v∗ • • • • v∗ • • •
• •
• • • •
9.1.12. Remark. If a plane graph is not a forest, then every face boundary con-
tains a cycle.
9.1.13. Remark. Deleting a non-cut edge of G has the effect of contracting its
dual edge in G ∗ , since two faces of G combine into one. Contracting a non-loop
edge of G has the effect of deleting its dual edge in G ∗ . Letting G be the central
solid graph below, we have G − e on the left and G · e on the right.
To maintain this duality, when discussing planarity we often keep multiedges
and loops that arise from edge contraction.
• •
e
• • • ← • • • • → • • • • •
• •
the region inside C twice, since each such edge belongs twice to faces inside C.
Hence the length of C and the full sum have the same parity, which is even.
B ⇔ C. The dual G ∗ is connected, and degrees in G ∗ are face lengths in G.
• • •
C
• • • •
• • •
Some facts about outerplane graphs have elegant proofs using duals.
9.1.19. Proposition. A plane graph is an outerplane graph if and only if its weak
dual is a forest.
Section 9.1: Embeddings and Euler ’s Formula 383
Proof: Since components of a plane graph G that are trees do not affect whether
G is an outerplane graph, we may assume that all components have cycles. Now
components of the weak dual H correspond to components of G. A component of
H has a cycle if and only if G has a vertex v surrounded by bounded faces of G,
which holds if and only if v is not incident to the unbounded face of G.
EULER’S FORMUL A
Euler ’s Formula is the basic counting tool relating the numbers of vertices,
edges, and faces of multigraphs drawn in the plane.
• • •
• • • →
• •
n=1 n>1
9.1.27. Remark. “Maximal plane multigraph” makes no sense, since edges may
have high multiplicity, but an n-vertex triangulation still has 3n − 6 edges. To
obtain a triangulation with multiedges from a maximal plane graph, an edge xy
bounding faces A and B can be “widened” into two edges and two vertices inserted
Exercises for Section 9.1 385
as shown below, adding six edges and four faces. Every face still has length 3. In
the dual, the edge AB is replaced using four new vertices as shown.
x x
• • •
A B → A • • B
• •
• •
• •
y y
•
• •
• •
A• • B → A• • • • B
•
EXERCISES 9.1
9.1.1. (−) Let G be a plane graph with dual G∗ . What is the effect on the dual when an
edge of G is subdivided? What is the effect when an edge of G is duplicated (that is, when
another edge with the same endpoints is added)?
386 Chapter 9: Planar Graphs
9.1.2. (−) Count the isomorphism classes of planar duals of the graph below.
• •
• • •
• •
9.1.3. (−) Prove or disprove: If G is a 2-connected plane graph with minimum degree 3 (no
multiedges), then its dual G∗ has no multiedges.
9.1.4. (−) Let G be a maximal plane graph with | V(G)| ≥ 3. Prove or disprove each below:
(a) G must be a chordal graph.
(b) G must have an even number of faces.
(c) G∗ must be 2-edge-connected and 3-regular.
9.1.5. (−) Let G be a plane graph with an odd number of vertices. Prove or disprove: If
G∗ is Eulerian, then G cannot be Hamiltonian.
9.1.6. (−) Prove that a 2-edge-connected 3-regular plane graph is 3-connected if and only
if no two faces share at least two boundary edges.
9.1.7. (−) Use edge deletion to prove Euler ’s Formula by induction on the number of edges,
with trees in the basis step.
9.1.8. (−) Let S be a set of n points in the plane with no two points in S closer together
than 1 inch. Prove that at most 3n − 6 pairs are exactly 1 inch apart.
9.1.9. (−) Obtain the number of faces in a ¾-regular plane graph with n vertices.
9.1.10. (−) Prove that every plane graph with minimum degree at least 4 has a face of
length 3.
9.1.11. (−) Prove that every plane graph with minimum degree at least 3 has a face with
length at most 5.
9.1.12. (−) Determine the number of faces in a plane graph with n vertices, m edges, and
¾ components.
9.1.13. (−) For n ≥ 5, construct an n-vertex maximal planar graph that does not have
three disjoint cycles.
9.1.14. (−) Let G be a maximal planar graph with at least five vertices. Prove that G does
not have adjacent vertices of degree 3.
9.1.15. Let G be a plane multigraph. Prove that (G∗)∗ ∼
= G if and only if G is connected.
9.1.16. Contracting an edge of a plane multigraph deletes the corresponding edge from the
dual: (G · e)∗ = G∗ − e∗ (Remark 9.1.22(2)). Use this to prove Theorem 9.1.11 inductively:
a set D ⊆ E(G) is a cycle in G if and only if the dual set D∗ is a bond in G∗ .
9.1.17. Prove by induction on the number of faces that a plane multigraph is bipartite if
and only if every face has even length.
9.1.18. Prove that every plane n-vertex multigraph isomorphic to its dual has 2n− 2 edges.
For n ≥ 4, construct an example with no loops or multiedges.
9.1.19. For ¾ ≥ 3, determine all maximal planar graphs with ¾ + 2 vertices such that all
vertices have degree 4 except for two vertices of degree ¾ .
9.1.20. Construct a vertex-transitive 3-regular planar graph of diameter 3 with 12 ver-
tices. (Comment: T. Barcume proved the conjecture of Erdős that no 3-regular planar
graph with diameter 3 has more than 12 vertices.)
Exercises for Section 9.1 387
9.1.21. Construct a 16-vertex 5-regular planar graph with diameter 3. (Hint: The unique
such graph can be drawn with 4-fold rotational symmetry and contains a 4-regular span-
ning subgraph with diameter 3. Comment: Preen [2012] proved that this graph is the
only 5-regular planar graph with diameter 3 other than the icosahedron.)
9.1.22. Let S be a separating 3-set of the dual of a maximal planar graph G. Prove that
G∗ − S has two components.
9.1.23. (♦) Prove that every maximal planar graph having at least four vertices is 3-
connected. (Ore [1967, p. 6])
9.1.24. (♦) A fullerene is a 3-regular 3-connected plane graph whose faces have length 6
except for twelve of length 5. For ¾ ∈ 0 , construct a fullerene with 5 ¾ faces of length 6 and
another with 6 ¾ + 2 faces of length 6. (Comment: Gr ünbaum–Motzkin [1963] constructed
fullerenes with r faces of length 6 for all r ∈ with r > 1.)
9.1.25. (♦) Prove that edges in a connected plane multigraph G form a spanning tree if
and only if the duals of the other edges form a spanning tree in G∗ . (von Staudt [1847])
9.1.26. (♦) Let G be a connected plane multigraph. Prove that G is Hamiltonian if and
only if V(G∗) can be partitioned into two sets S and T such that G∗ [S] and G∗ [T] are both
trees. (Stein [1970] proved this for triangulations.)
9.1.27. Let G be an Eulerian plane multigraph. Prove that G cannot satisfy either prop-
erty below. (Comment: These facts can be used in Exercise 9.3.28.)
(a) One face of G has length 2 or 4 and the rest have length 3.
(b) Every face of G has length 3 and G has a loop.
9.1.28. Use Euler ’s Formula to prove that an n-vertex maximal outerplanar graph has
2n − 3 edges.
9.1.29. Alternative proof of Proposition 9.1.20. Prove inductively that every outerplanar
graph with at least four vertices has two nonadjacent vertices with degree at most 2.
9.1.30. Let G be an outerplane graph other than K3 whose bounded faces all have length
3. Let t be the number of faces in G sharing no edge with the unbounded face. Prove that
G has exactly t + 2 vertices of degree 2.
9.1.31. Let G0 = K3 . For ¾ ≥ 1, let G ¾ be the plane graph obtained from G ¾−1 by adding a
new vertex ve for each edge e on the unbounded face of G ¾−1 , adjacent only to the endpoints
of e. Note that G ¾ is outerplanar.
(a) Determine the degree list of G ¾ .
(b) Prove that every outerplanar graph is a subgraph of G ¾ for some ¾ .
9.1.32. (♦) A triangulation of a convex n-gon is a maximal outerplanar graph obtained
by adding chords joining corners of the n-gon. Flipping a chord replaces it with the other
chord that cuts the union of the two triangles bounding it , as shown below. Flipping a
chord yields another triangulation. Prove that any triangulation can be turned into any
other using at most 2n − 6 flips, and prove that at most 2n − 10 suffice when n > 12.
(Comment: Sleator–Tarjan–Thurston [1988] used hyperbolic geometry to prove that the
bound 2n − 10 is best possible when n is sufficiently large. Pournin [2014] found a shorter
combinatorial proof that 2n − 10 is sharp when n > 12.)
• • • •
• • ↔ • •
• • • •
388 Chapter 9: Planar Graphs
9.1.33. For G ∈ {K6 , K7 }, determine whether G decomposes into two outerplanar graphs.
9.1.34. (♦) Let G be a nontrivial maximal outerplanar graph with vertex degrees all even.
Prove that | E(G)| is divisible by 3. (Jonsson–Propp [2007])
9.1.35. Let l be the length of a longest cycle in a planar triangulation G. Prove that G
has cycles of all lengths from 3 through l. (Balister)
9.1.36. (♦) Euler’s Formula using linear algebra. Let A be an n-by-m matrix over a field ;
its nullspace is {x ∈ m : Ax = 0}. The Rank–Nullity Theorem of linear algebra states
that the rank of A plus the dimension of its nullspace equals the number of columns. Apply
this to the incidence matrix (over the field 2 of size 2) to prove Euler ’s Formula.
9.1.37. Find the maximum number of edges in a planar subgraph of the hypercube Q¾ .
9.1.38. Let G be a 3-regular connected plane graph in which every vertex is incident to
one face of length 4, one face of length 6, and one face of length 8. Without drawing G,
use Euler ’s Formula to count the faces of G.
9.1.39. The rhombicosidodecahedron is a polyhedron in which every vertex is incident
to one triangular face, one pentagonal face, and two (opposite) quadrilateral faces. Deter-
mine the number of faces in the rhombicosidodecahedron. (Comment: The toy construction
system “ Zometool” is based on this polyhedron.)
9.1.40. (♦) Use Euler ’s Formula to count the regions formed by n lines in the plane, as-
suming that no two are parallel and no three have a common point.
9.1.41. (♦) Consider a convex n-gon such that no three segments joining corners have a com-
mon internal point. Use Euler ’s Formula (not induction!) to count the bounded regions in
the drawing after adding all (n2) segments joining corners of the n-gon. The answers for
3 ≤ n ≤ 6 are 1, 4, 11, and 25.
9.1.42. Let R be a convex region in the plane. Suppose that q chords with distinct end-
points on the boundary of R are drawn and form p points of intersection, with no three
chords having a common point. In terms of p and q, compute the number of regions into
which the chords cut R. (Alexanderson–Wetzel [1977])
9.1.43. (♦) Let º be a proper vertex coloring of an n-vertex triangulation using the colors
{a , b , c , d}. Let t be the number of edges joining colors a and b plus the number of edges
joining colors c and d. Determine t. (X. Lv)
9.1.44. Prove that if G is a planar graph with at least 11 vertices, then G is nonplanar.
Construct a self-complementary planar graph with eight vertices.
9.1.45. (♦) Let G be a connected n-vertex planar graph with m edges. Prove that
m ≤ ½ −½ 2 (n − 2) when G has girth ½ .
9.1.46. Prove that every n-vertex planar graph with n + ¾ edges has a cycle of length
+¾) 2(n+¾)
at most 2(n
¾ +2 . To prove that the bound is sharp, construct an example with girth ¾ +2
whenever n − 2 is divisible by ¾ + 2.
9.1.47. Unusual graphs.
(a) For a planar graph with minimum degree at least 3 and ni vertices of degree i,
prove 3n3 + 2n4 + n5 ≥ 12.
(b) Let G be a 3-connected plane graph in which no three faces have the same length.
Prove that G has two faces each of lengths 3, 4, and 5 and no face at all of length at least
7. There are four such graphs (Jorza [2001]); construct one.
9.1.48. (♦) Prove that every n-vertex plane graph decomposes into at most 2n − 4 edges
and facial triangles. Determine the graphs for which 2n − 4 such subgraphs are needed.
Exercises for Section 9.1 389
9.1.49. (♦) Let G be a connected even plane graph. An Eulerian circuit is noncrossing if
it does not cross itself when viewed as a closed curve. That is, in the embedding around a
vertex v, the two edges used on a visit through v are consecutive. Prove the following.
(a) G has a noncrossing Eulerian circuit. (Abrham–Kotzig [1979], Singmaster [1981])
(b) If also every bounded face is a triangle, then | E(G)| is divisible by 3.
(c) If also G is a maximal outerplanar graph, then | V(G)| is divisible by 3.
• • •
• • •
• •
9.1.50. For ¾ ∈ , prove that the following exist: an Eulerian planar graph with min-
imum degree 4 where the distance between degree-4 vertices is at least ¾ , and a planar
graph with minimum degree 5 where the distance between degree-5 vertices is at least ¾ .
9.1.51. Prove that every 4-regular plane graph has at least eight triangular faces. For
each ¾ ∈ , construct a 4-regular plane graph with exactly eight triangular faces and
such that any path connecting two of these faces has length at least ¾ .
9.1.52. Determine all n such that there exists a 4-regular planar graph with n vertices.
(Chvat ál [1969], Owens [1971])
9.1.53. For ¾ ∈ , construct a connected 5-regular planar graph with 12¾ vertices.
9.1.54. (♦) For n ≥ 4, prove that every n-vertex planar graph has at least four vertices
with degree less than 6. Prove that equality may hold when n is even and at least 8.
(Gr ünbaum–Motzkin [1963])
9.1.55. (♦) Directed plane graphs. Let G be a plane graph, and let D be an orientation of
G. The dual D∗ of D is an orientation of G∗ such that when an edge of D is viewed from
tail to head, the dual edge in D∗ crosses it from right to left. For example, if the solid
edges below are in D, then the dashed edges are in D∗ .
• • •
• • •
Prove that if D is strongly connected, then D∗ has no directed cycle, so −(D∗) = +(D∗) =
0. Conclude that if D is strong, then D has a face whose boundary is a clockwise cycle and
another face whose boundary is a counterclockwise cycle.
9.1.56. Prove that every 2-connected plane graph has an ear decomposition in which ears
are successively removed from the boundary of the external face of the remaining graph.
9.1.57. (♦) Pick’s Theorem. A lattice polygon is a polygon whose corners are at integer
lattice points in the plane.
(a) Let G be a 2-connected plane graph whose bounded faces are triangles, with B
vertices on the unbounded face and I other vertices. In terms of B and I, determine the
numbers of edges and faces in G.
(b) Let T be a lattice triangle. Prove that if no other lattice points lie on the bound-
ary or in the interior of T , then T has area 1/2. (Hint: Use induction on the area of the
smallest lattice rectangle containing T .)
(c) Let P be a lattice polygon with B lattice points on the perimeter and I lattice
points inside. Prove Pick’s Theorem: the area of the region bounded by P is I + B/2 − 1.
(DeTemple–Robertson [1974], Gaskell–Klamkin–Watson [1976])
390 Chapter 9: Planar Graphs
KURATOWSKI’S THEOREM
• •
•
• •
•
• • •
a K 3 ,3-subdivision
9.2.3. Theorem. (Kuratowski [1930]) A graph is planar if and only if it does not
contain a subdivision of K 5 or K 3 ,3 .
Thus K 5 and K 3 ,3 are the only topologically minimal nonplanar graphs (not
a subdivision of another nonplanar graph). Wagner [1937] proved another char-
acterization. Deletions and contractions preserve planarity, so we can seek the
Section 9.2: Structure of Planar Graphs 391
minimal nonplanar graphs under these operations. Wagner proved that G is pla-
nar if and only if it has no subgraph contractible to K 5 or K 3 ,3 . This follows easily
from Kuratowski’s Theorem (see Exercise 13), the proof of which is our next goal.
We will show that a smallest nonplanar graph not having a Kuratowski sub-
graph must be 3-connected. To prove Kuratowski’s Theorem, it then suffices to
show that 3-connected graphs without Kuratowski subgraphs are planar.
9.2.8. Lemma. If G is a graph with fewest edges among all nonplanar graphs
without Kuratowski subgraphs, then G is 3-connected.
Proof: Deleting an edge of G cannot create a Kuratowski subgraph in G. Thus
deleting one edge produces a planar subgraph, and hence G is a minimal nonpla-
nar graph. By Lemma 9.2.6, G is 2-connected.
Suppose that G has a separating 2-set S, with S = {x , y}. Since G is nonpla-
nar, the union of xy with some S-lobe is nonplanar (Lemma 9.2.7); let H be such
a graph. Since H has fewer edges than G, minimality of G forces H to have a
Kuratowski subgraph F . All of F appears in G except possibly the edge xy.
Since S is a minimal vertex cut, both x and y have neighbors in every S-lobe.
Thus we can replace xy in F with an x , y-path through another S-lobe to obtain a
392 Chapter 9: Planar Graphs
x
• • • •
F • H
• • • •
y
u1 v1 u1 v1
• • • •
y x
• → • •
• • • •
v2 u2 v2 u2
H in G in G
9.2.12.* Remark. Thomassen [1984] proved that the regions in Theorem 9.2.11
can be required to be convex hexagons, but not convex pentagons. Other exten-
sions guarantee special Kuratowski subgraphs in nonplanar graphs. Kelmans
[1981] conjectured that every 3-connected nonplanar graph with at least six ver-
tices has a cycle with three pairwise crossing chords. This was proved by Kelmans
[1984] and by Thomassen [1984].
A 2-connected planar graph need not have a convex embedding (consider
K 2 ,4), but every planar graph has an embedding where all edges are straight
line segments. Proved by Wagner [1936], Fáry [1948], and Stein [1951], this is
known as Fáry’s Theorem (Exercise 9).
9.2.13.* Remark. Kuratowski’s Theorem does not directly yield fast planarity
testing: too many subgraphs to check. Demoucron–Malgrange–Pertuiset [1964]
obtained a quadratic-time algorithm, and it produces an embedding. The proof of
Kuratowski’s Theorem by K lotz [1989] provides another algorthm, and it finds a
Kuratowski subgraph when the graph is not planar.
394 Chapter 9: Planar Graphs
Planar graphs are sparse, with average degree less than 6, but sparseness
alone does not guarantee easy separation. Erdős–Graham–Szemerédi [1976]
proved that for > 0 there is a positive constant c such that almost all graphs
with (2 + )¾ vertices and c ¾ edges retain a component with at least ¾ vertices
when any ¾ vertices are deleted. (See Chapter 14 for discussion of “almost all”.)
Thus the Separator Theorem truly needs the properties of planarity. The
original proof (Exercise 24) used weighted vertices and obtained separations from
spanning trees of small diameter. We present a later short proof based on connec-
tivity and path-lengths. A near-triangulation is a 2-connected plane graph in
which every bounded face has length 3.
•u • v0
• • • • • • • •
• • • • • • • • • •
Y S X
◦ ◦ ◦ ◦ ◦ • • • • •
•◦ ◦ ◦• ◦ •◦ • • •
•◦ v •v
• ••
C2 • c−
2 •P c−1 C1
• •
We claim that C1 contradicts the minimality of C. Since d(u , v) < c(u , v), the
cycle C1 is shorter than C and hence has length at most 2 ¾ . We have c−1 ≤ c− and
c+1 > c+ , so c−1 − c+1 < c− − c+ . To show c+1 < 2n/3, use c−1 ≥ c−2 to compute
n − c+1 = c−1 + | V(C1)| > 12 c− ≥ 13 n.
Thus C1 is an eligible cycle and would be preferred to C, a contradiction.
Claim 2: C has 2 ¾ vertices. By Claim 1, C has no chords; hence every edge
of C is one edge of a triangular face with a vertex inside C, since c− ≥ 2n/3. If
|V(C)| < 2¾ , then obtain C from C by detouring to absorb one such interior ver-
tex. Since c+ vertices remain outside C , and fewer than c− vertices are inside C ,
the cycle C contradicts the choice of C. Hence we must have | V(C)| = 2 ¾ .
9.2.19. Corollary.
√
(Lipton–Tarjan [1979]). Every n-vertex planar graph G has
2 √2n
a( , 2 )-separation.
1
1− 2/3
Proof: We build A , B , C gradually; the vertices not yet placed lie in D. Initially
A0 = B0 = C0 = ∅ and D0 = V(G). Step i − 1 produces disjoint sets Ai−1 , Bi−1 ,
and Di−1 such that no edges join any two of them and | Ai−1 | ≤ | Bi−1 | ≤ n/2.
Exercises for Section 9.2 397
At step i, apply Theorem 9.2.18 to the remaining “large” piece Di−1 . This
produces C∗ separating A∗ and B∗ within Di−1 , labeled so that | A∗ | ≤ | B∗ |. Com-
bine A∗ with Ai−1 . Since | A∗ | ≤ | B∗ | and | Ai−1 | ≤ | Bi−1 | , we have | Ai−1 ∪ A∗ | ≤ n/2.
Also | Bi−1 | ≤ n/2 is given. Let Ai be the smaller of Ai−1 ∪ A∗ and Bi−1 , and let Bi
be the other. Now | Ai | ≤ | Bi | ≤ n/2. Let Ci = Ci−1 ∪ C∗ .
We put A∗ into the final sets, and B∗ becomes Di to split at the next stage.
No edges join Di to Ai or Bi , so any vertices of Di can be added to Bi or to Ai .
Since | Di | ≤ 32 | Di−1 | , the bounds on the contributions to | C| form a geometric
√ √
sum. When D¾ = ∅, we have | A¾ | , | B¾ | ≤ n
and | C¾ | ≤ ∑i 2 2n(2/3)i < 2 √2n
.
2 1− 2/3
2.121). Along the way were also Djidjev [1982, 1987] and Gazit–Miller
√ [1990].
Djidjev [1982] showed that the coefficient cannot be less than 23 ( 3)1/2 (about
1.555). Thus trees of separations of planar graphs down to pieces of constant size
need logarithmic depth.
Proofs of the Planar Separator Theorem produce separations in linear time.
Due to this, the Planar Separator Theorem yields fast approximation algorithms
for computational problems that are difficult on planar graphs. Exercise 23 con-
siders the example of finding a large independent set.
EXERCISES 9.2
9.2.1. (−) Prove that the complement of the 3-dimensional cube Q3 is nonplanar.
9.2.2. (−) Prove or disprove: The union of any two paths is a planar graph.
9.2.3. (−) For each graph below, prove nonplanarity or give a convex embedding.
• •
• • •
• •
•
• •
•
• •
• •
• • • •
• •
9.2.7. When G has degree list (4 , 4 , 4 , 4 , 3 , 3 , 3 , 3), also G has this degree list. Show that
such G and G can be both planar, both nonplanar, or one of each type.
9.2.8. (♦) For n ≥ 5, let G be the graph whose vertices are n points on a circle, with each
vertex adjacent to the four nearest others. Prove that G is planar if and only if n is even.
9.2.9. (♦) Fáry’s Theorem. Let R be a planar region bounded by a simple polygon with
at most five sides (the edges do not cross). Prove that some point x inside R “sees” all of
R, meaning that the segment from x to any point of R does not cross the boundary of R.
Conclude inductively that every planar graph has a straight-line embedding.
9.2.10. Find a convex embedding in the plane for the graph below.
• •
• • •
• •
• • •
• •
9.2.11. (♦) Outerplanarity. (Chartrand–Harary [1967])
(a) Use Kuratowski’s Theorem to prove that G is outerplanar if and only if G does
not contain a subdivision of K4 or K 2 ,3 . (Hint: To apply Kuratowski’s Theorem, modify G
appropriately. This is much easier than following the steps of Kuratowski’s Theorem.)
(b) Use part (a) to prove that G K 2 is planar if and only if G is outerplanar.
9.2.12. For G1 and G 2 connected, with | V(G i)| ≥ 3, prove that G1 G 2 is planar if and
only if one is a path and the other is a cycle or a path. (Behzad–Mahmoodian [1969])
9.2.13. Wagner [1937] proved that a graph G is planar if and only if neither K 5 nor K3 ,3
can be obtained from G by deletions and contractions of edges.
(a) Show that deletion and contraction of edges preserve planarity. Conclude from
this that Wagner ’s condition is necessary.
(b) Use Kuratowski’s Theorem to prove that Wagner ’s condition is sufficient.
9.2.14. (♦) The Hanani–Tutte Theorem: a planarity criterion.
(a) Prove that in every drawing of K 5 or K3 ,3 in the plane, some two nonincident edges
cross an odd number of times. (Hint: Prove that the number of such pairs of edges is al-
ways odd.) (Hanani [1934], as Chojnacki)
(b) Prove that a graph is planar if it has a drawing in the plane in which every two
nonincident edges cross an even number of times. (Tutte [1970])
9.2.15. (♦) Prove that every 3-connected graph with at least six vertices that contains a
subdivision of K 5 also contains a subdivision of K3 ,3 .
9.2.16. (♦) For a cycle C in a graph G, a C-fragment is a component of G − V(C) together
with its edges and vertices of attachment to C. Two C-fragments conflict if they have
three common vertices of attachment or four alternating vertices of attachment on C. The
conflict graph of C has a vertex for each C-fragment , adjacent when they conflict. Prove
that G is planar if and only if the conflict graph of each cycle is bipartite. (Tutte [1958])
9.2.17. Let x and y be vertices in a planar graph G. Prove that G has a planar embedding
with x and y on the same face if and only if G − x − y has no cycle C with x and y in
conflicting C-fragments in G. (Hint: Use Kuratowski ’s Theorem. Comment: Tutte proved
this without Kuratowski’s Theorem and used it to prove Kuratowski’s Theorem.)
Section 9.3: Coloring of Planar Graphs 399
• • • • •
01
11 10 • • • 01
11 00 10
01 10 01 11 • • • • 00 • 11 •
• • 01
10 01 01 11 • 01 •
• 11 • • 00 • c b
a
00
• •
9.3.3. Example. The Tutte graph. Tutte [1946] found the 3-connected 3-regu-
lar non-Hamiltonian plane graph on the left below. Let H denote each component
obtained by deleting the central vertex and the three long edges. Since a Hamil-
tonian cycle must visit the central vertex, it must traverse one copy of H along a
Hamiltonian path joining the other entrances to H , which we call x and y.
We therefore study a graph that has a Hamiltonian cycle if and only if H has
a spanning x , y-path. Such a graph H (on the right below) is obtained by adding
an x , y-path of length 2 through a new vertex.
• • • •
• • •• • 4
••• • • •
••• 5 9
• 5 • • •
G • • • • 5 4 H
• •y •
• •
• • •• •• • • • •
•• • • •• •
• •• ••
5 5
•H
• • x• • •y
4
• •x •
A face of length j is a j-face. Considering the faces of each length, Grin-
berg ’s condition for H becomes 2a4 + 3a5 + 7a9 = 0, where ai = i − i . Since the
unbounded face is outside, the equation reduces mod 3 to 2a4 ≡ 7 (mod 3). Since
4 + 4 = 3, we have a4 ∈ {±3 , ±1}. The only choice satisfying 2a4 ≡ 7 (mod 3)
is a4 = −1, which requires that two 4-faces lie outside the Hamiltonian cycle.
However, those having a vertex of degree 2 cannot lie outside the cycle.
A faster contradiction arises by subdividing one edge incident to each vertex
of degree 2. This does not change the existence of a spanning cycle. The result-
ing graph has seven 5-faces, one 4-face, and one 11-face. The required equation
becomes 2 · (±1) = 9 − 3a5 , but the left side is not a multiple of 3.
Tutte [1956] proved that all 4-connected planar graphs are Hamiltonian.
Thomassen [1983] proved the stronger result (conjectured by Plummer [1975])
that every 4-connected planar graph is Hamiltonian-connected (every vertex pair
occurs as the endpoints of a spanning path). By proving that 4-connected trian-
gulations are Hamiltonian, Whitney [1931] reduced the Four Color Problem to
the case of Hamiltonian planar graphs (Exercise 10).
402 Chapter 9: Planar Graphs
We proved from Euler ’s Formula that planar n-vertex graphs have at most
3n − 6 edges (Theorem 9.1.23). Thus planar graphs are 5-degenerate, which im-
plies that they are 6-colorable (recall Proposition 8.1.12). Heawood improved the
upper bound from 6 to 5.
9.3.4. Theorem. (Five Color Theorem; Heawood [1890]) Every planar graph
G is 5-colorable.
Proof: Since subgraphs of G are planar, it suffices to forbid 6-critical planar
graphs. If G is 6-critical, then (G) ≥ 5, so with planarity we may let v be a
vertex of degree 5. Let º be a proper 5-coloring of G − v. All five colors must ap-
pear on N(v). Let v1 , v2 , v3 , v4 , v5 be the neighbors of v in clockwise order around
v, and name the colors so that º (vi) = i.
Let G i , j be the subgraph of G − v induced by the vertices of colors i and j .
Switching the colors on a component of G i , j yields another proper 5-coloring of
G − v. If the component of G i , j containing vi does not contain vj , then switch-
ing the colors on it removes color i from N(v). Now giving color i to v produces a
proper 5-coloring of G. Thus G is 5-colorable unless, for each choice of i and j , the
component of G i , j containing vi also contains vj . Let Pi , j be a path in G i , j from vi
to vj , shown below for (i , j) = (1 , 3).
3 1
1
• • •
4 2
• •
5• •
• 2 •4 •3
v
•
2
• • •1
4 3
The cycle C completed with P1 ,3 by v separates v2 from v4 . By the Jordan
Curve Theorem, the path P2 ,4 crosses C. Since G is planar, paths cross only at
shared vertices. The vertices of P1 ,3 all have color 1 or 3, and those of P2 ,4 all
have color 2 or 4, so they have no common vertex.
This contradiction implies that every planar graph is 5-colorable.
After 86 more years, the upper bound was lowered from 5 to 4 in Appel–
Haken [1976]. Before we explain the approach to the proof, we describe another
way to strengthen the Five Color Theorem.
Vizing asked in 1975 whether every planar graph is 5-choosable; we prove
this below. Voigt [1993] found a planar graph with 238 vertices that is not 4-
choosable; Mirzakhani [1996] (Exercise 35) reduced this to 63 vertices (both exam-
ples generalize to infinite families). Gutner [1996] (Exercise 34) and Voigt–Wirth
[1997] showed that in fact some 3-colorable planar graphs are not 4-choosable.
As is common in inductive arguments about plane graphs, the external ver-
tices (vertices of the unbounded face) play a special role. Recall that a near-
triangulation is a 2-connected plane graph in which every bounded face is a
triangle. The boundary of the outer face is a cycle.
Section 9.3: Coloring of Planar Graphs 403
•
vj
Case 1 Case 2
• • • •
• • • •
•
• • • • • •
The edges inward from the ring are dashed because a configuration in a trian-
gulation is determined by the interior subgraph and the degrees of its vertices
(Exercise 37). Thus we write these as “ • 3”, “ • 4”, and “ • 5”, respectively.
Saying that a configuration C is reducible for 4-colorability of triangulations
means that if C appears in G, then G can be changed to a smaller triangulation
G such that every proper 4-coloring of G leads to a proper 4-coloring of G.
The idea Heawood used in Theorem 9.3.4 came from Kempe ’s failed proof and
is important in proving reducibility of configurations. A path whose colors alter-
nate between two colors is a Kempe chain.
9.3.10. Remark. Kempe’s proof. Let us try to prove the Four Color Theorem
by induction using the unavoidable set {• 3 , • 4 , • 5}. The approach is similar to
Theorem 9.3.4. We can extend a 4-coloring of G − v to complete a 4-coloring of G
unless all four colors appear on N(v). Thus “ • 3” is reducible. If d(v) = 4, then
the Kempe-chain argument works as in Theorem 9.3.4, and “ • 4” is reducible.
Section 9.3: Coloring of Planar Graphs 405
Now consider “ • 5”. When d(v) = 5, the repeated color on N(v) in a proper
4-coloring of G − v appears on nonconsecutive neighbors of v, since G is a triangu-
lation. Let v1 , v2 , v3 , v4 , v5 be the neighbors of v in order. In the 4-coloring º of
G − v, we may assume by symmetry that º (v5) = 2 and that º (vi) = i for 1 ≤ i ≤ 4.
Define G i , j and Pi , j as in Theorem 9.3.4. We can eliminate color 1 from N(v)
unless chains P1 ,3 and P1 ,4 exist from v1 to v3 and v4 , respectively, as on the left
below. The component H of G 2 ,4 containing v2 is separated from v4 and v5 by the
cycle through P1 ,3 and v. The component H of G 2 ,3 containing v5 is separated
from v2 and v3 by the cycle through P1 ,4 and v. Switching colors 2 and 4 in H and
colors 2 and 3 in H eliminates color 2 from N(v). This was Kempe ’s final case.
1
4• • •3
4 3
• • P1 ,4 3• •4 P1 ,3
P1 ,4 1 P1 ,3 1
• •
1• 2• •2 •1 1• 2• •2 •1
• •
v v
• • • •
4 3 4 3
9.3.11.* Example. All configurations with ring size 3 or 4 are reducible (Exercise
38). Equivalently, no minimal 5-chromatic triangulation has a separating cycle
of length at most 4. Birkhoff [1913] proved that configurations with ring size 5
other than • 5 are reducible.
Birkhoff also proved reducibility of the configuration below with ring size 6,
called the Birkhoff diamond. One must consider all proper 4-colorings of the
ring. Some cases extend to proper colorings of the interior. In others, Kempe
chains are needed to change the coloring into one that extends (Exercise 39).
• • 5
• •
• • • • = 5• •5
• •
5
• •
We have barely begun; an enormous amount of detail remains. From 1913 to
1950, enough reducible configurations were found to prove that all planar graphs
with at most 36 vertices are 4-colorable. This was slow progress. In the 1960s,
Heesch focused attention on the size of the ring, gave heuristics for finding re-
ducible configurations, and developed methods for generating unavoidable sets.
Appel and Haken, working with Koch, improved the heuristics to consider
only “promising ” configurations. Using 1000 hours of computer time on three
406 Chapter 9: Planar Graphs
Every planar graph has a 5−-vertex, but a 5-vertex is not reducible for 4-
colorability. We need configurations with small degree on more vertices, such as
in Example 9.3.11. Wernicke [1904] guaranteed a 5-vertex having at least one
6−-neighbor. We prove a stronger version to introduce “discharging ”.
The condition d(G) < 6 alone does not guarantee the conclusion. The graph
K 5 ,7 has no 5-vertex with a 6−-neighbor, despite (K 5 ,7) = 5 and d(K 5 ,7) < 6. We
needed planarity to find a cycle through the neighbors of a 7-vertex.
Section 9.3: Coloring of Planar Graphs 407
9.3.16. Lemma. A minimal graph G such that Ò (G) > ¾ has no edge of weight at
most ¾ + 1. That is, an edge of weight at most ¾ + 1 is reducible for Ò (G) ≤ ¾ .
Proof: Let L assign lists of size ¾ to the edges of G. If uv is an edge of weight
at most ¾ + 1, then let G = G − uv. If Ò (G ) ≤ ¾ , then G has an L-coloring á .
Since uv is incident to at most d G(u) + d G(v) − 2 edges, some color in L(uv) is not
used by á on any edge incident to uv. Using it on uv extends the coloring to G.
Always Ò l(G) ≥ (G). For equality, we seek a sparseness condition that guar-
antees occurrence of our reducible configuration. We measure sparseness by small
density, where density is usually defined to be | E(G)| / | V(G)|. Equivalently, and
more pertinently for discharging, we consider graphs with small average degree.
9.3.18. Remark. Degree charging and average degree. We want to show that some
set of configurations is unavoidable when d(G) is less than some value b. Discharg-
ing brings extra charge to vertices with initial charge less than b. Vertices with
higher initial charge can give charge but must keep at least b. As in Proposi-
tion 9.3.14, the goal is to show that if no desired configuration occurs, then every
vertex ends with charge at least b, which requires d(G) ≥ b and violates the hy-
pothesis. The argument proves the contrapositive of the structural claim.
An edge whose weight is at most some desired value is a light edge. More
generally, we can speak of light triangles, etc.
408 Chapter 9: Planar Graphs
9.3.19. Lemma. If (G) ≥ 2 and d(G) < ¾4+¾2 , then G has an edge of weight at most
+ 1 (a light edge). Furthermore, d(G) ≤ ¾4+¾2 is not sufficient. (In particular,
for ∈ {3 , 4 , 5 , 6}, respectively, d(G) < b suffices, where b ∈ { 12 8 20
5 , 3 , 7 , 3}.)
Proof: The conditions require ≥ 3, since d(G) ≥ (G). We show that if G has
no light edge, then d(G) ≥ b, where b = ¾4+¾2 . We use degree charging and move
charge so that every vertex ends with charge at least b. Here we give the proof
for 3 ≤ ≤ 6, leaving > 6 to Exercise 43.
When ≤ 6, we have b ≤ 3, so only 2-vertices need charge (when > 6, also 3-
vertices need charge). A 2-vertex v needs b− 2; let it take half from each neighbor.
Since G has no light edge, no neighbor of v needs charge, so v ends with charge b.
We also must show that all vertices still have charge at least b. With no
light edges, a 2-vertex has only +-neighbors, so only +-vertices lose charge. A
j-vertex loses b−2 2 to each 2-neighbor. Hence its final charge is at least j − j b−2 2 .
With j ≥ , it suffices to show − b−2 2 ≥ b, which holds when b ≤ ¾4+¾2 .
To prove sharpness, we construct a graph having average degree ¾4+¾2 and no
light edge. Form G by subdividing each edge in a -regular multigraph H. If
n = | V(H)| , then G has n + n/2 vertices and n edges (twice as many as H), for
average degree exactly ¾4+¾2 . However, every edge has weight + 2.
4 (G)
9.3.21. Theorem. If Mad(G) < (G)+2 , then l(G) = (G).
Proof: Always l(G) ≥ (G); we prove the upper bound. Deleting edges can re-
duce the degree, so to permit an inductive proof we prove more generally that
Mad(G) < ¾4+¾2 and (G) ≤ together imply l(G) ≤ . Since every subgraph
of a graph satisfying these hypotheses also satisfies them, it suffices to show that
every graph in this family contains a configuration that is reducible for l(G) ≤ .
We may ignore isolated vertices. Since (G) ≤ , the edge at a 1-vertex has
weight at most + 1. If (G) ≥ 2, then Lemma 9.3.19 yields an edge of weight at
most + 1. By Lemma 9.3.16, this configuration is reducible for l(G) ≤ .
This brings us to the special role of discharging on planar graphs. The Dis-
charging Method is particularly effective for planar graphs because the dual is
also planar and hence also has bounded average degree. Thus we may also use
charge on faces. Euler ’s Formula yields several ways to exploit this interaction.
9.3.24. Proposition. The following formulas hold for a connected plane graph
G, where F(G) denotes the set of faces and l(º ) is the length of a face º .
∑ (d(v) − 4) + ∑ (l(º ) − 4) = −8
v∈ V(G) º ∈ F(G)
Proof: Multiply Euler ’s Formula by 6 or 4 and split the contribution from the
number of edges, obtaining the three formulas below.
6n − 2m − 4m + 6p = 12; 6n − 4m − 2m + 6p = 12; 4n − 2m − 2m + 4p = 8.
Multiply each equation by −1 and substitute 12 ∑v∈V(G) d(v) for the first occur-
rence of m in each and 12 ∑º ∈ F(G) l(º ) for the second. Collecting the contributions
by vertices and by faces completes the proofs.
9.3.26. Remark. For triangulations, vertex charging puts charge 0 on all faces,
just a translation of degree charging. Dually, face charging puts charge 0 on all
410 Chapter 9: Planar Graphs
vertices in a 3-regular plane graph and can be useful for plane graphs with large
girth. Balanced charging treats vertices and faces symmetrically.
In each case, the total charge is negative. When a hypothesis allows moving
charge so that every vertex and face ends with nonnegative charge, the hypothesis
must be false. For example, there is no 4-regular bipartite plane graph, since un-
der balanced charging every vertex and face would start with nonnegative charge.
In discharging arguments, we call an element “happy” when it has enough
charge. For degree charging, usually “enough charge” means at least the bound
on the average degree. For the methods on planar graphs in Definition 9.3.25, it
means nonnegative charge. When every vertex and face is happy, the contradic-
tion disproves the assumption that permits the discharging.
Next we illustrate balanced charging and face charging by proving two of the
results mentioned in Remark 9.3.23. Later we illustrate vertex charging.
9.3.27. Lemma. Every planar graph G with girth at least 5 and (G) ≥ 2 has a
2-vertex with a 5− neighbor or an edge joining two 3-vertices.
Proof: Suppose that G has no such light edge. Use balanced charging (put
charge d(v) − 4 on each vertex v and l( ) − 4 on each face ; all faces have excess
charge). The total charge is −8. We obtain a contradiction by showing that each
element ends happy (nonnegative charge) under the following discharging rule:
(R1) Each vertex v takes 4−d(v)
d(v)
from each incident face.
The amount taken is negative when d(v) ≥ 5, which means that such vertices
give charge to faces. The rule immediately makes each vertex happy; they all end
with charge 0, having taken or sent charge equally from or to the incident faces.
It remains only to check that each face ends happy. Since light edges are
forbidden, a j-face loses charge to at most ⌊ 2j ⌋ vertices. Charge is lost only to
3−-vertices; a 3-vertex takes only 13 , but a 2-vertex takes 1.
When a j-face loses charge to a 2-vertex, the next vertex on the face is a 6+-
vertex since G has no light edge. The net loss to these two vertices is only 23 . For
a 3-vertex and its successor, which is a 4+-vertex, the loss is only 13 .
Hence a j-face ends with charge at least j − 4 − 23 ⌊ 2j ⌋ . This is nonnegative
when j ≥ 6. When j = 5 it is − 13 , but a 5-face with two incident 2-vertices has
three incident 6+-vertices, which provides the extra 13 to make it happy.
In principle, any method in Proposition 9.3.24 (or others) can be used in a dis-
charging argument on plane graphs, but one method may require more movement
of charge (and work) than another.
9.3.28. Lemma. Every planar graph G with girth at least 7 and (G) ≥ 2 has an
edge of weight at most 5.
Proof: Assume that G has no light edge. Use face charging (put initial charge
2d(v) − 6 on each vertex v and l( ) − 6 on each face ). Since G has girth at least
7, the only objects with negative initial charge are 2-vertices. Discharging:
(R1) Each 2-vertex takes 1
2 from each neighboring vertex and each incident face.
Section 9.3: Coloring of Planar Graphs 411
To complete the proof, we check that all vertices and faces end happy. The
discharging ensures that 2-vertices end with charge 0. Since 3-vertices have no
2-neighbors, their charge remains 0. For j ≥ 4, a j-vertex may lose 12 along each
edge and ends with charge at least 2 j − 6 − 2j , which is nonnegative.
A j-face has at most ⌊ 2j ⌋ incident 2-vertices, since 2-vertices are not adja-
cent. Hence a j-face has final charge at least j − 6 − 12 ⌊ 2j ⌋ , which is nonnegative
whenever j ≥ 8. To help the 7-faces, we add another discharging rule.
(R2) When an edge e joins 4+-vertices, redirect the charge 12 that each has avail-
able for a 2-neighbor so that instead the two faces bounded by e each receive 12 .
Now when a 7-face gives away 32 to three 2-vertices, it recovers 12 from the adjacent
4+-vertices on its boundary and ends with charge 0.
•
• •
• • •
• •
• •
9.3.29. Remark. Lemma 9.3.28 strengthens Lemma 9.3.16 for planar graphs; it
can also be proved by balanced charging (Exercise 67). The proof here shows both
“redirection” of transmitted charge and the possible need for extra discharging
to help elements that lose too much charge.
When d(G) < 125 and
(G) = 2, already Lemma 9.3.19 guarantees an edge of
weight 4, meaning adjacent 2-vertices. One may wonder what additional sparse-
ness is guaranteed as the average degree decreases toward 2. Instead of lighter
edges, we obtain longer threads, where an -thread is a path in G with inter-
nal vertices having degree 2 in G (see Exercise 53). Long threads are reducible
for various properties of colorability or decomposition.
We next use vertex charging to prove a classical result about light edges in a
planar graph G. When (G) = 5, Franklin’s result (Proposition 9.3.14) guaran-
tees a 5-vertex with two 6−-neighbors and thus an edge of weight at most 11.
When (G) = 2, we cannot guarantee a light edge: every edge in K 2 ,n−2 has
weight n. The fundamental result of Kotzig [1955] (known as Kotzig’s Theo-
rem) is that every 3-connected planar graph has an edge of weight at most 13.
We prove a stronger version due to Borodin [1989b]. A normal plane map is a
plane multigraph where every vertex degree and face length is at least 3.
9.3.30.* Lemma. (Borodin [1989b]) Every normal plane map G has an edge of
weight at most 11 or a 4-cycle through two 3-vertices and a 10−-vertex (and
hence an edge of weight at most 13 at a 3-vertex).
Proof: (Jendrol’ [1999], Cranston–West [2017]) Suppose that G has no edge of
weight at most 11. If any face has length more than 3, then adding a chord
joining the neighbors on of a lowest-degree vertex of does not create one of the
desired configurations. Hence any desired subgraph in a triangulation obtained
from G must have occurred in G.
412 Chapter 9: Planar Graphs
We may therefore assume that every face has length 3. Assign charge by
vertex charging and use this discharging rule (vertices take what they need):
(R1) Every 5− vertex v takes charge 6−d(v)
d(v)
from each neighbor.
Faces start and end with charge 0. Since we assume that G has no edge of
weight at most 11, only 7+-vertices lose charge. Hence 5−-vertices become happy
and 6-vertices remain happy.
Since G is a triangulation, the neighbors of a vertex v form a cycle C. With
d(v) = j and no light edges, at most ⌊ j/2⌋ vertices along C take charge from v. A
7-vertex loses charge only to 5-vertices, so it loses at most 3( 15 ). An 8-vertex loses
charge only to 4+-vertices and hence loses at most 4( 12 ). A 9+-vertex v loses charge
at most 1 to at most ⌊ d(v)/2⌋ neighbors; this leaves charge at least ⌈ d(v)/2⌉ − 6,
which is nonnegative when d(v) ≥ 11. Thus in these cases v remains happy.
This leaves d(v) ∈ {9 , 10}. If v has no 3-neighbor, then v loses at most ⌊ d(v)
2 ⌋ 2,
1
leaving nonnegative charge. Hence already we have proved that G must have an
edge of weight at most 13 at a 3-vertex.
In addition, any three consecutive vertices on C form a 4-cycle with v. Thus
avoiding the specified 4-cycle separates 3-vertices by at least three edges along C,
so v gives charge to at most ⌊ d(v)/3⌋ such vertices. If a 9-vertex v has at least
three 3-neighbors, then it has exactly three and loses no other charge. Hence a
9-vertex loses at most max{3 · 1 , 2 · 1 + 2 · 12 } and ends happy. A 10-vertex has
at most five 5−-neighbors, and with three 3-neighbors it can only have one other
5−-neighbor. It loses at most max{4 · 1 , 2 · 1 + 3 · 12 } and also ends happy.
Although the remainder of this section is optional, the proofs illustrate im-
portant aspects of discharging arguments, especially Theorem 9.3.32.
We return to the List Color Conjecture l(G) = (G). Thinking that possibly
(G) = (G) + 1 for some graph G with (G) = (G), Vizing conjectured (G) ≤
(G) + 1. Juvan–Mohar–Skrekovski [1998a, 1999] proved this for (G) ≤ 4.
Section 9.3: Coloring of Planar Graphs 413
For planar graphs, Borodin [1990] proved (G) ≤ (G) + 1 when (G) ≥ 9.
We use balanced charging to prove Borodin’s result. An interesting tool is a reser-
voir or “pot ” of charge that can flow to or from vertices or faces without regard
to location; this enables charge to move long distances. In this proof, the pot al-
lows charge to move from maximum-degree vertices to 3-vertices; we need not
name specific recipients. Notions analogous to the pot of charge for long-distance
transfer of charge appear in Havet–Sereni [2006] and Borodin–Ivanova [2009]; a
general term for such methods is global discharging.
9.3.32. Theorem. (Borodin [1990]) (G) ≤ (G) + 1 for planar G with (G) ≥ 9.
Proof: (Cohen–Havet [2010]) To ensure that the family is closed under taking
subgraphs, we prove more generally that if ≥ 9 and G is planar with (G) ≤ ,
then (G) ≤ + 1. Let G be a minimal counterexample, with L assigning lists of
size + 1 to edges so that G has no L-edge-coloring. By Lemma 9.3.16, edges with
weight at most + 2 are reducible. Hence we may assume that (G) ≥ 3 and that
every edge has weight least + 3. Since ≥ 9, edges have weight at least 12.
We use balanced charging and a pot of charge. Initially, the pot has charge 0.
Discharging that makes each vertex and face happy and maintains nonnegative
charge in the pot contradicts negative total charge. We use two discharging rules.
(R1) The pot takes 12 from every -vertex and gives 1 to every 3-vertex.
(R2) Each 3-face takes 12 from each incident 8+-vertex and j −j 4 from each incident
j-vertex with j ∈ {5 , 6 , 7}.
To ensure positive charge in the pot, we prove n¾ > 2n3 , where nj is the num-
ber of j-vertices in G. The edges incident to 3-vertices form a bipartite graph H
with the 3-vertices as one part and the -vertices as the other. Any cycle C in
H has even length, since H is bipartite. By minimality of the counterexample,
G − E(C) has an L-edge-coloring . Each edge of C has (G) − 1 incident edges
colored by , so it still has at least two available colors. Since even cycles are 2-
edge-choosable (Example 8.2.7), the L-edge-coloring extends to G. Thus G being
a counterexample requires H to be acyclic, with fewer than n3 + n¾ edges. Since
| E(H)| = 3n3 , we have 3n3 < n3 + n¾ , as desired.
3 3
• • • •
9.3.34. Remark. Even without planarity, we can study the effect of Mad(G) on
edge-coloring. Using the Vizing Adjacency Lemma (Corollary 8.3.11) and degree
charging, one can show that when (G) ≥ 8 the condition Mad(G) < 6 implies
Ò (G) = (G) (Exercise 64). In fact, Mad(G) < 6.5 suffices (Miao–Sun [2010]).
If Mad(G) < 2, then G is a forest, and Ò l(G) = Ò (G) = (G). Hence for both
Ò and Ò l there is a threshold on Mad(G) (in terms of (G)) to guarantee equaling
(G). Vizing [1968] conjectured that Mad(G) ≤ (G) − 1 implies Ò (G) = (G).
In fact, he conjectured 2 | E(G)| ≥ | V(G)| ( (G) − 1) + 3 for critical graphs. Fiorini
[1975] proved that Mad(G) < 14 (G) implies Ò (G) = (G).
Sanders–Zhao [2002] proved that Mad(G) < 12 (G) implies Ò (G) = (G), and
√
in fact 2 | E(G)| ≥ 12 | V(G)| ( (G) + 2 (G) − 1) when G is critical. This result
pioneered the interaction between Mad(G) and discharging; they described it as
“the first time that the discharging method is applied to a graph theory problem
in which Euler ’s formula is not used and embeddings of graphs in surfaces are
not mentioned.” Later, Woodall [2007] proved that Mad(G) < 23 ( (G) + 1) suffices.
Woodall [2010] conjectured that Mad(G) < (G)−1 also implies Ò l(G) = (G),
but here the results are much weaker. Using an “iterated discharging ” argument
as presented√ in Woodall [2010], Borodin–Kostochka–Woodall [1997] proved that
Mad(G) < 2 (G) implies Ò l(G) = (G).
For ordinary proper coloring, the Four Color Theorem begs the question of
which planar graphs are 3-colorable. Grötzsch [1959] proved that planar triangle-
free graphs are 3-colorable; other proofs (all using discharging) are by Thomassen
[1994a], Dvořák–K awarabayashi–Thomas [2011] (with a linear-time algorithm
to find a proper 3-coloring), and Kostochka–Yancey [2014] (see Exercise 31).
The traditional proof of the lemma for the result of Sanders–Zhao [1995] and
Borodin [1996a] uses balanced charging, but by face charging it is a bit simpler.
9.3.36. Lemma. (Borodin [1996a]) Every 2-connected plane graph G such that
(G) ≥ 3 has two 3-faces with a common edge, or a j-face with 4 ≤ j ≤ 9, or a
10-face whose vertices all have degree 3.
Proof: Let G be a plane graph with (G) ≥ 3 and no such configuration. Use face
charging (2d(v) − 6 on each vertex v and l( ) − 6 on each face ). The total charge
is −12. With no 4-faces or 5-faces, only triangles start with negative charge, −3.
(R1) Each 3-face takes 1 from each neighboring face.
(R2) Each non-triangular face takes 1 from each incident 4+-vertex lying on a
triangle sharing an edge with (to help faces that lose too much).
Here (R1) makes 3-faces happy (since no two 3-faces share an edge), and 3-
vertices remain at charge 0. For j ≥ 4, a j-vertex loses charge at most ⌊ 2j ⌋ (since
3-faces do not share edges) and ends with at least ⌈ 32j ⌉ − 6, which is nonnegative.
For j ≥ 10, a j-face loses 1 for every path along its boundary such that the
neighboring faces are triangles and the endpoints have degree 3, as shown on the
left below. Face gives 1 to each of those 3-faces but takes 1 from each interven-
ing vertex, since forbidding 3-faces with shared edges requires the intervening
vertices to have degree at least 4. If an endpoint of a maximal such path has de-
gree at least 4, then there is no net loss. Hence the net loss for is at most ⌊ 2j ⌋ ,
and the final charge is at least ⌈ 2j ⌉ − 6, which is nonnegative when j ≥ 11.
Hence negative charge occurs only at 10-faces. Losing more than 4 requires
losing 1 through five paths. The paths must be single edges sharing no vertices,
and all the vertices incident to must have degree 3, as on the right below.
•
• • • •
• •
↓ ↑→← ↑ →←↑ ↓ • • • •
→ • ↑ • ↑ • ←
• ↑ ↓ ↓ ↓
↑ • • •
• • • •
• •
•
• • • • • • •
a a
b • • • • • • • b
c c
• • • • • • •
•
EXERCISES 9.3
9.3.1. (−) Prove that every maximal plane graph other than K4 is 3-face-colorable.
9.3.2. (−) Exhibit 3-regular graphs with these properties:
(a) planar but not 3-edge-colorable.
(b) 2-connected but not 3-edge-colorable.
(c) planar with connectivity 2, but not Hamiltonian.
9.3.3. (−) Prove that a 2-edge-connected plane graph is 2-face-colorable if and only if it is
Eulerian.
9.3.4. (−) Use the Four Color Theorem to prove that every planar graph decomposes into
two bipartite graphs. (Hedetniemi [1969], Mabry [1995])
9.3.5. (−) Prove that every graph with maximum average degree at most d is d-
degenerate. Prove that every d-degenerate graph has maximum average degree at most
2d. Give infinitely many examples to show that the second statement is nearly sharp.
9.3.6. (−) Prove or disprove: Every triangle-free planar graph is 4-choosable.
9.3.7. (−) Prove or disprove: For ¾ sufficiently large, a graph G with (G) = and d(G) <
+ 1 has adjacent -vertices.
9.3.8. (−) Let G be a planar graph with girth at least 6 and (G) ≥ 2. By Lemma 9.3.19,
G has an edge with weight at most 7. Prove sharpness by constructing a planar graph
with girth 6 and minimum degree 2 having no edge with weight at most 6.
9.3.9. Reduction of Four Color Problem to Tait’s conjecture. Let G be a 3-regular graph
with edge-connectivity 2. (Recall that (G) = (G) when G is 3-regular.)
(a) Prove that there exist subgraphs G1 , G 2 ⊆ G and vertices u1 , v1 ∈ V(G1) and
u2 , v2 ∈ V(G 2) such that u1 v1 , u2 v2 ∈
/ E(G) and G consists of G1 , G 2 , and a “ladder ” (of
some length) joining them at {u1 , v1 , u2 , v2 } as illustrated below.
(b) Prove that (G1 + u1 v1) = (G 2 + u2 v2) = 3 implies (G) = 3.
(c) Use Tait ’s Theorem (Theorem 9.3.1) to reduce the Four Color Theorem to Tait ’s
Conjecture: “every simple 3-regular 3-connected planar graph is 3-edge-colorable.”
v1 • • • • v2
G1 G2
u1 • • • • u2
418 Chapter 9: Planar Graphs
• • • • • •
• • • • •
• • • • • •
• • • • • • • •
• • • • • • •
•
• • • • • •
9.3.13. (♦) Use Grinberg ’s Theorem to prove that the Grinberg graph (on the left below)
is not Hamiltonian.
•
• •
• • • • •
• • • • • • •
• • •• •• • • • • • • • • •
• • • • • • •
• • • • • • • • •
• • • • •
• • • • • • •
• • •
• • •
• •
9.3.14. Give a short proof that the graph on the right above is not Hamiltonian. Show
that Grinberg ’s Theorem cannot be used directly to prove this. Show that Grinberg ’s
Theorem does apply to a modification of the graph.
9.3.15. The smallest known 3-regular 3-connected planar graph that is not Hamiltonian
has 38 vertices and appears on the left below. Prove that this graph is not Hamiltonian.
(Lederberg [1966], Bosák [1967], Barnette)
• • •• • • • • •
• • A B A A
• • •
• • • • • • • • • •
• • • • • • • • • • ••• • B B B A
• •• • • • • • • •
• • B A B A
• • • • • • • •
9.3.16. (♦) Let G be the grid Pr P s . Let Q be a Hamiltonian path from the upper left cor-
ner vertex to the lower right corner vertex, such as that shown on the right above in bold.
Note that Q partitions the grid into regions, some opening to the left or downward and
others opening to the right or upward. Prove that the total area of the up-right regions
(B) equals the total area of the down-left regions (A). (Fisher–Collins–Krompart [1994])
Exercises for Section 9.3 419
9.3.17. Prove that an outerplanar graph can be 2-colored so that the subgraph induced
by each color class is a disjoint union of paths. (Mihók [1983], Akiyama–Era–Gervacio–
Watanabe [1989], Goddard [1991])
9.3.18. Prove that a planar graph can be 2-colored so each color class induces an outerpla-
nar graph. (Chartrand–Geller–Hedetniemi [1971], Buršteı̆n [1974], Penaud [1975])
9.3.19. Prove that every outerplanar graph can be properly 3-colored so that the union of
any two color classes induces a forest. Conclude that the vertices of an outerplanar graph
can be partitioned into an independent set and a set inducing a forest so that the indepen-
dent set has at least 1/3 of the vertices.
9.3.20. (♦) Short proof of the Five Color Theorem. Let v be a 5-vertex in a graph G. Given
that x and y are nonadjacent neighbors of v, let G be the graph obtained from G by con-
tracting the edges vx and vy. Prove that if G is 5-colorable, then G is 5-colorable. Use
this to prove by induction that every planar graph is 5-colorable. (Kainen [1974])
9.3.21. Albertson–Berman [1979] and Akiyama–Watanabe [1987] conjectured that ev-
ery n-vertex planar graph has an induced subgraph with at least ⌈ n/2⌉ vertices that is a
forest. This would yield an independent set of at least ⌈ n/4⌉ vertices without using the
Four Color Theorem. Show that the conjecture is sharp by constructing an n-vertex pla-
nar graph having no induced forest with more than ⌈ n/2⌉ vertices. Akiyama–Watanabe
[1987] also conjectured that every n-vertex bipartite planar graph has an induced forest
with at least ⌈ 5n/8⌉ vertices; show that this conjecture also is sharp.
9.3.22. Without using the Four Color Theorem, prove that every Hamiltonian plane
graph is 4-face-colorable (nothing is assumed about the vertex degrees).
9.3.23. (♦) Let G be a maximal plane graph. Prove that G∗ has a 2-factor and use it to
show that V(G) can be 2-colored so that both colors appear on each face. Obtain the same
conclusion from the Four Color Theorem. (Buršteı̆n [1974], Penaud [1975])
9.3.24. (♦) Thomassen [1995b] proved that the vertices of any planar graph can be parti-
tioned into sets inducing a forest and a 3-degenerate graph. To generalize this, prove for
¾
d1 , . . . , d ¾ ∈ 0 and d ≤ ¾ − 1 + ∑i=1 d i that the vertices of any d-degenerate graph can
be partitioned into sets V1 , . . . , V¾ such that G[Vi ] is d i-degenerate for 1 ≤ i ≤ ¾ .
9.3.25. (♦) The Art Gallery Theorem. (Chvátal [1975], Fisk [1978])
(a) Prove that outerplanar graphs are 3-colorable (without the Four Color Theorem).
(b) Prove that an art gallery laid out as an n-gon can be protected by ⌊ n/3⌋ guards so
that every point of the interior is visible to some guard.
(c) For each n, construct an art gallery with n outer segments that cannot be watched
by fewer than ⌊ n/3⌋ guards.
9.3.26. (♦) An art gallery with walls is a polygon plus nonintersecting chords called “walls”
that join vertices. Each interior wall has a tiny “doorway”. A guard in a doorway can see
along both sides of the wall containing it , but no guard can see through a wall. Determine
the least t such that for every walled art gallery with n vertices, one can place t guards so
that every interior point is visible to some guard. (Hutchinson [1995], K ündgen [1999])
9.3.27. (♦) Heawood [1898] stated that a maximal planar graph is 3-colorable if and only
if it is Eulerian. Golovina–Yaglom [1963] proved it (Hutchinson [2001] generalized it).
(a) Prove that every 3-colorable triangulation (including multigraphs) is Eulerian.
(b) Let G be an even plane graph with all bounded faces having length 3. By Exercise
9.1.49, G has a noncrossing Eulerian circuit. Prove that every subcircuit has length di-
visible by 3. Conclude that G is 3-colorable. (Tsai–West [2011])
(c) Let G be as in part (b). Prove that G is 3-colorable using the fact that the dual is
bipartite. (Hint: Use induction on the number of bounded faces.) (Lovász [1993])
420 Chapter 9: Planar Graphs
9.3.28. (♦) Prove that every 3-colorable planar graph is a subgraph of some 3-colorable
triangulation. (Comment: C5 is not a spanning subgraph of a 3-colorable triangulation;
hence it may be necessary to add vertices.) (Król [1972])
9.3.29. Use the Four Color Theorem to prove that every 2-edge-connected 3-regular graph
that can be drawn in the plane with only one edge-crossing is 3-edge-colorable.
9.3.30. Gr ötzsch’s Theorem states that every triangle-free n-vertex planar graph G is
3-colorable, so (G) ≥ n/3. Tovey and Steinberg showed (G) > n/3. Prove sharpness using
the following graphs. Let G1 be the 5-cycle, with vertices a , x0 , x1 , y1 , 1 in order. For >
1, obtain G ¾ from G ¾−1 by adding three vertices x¾ , y¾ , ¾ , the path ⟨x¾−1 , x¾ , y¾ , ¾ , y¾−1 ⟩
and the edge ¾ x¾−2 . The graph G3 appears below. (Fraughnaugh [1985])
x0 x1 x2 x3
• • • •
• • • • • • •
a 1 y1 2 y2 3 y3
9.3.31. (♦) Kostochka–Yancey [2014] proved (using some discharging)that every 4-critical
n-vertex graph has at least ⌈ (5n − 2)/3⌉ edges (conjectured by Ore [1967]). Use their result
to prove Grötzsch’s Theorem: Every triangle-free planar graph is 3-colorable.
9.3.32. It has been conjectured that every planar triangulation has edge-chromatic num-
ber (G), and this has been proved for sufficiently large (G). Show that (G) = (G) for
the icosahedron, shown on the left below.
• • • •
•
• • •
•
• • • • •
• • • • • •
• • • •
•
• • •
9.3.33. An equitable coloring of a graph is a proper coloring whose color classes differ in
size by at most 1. Let G n be the graph formed from n concentric 4-cycles triangulating the
region between any two consecutive 4-cycles (each vertex has two consecutive neighbors on
the other 4-cycle); G4 appears above on the right.) Prove that for G n with n even and for
the icosahedron (on the left above), every proper 4-coloring is equitable. (M. Albertson)
9.3.34. (♦) Non-4-choosable planar graph with 75 vertices.
(a) Prove that the graph below cannot be properly colored from the given lists; the
vertices of degree 5 have lists of size 1 and the others have lists of size 4.
(b) Use part (a) to construct a 3-colorable planar graph with 75 vertices that is not
4-choosable. (Gutner [1996])
x
•
xa12
• •xb34
xy12• • xyab • xy34
• •yb34
ya12
•
y
Exercises for Section 9.3 421
9.3.40. Sharpness of Steinberg’s Conjecture. Construct two plane graphs with chromatic
number 4, one having no 5-cycles and the other having no 4-cycles.
9.3.41. (+) Arboricity of planar graphs. Let u be a 5-vertex in a plane triangulation G. Let
N(u) = {v, w , x , y , }, ordered so [v , w, x , y , ] is a cycle. Form G from G − u by adding
the edges vx and vy. Prove that if G decomposes into three forests, then also G decom-
poses into three forests. Conclude that every planar graph decomposes into three forests.
(Comment: Balogh–Kochol–Pluhár–Yu [2005] proved that one of the three forests can be
required to have maximum degree at most 8. Gonçalves [2009] reduced 8 to 4.)
9.3.42. Every graph G with Mad(G) < + 1 is -degenerate. Disprove the converse: for
each ∈ with ≥ 2 construct a -degenerate graph with average degree at least + 1.
9.3.43. Let G be a graph with (G) ≥ 2 and d(G) < ¾4+¾2 . Complete the proof of Lemma
9.3.19 by proving when > 6 that G has an edge with weight at most + 1.
422 Chapter 9: Planar Graphs
9.3.55. Prove that if d(G) < 25 and G is connected, then G contains a 3− -vertex with
a 1-neighbor, a 4− -vertex with two 2−-neighbors, or a 5+ -vertex v having at least d(v)2−1
neighbors of degree at most 2. (Cranston–Jahanbekam–West [2014])
9.3.56. Let G be a connected graph with at least four vertices. Prove that if d(G) < 52 and
(G) ≥ 2, then G contains a 2-thread or a 3-vertex having three 2-neighbors, one of which
has a second 3-neighbor. (Cranston–Kim–Yu [2010])
9.3.57. (♦) Prove that every planar graph with minimum degree 5 contains two 3-faces
sharing an edge with weight at most 11. (Borodin [1996b])
9.3.58. Prove that every plane triangulation with minimum degree 5 has two 3-faces shar-
ing an edge such that the non-shared vertices have degree-sum at most 11. (Comment:
With this and a 4− -vertex as an unavoidable set , Albertson [1976] proved that (G) ≥ 2n/9
when G is an n-vertex planar graph, without using the Four Color Theorem.)
9.3.59. (♦) Say that a plane graph is clean if no two 3-faces share an edge. For ≥ 7, prove
that a clean plane graph G with (G) ≤ has an edge with weight at most + 2. Conclude
that l(G) ≤ (G) + 1 when G is a clean plane graph with (G) ≥ 7. (Comment: Cranston
[2009] proved the same conclusion for (G) = 6, strengthening several earlier results.)
9.3.60. (♦) For (G) ≥ 2, prove that (G) ≤ 6 and d(G) < 27 guarantee in G an edge with
weight at most 7 or a cycle alternating between 2-vertices and 6-vertices. Conclude that
(G) ≤ 6 and Mad(G) < 27 imply ç(G) ≤ 6. (Hint: Use degree charging and a pot of charge.
Comment: This result strengthens Theorem 9.3.21.)
9.3.61. (+) Light triangles. Let G be a planar graph with minimum degree 5. Proposition
9.3.14 guarantees weight at most 17 on some three-vertex path.
(a) Prove that G contains a 3-face with weight at most 17 (Borodin [1989a])
(b) Provide a single example to show that smaller weight cannot be guaranteed. Show
that (G) = 5 is needed by constructing for each ∈ a planar graph with minimum
degree 4 having no 3-face with weight at most .
9.3.62. Let G be a plane graph having no 4-cycle and no face length in {4 , . . . , }. Prove
that the average face length is at least 6 − ¾18
+4 . Conclude Mad(G) < 3 + 2¾ −1 . In particular,
9
9.3.67. Use balanced charging to prove that every planar graph with girth at least 7 and
minimum degree at least 2 has a 2-vertex adjacent to a 3− -vertex. Prove that the conclu-
sion does not always hold when Mad(G) < 14
5
(thus planarity is needed).
9.3.68. A dynamic coloring is a proper coloring with each vertex v adjacent to vertices
of at least min{2 , d(v)} colors (Montgomery [2001]). A graph is dynamically ¾-choosable
if a dynamic coloring can be chosen from any vertex lists of size ¾ (Kim–Park [2011]).
(a) Prove that every cycle of length at least 6 is dynamically 4-choosable.
(b) Prove that except for C5 , a minimal graph among those that are not dynamically
4-choosable cannot contain an edge of weight at most 5.
(c) Prove that every planar graph with girth at least 7 is dynamically 4-choosable, but
some planar graphs with girth 6 are not dynamically 4-choosable.
9.3.69. (♦) Prove that every planar graph has a 5− -vertex with at most two 12+-neighbors.
(Comment: Balogh–Kochol–Pluhár–Yu [2005] strengthened 12 to 11; see Exercise 9.3.41.
van den Heuvel–McGuinness [2003] applies this to coloring squares of planar graphs.)
9.3.73. An injective coloring gives distinct colors to vertices with a common neighbor,
and the injective chromatic number, written i(G), is the minimum number of colors
in an injective coloring of G. Injective colorings need not be proper colorings.
(a) Determine the injective chromatic numbers of C5 and the Petersen graph.
(b) Let G be a graph with (G) = 2 and (G) = 3. Prove that if d(G) < 13 36
and G has
no 2-vertex in a triangle, then G has vertices x and y of degree 2 such that d(x , y) ≤ 3.
(Hint: 2-vertices may need more charge than their neighbors can provide.)
(c) Given (G) ≤ 3 and Mad(G) < 13 36
, prove i(G) ≤ 5. (Cranston–Kim–Yu [2010])
(d) Use the graph obtained by deleting one vertex from the Heawood graph (Exercise
6.2.27) to prove sharpness for parts (b) and (c).
Chapter 10
Ramsey Theory
Ramsey theory, named for Ramsey ’s Theorem, is the study of patterns in
partitions of large structures. A simple special case of Ramsey ’s Theorem is the
intuitively obvious Pigeonhole Principle. Partitioning theorems in general state
that some class in the partition must have special properties.
Motzkin described this informally by saying “Complete disorder is impossi-
ble”. Stargazers have always found interesting patterns of stars and given them
names; Ramsey Theory implies that any given pattern must occur (scaled) if there
are enough stars. Similarly, any sufficiently large amount of data (baseball statis-
tics, letters in the Bible, etc.) must have patterns with special structure.
Books on the subject include Graham–Rothschild–Spencer [1980, 1990],
Nešet řil–Rödl [1990], Soifer [2011], Prömel [2013], and Landman–Robertson
[2014], and recent developments are surveyed in Sudakov [2010] and Conlon–
Fox–Sudakov [2015]. Graham–Butler [2015] provides an introduction.
425
426 Chapter 10: Ramsey Theory
CL ASSICAL APPLICATIONS
10.1.4. Example. Midpoints between lattice points. Given five integer points in
the plane, the midpoint of the segment joining some pair also has integer coor-
dinates. The midpoint between (a , b) and (c , d) is ( a+ c b+ d
2 , 2
). This is an integer
point if and only if a and c have the same parity and b and d have the same parity.
Hence we group integer points by parity of coordinates: (odd/even, odd/even).
With five points, two must be in the same class and yield a lattice midpoint. With
four points, we may have one in each class and no lattice midpoint.
10.1.5. Example. Covering K n with bipartite graphs. We prove that the minimum
number of bipartite graphs with union K n is ⌈ log2 n⌉ . Equivalently, a complete
graph covered by ¾ bipartite subgraphs has at most 2¾ vertices. (Exercise 8.1.37
presents a generalization; the Pigeonhole Principle is not actually needed.)
Suppose that K n is covered by bipartite subgraphs G 1 , . . . , G ¾ , with G i hav-
ing bipartition {X i , Yi}. We may assume that each G i contains all the vertices,
since adding isolated vertices does not introduce odd cycles.
For each vertex v, define a binary ¾-tuple a by setting ai = 0 if v ∈ X i and
ai = 1 if v ∈ Yi . There are only 2¾ binary ¾-tuples. If n > 2¾ , then two vertices
have the same code. They lie in the same part in each G i , so the edge between
them is not covered. Thus n ≤ 2¾ .
To show that n = 2¾ is achievable, assign distinct binary ¾-tuples to the ver-
tices. The ith bipartite subgraph consists of all edges joining vertices with ith
coordinate 0 to vertices with ith coordinate 1. Since the ¾-tuples are distinct, ev-
ery edge is covered by some such subgraph. Indeed, edges joining complementary
codes appear in each subgraph.
Section 10.1: The Pigeonhole Principle 427
10.1.6. Example. Forcing divisible pairs. Erdős [1935] observed that any set of
n + 1 numbers in [2n] contains a pair such that one divides the other. This is
sharp: the n largest numbers in [2n] contain no such pair. To apply the Pigeon-
hole Principle, we partition [2n] into n classes such that for every two numbers
in the same class, one divides the other.
Every natural number is uniquely expressed as an odd number times a power
of 2. For fixed ¾ , the set {(2 ¾ − 1)2 j −1 : j ∈ } has the desired property; the smaller
of any two divides the larger. Since only n odd numbers are less than 2n, we have
n such classes. The ¾ th class is {m ∈ [2n]: m = (2 ¾ − 1)2 j −1 and j ∈ }.
Like Example 10.1.5, Example 10.1.6 can be viewed as an extremal problem.
How many elements can be chosen from [2n] such that none divides another? The
Pigeonhole Principle may establish a bound, and a construction can show that the
bound is best possible. Nevertheless, presenting a construction and showing that
no element can be added does not prohibit larger configurations. For example,
we can avoid divisible pairs in Example 10.1.6 by first selecting primes. When
n = 5, this yields {2 , 3 , 5 , 7}, but now we cannot add any more elements. Our set
is maximal but not maximum-sized: {6 , 7 , 8 , 9 , 10} is a larger example.
In a tiling, every domino cuts one line between adjacent rows or between ad-
jacent columns. There are 18 dominoes and 10 possible lines to be cut, so the
average number of cuts per line is 1.8. Since some line cuts at most the average,
some line is cut at most once, but perhaps still every line is cut at least once.
428 Chapter 10: Ramsey Theory
It suffices to show that every line is cut by an even number of dominoes, since
then a line cut by at most one is not cut at all. Since the number of squares on
one side of a line is even, and dominoes pair an even number of those, the number
covered by dominoes crossing the line must also be even.
The next theorem implies the result of Graham–Harary [1992] that every
spanning tree of Q¾ has diameter at least 2 ¾ − 1.
v u
• •
• •
u v
10.1.11. Example. The Chess Player Problem. A chess player wants to practice
for a match for 11 weeks. She wants to play at least one game per day but at most
132 games altogether. No matter how she schedules the games, there is a period
of consecutive days (among the 77 days) on which she plays exactly 22 games.
We can study totals over consecutive days by considering partial sums. Let ai
be the number of games played on days 1 through i, and set a0 = 0. The number of
games played on days i + 1 through j is aj − ai . We seek i , j such that ai + 22 = aj .
This suggests considering both {aj : 1 ≤ j ≤ 77} and {ai + 22: 0 ≤ i ≤ 76}. With at
least one game each day, each of these sets consists of 77 distinct numbers. Hence
repetition among these 154 numbers implies the desired result. Since a77 ≤ 132,
and a76 + 22 ≤ 153, we have 154 numbers in [153], and some number repeats.
Because a76 + 23 can be as large as 154, this argument does not force a period
of consecutive days with exactly ¾ games when ¾ ≥ 23.
With a total of at most b games on d consecutive days, the partial sum tech-
nique in Example 10.1.11 guarantees consecutive days with a total of ¾ games
when ¾ ≤ 2d − b. Another trick for ¾ ∈ {23 , 24 , 25} leads to a general solution.
For a circular analogue of the problem, see Clark–Lewis [1989, 1993].
MONOTONE SUBLISTS
By the Pigeonhole Principle, some two pairs are the same. However, when
i < j and ai < aj we can add aj to a longest increasing sublist ending at ai . When
i < j and ai ≥ aj , we can add aj to a longest decreasing sublist ending at ai .
Exercise 28 requests a list proving that the result is sharp.
10.1.15. Theorem. (de Bruijn, unpublished; see Kruskal [1953]) A list of more
d
than l2 d-dimensional vectors has a monotone sublist with more than l vec-
d
tors. Length l2 does not suffice.
Proof: The Erdős–Szekeres Theorem is the case d = 1; we use induction on d.
d−1
For d > 1, the given list A has a sublist B of length more than l2 in which the
last coordinate is monotone. By the induction hypothesis, the (d − 1)-dimensional
list B formed by the first d − 1 coordinates of the vectors in B has a monotone
(d − 1)-dimensional sublist C of length more than l. Since the last coordinate is
monotone over all of B, the positions in B corresponding to C form a d-dimensional
monotone sublist of A.
Exercise 28 requests a list proving that the result is sharp.
10.1.16. Theorem. In any n-vertex graph with m edges having distinct numeri-
cal labels on the edges, there is an increasing trail of length at least 2m/n.
Proof: Consider n pedestrians on the graph, starting one at each vertex. Process
each edge, in order of the labels, by switching the pedestrians on its endpoints
and adding 1 to the number of times each of those two have moved. Always each
vertex has one pedestrian. Each pedestrian follows an increasing trail. The total
movement is 2m. By the Pigeonhole Principle, some pedestrian follows a trail of
length at least 2m/n.
The equalities of Example 10.1.18 fail for longer patterns. Bóna [1997] gave
the first example of and of equal length such that Sn( )
= Sn( ), proving
Sn(1234) < Sn(1324). (For this and other pattern results, see Bóna [2004].)
One property of 3-element patterns does generalize. Note that n+1 1 (2n n
) ∼
cn − 4 for a constant c (Example 2.3.10). Stanley and Wilf conjectured around
3/2 n
most 15º (n) P-avoiding matrices of order 2n, where º (n) is the maximum number
of 1s in a P-avoiding matrix of order n.
We have proved | T2n | ≤ | T n| 15º (n) . The Füredi–Hajnal Conjecture is º (n) ≤
¾ −1
cP n. For n = 2¾ , iterating the recurrence yields | T n | ≤ | T1 | 15cP ¾=1 2 ≤ (15cP )n ,
n
¾ (¾¾ ) tall blocks). Each wide block has ¾ nonzero columns among its ¾ 2 columns,
2
and there are (¾¾ ) possible such sets. With ¾ (¾¾ ) wide blocks in a column of blocks,
2 2
the some ¾ wide blocks are nonzero in the same set S of ¾ columns. We use the
ith highest among these ¾ blocks to cover the 1 in the ith row of P , using the
appropriate column in S. That is, in this column of S the block has a 1 in some
row, and we use that row from this block. This contradicts that A avoids P.
We thus have at most ¾n2 ¾ (¾¾ ) wide blocks and the same bound on the number
2
of tall blocks. Since A avoids P , at most º (n/¾ 2) nonzero blocks are neither wide
nor tall. Such a block has at most (¾ − 1)2 nonzero entries, and we use the trivial
bound of ¾ 4 on the nonzero entries in wide and tall blocks. We now have
n ¾2 n
º (n) ≤ 2 ¾ 4 ¾ ( ) + (¾ − 1)2 º ( 2 ) .
¾ 2 ¾ ¾
When n is not a multiple of ¾ 2 , consider a submatrix whose order is the next
smaller multiple of ¾ 2 ; call it n . Fewer than 2 ¾ 2 n positions are lost; at worst
they could all be 1. We now prove the desired bound by induction. We compute
n ¾2
º (n) < º (n ) + 2 ¾ 2 n ≤ (¾ − 1)2 º ( 2 ) + 2 ¾ 3 ( )n + 2 ¾ 2 n
¾ ¾
¾ 2
n ¾ 2
≤ (¾ − 1)2 [2¾ 4 ( ) ] + 2 ¾ 3 ( )n + 2 ¾ 2 n
¾ ¾ 2 ¾
¾ 2
¾2
≤ 2¾ 2 ((¾ − 1)2 + ¾ + 1) ( )n ≤ 2¾ 4 ( )n ,
¾ ¾
Erdős proved by probabilistic arguments that graphs exist with large girth
and large chromatic number. Explicit constructions came later. The construction
we present intimately involves the Pigeonhole Principle, applying it iteratively
in a way that generates very large structures to ensure the existence of a special
substructure. (The proof of Ramsey ’s Theorem in Section 10.2 will also do this.)
To motivate the hypergraph-based construction, we first construct graphs
with girth 6 and large chromatic number. This may be the earliest construction of
triangle-free graphs with large chromatic number. It appeared in an undergrad-
uate magazine at Cambridge University. “Blanche Descartes” was a pseudonym
used by R.L. Brooks, C.A.B. Smith, A.H. Stone, and W.T. Tutte when under-
graduates together at Cambridge; all became mathematicians.
10.1.24. Example. Graphs with girth 6 and high chromatic number (Blanche
Descartes [1947, 1954], Kelly–Kelly [1954]). Like Mycielski’s construction, this
is inductive; we start with C6 for = 2. The construction increases chromatic
number but preserves girth 6. Let G be a ( − 1)-chromatic graph with girth 6.
To construct G , let r = | V(G)| and N = (r − 1)( − 1) + 1. Begin with a set
S of N isolated vertices. Add ( Nr ) copies of G, one for each r-subset of S. For
1 ≤ i ≤ ( Nr ), add a matching from the ith copy of G to the ith r-set in S. The
resulting graph is G . A cycle visiting more than one copy of G has at least one
interior edge and two departing edges from each copy it visits. Thus cycles in G
not in one copy of G have at least six edges.
A proper ( − 1)-coloring of G can be extended to a -coloring of G by using
that ( − 1)-coloring on each copy of G and using a new color on S. In any ( − 1)-
coloring of G , by the Pigeonhole Principle some r vertices of S have the same
color. This color is forbidden from the copy of G corresponding to this r-set. Since
this copy of G cannot be properly ( − 2)-colored, we conclude that (G ) = .
G G G G
•••• •••• ( Nr ) copies
•••••• S
Section 10.1: The Pigeonhole Principle 435
10.1.26. Example. Let F be the 3-uniform 7-vertex hypergraph with edge set
{124, 235, 346, 457, 561, 672, 713}. Three consecutive vertices contain no edge,
so (F) ≤ 3. To show (F) = 3, consider a 2-coloring; some four vertices have the
same color. Any four vertices not having three consecutive include three vertices
of the form i , i + 1 , i + 3, forming an edge. A 4-set containing i , i + 1 , i + 2 avoids
completing an edge only by adding i + 5, but then the three vertices with the
other color form an edge. Hence every 2-coloring has a monochromatic edge. (This
hypergraph is known as the Fano plane; see Chapter 13).
H2
H1 A2 H3
A1 A3
A5 A4
H5 H4
V(Y)
The first conjecture sounds a bit artificial, but they are equivalent, and both
are known as the Erdős–Faber–Lovász Conjecture. Conjecture 10.1.33 is a way
of stating Conjecture 10.1.34 in the language of ordinary graph coloring. The
transformation uses hypergraph duality.
In forming H ∗ from H , vertices and edges exchange roles, but the incidences
remain the same (multiedges arise in H ∗ when vertices in H have the same in-
cident edges). Proper edge-coloring of H is more restrictive than proper vertex
coloring of H ∗ ; it is equivalent to coloring V(H ∗) so that in each edge of H ∗ the
vertices all have distinct colors.
only if its dual is linear, since both mean forbidding a 2-by-2 all-1 submatrix in
the incidence matrix. By discarding elements of V that lie in only one clique in
G, we have ensured that the dual hypergraph H ∗ has no edge of size 1. Thus H ∗
is a simple hypergraph, and G is n-colorable if and only if H ∗ is n-edge-colorable.
The transformation from G to H ∗ is reversible. A simple hypergraph H ∗ with
n vertices has each vertex in at most n − 1 edges, since no other vertex is in two
such edges. Hence the dual hypergraph H is a simple hypergraph with n edges of
size at most n − 1. Augmenting these edges gives Q1 , . . . , Qn and G.
candidates for the edge uw. Similarly, colors in B − A do not appear at u. Since
colors in A − B specify distinct edges containing u and colors in B − A specify
distinct edges containing v, it suffices to prove | A − B| + | B − A| ≥ n − 1.
We count the ⌈ 3n/2⌉ − 2 colors present at u and/or v. A color not in A ∪ B
appears on an edge of size at least 3 containing u or v. Since each color in A elim-
inates a potential neighbor of u from such edges and we also exclude {u , v}, there
are at most (n − | A| − 2)/2 such edges containing u. Similarly, there are at most
(n − | B| − 2)/2 such edges containing v. Having counted all the colors, we have
| A ∪ B| + (n − | A| − 2)/2 + (n − | B| − 2)/2 ≥ ⌈ 3n/2⌉ − 2 ≥ (3n − 5)/2.
This simplifies to 2 | A ∪ B| − (| A| + | B|) ≥ n − 1. Since the left side equals | A − B| +
| B − A| , the proof is complete.
EXERCISES 10.1
10.1.1. (−) Prove that every graph with at least three vertices, all of even degree, has at
least three vertices with the same degree.
10.1.2. (−) Prove that every set of 2 n + 1 integer lattice points in n
contains a pair of
points whose centroid (mean vector) is also an integer lattice point.
10.1.3. (−) Prove that any√set of five points in a square of area 1 contains two points sepa-
rated by distance at most 2/2 and that no closer distance can be forced.
10.1.4. (−) Determine the least ¾ such that every ¾-element subset of [2n] contains two
relatively prime elements.
10.1.5. (−) Determine the least ¾ such that every ¾-element subset of [3n] contains three
consecutive numbers.
10.1.6. Given n , ¾ ∈ , determine the maximum size of a subset of [n] that has no two
numbers differing by ¾ .
10.1.7. (♦) Determine the least n such that every set of n integers contains two elements
whose sum or difference is a multiple of ¾ .
10.1.8. Prove that every set of 2 ¾ integers has elements of opposite parity differing by at
least 2 ¾ − 1 or elements of equal parity differing by at least 4 ¾ − 2.
10.1.9. Use the Pigeonhole Principle to prove that for every rational number, the decimal
expansion is eventually repeating.
10.1.10. Generalization of Example 10.1.6. Show that every set of (2 m − 1)n + 1 distinct
integers chosen from {1 , . . . , 2 m n} contains m + 1 distinct integers a0 , . . . , am such that
ai−1 divides ai for 1 ≤ i ≤ m. (Khare [1989])
10.1.11. Consider the grid [n] × [n] of n2 points in the plane. Each point is colored black or
white. How large must n be so that every such coloring yields a rectangle with horizontal
and vertical sides whose corners have the same color?
10.1.12. An exam consists of ¾ true/false questions. Determine the least n such that
whenever n students take the exam, some two students agree in their answers to at least
one-third of the questions.
10.1.13. Let T be a complete ternary tree with ¾ levels whose 3¾ leaves are 2-colored. Prove
that in some complete binary subtree (2 ¾ leaves), all leaves have the same color. (Milans)
Exercises for Section 10.1 441
10.1.14. In a chess tournament , each person plays every other, scoring 1 for a win, 0 for
a draw, and −1 for a loss. Prove that if at least 3/4 of the games are draws, then some two
players score the same total. Show that this is asymptotically sharp. (Bóna [2002, p. 50])
10.1.15. In the chess tournament of Exercise 10.1.14, suppose that the players come from
two countries (each person plays all others). Prove that some player scores at least as many
points against players from the same country as against players from the other country.
10.1.16. (♦) Determine the least n such that every set of n integers has a nonempty subset
whose sum is a multiple of ¾ . (Comment: A more general and stronger statement valid for
any group (here ¾) appears in Moser [1948]. See also Vince [1965] for the special case.)
10.1.17. Let x be a real number. Show that some number in {x , 2x , . . . , (n − 1)x} differs
by at most 1/n from an integer.
10.1.18. (♦) Let º (n) be the least ¾ such that every set of ¾ elements in [n] has two disjoint
subsets with the same sum. Prove 1 + ⌊ log 2 n⌋ < º (n) ≤ ⌈ 1 + log 2 n + log 2 log 2 n⌉ for n ≥ 3.
10.1.19. For n < 2 ¾ , prove that any multiset of ¾ positive integers with sum n has a subset
with sum j for all j ∈ [n], and show that this fails when n = 2 ¾ . (Brown [1961], Ganter–
Teirlinck [1977])
10.1.20. Let S1 , . . . , Sm be a partition of [n] with at least two sets having size more than
m. Prove that there are distinct indices ¾ , l ∈ [m] such that some difference between two
elements of S¾ is also a difference between two elements of Sl . (LeSaulnier [2006])
10.1.21. Use Example 10.1.7 to prove the Chinese Remainder Theorem: If n1 , . . . , nr
are pairwise relatively prime natural numbers, and a1 , . . . , ar are integers, then one
congruence class modulo ∏ ni is congruent to ai modulo ni for each i. (Hint: Consider
x = ∑i=1 aj Nj yj , where Nj = (∏ ni)/nj and yj is chosen using multiplicative inverses.)
r
10.1.27. For n ∈ , prove that every list of more than n3 numbers has a sublist with more
than n entries that is strictly increasing or strictly decreasing or constant. Construct an
example to show that the result is sharp.
10.1.28. Construct a list of length n2 having no monotone sublist of length more than n.
d
Extend this by induction to construct a list of l 2 vectors in d having no monotone sublist
of length more than l. (Alon–Füredi–Katchalski [1985])
10.1.29. (♦) Let Cn¾ be the 2 ¾-regular graph obtained from Cn by making any two vertices
adjacent if the distance between them in Cn is at most ¾ . For ¾ ≥ 2, prove that (Cn¾) > + 2
if n = ( + 1) − 1 and (Cn¾) ≤ + 2 if n ≥ ( + 1).
10.1.30. (♦) A function : [n] → [n] is contractive if (i) ≤ i for all i. A monotone -list
for is a strictly increasing list a1 , . . . , a¾ from [n] such that (a1) ≤ · · · ≤ (a¾). Prove
that 2 ¾−1 is the least n such that for every contractive mapping on [n] there is a monotone
-list. (Hint: For how many a in [n] can the longest monotone list ending with a have j
elements? Comment: This result is generalized in West–Trotter–Peck–Shor [1984].)
10.1.31. (+) Prove that Theorem 10.1.16 is sharp for n ≥ 6 by giving an ordering of E(K n)
such that the maximum length of an increasing trail is n − 1. (Comment: The construction
is easy when n is even.) (Graham–Kleitman [1973])
10.1.32. Prove that at most ( − 1)2n permutations of [n] avoid the identity permutation
of length . (Bóna [2004]) (Comment: Although this bound seems loose, in fact there are
asympotically c ((¾¾2−−1)2¾)/2 such permutations, where c is a known constant.)
2n
10.1.38. (+) A deck of n cards is a permutation of [n]; view it as a word. A shuffle splits
a word into an initial block and a final block (one may be empty) and merges them, main-
taining order within each block. For example, one shuffle can produce 3142 from 1234.
Consider permutations of [n] produced from the identity permutation by one shuffle.
a) Prove that these are the permutations avoiding 321, 2143, and 2413. Count them.
b) Show that among these, the permutations that can be returned to the identity by
one more shuffle are those that split [n] into four segments A , B , C, D with B , C
= ∅ and
reorder them as A , C, B , D. Count them. Characterize them as the permutations avoiding
321, 2143, 2413, and 3142. (DeSario [2002])
10.1.39. (♦) Let G be a ( − 1)-chromatic n-vertex graph with girth l. Let H be a -
chromatic n-uniform hypergraph with girth at least l/3, edges e1 , . . . , e m , and vertices U.
Form G from U and disjoint copies G1 , . . . , G m of G by adding a matching of size n from
V(G i) to ei for each i. Prove that G has girth l and chromatic number . (Nešet řil–Rödl)
Section 10.2: Ramsey’s Theorem 443
10.1.40. (+) Graphs with large girth and chromatic number. A (d , r, ½)-graph is a graph
with girth at least ½ formed from a complete d-ary tree by giving each leaf r neighbors
(besides its parent) on its path to the root. (A complete d-ary tree of height h is a rooted
tree where all non-leaves have d children and all leaves have distance h from the root.)
(a) Assume that (d , r, ½)-graphs exist. Use a (¾ , ¾ + 1 , 2½)-graph to construct a graph
with girth at least ½ that is not ¾-colorable. (Hint: Use the canonical edge-coloring of the
underlying tree, which assigns color i to the edge from a non-leaf vertex to its ith child.)
(b) Let m(d , r, ½) be the least height of the underlying tree in a (d , r, ½)-graph, if one
exists. Prove that a (d , r, ½)-graph exists for even ½ by showing (1) m(d , r, 4) = 2r + 1, (2)
m(d , r, ½ + 2) ≤ 2 + m(d , d 2 , ½), and (3) m(d , r, ½) ≤ m1 + m2 − 1, where m1 = m(d , 1 , ½)
and m2 = m(d m1 , r − 1 , ½). (Alon–Kostochka–Reiniger–West–Zhu [2016]) (Comment: By
setting m1 = 2⌊ m(d , 1 , ½)/2⌋ + 1 in (3), one can make bipartite (d , r, ½)-graphs, which
yields additional applications to list coloring.)
10.2.1. Example. Among any six people, there are three mutual acquaintances or
three mutual strangers. Focus on one person, x. Among the remaining five people,
x must have at least three acquaintances or at least three non-acquaintances. By
symmetry, we may assume that x has at least three acquaintances. If any two of
these are acquainted, then they form the desired set with x; if they are pairwise
non-acquainted, then we have three mutual strangers.
x
•
• • • • •
Example 10.2.1 can be modeled as 2-coloring E(K 6). Edges are sets of size 2;
more generally, Ramsey ’s Theorem considers sets of size r. We partition the r-
subsets of a set S into ¾ classes and look for p elements of S whose r-sets all lie in
the same class. Example 10.2.1 states that when | S| = 6, there is always a triple
whose 2-sets lie in the same class.
Ramsey ’s Theorem states that R(p1 , . . . , p¾ ; r) exists for every choice of the
quotas p1 , . . . , p¾ . The case r = 1 is the quota version of the Pigeonhole Principle
(Theorem 10.1.2). To suggest the approach, we first consider the case r = ¾ = 2,
which includes and extends Example 10.2.1.
• T • •U • •
| T | ≥ R(p1 , p2 − 1; 2) or |U | ≥ R(p1 − 1 , p2 ; 2)
T
x• r−1 S
p = R(p − 1 , q; r)
Let S = S − {x}. We use º to define a 2-coloring º of (rS−1). For A ∈ (rS−1),
let º (A) = º (A ∪ {x}); thus º is a 2-coloring of the (r − 1)-sets in S . Since
|S | = R(p , q ; r − 1), the induction hypothesis implies that S contains a red-
homogeneous set of size p or a blue-homogeneous set of size q under º (when
r = 2, this step is the invocation of the Pigeonhole Principle). By symmetry, we
may assume that the red quota is met. Let T be a p -element subset of S whose
(r − 1)-sets are red under º .
We return to the original coloring º on ( Tr ). Since | T | = p = R(p − 1 , q; r),
within T there is a (p − 1)-set that is red-homogeneous under º or a q-set that
is blue-homogeneous under º . If there is a blue-homogeneous q-set, then we are
done. If there is a red-homogeneous (p − 1)-set P , then consider P ∪ {x}. From
the definition of T , the (r − 1)-sets of P are all red under º , and so their unions
with x are red under º . Hence P ∪ {x} is a red-homogeneous p-set under º .
The structure of this proof is called “double induction”; the proof of the in-
duction step is itself a proof by induction.
APPLICATIONS
Our first application was a problem posed to some talented mathematics stu-
dents in 1932 by their friend Eszther K lein. Paul Erdős, then 19, was in the
group. Erdős and Szekeres gave several solutions, including one requiring re-
discovery of Ramsey ’s Theorem, which was unknown to them. Four years later,
K lein married Szekeres, so Erdős named this the Happy End Theorem.
10.2.6. Theorem. (Erdős–Szekeres [1935]). For m ∈ , there is a (least) inte-
ger N(m) such that every set of N(m) points in the plane (no three collinear)
contains an m-subset forming a convex m-gon.
Proof: We need two facts. (1) Among any five points in the plane, four determine a
convex quadrilateral (if no three are collinear). Construct the convex hull of the
five points. When it is a pentagon or a quadrilateral, the claim is immediate.
When it is a triangle, the other two points lie inside. By the Pigeonhole Princi-
ple(!), two corners of the triangle are on one side of the line through the points
inside. These plus the points inside form a convex quadrilateral.
• • • •
• •
• • • •
• • • •
• • • •
• • • •
(2) If every 4-subset of m points in the plane forms a convex quadrilateral, then
the m points form a convex m-gon. If not, then the convex hull of the m points
consists of some t points, where t < m. The remaining points lie inside the t-gon.
When we triangulate the t-gon, as shown on the right above, a point inside the t-
gon lies in one of the triangles. With the vertices of that triangle, it forms a 4-set
that does not determine a convex quadrilateral.
In order to combine these two results into a proof of the theorem, let N =
R(m , 5; 4). Given N points in a plane, color each 4-set by convexity: red if it de-
termines a convex quadrilateral, blue if it does not. By fact (1), there cannot be 5
points whose 4-subsets are all blue. By Ramsey ’s Theorem, there must then be m
points whose 4-subsets are all red. By fact (2), they form a convex m-gon. Hence
N(m) exists and is at most R(m , 5; 4).
The upper bound R(m , 5; 4) is exact for m = 4 by fact (1), but already it is
−4
very loose at m = 5 (Exercise 6 shows N(5) = 9). In general, N(m) ≤ (2m m−2 + 1
)
(Erdős–Szekeres [1935]) and N(m) > 2 m−2 (Erdős–Szekeres [1960]). In fact, they
conjectured N(m) = 2 m−2 + 1 (Exercises 7–9). Erdős offered $500 for a proof of
the conjecture, raised to $1000 by Graham. After more than 60 years, Chung–
Graham [1998] improved the upper bound by 1. About ten papers gave further
small improvements, but none improved the leading behavior of 4 m . Finally, Suk
[2016] combined various ways of finding a convex polygon to solve the problem
asymptotically, proving N(m) ≤ 2 m+o(m). Other extensions and generalizations
are surveyed in Morris–Soltan [2000, 2016].
In the next application, again we need an auxiliary structural lemma and
obtain a bound that likely is much larger than needed.
Section 10.2: Ramsey’s Theorem 447
10.2.7. Example. Table storage and search. From a large universe of numbers
(called “keys”), n numbers arrive to be stored in a table of size n. If they are stored
in order, then binary search can test the presence of any key by probing at most
⌈ lg(n + 1)⌉ locations, where lg denotes log2 .
Can another strategy always test membership in fewer probes? It depends
on the size of the key space M. Yao [1981] proved that sorted storage and binary
search is optimal when M is large.
A storage strategy T assigns each n-set A of keys a storage permutation:
T(A) = puts the jth smallest element of A in location (j), for 1 ≤ j ≤ n.
A query asks whether a key x is present in the table. A search strategy S probes
table locations, based on x, T, and the outcome of earlier probes. The answer to a
probe is the key stored in that location. The (worst-case) cost of a strategy (S , T)
is the maximum, over all table contents A and queries x, of the number of probes
used by S to determine whether x ∈ A when T is used to store the contents of the
table. For m = | M | , let (m , n) be the minimum cost over all strategies.
When m = n, every key is present, and (n , n) = 0. When m = n + 1, sorted
storage has worst-case search cost 2, since the jth element x may be stored at j
or j − 1, depending on whether the missing element is higher or lower than x. On
the other hand, probing location 1 suffices if we store in location 1 the key that
cyclically follows the missing key. Hence (n + 1 , n) = 1; sorting is not optimal
when m is small. Yao [1981] proved that (m , n) ≤ 1 if and only if m ≤ 2n − 2.
The next lemma generalizes the argument that binary search in sorted tables
needs lg(n + 1) probes in the worst case.
10.2.8. Lemma. (Yao [1981]) Let T be a storage strategy for n-sets from a uni-
verse M with | M | ≥ 2. A set P ⊆ M is stored consistently if each n-set in P
is stored according to the same permutation. If some set of size 2n − 1 in M
is stored consistently under T, then any strategy using T for storage costs at
least ⌈ lg(n + 1)⌉ probes in the worst case.
Proof: Let P be a set of size 2n − 1 stored consistently under T; there is a permu-
tation such that T stores any n-set from P by putting its jth smallest element
in position (j), for 1 ≤ j ≤ n. Let P = {x1 , . . . , x 2n−1 } with x1 < · · · < x2n−1 . By
reindexing the table locations in the order (1) , . . . , (n), we may assume that
is the identity permutation.
Using induction on n, we prove that an adversary can force the algorithm to
use at least ⌈ lg(n + 1)⌉ probes to test whether the “central element ” x n of P is
present. For n = 1, a probe is needed, since | M | ≥ 2.
For n ≥ 2, let n = ⌊ n/2⌋ . The adversary responds to the first probe to leave
a problem of the same type, with size n and with x n still the central element.
Define P by eliminating the top ⌈ n/2⌉ and bottom ⌈ n/2⌉ elements of P. Since
2n − 1 = 2n − 1 − 2⌈ n/2⌉ , the size of P is 2n − 1, and the central element is x n .
If the algorithm first probes location j with j ≤ ⌈ n/2⌉ , then the adversary
responds that key x j is there. The adversary also grants that keys x1 , . . . , x⌈n/2⌉
are present in locations 1 , . . . , ⌈ n/2⌉ (in order, since P is consistent) and keys
{x2n−⌈n/2⌉ , . . . , x 2n−1 } are not in the table (see exception below for n ≤ 3). Now all
is known except which n -subset of P appears in locations ⌈ n/2⌉ + 1 , . . . , n.
448 Chapter 10: Ramsey Theory
probe
1 j ⌈n/2⌉ ⌈n/2⌉ + 1 n
x1 · · · x j · · · x⌈n/2⌉
n -set from P x2n−⌈n/2⌉ · · · x2n−1
present smaller problem absent
RAMSEY NUMBERS
threatens to destroy the human race unless we tell it the value of R(5 , 5; 2), then
we should have all computers in the world look for the answer. If instead it wants
R(6 , 6; 2), then he advised destroying the evil spirit before it destroys us.
Section 10.2: Ramsey’s Theorem 449
To understand the joke, consider trying to prove R(5 , 5; 2) > 43. Without
making use of symmetry or other reductions of the search, the number of graphs
with vertex set [43] is 2( 2 ) , which equals 2903 . We need one having no 5-clique or
43
• • •
• • • •
• •
• • • •
√
Corollary 10.2.12 yields R(p + 1 , p + 1) ≤ (2p p) ∼ 4 /
p
p. Conlon [2009a]
improved the upper bound by putting a superpolynomial function of p in the de-
nominator: R(p + 1 , p + 1) ≤ (2p
p
)p−c log p/log log p for some constant c.
The constructive lower bounds in Exercises 17–18 are polynomials in p. The
best constructive lower bound known grows faster than every polynomial but
slower than every exponential (Exercise 19). A survey of constructive bounds ap-
pears in Frankl [1990]. An exponential lower bound can be proved by counting.
Proof: Consider the graphs with vertex set [n]. Each possible p-clique occurs in
2(2)−(2) of these 2(2) graphs. Similarly, each set of p vertices occurs as an inde-
n p n
pendent set in 2(2)−(2) of the graphs. Discarding these leaves only graphs with no
n p
p-clique or independent p-set. Since there are (np) ways to choose p vertices, the
inequality 2(n)2(2)−(2) < 2(2) implies R(p , p) > n. We seek n such that (n) < 2(2)−1 .
n p n p
p p
p
To obtain the desired bound, we use (np) < ( ne
p
) , proved in Section 14.1. It
ne p (p
)−
thus suffices to have ( ) < 2 2 , which simplifies to n < (1 − o(1)) √p 2 p/2 .
1
p e 2
Section 10.2: Ramsey’s Theorem 451
10.2.15.* Remark. Fixing one quota. In contrast to the diagonal case, tighter
bounds are known when q is fixed and p is large. Here R(p , q) ≤ cpq−1 logloglogp p
(Graver–Yackel [1968], Chung–Grinstead [1983]). For q = 3, the answer is
known within a constant factor:
c p2
cp2
log p ≤ R(p , 3) ≤ log p
of the first r − 1 vertices in [N]. Label S with the color given by º to the major-
ity of the r-sets obtained by adding a later vertex to S. Keep alive only the later
live vertices y such that º (S ∪ {y}) is the same as the label of S.
Consider the situation when x is the first remaining vertex. Iteratively la-
bel each (r − 1)-set S consisting of x and r − 2 earlier vertices that have been
kept alive. The label of S is the majority color of the extensions of S to r-sets
by adding a later remaining live vertex y. Keep y alive only if º (S ∪ {y}) is the
same as the label on S .
Each time we label an (r − 1)-set, we lose at most half of the remaining live
vertices. We want to wind up with R(p − 1; r − 1) vertices whose (r − 1)-sets have
all been labeled, plus another live vertex. Since ( R(p−r−1;r
1
−1)
) sets of size r − 1 are
to be labeled, it suffices to start out with N vertices. By the definition of the
Ramsey number, we then have a set U of p vertices in which every (r − 1)-set not
containing the last vertex has been labeled with the same color, meaning that the
r-sets obtained by adding a later vertex of U all have that color.
10.2.18. Corollary. R(p; r) ≤ tow r−1 (cr p), where tow 0(x) = x, tow h(x) =
2tow h−1(x) for h > 0, and cr is a constant that depends on r but is indepen-
dent of p.
Proof: By Proposition 10.2.16, R(p; 2) ≤ 22p , so c2 = 2 suffices. For larger r,
r −1
Theorem 10.2.17 yields R(p; r) ≤ 2[tow r−2(cr−1(p−1))] ≤ tow r−1 (cr p). The presence
of p − 1 in the recurrence allows cr to remain relatively small.
tion on r leads to a lower bound on R(p; r) that is also a tower, but having height
lower by 1. The key is the next lemma, whose proof is due to Erdős and Hajnal
but seems to be published only in Graham–Rothschild–Spencer [1980].
has a valley at the second position (value smaller than the neighboring values),
then let º (Y) be blue. Otherwise, (Y) is chosen arbitrarily.
Now let Z be a (2p + r − 4)-set in T ; we show that Z cannot be homogeneous.
Suppose that Z is red-homogeneous (an analogous argument applies for blue).
With Z indexed in increasing order, no consecutive values in (Z) are equal.
Case 1: For some t, the positions t through t + p − 1 in (Z) form a strictly
monotone p-tuple Ẑ. Suppose first that Ẑ is decreasing, and let s = (Zs , Zs+1),
so Ẑ = ( t , . . . , t+ p−1). Since admits no homogeneous p-tuple, some r entries in
Ẑ form a set W that is blue under . Let i1 , . . . , ir be the corresponding indices
of these positions in Z, and let Y = (Zi1 , . . . , Zir , Zir +1).
We claim that (Y) is blue, contradicting that Z is red-homogeneous. By
(∗), the value (Yj , Yj +1) is the largest (Zs , Zs+1) among s such that i j ≤ s < i j +1 ,
where ir+1 = ir + 1. Since (Z) is monotone decreasing, this largest value is Wj .
Thus (Y) = W . Since W is a sublist of the monotone decreasing list (Z), also W
is monotone decreasing. Hence by definition (Y) = (W), which is blue.
If (Z) is strictly increasing, then an analogous argument applies, with Y
consisting of the positions in Z just after all those corresponding to the positions
occupied by W , plus the first position occupied by W .
Case 2: No consecutive p-tuple in (Z) is monotone. Consider the first 2p − 3
positions in (Z). None after the first can be a valley, because then Z would con-
tain an (r + 1)-tuple assigned blue. Hence (Z) has at most one peak. If it has no
peak, then (Z) is monotone. If it has a peak before or after the middle, then the
portion on the opposite side of the middle of (Z) is a monotone list of length at
least p. In each of these possibilities, Case 1 applies.
10.2.20. Corollary. R(p; r) > tow r−2(c r p2), where c r = c/42r−6 and R(p; 3) > 2 cp .
2
Thus tow r−2(c r p2) < R(p; r) ≤ tow r−1 (cr p); the heights differ by 1. Erdős con-
jectured R(p; 3) > 22 , yielding R(p; r) > tow r−1 (c r p). Erdős and Hajnal proved
cp
that R4(p; 3) is doubly-exponential, so for four colors the towers above and below
have the same height. Conlon–Fox–Sudakov [2013] proved R3(p; 3) > 2 p .
c log p
Sometimes R(G 1 , G 2) has a simple formula. Again we color red and blue.
The lower bound holds more generally, with the same coloring. If the largest
component of G has m vertices, and H has chromatic number n, then R(G , H) ≥
(m − 1)(n − 1) + 1 (Chvátal–Harary [1972]). Burr–Erdős [1983] conjectured that
R(G , K n) = (m − 1)(n − 1) + 1 when m is sufficiently large relative to n and
max F ⊆ G ||V(F)
E(F)|
|
, but Brandt [1996] disproved this. Nevertheless, Nikiforov [2005]
proved R(Cm , K n) = (m − 1)(n − 1) + 1 for m ≥ 4n + 2, partially settling a conjecture
of Erdős, Rousseau, and Schelp (see Faudree–Schelp [1978]).
The upper bound for Theorem 10.2.22 depends on color classes in H being sin-
gle vertices. Otherwise, the lower bound can be weak. For example, the Chvátal–
Harary result yields R(mK 3 , mK 3) ≥ (3 − 1)(3 − 1) + 1 = 5, but the truth is 5m.
For the upper bound, we use induction on m. The basis step m = 2 requires
case analysis (Exercise 28). If m ≥ 3, then 5m > R(3 , 3) = 6, so every 2-coloring
of E(K 5m) contains a monochromatic triangle. Discarding three vertices, we find
more such triangles until fewer than 6 vertices remain. Since 5m − 3m ≥ 6 for
m ≥ 3, we find m disjoint monochromatic triangles. If these have the same color,
then we are done; otherwise, we have a triangle in each color.
Let {a , b , c} and {d , e , º } be the vertex sets of disjoint red and blue triangles.
Of the nine edges joining them, we may assume by symmetry that at least five
are red. Some two of these have a common endpoint in {d , e , º }. This yields a red
triangle and a blue triangle with a common vertex. If m > 2, then the induction
hypothesis yields (m − 1)K 3 in one color among the remaining 5m − 5 vertices. We
then we add the appropriately colored triangle from the five special vertices.
We have so far studied vertex Ramsey numbers. There are also the size Ram-
sey number ((H) = | E(H)|), the clique Ramsey number ( = ), the chro-
matic Ramsey number ( = ), and the degree Ramsey number ( = ). The
initial result on parameter Ramsey numbers was R(G) = (G) for every graph
G (Folkman [1970]), extended to R(G; s) = (G) by Nešet řil–Rödl [1976].
The size Ramsey number of G, defined in Erdős–Faudree–Rousseau–Schelp
[1978], is obviously at most ( R(G)
2 ); they proved equality when G is a complete
graph. Solving a problem for which Erdős offered 100 euros, Beck [1983] proved
that the size Ramsey number of Pn is linear in n (improved by Dudek–Prałat
456 Chapter 10: Ramsey Theory
[2015]). The size Ramsey number also grows linearly in n for cycles (Haxell–
Kohayakawa–Łuczak [1995], but not for graphs with maximum degree 3 (Rödl–
Szemerédi [2000]). The result of Chvátal–Rödl–Szemerédi–Trotter [1983] (Sec-
tion 11.1) implies a quadratic upper bound in n for graphs with maximum de-
gree at most ¾ , and this was improved to O(n2( logn n)1/¾) by Kohayakawa–Rödl–
Szemerédi–Schacht [2011]). Faudree–Schelp [2002] surveyed the early results
on the topic, but there are many additional papers on the size Ramsey numbers
of special graphs or special families of graphs.
Here we study only the chromatic Ramsey number. This is the primary fo-
cus of Burr–Erdős–Lovász [1976], where parameter Ramsey numbers were first
proposed. We begin with an old result implying R(G) = 2 when G is bipartite.
List the pairs of parts in some order. For i from 0 to (2r ), we show that N
is large enough so that for every s-coloring of E(K r [N]), some copy of K r [N(r)−i]
2
has the property that the edges of the jth pair of parts are colored monochro-
matically, for each j with 1 ≤ j ≤ i. For i = 0, there is nothing to prove; no
requirement is imposed on the full graph K r [N].
After such a copy of K r [N(r)−i+1 ] has been found for the first i−1 pairs of parts,
2
consider the ith pair. The vertices retained in these two parts induce K M,M , where
M = N(r)−i+1 . By the definition of N(r)−i+1 , the inherited coloring of E(K M,M) con-
2 2
tains a monochromatic copy of K m ,m with m = N(r)−i . Keep these m vertices in
2
Section 10.2: Ramsey’s Theorem 457
these two parts and any m vertices in each remaining part. The resulting copy
of K r [N(r)−i] has the desired property for the first i parts. After reaching i = (2r ),
2
we have the desired copy of K r [n], since N0 = n.
EXERCISES 10.2
10.2.1. (−) Let Dn be the digraph with vertex set [n] whose edges are the ordered pairs
of distinct vertices. A tournament with a linear order on its vertices is monotone if ev-
ery edge points toward its lower endpoint or every edge points toward its higher endpoint.
Given ¾ , prove that if n is sufficiently large, then every spanning subdigraph of Dn con-
tains ¾ vertices that induce no edges or a monotone tournament or a copy of D¾ .
10.2.2. (−) Let n = R(¾ , l). Prove that the edges of the graph obtained from K n by deleting
one edge can be 2-colored with no red K ¾ or blue K l . (Chvatal [1974])
10.2.3. (−) Use the graph below to prove R(3 , 5) = 14.
• • •
• •
• •
• •
• •
• •
10.2.4. (−) Prove that 2-colorings of E(K6) have at least two monochromatic triangles.
10.2.5. (♦) For ¾ ≥ 2, say that a graph G is ¾ -balanced if every induced subgraph with 2 ¾
vertices has independence number ¾ .
(a) By explicit construction, prove R(3 , ¾) > 3¾ − 4.
(b) Prove that every ¾-balanced graph has at most R(3 , ¾ + 1)+ 2 vertices. (A. Brieden)
(c) Construct a ¾-balanced graph with 2 ¾ + 2 vertices. (Comment: Q. Zhu [1989]
showed for ¾ ≥ 4 that no ¾-balanced graph has more than 2 ¾ + 2 vertices.)
10.2.6. Prove N(5) = 9. That is, any nine points in 2 with no three collinear determine
some convex 5-gon, and some set of eight points does not. (Comment: Due first to Makai
and Turán in 1935 (unpublished), later proofs include Kalbfleisch–Kalbfleisch–Stanton
[1970] and Bonnice [1974]. By computer, Szekeres–Peters [2006] showed N(6) = 17.)
10.2.7. (+) In a tournament with weights on the edges, a nondecreasing [decreasing]
path is a path whose edge weights are successively nondecreasing [decreasing]. Prove that
the maximum number of vertices in an edge-weighted tournament having no nondecreas-
ing path of length p + 1 and no decreasing path of length q + 1 is ( p+p q). (Hint: Let (cx y , d x y)
denote the maximum length of (nondecreasing, decreasing) paths ending with edge xy.
Associate with each vertex the set of maximal labels on entering edges. Show that at most
(p+pq) distinct sets of labels can occur at vertices.) (Chvátal–Komlós [1971])
10.2.8. A list of points v1 , . . . , vn , where vi = (xi , yi) with x1 < · · · < x n , is convex [con-
cave] if whenever i < j the segment vi vj passes above [below] {vi+1 , . . . , vj −1 }. Use Exercise
10.2.7 to prove that the maximum number of points in the plane (with no three collinear)
containing no convex sequence of r points or concave sequence of s points is (r+r−s−2 4) . Con-
−4
clude that (2m
m−2
) + 1 points force a convex m-gon.
10.2.9. (+) Find 2 m−2 points in the plane (no three collinear) that form no convex m-gon.
(Hint: Use sets Ti for 0 ≤ i ≤ m − 2 (from Exercise 10.2.8) that have ( m−i 2) points but
contain no concave (i + 2)-sequence or convex (m − i)-sequence.) (Erdős–Szekeres [1960])
10.2.10. (♦) Let S be a set of R(m , m; 3) points in the plane with no three collinear. Prove
that S contains m points that form a convex m-gon. (Tarsi)
Exercises for Section 10.2 459
10.2.11. Prove that every graph with 2 ¾ vertices has a clique Q and an independent set S
such that | Q| + | S| = ¾ + 1. Conclude from this that R(¾ , ¾) ≤ 4¾−1 .
10.2.12. Ramsey numbers for r = 2 and multiple colors.
(a) Let p = (p1 , . . . , p¾), and obtain qi from p by subtracting one from pi but leaving
¾
the other coordinates unchanged. Prove R(p) ≤ ∑i=1 R(qi) − ¾ + 2.
(b) Prove R(p1 + 1 , . . . , p¾ + 1) ≤ (p1p+···+ p¾ )!
!··· p !
.
1 ¾
10.2.13. Prove that every graph G with p vertices, q edges, and automorphism group of
size s satisfies R¾(G) > (s¾ q−1)1/p .
10.2.14. (♦) Let r¾ = R¾ (3; 2) (see Definition 10.2.10).
(a) Prove r¾ ≤ ¾(r¾−1 − 1) + 2.
(b) Prove ⌊ t!e⌋ = t! ∑i=0 i!1 for t ∈ .
t
(c) Prove r¾ ≤ ⌊ ¾ !e⌋ + 1 for ¾ ≥ 2. (Thus r3 ≤ 17; in fact , equality holds).
10.2.15. (♦) For the diagonal ¾-color Ramsey number (Definition 10.2.10), prove the bound
(q−1)¾ −1 j
R¾(q; 2) ≤ 1 + ∑j =0 ¾ . (Comment: This implies the simpler-looking but weaker bound
R¾(q; 2) < ¾ , generalized in the next exercise.)
q¾
¾
10.2.16. (♦) For ¾ ≥ 2, let M¾(p; r) = max{R(q1 , . . . , q¾ ; r): ∑i=1 qi = p}.
(a) Prove M¾(p; r) ≤ 1 + M¾(¾ M¾(p − 1; r); r − 1).
(b) Prove M¾(p; 2) < ¾ p .
(c) Prove R¾(q; 3) ≤ t(¾ q + 1 , ¾ + 1), where t(1 , b) = b and t(h , b) = bt(h−1 ,b) (thus t(h , b)
t(p−1 , ¾+1)
is a tower of h copies of b). (Hint: Prove the stronger bound M¾(p; 3) < ¾ ¾ . Com-
ment: Conlon–Fox–Sudakov [2010] improved the upper bound; in particular, R¾(6; 3) ≤
(4+ o(1))¾ log ¾ c¾
22 . The technique of Lemma 10.2.19 yields R¾(6; 3) > 2 2 .)
10.2.17. Give a constructive proof of R(p + 1 , p + 1) > (3p) by considering the graph G
whose vertex set is ([p]
3
) with xy ∈ E(G) if and only if | x ∩ y| = 1. (Nagy [1972])
10.2.18. (♦) The composition or lexicographic product of graphs G and H is the graph
G[H] on V(G) × V(H) defined by making (u , v) and (u , v ) adjacent if and only if (1) uu is
an edge of G, or (2) u = u and vv is an edge of H .
(a) Prove (G[H]) ≤ (G) (H).
(b) Prove that the complement of G[H] is G[H].
(c) Use (a) and (b) to prove by construction that
R(pq + 1 , pq + 1) − 1 ≥ [R(p + 1 , p + 1) − 1] · [R(q + 1 , q + 1) − 1] .
(d) Deduce that R(2 n + 1 , 2 n + 1) ≥ 5 n + 1 for n ≥ 0, and compare this to the non-
constructive lower bound for R( , ) in Theorem 10.2.14. (Abbott [1972])
10.2.19. Frankl–Wilson [1981] √
constructed explicit n-vertex graphs with clique and inde-
pendence numbers at most 2 c log n log log n , where c is a constant. Obtain from this a lower
bound for R(p , p) larger than every polynomial in p but smaller than any exponential in p.
10.2.20. (+) Prove pe M1 < R¾ (p; r + 1) ≤ r + M2 , where M1 = 1
r +1
( p−r 1) and M2 = ( R¾ (p;r)
r
).
10.2.21. (♦) Determine R(K1 ,r1 , . . . , K1 ,r¾ ) (in all cases). (Burr–Roberts [1973])
10.2.22. (♦) Let T be a tree with m edges, and let n be a multiple of m. Determine the
Ramsey number R(T , K1 ,n+1 ). (Burr [1974])
10.2.23. (♦) Let T be a tree with m vertices. Prove that only one 2-coloring of E(K(m−1)(n−1))
(up to isomorphism) has no red T or blue K n . Conclude that if G is formed from K(m−1)(n−1)
by adding one vertex adjacent to s vertices of the clique, then all red/blue colorings of G
have a red T or a blue K n if and only if s > (m − 1)(n − 2). (Hook–Isaak [2011])
460 Chapter 10: Ramsey Theory
10.2.24. For m-vertex trees T , show R(T, K n1 ,...,K n¾ ) = (m− 1)(R(n1 ,...,n¾)− 1)+ 1. (Burr)
10.2.25. (♦) Let G and H be graphs with n = | V(G)| and ¾ = Ò(H). Let s be the least size
of a color class in any proper ¾-coloring of H . When s ≤ n, prove R(G , H) ≥ (n − 1)(¾ − 1) + s.
(Rousseau–Sheehan [1978], Burr [1981])
10.2.26. Prove R(C4 , C4) = 6. (Comment: There are many proofs.)
10.2.27. (♦) Prove R(mK 2 , mK 2) = 3m − 1.
10.2.28. Complete the proof that R(2 K3 , 2K3) = 10.
10.2.29. (♦) For 1 ≤ i ≤ ¾ , let G i be a graph with pi vertices, and mi ∈ . Prove
R(m1 G1 , . . . , m¾ G ¾) ≤ ∑(mi − 1)pi + R(G1 , . . . , G ¾).
10.2.30. (♦) Determine R(P3 , G) for every n-vertex graph G, as a function only of n and
the maximum size of a matching in G.
10.2.31. Let G be an n-vertex graph with m edges. Build a graph H with n + m vertices
such that in every red/blue coloring of E(H), the red subgraph has P3 as an induced sub-
graph or the blue subgraph has G as an induced subgraph. (Comment: The bound n + m
cannot be reduced when the components of G are complete.) (Kostochka–Sheikh [2006])
10.2.32. (♦) Prove that every ¾-coloring of E(K s ,t) has a monochromatic connected sub-
graph with at least (s + t)/¾ vertices. Conclude that every ¾-coloring of E(K n) has such a
subgraph with at least n/(¾ − 1) vertices. For ¾ = 3, show that one cannot guarantee more
than n/2. (Gerencsér–Gyárfás [1967], Gyárfás [1977]) (Comment: Mubayi [2002] and
Liu–Morris–Prince [2009] guaranteed double-stars as such subgraphs of K s ,t . One can
use at least 1/¾ of the vertices in each part when ¾ ≤ 3 (Bucić–Letzter–Sudakov [2018]),
but not when ¾ > 3 (DeBiasio et al. [2018]). For surveys, see Gyárfás [2011, 2016].)
10.2.33. Let G be an n-vertex graph with m edges.
(a) Prove that if ∑v∈V(G) ( d(v)) > (2n) , then G contains a 4-cycle.
2
√
(b) Prove that if m > 4n (1 + 4n − 3), then G contains a 4-cycle.
(c) Prove R¾(C4) ≤ ¾ 2 + ¾ + 2. (Comment: Using difference sets (Section 13.2), there
is a lower bound of ¾ 2 − ¾ + 2.) (Chung–Graham [1975])
10.2.34. (♦) Prove that for n sufficiently large, every 2-coloring of E(K n ,n) has a monochro-
matic copy of Kp ,p . Show that the analogue fails for tripartite graphs: 2-colorings of
E(K n ,n ,n) need not have monochromatic triangles no matter how large n is.
10.2.35. (♦) Bondy [1971a] proved that if xy ∈
/ E(G) implies d(x) + d(y) ≥ n for an n-vertex
graph G, then G = K t ,t or G has a cycle of each length from 3 to n. Use this to prove
R(Cm , K1 ,r) = max{m , 2r+1}, except maybe when m is even and m ≤ 2r. (Lawrence [1973]).
10.2.36. (♦) Ramsey numbers of connected n-vertex graphs.
(a) Prove that if G is a connected bipartite graph with parts of sizes r and s, with
r ≥ s, then R(G , G) ≥ max{2r − 1 , r + 2s − 1}. (Burr [1974])
(b) Let G be a connected n-vertex graph. Prove R(G , G) ≥ ⌊ (4n − 1)/3⌋ .
(c) Prove R(H , H) ≥ max{2r − 1 , r + 2s − 1}, where H = K1 ,r−1 + K1 ,s and r > s.
(d) The formula of part (c) is in fact an upper bound (Rosta). Use this to prove
that parts (a) and (b) are sharp by computing R(G , G) when G is the tree obtained from
K1 ,r−1 + K1 ,s−1 by adding an edge joining leaves of the two components. (Burr–Erdős [1976])
(Comment: Burr and Erdős conjectured R(G , G) ≤ 2n − 2 when G is an n-vertex tree.)
10.2.37. (+) For m ≥ n ≥ 2, prove R(Pm , Pn) = m + ⌊ n/2⌋ − 1. (Gerencsér–Gyárfás [1967])
10.2.38. For n ≥ 3, prove that every 2-coloring of E(K n) has a spanning cycle that consists
of at most two monochromatic paths. (Gerencsér–Gyárfás [1967]) (Comment: A version
for digraphs due to Raynaud [1973] was proved also in Gyárfás [1983].)
Section 10.3: Further Topics 461
10.2.39. (+) Ramsey numbers for cycles. Let º be a 2-coloring of E(K n).
(a) Prove that if º contains a monochromatic copy of C2¾+1 for some ¾ ≥ 3, then º also
contains a monochromatic copy of C2¾ .
(b) Prove that if º contains a monochromatic C2¾ for some ¾ ≥ 3, then º also contains
a monochromatic C2¾−1 or 2K ¾ .
(c) Prove R(Cm , Cm) ≤ 2m − 1 for m ≥ 5 (m = 4 is Exercise 10.2.26). (Hint: Use the
Erdős–Gallai [1959] result that an n-vertex graph with more than (m − 1)(n − 1)/2 edges
has a cycle of length at least m (Theorem 7.3.16). There is still one difficult case.)
10.2.40. 3-color Ramsey numbers for cycles.
(a) Prove R(Cn , Cn , Cn) ≥ 2n when n is even.
(b) Prove R(Cn , Cn , Cn) ≥ 4n − 3 when n is odd.
(Comment: Equality holds in both statements when n is sufficiently large, proved
by Benevides–Skokan [2009] for even n. Jenssen–Skokan [2016] proved for odd n that
R¾(Cn) = 2 ¾−1(n − 1) + 1. Both papers use the Regularity Method (Section 11.1).)
10.2.41. (♦) Chromatic Ramsey number.
(a) Prove the general lower bound RÒ(G; s) > (Ò(G) − 1)s . (Comment: Burr–Erdős–
Lovász [1976] conjectured that this lower bound is sharp; this was proved by Zhu [2011].)
(b) Let G be a 3-chromatic graph. Prove that 5 ≤ RÒ(G; 2) ≤ 6, with equality in the
lower bound if and only if there is a homomorphism from G into C5 .
10.2.42. (♦) In a family of axis-parallel squares in 2 , a set is homogeneous if it is pairwise
intersecting √
or pairwise disjoint. Prove that n squares always have a homogeneous set of
size at least n/4.√Prove for infinitely many n that some family has no homogeneous set
of size more than 4n/5. (Hagelstein–Herden–Young [2017], Hagelstein–Herden [2018])
(Comment: See Larman–Matoušek–Pach–Törőcsik [1994] for related problems.)
10.2.43. (♦) Given ¾ , l ∈ , prove that there exists N¾ ,l such that for d ≥ N¾ ,l , every
¾-coloring of the edges of the d-dimensional cube Qd contains a monochromatic path of
length l that is a shortest path joining its endpoints. (Hint: Given the value N¾ ,l , obtain
an upper bound on N¾ ,2l to prove that it exists.) (Stong [2018])
10.2.44. The zero-sum Ramsey number R(G , ¾) of a graph G with | E(G)| divisible by
¾ is the least n such that every coloring of E(K n) by integers has a copy of G on which the
sum of the colors is divisible by ¾ . (Caro [1996] surveys such problems.)
(a) Prove that R(G , ¾) is well-defined.
(b) Prove R(K3 , 3) = 11.
Ramsey ’s Theorem was not the first result in the partition calculus, but it
is the best known and most thoroughly studied. The first result about monochro-
462 Chapter 10: Ramsey Theory
matic structures in colorings of natural numbers was due to Hilbert [1892] (Ex-
ercise 3). We begin with a later result that still pre-dates Ramsey ’s Theorem and
arose from an attempt to prove Fermat ’s Last Theorem.
10.3.2. Example. Bounds for Schur numbers. Like Ramsey numbers, few Schur
numbers are known exactly. We know s1 = 2, s2 = 5, s3 = 14, and s5 = 45 (by
computer). The upper bound of r¾ − 1 yields s¾ ≤ ⌊ !e⌋ (see Exercise 10.2.14).
Schur proved s¾ ≥ (3¾ + 1)/2. Given a -coloring of [n] with no monochro-
matic solution to x + y = , define a ( + 1)-coloring of [3n + 1] by
⎧ (i) if i ≤ n,
⎪
⎪
(i) = ⎨ (i − 2n − 1) if i ≥ 2n + 2,
⎪
⎪
⎩ +1 if n + 1 ≤ i ≤ 2n + 1.
When C has just one row (with no 0), the Columns Condition reduces to hav-
ing a nonempty index set I such that ∑i∈ I ci = 0. These form the first block, and
each later coefficient is a multiple of one in the first block.
Rado ’s Theorem was extended by Deuber [1973]. We will prove a weaker ver-
sion of Rado ’s Theorem for coefficient matrices of the type below.
⎛1 −1 0 0 0 −1 ⎞
⎜0
⎜
1 −1 0 0 −1 ⎟
⎟
⎜0 0 1 −1 0 −1 ⎟
⎝0 0 0 1 −1 −1 ⎠
The columns before the last sum to zero, and the last is a linear combination of
the others by assigning weight i to column i. Thus the matrix does satisfy the
Columns Condition.
To interpret the equations corresponding to the matrix, name the variables
x1 , . . . , x l and d. The equations then become x i+1 = x i + d for 1 ≤ i < l. In other
words, x1 , . . . , x l must form an l-term arithmetic progression. Under Rado ’s The-
orem, we are guaranteed a monochromatic arithmetic progression where the con-
stant difference d also has the same color. We will prove the weaker statement
that does not require d to have the same color as the elements of the progression.
10.3.5. Theorem. (van der Waerden’s Theorem; van der Waerden [1927])
Given positive integers l and ¾ , there is an integer w(l , ¾) such that every
¾-coloring of [w(l , ¾)] has a monochromatic l-term arithmetic progression.
10.3.6. Example. We prove w(3 , 2) ≤ 325. This is quite loose, since w(3 , 2) = 9
(Exercise 8). Like the inductive proof of Ramsey ’s Theorem, this inductive proof
gives a ridiculously large upper bound for w(l , ¾).
Consider a 2-coloring of [325]. Partition [325] into 65 blocks of 5 consecutive
integers. The coloring gives some red-blue pattern to each block; there are 32
possible patterns. By using 65 blocks, some pattern is repeated by the time we
reach the middle block. Thus we can find three equally-spaced blocks such that
the first two have the same pattern. Similarly, we use 5-element blocks so that we
find a duplicated color by the middle of any block. Thus we can find three equally
spaced elements in the block such that the first two have the same color.
For example, when blocks 3 and 30 have the same pattern RBRBB, con-
sider block 57 with elements 281-285. We obtain either a blue progression as
{15 , 150 , 285} or a red progression as {11 , 148 , 285}.
10.3.7. Definition. Let [0 , l]m be the set of integer m-tuples (x1 , . . . , x m) such
that 0 ≤ x i ≤ l. The jth critical class Cj is defined by
Cj = {x ∈ [0 , l]m : x i = l ⇔ i ≤ j}.
An m-dimensional block structure (of length l) in [n] is a choice of posi-
tive integers a , d1 , . . . , d n that map [0 , l]m to [n] injectively by sending x to
a + ∑ x i d i . A block structure is layered for a coloring º of [n] if º is constant
on the image of each critical class.
x2
0 ··· l
0
.. C0
x1 .
l C1 C2
10.3.9.* Remark. When we color with finitely many colors, van der Waerden’s
Theorem guarantees arbitrarily long arithmetic progressions. “Arbitrarily long ”
does not mean infinite! Consider 2-coloring by the parity of ⌈ lg n⌉ . An arith-
metic progression in one color has a fixed difference d. No matter where it starts,
later there are more than d consecutive integers in the other color. Hence there
is no infinite monochromatic arithemetic progression.
We know even less about van der Waerden numbers than about Ramsey num-
bers: w(2 , 2) = 3, w(3 , 2) = 9, w(4 , 2) = 35, w(3 , 3) = 27, w(3 , 4) = 76, w(5 , 2) =
178, w(6 , 2) = 1132 (Kouril–Paul [2008]), and w(4 , 3) = 293 (Kouril [2012]).
The proof of Theorem 10.3.8 yields what Graham–Rothschild–Spencer [1980]
called “Eeeeenormous Upper Bounds.” For diagonal Ramsey numbers, the induc-
r −1
tion yields roughly R(q; r) ≤ 2 R(q;r−1) ; this builds a “tower ” of r exponentiations.
The bound from Theorem 10.3.8 grows even faster. Let wl(¾) be the result-
466 Chapter 10: Ramsey Theory
Van der Waerden’s Theorem implies Rado ’s Theorem for systems with one
equation, but this still takes some effort. We present an easier application. For a
finite set S of integers, let P(S) be the set of sums of nonempty subsets of S. Folk-
man and others proved that in every ¾-coloring of there are arbitrarily large
sets S such that P(S) is monochromatic. This follows easily from Rado ’s Theorem
(Exercise 19). To prove it from van der Waerden’s Theorem, we need a lemma.
The block structures in the proof of van der Waerden’s Theorem suggest that
it concerns sets and arrangements more than integers. The Hales–Jewett Theo-
rem captures the combinatorial essence. The proof is analogous, so we just state
the result. The point is that when we color a grid in sufficiently many dimensions,
we obtain a monochromatic line. We must define “line” carefully.
Let S = {a0 , . . . , a l−1 }, and let S m be the set of m-tuples drawn from S. We
designate elements of S m by the vector of subscripts. Thus S m can be viewed as
Clm , the m-dimensional grid with l points on each edge. Only the order of ele-
ments in S matters, not their values.
10.3.12. Definition. A line in Clm is a set of l distinct vectors x(0) , . . . , x(l−1) de-
termined by a partition B0 , B1 of [m] and constants cj for j ∈ B0 by setting
(i) (i)
x j = cj if j ∈ B0 and x j = i if j ∈ B1 (B0 may be empty).
In this notion of line, coordinate values vary in the same order on coordinates
in B1 , and they are fixed on each coordinate in B0 . Not every geometric line is a
line here; {210 , 111 , 012} is not a line in C33 .
The Hales–Jewett Theorem includes van der Waerden’s Theorem and implies
Folkman’s Theorem. We present a geometric application. Two sets V, W ∈ m
are homothetic if one arises from the other by a scale change and a transla-
tion, meaning a correspondence between {vi} and {wi} such that wi = cvi + with
c ∈ − {0} and ∈ m .
10.3.14. Theorem. (Gallai–Witt Theorem; see Rado [1933], Witt [1952]) If the
points of m are colored with finitely many colors, then for every finite set
V ⊂ m there exists a monochromatic W that is homothetic to V .
Proof: Let : m → [t] be the coloring. Let l = | V | and N = HJ(l , t). View the
elements of the cube ClN as lists (x1 , . . . , x N) with x i ∈ V . Define : ClN → m
by (x1 , . . . , x N) = ∑ i=1 i x i for constants 1 , . . . , N chosen to make injective.
N
We need only avoid finitely many equalities of the form ∑ i(x i − x i) = 0 and can
choose 1 , . . . , N to be integers.
Once is injective, define : ClN → [t] by (x) = ((x)). The choice of
N guarantees a monochromatic line; let B0 , B1 be its coordinate partition. The
image of the line under is monochromatic under . To see that it is homothetic
to V , observe that (x(j)) = cvj + , where c = ∑i∈ B1 i and = ∑i∈ B0 i x i ; both c
(j)
Most statements of Ramsey theory can be phrased concisely using the vague-
sounding “sufficiently large”. A statement about infinite sets would be simpler.
That is, when we ¾-color the r-subsets of , must there be an infinite homogeneous
set? This seems too much to ask but would avoid quotas and Ramsey numbers and
would imply the finite version.
Extensions to infinite sets can be dangerous, leading to unsupported leaps of
faith and false statements. For example, injections from A to B and B to A must
be bijections when A and B are finite, but this fails when A and B are infinite
(doubling and negation are injections from to , but doubling is not a bijection).
In contrast, Ramsey ’s Theorem behaves as desired. Like the proof of the fi-
nite version, this proof invokes the induction hypothesis for both r − 1 and 1.
However, we ignore quotas and “Ramsey numbers” and don’t care which color
provides the infinite homogeneous set.
Ramsey [1930] proved both versions separately. The infinite version can be
used to prove the finite version (but not the other way!) via the “Compactness
Principle” (also called Rado Selection Principle), which was discovered repeat-
edly (see Rado [1949], Erdős [1950], Gottschalk [1951], de Bruijn–Erdős [1951]).
The Compactness Principle relates colorings of an infinite hypergraph to col-
orings of finite subhypergraphs. If A is a subset of the vertex set of H , then the
induced subhypergraph H A is the hypergraph with vertex set A whose edges
are the edges of H contained in A.
Section 10.3: Further Topics 469
10.3.17. Corollary. (Finite Ramsey Theorem) For ¾ , r, q ∈ , there is n ∈
such that every ¾-coloring of ([n]
r
) has a homogeneous q-set.
Proof: Let H q be the hypergraph with vertex set (r ) that has an edge (Sr) for each
q-set S ⊆ ; note that every edge is finite (with size (qr)). By Ramsey ’s Theorem
(Theorem 10.3.15) every ¾-coloring of (r ) has an infinite homogeneous set; hence
it also has a homogeneous set of size q.
We conclude that H q is not ¾-colorable. Every edge of H q is finite, so the Com-
pactness Principle guarantees a finite set A ⊆ such that H Aq is not ¾-colorable.
Letting n be the largest element of A, we have H Aq ⊆ H[n]q
. We conclude that the
desired n exists and is at most | A|.
What happens for infinite sets of colors? As usual, we color (r ). When r = 1,
the situation is simple. If we use infinitely many colors, then we have an infinite
set receiving distinct colors. Otherwise, we use only finitely many colors, and
then the Pigeonhole Principle guarantees an infinite monochromatic set. When
r ≥ 2, we can no longer guarantee an infinite set whose r-sets all receive distinct
colors or all receive the same color, but we can guarantee a more general object.
10.3.19. Definition. For S ⊂ , a coloring º of (Sr) is canonical if there is a set
of indices I ⊆ [r] such that º (A) = º (B) if and only if for i ∈ I the ith largest
elements of A and B are equal. A colored set is rainbow (or polychromatic
or heterochromatic) if its elements have distinct colors.
The condition for º (A) = º (B) is not that the ith largest elements of A and B
are equal if and only if i ∈ I; additional equalities between A and B are allowed.
For example, if I = ∅, then the condition holds for all {A , B}, so in a canonically
colored S with I = ∅ all r-sets have the same color. On the other hand, if I =
[r], then r-tuples get the same color if and only if they agree completely, so (Sr) is
rainbow colored when I = [r], using distinct colors on all r-sets.
When r = 2, there are two other possibilities: a canonically-colored S with
I = {1} has º (A) = º (B) if and only if min(A) = min(B), and with I = {2} the
requirement is max(A) = max(B). We state the infinite and finite versions of the
general theorem (see Graham–Rothschild–Spencer [1980, 1990, Chapter 5]).
For the finite version when r = 1, see Exercise 11. We prove just the infinite
version for r = 2. The four possibilities for a canonical coloring are monochro-
matic, min-coloring, max-coloring, and rainbow.
With this fixed vertex set {1 , 2 , 3 , 4}, there are 203 possible such patterns, cor-
responding to the 203 distinct partitions of [6] (that is, ∑¾=1 S(6 , ¾) = 203).
6
By the Infinite Ramsey Theorem (Theorem 10.3.15) with 203 colors, under º
all 4-sets in some infinite set S are colored by the same pattern. In fact, as soon
as S has at least seven elements, only a few patterns can hold for all 4-sets in S.
Consider the equalities below, dropping the set brackets within º ({i , j}).
º (a1 , a2) = º (a1 , a3) º (a2 , a4) = º (a3 , a4)
º (a1 , a2) = º (a1 , a4) º (a1 , a4) = º (a3 , a4)
º (a1 , a3) = º (a1 , a4) º (a1 , a4) = º (a2 , a4)
º (a2 , a3) = º (a2 , a4) º (a1 , a3) = º (a2 , a3)
If the pattern on {1 , 2 , 3 , 4} satisfies the first column of equalities whenever
{a1 , a2 , a3 , a4} ⊂ S with a1 < a2 < a3 < a4 , then the coloring is min-determined.
This is distinct from min-coloring in that min-determined does not imply that
º (i , j)
= º (¾ , l) when min{i , j}
= min{¾ , l}. Similarly, a pattern satisfying the
second column is max-determined.
Without loss of generality, let [7] be the first seven elements of S, in order.
Since the pattern is constant over (S4 ), a single equality yields the four require-
ments in either column when applied to various 4-sets in [7]:
if º (2 , 4) = º (2 , 6), if º (2 , 6) = º (4 , 6),
then min-determined then max-determined
2 4 6 7 º (a1 , a2) = º (a1 , a3) 1 2 4 6 º (a2 , a4) = º (a3 , a4)
2 4 5 6 º (a1 , a2) = º (a1 , a4) 2 3 4 6 º (a1 , a4) = º (a3 , a4)
2 3 4 6 º (a1 , a3) = º (a1 , a4) 2 4 5 6 º (a1 , a4) = º (a2 , a4)
1 2 4 6 º (a2 , a3) = º (a2 , a4) 2 4 6 7 º (a1 , a3) = º (a2 , a3)
If º (2 , 4) = º (2 , 6) = º (4 , 6), then the pattern puts all edges of K 4 in the
same class, and º is monochromatic on (S2 ). To complete the proof, we need to
consider the consequences of º (2 , 6)
= º (4 , 6) and º (2 , 4)
= º (2 , 6). Again we
list these in two columns
if º (2 , 6)
= º (4 , 6) if º (2 , 4)
= º (2 , 6)
2 4 6 7 º (a1 , a3)
= º (a2 , a3) 1 2 4 6 º (a2 , a3)
= º (a2 , a4)
2 4 5 6 º (a1 , a4)
= º (a2 , a4) 2 3 4 6 º (a1 , a3)
= º (a1 , a4)
2 3 4 6 º (a1 , a4)
= º (a3 , a4) 2 4 5 6 º (a1 , a2)
= º (a1 , a4)
1 2 4 6 º (a2 , a4)
= º (a3 , a4) 2 4 6 7 º (a1 , a2)
= º (a1 , a3)
If º (2 , 4) = º (2 , 6)
= º (4 , 6), then both columns on the left hold. From the
first, the coloring is min-determined. The second then ensures that the pattern
is a min-coloring. Similarly, º (2 , 4)
= º (4 , 6) = º (2 , 6) forces max-coloring.
Finally, when º (2 , 4)
= º (2 , 6)
= º (4 , 6), we must show that the pattern has
no two edges with the same color. The two columns of inequalities establish dis-
tinctness for eight pairs among the six edges; there are seven more to check. For
example, if º (a1 , a2) = º (a2 , a3), then {1 , 2 , 4 , 5} and {1 , 2 , 6 , 7} yield º (2 , 4) =
º (1 , 2) = º (2 , 6), a contradiction. We leave the remaining cases as Exercise 12.
For the finite version with r = 2 and q ≥ 7, it suffices to let n be the Ramsey
number such that every 203-coloring of ([n]
2 ) has a homogeneous q-set S. The proof
S
above then guarantees that ( 2 ) is canonically colored.
472 Chapter 10: Ramsey Theory
Jamison [2011] showed that lexical colorings can be recognized in time that
is linear in the number of edges. The same is true for monochromatic and rainbow
patterns, so Ramsey families of color patterns can be recognized in linear time.
Exercises for Section 10.3 473
EXERCISES 10.3
10.3.1. (−) Confirm that under the (¾ + 1)-coloring in Example 10.3.2, there is no
monochromatic solution to x + y = .
10.3.2. (−) For edge-colorings of graphs (see Definition 10.3.22), prove that the only pat-
terns that are monochromatic and lexical are monochromatic stars, and prove that the only
patterns that are rainbow and lexical are rainbow forests. (Jamison–Jiang–Ling [2003])
10.3.3. (♦) Hilbert ’s Cube Lemma (Hilbert [1892]). Given a ∈ 0 and d1 , . . . , d m ∈ ,
the affine m-cube H(a , d1 , . . . , d m) is the set {a + ∑i∈ I d i : I ⊆ [m]}. For m , ∈ , prove
that there is a least integer hm ,¾ such that every -coloring of [hm ,¾ ] contains a monochro-
matic affine m-cube. (Hint: Prove hm ,¾ ≤ n + n, where n = hm−1 ,¾ . Comment: Brown–
Erdős–Chung–Graham [1985] proved h2 ,¾ = (1 + o(1)) 2 and showed c1 m ≤ hm ,¾ ≤ c2 for
m
(a) Prove that m2 + m − 1 is the least n such that every 2-coloring of [n] contains a
monochromatic solution (numbers may repeated). (Beutelspacher–Brestovansky [1982])
(b) For each n, determine the maximum size of a subset of [n] containing no solution.
(Comment: Given a1 , . . . , am ∈ , Guo–Sun [2008] found the least n such that all
2-colorings of [n] have monochromatic solutions of ∑i=1 ai xi = x0 . It is rs2 + s − r, where
m
m−1
r = min{a1 , . . . , am} and s = ∑i=1 ai . Schaal [1993] studied c + ∑i=1 xi = x m . No n suffices
m
when c is odd and m is even, but otherwise the value is known. When c ≥ −(m − 2), it is
m2 + (c − 1)(m + 1) if m is odd or c is even. For smaller c it is more complicated.)
10.3.6. (♦) Given a homogeneous linear equation with integer coefficients, let () be the
least n such that every -coloring of [n] produces a monochromatic solution to the equation.
For each equation below, (1) use Rado’s Theorem (Theorem 10.3.4) to determine whether
() exists for all , and (2) determine (2).
(a) x + y = 2 . (b) x + y = 3 . (c) w + x + y = .
10.3.7. Given m, prove that if p is prime and sufficiently large, then x m + y m = m has a
solution in integers modulo p. (Dickson [1909], Schur [1916])
10.3.8. Prove w(3 , 2) = 9. That is, every 2-coloring of [9] has a 3-term monochromatic
arithmetic progression, but some 2-coloring of [8] does not. Generalize the latter to prove
w(l , 2) > 2(l − 1)2 . (Hint: On [9], consider possible colorings of {4 , 5 , 6} or {1 , 5 , 9}.)
10.3.9. (♦) Let ⟨a⟩ and ⟨b⟩ be sequences of distinct positive integers, and fix ∈ . Prove
that if ⟨a⟩ contains arbitrarily long arithmetic progressions, and |bn − an | ≤ for all n,
then ⟨b⟩ contains arbitrarily long arithmetic progressions. (Rubel [1988])
474 Chapter 10: Ramsey Theory
10.3.10. Prove that every infinite sequence has an infinite nondecreasing subsequence or
an infinite decreasing subsequence.
10.3.11. Prove that every finite colored set of at least (¾ − 1)2 + 1 integers has a canonically
colored ¾-set. (Note that the colored objects are 1-sets.)
10.3.12. Finish the proof of the Canonical Ramsey Theorem for r = 2 (Theorem 10.3.21).
10.3.13. Prove that for every 2-coloring of the points of m , there is a set of n integer
lattice points with the same color whose centroid (mean vector) is an integer lattice point
also having that color. (Bòna [1991])
10.3.14. (♦) Prove that every coloring of E(K n) has a rainbow triangle or a monochromatic
spanning tree. (Thus a graph or its complement is connected.) (Galvin [1975])
10.3.15. (♦) A Gallai coloring is an edge-coloring of a complete graph with no rainbow
triangle. (Gyárfás–Simonyi [2004])
(a) Prove that every Gallai coloring with at least three colors has a color class con-
taining no spanning tree. (Hint: Show that the edges joining two components formed by
a color class have the same color.)
(b) Prove that every Gallai coloring arises from a 2-colored complete graph H by ex-
panding each vertex into a Gallai-colored complete graph. That is, each vertex vi expands
into a vertex set Vi so that each Vi induces a Gallai coloring, and each edge xy with x ∈ Vi
and y ∈ Vj inherits the color originally on vi vj in H .
(c) Prove that the pattern Ramsey number of the family consisting of a monochromatic
K1 ,m and a rainbow K3 is the least n such that ⌈ 2n/5⌉ ≥ m.
10.3.16. (♦) Product Ramsey Theorem. For r = (r1 , . . . , rd) ∈ d , an r-grid is a set
S1 × · · · × Sd , where Si is a set of ri natural numbers. Given r, ¾ , and vector thresholds
p1 , . . . , p¾ ∈ d , prove that there exists a vector (n1 , . . . , nd) ∈ d such that any ¾-coloring
of the r-grids of [n1 ] × · · · × [nd ] yields for some i a pi -grid whose r-grids all have color i.
10.3.17. Product van der Waerden Theorem. An arithmetic m-grid of size l is a set
of points in m of the form {(a1 + i1 d1 , . . . , am + im d m): 0 ≤ ij < l}, where d1 , . . . , d m are
fixed positive integers.
(a) Using van der Waerden’s Theorem (not the Hales–Jewett Theorem), prove for
r, l , m ∈ that there is a number W such that every r-coloring of [W ]m contains a
monochromatic arithmetic m-grid of size l.
(b) For r, n ∈
with n > 2, conclude that every r-coloring of 2 contains n points
with the same color spanning a convex polytope with nonzero 2-dimensional volume whose
centroid (mean vector) also has that color. (Comment: This generalizes to m with m ≥ 2.)
10.3.18. Determine the least n such that for every ¾-coloring of [n] there is a pair S of
elements for which the color of the sum of every nonempty subset of S is determined by its
maximum element (see Lemma 10.3.10).
10.3.19. (♦) Prove Folkman’s Theorem from Rado’s Theorem. In particular, show that
the system yT = ∑i∈ T xi for nonempty sets T ⊆ [t] satisfies the Columns Condition.
10.3.20. Consider a positional game with positions x1 , . . . , x n and winning sets {S1 , . . . , Sm}.
(Tic-Tac-Toe has nine positions and eight winning sets.)
(a) Prove that Player 1 can win Tic-Tac-Toe on the m-dimensional cube Clm of side-
length l if l is fixed and m is sufficiently large. (Hales–Jewett [1963])
(b) Suppose that each winning set has size at least a and each position appears in at
most b winning sets. Prove that Player 2 can force a draw if a ≥ 2b.
(c) In Tic-Tac-Toe on Clm , prove that Player 2 can force a draw when l ≥ 3m − 1.
Chapter 11
Extremal Problems
In this chapter, we study extremal problems for families of sets and subsets.
We seek the largest or smallest structure with certain properties, or extreme val-
ues of a parameter over a class of structures.
11.1.1. Definition. The Tur án graph T n ,r is the complete r-partite graph with
n vertices having b parts of size a + 1 and r − b parts of size a, where a = ⌊ n/r⌋
and b = n − ra. Let tr (n) = | E(T n ,r)|.
Turán proved that T n ,r is the unique largest n-vertex graph not containing
K r+1 . The proof by Erdős in Theorem 5.2.11 uses induction on r and the Degree-
475
476 Chapter 11: Extremal Problems
Sum Formula, showing that for every graph G not containing K r+1 , there is an
r-partite graph H with d H (v) ≥ d G(v) for all v ∈ V(G). It also uses that T n ,r is
the unique largest r-partite n-vertex graph (if part-sizes differ by more than 1,
shifting a vertex from a larger part to a smallest part gains edges). Here we note
the asymptotic value of the number of edges.
For the asymptotic optimality of the bound, note that each part-size exceeds
n/r − 1. Counting the edges by pairs of parts thus yields
r(r − 1) n − r 2 1 1 1 n2
tr (n) > ( ) = (1 − ) ( n2 − 2nr + r 2 ) = (1 − ) − O(n).
2 r 2 r r 2
Turán’s Theorem has many proofs. Turán’s original proof used induction on
n (Exercise 7), different from the Erdős proof. The proof in Exercise 8 uses a con-
tinuous optimization problem. Theorem 14.1.15 gives a probabilistic proof. Six
proofs appear in Aigner [1995], and the five proofs in Aigner–Ziegler [1999] in-
clude the proof we present here.
11.1.3. Theorem. (Tur án’s Theorem; Turán [1941]) Among n-vertex graphs
with no (r + 1)-clique, the unique largest graph is T n ,r .
Proof: (Zykov [1949]) Since T n ,r is the unique largest r-partite graph, it suffices
to show that any largest graph G not containing K r+1 is a complete multipartite
graph, which means it does not have K 2 + K 1 as an induced subgraph. If G has
such a subgraph, with vertex set {u , v , w} and vw ∈ E(G), then we find a larger
graph not containing K r+1 .
If d(u) < d(v), then we replace u with a new vertex v having the same neigh-
bors as v, as shown below. Since v and v are not adjacent, we did not create an
(r + 1)-clique. Since d(u) < d(v) = d(v ), the new graph has more edges.
By symmetry in v and w, we may assume d(u) ≥ max{d(v) , d(w)}. Now we
replace both v and w by two new copies of u, as shown below. Again we have create
no larger clique. We lose only d(v) + d(w) − 1 edges, since vw is counted twice, and
we gain 2d(u) edges, so again the new graph is larger.
w• w• •
v•• v •u v•
•u •u •u
• • • • • • • • •
11.1.5. Lemma. If a graph G has n vertices and m edges, then ¾3(G) + ¾3(G)
equals each formula below, where d(v) is the degree of v in G.
(a) (n3) − 12 ∑v∈V(G) d(v)[n − 1 − d(v)] (Sauvé [1961])
(b) (n3) − (n − 2)m + ∑v∈V(G) (d(v)
2
). (Goodman [1959])
Proof: (Sauvé) View G and G as a 2-coloring of E(K n). Edges of G have one color
and edges of G the other. We count monochromatic triangles.
Assign each pair of incident edges in K n weight 2 if they have the same color,
weight −1 if not. A vertex triple inducing a monochromatic triangle contributes
6 to the total weight; other triples contribute 0. Hence the sum of the weights of
all pairs of incident edges is 6 times the number of monochromatic triangles.
Over the pairs of edges incident to v, the weights sum to
n−1− d(v)
2 ) + 2(
2(d(v) 2 ) − d(v)[n − 1 − d(v)].
11.1.6. Theorem. (Goodman [1959]) An n-vertex graph and its complement to-
gether have at least n(n − 1)(n − 5)/24 triangles, sharp when n ≡ 1 (mod 4).
Proof: (Sauvé [1961]) To minimize formula (a) of Lemma 11.1.5, we maximize
the subtracted terms. This is achieved by setting each d(v) to (n − 1)/2. The for-
mula becomes (3n) − 2n (n−41) , which simplifies to the claimed lower bound.
2
By Lemma 11.1.5, ¾3(G) + ¾3(G) depends only on the vertex degrees, not the
choice of edges. Equality in the bound holds if and only if every vertex has degree
(n − 1)/2. This can happen only for n odd and (n − 1)/2 even, so n = 4¾ + 1 and G is
2 ¾-regular. When n ≡ 1 (mod 4), this is achieved by a regular self-complementary
graph, such as the graph obtained by adding one vertex adjacent to the low-degree
vertices in the near-regular self-complementary graph P4 [K ¾ , K ¾ , K ¾ , K ¾ ]. For
other congruence classes, the bound can be improved slightly (Exercise 27).
Proof: Write the formula of Lemma 11.1.5b in terms of G, letting m = ##### E(G)#####
and d (v) = d G(v). Note that 3¾3(G) ≤ ∑ (d 2(v)), since incident edges lie in at most
one triangle. Subtracting this upper bound on ¾3(G) from Lemma 11.1.5b yields
¾3(G) ≥ (n3) − (n − 2)m + 23 ∑ (d 2(v)).
Replace ∑ (d 2(v)) with the lower bound n(2m2/n), replace m with (n2) − m, and sim-
plify (Exercise 1) to obtain ¾3(G) ≥ 3n
m
(4m − n2).
11.1.8.* Remark. Lower bounds. For q + 1 ≥ r > p, the Turán graph T n ,q has the
fewest r-cliques among n-vertex graphs G with ¾p(G) = ¾p(T n ,q). Bollobás [1976b]
proved that linear interpolation yields lower bounds on ¾r(G) for intermediate
values of ¾p(G) (see Bollobás [1978, pp. 297–301]). When p = 2 and r = 3 and m =
| E(G)| , interpolation improves Corollary 11.1.7 for m ∈ [ n4 , n3 ]. Since K n/2 ,n/2 has
2 2
n2/4 edges and no triangles, while K n/3 ,n/3 ,n/3 has n2/3 edges and n3/27 triangles,
interpolation yields at least 9n (4m − n2) triangles. This improves Corollary 11.1.7,
since 9n > 3n m
when m < n2/3.
Just above tr(n) (with n2/4 + 1 edges), Turán’s Theorem guarantees one trian-
gle, the Moon–Moser bound guarantees n/3, and interpolation guarantees 4n/9.
In fact, G has at least ⌊ n/2⌋ triangles (Rademacher; see Erdős [1955], in Hebrew).
This is sharp, by adding one edge to T n ,2 .
Adding q edges inside one part of T n ,2 (without forming triangles) creates
only q⌊ n/2⌋ triangles. Erdős [1962b] proved that this minimizes ¾3(G) when q <
cn, for some constant c. When q = n/2, adding a (¾ + 1)-cycle to K ¾+1 ,¾−1 produces
only (n/2)(n/2)− 1 triangles. For large n, Lovász–Simonovits [1976] proved Erdős’
conjecture that c = 1/2 is best, plus similar results for larger complete graphs.
Mubayi [2010] greatly generalized the results. For an (r + 1)-chromatic graph
F having an edge e such that (F − e) = r, there is a constant c F such that for
1 ≤ q ≤ c F n, every n-vertex graph with tr (n) + q edges has at least qs copies of
F , where s is the minimum number of copies of F formed by adding one edge to
T n ,r . This is sharp for odd cycles and asymptotically sharp in general. The tool is
the Graph Removal Lemma, generalizing the Triangle Removal Lemma (Lemma
11.1.22) obtained from the Szemerédi Regularity Lemma (Theorem 11.1.13).
The problem was also studied for larger numbers of edges: we want to min-
imize r(G) when G is an n-vertex graph with at least n2 edges, where >
1
2
(1 − r−1 1 ). Lovász–Simonovits [1983] conjectured that the minimizing graph is
a complete r-partite graph where all the parts (except one smaller) have the same
size. This was proved for r = 3 by Razborov [2008], for r = 4 by Nikiforov [2011],
and in general by Reiher [2016].
11.1.9. Definition. The Tur án number of F , written ex (n; F), is the maximum
number of edges in an n-vertex graph not containing F . Let G[s] denote the
graph obtained from G by replacing each vertex v with an independent set
Sv of size s, with vertices in Su and Sv adjacent if and only if uv ∈ E(G).
Since any edge beyond a maximal triangle-free subgraph must lie in a trian-
gle, n-vertex graphs with t2(n)+ cn2 edges have many triangles when c is a positive
constant. Similarly, tr(n) + cn2 edges force many (r + 1)-cliques. Erdős and Stone
proved that when n is large enough, tr(n) + cn2 edges force copies of K r+1 whose
union is a complete (r + 1)-partite graph with large vertex classes.
Few exact results are known. For odd cycles, in fact ex (n; C2¾+1) = ⌊ n2/4⌋
when n ≥ 4¾ − 2 (see Füredi–Gunderson [2015], including all n).
For bipartite graphs, Theorem 11.1.11 gives only ex (n; F) ∈ o(n2). Counting
arguments yield better bounds; in fact, ex (n; C4) ∈ O(n3/2). The constructions
involve designs and projective planes, so we postpone discussion of ex (n; C4) to
Chapter 13. Simonovits [1968] pioneered a method for studying Turán numbers
(also called extremal numbers). These have been studied for various bipartite
graphs and families of graphs, surveyed in Füredi–Simonovits [2013].
Of most interest is ex (n; C2¾). Bondy–Simonovits [1974] proved ex (n; C2¾) <
90¾ n1+1/¾ (see Exercise 14.2.11 for a lower bound). The constant was improved by
Verstraëte [2000] and √then Pikhurko [2012]. More recently, Bukh–Jiang [2017]
proved ex (n; C2¾) ≤ 80 ¾ log ¾ n1+1/¾ + 10¾ 2 n when ¾ ≥ 2 and n ≥ (2 ¾)8¾ .
2
The induced subgraphs of fixed size in a “fairly random” bipartite graph have
about the same edge density, if they are not too small. Hence we restrict the edge
density only for subgraphs with at least a fraction of the vertices from each
part. Making smaller is more restrictive, yielding more “regular ” behavior.
When we partition V(G) into singleton sets, every pair is -regular, but ap-
plications require larger parts. We need equipartitions with not too many parts
such that almost all the pairs of parts are -regular. The Regularity Lemma guar-
antees such a suitable partition in a precise way.
Though Szemerédi [1978] is the seminal paper, already the idea was used in
Szemerédi [1975]. Szemerédi [2015] describes a number of variants of the lemma.
We will prove the one stated below.
11.1.15. Theorem. (alternate Regularity Lemma). For , l > 0, there are con-
stants M, N ∈ such that every graph with at least N vertices has an -
regular , -partition for some with l ≤ ≤ M.
| Bj | ≥ | Yj | m for j ≥ t. (∗)
When we are choosing yt , we do not know which vertices will be chosen to
represent the neighbors of x j in {x t+1 , . . . , x j −1 }. The vertex eventually chosen
as yj must be adjacent to all of them. For this reason, we initially preserve many
candidates for y j . As more neighbors of x j are chosen, the number of candidates
we keep decreases. When | Yj | = D, one candidate suffices.
If x j ∈
/ NH (x t), then Yj and Bj do not change when yt is chosen. To maintain
(∗), it suffices to choose yt from Bt so that yt has at least | Bj | neighbors in Bj for
each j with j > t and x j ∈ NH (x t).
For such j , define u and v by x t ∈ Ru and x j ∈ Rv . The pair (Au , Av) is -
regular in G, by definition. We have Bt ⊆ Au and Bj ⊆ Av . Since the hypotheses
guarantee D ≥ , by (∗) we have | Bj | ≥ | Av |.
Let B be the set of vertices in Bt that do not have at least | Bj | neighbors
in Bj . Thus (B , Bj ) < . If | B| ≥ m, then -regularity of (Au , Av) guarantees
(B , Bj ) ≥ d − = , a contradiction.
Hence all but m vertices of Bt have at least | Bj | neighbors in Bj . Since
there are at most D values of j to consider, we discard at most D m vertices of Bt
in this way. We also discard vertices of Bt already chosen to represent vertices of
H in Rv ; there are at most s − 1 of these. There remain at least ( D − D)m − (s − 1)
vertices in Bt ; choose one to be yt .
Since at each t there are at least ( D − D)m − (s − 1) choices for yt , there are
at least [( D − D)m − (s − 1)]n labeled copies of H in G. From = D/(D + 2), we
have D = 2 + D ≥ 2 + D. Thus 2 ≤ D − D. Since also s − 1 ≤ m, we
have ( D − D)m − (s − 1) ≥ m.
Let G be an n-vertex graph with more than tr(n) + cn2 edges. By the alterna-
tive form of the Regularity Lemma, G has an -regular , -partition V0 , . . . , V ,
where l ≤ ≤ M. Let m = | V1 | = · · · = | V | .
The reduced graph R with vertex set v1 , . . . , vn has vi vj ∈ E(R) if and only
if the pair (Vi , Vj) is -regular with density at least d. Showing that | E(R)| >
tr( ) forces K r+1 ⊆ R. The Embedding Lemma then implies K r+1 [s] ⊆ G. Since
(K r+1 [s]) = rs, applying it requires ≤ and s − 1 ≤ m, which were guaran-
teed by the choice of and then n.
The “bad” edges of G are those incident to V0 , within Vi for i ≥ 1, or joining
Vi and Vj when (Vi , Vj ) is not -regular or is -regular with density less than d.
To show that R has enough edges, we show that the number of bad edges in G
is small enough that more than tr ( ) pairs with density at least d are needed to
accommodate the good edges. Note that n − n ≤ m yields n ≤ (1 + ) m, and
hence n2 < 2 2 m2 , since < 1/4. Of course, n2 > 2 m2 .
Since | V0 | ≤ n, the number of edges incident to V0 is less than n2 , which is
less than 2 2 m2 . Since at most 2 pairs are not -regular, at most 2 m2 edges
of G lie in such pairs. Fewer than 12 2 pairs have density less than d, and hence at
most 12 2 dm2 edges lie in such pairs. Each G[Vi] has at most 12 m2 edges, totaling
at most 12 m2 edges. Finally, each edge of R arises from a pair with density at
least d; even when the density is 1, it contributes at most m2 edges to G. Thus
| E(G)| ≤ 3 2 m2 + 12 d 2 m2 + 12 m2 + | E(R)| m2 .
Solving for | E(R)| , further substitution yields the desired bound.
| E(G)| − 3 2 m2 − 12 d 2 m2 − 12 m2
| E(R)| ≥
m2
tr(n) + cn
2
d 1
≥ 2
( 2 m2
− 3 − − )
2 2
tr(n) d 1
≥ 2
( + c − 3 − − )
n2 2 2l
> 1
2
2(1
− 1/r) ≥ tr( ).
Hence K r+1 ⊆ R, and the Embedding Lemma gives K r+1 [s] ⊆ G.
11.1.17.* Remark. As we have noted, the Erdős–Stone Theorem has proofs avoid-
ing these tools. The theorem also can be made more precise. We fixed c and s and
showed that K r+1 [s] is forced by tr (n) + cn2 edges when n is large enough. Instead,
we can fix c and n and ask how large s can be guaranteed as a function of n when
forcing K r+1 [s]. If it grows with n, then the Erdős–Stone Theorem follows. A
lower bound on the growth of s is a quantitative strengthening.
Section 11.1: Forced Subgraphs 483
Our second application of the Regularity Lemma is from graph Ramsey the-
ory. The Ramsey number R(G , G) may grow exponentially in the number of ver-
tices of G, such as when G = K n . In some families of relatively sparse graphs, the
Ramsey number grows at most linearly in the number of vertices! Most famously,
one such family is the family of graphs with bounded maximum degree.
ROTH’S THEOREM
Proof: (Ruzsa–Szemerédi [1978]) The meaning of the statement is that for each
positive , for large enough n every set S ⊆ [n] with | S| = n contains a 3-term
arithmetic progression; this is what we must prove.
We construct a graph G with vertex set A ∪ B ∪ C, where A = {a1 , . . . , an},
B = {b1 , . . . , b2n}, and C = {c1 , . . . , c3n}. For s ∈ S and j ∈ n, add to E(G) the
triangle with vertices {aj , bj + s , cj +2s}. Let Ì be this set of triangles.
The n2 triangles in Ì are edge-disjoint; hence it takes at least n2 edges to
hit all the triangles in G. By the Triangle-Removal Lemma, G has at least n3
triangles (for some constant ). For large enough n, we have n3 > n2 , and hence
G has a triangle T not in Ì ; it uses edges from distinct triangles in Ì.
We gave G no edges within A, B, or C. Let V(T) = {aj , bj + s , cj +t }. By the
construction of G, these three edges require s ∈ S and t − s ∈ S, and also t = 2s
for some s ∈ S. Also, s and s are distinct, since T ∈ / Ì. Since 2s − s = t − s ∈ S,
the numbers s , s , 2s − s form an arithmetic progression in S.
It remains to prove the Regularity Lemma. For this we will need several lem-
mas about the behavior of densities of pairs of vertex sets.
We still need a partition whose nonexceptional parts have equal size. Let m
be the desired part-size, to be specified later. Break each part in P other than V0
into blocks of size m , with fewer than m left over. Combine the leftover vertices
with V0 to form V0 ; this produces Π with ¾ parts other than V0 , where ¾ ≤
# #
n/m . Note that #### V0 #### ≤ | V0 | + m ¾ 2¾ .
Splitting into blocks of size m further increases (we ignore this gain), but
combining the leftovers into V0 reduces . Combining singletons with V0 would
lose the most. The contributions of a singleton part with all other parts sum to
at most the degree of the singleton vertex. Since m 2¾ is an upper bound on
### V − V ### , the amount lost by forming V is at most m 2¾ n.
## 0 0 ## 0
Since m ≥ n(1 − ), we now have (G , Π ) ≥ (G , Π) + 5 n2(1 − )2 − m 2¾ n.
The gain is at least 5 n2 − [5 n2(2 − 2) + m 2¾ n]. To ensure net gain at least
5 n2/2, we want 26 n + m 2¾ < 5 n/2. With < 1/5, it suffices to choose m so
that m 2¾ ≤ 6 n/2. Set m = ⌊ 6 n/( 2¾+1 )⌋ . Now Π is an , -partition with
bounded by a bit more than 2¾+1/6 . Doubling this value suffices. Finally, note
that the exceptional part has gained at most 6 n/2 vertices.
The simple formula for the gain per split is why we keep equal size for the
nonexceptional parts. Later the exceptional part can be distributed to the others.
Proof of the Szemer édi Regularity Lemma (as Theorem 11.1.15) : Given pos-
itive constants and l, we seek positive integers M and N such that every graph
with at least N vertices has an -regular , -partition for some ∈ [l , M].
To apply Lemma 11.1.27, we need < 15 . Since an -regular , -partition is
also an -regular , -partition when > , we may assume < 15 . Similarly, if
the claim is true for a given value of l, it remains true for smaller values, so we
may assume l > 2/.
Given such and l, define M and N as follows. Let L0 = l and Li+1 =
⌈ Li 2 Li +2/6 ⌉ . Let M = L⌈1/ 5 ⌉ , and choose N with N > max{M, l/6 }. Let G be
an n-vertex graph, where n ≥ n. Since l > 2/ , we can form an , l-partition of
G by breaking V(G) arbitrarily into l parts of size ⌊ n/l⌋ , with fewer than n/2
vertices left over for the exceptional part.
Since | E(G)| < n2/2, fewer than −5 iterations of the refinement procedure in
Lemma 11.1.27 produce an -regular , -partition of G. The initial exceptional
set has fewer than n/2 vertices, and the exceptional set gains fewer than 6 n/2
with each iteration. With fewer than −5 iterations, the final exceptional set has
at most n vertices. Also, the final partition has at most M parts.
11.1.28.* Remark. Since the upper bound on the number of parts in Lemma
11.1.27 is 2+2/6 , iterating −5 times makes N an exponential tower with height
−5 . Thus the Regularity Lemma applies only to enormous graphs.
We have given only a few applications of Regularity; there are many others.
Komlós–Simonovits [1996] is an influential early survey; others include Komlós–
Shokoufandeh–Simonovits–Szemerédi [2002], Kohayakawa–Rödl [2003], Rödl–
Schacht [2010]. K ühn–Osthus [2009] explains the use of the regularity/blow-
up method in general. The original lemma gives useful results only for dense
graphs; Kohayakawa [1997] developed an analogue for sparse graphs (see also
Kohayakawa–Rödl [2003], Gerke–Steger [2005], and Scott [2011]). Frankl–Rödl
Exercises for Section 11.1 489
EXERCISES 11.1
11.1.5. Let G be a connected graph having neither P4 nor the 4-vertex “paw” obtained by
adding one edge to K1 ,3 as an induced subgraph. Prove that G is complete multipartite.
11.1.6. Prove that every n-vertex graph not containing K r+1 has at most (1 − 1r ) n2 edges.
2
11.1.7. (♦) Turán’s proof of Turán’s Theorem. Recall that tr(n) = | E(T n ,r)| .
(a) Prove that a maximal graph with no (r + 1)-clique has an r-clique.
(b) For n ≥ r, prove that tr(n) = (2r ) + (n − r)(r − 1) + tr(n − r).
(c) Use parts (a) and (b) to prove Turán’s Theorem by induction on n, including the
uniqueness of graphs achieving the bound. (Turán [1941])
11.1.8. Let S be the set of nonnegative vectors in n with sum 1. Given a graph G with
vertex set {v1 , . . . , vn}, let (x) = ∑vi v ∈ E(G) xi xj for x ∈ S, and let = max x∈S (x).
j
(a) Prove that is maximized by some vector whose nonzero coordinates correspond
to the vertices of a clique. Conclude = 12 (1 − 1/(G)).
(b) Prove that is attained by a vector x with all coordinates nonzero if and only if G
is a complete multipartite graph.
(c) Prove Turán’s Theorem for K r+1 -free n-vertex graphs by induction on n − ⌊ n/r⌋ ,
using parts (a) and (b) for the base case. (Motzkin–Straus [1965])
11.1.9. (♦) The Turán graph T n ,r with size tr(n) is the complete r-partite graph with b
parts of size a + 1 and r − b parts of size a, where a = ⌊ n/r⌋ and b = n − ra.
(a) Prove that tr(n) = (1 − 1/r)n2/2 − b(r − b)/(2r).
(b) Since tr(n) is an integer, part (a) yields tr(n) ≤ ⌊ (1 − 1/r)n2/2⌋ . Determine the
smallest value of r such that strict inequality occurs for some n. For this value of r, deter-
mine the values of n such that tr(n) < ⌊ (1 − 1/r)n2/2⌋ .
11.1.10. Let a = ⌊ n/r⌋ . Compare the Turán graph T n ,r with the graph K a + K n− a to prove
directly that tr(n) = ( n−2 a) + (r − 1)(a+2 1 ) .
11.1.11. Given positive integers n and , let q = ⌊ n/ ⌋ , r = n − q , s = ⌊ n/( + 1)⌋ , and
t = n − s( + 1). Use Turán’s Theorem to prove (2q) + rq ≥ (2s)( + 1) + ts. (Richter [1993])
11.1.12. Let G be a graph with n vertices and m edges. Determine lower bounds on (G)
and (G) in terms of n and m that are sometimes sharp.
490 Chapter 11: Extremal Problems
11.1.13. Let S be a set of n points in a circular region with radius 1√, and consider the
distance between any two points in S. Prove that the distance exceeds 2 for at most n2/3
of the pairs. (Bondy–Murty [1976, p. 114])
11.1.14. (♦) Let G be a graph with n vertices that has tr(n)− ¾ edges and at least one (r + 1)-
clique, where ¾ ≥ 0. Prove that G has at least r(n) + 1 − cliques of size r + 1, where
r(n) = n − ⌈ n/r⌉ − r. (Hint: Prove that a graph with exactly one (r + 1)-clique has at most
tr(n) − r(n) edges.) (Erdős [1964], Moon [1965c])
11.1.15. (♦) Let ¾(n) be the minimum size of a family F of subsets of [n] such that every
subset of [n] with size at most is the union of two (possibly equal) members of F . Note
that 1 (n) = 2√(n) = n + 1. (Comment: Füredi–Katona [2006] determined also 4(n).)
(a) Prove 2 · 2 n/2 − 1/2 ≤ n(n) ≤ 2⌈n/2⌉ + 2⌊n/2⌋ − 1.
(b) Prove 3(n) = 1 + n + ( n2) − ⌊ n2/4⌋ .
11.1.27. For an n-vertex graph G, prove the bounds below and show that they are sharp.
⎧
⎪ 2( l ) if n = 2l
⎪
⎪2 3
¾3(G) + ¾3(G) ≥ ⎨ 3 ¾(¾ − 1)(4 ¾ + 1) if n = 4 ¾ + 1 .
⎪
⎪
⎪
⎩ 3 ¾(¾ + 1)(4 ¾ − 1) if n = 4¾ + 3
2
• • • • •
• • • • •
• • • • •
• •
•
11.1.30. Construct a 3-uniform hypergraph with asympotically 95 (n3) edges that does not
(3)
contain K4 , the complete 3-uniform hypergraph with four vertices. (Comment: Turán
[1941] conjectured that this is asymptotically the most edges in such an n-vertex hyper-
(3)
graph: that is, ex (n; K4 )/(3n) → 5/9. Erdős offered $1000 for a proof. Chung–Lu [1999]
proved an upper bound of .593, and Razborov [2011] lowered it to .561.)
11.1.31. (♦) Erdős–Stone Theorem (Theorem 11.1.10). Fix ∈ (0 , 1), and consider r, t ∈ .
(a) Prove that when n is sufficiently large, every n-vertex graph with minimum degree
at least (1 − 1/r + )n contains K r+1 [t]. (Hint: Use induction on r.) (See Lovász [1993])
(b) Prove ex (n; K r+1 [t]) ≤ (1 − 1/r + )n2/2 for sufficiently large n. (Erdős–Stone [1946])
11.1.32. An ordered graph is a graph with linear order on the vertices. The interval
chromatic number of an ordered graph is the least number of independent sets of consec-
utive vertices needed to cover the vertices (ranging from 2 to n for n-vertex ordered paths).
An ordered graph G avoids an ordered graph H if H does not appear in G via an order-
preserving injection on the vertices. Let ex (n; H) be the maximum number of edges in an
n-vertex ordered graph that avoids H . Use the Erdős–Stone Theorem to prove that if H has
interval chromatic number , then ex (n; H) = (1 − ¾−1 1 )(n2) + o(n2). (Pach–Tardos [2006])
11.1.33. A graph G is F-saturated if it does not contain F , but adding any edge creates
a copy of F . For n ≥ t − 1, prove that K t−2 K n− t+2 has the fewest edges among all K t -
saturated graphs with n vertices. (Erdős–Hajnal–Moon [1964])
492 Chapter 11: Extremal Problems
11.1.34. (♦) Prove that there is an n-vertex F-saturated graph (see Exercise 11.1.33 for def-
inition) having at most ( (F) − 1)n + (F)n/2 edges, where (F) is the vertex cover number
of F . (K ászonyi–Tuza [1986]; clarified in Füredi [2007])
11.1.35. Let sat(n; F) be the minimum number of edges in an F-saturated graph with n
vertices (see Exercise 11.1.33 for definition).
(a) Determine sat(n; K3).
(b) With P being the Petersen graph, show that sat(n; P) ≤ 4n − 4.
11.1.36. Given the Regularity Lemma (Theorem 11.1.15), prove that one can instead re-
quire an -regular partition in which each part belongs to at most irregular pairs (in-
stead of a total of 2 irregular pairs).
11.1.37. (♦) The Ramsey–Tur án problem. (Szemerédi [1972])
(a) Let G be a graph with 2n vertices, partitioned into sets A and B of size n. Show
that if | [ A , B]| ≥ (1/2 + )n2 , then G contains K4 or an independent set of size n/2.
(b) Let G be a graph with 3n vertices partitioned into sets A, B, and C, each of size n.
Show that if each pair among { A , B , C} is -regular and has density more than 2 , then
G contains K4 or an independent set of size at least 2 n.
(c) (+) Let G be an n-vertex graph. Prove that if G does not contain K4 , and (G) ∈
o(n), then | E(G)| < (1/8)n2 + o(n2).
11.1.38. The Slicing Lemma. Let (A , B) be an -regular pair with density d, where
0 < ≤ ≤ 1/2. Prove that for any A ⊆ A and B ⊆ B with | A | ≥ | A| and | B | ≥ | B| ,
the pair (A , B ) is /-regular with density greater than d − .
11.1.39. (♦) Let G be an A , B-bigraph with | A| = | B| = n.
(a) Prove that if G has no independent set consisting of (G) vertices in A and (G)
vertices in B, then G has a perfect matching.
(b) Obtain a perfect matching when (A , B) is an -regular pair and (G) > n.
11.1.40. (♦) Given an -regular pair (A , B) with density d and | A| = | B| = m, let a vertex
v in A ∪ B be good for the pair if it has at least (d − )m neighbors in the other part.
(a) Let x ∈ A and y ∈ B be fixed good vertices in the pair (A , B) as specified above.
Prove that if d > 5 , then when m is sufficiently large there is an x , y-path of length at
least (1 − − d− )2m that avoids any K specified vertices.
(b) Given d > 5 , let R be the reduced graph of -regular pairs with density at least d
resulting from an -regular partition of an n-vertex graph G. Prove that if R has vertices
and some component of R has a matching of size t, then G has a cycle of length at least
(1 − − d− ) 2t
n. (See Figaj–Łuczak [2007] for similar results.)
11.1.41. (+) Let G be an A , B-bigraph √ with | A| = | B| = n and (G) ≥ dn. Prove that if
(A , B) is an -regular pair and d > 3 + , then G has a spanning cycle. (Haxell [1997])
11.1.42. Let (A , B) be an -regular pair with density d and | A| = | B| = n.
(a) For ∈ , consider Y ⊆ B such that (d − )−1 | Y | ≥ | B|. Prove that the number
of -tuples (x1 , . . . , x) of elements of A having at most (d − ) | Y | common neighbors in Y
is at most | A| . (Komlós–Simonovits [1996]) (Comment: Lemma 11.1.20 is = 1.)
(b) Prove that at least 14 (1 − 4 )(d − )4 n4 4-cycles alternate between A and B.
11.1.43. (♦) (6,3)-Theorem (Ruzsa–Szemerédi [1978]).
(a) Let G be an n-vertex graph with every edge in exactly one triangle. Use the
Triangle-Removal Lemma (Lemma 11.1.22) to prove that G has o(n2) edges.
(b) Let G be an n-vertex graph that decomposes into at most n induced matchings (ver-
tices of distinct edges in such a matching are not adjacent). Prove that G has o(n2) edges.
(c) Let H be a 3-uniform n-vertex hypergraph having no six vertices that induce at
least three edges. Prove that H has o(n2) edges.
Section 11.2: Families of Sets 493
11.1.44. (♦) Fix c ∈ (0 , 1). Prove that for some n ∈ , any set of at least cn2 points in [n]2
contains three distinct points of the form {(x , y) , (x + a , y) , (x , y + a)}. (Hint: Use Lemma
11.1.22 on a suitable graph.) (Ajtai–Szemerédi [1974], Solymosi [2003])
11.2.1. Definition. A family of sets or set system is a set whose members are
sets. A ¾-uniform family is a family of ¾-sets.
11.2.2. Definition. The t-shadow of a family F is the family of all t-sets con-
tained in members of F . The shadow F of a -uniform family F is its ( − 1)-
shadow. The shade is the family of all ( + 1)-sets containing members of F .
Among all -uniform families of size m, we seek the family F with smallest
shadow. Since each -set contributes exactly sets to the shadow and | F | is fixed,
the size of the shadow is minimized when the sets in the shadow arise from many
members of F . This can be achieved by confining F to subsets of a small subset of
[n]. The amazing result is that there exists an ordering of the -sets such that,
for each m, the first m sets in this ordering form an optimal family.
To confine the initial sets to a small subset of [n], we define an ordering of
-sets in which x precedes y if the largest element of x is less than the largest
element of y. We use notation like x and y for -element subsets to emphasize
their interpretation as binary incidence vectors.
To facilitate the proof that the first m sets in this order form an optimal fam-
ily, we study its shadow.
11.2.5. Lemma. If the vector with index m in the colex ordering on ([n] ¾ ) has 1 in
positions m1 , . . . , m¾ , with m1 < · · · < m¾ , then m = (m¾¾ ) + (m¾−¾−11 ) + · · · + (m11 ).
Proof: Let be the vector with index m. Indexing starts with 0, so m counts the
vectors preceding . We count them another way. To reach , we must skip all
vectors whose th 1 appears before position m¾ . There are (m¾¾ ) of these, since
the first position is position 0. Some vectors with the last 1 in position m¾ also
precede . These begin with (m¾−¾−11 ) vectors having − 1 1s in positions before m¾−1 .
Continuing, the jth term in the summation counts the vectors that appear before
in the ordering and have their last j − 1 1s in the same positions as .
11.2.6. Corollary. For m , ∈ , there is a unique expression of m in the form
(m¾¾ ) + (m¾−¾−11 ) + · · · + (mi i ) with m¾ > · · · > mi ≥ i.
Proof: In the colex ordering on ([n]¾ ), appending 0s increases the number of co-
ordinates without changing the position of the first (¾n) vectors. Lemma 11.2.5
thus applies for any n with (¾n) > m to obtain an expression for m using the vector
with index m in the ordering. Left-justified 1s in the vector yield mj = j − 1 and
contribute 0; we drop those terms from the expression in Lemma 11.2.5 to obtain
an expression of the desired form. Two such expansions correspond to distinct
vectors in the colex ordering and hence distinct values of m.
11.2.8. Lemma. The shadow of the first m vectors in the colex order on ([n]
¾ ) con-
sists of the first ¾ (m) vectors in the colex order on (¾[n]
−1 ).
Proof: We count the shadow using Lemma 11.2.5. The family consisting of all
elements of ([n]
¾ ) whose last 1 appears before position m¾ has shadow consisting of
all vectors of weight − 1 whose last 1 precedes position m¾ . In general, the j-th
term in the summation for ¾ (m) considers all vectors before the indexed vector vm
in ([n]
¾ ) that have their rightmost j − 1 ones in the same positions as vm . It counts
the portion of their shadow consisting of sets whose last j − 1 ones are in those
same positions. This is the portion of the shadow not counted by earlier terms.
Thus the full sum counts the entire shadow exactly.
Section 11.2: Families of Sets 495
Note that the optimal family depends only on m and ¾ , not n, as long as (¾n) ≥
m. The Kruskal–K atona Theorem is a very precise statement. For many appli-
cations, a smoothed version due to Lovász [1979] suffices. It treats m as a value
of the “choose ¾ ” polynomial and can also be proved using shift operators (Ex-
ercise 9). Instead, we give a short more recent proof. Exercise 10 requests the
characterization of when equality holds.
Proof: (Keevash [2008]) Note that F is contained among the -sets whose ( − 1)-
subsets are all present in F . Letting r = − 1, it therefore suffices to show that
when G is a family of size (ur) in ([n] r
), the number of (r + 1)-sets whose r-sets are
u
all present in G is at most (r+1 ).
We use induction on r; the claim is immediate when r = 1. For r > 1, we
treat G as the edge set of a hypergraph. We may assume that each v ∈ [n] lies in
some member of G. Let d(v) be the number of edges of G containing v. Let G (v)
be the family of (r − 1)-sets obtained by deleting v from edges of G. Let q(v) be the
number of (r + 1)-sets containing v whose r-sets all lie in G.
Note that S ∪ {v} is counted by q(v) if and only if S ⊆ G and all (r − 1)-subsets
of S lie in G (v). The first condition implies q(v) ≤ | G | − d(v), while the second
bounds q(v) by the number of r-sets whose (r − 1)-subsets all lie in G (v).
We claim that for all v, at least one of these bounds is at most u−r r d(v). If
d(v) ≥ (ur−−11), then (ur) − d(v) ≤ ur (ur−−11) − d(v) ≤ u−r r d(v). If d(v) ≤ (ur−−11), then define
u by d(v) = (ur−−11 ); note that u ≤ u. Note also that | G (v)| = d(v). By the induction
hypothesis, at most (u r−1 ) elements of ([n] r
) have all their (r − 1)-sets in G (v). We
u −1 u −r u −1 u−r
compute ( r ) = r ( r−1 ) ≤ r d(v).
Finally, every (r + 1)-set whose r-sets are all present in G is counted r + 1
times in ∑v∈[n] q(v). Hence the number of these sets is bounded by r(ru−+r1) ∑v∈[n] d(v).
Since the degree sum is r | G | , which equals r(ur), the bound simplifies to (r+u1 ).
We began with the Kruskal–K atona Theorem due to its relation to Turán-
type problems, but the most fundamental problem in extremal set theory is to
maximize the size of a family in which no member contains another. Sperner
[1928] gave the answer. The theorem has many proofs, most of which extend to
interesting additional results. Chapter 12 presents some of these extensions.
Section 11.2: Families of Sets 497
We will see that a largest such family uses only ¾-sets. The ¾-sets contain-
ing t particular elements form a t-star that is an EK R(¾ , t)-family of size (¾n−−tt).
When n is sufficiently large, this is the extremal family. We first consider only the
case t = 1, using a counting argument. In this case we may express the problem
as a Turán-type problem; we seek a largest ¾-uniform hypergraph not contain-
ing the hypergraph consisting of two disjoint edges. Published in 1961, the EKR
Theorem was actually proved in 1938, as noted by Erdős [1990].
←x→
The original proof pushed an EK R( , t) family toward the claimed extremal
family using shift operators.
Frankl [1987] proved via shift operators that EK R( , t)-families have size
at most (¾n−−tt) when n is sufficiently large. Forbidding t-stars costs a lot; an
−1
EK R( , 1)-family with no common element has size at most (n¾− ) (n−¾−¾−1 1 ) + 1
1 −
(Hilton–Milner [1967]; see Exercise 14). Bollobás [1986] considered larger t.
2 t− j ¾ − t− j 2 ¾ − t− j
With Sj = ( tj )(¾−j t) (n¾−
− t− j
t− j ), we have Sj = j +1 ( j +1 ) < (j + 1)−3 . Since
S
j +1
n− t− j
∞
∑ j =2(j + 1)−3 < 1, we have ∑ j =2 Sj < 2S2 , so
t
t
n−t−2 t2(¾ − t)5 n − t − 1
∑ Sj < t2(¾ − t)4 (¾ − t − 2) < n− t
(
¾−t−1
).
j =2
t2 (¾ − t)5 1 n− t n− t−1
Since n− t < 14 ¾n−−tt when n > 2t¾ 3 , we obtain ∑tj =2 Sj < (
4 ¾ − t ¾ − t−1
), and then
1 n− t n− t
4 ¾−t < ¾−t − ¾ − t(¾ − t)2 (for n > 2t¾ 3) finishes the proof.
3
At first, “sufficiently large” meant n ≥ t + (¾ − t)(¾t ) ; the threshold in Theo-
rem 11.2.22 is better. Frankl [1976] and Wilson [1984] together showed that the
t-star of ¾-sets is optimal when n ≥ (t + 1)(¾ − t + 1), extending Theorem 11.2.18.
For smaller n, other EK R(¾ , t)-families are larger, such as (⌈(n+[n]
1)/2⌉
) when t = 1
and n < 2 ¾ . Ahlswede–K hachatrian [1997] determined the extreme in all cases
(see Exercise 22), as conjectured by Frankl [1978].
The Erdős–Ko–Rado Theorem for t = 1 follows easily from the Kruskal–
K atona Theorem, as shown by Daykin [1974a]). The earlier result below uses
the same ideas and is stronger (simply set F = G).
Proof: Let F ⊂ (n[n] −¾) consist of the complements of members of F . Note that
n − ¾ ≥ l, since ¾ + l ≤ n. The family G ∪ F is an antichain. Thus the l-shadow of
F is disjoint from G. By the Kruskal-K atona Theorem, the size of the l-shadow
of F is at least l+1 l+2 · · · n−¾ (| F |). Thus | G | + l+1 l+2 · · · n−¾ (| F |) ≤ (nl).
If | F | ≥ (¾n−−11), then also | F | ≥ (nn−
−¾ ), and the first term in the (n − )-binomial
1
n−1
expansion of | F | is (n−¾). Regardless of what else is present, iteration of yields
(n−l 1 ) as a lower bound on the second term in the inequality above. Thus | G | ≤
(nl) − (n−l 1) = (nl−−11 ).
11.2.25. Conjecture. (Chvátal [1974]) Every ideal of subsets of [n] has the star
property.
The term “ideal” is traditional for this topic and is used in the rest of this
chapter. Since “ideal” is used in other ways in other areas of mathematics, “down-
set ” has grown in popularity as a alternative term without alternative meanings.
As we observed before Definition 11.2.24, the Erdős–Ko–Rado Theorem im-
plies the conjecture for the ideal consisting of all subsets of [n] with size at most
¾ , where ¾ ≤ n/2. Example 11.2.16 proves it for the family of all subsets of
[n]. Other partial results appear in Chvátal [1974], K leitman–Magnanti [1974],
Berge [1975], and Wang–Wang [1978]; they are surveyed in K leitman [1979].
We show first that an intersecting family cannot contain more than half of
an ideal, because ideals split into pairs of disjoint sets. The proof removes some
disjoint pairs from the “top” of the ideal and applies induction to the rest.
H
I−H
502 Chapter 11: Extremal Problems
B
F− F F
↑
I
H ↓
x H
(it does not matter whether H is an ideal). Since F is pairwise intersecting and
Y ∈ H is disjoint from its mate, H ∩ F = ∅. Furthermore, Y ∪ {x} also is
disjoint from the mate of Y in F , so Y ∪ {x} ∈ / F − F .
It remains only to show Y ∪ {x} ∈ I to obtain (F − F ) ∪ H as a star generated
by x with size | F | . Since B ⊆ F and F ∩ H = ∅, we have Y ∈
/ B. Thus Y is non-
maximal in I and has the form A − a for some A ∈ I ⊂ I. The hypothesis then
yields Y ∪ {x} ∈ I.
SUNFLOWERS (optional)
In the problems we have considered thus far, our notion of “star ” was a family
of sets having a common element. Now we consider a more restricted notion.
let B be the union of the sets in H ; note that | B| ≤ ¾(s − 1). Every member of
F intersects B. By the Pigeonhole Principle, some element of B lies in at least
| F | /| B| members of F . We compute
| F | ¾ !(s − 1)¾
> = (¾ − 1)!(s − 1)¾−1 .
| B| ¾(s − 1)
Deleting x from the sets containing it yields a (¾ − 1)-uniform family F with
more than (¾ − 1)!(s − 1)¾−1 members. By the induction hypothesis, F contains a
sunflower of size s. Returning x to its sets yields a sunflower in F of size s.
For the construction, let X 1 , . . . , X ¾ be disjoint sets of size s − 1. Let F
be the family of all transversals (¾-sets consisting of one element from each of
X 1 , . . . , X ¾). If F contains a sunflower A1 , . . . , A s , then some element x belongs
to exactly one of A1 , . . . , A s . By symmetry, we may assume x ∈ A1 ∩ X 1 . Since
the pairwise intersections are the same, the sets A1 , . . . , A s must intersect X 1
in distinct elements. Since | X 1 | = s − 1, this is impossible.
It is not known whether the bound ¾ !(s − 1)¾ in Theorem 11.2.30 is sharp.
11.2.31. Conjecture. (Erdős–Rado [1960]) For ¾ ∈ there is a constant c¾ such
that every ¾-uniform family F with | F | > cs¾ contains a sunflower of size s.
ENTROPY (optional)
The notion of entropy is quite different from the rest of this section. We
include it here because it can yield extremal results on enumerative problems
related to topics studied in this chapter. Our treatment draws on Alon–Spencer
[2008] and an excellent tutorial by Galvin [2014]; see also Radhakrishnan [2003].
Section 11.2: Families of Sets 505
The point is this: if we have a random variable X defined over some set S,
and we can compute H(X) without knowing | S| , then by Lemma 11.2.34 we have
|S| ≥ 2 H(X) , with equality if X actually is uniform over S.
We need some additional notions about random variables. When X and Y
are random variables, with outcomes respectively in S and T , we denote by
(X , Y) the joint random variable; it has outcomes in S × T , with (X = i) =
∑ j ∈ T ((X , Y) = (i , j)) and (Y = j) = ∑i∈S ((X , Y) = (i , j)).
506 Chapter 11: Extremal Problems
11.2.35. Lemma. If X and Y are random variables, then H(X) ≤ H(X , Y).
Proof: The joint distribution breaks events for X into subevents; intuitively, this
cannot reduce the expected information in the outcome. In the entropy computa-
tion, breaking an outcome with probability p+ p into outcomes with probabilities
p and p replaces −(p + p ) lg(p + p ) with − p lg p − p lg p , which is larger since
− lg is a decreasing function. Repeating this leads us from H(X) to H(X , Y).
Intuitively, the information gained in knowing the outcome for the joint vari-
able (X , Y) is the information gained in knowing X plus the information gained
in knowing Y given that we already know X . We formalize this.
11.2.37. Lemma. (Chain Rule for entropy) H(X , Y) = H(X) + H(Y | X).
Proof: For simplicity, we just write the value for the event that the variable
takes that value. Since (Y = y | X = x) = (X = x & Y = y)/(X = x), we thus
write p(y | x) = p(x , y)/p(x). Note also ∑ y p(y | x) = 1. We compute
1
H(X | Y) = − ∑ p(y) ∑ p(x | y) lg p(x | y) = ∑ p(x) ∑ p(y | x) lg
y x x y
p(x | y)
p(y | x) p(y)
≤ ∑ p(x) lg ∑
p(x | y) ∑
= p(x) lg ∑
x y x y
p(x)
1
= ∑ p(x) lg = H(X).
x
p(x)
Already we can use entropy to give a good bound on the number of subsets of
[n] with size at most n. For 0 ≤ ≤ 1, let H( ) = − lg − (1 − ) lg(1 − ); note
that H( ) is the entropy of a 0 , 1-variable with success probability .
Proof: (Massey [1974]) The lower bound is the lower bound for the top term from
Exercise 2.3.14, using Stirling ’s Formula. For the upper bound, let F be the
family of subsets of [n] with size at most n. Choose a member of F uniformly at
random, generating the random binary n-tuple X where X i = 1 if and only if i is
in the chosen set. By Lemma 11.2.34, it suffices to show H(X) ≤ H( )n.
By subadditivity and symmetry, H(X) ≤ ∑ i=1 H(X i) = nH(X 1). Since X 1 is
n
the sets in F that contain i, and let m = | F | . Let G be the family of all pairwise
intersections of sets in F . By the condition on F , we have | G | = (m2 ). Element i
pi m
appears in ( 2 ) of the members of G; that is, in a proportion less than p2i . By
Corollary 11.2.41, | G | ≤ 2 i H(pi ) .
2
where p = ∑ p¾i pi . The maximum of H(p2)/p occurs at p ≈ .4914, where the value
is about 1 .6228. Thus (m 2 ≤ 2
) 1 .6228¾
, so roughly | F | ≤ 2 .8114¾+o(¾) .
Summing over all A ∈ F yields a lower bound on ∑{i1 ,... ,i¾ }= A∈ F H(X i1 , . . . , X i¾ ).
In the lower bound, each term of the form H(X i | X 1 , . . . , X i−1) appears at least r
times. Hence
n
| G | ≤ ∏ | t A(G) |1/r .
A∈ F
Section 11.2: Families of Sets 509
The total size of all members of is s | |. By symmetry, each vertex pair lies
in the same number of members of , so it occurs in exactly s | | /(n2) such graphs.
This is the value of r in Lemma 11.2.44.
For each A ∈ , the family t A() is an intersecting family. In particular, any
B , B ∈ share a triangle, but the complement of A has no triangle, so B ∩ A and
B ∩ A must share an edge of that triangle.
Since t A() is an intersecting family of subsets of A, and | A| = s, we conclude
|t A()| ≤ 2 s−1 (recall Example 11.2.16). Since s | | /r = (n2) and s ≤ 12 (n2), using
Lemma 11.2.44 yields
A∈
We have presented here only the basic ideas of using entropy to prove bounds
on extremal combinatorial problems: the relationship between entropy and the
number of outcomes, subadditivity, and Shearer ’s Lemma. Similar applications
appear in Exercises 38–41. Meanwhile, Galvin [2014] presents an impressive va-
riety of applications and pointers to applications of entropy. We describe a few
below to encourage readers to explore more deeply.
11.2.46. Example. Antichains of subsets of [n]. By taking families of n/2-sets
from [n], one can form 2(⌈n/2⌉) antichains. K leitman [1969] was the first to show
n
n
that the logarithm of the total number of antichains is asymptotic to (⌈n/2⌉) (see
Section 12.2). Pippenger [1999] showed how to prove this using the properties of
entropy discussed here, though his lower-order terms were not as sharp.
510 Chapter 11: Extremal Problems
EXERCISES 11.2
11.2.1. (−) Fix m , ¾ ∈ . When n is sufficiently large, how can a family of m sets of size ¾
be chosen in [n] to maximize the size of the shadow of the family?
11.2.2. (−) Permutations (in word form) intersect if they agree in some position. Find the
maximum size of an intersecting family of permutations of [n]. (Deza–Frankl [1977])
11.2.3. (−) Does every maximal intersecting family in 2[n] have size 2 n−1 ?
11.2.4. (−) Let I be an ideal of subsets of [n]. Prove that every element of [n] appears in
at most half the members of I.
11.2.5. (−) Use the Sunflower Theorem to prove that every graph with more than 2(¾ − 1)2
edges contains a matching of size ¾ or a star of size ¾ .
11.2.6. Determine the maximum size of a family of subsets of [n] such that no element
belongs to at least two sets in the family and is omitted by at least two sets in the family.
11.2.7. Use the Kruskal–Katona Theorem to prove that the size of the shade of a family
of m elements of ([n]
¾ ) is minimized by the family consisting of the first m elements of the
11.2.8. (♦) Let G be an n-vertex graph with m edges. For each ¾ ∈ , determine the max-
imum number of ¾-cliques in G, and construct an example achieving equality. (Bollobás)
11.2.9. Explain how to modify the shift-operator proof of the Kruskal–Katona Theorem
(Theorem 11.2.11) to give a direct proof of Theorem 11.2.12 that the shadow of a ¾-uniform
family with size (u¾) has size at least (¾−u 1 ). (Frankl [1984])
11.2.10. Let F be a ¾-uniform family of size (u¾) . Refine the proof of Theorem 11.2.12 to
show that the shadow of F has size exactly (¾−u 1 ) if and only if u is an integer and F consists
of all ¾-sets in a set of size u. (Lovász [1979])
Exercises for Section 11.2 511
º¾ + ¾ +1 (¾ +1 + ··· +
l −1 ( l −1 + l(l))) ≤ (¾n).
(Clements [1973], Daykin–Godfrey–Hilton [1974])
11.2.12. Fix r ≥ 2. For what values of n is it possible to color every square in an n-by-n
grid with one of r colors so that , for all i , j , between 1 and n with i
= j and j
= , the
square in row i and column j is assigned a different color from the square in row j and
column . (Hint: Use Sperner ’s Theorem.) (Propp [1998])
11.2.13. Define a rising antichain to be an antichain of subsets of [n] whose sizes are
distinct. Let two rising antichains be equivalent if one is obtained from the other by com-
plementing all sets and/or relabeling the elements of [n].
(a) Determine the maximum size of a rising antichain of subsets of [n].
(b) Prove that when n ≥ 5, the largest rising antichains are all equivalent to each
other. (Bey–Griggs [2002])
11.2.14. For n > 2 , construct an intersecting family of -subsets of [n] with size (¾n−−11) −
(n−¾−¾−1 1) + 1 that is not a star. (Comment: Hilton–Milner [1967] proved that none is larger.)
11.2.15. For n ≥ t ≥ 1, let q = ⌈ (n + t)/2⌉ . Prove that a largest t-intersecting family in 2 n
has size ∑i= q ( ni) when n + t is even and ∑i= q (ni) + (nq−−11 ) when n + t is odd. (Katona [1964])
n n
11.2.16. Let F be a family of 4-sets of [n] that pairwise intersect at most twice. Prove the
existence of S ⊂ [n] with | S| ≥ ⌈ (6n − 6)1/3 ⌉ that contains no member of F . (Adrian [1991])
11.2.17. Let F be an intersecting family of subsets of [n] whose members have size at most
¾
. Prove that | F | ≤ ∑i=1 (ni−−11 ) , with equality only for stars if < n− 1.
11.2.18. (♦) Prove that the largest antichain of subsets of [n] consisting of pairs of com-
n−1
plementary sets has size 2(⌈n/2⌉). (Bollobás [1973])
11.2.19. Let and be simple -words from [n] (lists of distinct elements). Say that
and intersect if i = i for some i. Prove that the maximum size of a pairwise intersecting
family of simple -words from [n] is (n − 1)!/(n − )!. (see Deza–Frankl [1978], Lovász–
Nešetril–Pultr [1980])
11.2.20. Let F be a family of subsets of [n] such that each member has size at least l and
each pair of members have at most common elements, where l ≤ . Prove that | F | is
maximized uniquely by F = {A ⊆ [n]: l ≤ | A| ≤ + 1}.
11.2.21. Let A be an intersecting antichain of subsets of [n] with | x| ≤ n/2 for all x ∈ A.
−1
−1
Prove that ∑ x∈ A (|nx|− 1)
≤ 1. (Hint: Assign weight | x|−1 to each x ∈ A and prove that the
total weight on members of A appearing as consecutive strings in a single cyclic permuta-
tion is at most 1.) (Bollobás [1973], Greene–Katona–Kleitman [1976])
11.2.22. For 0 ≤ r ≤ − t, let Sr be the family of -subsets of [n] that contain at least t + r
of the smallest t + 2r elements.
(a) Show that Sr is a t-intersecting family.
(b) Prove that | Sr | = ∑i=0 (tt++r2r n− t−2r
r
+i)(¾ − t−r−i).
(c) Prove that | S1 | > | S0 | if and only if n < ( − t + 1)(t + 1). Thus the t-star S0 is not a
largest EKR( , t)-family when n < ( − t + 1)(t + 1). (Frankl [1978]) (Comment: Ahlswede–
Khachatrian [1997] proved that Sr is a largest EKR( , t)-family when ( − t + 1)(2 + rt−+11 ) ≤
n < ( − t + 1)(2 + t−r 1 ). A proof appears in Engel [1997, pp. 50–60].)
512 Chapter 11: Extremal Problems
11.2.23. (♦) Let A1 , . . . , A n be r-sets such that | Ai ∩ Aj | ≤ ¾ for distinct i , j ∈ [n]. Prove
### n A ### ≥ nr 2/[r + (n − 1)¾]. Interpret for proper edge-colorings of K . (Corrádi [1969])
# #⋃ i = 1 i #
# n
11.2.36. Let X be a random variable such that for the ith outcome, the probability pi that
it occurs is a power of 1/2. Associate distinct binary words with each outcome so that the
word associated with the ith outcome has length − lg pi . Show that the expected length of
the word specifying the outcome is the entropy H(x).
11.2.37. For the entropy of the joint variable (X , Y), prove H(X , Y) ≤ H(X) + H(Y) di-
rectly from the definition. (Hint: Express H(X) + H(Y) − H(X , Y) as the double sum
∑ ∑ (X = i)(Y = j) i , j lg i , j , where i , j = (X
[(X ,Y)=(i , j)]
=i)(Y = j) .)
11.2.38. Example 10.1.5 used the Pigeonhole Principle to show that lg n bipartite sub-
graphs are needed to cover K n . Use entropy to generalize: The number of -partite sub-
graphs needed to cover K n is at least (lg n)/(lg ).
11.2.39. (♦) A distinguishing family for [n] is a family of subsets of [n] such that for
any two subsets A , B ⊆ [n], there is some D ∈ such that | A ∩ D|
= | B ∩ D|. Let (n) be
the minimum size of such a family.
(a) Use entropy to prove (n) ≥ n/lg(n + 1). (Comment: There is an improvement by
an asymptotic factor of 2; see Erdős–Rényi [1963] and Moser [1970]. That matches the up-
per bound (n) ≤ (1 + o(1))2n/lg n by Lindström [1965] and Cantor–Mills [1966].)
(b) Given n coins of the same weight , except that some counterfeit coins weigh a fixed
smaller amount , prove that (n) is the minimum number of subsets of the coins whose ac-
curate weighing determines the counterfeit coins. The outcome of a weighing determines
how many in the weighed set are light. (Söderberg–Shapiro [1963])
11.2.40. (♦) Let S be a family of n points in d . Let nj be the number of distinct points
obtained by setting the jth coordinates of these points to 0 (projecting S on the hyper-
plane xj = 0). Prove nd−1 ≤ ∏ j =1 nj , and show that this is sharp for all d. (Hint: Use
d
11.3. Matroids
The defining properties of matroids are general enough to occur in many con-
texts and special enough to yield rich combinatorial structure. Many elegant re-
sults from graph theory, linear algebra, and elsewhere generalize in the theory
of matroids. These include the greedy algorithm for minimum spanning trees,
min-max relations for systems of distinct representatives, dimension properties
of vector spaces, and duality properties of planar graphs. When a theorem on a
special class holds for all matroids, it immediately yields results for other classes.
514 Chapter 11: Extremal Problems
Before discussing the added properties that yield matroids, we begin with
the more general notion of hereditary systems, familiar from our study of ideals.
Given a finite set E of elements, we use 2 E to denote the family of subsets of E,
ordered by inclusion; it has size 2| E| . We view a nonempty ideal in 2 E and the
other ways of specifying it as a single structure. A matroid will then be such a
structure that satisfies one of various equivalent additional constraints.
11.3.2. Example. On the left below we sketch the inclusion order on subsets of
E, with the full set E at the top and the empty set at the bottom. We sketch the
relationships among the independent sets, bases, circuits, and dependent sets of
a hereditary system. The bases are the maximal elements of I, and the circuits
are the minimal elements not in I. Always ∅ ∈ I. If every set is independent,
then there is no circuit, but every hereditary system has at least one base.
On the right we obtain a hereditary system from a multigraph with three
edges. The independent sets are the acyclic edge sets. The only dependent sets
are {1 , 2} and {1 , 2 , 3}, the only circuit is {1 , 2}, and the bases are {1 , 3} and
{2 , 3}. The rank of an independent set is its size. For the dependent sets, we
have r({1 , 2}) = 1 and r({1 , 2 , 3}) = 2.
Section 11.3: Matroids 515
E •
123
•
D 3
12
• 13
• 23
•
B •
C
1
• •2 •3
I 1 2
•
• ∅
∅
Most terminology in matroid theory comes from the motivating contexts that
led to the discovery of matroids, particularly graphs and linear algebra. We begin
with the fundamental example from graphs.
11.3.5. Example. Bases in a cycle matroid M(G). The graph K 4− , with four ver-
tices and five edges, arises by deleting one edge from K 4 . Spanning trees in K 4−
have three edges, so every set with more than three edges is dependent. Also the
two triangles are dependent. This yields eight dependent sets and 24 indepen-
dent sets among the subsets of E(K 4−). There are three minimal dependent sets
(the cycles) and eight maximal independent sets (the spanning trees).
For a general multigraph G, the bases of the cycle matroid M(G) are the edge
sets of the maximal forests in G. Each contains a spanning tree of each component
of G, so they have equal size. Consider B1 , B2 ∈ B and e ∈ B1 − B2 . Deleting e
from B1 disconnects a component; since B2 contains a tree spanning the same
component of G, some edge º ∈ B2 − B1 can be added to B1 − e to reconnect it.
The base exchange property is
If B1 , B2 ∈ B M , then for all e ∈ B1 − B2
there exists º ∈ B2 − B1 such that B1 − e + º ∈ B M .
Matroids are the hereditary systems satisfying the base exchange property.
516 Chapter 11: Extremal Problems
• • • • Y
e
• • • • X−Y
• • • • º • E− X
11.3.10. Example. Circuits in vector matroids. Technically, one vector (or multi-
ples of it) may be used to represent distinct elements of E, just as a matrix may
Section 11.3: Matroids 517
have repeated columns; these yield parallel elements. The circuits are the min-
imal sets {x1 , . . . , x ¾ } ⊆ E such that ∑ ci x i = 0 using coefficients not all zero.
Minimality forces all ci
= 0.
Let C1 and C2 be distinct circuits containing x. The equations of dependence
for C1 and C2 let us write x as a linear combination of C1 − x and of C2 − x. Equat-
ing these expressions yields an equation of dependence for (C1 ∪ C2) − x; thus
(C1 ∪ C2) − x contains a circuit.
The (weak) elimination property is
If C1 and C2 are distinct circuits and x ∈ C1 ∩ C2 ,
then another member of C M is contained in (C1 ∪ C2) − x.
Matroids are the hereditary systems satisfying the weak elimination property.
The column matroid of the matrix below is also the cycle matroid of K 4− .
⎛0 0 0 1 1⎞
⎜0 1 1 0 1⎟
⎝1 1 0 0 0⎠
The weak elimination property implies that in a matroid the relation of being
parallel is transitive, but this does not hold for all hereditary systems.
Another class of matroids important for applications arose much later from
families of sets. Edmonds–Fulkerson [1965] and Mirsky–Perfect [1967] indepen-
dently discovered that these are matroids.
11.3.12. Remark. Transversal matroids and bipartite graphs. The name “trans-
versal” arises from using this word to mean SDR. However, in the study of op-
timization problems in hypergraphs, the word “transversal” is used without re-
quiring the representatives to be distinct. We therefore use “SDR” here.
Given A1 , . . . , Am with union E, consider the bipartite incidence graph G.
The parts are E and [m], with e ∈ E adjacent to i ∈ [m] if and only if e ∈ Ai . A
set X ⊆ E is independent in the transversal matroid induced by A1 , . . . , Am on E
if and only if X is covered by some matching in G.
Also, given an E , F-bigraph G, we can associate with vi ∈ F the set NG(vi).
Letting Ai = NG(vi) expresses G as the incidence graph of the family of sets.
Hence every bipartite graph induces a transversal matroid on each of its parts.
The bipartite graph below yields the transversal matroid of the family A =
{{1 , 2} , {2 , 3 , 4} , {4 , 5}}. This matroid is again M(K 4−).
1 2 3 4 5
E • • • • •
[m] • • •
{1 ,2} {2 ,3 ,4} {4 ,5}
518 Chapter 11: Extremal Problems
P
[m] • • • • • •
11.3.15. Example. Weak elimination in cycle matroids. The circuits of M(G) are
the edge sets of cycles in G. Cycles have even degree at each vertex. For C1 , C2 ∈
C, the symmetric difference C1 C2 also has even degree at each vertex. If C1
=
C2 , then C1 C2 contains a cycle. This is stronger than weak elimination, since
C1 C2 ⊆ C1 ∪ C2 − x. In the picture below, C1 and C2 are face boundaries of length
9 sharing the dashed edges, and C1 C2 is the union of two disjoint cycles.
• •
C2 •
• • • • x • •
C1 •
• •
Section 11.3: Matroids 519
For linear matroids, direct proof of the augmentation or base exchange prop-
erty uses the fact that ¾ linearly independent vectors cannot all be expressed as
linear combinations of a smaller set. On the other hand, since we have verified
the weak elimination property for linear matroids, this theorem of linear algebra
follows from matroid axiomatics!
A XIOMATICS OF MATROIDS
Various of these properties (plus being a hereditary system) have been used
to define matroids. Examples include I (Welsh [1976], Schrijver [2003]), U (Ed-
monds [1965a,b], Bixby [1981], Nemhauser–Wolsey [1988]), A (Whitney [1935]),
C (Tutte [1970]), G (Papadimitriou–Steiglitz [1982]). van der Waerden [1937],
Rota [1964], Crapo–Rota [1970], and Aigner [1979] use other conditions.
Many authors list properties of hereditary systems when characterizing some
aspect of a matroid. This obscures the essence of the characterization and leads
to extra work. Working in the context of hereditary systems is simpler. All prop-
erties of hereditary systems are always available; we need not verify them when
introducing another aspect. Our chain of implications may seem long, so it is
worth noting that augmentation (I) and uniformity (U), for example, are easy to
show equivalent, and hence the proof can be given in shorter implication chains.
and r(X ) > r(X). Among bases containing largest independent sets in X and X ,
choose B and B with largest intersection. Since r(X + e) = r(X + º ) = r(X), we
have e , º ∈/ B. Since | B ∩ X | > | B ∩ X | and | B| = | B | , there exists x ∈ B − B
with x ∈ / X . Base exchange guarantees a base B − x + x for some x ∈ B − B.
Since x ∈ / X , we have | B − x + x ∩ X | = r(X), but |(B − x + x ) ∩ B | > | B ∩ B |.
A ⇒ A . We use induction on | Y − X | . There is nothing to prove when
| Y − X | = 1. When | Y − X | > 1, choose e , º ∈ Y − X and let Y = Y − e − º . Apply-
ing the induction hypothesis using Y or Y + e or Y + º yields r(X) = r(X ∪ Y ) =
r(X ∪ Y + e) = r(X ∪ Y + º ). Now weak absorption yields r(X) = r(X ∪ Y).
A ⇒ U. If Y is a maximal independent subset of X , then r(Y + e) = r(Y) for
all e ∈ X − Y . By strong absorption, r(X) = r(Y) = | Y |. Hence all such Y have
the same size, r(X).
U ⇒ R. Given X , Y ⊆ E, choose a maximum independent set I1 from X ∩ Y .
By uniformity, I1 can be enlarged to a maximum independent subset of X ∪ Y ;
call this I2 . Consider I2 ∩ X and I2 ∩ Y ; these are independent subsets of X and
Y , and each includes I1 . Hence
r(X ∩ Y) + r(X ∪ Y) = | I1 | + | I2 | = | I2 ∩ X | + | I2 ∩ Y | ≤ r(X) + r(Y).
X I2 I1 I2 Y
U⇒R
• • • • • V
F1 F2 F3 F4 F5
When G has an odd cycle, G has no set of vertices whose incident sets par-
tition E(G); thus M(K 4−) is not a partition matroid, for example. In a digraph,
however, each edge has a head and a tail, and we can define the head partition
matroid and the tail partition matroid using the edge partitions induced by
incidences with heads and by incidences with tails. For example, the matroid of
Example 11.3.2 arises as the partition matroid on E induced by U in the bipar-
tite graph on the left below, as the head partition matroid in the first digraph,
and as the tail partition matroid in the second digraph.
U
• • • • • •
1 2 3 1 2 3 1 2 3
• • • • • • • • •
Section 11.3: Matroids 523
Computing the rank function of the dual is easy using an alternative notion of
the rank of a set. Instead of viewing r(X) as the maximum size of an independent
subset of X , it can be helpful to view it as the maximum size of the intersection
of X with a base.
Proof: The rank of a set X is the maximum size of its intersections with bases.
Choose B∗ ∈ B∗ so that r∗(X) = | X ∩ B∗ | , and let B = B∗ . Now B is a base hav-
ing smallest intersection with X and hence largest intersection with X . Hence
r(X) = | B − X | . Also | B| = r(E), so r∗(X) = | X | − | X ∩ B| = | X | − (r(E) − r(X)).
E
X X
r∗(X) r(X)
X X
B∗ B
11.3.27. Proposition. The cocircuits of a matroid are the minimal sets intersect-
ing every base. The bases are the minimal sets intersecting every cocircuit.
Proof: Cocircuits are the minimal sets in no cobase. Since the cobases are the
complements of the bases, a set lies in no cobase if and only if it intersects ev-
ery base. Similarly, cobases are the maximal sets containing no cocircuit, so the
complements of the cobases are the minimal sets intersecting every cocircuit.
11.3.28. Corollary. The cocircuits of a cycle matroid M(G) are the bonds of G.
Proof: By Proposition 11.3.27, the cocircuits are the minimal sets intersecting
every maximal forest. Hence they are the minimal sets whose deletion increases
the number of components; these are the bonds.
By Corollary 11.3.28, the bond matroid of G is the dual of the cycle matroid
M(G). By Theorem 9.1.11, a set of edges forms a bond in a plane graph G if and
only if the corresponding dual edges form a cycle in G ∗ . Hence we have shown
that the dual of the cycle matroid of G is in fact the cycle matroid of G ∗ . We
will use this to characterize planar graphs. For the proof, we must generalize
edge-deletion and edge-contraction to matroids.
Given a graph G, the acyclic subsets of E(G − e) are just the acyclic subsets of
E(G) that omit e. To make contraction a dual notion, it makes sense to describe
its effect in terms of sets containing bases instead of sets contained in bases. A
set X ⊆ E(G · e) contains a spanning tree of each component of G · e if and only if
X + e contains a spanning tree of each component of G.
This motivates our notation for hereditary systems. Just as we express the
subgraph of G induced by S as both G[S] and G − S, for matroids we use different
notation to emphasize the set of elements remaining or one element eliminated.
Section 11.3: Matroids 525
From the definitions, M | F and M.F are hereditary systems. The notations
M | F and M.F appear (briefly) in Oxley [1992] (pages 22 and 104, respectively).
Note the distinction between “ .” and “ · ”; the former emphasizes “contracting to”
a specified set by “contracting away” the other elements. We use “ − ” or “ · ” when
eliminating one specified element and “ | ” or “ .” when specifying the elements that
remain. Our notation for M − e and M · e is consistent with our usage for graphs
but is nonstandard in the matroid community, where M \ e for our M − e and M/e
for our M · e are most common.
Defining contraction via spanning sets yields a natural duality.
11.3.33. Remark. The formula for r M.F yields a description of the independent
sets: X ∈ I M.F if and only if adding X to F increases the rank by | X | . Note that
when F is an independent set {e} of size 1, we have r M.F (X) = r M (X + e) − 1. In
particular, when we contract a nonloop edge in a graph, the maximum size of a
forest among the edges of any set containing that edge decreases by 1.
The duality between deletion and contraction is familiar in plane graphs.
Deleting an edge e in a plane graph G contracts the corresponding edge in G ∗ ;
contracting e deletes the edge in the dual. The fate of the 4-cycle below illustrates
that when a circuit of M intersects F , its intersection with F need not be a cir-
cuit of M.F , even when only one element has been contracted. In fact, the circuits
of M.F are the minimal nonempty sets in {C ∩ F: C ∈ C M } (Exercise 47).
Also, restriction and contraction commute (Exercise 49).
• •
← →
• • • • • • • • • • • •
delete contract
• •
11.3.34. Corollary. The behavior of cycle matroids and bond matroids under
deletion or contraction of an edge e ∈ E(G) is
M(G − e) = M(G) − e , M ∗(G − e) = M ∗(G) · e ,
M(G · e) = M(G) · e , M ∗(G · e) = M ∗(G) − e.
Proof: Matroid deletion and contraction are defined so that the statements in the
first column describe the behavior of cycle matroids. Using these and Proposition
11.3.31, for the second column we compute
M ∗(G − e) = [M(G − e)]∗ = [M(G) − e]∗ = M ∗(G) · e ,
M ∗(G · e) = [M(G · e)]∗ = [M(G) · e]∗ = M ∗(G) − e.
11.3.35. Theorem. (Whitney [1932c]) A graph G is planar if and only if its bond
matroid M ∗(G) is graphic.
Section 11.3: Matroids 527
Proof: We have observed that planar graphs have abstract duals; this proves
necessity. For sufficiency, we first prove that existence of an abstract dual is pre-
served under deletion and contraction of edges. Suppose that G has an abstract
dual H , so that M(H) =∼ M ∗(G). Let e be the edge of H corresponding to e under
the bijection. To prove that H · e is an abstract dual of G − e and that H − e is
an abstract dual of G · e, we use Corollary 11.3.34 to compute
M ∗(G − e) = M ∗(G) · e ∼
= M(H) · e = M(H · e ) ,
M ∗(G · e) = M ∗(G) − e ∼
= M(H) − e = M(H − e ).
By Kuratowski’s Theorem, a nonplanar graph contains a subdivision of K 5
or K 3 ,3 . Hence K 5 or K 3 ,3 is a minor of it. Since existence of abstract duals is pre-
served under deletion and contraction, showing that K 5 and K 3 ,3 have no abstract
dual implies that every nonplanar graph has no abstract dual.
If H is an abstract dual of G, then also G is an abstract dual of H , since
M ∗(G) ∼ = M(H) if and only if M(G) ∼ = M ∗(H). If G has girth ½ , then bonds of H
have size at least ½ , so (H) ≥ . Letting n = | V(H)| and m = | E(H)| , we have also
| E(G)| = m. Thus the Degree-Sum Formula yields n ≤ ⌊ 2m/ (H)⌋ ≤ ⌊ 2m/ ⌋ .
Let H be an abstract dual of K 5 . Since K 5 has girth 3, n ≤ ⌊ 20/3⌋ = 6. Since
all bonds of K 5 have four or six edges, all cycles of H have four or six edges, and
thus H is a simple bipartite graph. However, no simple bipartite graph with at
most six vertices has ten edges.
Let H be an abstract dual of K 3 ,3 . Since K 3 ,3 has girth 4, n ≤ ⌊ 18/4⌋ = 4.
Since all bonds of K 3 ,3 have at least three edges, all cycles of H have at least three
edges, and thus H is a simple graph. However, no simple graph with at most four
vertices has nine edges.
11.3.41. Definition. The closed sets of a hereditary system on E are the sets
X ⊆ E such that (X) = X (also called flats or subspaces).
Section 11.3: Matroids 529
In a matroid on E, the sets whose span is E are the sets containing bases;
hence the term “spanning sets”. Similarly, in a matroid the hyperplanes are the
maximal proper closed subsets of E. Both fail for general hereditary systems.
The span function of a matroid is also called its closure function. A closure
operator on 2 E is an expansive, order-preserving, idempotent function from 2 E
to 2 E . Such an operator is the span function of a matroid if and only if it satisfies
Steinitz exchange. Since every hereditary system satisfies Steinitz exchange, our
approach to matroids as hereditary systems with an added property is not well
suited for studying closure operators. The span function of a hereditary system
M is a closure operator if and only if M is a matroid.
Matroids are developed from lattice theory (Section 12.4) in MacLane [1936],
Rota [1964], and Aigner [1979]. Brylawski [1986] described the transformations
among about a dozen aspects of matroids, calling these maps cryptomorphisms.
MATROID INTERSECTION
Matroid theory took a great leap forward with the Matroid Intersection and
Union Theorems. They provided a unified context for many well-known min-max
relations, which became corollaries. We proved some of these in earlier chapters.
Yielding a unified proof for many important theorems, the Matroid Intersection
Theorem can be considered among the most beautiful theorems of combinatorics.
The Matroid Intersection Theorem is a min-max relation for the maximum
size of common independent sets in two matroids on the same set E. The intersec-
tion of two matroids is a hereditary system but generally not a matroid. For mul-
tiple matroids on a set E, we typically use subscripts to distinguish corresponding
aspects, as in B i for the bases of Mi , etc. We still use X for the complement of X
within the full set E.
11.3.43. Example. Since I1 and I2 are closed under taking subsets, the common
independent sets in two hereditary systems also form a hereditary family.
In a bipartite graph G with edge set E, each part induces a partition matroid
on E. A set of edges forms an independent set in one of these partition matroids
if and only if its endpoints in the corresponding part of G are distinct. A set of
edges is independent in both matroids if and only if it is a matching in G.
The hereditary system whose independent sets are the matchings in a bi-
partite graph is not a matroid. The central edge in a path of length 3 forms an
independent set, and the two end edges form a larger one, but the smaller set can-
not be augmented from the larger, so augmentation fails. This is why the greedy
algorithm does not solve maximum matching in bipartite graphs.
Proof: (Woodall; see Seymour [1976]) For the upper bound on | I | , consider I ∈
I1 ∩ I2 and X ⊆ E. The sets I ∩ X and I ∩ X are also common independent sets,
and | I | = | I ∩ X | + ##### I ∩ X ##### ≤ r1 (X) + r2(X). Hence max{| I |} ≤ min{r1 (X) + r2(X)}.
X X
I
X Y
•
e
We have already proved various special cases of the Matroid Intersection The-
orem, including the K önig–Egerváry Theorem and the Ford–Fulkerson Theorem
Section 11.3: Matroids 531
(Theorem 7.2.15). Given any two matroids on the same set, the Matroid Intersec-
tion Theorem guarantees a min-max relation for the maximum size of a common
independent set, says what the result should be, and provides a proof.
• • • • •
T2
The next application uses the rank function for transversal matroids.
• • • • • • • • • • • E
Y X A(J)
532 Chapter 11: Extremal Problems
Proof: Let E be the union of all the sets in A ∪ B. A common partial transversal
is a common independent set in the two transversal matroids M1 , M2 induced on
E by A and B. A common transversal is a common independent set of size m. We
need only restate the condition r1 (X)+ r2 (X) ≥ m to find the appropriate condition
on the set systems.
The rank formula (∗) from Example 11.3.46 yields
# #
r1 (X) + r2(X) = min {| A(I) ∩ X | − | I | + m} + min {#### B(J) ∩ X #### − | J | + m}.
I⊆ [m] J⊆ [m]
MATROID UNION
Using a direct sum, we prove that the union of matroids is always a matroid,
and we compute the rank function.
the maximum size of a set independent in both N1 and N2 equals the maximum
size of a set independent in M. We then compute r M (E) by applying the Matroid
Intersection Theorem to N1 and N2 . Let Mi be a copy of Mi defined on the ele-
ments E i of row i in E . Let N1 be the direct sum matroid M1 ⊕ · · · ⊕ M¾ , and let
N2 be the partition matroid induced on E by the column partition {Ej }.
Each set X ∈ I M has a decomposition into disjoint subsets X i ∈ Ii , since Ii is
an ideal. Given a decomposition {X i } of X ∈ I M , let X i be the copy of X i in E i .
Since {X i } are disjoint, ∪ X i is independent in N2 , and X i ∈ Ii implies that ∪ X i
is also independent in N1 . From X ∈ I M , we have constructed ∪ X i of size | X | in
I N1 ∩ I N2 . Conversely, any X ∈ I N1 ∩ I N2 corresponds to a decomposition of a set in
I M of size | X | when the sets X ∩ E i are transferred back to E, because N2 forbids
multiple copies of elements.
E
ej
1 • X1 • • • • • • • ← M1
Ei → • • • • X 2 • • • • ..
Ej .
• • • • • • • •
¾ • • • • • • • X ¾ • ← M¾
After applying the submodularity of each ri and the diagram below, these in-
equalities yield r(X ∩ Y) + r(X ∪ Y) ≤ r(X) + r(Y).
Section 11.3: Matroids 535
X 2 Y
1 0 1 0 1 0 1
U V
2
The Matroid Union Theorem yields short proofs of formulas for packing and
covering problems. In each formula below, the optimal subset is closed, because
switching from X to (X) improves the numerator without changing the denomi-
nator. The graph corollaries were originally proved by difficult ad hoc arguments.
EXERCISES 11.3
11.3.1. (−) Let M be the hereditary system on [4] whose bases are {1 , 2} and {3 , 4}. Show
that all the properties listed in Definition 11.3.18 fail for M.
11.3.2. (−) For each family C below, determine whether it is the family of circuits of a
hereditary system on [6]. If it is, determine whether the system is a graphic matroid.
(a) C = {{1 , 2 , 3} , {3 , 4 , 5} , {5 , 6 , 1}}.
(b) C = {{1 , 2 , 3} , {3 , 4 , 5} , {1 , 2 , 4 , 5}}.
11.3.3. (−) Characterize the G graphs that yield matroids as follows:
(a) The stable sets of G are the independent sets of a matroid on V(G).
(b) The matchings in G are the independent sets of a matroid on E(G).
11.3.4. (−) Show that the stable sets of a graph need not be the independent sets of a
matroid by finding vertex-weighted graphs where the ratio between the set found by the
greedy algorithm and the maximum weight of a stable set is arbitrarily large.
11.3.5. (−) Explain how to obtain the rank function of a hereditary system from the bases.
11.3.6. (−) Let B be a base of a matroid. For e ∈ B, prove that B − º + e is a base if and
only if º belongs to the circuit formed by adding e to B.
11.3.7. (−) Let e be an element of a circuit C in a matroid. Prove that C is the unique
circuit created by adding e to some base.
11.3.8. (−) Prove the following implications directly for hereditary systems.
(a) The augmentation (I) and uniformity (U) properties are equivalent.
(b) The uniformity (U) and base exchange (B) properties are equivalent.
(c) Submodularity (R) implies weak absorption (A).
(d) Strong absorption (A ) implies base exchange (B).
(e) Augmentation (I) implies weak elimination (C).
11.3.9. (−) Prove that if r(X) = r(X ∩ Y) for some X , Y ⊆ E in a matroid on E, then
r(X ∪ Y) = r(Y).
11.3.10. (−) A set of | E| − r(E) circuits of a matroid on E form a fundamental set of
circuits if the elements e1 , . . . , e n can be ordered so that the last element of Ci is er(E)+i .
Prove that every matroid has a fundamental set of circuits. (Whitney [1935])
11.3.11. (−) Describe the circuits of a partition matroid M. Use this description to prove
directly that partition matroids satisfy the weak elimination property.
11.3.12. (−) Prove that every partition matroid is a transversal matroid.
11.3.13. (−) Determine whether the cycle matroid of G below is a transversal matroid.
c
• •
d
a b e º
G
• •
½
Exercises for Section 11.3 537
11.3.14. (−) Let B1 and B2 be bases of a matroid such that | B1 B2 | = 2. Prove that there
is a unique circuit C such that B1 B2 ⊆ C ⊆ B1 ∪ B2 .
11.3.15. (−) Prove that the cycle matroid of a graph G is the column matroid over 2 of
the vertex-edge incidence matrix of G.
11.3.16. (−) Use matroid duality to prove Euler ’s Formula for plane graphs.
11.3.17. (−) Let M be the hereditary system on E(K n) whose independent sets are the edge
sets of planar graphs. Determine whether M is a matroid.
11.3.18. (−) Determine whether a set can be a circuit and a cocircuit in the same matroid.
11.3.19. (−) Let C and C∗ be a circuit and a cocircuit in a matroid on n elements. Deter-
mine the minimum and maximum possible values of | C| + | C∗ | .
11.3.20. (−) Let M be a matroid on E, and fix A ⊆ E. Let I be the family of sets X ⊆ E
such that X ∈ I and X ∩ A = ∅. Prove that I is the family of independent sets of a matroid.
11.3.21. (−) Let r and be the rank function and span function of a matroid. Prove that
r(X) = min{| Y | : Y ⊆ X and (Y) = (X)}.
11.3.22. (−) Prove that a matroid of rank r has at least 2 r closed sets. (Lazarson [1957])
11.3.23. (−) Let G be an n-vertex graph, and let E1 , . . . , En−1 be a partition of E(G) into
n − 1 sets. Show that matroids can be used to test whether G has a spanning tree with
exactly one edge in each subset Ei .
11.3.24. (−) Given matroids M1 , . . . , M¾ on E, the Matroid Partition Problem asks
whether an input set X ⊆ E partitions into sets I1 , . . . , I¾ with Ii ∈ Ii . Prove that X is
partitionable if and only if | X − Y | + ∑ ri(Y) ≥ | X | for all Y ⊆ X .
11.3.25. (−) Use HAMILTONIAN PATH in directed graphs to prove that 3-MATROID
INTERSECTION is NP-complete.
11.3.26. (−) Use 3-D MATCHING to prove that 3-MATROID INTERSECTION is NP-
complete. Given disjoint sets V1 , V2 , V3 and a family of triples that each consists of one
element from each Vi , 3-D MATCHING is the problem of finding the maximum number of
triples that together use each element at most once. (In this terminology, ordinary bipar-
tite matching is 2-D MATCHING.)
11.3.27. Graphic matroids.
(a) Determine which graphic matroids are also uniform matroids.
(b) Determine which graphic matroids are also partition matroids.
11.3.28. (♦) The Fano matroid is the vector matroid of the matrix below over the 2-
element field 2 . Prove that the Fano matroid is neither a graphic matroid nor a tranver-
sal matroid. (Hint: Use the circuits.)
1001011
0101110
0010111
11.3.29. (♦) Let E be the edge set of a graph G. Say that a set X ⊆ E is weakly acyclic if
the spanning subgraph of G with edge set X has at most one cycle. Prove that the weakly
acyclic sets are the independent sets of a matroid on E.
11.3.30. Let s and t be vertices in a digraph D. Let E = V(D) − {s , t}. For X ⊆ E, let r(X)
be the number of edges from s ∪ X to X ∪ t. Prove that r is submodular.
538 Chapter 11: Extremal Problems
11.3.31. (♦) Submodularity for cycle matroids. Given a graph G, let ¾(X) be the number
of components of the spanning subgraph G X with edge set X . Let U and V be the sets
of components of G X and G Y , respectively. Let H be the U, V-bigraph with Ui adjacent
to Vj if Ui in G X and Vj in G Y have a common vertex. Relate the numbers of vertices,
components, and edges in H to the numbers ¾(X) , ¾(Y) , ¾(X ∩ Y) , ¾(X ∪ Y), and conclude
directly that the rank function of the cycle matroid of G is submodular. (Aigner [1979])
11.3.32. Without using other characterizations of matroids, prove directly that the base
exchange and dual base exchange properties are equivalent.
11.3.33. (♦) Prove the following implications directly for hereditary systems.
(a) The base exchange property (B) implies the augmentation property (I).
(b) The augmentation property (I) implies the absorption property (A).
(c) The strong absorption property (A ) implies the submodularity property (R) (with-
out using uniformity).
11.3.34. Using only linear dependence, prove that vector matroids satisfy the induced
circuit property: adding an element to a linearly independent set of vectors creates at most
one minimal dependent set.
11.3.35. (♦) Prove the following implications directly for hereditary systems.
(a) The base exchange property (B) implies the induced circuit property (J).
(b) The induced circuit property (J) implies the augmentation property (I).
(c) The induced circuit property implies the weak elimination property (C).
11.3.36. Prove that a hereditary system is a matroid if and only if it satisfies the following
“ultra-weak” augmentation property: If I1 , I2 ∈ I with | I2 | > | I1 | and | I1 − I2 | = 1, then
I1 + e ∈ I for some e ∈ I2 − I1 . (Chappell)
11.3.37. Given a matroid on a set E, let C1 , . . . , C¾ be circuits such that none is contained
¾
in the union of the others. Let X be a subset of E with | X | < ¾ . Prove that ⋃i=1 Ci − X
contains a circuit. (Welsh [1979])
11.3.41. (+) Let B1 and B2 be bases of a matroid M. Prove that there is a bijection : B1 →
B2 such that for each e ∈ B1 , the set B2 − (e) + e is a base of M . (Brualdi [1969]) (Hint:
Define a B1 , B2 -bigraph by making e ∈ B1 and ∈ B2 adjacent when B2 + e − ∈ B.)
11.3.42. (♦) Let M be a matroid on a set E, and let w: E → 0 . Use the greedy algorithm
to prove a min-max formula for maximum weighted independent set: max I∈I ∑ e∈ I w(e) =
min ∑i r(X i), where the minimum is over all chains (by inclusion) of sets in E such that
each element e ∈ E appears in at least w(e) sets in the chain (sets may repeat in chains).
Exercises for Section 11.3 539
11.3.43. (♦) Circuits and cocircuits. Consider a matroid M and its dual M ∗ .
(a) Dual augmentation property. Given disjoint sets X and X ∗ with X ∈ I and
X ∈ I∗ , prove that there are disjoint sets B and B∗ with X ⊆ B ∈ B and X ∗ ⊆ B∗ ∈ B∗ .
∗
(b) Let e be an element of a base B. Prove that M has exactly one cocircuit disjoint
from B − e and that it contains e.
(c) Prove that the cocircuits of M are the minimal nonempty sets C∗ such that
| C∗ ∩ C|
= 1 for every C ∈ C.
(d) For distinct elements x and y of a circuit C, prove that there is a cocircuit C∗ such
that C∗ ∩ C = {x , y}. (Minty [1966])
11.3.44. The ¾-truncation M¾ of a matroid M is defined by I M¾ = {X ∈ I M : | X | ≤ ¾}.
(a) Prove that M¾ is a matroid.
(b) Prove that a matroid can be covered by t independent sets of size at most ¾ if and
only if max| X |≥1 min{|¾X,r(X)}
|
≤ t.
(c) Prove that a matroid of rank at least ¾ with ground set E has t pairwise disjoint
independent sets of size ¾ if and only if min X : r(X)<¾ |¾E−|−| X|
r(X)
≥ t. (Chen–Lai [1996])
11.3.45. The ¾-elongation of a matroid M is the hereditary system M ¾ whose bases are
the spanning sets of M with size ¾ .
(a) Prove that M ¾ is a matroid.
(b) Prove that (M¾)∗ = (M ∗)| E|−¾ if ¾ ≤ r(M), where M¾ is the ¾-truncation of M defined
in Exercise 11.3.44. (Welsh [1979])
11.3.46. Prove that a matroid has no circuits of size at most 2 if and only if (1) no element
is in every hyperplane, and (2) for any two elements some hyperplane contains exactly one.
11.3.47. Let M be a matroid on E. For F ⊆ E, prove that C M | F = {C ⊆ F : C ∈ C M } and
that C M.F is the set of minimal nonempty members of {C ∩ F : C ∈ C M }.
11.3.48. By duality and matroid restriction, prove r M.F (X) = r M (X ∪ F) − r M (F).
11.3.49. (♦) Prove that any minor of a matroid obtained by restricting and then con-
tracting can also be obtained by contracting and then restricting. In particular, if M
is a matroid on E and Y ⊆ X ⊆ E, prove that (M | X).Y = (M.X − Y)| Y and (M.X)| Y =
(M | X − Y).Y . (Hint: Use the rank function.)
11.3.50. (♦) Prove that the properties in Theorem 11.3.40 (involving the span function)
are equivalent and characterize matroids: incorporation (P), idempotence (S), transitivity
of dependence (T), and strong elimination (C ). (Hint: Prove U ⇒ P ⇒ S ⇒ T ⇒ C ⇒ C.)
11.3.51. Prove the following properties of closed sets of a matroid.
(a) The closed sets are the complements of the unions of cocircuits.
(b) The intersection of two closed sets is closed.
(c) The span of a set is the intersection of all closed sets containing it.
(d) The union of two closed sets need not be a closed set.
11.3.52. (+) Prove directly that in a hereditary system, the weak elimination property
implies the strong elimination property, using induction on | C1 ∪ C2 |. (Lehman [1964])
11.3.53. Given a matroid M on E and e ∈ E, the Shannon switching game (M, e) played
by Spanner and Cutter is as follows. On each round Cutter deletes an element of E − e, and
then Spanner seizes an element of E − e. Spanner wants a set that spans e; Cutter aims to
prevent this. Prove that Spanner has a winning strategy when there are disjoint subsets
X 1 , X 2 of E − e such that e ∈ (X 1 ) = (X 2). (Lehman [1964]) (Comment: A lengthy proof
using the Matroid Union Theorem (Theorem 11.3.52) shows that this sufficient condition
is also necessary. A special case using the cycle matroid for a union of two edge-disjoint
trees was marketed by Hasbro under the name “Bridg-It ” ; see West [2001, p.74].)
540 Chapter 11: Extremal Problems
11.3.54. (+) Given a matroid M , the base exchange graph (M) has a vertex for each
base of M , with two bases adjacent when their symmetric difference has size 2. Prove
that (M) is Hamiltonian when M has at least three bases. (Hint: Prove the stronger
statement that (M) has a spanning cycle through any edge.) (Holzmann–Harary [1972])
11.3.55. Use the formula r(X) = min J ⊆[m] {| A(J) ∩ X | + m − | J |} for the rank function of
the transversal matroid on E induced by subsets A1 , . . . , A m (Example 11.3.46) to prove
directly that the rank function satisfies r(∅) = 0 and r(X) ≤ r(X + e) ≤ r(X) + 1.
11.3.56. (♦) Given a bipartite graph G with E being one part , let M be the transversal
matroid on E whose independent sets are the subsets of E that can be covered by matchings
in G. By Ore’s Defect Formula (see Example 11.3.46), r(X) = min S⊆ X {| N(S)| + | X − S|}.
Prove directly that r is submodular.
11.3.57. Prove that restrictions and unions of transversal matroids are transversal ma-
troids, but contractions and duals of transversal matroids need not be.
11.3.58. (♦) Let M be the transversal matroid on E induced by subsets A1 , . . . , A m . Use
the Matroid Union Theorem to prove r M (X) = min Y ⊆ X {| X − Y | + | N(Y)|}.
11.3.59. (♦) Common independent and spanning sets.
(a) For matroids M1 and M2 on a set E, prove | I | + | S| = r1 (E) + r2(E), where I is a
largest common independent set and S is a smallest common spanning set.
(b) Let G be an n-vertex bipartite graph with no isolated vertices. Prove (G) +
(G) = n (Gallai’s Theorem, Exercise 6.1.50).
(c) Let G be a bipartite graph with no isolated vertices. Without using other results,
use part (a) directly to prove (G) = (G) (K önig ’s Other Theorem, Theorem 6.1.16).
11.3.60. (♦) Use the Matroid Intersection Theorem to prove that in every acyclic digraph,
the vertices can be covered by at most pairwise disjoint paths, where is the indepen-
dence number of the underlying graph. (Chappell)
11.3.61. Given matroids M1 and M2 whose families of spanning sets are S 1 and S 2 ,
prove that the matroid (M1∗ ∪ M2∗)∗ is the hereditary system whose spanning sets are
{X 1 ∩ X 2 : X 1 ∈ S 1 , X 2 ∈ S 2 }.
11.3.62. Matroid Intersection from Matroid Union.
(a) Without the Matroid Intersection Theorem, prove that the maximum size of a com-
mon independent set in matroids M1 and M2 on E is r M1 ∪ M ∗ (E) − r M ∗ (E).
2 2
(b) Prove the Matroid Intersection Theorem by applying Matroid Union to M1 ∪ M2∗ .
11.3.63. (♦) Connectivity and spanning trees.
(a) Let F be a set of at most edges in a 2 -edge-connected graph G. Use Corollary
11.3.56 to prove that G − F has edge-disjoint spanning trees. (Nash-Williams [1961])
(b) For each , construct a (2 − 1)-edge-connected graph that does not have edge-
disjoint spanning trees.
11.3.64. Colored trees and b-detachments.
(a) Let G be a connected edge-colored graph with color classes E1 , . . . , E¾ . Prove that
G has a spanning tree with distinct colors if and only if G − F has at most t + 1 components
whenever F consists of t color classes. (Hint: Use the Matroid Intersection Theorem.)
(b) A split replaces a vertex x with two new vertices x1 and x2 whose neighborhoods
in the new graph partition N(x). Given b: V(G) → , a b-detachment of a graph G arises
by performing splits until there are b(v) copies of each vertex v. Use part (a) to prove that
G has a connected b-detachment if and only if for all U ⊆ V(G), graph G − U has at most
(U) + 1 − b(U) components, where b(U) = ∑v∈U b(v) and (U) is the number of edges inci-
dent to U. (Schrijver [2003, p. 704]; see Nash-Williams [1985] for a more general result.)
Chapter 12
12.1.1. Example. The subsets of a finite set, ordered by inclusion, form a natu-
ral poset. We spent most of Chapter 11 studying aspects of it. Elementary under-
standing of containment yields three natural properties: (1) A ⊆ A, (2) A ⊆ B
and B ⊆ A together imply A = B, and (3) If A ⊆ B and B ⊆ C, then A ⊆ C.
Similarly, the divisibility relation on the divisors of an integer N satisfies:
(1) x | x, (2) x | y and y | x imply x = y, and (3) If x | y and y | , then x | .
541
542 Chapter 12: Partially Ordered Sets
d d
• •
• •
• a• •b
c
• •
a• •b •
c
For a useful visual presentation, transitivity of the order relation allows us
to describe a poset completely while drawing only some of the comparable pairs.
12.1.5. Definition. If x < y in P and there is no with x < < y, then y covers
x (in P), written as x ≺ y or y ! x. The cover relation is the set of pairs
(x , y) such that x ≺ y. The cover digraph is the digraph on the elements of
P whose edge set is {xy: x ≺ y}.
A cover diagram (or Hasse diagram or diagram) of P is obtained by
erasing the directions on edges after drawing the cover digraph in the plane
such that each (straight-line) edge points upward. The cover graph is the
graph on the elements of P whose edge set is {xy: x ≺ y or y ≺ x}.
Section 12.1: Structure of Posets 543
On the right is the poset of subsets of [3], ordered by inclusion. The diagram
specifies the poset completely; x < y in P if and only if we can reach y from x in
the diagram by moving only upward along edges. Omitting the edges implied by
transitivity makes it easier to see the structure. By the convention that the edges
for the order relation point upward, the diagram provides the cover digraph and,
by transitive closure, the comparability digraph.
The cover graph (but not the diagram) discards the order information and
does not specify the poset. For example, C4 is the cover graph of two posets (one
shown above), and C6 is the cover graph of seven posets (Exercise 3). In contrast
to comparability graphs, testing whether a graph is a cover graph is NP-complete
(Nešet řil–Rödl [1987, 1993]; Brightwell [1993] gave a simpler proof).
The simplest posets are totally ordered or totally unordered. Indeed, we say
“partial order ” as a generalization of total order.
The first poset in Remark 12.1.4 has one maximal element (d) and two min-
imal elements (a and b). A ¾-chain has one maximal and one minimal element.
In an antichain, every element is maximal and minimal. The cover graph of k is
the path P¾ ; its comparability graph is K ¾ .
12.1.8. Definition. Posets P and Q are isomorphic if some bijection from the
set P to the set Q preserves the order relation. A subposet of a poset P is a
poset R on a subset of P defined by restricting the comparability relation to R.
If Q is isomorphic to a subposet of P , then P contains Q or Q embeds in P.
The dual of P , written P ∗ , is the poset on the elements of P defined by
y ≤ P ∗ x if and only if x ≤ P y. A poset isomorphic to its dual is self-dual. A
poset is finite if it has finitely many elements.
544 Chapter 12: Partially Ordered Sets
12.1.11. Definition. Let P be a poset. Its width w(P) is the size of a largest
antichain in P. Its height h(P) is the size of a largest chain in P. Its length
is one less than its height.
12.1.12. Example. The poset 23 has width 3, height 4, and length 3. An an-
tichain of size w(P) in P is a maximum antichain, but a maximal antichain
(one not contained in a larger antichain) may be smaller. For example, the an-
tichain {{1} , {2 , 3}} in 23 is a maximal antichain but not a maximum antichain.
A chain in a poset with finite height is a maximal chain if and only if it
extends from a minimal element to a maximal element and its successive pairs
satisfy the cover relation. For elements, “maximal” and “minimal” refer to the
order relation in P , not to containment on sets of elements.
Down-sets have also been called ideals or order ideals, and up-sets have
been called dual ideals or filters. The terms “down-set ” and “up-set ” are less
sophisticated, but they are explicit and do not conflict with other uses of “ideal”
and “filter ” in mathematics. In Chapter 11, we used “ideal of sets” for a down-set
in 2 n because this is common and is consistent with algebraic notions.
In 23 , the down-set generated by {1 , 23} is {1 , 23 , 2 , 3 , ∅}. There are exactly
20 antichains and 20 down-sets in 23 ; one of each is empty.
12.1.17. Example. The subset poset. The poset 2 is a 2-element chain; call its el-
ements 0 and 1, with 0 < 1. With each element of [n], associate a copy of 2. Let
P be the poset of subsets of [n], ordered by inclusion. Mapping each member of
P to its incidence vector expresses P as 2 n . Thus we denote P as 2 n . (We suggest
pronouncing 2 n as “ 2 sup n”.) For the inclusion poset on the subsets of a set X ,
we write 2 X and call X the ground set. The poset 2 n is also called the Boolean
algebra on n elements, sometimes denoted Bn .
Since 2 n is the product of n copies of 2, its cover graph is the n-dimensional
cube. Note that if x is a ¾-set and y is an l-set in [n] with x < y, then the sub-
poset of 2 n consisting of { : x ≤ ≤ y} is isomorphic to 2 l−¾ . Also, 2 n is self-dual
(via complementation of subsets of [n]). Finally, when writing elements of 2 n as
sets or as their incidence vectors, we typically drop set brackets, commas, and
parentheses and just write strings of elements.
546 Chapter 12: Partially Ordered Sets
U[A]
• • •x
A • • • • • • • • • •
• • •y
D[A]
d e a+ b+ c+ d+ e+ +
• • • • • • • •
•c •
• • • • • • • •
a b a− b− c− d− e− −
12.1.20. Remark. A simpler min-max relation holds for maximum chains and
minimum antichain coverings (Mirsky [1971]). The antichain of maximal ele-
ments intersects each maximal chain, so by induction on h(P) we can cover P
with h(P) antichains. Via the Perfect Graph Theorem (Corollary 8.3.35), this
easy observation implies Dilworth’s Theorem.
548 Chapter 12: Partially Ordered Sets
The original proof of the Greene–K leitman Theorem was quite long. There
are now shorter combinatorial proofs(Saks [1979]) and proofs applying other min-
max relations (such as Frank [1980b] via minimum-cost network flow). We leave
these to a more advanced book.
For acyclic digraphs, there are extensions of the Greene–K leitman Theorem
due to Linial [1981], Saks [1980], Cameron [1982], and Hoffman [1983]. Berge
conjectured an extension for arbitrary digraphs. Let C be a partition of the ver-
tices of a digraph D using paths. A partition with smallest ¾-norm is ¾-optimal.
On the other hand, a partial ¾-coloring is a union of ¾ independent sets of ver-
tices; view each set as a color class. The number of colors on a path C is bounded
by min{¾ , | V(C)|}. We seek a partial ¾-coloring where equality holds.
Berge [1985] noted that the Greene–K leitman Theorem is the special case for
transitive digraphs; he proved it also for ¾ = 1 in general. Cameron [1986] proved
it for acyclic digraphs, Berger–Hartman [2008] proved it for ¾ = 2, and Berger–
Hartman [2012] gave a unified proof for various cases using network flows. The
general conjecture remains open; Hartman [2006] surveyed partial results.
EXERCISES 12.1
12.1.1. (−) For n = 3 and n = 4, list the isomorphism classes of posets with n elements.
Determine how many are self-dual.
12.1.2. (−) Show that 23 contains 15 copies of 2 2 .
12.1.3. (−) Draw the diagrams of the seven posets (isomorphism classes) whose cover graph
is a 6-cycle. Determine their widths.
12.1.4. (−) By Remark 12.1.20, every ¾-family decomposes into ¾ antichains. Use the
poset below to show that it may not be possible to obtain a maximum 2-family by adding
an antichain to a maximum antichain.
• •
• • • • •
• •
12.1.5. Prove that the graphs below are comparability graphs by exhibiting cover dia-
grams of posets for which they are the comparability graphs. Use the necessary condition
in the next exercise (12.1.6) to prove that their complements are not comparability graphs.
• • •
• •
• •
• •
• • • • • •
• • • • •
550 Chapter 12: Partially Ordered Sets
12.1.6. (♦) For a closed walk [x1 , . . . , x¾ ] in a graph, a triangular chord is an edge of
the form xi xi+2 (with indices modulo ¾). Prove that in a comparability graph, every closed
walk of odd length has a triangular chord. Conclude that the complement of the cycle Cn is
not a comparability graph when n ≥ 5. (Comment: Gilmore–Hoffman [1964] showed that
this necessary condition is also sufficient.)
12.1.7. (♦) For a graph G, the Ghouilà-Houri graph G is the graph defined on the or-
dered pairs of adjacent vertices of G by putting (x , y) ↔ (y , ) in G if and only if x ∈
/ E(G).
Prove that G is bipartite if and only if every closed odd walk of G has a triangular chord.
(Comment: With Exercise 12.1.6, this yields a polynomial-time recognition algorithm for
comparability graphs.) (Ghouilà-Houri [1962])
x
•u
xu
• • •w
yx
• • y
•x
G vy • • yv G
• • • • xy
• y • y
w v
w
• • • ux
x
12.1.8. (♦) Prove that a graph is the cover graph of some poset if and only if it has an
acyclic orientation without dependent edges, where a dependent edge in a digraph is an
edge whose reversal completes a cycle. Conclude that if the chromatic number of a graph
is less than its girth, then it is a cover graph.
12.1.9. Use Exercise 12.1.8 to prove that the Gr ötzsch graph below is not a cover graph.
(Fisher–Fraughnaugh–Langley–West [1997])
•
•
• • • •
•
• •
• •
12.1.10. A digraph D is a cover digraph if E(D) is the cover relation of some poset. De-
rive a polynomial-time checkable characterization of cover digraphs. Assume that one can
find in polynomial time all vertices reachable from a specified vertex. (Comment: No effi-
cient algorithm is known to check whether an undirected graph is a cover graph.)
12.1.11. Obtain simple formulas (constant number of terms) for
(a) the number of chains of size 2 and the number of chains of size 3 in 2 n .
(b) the numbers of antichains of size 2 and size 3 in 2 n . (Popadić [1970])
12.1.12. A cutset in a poset is a subset intersecting every maximal chain. The family
[n]
(⌈n/2⌉) is a minimal cutset in 2 n ; is it a largest one? (Füredi–Griggs–Kleitman [1989])
12.1.13. There are 16 sentences of the form “In every poset , A B chain intersects C D
antichain” , where A , C ∈ {some, every} and B , D ∈ {maximal, largest}. For each such
sentence, determine whether it is true or false.
12.1.14. Suppose that the red subgraph in a red/blue-coloring of E(K n) has a transitive
orientation.
√ Prove that the coloring has a monochromatic complete subgraph with at least
n vertices. Show that the bound is sharp.
Exercises for Section 12.1 551
12.1.15. (♦) Prove that a poset of size greater than mn has a chain of size greater than
m or an antichain of size greater than n. Use this to prove the Erdős–Szekeres Theorem:
every list of mn + 1 distinct integers has an increasing sublist with more than m elements
or a decreasing sublist with more than n elements.
12.1.16. (♦) A family of sets is union-free if it has no two distinct members whose union
is a third member. Moser asked for º (n), the maximum size of a union-free subfamily that
can be guaranteed to exist in any family of n sets.√
(a) Use Dilworth’s Theorem to prove º (n) ≥ n. (Riddell, Erdős–Komlós [1970])
√
(b) Prove º (n) > 2n − 1. (Erdős–Shelah [1972], Kleitman [1973])
(c) Let Ai , j consist of the integers from −i to + j , and let F = {Ai , j : (i , j) ∈ [t]2 }. Prove
√
that the maximum size of a union-free family in F is 2t − 1. Thus º (n) ≤ 2 n − 1 when n
is a perfect square. (Erdős–Shelah [1972]) √
(Comment: Fox–Lee–Sudakov [2012] proved º (n) = ⌊ 4n + 1⌋ − 1 for all n.)
12.1.17. Given n1 , . . . , n¾ ∈ , let P denote the poset whose elements are the -tuples x
with xi ∈ [ni ] for all i, ordered by x < y if and only if xi < yi for all i. Prove that every
maximal antichain in P is a maximum antichain, and determine its size. (Tsai [2017])
12.1.18. Exercise 6.1.23 used Hall’s Theorem to prove that if G is an X , Y -bigraph with no
isolated vertices, and d(x) ≥ d(y) whenever xy ∈ E(G) with x ∈ X and y ∈ Y , then G has a
matching that covers X . Use this to show that the family of subsets of [n] decomposes into
(⌈n/2⌉
n
) inclusion chains, which therefore form a Dilworth decomposition of 2 n . (F. Galvin)
12.1.19. Another proof of Dilworth’s Theorem. The poset on the right below arises from
that on the left by deleting the central covering pair. All other comparabilities remain.
(a) Suppose that x covers y and in P. Let Q and R be the posets obtained by deleting
(y , x) and ( , x), respectively, from the set of relations in P. Prove that min{w(Q) , w(R)} =
w(P). (Hint: Take maximum antichains in Q and R, and consider the maximal elements
and the minimal elements of the union of these antichains as a subposet of P.)
(b) Use part (a) to prove Dilworth’s Theorem. (Harzheim [1983])
• •
• • • •
• • • •
• •
12.1.20. For each poset below and each , find a chain partition that is both -saturated
and ( + 1)-saturated. Is some chain partition -saturated for all ?
•
• • •
• •
• • • • • •
• • •
• • • • • •
• •
• • •
•
12.1.21. (♦) Let d ¾ be the maximum size of a -family in a poset P , and let ¾ = d ¾ − d ¾−1 .
(a) In a -saturated chain partition C of P , let be the number of chains of size at least
. Prove ¾ ≥ ≥ ¾+1 , (Comment: The Greene–Kleitman Theorem thus implies 1 ≥
· · · ≥ h , where P has height h. No direct proof is known.) (Greene–Kleitman [1976a])
(b) Prove = ¾ when C is both -saturated and ( − 1)-saturated.
552 Chapter 12: Partially Ordered Sets
12.1.22. A poset P is polyunsaturated (West [1986]) if for 1 ≤ ¾ < l − 1 < h(P) no chain
partition of P is both ¾-saturated and l-saturated.
(a) Use the Greene–Kleitman Theorem and Exercise 12.1.21 to prove that h(P) ≤
w(P) + 2 when P is polyunsaturated.
(b) Construct a poset P¾ iteratively as follows. For ¾ = 1, let P¾ = 3. For ¾ > 1, ob-
tain P¾ from P¾−1 by adding a chain C of ¾ + 1 new elements and making the element just
below the maximal element on C cover the element just below the maximal element of the
(unique) longest chain in P¾−1 . The diagrams of P2 and P3 appear below. Prove that P¾
is polyunsaturated. (Comment: Thus the maximum height of a polyunsaturated poset of
width ¾ is ¾ + 2.) (Chappell [2002])
•
• • •
• • • • •
• • • • •
• •
GRADED POSETS
In this section we consider only finite posets. This property makes the notion
of the “rank” of an element well defined.
12.2.1. Definition. In a poset, the rank of an element x, written r(x), is the max-
imum length of a chain having x as its top element. A poset P is graded if all
its maximal chains have the same length, and its rank r(P) is that length.
• •2 •2
•
• •1 •1
•
• •0 •0
not graded graded
In a graded poset, r(x) = r(y) + 1 when x covers y. The rank of the poset is
the rank of its maximal elements. The notion of rank function can be extended
to more general posets, but we will study only graded posets in this section.
Section 12.2: Symmetric Chains and LYM Orders 553
12.2.2. Definition. If P is graded, then the elements with rank ¾ are the ¾ th
rank or ¾ th level P¾ , and we write N¾ (P) for the rank size | P¾ | (also called
the ¾ th Whitney number of P). A graded poset is rank-symmetric if N¾ =
Nr(P)−¾ for all ¾ . It is rank-unimodal if there is a rank ¾ such that Ni ≤ Nj
whenever i ≤ j ≤ ¾ or i ≥ j ≥ ¾ . The rank generating function is the
formal power series ∑¾≥0 N¾ x¾ .
12.2.3. Example. Subsets. The poset 2 n is graded, with r(x) = | x| and r(2 n) =
n. The ¾ th rank is ([n]
¾ ). The poset is rank-symmetric and rank-unimodal. Since
N¾ (2 n)
= ¾ the rank generating function is (1 + x)n .
( n
),
Every maximal chain in 2 n has length n (size n + 1). There are maximal an-
tichains of size 1, but for maximum antichains we will again prove Sperner ’s
Theorem (Theorem 11.2.14) that w(2 n) = (⌊n/2⌋n
).
phrased using divisibility, but the structure is completely captured by the chain-
product description, and we usually view the elements as n-tuples.
For a ∈ M e , we have r(a) = ∑ ai . The rank generating function enumerates
multisets, indexed by size: ∏i=1 (1 + x + · · · x ei −1). When the ith multiplicity is
n
•
• •
• • •
•
• • •
• •
•
12.2.7. Proposition. Every symmetric chain order satisfies the strong Sperner
property.
Proof: In a graded poset P , any ¾ largest ranks form a ¾-family. Every chain C in
a symmetric chain decomposition contributes exactly min{¾ , | C|} elements to the
union of the ¾ largest ranks. No chain C can contribute more than min{¾ , | C|}
elements to a ¾-family, so these ranks form a maximum ¾-family.
• •
• • • • • • •
• • → • • • → • • •
• • •
The result was proved more generally for the divisor order, solving a problem
posed by the Dutch Wiskundig Genootschap in 1949. K atona observed that the
method applies to any product of symmetric chain orders.
12.2.9. Theorem. (K atona [1972a]) Products of symmetric chain orders are sym-
metric chain orders.
Proof: We need only consider a product of two such orders. If P and Q have sym-
metric chain decompositions B1 , . . . , B¾ and D1 , . . . , Dl , then the products Bi × Dj
Section 12.2: Symmetric Chains and LYM Orders 555
•
• •
• • •
• • • •
• • • •
• • •
• •
•
Theorem 12.2.8 is easy but does not explicitly describe the chains. How can
we tell whether two given elements lie in the same chain?
12.2.12.* Example. (Aigner [1973]) We use a greedy lexicographic rule. List the
¾-sets in lexicographic order, from [¾] to [n] − [n − ¾]. Match each ¾-set A in turn
to the (¾ + 1)-set that is earliest in lexicographic order on level ¾ + 1 among the
(¾ + 1)-sets that remain unmatched and contain A. For example, in 24 we match
∅ to 1, then 1 → 12, 2 → 23, 3 → 13, and 4 → 14, then 12 → 123, 13 → 134,
14 → 124, 23 → 234, with none available for 24 and 34, and finally 123 → 1234.
The resulting chains (shown below for n = 4) are the same as those in Exam-
ple 12.2.10 (see Exercise 20). It is not even obvious that this produces symmetric
Section 12.2: Symmetric Chains and LYM Orders 557
chains, and yet we obtain the familiar bracketing decomposition. The construc-
tion also extends to multisets.
• 1234
123 • •124 •134 •234
12• 13• 14• • 23 24 34
1 • 2• •3 •4
•∅
12.2.13. Example. L(m , n): Bounded integer partitions. The elements of L(m , n)
are the integer lists (a1 , . . . , am) such that 0 ≤ a1 ≤ · · · < am ≤ n. These corre-
spond to Ferrers diagrams contained in an m by n rectangle. The order relation
puts a ≤ b if and only if ai ≤ bi for all i. Hence L(m , n) is a subposet of (n + 1)m .
The complement of a Ferrers diagram in a rectangle fits in that rectangle,
so L(m , n) is rank-symmetric (actually, self-dual). The rank generating function
1− qn+ j
(with formal variable q for algebraic reasons), is ∏m j =1 1 − q j
(Exercise 3.4.40).
Rank-unimodality is difficult; algebraic proofs began with Sylvester (see Proctor
[1982]). O ’Hara [1990] found an intricate combinatorial proof, presented also in
Zeilberger [1989]. Stanley [1982] observed that L(m , n) has the Sperner prop-
erty, using results of Griggs [1977].
Stanley conjectured that L(m , n) is a symmetric chain order. This is easy for
m ≤ 2 (see Exercises 5–8) and is known for m ≤ 4 (Riess [1978], Lindström [1980],
West [1980]). Solutions for L(m , n) with m = 5 and n odd have been rumored.
maximal elements all have size ⌈ n/2⌉ ; this yields a lower bound. For the upper
bound, we view down-sets as monotone Boolean functions, defined to be order-
preserving functions from 2 n to {0 , 1}.
By a more detailed argument along the same lines, showing that almost
always the new chain contains at most one undetermined element, K leitman–
Markowsky [1975] improved this upper bound to 2(⌈n/2⌉)(1+O(log n/n)) (strengthening
n
Exact values for n ≤ 7 are 3, 6, 20, 168, 7581, 7828354, and 2,414,682,040,998,
with Korshunov ’s formula giving 7996118 for n = 6.
−1 ≤
12.2.16. Definition. For a family F in a graded poset, the inequality ∑ x∈ F Nr(x)
1 is the LYM inequality. A graded poset satisfies the LYM property if its
antichains all satisfy the LYM inequality. Such a poset is an LYM order.
By the argument of Theorem 12.2.15, the LYM property implies the Sperner
property. An analogue of this argument using circular arrangements yields the
strong Sperner property for 2 n (Exercise 28). We will see later that the LYM
property implies the strong Sperner property.
We will also see that the argument in Theorem 12.2.15 generalizes; it needs
only a list of maximal chains such that, in each rank, each element appears
equally often. We introduce a name for such a list of maximal chains in order
to use the argument in more generality.
12.2.20. Example. 2 n has the normalized matching property. For A ⊂ ([n] ¾ ), each
element of A extends to n − ¾ elements of A∗ . Since each element in A∗ can lose
an element in ¾ + 1 ways, (¾ + 1) | A∗ | ≥ (n − ¾) | A| . Dividing both sides by (n − ¾)(¾n)
yields | A| /N¾ ≤ | A∗ | /N¾+1 . This was the essence of the argument we used to prove
Sperner ’s Theorem (Theorem 11.2.14).
12.2.21. Theorem. (K leitman [1974]) For a graded poset P , the following state-
ments are equivalent:
(A) P has a regular covering.
(B) P has the LYM property.
(C) P has the normalized matching property.
Proof: A ⇒ B. As in the proof of Theorem 12.2.15, counting the chains in
a regular covering C that are hit by the elements of an antichain F yields
∑ x∈ F |C| /Nr(x) ≤ |C| and thus the LYM inequality.
B ⇒ C. If A ⊆ P¾ , then A ∪ (P¾+1 − A∗) is an antichain in P. The LYM
inequality yields | A| /N¾ +| P¾+1 − A∗ | /N¾+1 ≤ 1. Since | P¾+1 | = N¾+1 , this becomes
| A| /N¾ ≤ | A∗ | /N¾+1 .
A∗ P¾+1 − A∗ P¾+1
A P¾
12.2.22.* Remark. (1) The LYM inequality and regular coverings are self-dual,
so normalized matching is equivalent to requiring | D[A] ∩ P¾−1 | ≥ | A| N¾−1/N¾
when A ⊆ P¾ (Exercise 29 requests a direct proof without duality).
(2) Theorem 12.2.21 guarantees short proofs. Having the LYM property can
be proved by giving a regular covering. Failing the LYM property can be proved
by giving a violation of the normalized matching property (Exercises 26–27).
(3) Since the number of chains is divisible by each rank-size, every regular
covering has at least lcm {N¾ } chains, achieved by blowing up x to lcm {N¾ }/Nr(x)
copies (Exercise 4). However, every LYM poset has a regular covering using at
most | P | − r(P) distinct chains, and this is best possible (Exercise 30).
(4) Graham–Harper [1969] found an efficient method to find a regular cover-
ing. We seek nonnegative integer weights on the edges from P¾ to P¾+1 such that
Section 12.2: Symmetric Chains and LYM Orders 561
the total weight on edges leaving each element of P¾ is N¾+1 and the total weight
on edges entering each element of P¾+1 is N¾ . A solution forms a regular covering
for the subposet P¾ ∪ P¾+1 . The weights give the relative usage of the covering
pairs in the full regular covering. Feasibility can be tested by adding a source
and sink, modeling the weights with multiedges, and using Menger ’s Theorem;
thus we can test the LYM property in polynomial time.
(5) When the number of elements an element x covers depends only on the
rank of x, the set of all maximal chains is a regular covering (Baker [1969]).
We have seen that the LYM property implies the Sperner property. The LYM
property (with its equivalence to regular covering) also implies a more general
statement that implies the strong Sperner property.
12.2.25. Corollary. (Erdős [1945]) The LYM property implies the strong Sperner
property.
Proof: If G is a ¾-family, then Corollary 12.2.24 limits its size to the sum of the
¾ largest rank sizes.
Now it is natural to ask whether the LYM property is so strong that it also im-
plies the structural “holy grail” of symmetric chain decomposition. The answer
is “yes” when the obvious necessary conditions hold.
levels to one along the resulting matching. Since normalized matching considers
only consecutive levels, the smaller poset P is still an LYM order, and it also has
symmetric and unimodal rank sizes. The guaranteed chain decomposition for P
expands into a symmetric chain decomposition of P using the central matching.
For odd height, let the middle rank be P¾+1 . If we can match P¾ to P¾+2
through P¾+1 , then the unused elements of P¾+1 will become singleton chains.
After discarding them, the three levels collapse to one level along the matched
edges to obtain a smaller LYM order P . After obtaining a symmetric chain de-
composition of P , expand each element of the middle level into a 3-element chain
as the middle of a skipless symmetric chain in P. Together with the discarded
singletons, these chains form a symmetric chain decomposition of P.
The covering pairs down from P¾+2 and up from P¾ yield two families A and
B of subsets of P¾+1 , each with N¾ sets. The two desired matchings exist when
there is a common system of distinct representatives for A and B. For subsets
I , J ⊆ [N¾ ], let A = ∪i∈ I Ai and B = ∪ j ∈ J Bj . By the Ford–Fulkerson Condition
(Theorem 7.2.15), | A ∩ B | ≥ | I |+| J |− N¾ suffices. Since the dual of an LYM order
is an LYM order, both | A | ≥ | I | (N¾+1/N¾) and | B | ≥ | J | (N¾+1/N¾). Thus
| A ∩ B | = | A | + | B | − | A ∪ B | ≥ (| I | + | J |)(N¾+1/N¾) − N¾+1
= (| I | + | J | − N¾)(N¾+1/N¾) ≥ | I | + | J | − N¾ .
So far, our only criteria for the LYM property are the three equivalent defin-
ing properties. We have not yet proved that chain-products are symmetric chain
orders. We consider the behavior of the LYM property under products. First note
the behavior of the rank sizes.
12.2.27. Remark. Rank of poset products. If P and Q are graded, then their
product is also graded and has rank function given by r P × Q(x , y) = r P (x) + r Q(y).
Thus N¾ (P × Q) = ∑i Ni(P)N¾−i(Q).
12.2.28. Example. The product of LYM posets need not be an LYM poset. In the
example below, the set {a1 , b1} occupies 32 of its rank, but its shadow at the rank
above is only 12 of that rank.
• d1
d•
1• d0 • • c1
c• × =
0• c0 • • •
• • a1 b1
a b • •
a0 b0
Section 12.2: Symmetric Chains and LYM Orders 563
12.2.29. Remark. Necessary condition for LYM property in a special product. Let
Q = P × 2, where P is an LYM poset. Let A = {(x , 1): x ∈ P¾−1 }. The set A lies in
rank ¾ in Q. Note that A∗ ⊆ {(y , 1): y ∈ P¾ }.
Write Nj for Nj (P). Since 2 has one element at each rank, Q has Nj −1 + Nj
elements at rank j . Normalized matching thus requires
| A∗ | | A|
≥ .
N¾ + N¾+1 N¾−1 + N¾
Since | A| = N¾−1 and | A∗ | = N¾ , we need N¾2 ≥ N¾−1 N¾+1 . This condition on the
sequence of rank sizes is necessary for the product with 2 to be an LYM order. We
will show that it is sufficient for products in general.
12.2.30. Definition. A sequence ⟨N⟩ is log-concave if N¾2 ≥ N¾−1 N¾+1 for all ¾ .
The condition for log-concavity is that the logarithms of the terms form a
concave sequence. Every concave sequence is also log-concave.
12.2.31. Theorem. (Harper [1974], Hsieh–K leitman [1973]) The family of LYM
orders with log-concave rank sizes is closed under taking products.
¾
Proof: We have r(P1 × P2) = r(P1) + r(P2) and N¾ (P1 × P2) = ∑ i=0 Ni(P1)N¾−i(P2).
Log-concavity of the convolution of two log-concave sequences is an exercise in al-
gebraic manipulation (Exercise 31).
To prove the LYM inequality for P1 × P2 , we generalize Theorem 12.2.23.
There we picked a random chain from a regular covering. Here, we pick a ran-
dom pair C1 , C2 from regular coverings C1 and C2 of P1 and P2 . This produces a
random rectangle in the product.
Given any subset G of P1 × P2 and weights ë x for x ∈ P , let X =
∑ x∈ G∩(C1 × C2) ë x . The expectation is ∑ x∈ G ë x (x ∈ C1 × C2). Since C1 and C2 are
regular coverings, (x ∈ C1 × C2) = Nr(x1)(P1)−1 Nr(x2)(P2)−1 , where x = (x1 , x2).
Thus the left side of the inequality below is the expectation of X , while the right
side is its maximum.
ëx
∑ Nr(x )(P1)Nr(x )(P2) ≤ max
C ∈C i i
∑ ëy
x∈ G 1 2 y ∈ G ∩ C1 × C2
Setting ë x = Nr(x1)(P1)Nr(x2)(P2)/Nx yields
1 Nr(y1)(P1)Nr(y2)(P2)
∑ Nr(x) ≤ max
C ∈C i i
∑ Nr(y)
.
x∈ G y ∈ G ∩ C1 × C2
To obtain the LYM inequality, it suffices to show that the right side of this in-
equality is at most 1 when G is an antichain.
If G lies entirely in the ¾ th rank of P1 × P2 , then we compute a bound over
rank ¾ for arbitrary C1 × C2 . The elements of rank ¾ in P1 × P2 that lie in C1 × C2
have the form (y1 , y2), where y1 is the element of C1 with rank i in P1 and y2 is
the element of C2 with rank ¾ − i in P2 . There is at most one such element for
each i ∈ {0 , . . . , ¾}. Thus
¾
Nr(y1)(P1)Nr(y2)(P2) N (P )N (P )
∑ ≤ ∑ i 1 ¾−i 2 = 1 .
Nr(y) N¾ (P1 × P2)
y ∈ G ∩ C1 × C2 i=0
564 Chapter 12: Partially Ordered Sets
Suppose that G has elements from more than one rank in P1 × P2 . We show
that pushing those in the lowest occupied rank upward toward the highest occu-
pied rank cannot decrease the specified sum. This suffices, since we have shown
that the sum is bounded by 1 when G lies in a single rank.
Let T be a maximal set of “consecutive” elements of G at rank ¾ in C1 × C2 ;
“consecutive” means T = {(x i , y¾−i): r ≤ i ≤ s} for some 0 ≤ r ≤ s, where x i is
the element of rank i in C1 and yj is the element of rank j in C2 . Let T ∗ be the
set of elements covering members of T in C1 × C2 ; this is another consecutive
set. Because T is a maximal consecutive set, replacing all of T with T ∗ does not
violate the antichain condition.
T∗
¾+1◦ • • • ◦ ◦
¾→ ◦ • T • ◦ •
s+1
12.2.33. Theorem. If all roots of a polynomial with real coefficients are real,
then the sequence of coefficients is log-concave.
complex roots when max e i > 2. Log-concavity follows because the convolution of
log-concave sequences is log-concave.
EXERCISES 12.2
12.2.1. (−) Use Sperner ’s Theorem and Dilworth’s Theorem to prove (weaker than Theo-
rem 12.2.14) that the number of antichains in 2 n is at most (n + 1)(⌈n/2⌉). (Gilbert [1954])
n
12.2.4. (−) Prove that the minimum number of chains in a regular covering of an LYM or-
der is lcm N¾ . (Hint: Blow up each element x to (lcm N¾)/Nr(x) copies and use the argument
of Theorem 12.2.21.) (West–Harper–Daykin [1983])
12.2.5. (−) Prove that L(2 , n) (Example 12.2.13) is a symmetric chain order.
12.2.6. (−) An automorphism of a poset is an order-preserving permutation of the ele-
ments. Let P be a graded poset such that whenever x and y have the same rank in P , some
automorphism maps x to y. Prove that P is an LYM order.
12.2.7. Prove w(n × n × n) = ⌊ (3n2 + 1)/4⌋ .
12.2.8. (+) Construct a symmetric chain decomposition of L(3 , n) for odd n. (West [1980])
12.2.9. Let P be a finite poset whose diagram is connected.
(a) Show that P may have a maximal chain that is not a longest chain even when every
element in P lies in a longest chain of P.
(b) Suppose that , whenever y covers x in P , some longest chain contains both x and y.
Prove that P is a graded poset. (Stanley [1971, p. 19–20])
12.2.10. ¾ -families in chain products.
(a) For i , j , ¾ ∈ , find a formula without summations for the maximum size of a ¾-
family in the chain-product i × j. (Hint: Consider three cases for {i , j , ¾}.)
(b) Consider three sets of parallel lines in the plane, forming equilateral triangles.
Within the sets, the lines need not be equally spaced. Let the sets have sizes r, s , t. De-
termine the maximum number of points that occur as the intersection of three lines, one
from each set. (Matsko–West–Wetzel [2001])
12.2.11. (♦) A semiantichain in P × Q is a subset S having (u , v) < (u , v ) for two ele-
ments of S only if u < u and v < v . A product poset has the 2-part Sperner property
when some single rank is a largest semiantichain.
(a) Prove that the product of two symmetric chain orders is 2-part Sperner.
(b) Use part (a) to show that for any 2-coloring of the elements of [n], the largest sub-
poset of 2 n having no related pair with monochromatic difference consists of the middle
rank. (Kleitman [1965], Katona [1966])
12.2.12. Bracketing decomposition of M e . Dedicate ei − 1 positions for the ith coordinate.
View a ∈ M e as a list with 0 ≤ ai < ei . In the positions for the ith coordinate, put ai
right parentheses followed by ei − 1 − ai left parentheses. Match parentheses as in Ex-
ample 12.2.10. Associate a single chain to the elements having the same matched pairs.
Prove that these chains form a symmetric chain decomposition of M e . (Below is a chain
from M (5 ,4) with one matched pair; it is the second chain in the figure for Theorem 12.2.9.)
(Greene–Kleitman [1976b], Leeb [unpublished])
(((( )(( )((( )(( ))(( )(( )))( )(( )))( ))( )))( )))
< < < < <
(0 , 1) (1 , 1) (2 , 1) (3 , 1) (3 , 2) (3 , 3)
12.2.13. A finite set of integers is balanced if the numbers of even and odd elements differ
by at most 1. Let F be a family of subsets of [n] such that whenever A , B ∈ F with A ⊆ B,
the set B − A is not balanced. Prove that | F | ≤ (⌈n/2⌉
n
) and that this bound is best possible.
(Greene–Kleitman [1976b])
12.2.14. (♦) A skew chain order is a poset having a rank function in which every mini-
mal element has rank 0 and a decomposition into skipless chains starting at rank 0. De-
scribe (with proof) the largest semiantichain (see Exercise 12.2.11) in the product of two
skew chain orders. Let P¾ be the inclusion order on the set of intervals in with end-
points in [¾]. Give a geometric description of the maximum semiantichain in Pm × Pn .
(West–Kleitman [1979])
566 Chapter 12: Partially Ordered Sets
12.2.24. (♦) Let G be an X , Y -bigraph with | Y | ≥ | X | and no isolated vertices. The defi-
ciency (A) of a set A ⊆ V(G) is | A| − | N(A)|. Say that G has the strong Hall property if
(A) + (B) ≤ | Y | − | X | when A , B ⊆ Y with | A| + | B| ≤ | Y |. Let H be a graph formed from
G + G by adding a matching joining the copies of Y .
(a) Prove that if G satisfies the strong Hall property, then H has a perfect matching.
(b) Let P be a self-dual rank-symmetric rank-unimodal poset. Prove that if the bi-
partite graphs joining consecutive levels all have the strong Hall property, then P has a
symmetric chain decomposition. (Lu–Wang–Wong [1998])
12.2.25. The Weak Order Wn on the permutations of [n] is defined by letting cover if
is obtained from by transposing two consecutive elements to make them an inversion.
The poset is graded: r( ) is the number of inversions in , so the rank generating function
is 1(1 + x)(1 + x + x2) · · · (1 + x + · · · + x n−1 ), with unimodal coefficients (Example 12.2.34).
(a) Show that Wn is a symmetric chain order for n ≤ 4. (Comment: Also W5 is a sym-
metric chain order by using Exercise 12.2.24, but for n > 5 the answer is unknown.)
(b) Show that W4 is not an LYM order by considering the permutation 2143. Gener-
alize the argument to prove that W2m is not an LYM order for m ≥ 2.
12.2.26. Prove that L(m , n) is an LYM order if and only if m = n = 3 or min{m , n} ≤ 2.
(Hint: Find the lowest violation of normalized matching in L(3 , 4) and generalize this for
m ≥ 3 and n ≥ 4. A different violation is needed for L(4 , 4); consider 1114.)
12.2.27. (♦) Let Π n denote the poset of partitions of [n], with ≤ if is a union of par-
titions of the blocks of . Partitions with blocks have rank n − , so Nn−¾(Π n) = S(n , )
(the Stirling number). For even n, let A be the set of partitions of [n] into two blocks of
size n/2. Use A and its shadow to prove that Π n with n even is not an LYM order when
n ≥ 20. (Spencer [1974]) (Comment: Rota asked whether Π n always has the Sperner prop-
erty; Canfield [1978] showed that it doesn’t. Shearer [1979] and Jichang–Kleitman [1984]
reduced the least n such that Π n is not Sperner to 4 × 109 and then to 3.4 × 106 .)
12.2.28. (♦) Let F be a -family in 2 n .
(a) Prove that every circular permutation of [n] has at most n substrings in F .
−1 ≤ .
(b) Use part (a) to prove ∑ x∈ F Nr(x)
(c) Use part (b) to prove the strong Sperner property for 2 n . (Füredi–Katona)
12.2.29. Prove directly that the dual of a graded poset satisfying the normalized match-
ing property also satisfies that property. That is, given an X , Y -bigraph satisfying
| N(S)| / | Y | ≥ | S| / | X | for all S ⊆ X , prove | N(T)| / | X | ≥ | T | / | Y | for all T ⊆ Y .
12.2.30. A minimal LYM order is an LYM order such that deleting any covering pair
from the order relation destroys the LYM property.
(a) Prove that the relations between adjacent ranks of a minimal LYM order form a
forest , connected when the rank sizes are relatively prime. Construct an example to show
that the forest may or may not be connected when the rank sizes are not relatively prime.
(Hint: Consider the Graham–Harper version of the normalized matching condition.)
(b) Prove that every LYM order P has a regular covering using at most | P | − r(P) dis-
tinct chains. Prove that this is sharp. (West–Harper–Daykin [1983])
12.2.31. Let ⟨a⟩ and ⟨b⟩ be log-concave sequences.
(a) Prove that ai aj ≥ ai+1 aj −1 whenever i ≥ j .
(b) Prove that ∑i ∑j (ai aj − ai+1 aj −1)(b¾−i b¾− j − b¾−1 −i b¾+1 − j ) ≥ 0.
(c) (+) Use part (b) to prove that the product of two graded posets with log-concave
rank sizes has log-concave rank sizes.
12.2.32. Given log-concave sequences ⟨a⟩ and ⟨b⟩, let ¾(r, s) = ∑i=r ai b¾−i . Prove that
s
½ ¾+1 (r,s+1)
½ (r,s)
is increasing in r and decreasing in s. (This completes Theorem 12.2.31.)
¾
568 Chapter 12: Partially Ordered Sets
12.2.33. (♦) Given s , t ∈ 0 , let an = ∑it=s (ni). Prove that ⟨a⟩ is log-concave. (Hint: Let
ºn(x) = ∑¾= s (¾) x
t n ¾
, and study the coefficients of [ºn(x)]2 − ºn−1 (x)ºn+1 (x). (Knuth [2017])
12.2.34. Let Ln(q) be the inclusion order on the subspaces of an n-dimensional vector space
over a field with q elements.
(a) Count the bases in a subspace of dimension ¾ .
(qn − 1)(qn−1 − 1) · · · (qn−¾+1 − 1)
(b) Prove N¾(Ln(q)) = .
(q¾ − 1)(q¾−1 − 1) · · · (q1 − 1)
q¾ −1
(c) Prove that elements of rank ¾ cover q−1 elements. Conclude that Ln(q) is an LYM
order. (Comment: N¾(Ln(q)) is the Gaussian polynomial [¾n]q of Exercise 3.4.40.)
12.2.35. A graded poset is regular if all elements of rank ¾ are covered by the same num-
ber of elements at rank ¾ + 1 and cover the same number at rank ¾ − 1. A graded poset is
strictly Sperner if every maximum antichain consists of one rank. A regular covering is
exhaustive if any two comparable elements both lie on some chain in the covering.
(a) Show that the product of two chains of different lengths is not strictly Sperner (al-
though it is an LYM order).
(b) Prove that a poset with an exhaustive regular covering has the strict Sperner prop-
erty if and only if for every pair of maximum-sized ranks, the bipartite graph of relations
between them is connected. (Broline)
(c) Prove that a regular poset has an exhaustive regular covering, and conclude that
2 n has the strict Sperner property.
12.2.36. Derived LYM posets.
(a) Let P be an LYM order of rank r. For S ⊆ [r], let Q be the subposet consisting of
all elements whose rank in P belongs to S. Prove that Q is an LYM order.
(b) Let ⟨a¾ ⟩ be a log-concave sequence. Prove that a2¾ ≥ a¾+ j a¾− j for all ¾ , j .
(c) Let A1 , . . . , Ar be a partition of [n] into r blocks, and let S1 , . . . , Sr be r arithmetic
progressions. Let P = {X ⊂ [n]: | X ∩ Ai | ∈ Si for 1 ≤ i ≤ r}. Prove that the inclusion order
on P is an LYM order. (Griggs [1982])
12.2.37. Bollobás’ Inequality.
(a) Let A1 , . . . , A m and B1 , . . . , Bm be subsets of [n] such that Ai ∩ Bj = ∅ if and only
−1
if i = j . Prove that ∑ (| Ai||+|
Ai |
Bi |
) ≤ 1. (Hint: Consider instances of B¾ completely after A¾
in permutations of [n].) (Bollobás [1965])
(b) Use part (a) to prove the LYM property for 2 n .
(c) Use part (a) to prove that (⌊(nn−−¾)/2⌋
¾
) is the maximum t such that 2 n contains (¾ + 1)-
chains C1 , . . . , Ct such that every member of each chain is incomparable to all members of
all the other chains in the list. (Griggs–Stahl–Trotter [1984])
12.2.38. Let be a family of finite sets A1 , . . . , A m . Let Ì( ) denote the minimum size of
a set intersecting each Ai . A family is Ì-critical if Ì( − {Ai }) < Ì( ) for all i.
−1
(a) Prove ∑i=1 (| Ais|+ s) ≤ 1 for Ì-critical with Ì( ) = s+1. (Hint: Exercise 12.2.37a.)
m
(b) Prove that if is r-uniform and every Ì(A) ≤ s for every subfamily A with | A| ≤
(r+s s) , then Ì( ) ≤ s. State the special case for graphs, using the vertex cover number Î(G).
ORDER DIMENSION
When purchasing a new car, a buyer considers many models. Between any
two, the buyer may prefer one or be undecided. Assuming that the preference
relation is a partial order, let P be the resulting poset. The buyer may try to
encode P by rating the cars on criteria such as price, reliability, mileage, roomi-
ness, color, styling, etc. Assume that cars are ranked linearly on each scale. The
scales “realize” P when car x is preferred to car y in P if and only if x is preferred
to y on each scale. We try to realize a poset using a small number of linear orders.
A set of extensions realizes P if and only if for every (x , y) ∈ I(P), some exten-
sion in the set has x < y. That is, every incomparable pair must be established.
1 5 6•
• •
4 5 6 4 5 6 5• •3
3• •4 • • • • • •
4• •2
• • • • • • • •
2 6 1 2 3 1 2 3 •1
F F̂ F̂ P
1 2 3 4
• • • •
• • • •
1 2 3 4
time by checking an entry. A realizer of size ¾ uses ¾ n log2 n bits. This takes less
storage when dim P ≤ O(n/log2 n), although testing x < y takes ¾ comparisons.
Encoding each element by its heights on the ¾ extensions of a realizer embeds
a poset in ¾ under the product ordering. Indeed, the least such ¾ is another
definition of dimension, often attributed to Ore but given earlier by Hiraguchi.
12.3.7. Theorem. (Hiraguchi [1955], Ore [1962]) A partial order P has a real-
izer of size ¾ if and only if it embeds in the product of ¾ chains.
Proof: Given a realizer, we obtain such an embedding using the heights on the
extensions to map each element of P to an element of the product. Conversely,
given an embedding that maps x ∈ P to (x1 , . . . , x ¾), we seek a realizer by placing
the elements on the ith extension in the order of their ith coordinates.
These values need not be distinct; there may be “ties” in coordinate i. Let
S = {x ∈ P: x i = t}. To break the ties, expand this position on the ith extension
into any linear extension of the subposet S. This preserves all the relations of P ,
so we have obtained linear extensions.
To show that this is a realizer, consider x , y ∈ S with x y. Because the encod-
ing embeds P , there are coordinates j and ¾ such that x j < yj and x¾ > y¾ . The
extensions corresponding to these coordinates have x < y and y < x, respectively,
which is not affected by breaking ties in another coordinate.
Theorem 12.3.7 yields dim 2[n] ≤ n, since 2[n] is a product of n chains. Komm
[1948] showed that dim 2[n] = n. To see that 2[n] cannot embed in a product of
fewer chains, we use Sn and the next observation.
and (b , 0̂) < (1̂ , 0̂), such an extension will have (0̂ , 1̂) < (1̂ , 0̂) and must be one of
L1 , . . . , Lm . Furthermore, since (a , 0̂) < (a , 1̂), this extension has (a , 0̂) < (b , 0̂).
Since (a , b) ∈ I(P) was arbitrary, L1 , . . . , Lm contains a realizer of the copy P ×
{0̂} of P , so m ≥ dim P. By analogous reasoning, the extensions with (0̂ , 1̂) >
(1̂ , 0̂) realize {0̂} × Q, so there are at least dim Q of those.
To see that dim P × Q can be less than dim P + dim Q, consider the simplest
product involving a non-bounded poset: dim (• •) × (•) = 2 = dim (• •) + dim (•) − 1.
However, it seems that it cannot be much less.
Since a set of extensions realizes P if and only if each ordered pair (x , y) ∈ I(P)
appears in some extension, computing dimension is equivalent to covering of I(P)
by the fewest sets of pairs that can appear in one extension. This expresses dimen-
sion as hypergraph coloring (recall that the chromatic number of a hypergraph is
the minimum size of a vertex partition into sets containing no edge).
Thus dim P is the chromatic number of a hypergraph where the vertices are
I(P), the edges are the alternating cycles, and the colors are the linear exten-
sions. We do not need all of this hypergraph to compute dim P. In computing
dim Sn it was enough to establish the incomparable pairs (ī , i); the others were
then necessarily also established. In general, it suffices to establish the “crucial”
incomparable pairs.
Section 12.3: Linear Extensions and Dimension 573
The hypergraph H(P) is useful for computing dimension in special classes be-
cause the lower bound can be established by exhibiting any subgraph of H(P) with
the desired chromatic number. The upper bound is then verified by exhibiting a
realizer that has all the unforced pairs, rather than by verifying that every edge
of H(P) is properly colored. For the standard example, C(Sn) = {(ī , i): 1 ≤ i ≤ n}.
The minimal alternating cycles are precisely the sets of two unforced pairs so
H(Sn) = K n and Ò(H(Sn)) = n.
Hiraguchi proved that this is extremal for both parameters. The proof of dim P ≤
| P | /2 developed here is due independently to K imble [1973] and Trotter [1975].
12.3.17. Definition. A linear extension L puts Y over X if X and Y are disjoint
subposets and y is above x in L whenever x y, x ∈ X , and y ∈ Y . For Q ⊆ P ,
an upper extension of Q is a linear extension that puts P − Q over Q; a
lower extension puts Q over P − Q.
12.3.18. Lemma. Every chain in a poset has upper and lower extensions.
Proof: By symmetry, it suffices to find upper extensions. Let C be a chain in a
poset P consisting of x1 , . . . , x ¾ from bottom to top. Let L be a linear extension of
P − C. For 1 ≤ i ≤ ¾ − 1, let Yi be the set of elements of P − C that are less than
x i+1 but not less than x i ; also let Y0 = D(x1) and Y¾ = P − D[C]. Form a linear
ordering L of the elements of P by inserting between x i and x i+1 all elements of
Yi in the order that they have on L. Similarly insert Y0 before x1 and Y¾ after x¾ .
If y < y for y ∈ Yi and y ∈ / C, then transitivity yields y ∈ Yj for some j ≤ i,
so L puts y and y in the right order. Also x i and y appear in the right order
when they are comparable. If x i y, then y ∈ Yj for some j ≥ i. Thus L is an
upper extension of C.
Not all subposets have upper or lower extensions. Rabinovitch [1978] deter-
mined when there is an extension putting Y over X (Exercise 16).
In addition to the notations U(x) and D(x) for the sets of elements above and
below x, we also use I(x) = {y ∈ P: y x}. Thus P − x = U(x) ∪ D(x) ∪ I(x).
U(x)
U(x) ∪ I(x) U(x)
x• I(x) x ←→ x
D(x) D(x) ∪ I(x)
D(x)
L
Section 12.3: Linear Extensions and Dimension 575
We claim that these 1 + dim (P − x) extensions realize P. The two new exten-
sions establish the incomparable pairs involving x. We must also consider incom-
parable pairs (y , ) with y ∈ I(x) and ∈ U(x) ∪ D(x) that were established by L.
Since the two new extensions have U(x) ∪ I(x) and D(x) ∪ I(x) in order as on L,
the pair (y , ) appears as it did in L in one of the new extensions.
• • • •
•
• • • • • • • • • • •
•
BIPARTITE POSETS
The standard examples Sn are posets whose elements are all maximal or min-
imal. We consider more general such posets.
12.3.25. Remark. In a normal bipartite poset, the unforced pairs are the pairs
(x , y) ∈ I(P) such that x is maximal and y is minimal.
12.3.26. Definition. Write 2 nl,¾ for the subposet of 2 n induced by the l-sets and
¾-sets. Let d n(l , ¾) = dim 2 nl,¾ .
The case of most interest is d n(1 , ¾). Spencer [1971] showed that d n(1 , ¾) ∼
c¾ lg lg n when ¾ is constant (we henceforth use lg√for log2 and ln for log e). Dush-
nik [1950] computed d n(1 , ¾) exactly when ¾ ≥ 2 n; the exact result appears in
Theorem 12.3.29. After a slow√ decline in d n(1 , ¾) as ¾ decreases from n, the drop
becomes rapid for ¾ below 2 n. The upper and lower bounds when ¾ ∈ o(n) differ
by a factor of ln n.
¾ d n(1 , ¾) reference
n−1 n standard example Sn
n−1
2 ≤ ¾ ≤ n− 2 n−1 Dushnik [1950]
n
3< ¾ ≤ n2 −
√1 n− 2 Dushnik [1950]
¾=n ≥2 n n − n1− + O(n2−3 ) Dushnik [1950]
general
√ < ¾(¾ + 1) ln(ne/¾) Füredi–K ahn [1986]
2 ≤ ¾ ≤ 2 n−4 ≥ 14 (¾ + 2)2 Exercise 29
constant ∼ c lg lg n Spencer [1971]
2 ∼ lg lg n Spencer [1971]
These results use different methods. Dushnik’s lower bound uses the Pigeon-
hole Principle, Spencer ’s bounds are by relating the problem to other questions,
and the Füredi–K ahn upper bound is probabilistic.
For bipartite posets in general, the computation of dimension can be reduced
to constructing an appropriate set of permutations of the minimal elements. By
“permutation”, here we mean a linear ordering written out as a list of elements
in order; we use “permutation” to distinguish a linear ordering of some of the
elements from a linear extension of the full poset. An element of a permutation
“comes later than” or “follows” all the elements to its left.
12.3.27. Definition. Given a bipartite poset P , let X and Y be the sets of mini-
mal and maximal elements, respectively. For y ∈ Y , let Sy = {x ∈ X : x < y}.
A set {L1 , . . . , Lt } of permutations of X is a suitable set for P if whenever
y x with y ∈ Y and x ∈ X , some Li puts x later than all of Sy .
12.3.28. Lemma. If P is a normal bipartite poset, then dim P equals the mini-
mum size of a suitable set for P.
Proof: Let t be the minimum size of a suitable set for P. Given a suitable set of
size t, in each permutation we insert each maximal element y immediately after
the last element of Sy . The resulting linear orderings can be viewed as linear
extensions of P. In fact, they form a realizer of size t, since the unforced pairs
are the max-min pairs (y , x) with x ∈
/ Sy . Hence dim P ≤ t.
Section 12.3: Linear Extensions and Dimension 577
(failure) ≤ n(n −¾ 1 ) ( ¾ +¾ 1 )
t t
n 1
< ( ) (1 − )
¾ ¾+1
ne ¾ ne ¾
<( ) e−t/(¾+1) ≤ ( ) e−¾ ln(ne/¾) = 1 .
¾ ¾
¾ − x (Chapter 14), slightly
We used standard inequalities (¾n) ≤ ( ne
¾ ) and 1 − x ≤ e
weakening the Füredi–K ahn bound to simplify computation.
all pairs of other elements except the pairs involving the last element s. In each
case, there are two permutations where s immediately precedes r, and each of the
other six elements precedes s in one of those permutations.
Example 12.3.32 arises from Lemma 12.3.33 using the family given by S1 =
{1 , 2}, S2 = {1 , 3}, and S3 = {1 , 4}. This is a 2-scrambling family of subsets
of [4]; here m = 3. For each Li , Step 1 splits the elements into the two groups
{0 , 1 , 2 , 3} and {4 , 5 , 6 , 7}. The lower group goes first when i ∈ S1 , which holds
for i ∈ {1 , 2}; in L3 and L4 the lower group goes last. Step 2 splits the lower
group into {0 , 1} and {2 , 3} and the upper group into {4 , 5} and {6 , 7}. Within
each group, the lower subgroup goes first when i ∈ S2 , which holds for i ∈ {1 , 3}.
Step 3 finishes the job, deciding which goes first in each pair.
We will use this construction for the upper bound in the next theorem. Given
m sets forming a ¾-scrambling family of subsets of [t], we will obtain d n(1 , 2) ≤ t
when n = 2 m . Hence we seek a large ¾-scrambling family.
Let M(t , ¾) be the maximum size of a ¾-scrambling family in 2 t . We are par-
ticularly interested in ¾ = 2. The family of all ⌊ t/2⌋-sets in [t] that contain the
√
t−1
element 1 is 2-scrambling, so M(t , 2) ≥ (⌊t/2⌋ −1 ) > 2 / 2 t. For ∈
t
, there is a
constant c¾ such that M(t , ) ≥ ct¾ (Exercise 31).
Proof: Upper bound. We prove d n(1 , ) ≤ t for n = 2 M(t ,¾) . Since M(t , ) > ct , this
yields d n(1 , ) < lg1 c lg lg n. For convenience, let m = M(t , ). Let {S1 , . . . , Sm} be
a largest -scrambling family of subsets of [t]. Lemma 12.3.33 provides orderings
L1 , . . . , Lt of 0 through n − 1 such that if a < b and j is the leftmost position
where a and b differ as vectors, then b follows a on Li if and only if i ∈ Sj .
580 Chapter 12: Partially Ordered Sets
We claim that {L1 , . . . , Lt } is a suitable set for 21n ,¾ . Viewing the elements
as binary m-vectors, consider a vector b and vectors a1 , . . . , a¾ other than b. For
1 ≤ r ≤ ¾ , let jr be the first coordinate where ar and b differ. Let A = {r: bjr = 1},
so A ⊆ [¾]. Since {S1 , . . . , Sm} is a ¾-scrambling family and { j1 , . . . , j¾ } is a set
of at most ¾ indices, there is a value i ∈ [t] such that i ∈ Sjr for r ∈ A and i ∈ / Sjr
for r ∈/ A. We claim that b occurs after all of a1 , . . . , a¾ on Li .
In constructing Li , element b is compared with ar when processing coordinate
jr . If bjr = 1, then r ∈ A and i ∈ Sjr . If bjr = 0, then r ∈ / A and i ∈ / Sjr . In either
case, b is placed after ar at stage j . Hence b follows each of a1 , . . . , a¾ in Li . We
conclude that L1 , . . . , Lt is a suitable set.
Lower bound. A suitable set of permutations for 21n ,¾ is also a suitable set for
21n ,¾−1 . Hence by Lemma 12.3.28 it suffices to prove the lower bound for ¾ = 2.
We prove that if n ≥ 22 + 1, then any t orderings of [n] yield a triple that ap-
t
2 t−1
size 2 + 1 that appears monotonically in Lt . Within S, the induction hypothe-
sis yields a triple {x , y , } that appears monotonically in each of L1 , . . . , Lt−1 . By
the choice of S, this triple is also monotone in Lt .
t−1
√
Proof: We have M(t , 2) ≥ (⌊t/2⌋ −1) > 2 / 2 t (using Stirling ’s Formula). By the
t
Note the effect of the double exponential. Since M(t , 2) is the number of ⌊ t/2⌋-
subsets of [t] containing element 1, for t = 6 we have M(t , 2) = 10. The lower and
upper bounds thus yield 4 ≤ d1024(1 , 2) ≤ 6.
For d n(1 , 2), Corollary 12.3.35 establishes the asymptotic behavior. We
provided the next term of the upper bound because this is in fact sharp. In-
deed, there are four natural related problems whose answers in terms of n are
lg lg n + ( 21 + o(1)) lg lg lg n. We discuss three in the rest of this section and the
fourth in Exercise 12.4.7.
Meanwhile, we note that Hoşten–Morris [1999] determined exact values of
n where d n(1 , 2) increases. Biró–Hamburger–P ór–Trotter [2016] observed that
with the result of K leitman–Markowsky [1975], this determines d n(1 , 2) ex-
actly for almost all n, and within 1 otherwise. In particular, given any posi-
tive , for sufficiently large n we have s − < d n(1 , 2) < s + 1 + , where s =
lg lg m + 12 lg lg lg n + 12 lg + 12 .
Section 12.3: Linear Extensions and Dimension 581
12.3.36. Definition. The shift graph G n is the graph with vertex set ([n] )
2 and
edges defined by i j ↔ j ¾ if and only if i < j < ¾ (disjoint pairs are non-
adjacent). The double shift graph G n is the graph with vertex set ([n])
3 and
edges defined by i j ¾ ↔ j ¾ l if i < j < ¾ < l.
12.3.37. Lemma. (A. Hajnal) The chromatic number of the shift graph G n is
⌈ lg n⌉ ; this is the least t such that 2 t has at least n elements.
Proof: Given that 2 t has at least n elements, we properly color G n using [t] as
colors. Let A1 < A2 < · · · < An < · · · be a linear extension of 2 t . For each pair
i j ∈ V(G n) with i < j , color i j with some element of A j − Ai . Since the ordering is
an extension of 2 t , such an element exists. Since no element of A j − Ai can belong
to A¾ − A j , the coloring is proper.
Conversely, when Ò(G n) = t, we show that [t] has at least n subsets. Consider
a proper coloring of G n using [t] as colors. For each i ∈ [n], let Si be the set of
colors used on vertices of the form i j with j > i. If Si = Sj with j > i, then the
color c that appears on i j also appears on j ¾ for some ¾ > j . This is impossible in
a proper coloring, since i j ↔ j ¾ in G n . Hence S1 , . . . , Sn are distinct.
Proof: Corollary 12.3.35 establishes the upper bound. We prove that Ò(G n) is a
lower bound. Let L1 , . . . , Lt be a realizer. For i j ¾ with i < j < ¾ , choose c ∈ [t]
such that the singleton j is above the doubleton i¾ in Lc . Let c be the color of i j ¾ .
We cannot also give color c to j ¾ l with ¾ < l, because this would place i¾ < j <
jl < ¾ < i¾ on Lc . Hence this defines a proper t-coloring of G n , and Ò(G n) is a
lower bound on the dimension.
EXERCISES 12.3
12.3.1. (−) Prove that the intersection of two order relations on the same set is an order
relation.
12.3.2. (−) Prove that a set of elements forms a down-set in a poset P if and only if it is
an initial segment of some linear extension of P.
12.3.3. (−) List all linear extensions of the poset in Example 12.3.4. Determine which
belong to realizers of size 2.
12.3.4. (−) Describe all pairs of linear extensions realizing m + n.
12.3.5. (−) Prove that an n-vertex graph G is the comparability graph of a 2-dimensional
poset if and only if its vertices can be named v1 , . . . , vn so that there is a permutation of
[n] such that vi vj ∈ E(G) for i < j if and only if i > j .
12.3.6. Prove that the posets below have dimension 3. List four techniques that can be
used for the lower bound.
• • • • • • • • •
•
• • • • •
• •
• • • • • • • •
12.3.7. The “fence” poset F n has minimal elements x0 , . . . , x n and maximal elements
y1 , . . . , yn with comparable pairs given by xi−1 , xi < yi for 1 ≤ i ≤ n. Use an embedding of
F n in 2 to find all pairs of linear extensions realizing F n .
12.3.8. Prove that the poset below has dimension 3.
9• •10
7• •8
5• • 11 •6
3• •4
1• •2
12.3.9. The poset in Exercise 12.3.8 is 3-irreducible (deleting any element leaves a
2-dimensional poset), and it generalizes easily to 3-irreducible posets of all nontrivial
heights. Use this and Theorem 12.3.9 to prove the existence of n-irreducible posets of
large height.
Exercises for Section 12.3 583
12.3.10. Prove that a graph G is the complement of a comparability graph if and only if G
is the intersection graph of the curves graphing a set of continuous real-valued functions
on [0 , 1]. (Golumbic–Rotem–Urrutia [1983])
12.3.11. Let P be the graded poset with rank sizes a0 , . . . , ar such that elements are in-
comparable if and only if they have the same rank. Prove dim P = 2. Describe the minimal
alternating cycles of incomparable pairs and a proper 2-coloring of the hypergraph H(P).
12.3.12. Let {(xi , yi): 1 ≤ i ≤ ¾} be a minimal alternating cycle of incomparable pairs in
a poset P. Prove that {x1 , . . . , x¾ } and {y1 , . . . , y¾ } are antichains in P.
12.3.13. Complete the proof that dim P ≤ max{2 , | P − A|} by proving that dim P ≤ 2 if P
has an antichain A such that | P − A| = 2.
12.3.14. (♦) The composition (also called lexicographic product) Q[P1 , . . . , P¾ ] is
formed from a poset Q of size ¾ by expanding each xi ∈ Q to a copy of Pi ; elements expanded
from xi and xj are related as xi and xj are related in Q. Prove that if P = P0 [P1 , . . . , P¾ ],
then dim P = max i≥0 dim Pi . (Hiraguchi [1951])
12.3.15. (♦) Given a connected graph G, let P be the poset of subsets of V(G) that in-
duce connected subgraphs of G, ordered by inclusion. Prove that dim P is the number of
non-cut vertices in G. (Hint: Use distance from non-cut-vertices to partition the ordered
incomparable pairs into classes that avoid alternating cycles.) (Trotter–Moore [1976a])
12.3.16. (♦) Let X and Y be disjoint subposets of a poset P. Prove that P has a linear
extension putting Y over X if and only if P contains no copy of 2 + 2 with minimal elements
in Y and maximal elements in X . (Hint: Use induction on the number of incomparable
pairs (x , y) with x ∈ X and y ∈ Y .) (Rabinovitch [1978])
12.3.17. In a poset P that is not an antichain, let C be a chain, M be the antichain of max-
imal elements, and A be an antichain. Prove the following inequalities.
(a) dim P ≤ 2 + dim (P − C). (Hiraguchi [1951])
(b) dim P ≤ 1 + w(P − M). (Trotter [1975])
(c) dim P ≤ 1 + 2w(P − A). (Trotter 1975]; sharpness in Trotter [1974b])
12.3.18. (+) Let C be a chain in a poset P such that each element of P − C is incomparable
to at most one element of C. Prove that dim P ≤ 1 + dim (P − C). (Bogart–Trotter [1973])
12.3.19. (♦) Suppose that a is a maximal element in P , b is a minimal element in P , and
ab. Prove that dim P ≤ 1 + dim (P − {a , b}).
12.3.20. (♦) Given a < b in a poset P , let r(a , b) count the ordered pairs (x , y) ∈ I(P) such
that a < x and y < b. Prove that (a , b) is a removable pair if r(a , b) ≤ dim P − 3. (Hint: In a
realizer of P − {a , b}, replace a well-chosen extension with two others.) (Hiraguchi [1951])
12.3.21. (♦) Given incomparable elements a and b in a poset P , let r(a , b) count the ordered
pairs (x , y) ∈ I(P) such that x is comparable to both a and b and y is incomparable to both
a and b. Prove that (a , b) is a removable pair if r(a , b) ≤ dim P − 3. (Hint: In a realizer of
P − {a , b}, replace a well-chosen extension with two others.) (Kelly–Trotter [1982])
12.3.22. (♦) Four-Point Removal Theorem. Let P be a poset.
(a) Let C and D be chains in P such that x y for all x ∈ C and y ∈ D. Prove that P has
a linear extension that puts P − C − D over C and puts D over P − C − D. (Hint: Partition
P − C − D into the set X 1 below the top of C, the set X 2 above the bottom of D, and the
remainder X 3 . Combine linear extensions of X 1 ∪ C, X 2 ∪ D, and X 3 .) (Hiraguchi [1955])
(b) For C and D as in part (a), prove dim P ≤ 2 + dim (P − C − D). (Hiraguchi [1955])
(c) For x and y maximal in P , with D(x) ⊆ D(y), prove dim P ≤ 1 + dim (P − x − y).
(d) Given | P | ≥ 4, use parts (b) and (c) to prove that x , y , , w ∈ P exist such that
dim P ≤ 2 + dim (P − {x , y , , w}). (Tator [1983])
584 Chapter 12: Partially Ordered Sets
12.3.23. (♦) The ¾-dimension dim ¾(P) of a poset P is the minimum t such that P em-
beds in k t . Prove that if P decomposes into t chains of size less than ¾ , then dim ¾ P ≤ t.
(Comment: Thus ¾-dimension is well defined.) (Trotter [1976])
12.3.24. (♦) Prove that the maximum size of a minimal realizer of an n-element antichain
is ⌊ n2/4⌋ (for n ≥ 4). (Maurer–Rabinovitch [1977])
12.3.25. In the poset below, prove that (x , y) is an unforced pair whose removal decreases
the dimension by 2. (Reuter [1989b])
x
• • •
• •
•
• •y •
• • •
12.3.26. For n ≥ 5, we construct an n-dimensional poset Pn with 4n − 4 elements and an
unforced pair (y , x) such that dim (Pn − {x , y}) = n − 2 (see P5 below). Begin with disjoint
copies A and B of Sn−2 , with sets A1 and B1 of minimal elements, A2 and B2 of maximal
elements. Add four elements x , y , , w plus covering pairs B1 ≺ x ≺ A2 and A1 ∪ B1 ≺ y
and { , w} ≺ A2 ∪ B2 and w ≺ y. Prove that dim Pn = n, that (y , x) is an unforced pair, and
that dim (Pn − {x , y}) = n − 2. Which property fails for n = 4? (Kierstead–Trotter [1991])
y
A2 • • • • • • • B2
x
•
A1 • • • • • • • • B1
w
In specifying an interval order, the functions and above give the left and
right endpoints of the corresponding interval, respectively.
The characterizations of interval orders and semiorders by forbidden sub-
posets can be used to construct representations. Semiorders were characterized
much earlier, but it is convenient to characterize interval orders first and then
characterize semiorders among them. Fishburn–Monjardet [1992] noted that
posets without 2 + 2 were studied as early as Wiener [1914], who gave a char-
acterization in much different terminology.
Iw Ix Iy I
↑ before
a a+1 b
↓ after
Iw Ix Iy I
More generally, Fishburn [1984b] proved that the interval orders having in-
terval representations using intervals with lengths in [n − 2] are those not con-
taining the poset n + 1 (see also Fishburn [1985, Theorem 8.3]).
Counting interval orders is hard (Hanlon [1982]); but there are precisely
1
( 2n
)
n+1 n semiorders on n elements, bijectively, using the Catalan numbers
(Dean–
Keller [1968]; Exercise 9). For semiorders representable using open intervals of
length with integer endpoints, Mitas [1994] obtained a forbidden subposet char-
acterization; the number of forbidden subposets is the ( + 1)th Catalan number!
588 Chapter 12: Partially Ordered Sets
L ATTICES
Some special posets admit algebraic operations that generalize the notions of
intersection/union for subsets and gcd/lcm for divisibility.
12.4.13. Example. L(m , n), again. The poset L(m , n) of Example 12.4.13 arises
as a lattice of down-sets: L(m , n) =∼ J(m × n) (Exercise 14). The isomorphism
maps a ∈ L(m , n) to the down-set of m × n generated by {(m + 1 − i , ai): ai > 0}.
The down-set in 4 × 5 corresponding to (0 , 1 , 5 , 5) ∈ L(4 , 5) is shown below.
Another proof that L(m , n) is a lattice is by applying Definition 12.4.11 to
the lattice (n + 1)m that contains it (Exercise 15).
•
• •
• • •
• • • •
• • • •
• • •
• •
•
12.4.15. Example. Examples of strict inequality in Lemma 12.4.14(d) and (e) oc-
cur in the lattices M5 and N5 shown on the right above; we will explain their
names later. Note that M5 is the partition lattice Π3 .
The next lemma saves some work in proving that posets are lattices. Given
an upper bound (or a lower bound), one need not construct both meets and joins.
12.4.18. Lemma. If P is locally finite, has an upper bound (the element 1̂), and
has a well-defined meet operation, then P is a lattice.
Proof: It suffices to prove that joins exist. Consider x , y ∈ P. The upper bound 1
is a common upper bound for x and y. Since P is locally finite, the interval from
x ∧ y to 1̂ is finite. Thus we can consider the minimal elements among the set of
common upper bounds of x and y; they lie in the interval [x ∧ y , 1̂].
Let u and v be minimal common upper bounds for x and y. Since x and y are
common lower bounds for u and v, we have x < u ∧ v and y < u ∧ v. Thus u ∧ v
is a common upper bound for x and y. Since u and v are minimal such elements,
u ∧ v ∈ {u , v}. Thus u and v are comparable. Since they are minimal elements in
a subposet of P , they must therefore be equal. Hence there is a unique minimal
common upper bound for x and y.
•1̂
u• •v
•
u∧v
x• •y
•
x∧y
Section 12.4: Special Families of Posets 591
DISTRIBUTIVE L ATTICES
12.4.20. Example. Subset and divisor lattices. Distributivity for the subset lat-
tice can be seen by marking x ∧ (y ∨ ) and (x ∧ y) ∨ (x ∧ ) in a Venn diagram.
For the divisor lattice, we can argue directly about divisors using gcd and lcm to
show distributivity. Alternatively, since every chain is a distributive lattice (min
distributes over max for integers), the conclusion that M e is distributive follows
immediately from the next lemma.
12.4.25. Example. In a finite lattice, the join-irreducible elements are those cov-
ering exactly one element. In the subset lattice these are the 1-sets. In the divisor
lattice these are the powers of primes.
In the lattice L on the left below, the elements labeled by single letters are
the join-irreducible elements. The resulting subposet P(L) is on the right. The
label for each x ∈ L is the set of join-irreducible elements whose join is x. Unique-
ness of such expressions is our next objective. The minimal element of L is not
considered join-irreducible, and the maximal element is not meet-irreducible.
be•
bcd • •e
bc• bd• •cd e•
b• c• •d b• c• •d
•a •a
L P(L)
•∅
We will see in Theorem 12.4.38 that distributive lattices are the appropriate
general setting for many results on 2 n and M e . It helps to keep the divisor lattice
in mind when discussing them. The proof that L = ∼ J(P(L)) when L is distribu-
tive generalizes the proof that integers have unique prime factorizations. In this
discussion, we abbreviate “ join-irreducible” to irreducible.
By induction on the size of the set, in a lattice every finite set has a unique
least common upper bound, so we write joins of finite sets without parentheses.
Induction also shows that meet distributes over a join of a finite set of elements.
Section 12.4: Special Families of Posets 593
12.4.28. Lemma. In a finite distributive lattice L having a lower bound 0̂, every
element has a unique irredundant representation.
Proof: We first prove existence. Note that the identity element for join is 0̂; fol-
lowing our usual convention, 0̂ is thus the join of the empty set of irreducible
elements. Now, if some element has no irredundant representation, then there
is a minimal such element x, and x is the join of two lower elements. By mini-
mality, those elements have irredundant representations, and x is the join of the
union of those two sets. Deleting the non-maximal elements in the union yields
an irredundant representation.
Now let p1 ∨ · · · ∨ p¾ and q1 ∨ · · · ∨ ql be irredundant representations of a.
Since pi ≤ a, Lemma 12.4.26 implies that each pr satisfies pr ≤ qs for some s.
Similarly each qs satisfies qs ≤ pt for some t. This yields a relation pr ≤ pt , which
forces pr = qs = pt since p1 , . . . , p¾ form an antichain. Hence each pi belongs to
{qj }, and similarly each qj belongs to {pi}, and the sets are the same.
We use the word “factorization” because for a divisor lattice, the factoriza-
tion of an element is the set of prime powers in its numerical prime factorization.
12.4.32. Corollary. (1) Every distributive lattice L is graded, with r(L) = | P(L)| .
(2) Under , the irreducible elements of L map to members of J(P(L)) gener-
ated by single elements.
Proof: (1) J(P(L)) is ranked by cardinality of the down-sets in P(L) (for example,
compare L and P(L) in the drawing of Example 12.4.25).
(2) The factorization of an irreducible element p ∈ P(L) is {p}.
∼ Q(L);
Writing this discussion using meets instead of joins would prove P(L) =
Exercise 33 obtains this statement from Theorem 12.4.31.
| L| | F ∩ G | ≥ | F | | G | .
X e n −1
X1 L e n −1
X0
L1
L0
Daykin [1977] proved a more general inequality for more general sets in dis-
tributive lattices and thereby characterized distributive lattices (Exercise 43).
As a common extension of Theorem 12.4.36 and Chebyshev ’s Inequality, we
will prove the FKG Inequality for monotone functions on lattices. Discovered
jointly by Fortuin, K asteleyn, and Ginibre, this is the central result about cor-
relational inequalities.
Chebyshev ’s Inequality can be viewed as a statement about random vari-
ables. The weight function Þ(i) gives the probability that the outcome is i. The
sequences x and y are monotone functions º (i) and ½(i), and we compare the ex-
pectation of their product and the product of their expectations. To extend this
to distributive lattices, we need a technical condition on the weight function Þ.
The FKG Inequality yields K leitman’s Inequality for all distributive lattices
by setting = 1 and letting and be the (order-reversing) characteristic func-
tions on the down-sets F and G, where the characteristic function of a set A
is the function A having value 1 on A and value 0 outside A. Nevertheless,
generalizations of K leitman’s Inequality continued to appear long after the FKG
Inequality, because the FKG Inequality appeared in the literature of statistical
mechanics and discrete mathematicians were unaware of it for years.
Later, Ahlswede and Daykin found a generalization of the FKG Inequality
having an easier inductive proof. We give this proof, following the presentation of
Graham [1982]. The theorem is known both as the Ahlswede–Daykin Inequal-
ity and as the Four Function Inequality. A result intermediate between the
FKG Inequality and the Four Function Inequality appeared in Holley [1974].
Proof: We first reduce to the case of 2 n , using that distributive lattices are sub-
lattices of such posets (Theorem 12.4.31). If the claim holds for 2 n , then it holds
for a sublattice L of 2 n as follows. Given , , , defined on L, extend them to
2 n by giving them value 0 on 2 n − L. Whenever (x)(y)
= 0, we have x , y ∈ L.
Since L is a sublattice, L also contains x ∧ y and x ∨ y, and the hypothesis for
2 n follows from its truth for L. Hence the conclusion holds for any X , Y ⊆ 2 n ,
including when X , Y ⊆ L.
The proof for 2 n uses induction on n. For n = 1, we check several cases. The el-
ements of L are 0 and 1 (representing ∅ and [1]). The hypothesis gives (x)(y) ≤
(min{x , y})(max{x , y}) for the four possibilities of x , y ∈ {0 , 1}. The conclusion
is easy when | X | = 1 or | Y | = 1. The case X = Y = {0 , 1} requires a numerical
optimization (Exercise 45).
598 Chapter 12: Partially Ordered Sets
To complete the proof, we need only show (1) every nonnegative monotone
nonincreasing function on L is a linear combination of at most | L| characteris-
tic functions on down-sets, and (2) the FKG Inequality is preserved by taking a
positive linear combination of order-reversing functions 1 and 2 .
(1) follows by induction on the number of nonzero values of , with a trivial
basis. Let be the least nonzero value of , let S = {x ∈ L: (x)
= 0}, and let S
be the characteristic function of S. Now − S is a nonnegative nonincreasing
function on L with fewer nonzero values than .
For (2), let be a positive linear combination of 1 and 2 , which each satisfy
the FKG Inequality with . Term-by-term linearity of real number arithmetic
yields the FKG Inequality for and .
The FKG Inequality was notably applied to prove a conjecture by Rival and
Sands about positive correlation in random linear extensions of a poset Q. Recall
that (A) is the fraction of the linear extensions in which event A occurs. For
example, when Q is an antichain, (x < y) = 12 for any x and y. If Q = 2 + 1, with
x < and y unrelated to both, then (x < y) = (y < ) = 23 and (x < ) = 1.
½ capture the desired events, let them be the characteristic functions of F and G,
where F = {x ∈ [N]n : x1 < x2 } and G = {x ∈ [N]n : x1 < x3}. Roughly,
•
• •
• • • •
• • • • •
• • • •
•
Q J(Q)
Upper bound. Given a ¾-edge-coloring á of E(K nr) that avoids Ptri in color i for
each i, it suffices to define an injection from [n] to Qr . View each vertex subset
Y ⊆ [n] as an increasing list, with Y − = Y − max Y and Y + = Y − min Y .
For 1 ≤ j ≤ r < n, we construct ½ j : ([n]
j
) → Qr− j +1 such that
½ j (Y −)
≥ ½ j (Y +) in Qr− j +1 when Y ∈ ( j[n]
+1 ). (∗)
This suffices, since ½ 1 will then be the desired injection.
We first define ½ r . For X ∈ ([n] r
), let i = á(X), and let w1 , . . . , wt −r be the ith
i
chain in Q. Set ½ r (X) = wh , where h is the largest integer such that some copy of
P hr +r−1 in color i has last edge X . Note that h ≤ t i − r, since á has no copy of Ptr in i
color i. If á(Y −) = á(Y +) for some Y ∈ (r[n] +1 ), then ½ r (Y ) > ½ r (Y ), and otherwise
+ −
½ r(Y ) and ½ r(Y ) are incomparable in Q. In either case, ½ r(Y )
≥ ½ r(Y +).
+ − −
definition of ½ j yields ½ j +1(Y) ∈ ½ j (Y +). If ½ j +1 (Y) also lies in ½ j (Y −), then by the
definition of ½ j (Y −) (using X = Y −), the element ½ j +1(Y) in Qr− j lies below some
element ½ j +1 (Z) such that Z + = Y − . Letting W = Z ∪ Y , we have Z = W − and
Y = W + . Thus ½ j +1 (W −) ≥ ½ j +1 (W +), which contradicts (∗) for ½ j +1 .
We conclude ½ j +1 (Y) ∈ ½ j (Y +) − ½ j (Y −). Hence the down-set ½ j (Y +) in Qr− j
does not contain the down-set ½ j (Y −), which means ½ j (Y −)
≥ ½ j (Y +) in Qr− j +1 .
Z• • • • •
• • • • •Y
Theorem 12.4.45 yields inductive upper and lower bounds for R¾ (Ptr). For
R¾ (P43), note that Q2 = 2 ¾ , so computing | Q3 | for R¾ (P43) is just Dedekind ’s Prob-
lem (see Theorem 12.2.14). For an application, see Exercise 49.
EXERCISES 12.4
12.4.1. (−) Prove that a poset is a ranking if and only if no subposet is isomorphic to 2 + 1.
12.4.2. (−) Prove that a poset is a chain if and only if every subposet is a lattice.
12.4.3. (−) Draw the distributive lattice whose poset of join-irreducible elements is below.
e•
b• c• •d
º• •a
12.4.4. Let P be a poset such that P − x is an interval order. Can relations involving x be
added to P to obtain an interval order P such that P − x = P − x?
12.4.5. Alternative proof of Theorem 12.4.5. Let P be a poset without 2 + 2.
(a) Prove that the “upper holding” sets U(x) for x ∈ P are linearly ordered by inclu-
sion, and similarly for the sets D(y).
(b) For the 0 , 1-matrix of the order relation, prove that ordering the rows as x1 , . . . , x n
in decreasing order of |U(xi)| and the columns as y1 , . . . , yn in decreasing order of | D(yj )|
puts the 1s of the matrix in the positions of a Ferrers diagram.
(c) For x ∈ P , let u(x) count distinct sets of the form U(y) that are proper subsets of
U(x), and let d(x) count distinct sets of the form D(y) that are proper subsets of D(x). Let
h be the total number of distinct nonempty sets of the form U(x). Prove that assigning
each x ∈ P the interval [d(x) , h − u(x)] produces an interval representation of P. (Bogart ,
motivated by Rabinovitch [1977])
12.4.6. (♦) Let In be the poset of nontrivial intervals with integer endpoints in [n], ordered
by [a , b] < [c , d] if b < c. Prove that dim In > ¾ when n is sufficiently large. (Hint: Given
Ramsey’s Theorem, use n ≥ R¾(4; 3).) (Rabinovitch [1973])
12.4.7. (♦) Given the interval order In as in Exercise 12.4.6 and the “double-shift graph”
G n as in Definition 12.3.36, prove dim In ≥ Ò(G n). (Comment: Thus dim In ≥ lg lg n +
( 12 + o(1)) lg lg lg n, by Corollary 12.3.39. With some care, Füredi–P.Hajnal–Rödl–Trotter
[1992] constructed linear extensions to prove that the lower bound is tight.)
12.4.8. Representations of interval orders. Fix ¾ ∈ .
(a) Construct an interval order such that every interval representation uses at least
¾ different lengths of intervals. (Fishburn [1983])
(b) Construct an interval order such that every representation has an interval of
length more than ¾ times the length of its shortest interval. (Fishburn–Graham [1985])
Exercises for Section 12.4 605
12.4.11. (♦) Although interval orders are more general than chains (or semiorders), prove
that the standard example Sn cannot be an intersection of fewer than n interval orders.
12.4.12. (♦) A general binary relation is modeled by a digraph D, with adjacency matrix
A(D). A biorder representation of D consists of real-valued functions º and ½ on V(D)
such that uv ∈ E(D) if and only if º (u) > ½(v). For a digraph D, prove that the following
five conditions are equivalent.
(A) A(D) has no 2-by-2 submatrix that is a permutation matrix.
(B) The successor sets of D are ordered by inclusion.
(C) The predecessor sets of D are ordered by inclusion.
(D) The rows and columns of A(D) can be permuted independently so that every entry
below or to the left of a 1 is a 1.
(E) D has a biorder representation.
(Comment: The equivalences are due to various authors, with a short proof in West [1998].
Such relations are called biorders, Ferrers relations, or Ferrers digraphs (Riguet
[1951], Wiener [1914]). If also º (x) ≤ ½(x) for all x, then D is an interval order.)
12.4.13. (♦) The completion of a graph G with V(G) = [n] is the partition of [n] whose
blocks are the vertex sets of components of G. Let Q(G) denote the subposet of Π n whose
elements are the completions of spanning subgraphs of G. The partition of rank 1 with
block {i , j} lies in Q(G) if and only if i j ∈ E(G), so these posets are distinct for distinct G.
(a) Show that Q(G) need not be a sublattice of Π n .
(b) Prove that Q(G) is a sublattice of Π n isomorphic to 2 n−1 when G is a tree.
(c) Prove that if P is a copy of 2 n−1 in Π n , then P = Q(G) for an n-vertex tree G.
(d) Conclude that Π n contains nn−2 copies of 2 n−1 .
12.4.14. Let J(P) denote the inclusion poset on the down-sets of P. Using the mapping
∼ J(m × n) =
suggested in Example 12.4.12, prove L(m , n) = ∼ L(n , m).
12.4.18. Let Mn be the poset of Exercise 12.4.16. Find an explicit symmetric chain de-
composition for n ≤ 5. (Comment: Lindström conjectured that Mn is always a symmetric
chain order. Stanley [1982] observed that Mn satisfies the strong Sperner property.)
12.4.20. (♦) The Young lattice. Let Y be the poset of all partitions of all integers, ordered
by a ≤ b if and only if ai ≤ bi for all i (trailing zeros appended as needed).
(a) Prove that Y is a lattice.
(b) Prove that every a ∈ Y is covered by one more element than it covers.
(c) Prove that Y is a distributive lattice.
(d) Describe the join-irreducible elements of Y.
12.4.21. (♦) Prove that the dominance order on the partitions of n (written in decreasing
order) is a lattice. Here Þ ≤ ë if ∑i=1 Þi ≤ ∑i=1 ë i for all j . (Hint: Apply Lemma 12.4.18.)
j j
12.4.22. (♦) Obtain a necessary and sufficient condition for ë to cover Þ in the dominance
order on all integer partitions.
12.4.24. The poset Ln(q) is the containment poset on the set of subspaces of an n-
dimensional vector space over a q-element field. Prove that Ln(q) is a graded lattice but in
general is not a distributive lattice.
12.4.25. Let Λ n denote the poset of partitions of the integer n, ordered by refinement.
That is, for partitions ë and Þ of n, we put ë ≤ Þ if the multiset of parts in ë is obtained
by replacing each integer part in Þ with a partition of that part.
(a) Prove that Λ n is a graded poset.
(b) Prove that Λ 7 is not a lattice. (Comment: This holds also for n > 7.)
12.4.26. (♦) Let A and B be maximum antichains in a poset P , and let A and B be the
down-sets generated by A and B. Prove that the maximal elements of A ∪ B form a max-
imum antichain, and similarly for the maximal elements of A ∩ B . Conclude that the
maximum-sized antichains in a poset form a sublattice of the lattice of antichains, ordered
by A ≤ B if and only if for each x ∈ A there exists y ∈ B such that x ≤ y. (Dilworth [1960])
12.4.27. Given the result of Exercise 12.4.26, design a polynomial-time algorithm to con-
struct the maximal element of the lattice of maximum-sized antichains. (Hint: Use the
relation of Dilworth’s Theorem to maximum matching.)
12.4.28. An automorphism of a poset permutes elements but preserves the order rela-
tion. Prove that the automorphism group of Π n is isomorphic to the symmetric group Ën .
12.4.29. Given a connected graph G, let C(G) be the poset of the connected induced sub-
graphs of G, ordered by inclusion. Prove that C(G) is a lattice if and only if every block of
G is a complete graph. (Klavžar–Petkovšek [1988])
Exercises for Section 12.4 607
12.4.43. (♦) Using Theorem 12.4.23 and Theorem 12.4.40, prove that a lattice L is
distributive if and only if | F | | G| ≤ | F ∧ G| | F ∨ G| for all F , G ⊆ L (Definition 12.4.39).
Conclude that Kleitman’s Inequality holds for distributive lattices. (Daykin [1977])
12.4.44. For X , Y ⊆ 2 n , let X − Y = {A − B: A ∈ X , B ∈ Y }. Apply Exercise 12.4.43
to prove | X − X | ≥ | X | for any family X of finite sets. (Comment: Daykin–Lovász [1976]
showed in general that every nontrivial boolean function takes at least m distinct values
when evaluated over m distinct sets.)
12.4.45. Complete the proofs of the FKG and Ahlswede–Daykin Inequalities by proving
the latter for 21 . (Hint: For the case X = Y = {∅ , [1]}, let w = (∅)([1]), x = ([1])(∅),
y = (∅)([1]), and = ([1])(∅). Reduce the problem to inequalities involving w , x , y , .)
12.4.46. Suppose that the outcome of matches between tennis players is determined by an
unknown linear ordering of ability. Suppose that A and B are two teams with two players
each, and that initially we know nothing about the relative abilities of the two players on
a team. However, we do know a2 < b1 . Determine whether the events a1 < b1 and a2 < b2
are positively correlated, assuming that unknown information is random. (Shepp [1980])
12.4.47. Let Q = 2 + 4. Let and y be the top and bottom of the 4-chain, and let w and x
be the top and bottom of the 2-chain. Prove that the events x < y < w and x < < w are
not postively correlated on Q. (C. Mallows)
12.4.48. (♦) For x ∈ Q, let the random variable Hx be the height of x on a random linear
extension of Q, and let h(x) = (Hx). Let y be incomparable to x. Use the XYZ Inequality
to prove h(x|(x > y)) ≥ 1 + h(x|(x < y)). (Winkler [1982])
12.4.49. (+) The track number of a graph G, written (G), is the least t such that G
is the union of t interval graphs. The interval number of G, written i(G), is the least t
such that G is the intersection graph of sets that are unions of t intervals in . Note that
always i(G) ≤ t(G). We show that t(G) is unbounded even when i(G) = 2, as conjectured by
Heldt , Knauer, and Ueckerdt (see Milans–Stolee–West [2015]).
(a) Prove that i(G) ≤ 2 when G is a line graph.
(b) Prove that if n ≥ R¾(P ), then (L(K n)) > , where P is the ordered hypergraph
with vertices 1 , 2 , 3 , 4 , 5 , 6 in order obtained from the monotone path P63 by adding the
two edges {1 , 2 , 5} and {2 , 5 , 6}.
(c) Prove that if n < R¾(P43), then (L(K n)) ≤ + 2.
(d) For the complete 3-uniform hypergraph K63 , Erdős–Rado [1952] proved the bound
O(¾ lg ¾) (4+ o(1))¾ lg ¾
R¾(K63) ≤ 2 2 (improved by Conlon–Fox–Sudakov [2010] to 2 2 ). Use this and the
√
¾ −
bound R¾ (Pt ) ≥ 2 ¾
from Corollary 12.4.46 (where m = t − r + 1) to prove
r m 1 /2
Combinatorial Designs
In this chapter we study highly structured combinatorial arrangements.
Block designs are families of sets (actually, uniform hypergraphs) with special
conditions on pairs of elements. They are useful in constructions for extremal
problems and in designing statistical experiments.
We study general designs and special configurations such as Latin squares,
Hadamard matrices, and projective planes. Tools involve finite fields and differ-
ence sets. The final more technical section leads to a constructive disproof of a
famous conjecture of Euler.
Many texts and monographs treat classical design theory. For example, An-
derson [1997], Cameron–van Lint [1991], Lindner–Rodger [1997, 2009], Stinson
[2004], van Lint–Wilson [1992, 2001], and Wallis [1988, 2007] are patient and ac-
cessible. Beth–Jungnickel–Lenz [1986, 1999] and Colbourn–Dinitz [1996, 2007]
are encyclopedic. Dinitz–Stinson [1992] and Wallis [1996, 2003] provide surveys
on special topics.
13.1. Arrangements
For hundreds of years, mathematicians have been fascinated by questions
about the arrangements of labels that use all labels or all combinations of labels
in equal and symmetric ways. The requirements are quite rigid. For example, so-
lutions to “Sudoku” puzzles are Latin squares satisfying additional constraints.
L ATIN SQUARES
609
610 Chapter 13: Combinatorial Designs
13.1.2. Example. Growing corn. Suppose we wish to test four different types of
corn seeds (A , B , C, D). We want to subdivide our field into plots in order to min-
imize the effect of the geography of the field on the test results. To guard against
the possibility of an east-west or north-south gradient in soil quality, we can di-
vide the field into a four by four grid of subplots and assign seed types to subplots
using a Latin square design.
Given also four types of fertilizer to test ( , , , ), we can use another Latin
square for those. Ideally, we also want to test each fertilizer with each seed type.
We can do this using a Latin square orthogonal to the first square. We can also
test levels of irrigation (1,2,3,4) at the same time; the three Latin squares below
are pairwise orthogonal. There is no larger family of pairwise orthogonal Latin
squares of order 4.
ABCD 1234
DCBA 341 2
BADC 4321
CDAB 2143
When n is not a prime power, this construction still yields some orthogonal
squares (Exercise 6). Next we give a combining theorem for orthogonal families.
(a(1¾,1
) (¾)
, br,s) ··· (a(1¾,m
) (¾)
, br,s)
.. .. ..
C¾ = . . .
(a(m¾),1 , b(r,s
¾)
) ··· (a(m¾),m , b(r,s
¾)
)
13.1.7. Corollary. If n = ∏ pei i with each pi prime, then there exist mini(pei i − 1)
pairwise orthogonal Latin squares of order n.
612 Chapter 13: Combinatorial Designs
13.1.8. Example. Euler’s problem. The problem of finding MOLS(6 , 2) was pub-
lished by Euler in 1779 as the Problem of the 36 Officers. On parade day, there
are 36 officers: six ranks, six regiments, one officer of each rank from each regi-
ment. They desire to march with one officer of each rank in each row and column,
and one officer of each regiment in each row and column. Thus the appearances of
each rank must form a Latin square, as must the appearances of each regiment.
Since there is only one officer of a given rank from a given regiment, these Latin
squares must be orthogonal.
Euler conjectured impossibility. By normalizing the top rows to the labels
123456 in order, Tarry [1900, 1901] reduced the problem to an exhaustive exam-
ination of 9408 pairs, proving Euler right. Stinson [1984] found a much shorter
proof (see Anderson [1997, pp. 130–133]).
13.1.9. Remark. Due to Euler ’s use of Greek and Latin letters for orthogonal
squares, orthogonal pairs are also called Graeco–Latin squares.
Euler conjectured also that there are no orthogonal n-by-n Latin squares
whenever n is an odd multiple of 2, but here he was very wrong. Bose–
Shrikhande–Parker [1960] proved that for n ∈ / {1 , 2 , 6}, orthogonal Latin
squares of order n exist. We will discuss this in Section 13.3.
It is a long way from 2 to n − 1. The next value after 6 that is not a prime
power is 10. A long-running supercomputer search concluded that no complete
family of order 10 exists (see Lam–Thiel–Swiercz [1989]). Even after this long
search, the maximum size of an orthogonal family is not known; in fact, it is not
known whether there are 3 pairwise orthogonal 10-by-10 Latin squares.
We will see that complete families of order n are equivalent to various other
combinatorial configurations, including projective planes of order n, which can be
viewed as a special class of block designs. To indicate more of the scope of design
theory, we next introduce the general object.
BLOCK DESIGNS
In the setting of Example 13.1.2, the treatments form a set V . For complete
testing, we would like to test each treatment on each experimental unit, but this
may be expensive or infeasible. In a more general setting, each unit receives only
a subset of V , called a block. Several conditions are imposed to balance the usage
of treatments and units.
Having each treatment appear in r blocks ensures that treatments are tested
equally often; keeping the blocks the same size ensures that no experimental unit
is overused. Fixing ë helps to control for interaction between treatments. These
conditions were introduced formally by Yates [1936], but special cases of designs
were studied at least as early as 1844, with a seminal paper by K irkman [1847].
Originally, all five parameters were listed in naming a design (how fast can
you say “(v , b , r, ¾ , ë)-design”?). However, two simple counting arguments reduce
the number of independent parameters to three (Proposition 13.1.14). Thus we
simply call the object a (v , ¾ , ë)-design. (Even the hypothesis that all elements
appear in equally many blocks can be dropped; see Exercise 5.)
Historically, the treatments were called varieties, and thus the notation re-
flects the terminology: v counts the varieties, b the blocks, r the “replications”
(usage of each element), ¾ the “kardinality” of the blocks, and ë the “linkage”
(common appearances) of any two elements. Because we can view the blocks as
the edge set of a hypergraph with vertex set V , we usually call V the set of ver-
tices rather than the set of varieties.
13.1.12. Example. Fano plane. The Fano plane is the (7 , 3 , 1)-design with ver-
tex set [7] and blocks {124 , 235 , 346 , 457 ,561 ,672 ,713} (for clarity, we delete
commas within blocks and drop set brackets on blocks). Viewing the elements as
congruence classes modulo 7, the blocks have the form {i , i + 1 , i + 3}. Every pair
{r, s} of congruence classes is one apart, two apart, or three apart. It thus occurs
uniquely in the block generated by i such that {r, s} is {i , i + 1} or {i + 1 , i + 3} or
{i , i + 3}, respectively.
We can represent the Fano plane geometrically by letting the blocks corre-
spond to lines through the points; hence the use of “plane” in the name. As shown
in the famous diagram below, one line must “bend”.
If we delete one of these blocks and delete its points from all other blocks,
then we are left with six blocks consisting of all pairs from a set of four points,
which is an instance of Example 13.1.11.
1 B
• ⎛1 0 0 0 1 0 1⎞
⎜1
⎜ 1 0 0 0 1 0⎟
⎟
⎜0
⎜ 1 1 0 0 0 1⎟
⎟
6 2
• 3 • V⎜
⎜1 0 1 1 0 0 0⎟
⎟
• ⎜0
⎜ 1 0 1 1 0 0⎟
⎟
⎜ ⎟
⎜0 0 1 0 1 1 0⎟
• • • ⎝0 0 0 1 0 1 1⎠
5 7 4
13.1.13. Example. 9-point triple system. From nine points in a square array, we
form four sets of three triples. We use the rows, the columns, the rightward diag-
onals, and the leftward diagonals. Two points in the same row or column clearly
614 Chapter 13: Combinatorial Designs
appear together in exactly one block. If they are not in the same row or column,
then there is exactly one way to reach one from the other along a diagonal. Hence
the 12 triples form a (9 , 3 , 1)-design.
123 147 159 168
456 258 267 249
789 369 348 357
• • •
• • •
• • •
SYMMETRIC DESIGNS
13.1.17. Example. With 7 blocks and 7 elements, the Fano plane (Example
13.1.12) is a symmetric design. In the Fano plane, we compare two blocks A =
{i , i + 1 , i + 3} and B = { j , j + 1 , j + 3} by subtracting each element of A from
each element of B. The difference j − i appears three times, and the other differ-
ences are the six other values from j − i − 3 through j − i + 3. This means that
when j
= i the difference 0 appears exactly once, and the two blocks have exactly
one common element.
The statement that every two blocks have ë common elements is just A T A =
(¾ − ë)I + ë J. This statement is nontrivial, whereas the statement A A T =
(¾ − ë)I + ë J from Proposition 13.1.14c is essentially by definition. We conclude
that for a symmetric design, A and A T commute.
13.1.22. Lemma. The matrix below satisfies HH T = (b12 + b22 + b33 + b42)I4 .
⎛ b1 b2 b3 b4 ⎞
⎜ −b b1 −b4 b3 ⎟
H=⎜ 2 ⎟
⎜ −b3 b4 b1 −b2 ⎟
⎝ −b4 −b3 b2 b1 ⎠
We will modify this equation to obtain the desired equation satisfied by inte-
gers x , y , . First, Lagrange ’s Theorem expresses n as the sum of four squares:
n = b12 + b22 + b32 + b42 . Let (y1 , y2 , y3 , y4)T = H T (x1 , x 2 , x3 , x4)T , where H is the
matrix of Lemma 13.1.22 defined on b1 , b2 , b3 , b4 . Since HH T = nI4 , we have
∑i=1 yi2 = n ∑i=1 x2i . We call such a replacement H-substitution.
4 4
v+1
∑i=1 yi2 + w2 in terms of the free variables y1 , . . . , yv+1 . Iterative restriction
and cancellation reduces this to nx 2v+1 = yv2+1 + w2 in v steps. Now the clearing
of fractions yields an integer solution of ( − )x2 = 2 + y 2 , as desired.
13.1.24. Example. Except for (16 , 6 , 2) and (43 , 7 , 1), the unresolved triples from
Example 13.1.20 have the form (4m − 1 , 2m , m) or (4m − 1 , 2m − 1 , m − 1), where
m is an integer greater than 1. Both types are allowed by Theorem 13.1.23.
618 Chapter 13: Combinatorial Designs
HADAMARD MATRICES
Designs with = 1 are studied the most. We pause to discuss special ma-
trices that yield symmetric designs with larger . Hadamard [1893] asked for
the largest magnitude of the determinant of an n-by-n matrix with entries ±1.
The bound of nn/2 is attained only by matrices of the following type (Exercise 13).
(Actually, these matrices were first studied by Sylvester [1867].)
With entries ±1, the dot product of any row with itself is n. The rows
(or the columns, equivalently) must be pairwise orthogonal. We will obtain a
(4m − 1 , 2m − 1 , m − 1)-design from a Hadamard matrix of order 4m. First we
construct arbitrarily large Hadamard matrices.
∑ ai , j ai , j (b¾ · b¾ ) = ¾ ,¾ n ∑ ai , j ai , j = ¾ ,¾ i ,i mn.
j j
13.1.27. Example. Note that (1) is a 1-by-1 Hadamard matrix. Because (11 −11 ) is
a Hadamard matrix, products yield Hadamard matrices for all powers of 2 (ob-
served by Sylvester [1867]). Below is the resulting matrix of order 4.
⎛1 1 1 1⎞
⎜1
⎜
−1 1 −1 ⎟
⎟
⎜1 1 −1 −1 ⎟
⎝1 −1 −1 1⎠
Section 13.1: Arrangements 619
is odd, the numbers n2/2 and n/2 are not integers, which allows us to strengthen
the lower bound on p. We leave to Exercise 19 the completion of the proof that
also when n = 4t − 3, a monochromatic K 2 ,t occurs. Thus b(2 , t) ≤ 4t − 3.
Beineke–Schwenk [1976] proved that b(2 , t) = 4t − 3 when t ∈ {2 , 4} and
when there is a Hadamard matrix H of order 2t − 2 (this requires t odd). To prove
b(2 , t) > 4t − 4, we construct from H a matrix of order 4t − 4 with no constant
2-by-t submatrix. Obtain H from H by converting each −1 to 0, and let M =
H H
( H H ). Since any two rows of H have (t − 1)/2 common columns with 1s and
(t − 1)/2 common columns with 0s, any two rows of M have constant 2-by-(t − 1)
submatrices in both 0 and 1, but there is no constant 2-by-t submatrix.
Thus far we have constructed Hadamard matrices only of orders that are
powers of 2; others are more difficult. As observed in Example 13.1.24, Theorem
13.1.23 does not prohibit (4m − 1 , 2m − 1 , m − 1)-designs for any m. It is conjec-
tured that there is a Hadamard matrix of each order that is a multiple of 4. We
will show how to construct Hadamard matrices of order n = 2¾ (q + 1), where q is
an odd prime power and n is a multiple of 4, and then Proposition 13.1.26 yields
matrices of many other orders.
13.1.34.* Example. The Paley construction. Below are Hadamard matrices of or-
der 12 from the construction in Theorem 13.1.37 with q = 11 and q = 5.
+ + + + + + + + + + + + + + + + + + − + + + + +
− + + − + + + − − − + − + + + − − + + − + − − +
− − + + − + + + − − − + + + + + − − + + − + − −
− + − + + − + + + − − − + − + + + − + − + − + −
− − + − + + − + + + − − + − − + + + + − − + − +
− − − + − + + − + + + − + + − − + + + + − − + −
− − − − + − + + − + + + − + + + + + − − − − − −
− + − − − + − + + − + + + − + − − + − − − + + −
− + + − − − + − + + − + + + − + − − − − − − + +
− + + + − − − + − + + − + − + − + − − + − − − +
− − + + + − − − + − + + + − − + − + − + + − − −
− + − + + + − − − + − + + + − − + − − − + + − −
EXERCISES 13.1
13.1.1. (−) Explain how to construct a pair of orthogonal Latin squares of order 15. Include
all needed steps, but do not write out the final pair of squares.
13.1.2. (−) Show that there is a (v , ¾ , ë)-design with b blocks and each element appearing
in r blocks if and only if there is a (v , v − ¾ , b + ë − 2r)-design.
13.1.3. (−) Prove that if a (4m − 1 , 2m − 1 , m − 1)-design exists, then there is a Hadamard
matrix of order 4m.
13.1.4. Use Proposition 13.1.26 and Paley’s Theorem (Theorem 13.1.37) to show that
Hadamard matrices exist of all orders through n = 128 that are multiples of 4, except
possibly for 92 and 116.
Exercises for Section 13.1 623
⎛ a b c d⎞
⎜b d a c⎟
⎜ c a d b⎟
⎝d c b a⎠
13.1.8. (♦) Let M be a Latin square that can be written as ( YX YX ) with X and Y being Latin
squares of odd order. Prove that M has no transversal. Use this to prove that there is no
Latin square orthogonal to M. (Comment: Maillet [1894] proved that the Cayley table of
a group of even order cannot have a transversal.) (Mann [1950])
13.1.9. Determine all n such that there is a Latin square of order n where each row is a
rotation of the first and the main diagonal consists of 1 , . . . , n in order. (Dályay [2012])
13.1.10. (♦) For n ≥ 3, prove that if MOLS(n , n − 2) exists, then a complete family
MOLS(n , n − 1) exists. (Comment: Shrikhande [1961] proved that MOLS(n , n − 3) suf-
fices. Bruck proved that if n > p(n − ¾), where p(x) = 12 x4 + x3 + x2 + 32 x, then a family
MOLS(n , ¾ − 2) can be completed to MOLS(n , n − 1); see Denes–Keedwell [1974, sec. 9.3].)
13.1.11. Prove that if MOLS(n , ¾) exists, then there exist ¾ − 1 pairwise orthogonal Latin
squares whose diagonals all consist of the elements 1 through n in order.
13.1.12. Let S be a ¾-set of elements in a symmetric (v , ¾ , ë)-design. Prove that if S in-
tersects each block at least ë times, then S is a block in the design. (Hint: Consider the
counting argument in Theorem 13.1.18.) (Lander [1981])
13.1.13. Let A be a matrix of order n whose entries are real and have absolute value at
most 1. Prove that |det A| ≤ nn/2 , with equality only when A is a Hadamard matrix.
13.1.14. (+) For distinct integers i , j ∈ [4], let P(i , j , ¾ , l) = {s ∈ 4n : si = ¾ and sj = l}.
That is, P(i , j , ¾ , l) is a plane specified by giving coordinates i and j fixed values ¾ and l.
Prove that there is a function á: 4n → 2n that maps each such plane bijectively onto 2n if
and only if there are two orthogonal Latin squares of order n. (Stong [2007])
13.1.15. Use the Fano plane to prove that K7 ,7 is not 3-choosable.
13.1.16. (♦) Prove that there is a Hadamard matrix of order 4m if and only if there is a
(4m − 1 , 2m , m)-design.
624 Chapter 13: Combinatorial Designs
13.2.2. Example. Small projective planes. We will see that the Fano plane of
Example 13.1.12 is the smallest projective plane. With 13 points (0 to 9 plus
{A ,B,C}), the following 13 lines form a projective plane: 0139, 124A , 235B, 346C,
4570, 5681, 6792, 78A3, 89B4, 9AC5, AB06, BC17, C028.
The postulates in Definition 13.2.1 are quite strong. We will see that the
incidence matrix of a projective plane is that of a symmetric design with special
parameters and yields a complete family of orthogonal Latin squares.
Section 13.2: Projective Planes 625
We begin with point /line duality. Since (P1) and (P2) are dual as stated, we
need only show that the dual of (P3) is implied. The duality corresponds to trans-
posing the incidence matrix.
13.2.3. Proposition. In a finite projective plane, there are four distinct lines of
which no three contain a common point. Hence any statement about projec-
tive planes remains true when the roles of points and lines are interchanged
(simply transpose the incidence matrix).
Proof: Let a , b , c , d be four points with no three on a line (guaranteed by (P3)).
Let A , B , C, D be the lines guaranteed by (P1) to contain {a , b}, {b , c}, {c , d},
{d , a}, respectively. By the condition on a , b , c , d, these lines are distinct. If they
do not satisfy the claim, then by cyclic symmetry we may assume that A , B , C
have a common point x. The condition on a , b , c , d implies that x ∈ / {a , b , c , d},
but now A , B have two common points b , x and B , C have two common points c , x,
contradicting (P2).
a A b
D B
d C c
We next prove that the incidence relation of a projective plane has the defin-
ing properties of a design, with the points and lines as the elements and blocks
of a design. The number of points becomes the number of varieties v, the size of
each line becomes the block size ¾ , and ë = 1.
13.2.4. Theorem. In a finite projective plane, every point lies in the same num-
ber of lines, and every line has the same number of points.
Proof: By duality, it suffices to prove the latter, which we do by establishing an
injection from one arbitrary line A to another line B. This yields | B| ≥ | A| , and
interchanging them in the argument yields | A| ≥ | B| .
To define the map, we use a point not on A or B; we first obtain such a point.
(P3) provides four points a , b , c , d with no three on a line. If one of these is not
in A ∪ B, then it can be x. Otherwise, A and B each contain exactly two of them,
say a , b ∈ A and c , d ∈ B. Now (P1) provides a line containing {a , c} and another
line containing {b , d}, and (P2) guarantees that they have a common point x. If
x is in A or B, then we have two points on two distinct lines, violating (P1).
We map each p ∈ A to a point º (p) ∈ B using the unique line L(p) containing
p and x. Let º (p) be the point where L(p) meets B. If p
= q, then L(p)
= L(q),
else A and L(p) meet twice. This further implies º (p)
= º (q), else x and º (p) lie
on both L(p) and L(q). Hence | B| ≥ | A| , and by symmetry also | A| ≥ | B| .
b p
a B q B
x
d A º (p) A
c º (q)
x
626 Chapter 13: Combinatorial Designs
13.2.6. Definition. The order of a projective plane is one less than the number
of points in each line (or lines through each point).
(P1) and (P2) both hold. When q = 1, there are no four points to satisfy property
(P3) and hence no projective plane. It suffices to show that if q ≥ 2, then every
(q2 + q + 1 , q + 1 , 1)-design has four points with no three on a line.
Begin with one line L1 and distinct points a , b ∈ L1 . With q2 + q + 1 > q +
1, we can choose c outside L1 . Now there are unique lines L2 and L3 containing
{c , a} and {c , b}, respectively. Since any two lines have exactly one common point,
| L1 ∪ L2 ∪ L3 | = 3(q + 1) − 3 = 3q. Since q ≥ 2, we have 3q < q2 + q + 1. Hence a
point d remains outside L1 ∪ L2 ∪ L3 , and now {a , b , c , d} is the desired 4-set.
13.2.8. Example. Theorem 13.2.7 implies that (P1) and (P2) suffice when lines
have more than two elements, and (P3) becomes unnecessary.
No projective plane has order 1. Every projective plane of order 2 is isomor-
phic (by renaming points) to the Fano plane (Exercise 1). A projective plane of
order 3 (Example 13.2.2) has 13 points.
Theorem 13.2.7 states that a projective plane is just a symmetric design with
special parameters. We can thus use the Bruck–Chowla–Ryser Theorem (Theo-
rem 13.1.23) to prohibit some values of q as orders of projective planes.
mined by i , j and w¾ . This is well-defined, since two points determine one line.
•y
wq−1
•
•
L
Xq •w1
x
i , j •
X1
Y1 Yq
Since i , j and i , j both lie on X i , which avoids w¾ , they cannot both lie on
a line with w¾ . Thus the entries in row i of A(¾) are distinct. Similarly, column
entries are distinct, so each A(¾) is a Latin square.
For orthogonality, let ( , ) = (Ai¾, j , Ai , j ). We have i , j on W¾ , and Wl , .
( ) (l)
Since the two lines W , and Wl , have only one common point, the only position
that can yield the pair ( , ) in A and A l is (i , j).
628 Chapter 13: Combinatorial Designs
The converse reverses the construction. Begin with squares A(1) , . . . , A(q−1) .
Introduce one point w¾ for each square A¾ . Introduce q2 points { i , j }iq, j =1 . Finally,
(¾)
add two points x and y. The line W¾ ,l consists of w¾ and all i , j such that Ai , j = l.
The line X i consists of x and all i , j (first index fixed). The line Yj consists of y and
all i , j (second index fixed). Finally, the line L consists of x, y, and w1 , . . . , wq−1 .
We have defined q2 + q + 1 points and q2 + q + 1 lines, each consisting of q + 1
points. For q ≥ 2, points 1 ,1 , 1 ,2 , 2 ,1 , 2 ,2 have no three on a line. It suffices to
verify that every two points lie in one common line and every two lines have one
common point. We leave this to Exercise 4.
Finite fields of order q exist only when q is a power of a prime, yielding pro-
jective planes of such orders. Theorem 13.2.9 forbids projective planes of many
non-prime-power orders, but not orders such as 10. In light of Theorem 13.2.10,
the computer search mentioned in Remark 13.1.9 also prohibits projective planes
of order 10. It remains possible that a complete family of Latin squares (or a
projective plane) does not require a finite field of order q. No projective plane of
non-prime-power order is known, and none is believed to exist. For q ∈ , below
we summarize the relationship of ∃ MOLS(q , q − 1) to the other two properties.
q is a prime power ⇒ ∃ MOLS(q , q − 1) ⇔ ∃ proj . plane of order q
13.2.11.* Example. Affine planes. In the picture for Theorem 13.2.10, deleting L
and its points leaves q2 points and leaves q2 + q lines, each of size q. Any two points
that remain lie on exactly one line that remains, but some lines that remain are
now “parallel”; they met in a point now deleted. The result is a (q2 , q , 1)-design
(not symmetric) whose lines group into q “parallel classes”, each of which parti-
tions the set of points. Such a design is an affine plane (see Example 13.3.23).
The (9 , 3 , 1)-design in Example 13.1.13 is the affine plane that results from
deleting a line from the projective plane of order 3. What is the affine plane ob-
tained by deleting a line from the Fano plane?
• 100:200
012:021
001 010 •
• • 211:122
110 101 • • 011:022
• •
•
111 110:220 • • 121:212
•
• 011 001:002 • 111:222
• • 201:102
120:210
•
100 • •
112:221 101:202 •
010:020
630 Chapter 13: Combinatorial Designs
The polarity graph also solves the Turán problem for 4-cycles. In Section 10.1
we defined ex (n; H) to be the maximum number of edges in an n-vertex graph not
containing H and computed ex (n; K r). The problem of computing ex (n; C4) was
raised by Erdős in 1938. Perhaps surprisingly, 4-cycles are forced much earlier
than triangles; a simple counting argument shows that ex (n; C4) ∈ O(n3/2).
√
13.2.16. Proposition. If m > 14 n(1 + 4n − 3), then every simple n-vertex graph
G with m edges contains C4 . When n = q2 + q + 1, the polarity graph has
nearly this many edges.
Proof: Let x count the pairs of incident edges in G. If G has no 4-cycles, then no
two vertices have more than one common neighbor, so ∑ (d2i ) = x ≤ (n2). Using the
average degree and the convexity of (u2) in terms of u, we have ∑ (d2i ) ≥ n(2m/n
2 ).
Combining these inequalities √ yields m(2m/n − 1) ≤ n(n − 1)/2. The quadratic
formula yields m ≤ 14 n(1 + 4n − 3).
When n = q2 + q + 1, the upper bound reduces to 12 n(q + 1). Since the polarity
graph has q2 vertices of degree q + 1 and q + 1 vertices of degree q, its√number
of edges is just (q + 1)/2 less than the bound. The difference is about 12 n out of
approximately 12 n3/2 edges.
a largest graph not containing C4 . When q is an even prime power, Füredi [1983]
proved that only polarity graphs achieve the extreme; the condition for equality
is the existence of a polarity with q + 1 fixed points on the projective plane of order
q. This holds also for odd prime powers, but that case is more difficult; Füredi has
not published the proof. The case n = q2 + q for even prime powers is discussed in
Firke–Kosek–Nash–Williford [2013].
The incidence graph of a projective plane provides extremal constructions for
an analogous bipartite problem. In the context of reduced adjacency matrices,
extremal problems for complete bipartite subgraphs of K n ,n are natural.
Zarankiewicz asked for the first few values of (n; 3). Bounds on apply to
other incidence relations. For example, in a set of n points and m circles in the
plane (with no three points collinear and no four cocircular), the maximum num-
ber of incidences between points and circles is bounded by (m , n; 3 , 2), since any
three points determine a unique circle.
The incidence-counting idea in Proposition 13.2.16 also provides an upper
bound for (m , n; s , t). First we observe the connection between (n , n; s , t) and
the corresponding extremal problem for subgraphs of K n .
The better bound arises by naming the parameters so that t ≤ s. Znám [1965]
improved the leading coefficient when s = t, obtaining
(n; t) < (t − 1)1/t n2−1/t + (t − 1)n/2
(see Bollobás [1978, p. 311]). Guy [1968] collected and enhanced early results
on the problem. Roman [1975] extended the counting arguments for the upper
bound on (m , n; s , t) to a family of bounds, using a parameter , each bound op-
timal for infinitely many pairs (m , n). In particular, for any at least t − 1 he
proved (m , n; s , t) ≤ (s − 1)(nt)/ (t−¾1 ) + ( + 1)(t − 1)m/t.
Füredi further improved the leading coefficient for ex (n; K s ,t). This yields
asymptotic optimality of the construction for s = t = 3 we will describe.
t ) ≤
Equality in the counting bound ∑ x∈ X (d(x) (s − 1)(nt) requires each t-set
in Y to have exactly s − 1 common neighbors in X and all vertices in X to have
the same degree d. When t = 2, these are the conditions for the neighborhoods
of vertices in X to form an (n , d , s − 1)-design on Y . Brown [1966] used finite
geometries to show that the counting bound is asymptotically optimal for (n; 3),
but the method does not handle t > 3. The upper bound on ex (n; C4) below was
proved earlier by Reiman [1958].
√
n3/2 − n4/3 ≤ (n; 2) ≤ 12 n(1 + 4n − 3) ,
√
1 (n3/2
2 − n4/3) ≤ ex (n; C4) ≤ 14 n(1 + 4n − 3) .
Proof: The incidence graph and polarity graph of the projective plane yield the
lower bounds in terms of q. The second statement uses the number-theoretic re-
sult that if m is sufficiently large, then there is a prime between m − 101
m2/3 and
√
m. Applying this to m = 12 ( 4n − 3 − 1) and restricting the projective plane con-
struction for this prime to a subset of its vertices yields the bound.
The idea is that the points at distance 1 from a given point form a sphere. A
copy of K 3 ,3 would correspond to three spheres having three common points. In
such a three-dimensional space, it is not possible for three spheres to have three
common points (visualize this in 3).
For each solution to ∑i=1 a2i = 1, one can solve x i − yi = ai in q ways. Since
3
there are n = q3 vertices, it thus suffices to show that there are about 12 q2 solu-
tions in the field to ∑i=1 a12 = 1.
3
The gap between the bounds on (n; t) is large when t > 3. The current best
general lower bound arises from a simple non-constructive counting argument. A
similar argument gives a lower bound for ex (n; K t ,t).
s −1
13.2.24. Theorem. If = st−1 and = stt−−11 , then
(m , n; s , t) ≥ ⌊(1 − 1
s!t!
)m1− n1− ⌋ .
Proof: Let = ⌊ m1− n1− ⌋ . We count the copies of K s ,t over all subgraphs of K m ,n
−1
with edges; let the total be T . Some such graph then has at most T (mn ) copies
of K s ,t . Deleting one edge from each copy of K s ,t in this graph yields a K s ,t -free
−1
graph with at least − T (mn ) edges.
By summing the number of graphs containing each possible copy of K s ,t , we
− st mn(mn−1)···(mn− st+1) mn− st
obtain T = (ms)(nt)(mn − st ). Since ( ) =
mn
(−1)···(−t+1) ( − st ), the average
m n
is bounded by ( s )( t )( mn) , which in turn is bounded by s!t!
st 1
ms− st nt− st . Hence
(m , n; s , t) ≥ e − s!t! m1− n1− .
1
DIFFERENCE SETS
Some projective planes and some more general symmetric designs have the
simple structure that the blocks are cyclic translates of a single block. A familiar
example is the usual description of the Fano plane, in which the blocks are cyclic
translates of {0 , 1 , 3} modulo 7.
Here we describe a way of obtaining such a description. It is known that not
all symmetric (v , ¾ , ë)-designs arise in this way. In fact, not all projective planes
of order 16 can be expressed cyclically.
Since there are ¾(¾ − 1) ordered pairs of elements in a ¾-set, the definition
requires ë(v − 1) = ¾(¾ − 1), which is a familiar necessary condition for symmetric
designs (Proposition 13.1.14).
We will show that every prime p that exceeds and divides − but not v
is a multiplier of every (v , , )-difference set. This statement is the Multiplier
Theorem. Knowing that a number p is a multiplier helps to find a difference set
or forbid its existence, because some difference set must consist of complete orbits
modulo v under multiplication by p.
As shown by the last part of Example 13.2.33, not every union of orbits with
the desired size is a difference set (see also Exercise 16).
The remainder of this section is the proof of the Multiplier Theorem and can
be skipped without loss of continuity. We note only that although the proof ap-
636 Chapter 13: Combinatorial Designs
plies only when the specified prime p satisfies p > ë, it is conjectured that this
restriction is unnecessary for the conclusion.
We begin by defining a polynomial from a difference set, using the elements
¾
as exponents of monomials. Throughout this discussion, we let R(x) = ∑i=1 x d i
v−1
and Q(x) = ∑i=0 x i ; note that Q records all the congruence classes as exponents.
¾
13.2.34. Lemma. Given D = {d1 , . . . , d¾ }, let R(x) = ∑i=1 x di , and let Q(x) =
v−1
∑i=0 x i . If D is a (v , ¾ , ë)-difference set, then
R(x)R(x−1) ≡ ¾ − ë + ë Q(x) (mod (xv − 1)).
v−1
13.2.35. Lemma. Let Q(x) = ∑i=0 x i . If º is a polynomial, then
º (x)Q(x) ≡ º (1)Q(x) (mod (xv − 1)).
r r
º (x)Q(x) = ∑ ci x i Q(x) ≡ ∑ ci Q(x) ≡ º (1)Q(x) (mod (xv − 1)).
i=0 i=0
R(x p)Q(x) ≡ R(1)Q(x). Subtracting R(1)ë Q(x) from both sides of (∗) now yields
nR(x p) ≡ nx s R(x). This is just the statement that the congruence classes in pD
are the same as the congruence classes in D + s.
We will obtain another expression for this product to study R(x p)R(x−1).
Let m = n/p. Since Q(x) divides xv − 1, we can write R(x)R(x−1) ≡ n + ë Q(x)
as R(x)R(x−1) = pm + Q(x)A(x) for some polynomial A. Multiplying by [R(x)] p−1
yields [R(x)] p R(x−1) = pB(x) + Q(x)C(x) for some polynomials B and C.
Since p is prime, p is a factor of all multinomial coefficients in the expan-
sion of [R(x)] p except when we take the same monomial from each factor. Thus
[R(x)] p = R(x p) + pE(x) for some polynomial E. We now have
R(x p)R(x−1) = p[B(x) − E(x)R(x−1)] + Q(x)C(x).
We reduce this modulo xv − 1. Since x− j ≡ xv− j , we have B(x) − E(x)R(x−1) ≡ F(x)
for some polynomial F . Applying Lemma 13.2.35 to C(x) yields
R(x p)R(x−1) ≡ pF(x) + Q(x)C(1). (2)
When setting x = 1, adding a multiple of x − 1 changes nothing, and congru-
v
ence becomes equality. Since R(x) has | D| terms with coefficient 1, setting x = 1
in (2) thus yields ¾ 2 = pF(1) + vC(1). Since ë(v − 1) = ¾(¾ − 1), we have ¾ 2 = n + ë v.
Since p divides n, we conclude that vC(1) − ë v is divisible by p. Since v and p are
relatively prime, p divides C(1) − ë.
Thus we can set C(1) = ë + pt in (2) for some integer t. Now
R(x p)R(x−1) ≡ pF(x) + ptQ(x) + ë Q(x) ≡ pG(x) + ë Q(x)
for some polynomial G. Setting x = 1 yields ¾ 2 = pG(1) + ë v, and thus pG(1) = n.
Since Q(x−1) ≡ Q(x), evaluating at x−1 yields R(x− p)R(x) ≡ pG(x−1) + ë Q(x). We
have now obtained our second expression for the four-way product:
R(x p)R(x−1)R(x− p)R(x) ≡ (pG(x) + ë Q(x))(pG(x−1) + ë Q(x)). (3)
Since pG(x) and pG(x−1) are both congruent to polynomials in x, Lemma
13.2.35 yields pG(x)Q(x) ≡ pG(1)Q(x) = nQ(x), and similarly pG(x−1)Q(x) ≡
nQ(x). Combining (1) with (3) now yields
p2 G(x)G(x−1) + 2 ë nQ(x) + ë2 Q2(x) ≡ n2 + 2 ë nQ(x) + ë2 Q2(x),
which simplifies to
p2 G(x)G(x−1) ≡ n2 . (4)
Recall that R(x p)R(x−1) ≡ pG(x) + ë Q(x). Our aim, allowing us to apply
Lemma 13.2.36, is to show that G(x) = ax s for some constants a and s with s ≥ 0.
Since pG(1) = n, this will yield a = m and complete the proof.
In the product R(x p)R(x−1), all coefficients are nonnegative. The coefficients
do not become negative when we reduce exponents to at most v − 1 by applying
xv ≡ 1. Do this with both R(x p)R(x−1) and G(x), obtaining R (x) = pG (x) + ë Q(x)
(note that Q(x) does not change). Since each coefficient in ë Q(x) is ë and R (x) ≡
pG (x) + ë Q(x), each coefficient in R (x) is congruent to ë modulo p. Since p > ë
and each coefficient is nonnegative, each coefficient is at least ë. Therefore, the
polynomial pG(x) congruent to R(x p)R(x−1) − ë Q(x) has nonnegative coefficients.
Since G(x) has nonnegative coefficients, the expression p2 G(x)G(x−1) will
have a nonconstant term if G(x) has more than one nonzero term. This would
contradict (4). Also (4) implies that G is nonzero. Thus we have shown that G has
one monomial term, as desired.
638 Chapter 13: Combinatorial Designs
The Multiplier Theorem was proved by Hall [1947] for cyclic difference sets
yielding projective planes. Hall–Ryser [1951] extended it for ë > 1. Extensions
appear in McFarland–Mann [1965], Baumert [1971], and Lander [1983].
EXERCISES 13.2
13.2.1. (−) Prove that every projective plane with seven points is isomorphic to the Fano
plane, in the sense that renaming elements and permuting lines can turn it into the Fano
plane as described in Example 13.1.12.
13.2.2. (−) Prove that the Heawood graph (shown below) is the incidence bigraph of the
Fano plane.
• •
• •
• •
• •
• •
• •
• •
13.2.3. (−) Check that {1 , 2 , 5 , 15 , 17} is a (21 , 5 , 1)-difference set and find a translate
that is fixed by every multiplier.
13.2.4. Complete the proof that the construction in Theorem 13.2.10 of points and lines
from a complete orthogonal family produces a projective plane.
13.2.5. A hypergraph is ¾-colorable if its vertices can be partitioned into ¾ sets contain-
ing no edge. Prove that a hypergraph whose edges form the set of lines of a projective plane
of order q is 2-colorable if and only if q > 2.
13.2.6. The transversal number of a hypergraph is the minimum size of a set of vertices
that intersects every edge. Let q be a prime power. Let H be the hypergraph with q2 + q + 1
vertices whose edges are the lines of a projective plane of order q on the vertex set. Let H
be the hypergraph with the same vertex set whose edges are the complements of the edges
in H . Determine the transversal numbers of H and H .
13.2.7. Let q be a prime power congruent to 0 or 1 modulo 4. Prove that a2 + b2 + c2 = 0
has exactly q2 solutions with a , b , c ∈ q , and conclude that there are exactly q + 1 multi-
plicative classes of nonzero solutions. (Hint: When q ≡ 1 (mod 4), show that there exists
j ∈ q with j 2 = −1. Use j to reduce the problem to finding solutions of uv = −c2 .)
13.2.8. Let q be a prime power with q ≡ 3 (mod 4). Let S0 and S1 be the set of nonzero
squares and the set of non-squares in q . Note that −1 ∈ S1 , and hence x ∈ S0 if and only
if − x ∈ S1 for x
= 0. For i , j ∈ {0 , 1}, let Ti , j = {x ∈ Si : x + 1 ∈ Sj } and ti , j = | Ti , j |.
(a) Prove that t0 ,0 = t1 ,0 = t1 ,1 = (q − 3)/4 and x0 ,1 = (q + 1)/4. (Hint: Prove t1 ,0 = t1 ,1
by showing that the map taking x to 1/x is a bijection from T1 ,0 to T1 ,1 .)
(b) For each multiplicative class of nonzero triples solving a2 + b2 + c2 = 0, take the
representative whose
√ first nonzero coordinate is 1. Prove that each such triple has the
√
form (1 , ± x , ± − x − 1) for some x ∈ T0 ,1 . Use this to conclude that there are exactly
q + 1 multiplicative classes of nonzero solutions. (Comment: This approach also yields
q + 1 classes when q ≡ 1 (mod 4), where the values of ti , j are different.)
Exercises for Section 13.2 639
13.2.9. (♦) A dominating set in a graph is a vertex subset S such that every vertex
outside S has a neighbor in S. Determine the minimum size of a dominating set in the in-
cidence bigraph of a projective plane of order q. (Comment: A total dominating set in
G is a set that contains a neighbor of every vertex; it is a transversal in the hypergraph
whose edges are the neighborhoods in G; see Henning–Yeo [2013b].)
13.2.10. Zarankiewicz problem for forbidden K 2 ,t . Let G be an n-vertex graph.
(a) Prove that if G is simple and ∑v∈V(G) (d(v)
2 )
> (t − 1)(2n) , then G contains K 2 ,t .
(b) Prove that ∑v∈V(G) ( d(v)
2
) ≥ m(2m/n − 1), where G has m edges.
(c) Use (a) and (b) to prove K 2 ,t ⊆ G when m > 12 (t − 1)1/2 n3/2 + n/4.
(d) Application: Given n distinct points in the plane, prove that the distance is exactly
1 for at most √1 n3/2 + n/4 pairs. (Bondy–Murty [1976, pp. 111–112])
2
13.2.11. (♦) Prove that every ¾-regular graph with girth 6 has at least 2 ¾ 2 − 2 ¾ + 2 ver-
tices. For ¾ ≥ 3, prove that some ¾-regular graph of girth 6 has 2 ¾ 2 − 2 ¾ + 2 vertices if and
only if there is a projective plane of order ¾ − 1. (Karteszi [1960], Singleton [1966])
13.2.12. Use Theorem 13.1.23 to prove that there is no symmetric (29 , 8 , 2)-design. Other
triples (v , ¾ , ) excluded by such arguments are (43 ,7 ,1), (22 ,7 ,2), (46 ,10 ,2), (67 ,12 ,2),
(92 ,14 ,2), (106 ,15 ,2), (137 ,17 ,2), (53 ,13 ,3), (103 ,18 ,3), (34 ,12 ,4), (43 ,15 ,5), (72 ,20 ,5).
13.2.13. (♦) The degeneracy (G) of a graph G is defined by (G) = max √ H⊆ G (H).
¾
(a) Let {G1 , . . . , G ¾ } be a decomposition of K n . Prove ∑i=1 (G i) ≤ n. (Hint: Each
G i has a subgraph with minimum degree (G i).)
(b) Prove that part (a) is almost sharp, as follows: When q is a power of a prime, =
q2 + q + 1, and n =√m for some integer m, construct a decomposition {G1 , . . . , G ¾ } such
¾
that ∑i=1 (G i) ≥ ( − 1)n. (Füredi–Kostochka–Škrekovski–Stiebitz–West [2005])
13.2.14. Prove that the construction in Example 13.2.22 produces a (q2 − 1)/s-vertex graph
not containing K 2 ,s+1 , with all vertices having degree q or q − 1. (Füredi [1996c])
13.2.15. A (v , , )-difference family in v is a family of -subsets of v whose differ-
ences cover each nonzero element of v exactly times. Proposition 13.2.29 generalizes
immediately to show that the translates modulo v of the sets in a (v , , )-difference fam-
ily form a (v , , )-design. Show that the translates modulo 41 of {0 , 1 , 4 , 11 , 29} and
{0 , 5 , 14 , 20 , 22} form a (41 , 5 , 1)-design. (Hanani [1975])
13.2.16. (♦) Applications of the Multiplier Theorem.
(a) Use the Multiplier Theorem to obtain a difference set that generates a projective
plane of order 4.
(b) Use the Multiplier Theorem to obtain a difference set that generates a projective
plane of order 5. (Comment: Not all unions of orbits of the desired size are difference sets.)
13.2.17. Use the Multiplier Theorem to obtain a (37 , 9 , 2)-difference set and a (73 , 9 , 1)-
difference set.
13.2.18. Use multipliers to show that there is no (56 , 11 , 2)-difference set.
13.2.19. Show that every (n2 + n + 1 , n + 1 , 1)-difference set has n as a multiplier.
13.2.20. (♦) Prove that there is no (111 , 11 , 1)-difference set. (Hint: Without generating
orbits of multipliers, use two multipliers to restrict the set of values that can appear in
a difference set fixed under all multipliers. Comment: The impossibility of a (111 , 11 , 1)-
difference set does not (yet) prohibit a projective plane of order 10.)
13.2.21. Prove that there is no (n2 + n + 1 , n + 1 , 1)-difference set when n is divisible by 14
or 15 or 21. (Comment: For n ≤ 3600, it is known that an (n2 + n + 1 , n + 1 , 1)-difference
set exists only when n is a prime power (van Lint–Wilson [1992, p. 348]).)
640 Chapter 13: Combinatorial Designs
We consider only finite quasigroups. Applying a via ◦ (on the right or the
left) permutes Q. Equivalently, the matrix recording ◦ by putting x ◦ y in the
row indexed by x and the column indexed by y is a Latin square with elements
Q. Hence quasigroups are equivalent to Latin squares. Quasigroup terminol-
ogy facilitates algebraic construction and the notation i ◦ j for the (i , j)-entry in
a Latin square. A quasigroup is commutative if and only if the corresponding
Latin square is symmetric. The lemma has a nice application to total coloring of
complete graphs (Exercise 5).
0 3 1 4 2
3 1 4 2 0
1 4 2 0 3
4 2 0 3 1
2 0 3 1 4
• • • • • • •0
• • • • • • •1 3
• • • • • • •2
7
Section 13.3: Further Constructions 643
13.3.8. Theorem. (Bose [1939]) For n ∈ 0 , the triples in the Bose Construction
(Example 13.3.7), defined using any idempotent commutative quasigroup of
order 2n + 1, form an STS(6n + 3).
Proof: We have specified 2n + 1 Type 1 triples and 3(2n2+1 ) Type 2 triples. With
v = 6n + 3, we compute
2n + 1 (6n + 2)(6n + 3) 1 v
(2n + 1) + 3( ) = (3n + 1)(2n + 1) = = ( ).
2 6 3 2
The number of triples in an STS(v) is 13 (2v), since each pair must appear in
exactly one triple. Since we have 13 (2v) triples, it suffices to show that every pair
of elements appears in some triple.
If x and y are copies of the same element of Q, then they appear together in
a Type 1 triple (note that idempotence ensures that they appear together in no
other triple). If x = i¾ and y = j¾ with i
= j , then they appear together in the
Type 2 triple (i¾ , j¾ , (i ◦ j)¾+1 ).
The remaining case is x = i¾ and y = j l , with i
= j and ¾
= l. Since ¾ and l
are distinct in 3 , we may assume l = ¾ + 1. Since Q is a quasigroup, there is a
unique h ∈ Q such that h ◦ i = j . Now x and y appear in the triple (h¾ , i¾ , j l).
Since the positions on the diagonal have even coordinate sum, all diagonal
entries are small. In particular, i + i = 2i ≡ (n + i) + (n + i) (mod 2n), so the
quasigroup is half-idempotent.
0 3 1 4 2 5
3 1 4 2 5 0
1 4 2 5 0 3
4 2 5 0 3 1
2 5 0 3 1 4
5 0 3 1 4 2
13.3.12. Theorem. (Skolem [1958]) For n ∈ , the triples in the Skolem Con-
struction (Example 13.3.11), defined using any half-idempotent commutative
quasigroup on 2n , form an STS(6n + 1).
Proof: We have specified n Type 1 triples, 3n Type 2 triples, and 3(2n
2
) Type 3
triples. With v = 6n + 1, we compute
n + 3n + 3(2n
2 = 4n + 3n(2n − 1) = n(6n + 1) = 3 2
) ( ).
1 v
As in Theorem 13.3.8, since we have 13 (2v) triples, it suffices to show that every
pair of elements appears in some triple.
First suppose that ∞ ∈ / {x , y}. If x and y are copies of the same small element
of Q, then they appear together in a Type 1 triple. If x = i¾ and y = j¾ with i
= j ,
then they appear together in the Type 3 triple (i¾ , j¾ , (i ◦ j)¾+1 ).
Hence we may assume that x = i¾ and y = j l with ¾
= l and that {i , j}
consists of two distinct elements or the same large element. Since ¾ , l ∈ 3 , by
symmetry we may assume l = ¾ + 1. If i = n + j with j small, then x and y appear
in the Type 2 triple (∞ , i¾ , j l). Otherwise, let h ∈ Q be the unique element such
that h ◦ i = j , which exists since Q is a quasigroup. Since Q is half-idempotent,
i ◦ i is i when i is small, i − n when i is large; we have already considered those
cases. Hence h
= i, so x and y appear in the Type 3 triple (h¾ , i¾ , j l).
Finally, consider the pairs involving ∞. This element appears with one small
element and one large element in each of the 3n Type 2 triples, yielding the de-
sired 6n pairs.
There are many half-idempotent commutative quasigroups on 2n and hence
many Steiner triple systems of order 6n + 1 from the Skolem construction (the
original construction of Skolem [1958] was more specialized). Nevertheless, these
constructions lack cyclic invarance.
13.3.13. Definition. A Steiner triple system of order v is cyclic if its set of ele-
ments is v and the set of triples is cyclically invariant (that is, adding 1 to
each element of any triple yields another triple).
Section 13.3: Further Constructions 645
GRAPHICAL DESIGNS
13.3.15. Example. A (15 , 3 , 1)-design. The graph K 6 has 15 edges; these edges
will be the elements of the design. A natural way to form triples of edges is to
use the edge-sets of triangles as blocks. There are 20 triangles in K 6 ; each edge
appears in four of them. Although incident edges appear together in exactly one
triangle, we do not yet have blocks containing non-incident pairs of edges.
Natural triples containing non-incident pairs are the perfect matchings.
There are 15 perfect matchings, every non-incident pair appears in exactly one
of them, and no two incident edges appear together in a perfect matching. Thus
our set of 35 triples now satisfies the definition of a (15 , 3 , 1)-design. Each edge
appears in three perfect matchings and in a total of seven blocks, which confirms
the equation r(¾ − 1) = ë(v − 1).
646 Chapter 13: Combinatorial Designs
Proof: Decompose G into paths whose lengths are half the length of the cycles
in H. Each such segment P in G with length l expands to 4l edges in G(2) and
decomposes into two cycles C and C of length 2l, as illustrated below. Each end
edge of P expands in each of C and C into two edges at one vertex in the expan-
sion, and each internal edge of P expands in each of C and C into a 1-factor in
the corresponding copy of K 2 ,2 . Each expansion can be distributed to C and C in
either way. The resulting cycles decompose G(2) into two copies of H.
··· • • • • • • • • • ···
• • • • • • • • •
• • • • • • • • •
For existence theorems in design theory, one tries to prove that construc-
tions of a desired type exist whenever appropriate necessary conditions are sat-
isfied. In an iterative approach, methods are developed for building larger con-
structions from smaller ones. We seek enough such combining theorems to obtain
a proof that works for all sufficiently large values of the parameters. The Moore–
MacNeish Theorem (Theorem 13.1.6) is a combining theorem of this type for or-
thogonal families of Latin squares. Many constructions for small values may be
needed to start the induction.
We use this method to disprove Euler ’s Conjecture. Euler conjectured that
there is no pair of orthogonal Latin squares of order n whenever n ≡ 2 (mod 4).
In fact, Euler was completely wrong; such pairs of squares exist if and only if
n∈/ {1 , 2 , 6}. We will develop resolvable designs, pairwise-balanced designs, and
orthogonal arrays as tools, transforming the problem from the construction of
Latin squares into the construction of certain arrays.
We start with a famous request for a resolvable design.
Section 13.3: Further Constructions 649
In a resolvable design, v/¾ must be an integer. Since v/¾ = b/r it may then
be possible to partition the blocks into r parallel classes. The number of blocks is
just right for each element to appear once in each parallel class. However, not all
designs where ¾ | v are resolvable. The triple systems in the Bose construction
(Theorem 13.3.8) are not, for example.
13.3.23. Example. Resolvable designs. The set of all pairs in [2n] is a (2n , 2 , 1)-
design; the n(2n − 1) blocks are the edges of a complete graph. In Example 8.3.5,
we partitioned these edges into perfect matchings. Thus the design is resolvable.
The designs with the largest blocks relative to the number of points are the
projective planes. Projective planes are not resolvable, since q + 1 does not divide
q2 + q + 1, but they lead to resolvable designs. Given a projective plane of order q,
delete one line L and all appearances of its q + 1 elements. Since every two lines
have one common element, the remaining blocks have size q. All q + 1 appear-
ances of the remaining elements remain. They appeared together only outside L,
so they still appear together once. Thus the family is a (q2 , q , 1)-design; it is an
affine plane. Exercise 13 constructs these explicitly from finite fields.
For each element x of the line L deleted to obtain an affine plane, the remain-
ing n lines through x partition the remaining n2 points into n sets, forming a
parallel class. Each line other than L lies in exactly one of these classes, because
it intersects L in one point. Thus an affine plane is a resolvable design.
The blocks of an affine plane obtained from a projective plane of order 3 ap-
pear below. The columns in the list of blocks form parallel classes.
⎧
⎪ 123 , 147 , 159 , 168 ⎫
⎪
⎪ ⎪
⎨ 456 , 258 , 267 , 249 ⎬
⎪
⎪ ⎪
⎩ 789 , 369 , 348 , 357 ⎪
⎭
Like projective planes, affine planes have been used to construct other objects.
For example, Fon-Der-Flaass [2002] used them to produce large new families of
strongly regular graphs (Definition 15.3.19).
K irkman did find a construction for the Schoolgirl problem. When supplied
with a grouping into parallel classes, resolvable Steiner triple systems become
Kirkman triple systems. The number of points must be divisible by 3. With
that restriction, the full problem was solved by Ray-Chaudhuri–Wilson [1971]
650 Chapter 13: Combinatorial Designs
13.3.24. Example. The Schoolgirl design; a resolvable STS(15). Let the school-
girls be { A , B1 , . . . , B7 , C1 , . . . , C7}. On the first day, use blocks
1 2 3 4 5
AB1 C1 B2 B4 C3 B3 B7 C5 B5 B6 C2 C4 C6 C7
The blocks used on the other days are obtained by adding a constant to all the
subscripts and treating them modulo 7.
Each such set of five blocks covers each element once. Since there are 35
blocks, it suffices to show that each of the 105 pairs appears. The classes of pairs
are covered as follows, with appropriate shifts for i.
1 2 3 4 5
Bi Ci Bi Ci+1 Bi Ci+2 Bi Ci+3 Ci Ci+1
ABi Bi Ci+6 Bi Ci+5 Bi Ci+4 Ci Ci+2
ACi Bi Bi+2 Bi Bi+3 Bi Bi+1 Ci Ci+3
13.3.25. Example. Every resolvable (q2 , q , 1)-design is an affine plane. For each
parallel class, we add one element in those blocks, and finally we add one block
consisting of the q+ 1 new elements. By construction, the new family of blocks has
the properties required to be the set of lines in a projective plane, so the original
design was an affine plane.
13.3.26. Definition. For K ⊆ , a pairwise balanced design with parame-
ters (v , K , ë) is a family of blocks on a set of v elements such that the size of
each block is in K and any two elements appear together exactly ë times. Let
(v , K , ë)-PBD denote such a family.
13.3.28. Definition. Two n-by-n matrices (or two vectors of length n2) are or-
thogonal if the corresponding entries form n2 distinct ordered pairs. Define
special n-by-n matrices Rn and Cn by letting the entry in each position be the
row index or the column index, respectively.
Storing a matrix in row-major order lists its entries row-by-row, across each
row. We can thus interpret each matrix as a vector. In row-major order,
Rn = (1 , . . . , 1 , 2 , . . . , 2 , · · · , n . . . , n) ,
Cn = (1 , . . . , n , 1 , . . . , n , · · · , 1 . . . , n) .
In the remainder of this section, we apply orthogonal arrays and other tools
to disprove Euler ’s Conjecture. The details are somewhat involved.
Parker [1959] built orthogonal 10-by-10 squares using orthogonal arrays and
a computer. Now Exercise 18 can do this using the general construction below.
⎛ Ci Ui Di X ⎞
⎜U Ci X Di ⎟
Ai = ⎜ i ⎟ .
⎜ Di X Ci Ui ⎟
⎝X Di Ui Ci ⎠
Complete the array by adding blocks A0 , . . . , A2m after the first two blocks. Ver-
ification that this constructs an OA(4 , 3m + 1) is left to Exercise 17.
Section 13.3: Further Constructions 653
To kill the Euler Conjecture for all n, we also strengthen Theorem 13.3.32.
Proof: Let m be the claimed value plus 1. For i > r, construct A¾i with m + 1 rows
as in Theorem 13.3.32. For i ≤ r, let A¾i be an orthogonal array OA(m + 1 , ¾i).
For each block B, form MB by substitution in A| B| as in Theorem 13.3.32. Con-
catenate the matrices MBi as before, plus a matrix C consisting of one constant
column for each element outside all blocks with sizes in {¾1 , . . . , ¾r }.
If x
= y, then x and y appear together in one block B, and ( yx) occurs as a
column in rows r and s in MB exactly once (and nowhere else). If x = y and x
appears in a block B with size in {¾1 , . . . , ¾r }, then ( yx) appears in rows r and s in
MB ; otherwise, it appears in C.
elements. Each new element is added to the blocks of one of the parallel classes
of size ¾ , and we add one more block consisting of the new elements. This block of
size x and the special class of ¾ blocks of size m together partition the elements.
If m , x ∈
/ {¾ , ¾ + 1}, then the claim now follows from Theorem 13.3.35; otherwise,
we drop N(m) or N(x) from the minimization and obtain the same result.
When x = 1 there are no pairs involving the new elements, so we don’t need
the extra block. Now x is not a block size, and again we drop N(x) from the mini-
mization, which we can do by setting N(1) = ∞.
13.3.38. Corollary. If N(m) ≥ 3, N(x) ≥ 2, and 1 ≤ x < m, then N(4m + x) ≥ 2.
Proof: Take ¾ = 4 in Theorem 13.3.37.
In applying Corollary 13.3.38, it is helpful to take m as a multiple of 4.
13.3.39. Lemma. (see Anderson [1990], p. 129) If 4 | m, then N(m) ≥ 3.
Proof: The Moore–MacNeish Theorem (Theorem 13.1.6) yields the bound unless
m is divisible by 3 but not by 9. Thus m is divisible by 12 but not by 36. We
can express m as 12 or 24 times an even power of 2 times an odd number other
than 3. By the Moore–MacNeish Theorem, it suffices to prove that N(12) ≥ 3 and
N(24) ≥ 3. For n = 12, there is an explicit family of size 5 (Dulmage–Johnson–
Mendelsohn [1961]). For n = 24, see Exercise 15.
These combining theorems can yield better lower bounds on N(m) than the
Moore–MacNeish Theorem, but we only need N(m) ≥ 2.
13.3.40. Theorem. (Bose–Shrikhande–Parker [1960]) N(n) ≥ 2 for all positive
integers outside {1 , 2 , 6}.
Proof: We need consider only n ≡ 2 (mod 4) with n > 6. Corollary 13.3.34 handles
the case n ≡ 10 (mod 12). Since 12t + 6 = 3(4t + 2), the Moore–MacNeish Theorem
takes care of n = 12t + 6 given an orthogonal pair with order 4t + 2. There is no
pair when n = 6, so we need an explicit construction for n = 18, done in Example
13.3.36. When 18 < 4t + 2 ≡ 6 (mod 12), we reduce by another factor of 3.
This leaves only n ≡ 2 (mod 12). Explicit pairs are known for n = 14 and
n = 26 (we omit these), and we covered n = 38 in Example 13.3.36. We use the
Moore–MacNeish Theorem again for 50 = 5 · 10, 98 = 7 · 14, 110 = 10 · 11. We
use Corollary 13.3.38 for 62 = 4 · 13 + 10, 74 = 4 · 16 + 10, 86 = 4 · 19 + 10,
122 = 4 · 27 + 14, 134 = 4 · 27 + 26. We have now discussed the cases up to n = 144.
We express the other values as a multiple of 16 plus one of {18 , 22 , 26 , 30}.
Since n > 144, we have n = 16t + x = 4m + x, where 4 ÷ m and m ≥ 32. Thus
x < m. Also N(m) ≥ 3, by Lemma 13.3.39. Now N(n) ≥ 2, by Corollary 13.3.38.
EXERCISES 13.3
13.3.1. (−) For even v, construct a resolvable (v , 2 , 1)-design.
13.3.2. (−) Prove that K6 decomposes into three edges and four triangles.
13.3.3. (−) Prove that K9 decomposes into 4-cycles.
13.3.4. (−) A caterpillar is a tree having a single path incident to or containing every
edge. Prove that every caterpillar is graceful.
Exercises for Section 13.3 655
13.3.5. (♦) A total coloring of G color each vertex and edge so that objects adjacent or
incident have different colors; Ò (G) is the number of colors needed. Prove that an idempo-
tent commutative quasigroup of order n (Definition 13.3.9) exists if and only if Ò (K n) = n.
Conclude from Lemma 13.3.10 that Ò (K n) is n when n is odd and n + 1 when n is even.
(Behzad [1965]; see also Yap [1989]) (Comment: Since (K n) = n − 1, the Total Coloring
Conjecture (Exercise 8.3.33) holds for complete graphs.)
13.3.6. Prisoners A, B, and C stand with C in front of B and B in front of A. From ¾
hats of different colors, each receives one hat , selected at random. The prisoners know all
the colors but see only the hats in front of them. They guess the colors of their own hats,
first A, then B, then C, hearing what is said. If they all guess correctly, they will all be
freed. They know the rules and plan a strategy in advance. What strategy maximizes the
probability of success? (Hint: Use an idempotent quasigroup.) (Wagon–Zielinski [2018])
13.3.7. View v × m as {ai : a ∈ v , i ∈ [m]} An (i , j)-difference is a difference in v be-
tween elements with subscripts i and j . A (v , ¾ , ë , m)-mixed difference system is a fam-
ily D1 , . . . , Dt of ¾-subsets of v × m such that each element of v occurs exactly ë times as
an (i , j)-difference for each (i , j) ∈ [m]2 , except that difference 0 does not occur with i = j .
(a) Prove that the translates (in v) of the t sets in a (v , ¾ , ë , m)-mixed difference sys-
tem D1 , . . . , Dt form a (vm , ¾ , ë)-design.
(b) Let u = 2n + 1. Consider sets {01 , 02 , 03 } and { {ri , −ri , 0i+1 }: i ∈ 3 and 1 ≤ r ≤ n} .
Prove that these 3n + 1 sets form a (u , 3 , 1 , 3)-mixed difference system.
(c) Obtain an STS(v) when v ≡ 3 (mod 6) (see also Example 13.3.7). (Bose [1939])
13.3.8. (♦) Prove that the complete ¾-partite graph with parts of size ¾ decomposes into
¾ 2 copies of K¾ if and only if there is an affine plane of order ¾ .
13.3.9. Complete the proof that if the small numbers in v have a partition into difference
triples as specified in Example 13.3.14, then there exists a cyclic STS(v).
13.3.10. (♦) Construct a (6 , 3 , 2)-design. (Hint: Define 10 triangles on six points.)
13.3.11. Prove that there is no cyclic STS(9).
13.3.12. Fisher ’s Inequality states b ≥ v for the number b of blocks in a (v , ¾ , ë)-design.
Improve this to b ≥ v + p − 1 for a resolvable (v , ¾ , ë)-design with p parallel classes.
13.3.13. Let q be the finite field of size q. Let V be the set of ordered pairs of elements
from q . For a , b ∈ q , let La ,b = {(x , y) ∈ V : y = ax + b}, and let Ma = {(x , y) ∈ V : x = a}.
Prove that the q2 sets La ,b and the q sets Ma together form a (q2 , q , 1)-design.
13.3.14. (♦) Affine planes.
(a) Prove that if B is a block in a (q2 , q , 1)-design, and x is an element not in B, then
exactly one block in the design contains x and is disjoint from B.
(b) Use part (a) to prove that every (q2 , q , 1)-design is resolvable.
(c) Prove that if there is a (q2 , q , 1)-design, then there is a (q2 + 1 , q , q − 1)-design.
(Hint: Make q − 1 copies of the blocks in all but one class.) (Rasch–Herrendörfer [1977])
13.3.15. Let q be a prime power. Obtain a (q2 , q , 1)-design. Delete one element to obtain a
(q2 − 1 , {q , q − 1} , 1)-PBD in which the blocks of size q − 1 are pairwise disjoint. Conclude
that N(q2 − 1) ≥ N(q − 1); in particular, N(24) ≥ 3.
13.3.16. Pairwise-balanced designs.
(a) Show that a (v , {3 , 5} , 1)-PBD exists only when v is odd, and construct one for
v = 11. (Hint: For the construction, start with a resolvable (6 , 2 , 1)-design.)
(b) Show that a (v , {4 , 5} , 1)-PBD exists only when v or v − 1 is divisible by 4, and
construct one for v = 17.
13.3.17. (♦) Complete the proof of Theorem 13.3.33 that N(m) ≥ 2 implies N(3m + 1) ≥ 2.
656 Chapter 13: Combinatorial Designs
13.3.18. (♦) Use Theorem 13.3.33 to construct an explicit pair of 10-by-10 orthogonal Latin
squares. Express it as a “Graeco-Latin” square with the 100 numbers from 00 to 99 in the
100 positions. Explain the steps used (no proof needed).
13.3.19. Without restricting block sizes, a pairwise balanced design on a set E becomes
just a family F of blocks (subsets of E) such that every two elements appear in common
blocks. Prove that a family F having no block of size 1 is a pairwise balanced design with
= 1 if and only if F is the set of hyperplanes of a matroid of rank 3 with no circuits of
size 1 or 2. (G. Chappell)
13.3.20. (♦) Prove that if there exist n − 1 pairwise orthogonal Latin squares of order n,
then there exists a set of n(n − 1) permutations of [n] such that no two of them have the
same ordered pair in any two corresponding positions. The columns of the array below
form such a set of permutations when n = 4. (Comment: The converse also holds.)
123412341234
432121433412
214334124321
341243212143
In this section we begin with the simplest form of the probabilistic method
and then show how to strengthen it by using random variables and expectation.
We assume familiarity with the notions of events, probability spaces, and condi-
tional probability as defined in Chapter 0.
Proving that an event occurs with positive probability involves proving an
inequality. We use several fundamental tools in proving inequalities, some from
elementary calculus. We begin with useful facts about exponentials, where e is
the base 2.71828... of the natural logarithm. These inequalities are important
in asymptotic arguments, and we use them often, so we distinguish e from the
notation for an edge e in a graph by setting the numerical value e in roman font.
657
658 Chapter 14: The Probabilistic Method
We will need bounds on factorials and binomial coefficients. For (¾n), the
bound n¾/¾ ! may suffice for constant ¾ , but often we need a better upper bound.
¾
at most (n¾ )21−(2). If this is less than 1, then some outcome of the process has no
¾
Example 8.2.7 proved Ò l(K r,r) > ¾ for r = (2¾¾−1 ), so Ò l(K r,r) ≥ ( 12 + o(1)) lg r.
Exercise 16 requests an upper bound about twice that. Both have been improved.
14.1.10.* Theorem. (Alon [1993]) For some constant c, every graph G with av-
erage degree d has choice number at least c logloglogd d .
Each vertex receives a random s-subset of S as a list, with all t such sets equally
likely. Say that a vertex of A is full if all t possible lists appear on its neighbors.
The probability that a particular s-set T fails to appear on the neighbors of x is
(1 − 1/t)d H (x) . Since there are t such sets and d/4 > t log(2t), we obtain
RANDOM VARIABLES
Using the pigeonhole property requires a value or bound for (X). Often we
obtain this by expressing X as a sum of simpler random variables. We repeat
Lemma 0.13, restricting our attention to finite sums of random variables on dis-
crete probability spaces.
Applications of expectation and linearity often yield strong results with sur-
prisingly simple proofs. Many occur in the exercises, and another example is in
Theorem 16.1.28. By choosing random subgraphs, we show there that when m ≥
4n, every drawing in the plane of a graph with n vertices and m edges has at least
m3/(64n2) crossing pairs of edges.
The pigeonhole property of expectation plays a crucial role in an upper bound
on the Ramsey number R(3 , ). We seek that guarantees (G) ≥ in every
triangle-free n-vertex graph G. Weakening the Caro–Wei Theorem (Theorem
14.1.14) yields (G) ≥ n/(d + 1) when (G) = d, which is easily proved directly.
The breakthrough by Ajtai–Komlós–Szemerédi [1980] showed (G) ≥ (cn lg d)/d
when G is triangle-free. Simplifications and improvements were due to Shearer
[1983] (achieving c = 1 + o(1)), Shearer [1995], and Alon [1996]. We present the
short proof in Alon–Spencer [2008] based on the earlier papers.
d if v ∈ W
Xv = {
| N(v) ∩ W | if v ∈
/ W.
Let X = ∑v∈V(G) X v . In computing X , each vertex u ∈ W contributes d to X u
and contributes 1 to X v for each v ∈ N(u), since N(u) ∩ W = ∅. Hence the total
contribution to X from u is at most 2d. This yields X ≤ 2d | W | no matter what
W is. Taking expectations, we have (| W |) ≥ (X)/(2d). It therefore suffices to
prove (X v) ≥ 14 lg d for each vertex v, taken over all (equally likely) choices of W .
Fix v ∈ V(G). We will group the choices of W and show that over each group,
the expectation of X v is at least 14 lg d. The desired lower bound on (X v) then
follows, regardless of the sizes of the groups, since all W are equally likely.
We group the choices of W according to the subset of W outside the closed
neighborhood of v. This set W − (NG(v) ∪ {v}) is another random variable de-
termined by W ; call it S. For a given choice of S, let Y be the set of common
nonneighbors of S that lie in N(v), and let t = | Y |. The independent set W that
generates S may arise by adding v to S (since S ∩ N(v) = ∅) or by adding to S any
subset of Y . These 1 + 2 t possibilities for W are equally likely, since all W are
equally likely. In the first case, the value of X v is d. Over the other 2 t possibil-
ities the average value of X v is t/2, since the value of X v is then | Y ∩ W | . Thus
over this group the expected value of X v is the left side of the desired inequality
d (t/2)2 t
+ ≥ 14 lg d.
2t + 1 2t + 1
If t = 0, then the left side simplifies to d/2, which is big enough. Hence we
may assume t ≥ 1. If the inequality fails, then clearing fractions and rearranging
terms yields 4d − lg d < 2 t(lg d − 2t). Since
√ the left side is positive,
√ we have lg d >
2t ≥ 2. With t < 12 lg d, we have 2 t < d. Thus 4d − lg d < d(lg d − 2), which
fails when d ≥ 16.
It turns out that this relatively easy upper bound has the right order. We
will obtain the weaker lower bound R(3 , ) ≥ ( 2/lg 2 ) from Erdős [1961] in
Theorem 14.2.22, but K im [1995] proved R(3 , ) = ( 2/lg ).
We close this section with two unusual applications, showing the flexibility
and creativity that may be involved in applying probabilistic arguments to com-
binatorial problems. First we obtain Binet ’s Formula for the adjusted Fibonacci
numbers without directly solving the Fibonacci recurrence.
The next problem, posed by Kearnes–K iss [1999], succumbs surprisingly eas-
ily to a clever probabilistic argument. This time, instead of using max X ≥ (X),
we use (X) ≥ min X , but the definition of the random variable is not obvious.
• • • • •
• • • • •
• • • • •
• • • • •
For j ∈ [¾], let X j be the 0,1-variable that is 1 if ##### B j ∩ R##### is odd. Let X =
# # # j #
∑j X j . Since #### B j ∩ R#### is odd if and only if #### Bi ∩ Ri #### is odd for all i ∈ [n], and
# #
(#### Bi ∩ Ri#### is odd) = 12 because Bi is a nonempty proper subset of Ai , we have
j j
EXERCISES 14.1
14.1.1. (−) Choose a random ¾-subset of [n], with each ¾-set equally likely. Determine the
probability that the element 1 is chosen.
14.1.2. (−) Consider clubs A and B of size n. Each A sends an invitation to a B chosen at
random. What is the asymptotic probability that each B receives one?
14.1.3. (−) Construct a random variable and distribution on so that the expectation of
the random variable is undefined (infinite).
14.1.4. (−) A university study finds that on any given day, permit holders fail to drive to
campus with probability .1, independently. The university therefore sells ten permits for
a lot with nine spaces and 20 permits for a lot with 18 spaces. Which lot is more likely to
turn away the last permit holder who arrives? (adapted from Grimmett–Stirzaker [1992])
14.1.5. (−) Compute the expectations of the following quantities.
(a) The number of fixed points in a random permutation of [n].
(b) The number of male/female pairs when 2n people consisting of n men and n women
are randomly partitioned into n pairs.
(c) The number of vertices of degree ¾ in a graph with vertex set [n] where each edge
occurs with probability p, independently.
14.1.6. (−) Determine the expected number of monochromatic copies of K r,r in a random
2-coloring of the edges of K n ,n .
14.1.7. (−) Obtain an exponential lower bound on the minimum number of edges in a ¾-
uniform hypergraph that is not t-colorable.
14.1.8. (−) Prove that some n-vertex tournament has at least n!/2 n−1 spanning paths.
(Comment: Alon [1990] proved that the maximum number of Hamiltonian paths in an
n-vertex tournament is at most n!/(2 − o(1))n .) (Szele [1943])
14.1.9. Given a graph G with p vertices, q edges, and s automorphisms, let n = (s¾ q−1)1/p .
Prove that some ¾-coloring of E(K n) has no monochromatic G. (Chvátal–Harary [1973])
14.1.10. Sperner’s Theorem by random variables. Let F be an antichain of subsets of [n].
Let X be the number of members of F that occur as initial segments of a random permu-
tation of [n]. Use X to prove | F | ≤ (⌈n/2⌉
n
).
14.1.11. Fix , r ∈ with r ≥ . Determine the value m such that a random -coloring
of the vertices guarantees that every r-uniform hypergraph with at most m edges has a
vertex -coloring such that every color appears in every edge. (Alon–Spencer [2008])
Exercises for Section 14.1 667
14.1.12. (♦) Determine the expected number of descents in a random permutation (Defi-
nition 3.1.22). (Comment: Since the number of runs in a permutation is one more than
the number of descents, this gives an easier proof for Exercise 3.1.36.)
14.1.13. Let S be a finite set of finite binary words such that none is a prefix of another.
Prove that ∑a∈S 2−|a| ≤ 1.
14.1.14. An instance of SATISFIABILITY is a list of clauses, where each clause is a
set of literals (a literal is a variable or its negation). The instance is satisfied when each
variable is set to be TRUE or FALSE so that each clause has at least one true literal.
(a) Prove that an instance with clauses e1 , . . . , e m is satisfiable if ∑i=1 2−|ei | < 1.
m
(b) Construct an unsatisfiable instance with 2 ¾ clauses when all clauses have size ¾ .
14.1.15. (♦) Let n¾ be the least number of vertices in a non- ¾-choosable bipartite graph,
and let m¾ be the least number of edges in a non-2-colorable ¾-uniform hypergraph.
(a) Let H be a ¾-uniform hypergraph with n edges. Prove that H is 2-colorable if and
only if K n ,n is L-colorable when each part has E(H) as its color lists. Conclude n¾ ≤ 2m¾ .
(b) Let G be a non- ¾-choosable X , Y -bigraph. Let H be the hypergraph whose edges
are the lists in a ¾-uniform assignment L such that G has no L-coloring. Prove m¾ ≤ n¾ .
(Erdős–Rubin–Taylor [1979])
14.1.16. (♦) Apply 2-colorability of hypergraphs to prove that if ¾ > 1 + lg n, then every
n-vertex bipartite graph is ¾-choosable. Obtain the same result when ¾ > lg n.
14.1.17. Let H be a hypergraph with no edges e1 , . . . , e¾ and vertex x such that ei ∩ ej =
{x} for i , j ∈ [¾]. Prove that H is ¾-choosable. Strengthen the statement to an analogue of
degeneracy in graphs. (Hint: No probability needed.) (Berge [1973], from Tomescu [1968])
14.1.18. A tripartite 3-uniform hypergraph is a hypergraph whose vertex set parti-
tions into sets X , Y , and Z such that each edge has one vertex in each of those sets. Con-
struct a tripartite 3-uniform hypergraph that is not ¾-choosable.
14.1.19. The first passenger to board a plane loses her boarding pass and sits in a random
seat. Each subsequent passenger sits in his or her own seat if it is available and other-
wise chooses a random seat from those that remain. What is the probability that the last
passenger sits in his or her own seat? (Winkler [2004])
14.1.20. (♦) Prove that a tournament cannot contain three 3-cycles on four vertices. Con-
clude that the maximum number of edges in an n-vertex 3-uniform hypergraph having no
set of four vertices containing three edges is at least 14 (3n).
14.1.21. A bag has 1000 tiles; on each is printed one of the 26 letters of the alphabet.
Player A picks a tile at random and then replaces it. Player B then picks a tile at random.
Prove that the probability of the two players picking the same letter is at least 1/26.
14.1.22. A communication network is configured as a complete ¾-ary tree with leaves at
distance l from the root. At any time, each node is working with probability p, indepen-
dently of all others. When a node is not working, the subtree rooted at it is inaccessible.
What is the expected number of accessible nodes?
14.1.23. (♦) Let all nn−2 trees with vertex set [n] be equally likely. Define the following
random variables: X is the number of leaves, Y is the number of vertices of degree 2, and
Z is the number of leaves having neighbors of degree 2. Determine the limits as n → ∞ of
(X)/n, (Y)/n, and (Z)/n. (Hint: Use an encoding of the trees as n-ary lists.)
14.1.24. (♦) A pill bottle has m large pills and n small pills. Each day a patient chooses a
random pill; a small pill is consumed, but a large pill is split , with half consumed and the
other half becoming a small pill. Determine the expected number of small pills after the
last large pill is split and the expected day this occurs. (Knuth–McCarthy [1991])
668 Chapter 14: The Probabilistic Method
14.1.25. Let n distinct pairs of socks be put into the laundry. After washing, socks are
drawn successively at random (without replacement). Compute the expected number of
pairs among the first ¾ socks drawn.
14.1.26. For n , ¾ ∈ 0 with 0 ≤ ¾ ≤ n, form a permutation of [n] by choosing the first ¾
positions at random and filling the remaining n − ¾ positions in ascending order. Let En ,¾
be the expected number of left-to-right maxima (for example, E3 ,1 = 2 and E3 ,2 = 11/6).
Compute En ,¾ . Conclude that En+1 ,¾ − En ,¾ = 1/(¾ + 1). (Deshpande–Deshpande [2008])
14.1.27. (♦) Bipartite subgraphs.
(a) Use a random partition of the vertices to prove that every graph has a bipartite
subgraph with at least half its edges.
(b) Improve part (a) by showing that if G has m edges and n vertices, then G has a bi-
⌈n/2⌉
partite subgraph with at least m2 ⌈n/2⌉−1
edges whose part-sizes differ by at most 1.
(c) Prove that every graph with m edges that has a matching with ¾ edges has a bi-
partite subgraph with at least (m + ¾)/2 edges. (Molloy–Reed [2002, p. 37])
14.1.28. Let G be an n-vertex graph with average degree d and minimum degree ¾ . Prove
that G has an induced subgraph with at least d¾+n1 vertices that does not contain K ¾+1 .
14.1.29. (♦) Bollobás’s Inequality. Let {Ai }im=1 and {Bi }im=1 be subsets of [n], with | Ai | =
−1
ai , | Bi | = bi , and Ai ∩ Bj = ∅ if and only if i = j . Prove ∑i=1 ( aia+ibi ) ≤ 1. Conclude
m
14.1.31. (♦) Given a distribution of pebbles to the vertices of a graph, a pebbling move
removes two pebbles from some vertex and adds one pebble to a neighboring vertex. A ver-
tex is reachable from a distribution if some (possibly empty) list of pebbling moves results
in it having a pebble. Let D be a distribution on the ¾-cube Q¾ from which every vertex
is reachable. Moews [1998] proved that D must have at least (4/3)¾ pebbles. Here we de-
velop the proof in Bunde–Chambers–Cranston–Milans–West [2008].
(a) Prove ∑t≥0 ar,t 2− t ≥ 1 for any r ∈ V(Q¾), where ar,t is the number of pebbles in D
at distance t from r. Thus ∑t≥0 (ar,t)2− t ≥ 1 when r is chosen uniformly at random.
(b) Prove (ar,t) = | D| (¾t )2−¾ , and conclude | D| ≥ (4/3)¾ .
14.1.32. A coloring of a graph G is r-dynamic if it is proper and each vertex neighborhood
N(v) has at least min{r, d G(v)} colors. Prove that if (G) > sr++1s r ln n, where n = | V(G)| ,
then G has an r-dynamic coloring with at most (G)+ r + s colors. (Hint: Color the vertices
properly in the order v1 , . . . , vn , at random.) (Jahanbekam–Kim–O–West [2016])
14.1.33. Two players alternately flip a coin that has probability p of landing heads up.
The winner is the first to obtain heads. What is the probability that Player 1 wins?
14.1.34. (♦) A standard random walk moves distance 1 to the left or right on the real line
with each unit of time, with probability 12 in each direction.
(a) From position 0, prove that the expected number of steps taken to reach position
−1 or position n for the first time is n.
(b) Let X n be the number of steps until the difference between the maximum and min-
imum positions visited first equals n. Determine (X n). (Palacios–Sandell [1991])
Exercises for Section 14.1 669
14.1.35. (♦) A random walk on a graph G starts at a fixed vertex v and at each step moves to
a random neighbor of the current vertex, chosen uniformly. When G is a cycle, prove that
all vertices other than v are equally likely to be the last vertex visited for the first time.
(Comment: This folklore result appeared in Lovász–Winkler [1993], which also showed
that cycles and complete graphs are the only graphs with this property.)
14.1.36. An unbiased coin is flipped until ¾ heads occur. Let X be the number of isolated
heads in the list , and let Y be the number of runs (when ¾ = 4, the list HHTTHTTH
yields X = 2 and Y = 5). Compute (X) and (Y). (Bhanu–Deshpande [2010])
14.1.37. Consider a committee having both Senators from each of n states. Partition the
2n people into pairs at random, with each matching equally likely. All pairs are allowed.
(a) What is the probability that no Senators from the same state are paired?
(b) What is the limit of this probability as n → ∞ ?
14.1.38. (♦) An urn has n balls, of which ¾ are white. A ball is chosen at random until
a white ball is obtained. Determine the expected number of the step on which the first
white ball is obtained, under each of the following two scenarios.
(a) Non-white balls are put back in the urn before the next drawing.
(b) Non-white balls are discarded before the next drawing.
14.1.39. Let Q be a set of n points chosen independently and uniformly in the unit square.
Find the expected number of sets S ⊆ Q such that there is an increasing curve with S on
or below the curve and Q − S above it. (Stanley–Steele [1989])
14.1.40. (♦) Let v1 , . . . , vn √ be unit vectors in n . Prove that √ 1 , . . . , n can be chosen in
{−1 , +1} so that ####∑ i vi #### ≥ n and also so that ####∑ i vi #### ≤ n. Prove that both results are
sharp. (Alon–Spencer [1992])
14.1.41. (♦) Fix p1 , . . . , pn ∈ [0 , 1], and let v1 , . . . , vn be unit vectors in n . Let w = ∑ pi vi .
√
Prove that some subset of v1 , . . . , vn sums to a vector u such that |w − u| ≤ n/2. (Alon–
Spencer [1992])
14.1.42. (♦) Let A be an n-set in n2 . Prove that there is an n-set B in n2 such that at
least half of n2 can be expressed in the form a + b with a ∈ A and b ∈ B.
14.1.43. (+) A set S is sum-free if no distinct x , y , ∈ S satisfy x + y = . Prove that
every set A of nonzero integers contains a sum-free set S with | S| > | A| /3. (Erdős [1965])
14.1.44. Let A1 , . . . , A t be events in a space of n equally likely outcomes, with pi = (Ai) =
| Ai | /n and s = ∑i=1 pi . Given r ∈ with 1 ≤ r ≤ s, prove that for some set of r events in
t
s
{Ai }, the probability that they all occur is at least r!(r) / (rt ) . (Ford [1994])
14.1.45. Determine the probability that n points independently chosen uniformly at ran-
dom on a circle all lie in a semicircle. (Comment: This result appeared in at least three
papers and six books by the 1950s; Jordan [1872/1873] and Wendel [1962] generalized it.)
14.1.46. Fix n ≥ 1. For each of n independent trials, a ball is placed in some indexed box; it
is box j with probability 2− j , for j ∈ . Let X denote the number of empty boxes below the
highest-indexed occupied box. Compute (X). (Comment: Ferguson–Melolidakis [1984]
determined the complete distribution of X for each n.)
14.1.47. (♦) A binary maze is a digraph in which every vertex has two exiting edges, one
labeled 0 and one labeled 1. A search list specifies the label of each successive edge to be
followed. A search list b is n-universal if for every vertex u in every n-vertex strongly
connected binary maze G, following b from u reaches every vertex of G. Prove that the
minimum length of an n-universal search list is between 2 n−1 and n2 2 n ln n. (Hint: Bound
the number of triples (G , u , v) such that G is a maze and a random binary list of length m
never reaches v when starting from u.) (Knuth [1999])
670 Chapter 14: The Probabilistic Method
with at most this many homogeneous ¾-sets. By deleting a vertex of each homoge-
neous ¾-set, we retain a graph with at least the specified number of vertices but
no homogeneous ¾-set.
Thus R(¾ , ¾) > n− (X), for each n. Since (¾n) < ( ne
¾
)¾ , we also have the simpler
n − ( ne
¾
)¾ 21−¾(¾−1)/2 as a lower bound. We seek n to maximize this bound. Differ-
¾ −1
entiating suggests choosing n to satisfy 1 = ¾ ¾e ( ne ¾ ) 21−¾(¾−1)/2 , which requires
−
n = e ¾2
1 ¾/2(2e)−1/(¾ −1)
. The factor (2e)− 1/(¾ − 1)
is near 1 when ¾ is large.
For simplicity, we set n = e−1 ¾ 2¾/2 (actually a nearby integer) to obtain the
claimed bound. We have
ne ¾ ¾ 1 2e
n−( ) 21−¾(¾−1)/2 = 2¾/2 − 2¾ /2 1−¾(¾ −1)/2
= ¾ 2¾/2 (1 −
2
2 ).
¾ e e ¾
Since 2e/¾ tends to 0 for large ¾ , the bound is as claimed.
14.2.2. Theorem. (Arnautov [1974], Payan [1975]) For ¾ > 1, every n-vertex
graph with minimum degree ¾ has a dominating set of size at most n 1+ln(¾ +1)
¾ +1 .
Proof: (Alon [1990]) Form a random vertex subset S in such a graph by including
each vertex independently with probability p = ln(¾¾++11) . Given S, let T be the set
Section 14.2: Refinements of Basic Methods 671
A greedy algorithm that iteratively adds the vertex dominating the most
currently undominated vertices proves the same upper bound constructively (Ex-
ercise 8). The coefficient on n in Theorem 14.2.2 is asymptotically sharp; Alon–
Wormald [2010] gave a probabilistic construction of ¾-regular graphs with no
dominating set of size less than (1 − o(1)) ln¾¾ n.
The most famous use of the deletion method may be Erdős’s proof that graphs
with large girth and chromatic number exist. Theorem 10.1.31 presents an ex-
plicit construction. Here we present Spencer ’s simplification of Erdős’ proof, with
apologies for advance use of Lemma 14.3.8.
1−1/
With (X) < n , we have (X)/n → 0 as n → ∞. From Markov ’s Inequality
(Lemma 14.3.8), we conclude (X ≥ n2 ) → 0 as n → ∞. For n large, (X ≥ n2 ) < 12 .
Since (G) cannot grow when we delete vertices, at least n−(G) X
independent
sets are needed to color the remaining graph after we delete a vertex of each short
cycle. If X < n2 and (G) ≤ 2n , then at least colors are needed for the graph
remaining. By the Union Bound,
there exists an n-vertex graph G such that (1) (G) ≤ 2n¾ and (2) G has fewer than
2 cycles of length less than ½ . We delete a vertex from each short cycle and retain
n
The deletion method is also used in the proof of a technique called “depen-
dent random choice”. To motivate this, recall that the Tur án number ex (n; H)
is the maximum number of edges in an n-vertex graph not containing H. In
Theorem 13.2.19, a counting argument showed ex (n; K r,s) ≤ cn2−1/r when r ≤ s
(K óvari–Sós–Turán [1954]), which is the right order of growth when s > r! (The-
orem 13.2.25, Kollár–Rónyai–Szabó [1996]). Using a counting argument, Füredi
[1991] extended this bound on ex (n; H) to every A , B-bigraph H such that ver-
tices in B have degree at most r. Here we develop a later probabilistic proof.
The elementary counting argument shows that if G has too many edges,
then some set of r vertices has s common neighbors, yielding K r,s . That is, with
nonzero probability a random r-set from V(G) has at least s common neighbors.
In the Dependent Random Choice Lemma, we introduce some dependence among
the chosen vertices so that r-sets with many common neighbors are more likely to
be kept. In this way a smaller number of edges yields nonzero probability of hav-
ing many r-sets with at least s common neighbors. The comparison with Theorem
14.2.3 is that there we deleted a vertex from each bad cycle (too short), while here
we will delete a vertex from each bad r-set (too few common neighbors).
Versions of the lemma were proved in Kostochka–Rödl [2004] and Gowers
[1998]. We give roughly the proof by Alon–Krivelevich–Sudakov [2003] (see
Alon–Spencer [2008], Lecture 2 of Lee [2015], and Fox–Sudakov [2011]; the lat-
ter is an excellent survey presenting a variety of applications of the technique).
n t−1
.
Now let Y count the r-subsets of S having fewer than b common neighbors; we
want to eliminate such sets. A given r-set R lies in S if and only if each vertex of T
t
lies in N(R). If | N(R)| < b, then (R ⊆ S) < ( nb ) . This is where dependence helps;
r-sets having more common neighbors are more likely to lie in S. Considering all
r-sets, we have (Y) < (nr) ( nb ) .
r
This hypothesis on the constant c yields the hypothesis on G for Lemma 14.2.4.
Lemma 14.2.4 therefore provides a set U of at least a vertices in G such that
every r-subset of U has at least b common neighbors. We now find H in G. Use
a vertices of U as the vertices of A, assigned arbitrarily. Now, each vertex of B
needs to be made adjacent to some set of at most r vertices of A. For each vertex of
B in turn, find an r-set of vertices mapped to A containing its desired neighbors,
and find a common neighbor of this r-set that has not yet been used. Since the
r-set has at least b common neighbors, and b = | V(H)| , there is always such a
neighbor available until the process is finished.
Hence it suffices to let c H = c/2.
With 2¾−1 t edges, this occurs for some edge with probability at most 2te− p¾ , by
the Union Bound.
Now consider an edge S that is bad (in one color) under º but not º . Since S
requires a color change to go bad, some edge T intersecting S has the other color
on all its vertices (under º ). Given edges S and T that intersect, let AS,T be the
event that S becomes monochromatic and the vertices of S ∩ T change color.
Let U be the subset of S that changes color in the recoloring step; occurrence
of AS,T requires S ∩ T ⊆ U. The original coloring º gives one color to all of U ∪ T
and the other to all of S − U ; this has probability 2( 12 )2¾−r , where r = | S ∩ T |.
With j = |U | , the probability that the colors on U change in the recoloring step
is at most p j , and the probability of no change on S − U is at most 1.
For specified S, T, U , the probability is thus at most 21−2¾+r p j . We sum over
U with S ∩ T ⊆ U ⊆ S to bound (AS,T ). Letting i = j − r and using the Binomial
Theorem and 1 + x < e x , the bound becomes
¾ −r
−r 2p r
∑( ) (21−2¾+r pr ) pi = 21−2¾+r pr (1 + p)¾−r ≤ 21−2¾ e p¾ ( ) .
i 1+p
i=0
14.2.7.* Corollary. For > 0, when is sufficiently large the minimum num-
ber
√ of edges in a -uniform hypergraph that is not 2-colorable is at least
( 3 − )(2 ¾ − 1 1/3(ln )−1/2).
√
Proof: Choosing t < ( 3 − ) 1/3(ln )−1/2 and p = ln ¾
3¾ yields the inequality
2te− p¾ + t2 pe p¾ < 1 needed for Theorem 14.2.6.
Shearer [1985] proved that replacing the constant e with any smaller con-
stant in the condition epd ≤ 1 no longer guarantees (⋂ Ai ) > 0.
Most treatments of the Symmetric Local Lemma replace “all but d events”
with “all but d other events”) but then must require ep(d + 1) ≤ 1. We phrase the
condition using “all but d events” because the formula to count events omitted
from the set that is mutually independent of Ai often also counts Ai .
The Local Lemma has many applications. We use it first to improve the lower
bound on diagonal Ramsey numbers produced by the elementary existence argu-
ment, but only by a factor of 2. Gaining only a factor of 2 is disappointing; the
Local Lemma is more effective when dependence is rarer. The improvement for
van der Waerden numbers is more dramatic (Exercise 22). The general version of
the Local Lemma does provide a significant improvement for off-diagonal Ramsey
numbers with one parameter fixed (see Theorem 14.2.22).
√
14.2.10. Theorem. (Spencer [1975]) R(¾ , ¾) > (1 + o(1)) e ¾2
2 ¾/2 .
Proof: Form a random 2-coloring of E(K n), as usual. For each ¾-set S of vertices,
let AS be the event that S is homogeneous. Knowing the color of all edges outside
(S2 ) has no effect on the probability of AS . Hence we can let d in Theorem 14.2.9
be the number of ¾-sets in [n] (including S) that share at least two elements with
S; the event AS is mutually independent of the set of all other events.
To obtain an upper bound on d, pick two elements of S and pick ¾ − 2 elements
outside these two. Sets that share more than two elements with S are counted
many times. Nevertheless,
¾ n−2 ¾ n ¾2 ne ¾−2
d < ( )( ) < ( )( )< ( ) .
2 ¾−2 2 ¾−2 2 ¾−2
ever, AS is not mutually independent of that set of events. Let T and U be ¾-sets
such that S ∩ T = {v , x}, S ∩ U = {v , y}, and T ∩ U = {v , } (see figure below).
The events AS , A T , and AU are pairwise independent, as noted above. However,
AS is not mutually independent of {A T , AU }. If A T and AU both occur, then vx
and vy have the same color, and (AS | { A T , AU }) = ( 12 )(2)−2
= (AS).
¾
S
x
• v
•y
•
T U
•
The Local Lemma is effective when the sets on which an event Ai depends
are somehow “near ” Ai ; hence the name “Local Lemma”. Often the needed state-
ment about mutual independence uses the following principle, named by Molloy
and Reed. It describes a setting under which mutual independence is automatic.
14.2.13. Theorem. (Reed [1999]) Let L be a list assignment for a graph G such
¾
that each list has size at least ¾ . If every color appears in at most 2e of the
lists in any vertex neighborhood, then G has a proper coloring from the lists.
Proof: We may assume that each list has size exactly ¾ . Form a random coloring
by choosing uniformly and independently from each list. For each edge xy and
color c ∈ L(x) ∩ L(y), let A xy ,c be the event that x and y both receive color c. The
probability p of each such event is ¾ −2 .
Occurrence of an event A xy ,c is determined by the colors chosen for x and y.
By the Mutual Independence Principle, A xy ,c is mutually independent of the set
of all these events indexed by edges not incident to xy. We obtain an upper bound
on d by counting the events corresponding to edges incident to xy. Note that
there is no bound on the vertex degrees.
For an edge x y incident to xy, the event A x y ,c is defined if and only if c is
in L(x ) ∩ L(y ). By symmetry, suppose that x = x and y
= y. The hypothesis
allows at most 2e ¾
such events for each color c ∈ L(x), one of which is eliminated as
A xy ,c . The same computation holds for edges incident to y. We conclude that each
event A xy ,c is mutually independent of a set of all but d − 1 of the other events,
where d < ¾ 2/e. Since epd < 1, the Local Lemma implies that in some coloring
no such event occurs, and hence G has a proper coloring from the lists.
Choosing appropriate events for application of the Local Lemma can be tricky.
In Theorem 14.2.13, one might try defining an event A xy for having the same color
on x and y, but this fails (Exercise 24). Molloy–Reed [2002] gave various appli-
cations of Theorem 14.2.13. By other techniques, Haxell [2001] showed that the
conclusion still holds when each color appears in at most ¾/2 lists in each neigh-
borhood. By iterative use of the Local Lemma, Reed–Sudakov [2002] relaxed this
to ¾(1 − o(1)). Reed [1999] conjectured that ¾ − 1 suffices.
Before proving the general Local Lemma, we apply the symmetric version
again. Consider decomposition of graphs into linear forests, which are forests
whose components are paths. The minimum number of such forests needed is the
linear arboricity of the graph.
The bound is sharp, because a ¾-regular n-vertex graph has 12 ¾ n edges, and
each linear forest contains at most n − 1. Alon [1988] used the Local Lemma to
prove the conjecture asymptotically, showing that for some constant c the linear
arboricity is always at most 12 ¾ + c¾ 3/4(ln ¾)1/2 .
We present only the proof of the exact bound for graphs with large girth. As
a lemma, we need a variation on the greedy selection that finds independent sets
678 Chapter 14: The Probabilistic Method
of size ¾+n1 . We will be content with smaller independent sets but have some con-
trol on the locations of the vertices. (Haxell [2001] strengthened this result: the
sets only need to have size at least 2 ¾ .)
14.2.15. Lemma. (Alon [1994]) Given a graph G with maximum degree ¾ and a
partition of V(G) into sets of size at least 2e ¾ , there is an independent set in
G consisting of one vertex from each set in the partition.
Proof: Let a = ⌈ 2e¾ ⌉ , and let V1 , . . . , Vr be the partition. By discarding ver-
tices from G, we may assume that each Vi has size a. Pick one vertex from each
Vi , uniformly and independently. We want the resulting set S to have nonzero
probability of being independent.
For each edge xy with endpoints in distinct parts, let A xy be the event that
x , y ∈ S. We have (A xy) = a12 . By the Mutual Independence Principle, if x ∈ Vi
and y ∈ Vj , then A xy is mutually independent of the set of events for all edges
with both endpoints outside Vi ∪ Vj . The bound on d for the application of the
¾
Local Lemma is thus 2a¾ − 1. It suffices to have epd < 1. We have epd < e 2a a2
< 1,
by the choice of a.
Lemma 14.2.15 implies, for example, that when 11t points on a circle are
colored, with 11 points in each of t colors, there is a set of t points with distinct
colors such that no two are consecutive among the colored points.
Every connected 2 ¾-regular graph has an Eulerian circuit and hence an ori-
entation in which indegree and outdegree both equal ¾ at every vertex. Such a di-
graph is called ¾-regular. Decomposing the resulting digraph into ¾ + 1 forests of
directed paths yields the desired decomposition of the original 2 ¾-regular graph.
Thus it suffices to prove the following.
The proof of the general form of the Local Lemma is a subtle but short in-
duction using conditional probability (see Definition 0.10). The set Di includes
indices of all events other than Ai on which Ai is dependent, and possibly more.
Proof: To simplify the notation, let IS denote ⋂ j ∈S A j , the event that no event
indexed by S occurs. To prove (⋂t=1 At ) > 0, it suffices to prove both (IS) > 0
n
14.2.19.* Remark. The proof given here for the Local Lemma guarantees a point
outside all the bad events, called “flawless” in Achlioptas–Iliopoulos [2016]. How-
ever, the probability of flawless points may be exponentially small, and we are not
given an efficient way to find one. Much effort was devoted to “constructivizing ”
the proof to obtain such a point in polynomial time.
Work in this direction began with Beck [1991]. Subsequent work obtained
randomized algorithms to produce a flawless point in various special cases or un-
der additional restrictions, with a particularly simple example in Moser [2009].
Moser–Tardos [2010] then produced an algorithm that works whenever the sam-
ple space can be described as a product of independent choices over a set of vari-
ables, as in Proposition 14.2.12.
In particular, if the hypothesis of Theorem 14.2.18 holds for events struc-
tured as in Proposition 14.2.12, then one can start with a random point in the
probability space and proceed as follows, iteratively. If some bad event Ai occurs,
then randomly re-sample the variables in the underlying subset Si that determine
Ai . Moser–Tardos [2010] proved that this leads to a flawless point with expected
number of steps at most ∑ i 1−xixi (see Sinclair [2018, Lecture 25] for a proof).
The focus in this area has shifted to efficient local search algorithms de-
scribed in general settings that go beyond the probabilistic framework of the Local
Lemma. For example, Achlioptas–Iliopoulos [2016] replaced the probabilistic for-
mulation by a directed graph on the underlying space and sought a point outside
the bad events via a random walk on the digraph.
The original proof in Moser–Tardos [2010] used a technique called “witness
trees” to track dependencies and progress toward a flawless point. An alternative
approach presented by Moser was named the Entropy Compression Method
by Tao [2009]. This method has been applied in many situations and some-
times gives stronger results than the Local Lemma (see for example Grytczuk–
Kozik–Micek [2013], Esperet–Parreau [2013], and Dujmović–Joret–Kozik–Wood
[2016]). Bernshteyn [2017] further strengthened this method with his Local
Cut Lemma, which captures the sometimes lengthy computations of the Entropy
Compression Method and makes it easier to prove the same results.
Section 14.2: Refinements of Basic Methods 681
A different restriction of the general Local Lemma can be useful when there
are several types of events.
(Ai) = 2(Ai)e− /2
≤ x i e− j ∈ Di 2 (Aj ) = x
i ∏e
− xj
≤ x i ∏(1 − x j).
j ∈ Di j ∈ Di
Molloy and Reed call Theorem 14.2.20 the Asymmetric Local Lemma. It is
useful when events have different probabilities and each “neighborhood” Di has
few high-probability events. Because the Symmetric Local Lemma requires the
same upper bound on the probabilities of all the events, that bound must be very
small: ed1
. Since here we only require ∑ j ∈ Di (A j ) ≤ 14 , the probabilities of indi-
vidual events can also be near 14 . Exercise 26 further underscores the distinction.
Exercise 27 develops a generalization.
We illustrate the technique. Hind–Molloy–Reed [1999] used the next result
to prove that every graph with maximum degree D has a total coloring (see Exer-
cise 8.3.33) using at most D + 8 log8 D colors. A coloring is ¾-frugal if it is a proper
coloring and every color appears at most ¾ times in each vertex neighborhood.
(G) 1
∑ (A T ) ≤ (¾ + 1)
1
(G) + (¾ + 1) (G)( )
T ∈ DS
q ¾ q¾
(¾ + 1) (G) (¾ + 1)( (G))¾+1 ¾+1 ¾+1 1
< + ≤ + < .
q ¾ !q¾ 16( (G))1/¾ ¾ !16¾ 4
682 Chapter 14: The Probabilistic Method
The original proof of Theorem 14.2.21 used the general Local Lemma. The
neighborhood version gives a simpler proof, but the symmetric version is not
strong enough. It would require a single value p bounding the probabilities of
all the events; thus p ≥ 1/q2 is needed, where q = ⌊ 16( (G))1+1/¾ ⌋ . However,
in DS we must include more than (¾ + 1) (G)( (G) ¾ ) events, so we cannot satisfy
epd ≤ 1. The Neighborhood Local Lemma takes advantage of the fact that not
many of the events with “high” probability 1/q2 occur in each neighborhood.
The Neighborhood Local Lemma is not strong enough for the next applica-
tion to Ramsey numbers. In Corollary 14.1.17, we proved R(3 , ¾) ≤ 8¾ 2/lg ¾ . The
lower bound needs a graph with many vertices having no triangle or independent
¾-set. The deletion method yields R(3 , ¾) > ¾ 3/2+o(1) (Exercise 16).
We will improve the lower bound to c¾ 2/(ln ¾)2 . K im [1995] raised it to
R(3 , ¾) ≥ c¾ 2/ln ¾ , matching the growth rate of the upper bound. More
recent improvements include Bohman [2009], Bohman–Keevash [2013], and
Fiz Pontiveros–Griffiths–Morris [2013], the latter bringing the lower bound
asymptotically within a factor of 4 of the upper bound in Shearer [1983]. (For
analogous discussion of R(4 , ¾), see Exercise 17.)
The lower bound of c¾ 2/(ln ¾)2 was originally proved by Erdős [1961] using an
intricate deletion argument. As noted in Remark 8.1.19, it yields a triangle-free
r-chromatic graph with at most c (r ln r)2 vertices (Exercise 5). Spencer [1977]
gave a simpler proof using the general Local Lemma (see also Spencer [1987]).
14.2.22. Theorem. (Erdős [1961]) R(3 , ¾) ≥ c¾ 2/ln2 ¾ for all ¾ when c is a suffi-
ciently small constant.
Proof: (Spencer [1977]) Form a random graph with vertex set [n] by generating
each edge with probability p, independently; p will be chosen later. We seek n as
large as possible such that the probability of having no triangle or independent
¾-set is nonzero. Since we can adjust c if needed, we may assume that ¾ is large.
Define events AS for all S ⊆ [n] with | S| ∈ {3 , ¾}; event AS occurs if S is an
independent ¾-set or induces a triangle. The (n3) events AS with | S| = 3 each have
probability p3 , and the (n) events AS with | S| = ¾ each have probability (1 − p)(2).
¾
¾
By the Mutual Independence Principle, each AS is mutually independent of
the set consisting of all A T such that | T ∩ S| ≤ 1. That is, let DS be the set of all
T other than S such that | T ∩ S| ≥ 2.
To simplify the computation, we bound a slightly larger quantity. For each
S we include all ¾-sets in DS . Taking a closer look at the number of triples, we
must include (| S2 |)(n − |S|) triples in DS . Since we only have two types of events, to
prove R(3 , ¾) > n it suffices to choose y and in (0 , 1) such that for some p ∈ (0 , 1),
−
setting = (¾n) .
Because (1 − p)(2) < e− p(2) and (1 − )(¾) → 1, for the second inequality we study
¾ ¾ n
e− p(2) < (1 − y)(2)n . To simplify the right side, note that (2)ny 2 ∼ c (ln2 ) → 0,
¾ ¾ 4
which yields (1 − y)(2)n ∼ e− y(2)n (see Lemma 14.3.11). Note that ln = − ln (n).
¾ ¾
By comparing exponents in the desired inequality and canceling −(2), it thus suf-
fices to show p > [ln (n)] / (2) + ny.
Using n > (n) and 2.5 2 < ( ), it suffices to show p > 2.5 ln n + ny. Balancing
2
ny and p motivated our choice of p, which yields ny = pc21 . Also, p = c1 n−1/2 =
c1 c−0 1/2 · ln . Finally, the leading term in ln n as a function of is 2 ln . If we
choose the constants to yield the desired strict inequality in the leading terms,
then the lower-order terms can be ignored for sufficiently large (this also ex-
plains why we can ignore the last factor in the second desired inequality). Thus
it suffices to have c1 > (5c1/2
0 + c1
3 ).
When c0 and c1 are made sufficiently small,
the inequality holds.
n 1
( )np3 + ( )e− p(2) ≤ .
¾
2 4
In order for p to satisfy both inequalities, n(ln n)3 < c is required. Hence
this method cannot even yield a linear lower bound! The Symmetric Local Lemma
is even worse, providing only a constant lower bound. In this problem the deletion
method does better; see Exercise 16.
684 Chapter 14: The Probabilistic Method
EXERCISES 14.2
2
14.2.1. (−) Given natural numbers n and t, let m = n − (nt) 21 − t . Prove that there is a
2
14.2.14. To show the existence of triangle-free graphs with large chromatic number, con-
sider random n-vertex graphs in which each vertex pair is an edge with probability n−2/3 ,
independently. Use these to argue that there is a triangle-free graph with 2n/3 vertices
and chromatic number at least n1/3/(2 ln n). (Comment: This easy result is weaker than
what is guaranteed from R(3 , ¾) in Exercise 14.2.5.)
14.2.15. (♦) Reed [1998] conjectured (G) ≤⌈ (G)+21 + (G) ⌉ for every graph G. He proved
the existence of a positive constant such that (G) ≤ ⌈ (G) + (1 − )( (G) + 1)⌉ . Reed
[1998] showed that ≤ 1/2 is necessary. Sufficiency remains open.
(a) Generate a random n-vertex graph H with independent edge-probability p. Prove
((H) < 2+p c ln n) → 1 as n → ∞ , where c is a positive constant.
(b) Prove that there is a graph H with n − (1/3)n3/4 vertices having independence
number 2 and clique number less than (2 + c)n3/4 ln n.
(c) Prove that any such that Reed’s Conjecture holds for all graphs satisfies ≤ 1/2.
(Comment: As observed by Kostochka, part (c) also follows from the explicit graph
G t obtained by expanding each vertex of C5 into a t-clique; (G t) ≥ 5t/2 while (G t) =
2t and (G) = 3t − 1. Toward Reed’s Conjecture, when (G) is large it suffices to have
< 1/130,000 (King–Reed [2016]), < 1/26 (Bonamy–Perrett–Postle [2018]), or < 1/13
(Delcourt–Postle [2017]). The last result also works for the list chromatic number.)
14.2.16. Off-diagonal Ramsey numbers. (Note R(3 , ) ≥ c 2/ln2 from Theorem 14.2.22.)
¾
(a) Prove that if (n) p(2) + ( nl)(1 − p)(2) < 1 for some p ∈ (0 , 1), then R( , l) > n.
l
¾
Prove also that R( , l) > n − (n) p(2) − ( nl)(1 − p)(2) for all n ∈ and p ∈ (0 , 1).
l
(b) Choose n and p in the second part of (a) to prove R(3 , ) > 3/2− o(1) . What lower
bound on R(3 , ) can be obtained from the first part of (a)? (Spencer [1977])
14.2.17. (+) Lower bounds on the Ramsey number R(4 , ).
(a) Use part (a) of Exercise 14.2.16 to show that R(4 , ) ≥ ((/ ln )3/2).
(b) Use the Deletion Method to show that R(4 , ) ≥ ((/ ln )2).
(c) Use the Local Lemma to show that R(4 , ) ≥ ((/ ln )5/2). (Spencer [1977])
(Comment: Bohman [2009] proved R(4 , ) ≥ ( 5/2/(ln )2), and R(4 , ) ≤ 3+ o(1) is known.)
14.2.18. If n ≥ m, then trivially there is an injective function from [m] to [n]. Consider
functions where elements of [m] are mapped to uniformly random elements of [n], inde-
pendently (all nm functions are equally likely). Show the power of the Local Lemma by
comparing the lower bounds on n given by the Union Bound and by the Local Lemma for
positive probability of obtaining an injective function. (P. Prałat)
14.2.19. Let A1 and A2 be two dependent events, each having probability p. Prove that
the hypotheses of the General Local Lemma can hold for A1 and A2 if and only if p ≤ .25.
√
14.2.20. Let H be a graph with maximum degree . Prove that if ≤ s3/2/ 4e, then H
has an s-edge-coloring in which no 4-cycle is monochromatic. (Comment: Jiang–Milans–
West [2013] more generally considered avoiding monochromatic Kp ,q .)
14.2.21. (♦) Let G be a graph with (G) = − 1. Let S be a set of disjoint cliques in G, each
with size at least c . Use the Local Lemma to prove that if c is large enough, then G has
an independent set consisting of one vertex from each clique in S. Determine how large c
must be to allow the argument to work. (Hint: 11/13 is slightly above the threshold.)
14.2.22. (♦) The van der Waerden number w(l , ) is the least n so that every -coloring
of [n] has an l-term arithmetic progression in one color (Theorem 10.3.8).
(a) Use the existence method to prove that w(l , ) ≥ (l l−1)1/2 .
(b) Use the Local Lemma to prove that w(l , ) ≥ (el)−1 l−1 . (Comment: When l is
prime, there is a construction for w(l , 2) > l2 l using finite fields.)
686 Chapter 14: The Probabilistic Method
14.2.23. (♦) Let G be a digraph in which every vertex has outdegree ¾ and indegree ¾ . Let
r = ⌊ ¾/(2 .25 + 2 ln ¾)⌋ . Partition V(G) into r nonempty sets V1 , . . . , Vr by an appropriate
experiment. Use the Local Lemma to prove that with positive probability every vertex
has a successor in the set containing it. Conclude that every ¾-regular directed graph
has a family of r pairwise disjoint cycles. (Hint: Be careful to ensure that V1 , . . . , Vr
are nonempty. Comment: Alon [1996] proved that +(G) ≥ guarantees /64 pairwise
disjoint cycles (see also Alon–McDiarmid–Molloy [1996]), later improved to /18 (Bucić
[2018]). Bermond–Thomassen [1981] conjectured that /2 can be guaranteed, proved for
tournaments in Bang-Jensen–Bessy–Thomassé [2014].)
14.2.24. Let L be a -uniform list assignment for a graph G. Color vertices uniformly at
random from their lists, independently. For each edge xy, let A x y be the event that x and
y receive the same color. Determine what is needed for the Symmetric Local Lemma to
guarantee a proper coloring from the lists. How useful is this result? (Molloy–Reed [2002])
14.2.25. Let (n , r, s) be the minimum number of colors on E(K n) so that every copy of
K r has at least s colors. Let (n , r, s) be the minimum number of colors on E(K n ,n) so that
every copy of K r,r has at least s colors. Use the Local Lemma to prove the following.
(a) (n , r, s) ≤ cr,s n(r−2)/[(2)− s+1] . (Erdős–Gyárfás [1997])
r
14.2.26. Let H be a hypergraph in which every edge has size at least 3 and each edge of H
intersects at most ar (other) edges of size r. Use the Neighborhood Local Lemma to prove
that if ∑ ar 2−r ≤ 18 , then H is 2-colorable. How would this condition need to change to
obtain the conclusion from the Symmetric Local Lemma? (Molloy–Reed [2002])
14.2.27. Weighted Neighborhood Local Lemma (Molloy–Reed [2002]).
(a) Let A1 , . . . , A n be events in a probability space. For each i, let Di ⊆ [n] − {i} be such
that Ai is mutually independent of {Aj : j ∈ / Di ∪ {i}}. Let and t1 , . . . , t n be real numbers
such that 0 ≤ ≤ 14 and ti ≥ 1 for all i. Prove that if (Ai) ≤ ti and ∑ j ∈ D (2 )tj ≤ t2i for all
i
i, then (⋂i=1 Ai ) > 0. (Hint: Mimic the proof of Theorem 14.2.20, with xi = (2 )ti .)
n
(b) Let H be a hypergraph in which every edge has size at√least 3 and each vertex of
H lies in at most bi edges of size i. Prove that if ∑ bi 2−i/2 ≤ 1/(6 2), then H is 2-colorable.
“ALMOST ALWAYS”
In (n , 12 ), all graphs with vertex set [n] are equally likely. When property Q
holds with high probability in (n , 12 ), we say “almost every graph satisfies Q” .1
We often shorten “with high probability” to “whp”.
Because we often measure running times of algorithms in terms of the num-
ber of vertices and number of edges, we may prefer to control the number of edges.
This suggests making the n-vertex labeled graphs with m edges equally likely.
Applications seem more natural in the uniform model. For example, we ask
“in terms of n, how many edges are needed to make a graph almost surely con-
nected?” rather than “in terms of n, what edge probability makes a graph almost
surely connected?” However, calculations are harder in the uniform model.
Fortunately, the binomial model approximates the uniform model when n is
large and m = p(2n). The proof requires detailed study of the binomial distribu-
tion. A graph property Q is convex if G satisfies Q whenever F ⊆ G ⊆ H and
both F and H satisfy Q.
Here X is the sum of ( n2) indicator variables, say X i for the ith vertex pair
{x , y}, with X i = 1 when x and y have no common neighbor. Since n − 2 vertices
must fail, (X i = 1) = (1 − p2)n−2 and (X) = (n2)(1 − p2)n−2 . When p is constant,
(X) → 0, and whp G p has diameter 2 (we will see that much smaller p suffices).
We generalize further in the next theorem.
v
•
S T
THRESHOLD FUNCTIONS
With constant edge probability, random graphs are dense, with many more
edges than needed to be connected. To improve Theorem 14.3.7 and Example
14.3.9, we want to make p(n) smaller while still having G p connected whp. A
closer look at the computation in Example 14.3.9 shows that we can still guaran-
tee (X) → 0 when p(n) is much smaller. To make the discussion precise, we need
another numerical lemma.
Since np2 → 0, the second factor tends to 1, and we obtain (1 − p)n ∼ e−np.
Section 14.3: Moments and Thresholds 691
1 2− c
expression simplifies to (X) ∼ 2 n . If c > 2, then still (X) → 0.
By parametrizing the probability to simplify the asymptotic formula for the
expectation, we have shown that G p has diameter 2 whp for a much smaller edge
probability than before (and thus a much smaller number of edges in the uniform
model). This strengthens the result.
Although (X) → ∞ suggests that (X = 0) → 0, this is not always true.
For example, (X) → ∞ when (X = 0) = .5 and (X = n) = .5. To obtain
(X = 0) → 0, we must show that the probability is not dispersed like this.
(X)2 → 1.
2
2
Proof: Applied to the variable (X − (X))2 and the value t2 , Markov ’s Inequality
yields ((X − (X))2 ≥ t2 ) ≤ ((X − (X))2 )/t2 . Written as ( | X − (X)| ≥ t) ≤
Var(X)/t2 , this is Chebyshev’s Inequality. Since
((X − (X))2 ) = ( X 2 − 2 X (X) + ((X))2 ) = (X 2) − ((X))2 ,
the inequality is ( | X − (X)| ≥ t) ≤ ( (X 2) − (X)2 )/t2 . Since X = 0 only when
| X − (X)| ≥ (X), setting t = (X) completes the proof.
Intuitively, when the standard deviation grows more slowly than the expec-
tation, all probability is pulled away from 0, and (X = 0) → 0.
A connected graph has no isolated vertices, so a connectedness threshold is no
smaller than a threshold for no isolated vertices. In fact, the thresholds are the
same (Bollobás–Thomason [1985]); later we will suggest intuitively why. Proving
the latter threshold is easier, because the indicator variables for isolated vertices
have very simple distributions. We need an approximation to (1 − p)n .
Proof: Let X count the copies of H that appear. There are n(¾) ways to map V(H)
into [n]. Each copy of H arises under A of these maps, where A is the number of
automorphisms of H , so there are n(¾)/A possible copies. Note that A depends on
H but not on n. Let X i be the indicator variable for the occurrence of Hi , the ith
copy of H , so X = ∑ X i . Since H has l edges, (X i = 1) = pl . Because ¾ is fixed,
(X) ∼ n¾ pl/A.
Setting p(n) = cn n−¾/l yields (X) ∼ cln/A. Hence (X) → 0 when cn → 0
and (X) → ∞ when cn → ∞. By the Second Moment Method, it remains only
to prove that (X 2) ∼ (X)2 when cn → ∞. Again (X 2) = (X) + ∑i
= j (X i X j ).
(Note that (X) ∈ o( (X)2) when (X) → ∞.)
The summands are not equal; (X i X j ) depends on Hi ∩ Hj . Group terms by
the intersection, H . Let EH denote the sum of the contributions to ∑ (X i X j )
from all pairs (i , j) with Hi ∩ Hj ∼
= H . When H has r vertices and s edges, the
number of edges needed to create Hi and Hj is 2l − s, so (X i X j ) = p2l− s .
Hi H Hj
The number of ways to extend H into copies of H on these sets depends only on
H and H , not on n or p; call it H . Thus EH is asymptotic to H n2¾−r p2l− s .
Since 2s/r is the average degree of H , and H is balanced, we have r/s ≥ /l
(including when s = 0). Hence pnr/s ≥ pn¾/l → ∞ when cn → ∞. Thus n−r p− s →
0, and EH ∈ o( (X)2) for H
= ∅. Since the number of such subgraphs H is
constant (independent of n), we obtain (X 2) ∼ (X) + E∅ ∼ (X)2 .
This result generalizes for all H. Let d(H) = | E(H)| / | V(H)| ; the ratio is the
density of H. Let (H) = max F ⊆ H d(F); we call (H) the maximum density of
H. The density and maximum density are equal when H is balanced, and then
p = n−1/Ô(H) is the threshold for appearance of H. Every graph H has a balanced
subgraph F such that d(F) = (H). When pnÔ(H) → 0, whp G p has no copy of F ;
hence it also has no copy of H. In fact, always p = n−1/Ô(H) is a threshold function
for the appearance of H (Exercise 13).
3. The expression (X 2) ∼ (X)2 does not say that the difference approaches
0, only that the difference is in o( (X)2). The notation (X 2) → c makes sense
only when c is a constant.
4. Linearity of expectation is valid for sums of random variables, not prod-
ucts. When X = ∑i=1 X i and each X i is an indicator variable, (X 2) = (X) +
n
∑i
= j (X i X j ). When they are independent and identically distributed, (X i X j ) =
(X i) (X j ) and (X 2) = (X)2 + n(n − 1)(E(X i))2 . In general, analysis of (X i X j )
depends on how X i and X j interact.
5. When proving (X 2) ∼ (X)2 , isolating the terms that produce (X)2 can
simplify the treatment of the remainder, because it suffices to prove that the total
contribution of the rest has lower order.
CONVERGENCE OF MOMENTS
Sometimes we can say much more about the distribution of a counting vari-
able X . Beyond the second moment, suppose that we can determine the rth mo-
ment (X r) asymptotically. Usually, the sequence of moments determines the dis-
tribution (see Exercise 29). Determining the moments asymptotically determines
the asymptotic behavior of the distribution, and we can compute lim (X = ¾).
After developing the method, we present two applications. First is a sharp
threshold for the disappearance of isolated vertices. What happens “at ” the
threshold for a monotone property Q, when (Q) does not tend to 0 or 1? When
occurrence of Q is equivalent to X = 0 for some counting variable X , being at
the threshold can mean introducing a parametrized lower-order term in the edge
probability p(n) to study (X = 0) more precisely. We may obtain not only (Q)
in terms of that parameter, but in fact the entire asymptotic distribution of X .
The second application gives us a way to generate random d-regular graphs.
Although whp the minimum and maximum degree of G p are relatively close, the
random graph is decidedly not regular, so we need another method.
We will use two other types of moments.
binomial moment Sr(X) is ∑ (X i1 · · · X ir ), where the sum is taken over all
r-subsets of the index set [m].
Proof: The binomial moment Sr(X) is itself the expectation of a sum of indi-
cator variables: Sr(X) = ∑| T |=r (X i = 1 for i ∈ T). The value of X j for j ∈
/
T is unimportant, so we allow all possibilities for such X j . Hence Sr(X) =
∑| T |=r ∑S⊇ T (AS), where AS is the event that X i = 1 if and only if i ∈ S.
Section 14.3: Moments and Thresholds 695
When | S| = j , the event AS appears (rj ) times in the double sum. Also
∑|S|= j (AS) = (X = j). Thus
m
∑ ( r )(X = ∑ j(r)(X =
j 1 1
Sr(X) = j) = j) = Er(X).
r! r!
j =r j
Finally, given the expression for Sr(X) in terms of (X = j), the claimed for-
mula for (X = ¾) follows from the Inclusion-Exclusion Formula for the number
of elements belonging to exactly ¾ of the events of the form X i = 1. Both sides of
the equality are normalized by the same amount. Alternatively, one can just sub-
stitute the formula for Sr(X) into the claimed expression to show that it equals
(X = ¾) (Exercise 30).
In applying Lemma 14.3.21, typically m → ∞ as n → ∞. We do not hope to
compute (X = ¾) for a given m; we only seek limm→∞ (X = ¾). Fortunately, we
can approximate the alternating sum by truncation.
Proof: Letting Ni = (X = i), we have Sr = ∑ j =r (rj )Nj . Consider a truncation
m
of the sum N¾ = ∑r=¾ (−1)r−¾ (¾r )Sr up to the term r = t. Using the expression for
m
The inner sum has the form s(a , b) = ∑ l=0(−1)l (bl), where l = r − ¾ , a = t − ¾ ,
a
The sign of the error to obtain the truncation from Nj depends on the parity of
t − ¾ , as claimed.
this series, choose q large enough to make the error at most . Since q is now
fixed, we can choose M large enough so that for all r < + 2q simultaneously
−1
we have | Sr(X) − r/r!| < 2q+1 (r ) for m > M. The Bonferroni inequalities now
imply for m > M that (X = ) differs from ∑r= (−1)r− (r ) r! by at most .
+2q−1 r
#
Now ###(X = ) − e − #
/ !### < 2 for m > M. Finally, let → 0.
# #
The technique used in Theorem 14.3.24 was introduced by V. Brun in 1915;
in number theory it is known as Brun’s sieve. The probabilistic interpretation
was initiated by Bonferroni. In probabilistic combinatorics, some call this the
Method of Moments (Janson–Łuczak–Rucinski [2000, p. 140]) or the Conver-
gence of Moments Method. Earlier, Spencer called it the Poisson Paradigm
(see Alon–Spencer [1992]).
We can now sharpen the threshold for the disappearance of isolated vertices.
Recall that X = ∑ X i , with a variable for each vertex. The term in Sr(X)
for a set of variables T is the expectation that the vertices corresponding to T
in G p have no incident edges. Hence Sr(X) = (nr)(1 − p)r(n−r)+r(r−1)/2 . For fixed r,
we use p → 0 to conclude that constant powers of (1 − p) tend to 1, obtaining
Sr(X) ∼ (n(1 − p)n)r/r!. For constant p, this tends to 0, but with p = (ln n + x)/n,
we have n(1 − p)n → e− x . Hence Sr(X) → Þr/r!.
Proof: The probability that G is simple is the product of the probability that G
has no loop and the probability that G has no multiedge given that it has no loop.
Let X be the number of loops in G. The probability of a particular loop aris-
ing as an edge joining two specified vertices vi and vj in a specified group v is dn1−1 ,
since we can generate the graph by first picking the mate of vi . The number of
these variables is n(d2 ), so (X) = d−2 1 1−1/(dn)
1
. Thus (X) → d−2 1 .
Let Þ = d−2 1 . If Sr(X) → Þr/r!, then X is asymptotically Poisson distributed
with mean Þ , and the probability of having no loops is e−(d−1)/2 . Pick r of the indi-
r
cator variables for loops. The probability that all these loops occur is ∏i=1 dn−12i+1 .
¾
The number of choices of ¾ such pairs from distinct groups is n(¾)(d2 ) . There can
also be ¾ such pairs with a group contributing more than one loop, but there are
only O(n¾−1) such selections. Thus Sr(X) ∼ ( d−2 1 )¾ , as desired.
Given that no loops occur, let Y count the pairs of edges with the same end-
points that arise. When two vertices are selected from each of two groups, they
2
form a multiedge with probability 2 dn1−1 dn1−3 . There are (n2)(d2 ) such choices of
(d−1)2 (d−1)2
four vertices, so (Y) = ( d−2 1 )2 1−1/(dn)
1 1
1−3/(dn)
→ 4 . Letting ë = 4 , an ar-
gument like that above yields Sr(Y) → ë /r!. Thus (Y = 0) = e
r −(d−1)2 /4.
Finally, e−(d−1)/2 e−(d−1) /4 = e−(d −1)/4 .
2 2
698 Chapter 14: The Probabilistic Method
GRAPH EVOLUTION
We can generate random graphs with vertex set [n] by iteratively adding an
edge that is equally likely to be any edge not already present. This yields the
same probability space as the uniform model when we have added m edges.
This procedure is called the random graph process, introduced in Erdős–
Rényi [1959]. The likely effect of a new edge on the present structure gives intu-
ition about the structure of random graphs, which is usually correct.
A stage of evolution is a range for m(n) (or p(n)) where the properties of the
typical graph do not change much. We describe such stages. Verification uses the
techniques we have developed, but the computations can be difficult.
14.3.30. Remark. Stages of evolution. With many vertices and few edges, each
new edge is likely to be isolated. Later, with small components, each new edge is
likely to join two components, thereby avoiding cycles (see Exercise 6).
Let t¾ (n) = n−¾/(¾−1) . If p/t¾ → ∞ but p/t¾+1 → 0, then whp every tree on
¾ vertices appears but none on ¾ + 1 vertices appears. This uses the fact that
if A1 , . . . , Ar each happen whp, and r is constant, then whp all of A1 , . . . , Ar
happen. For a single tree, Theorem 14.3.18 applies.
When p = c/n with 0 < c < 1, the number of cycles is asymptotically Pois-
son distributed with constant mean. With only a few cycles and all components
small, we still expect the next edge to join two components or create a cycle in an
acyclic component. Whp the largest component has about ln n vertices, and each
component has at most one cycle. Most vertices still lie in acyclic components.
As c reaches and passes 1, the structure of G p changes radically. There is a
double jump: the structure is significantly different for c < 1, c ∼ 1, and c > 1.
At pn = 1, the Second Moment Method guarantees that whp G p has a cycle. Also,
the order of the largest component jumps from log n to n2/3 . With c = 1 + O(n−2/3),
whp a giant component appears with a linear number of vertices, the other com-
ponents are small, and there is a cycle with three crossing chords (nonplanar).
Next, p grows to c lnn n . For c < 1, whp G p has isolated vertices. When c > 1,
they disappear. Edges added to a disconnected graph may go within a component
or connect two. When all components are small, whp new edges join components.
After a giant component emerges, new edges tend to lie within it or join it to an-
other component. The components most likely to be absorbed are the larger ones.
Therefore, as c passes through 1 the last remaining small components swallowed
by the giant component are isolated vertices, making the threshold for connect-
edness the same as the threshold for disappearance of isolated vertices.
With c > 1, suddenly whp G p also has a spanning cycle. Minimum degree ¾
(and the spanning cycle when ¾ = 2) has a threshold that involves a lower order
term: lnnn + (¾ − 1) ln ln n
n . This is closely related to the result in Exercise 24.
Section 14.3: Moments and Thresholds 699
The last stages of evolution are pn/ln n → ∞ with p = o(1), and then constant
p. When p = c lnn n with c → ∞ , increasing density makes evolutionary viewpoint
less valuable. We give less study to probability thresholds and concentrate on the
likely value of graph parameters. When p = 1/2, properties of the random graph
can lead to fast algorithms that whp solve a difficult problem.
Similarly, some NP-hard problems are trivial for random graphs. Although
(G) ≤ (G) ≤ (G)+1 for every graph G (Vizing [1964]), deciding between these
values is NP-hard (Holyer [1981]). Vizing proved that (G) = (G) + 1 requires
at least three vertices of maximum degree. By the uniqueness of the vertex of
maximum degree in G 1/2 , Erdős–Wilson [1977] observed that whp (G) = (G).
Often the distribution of a graph parameter over (n , p) is nontrivial but
still is highly concentrated. Given a parameter , we want to show (G p) ∼ (n)
whp. We often write (G p) = (1 + o(1)) (n), meaning that for any positive ,
whp (G p) is between (1 − ) (n) and (1 + ) (n). Another way of expressing this
extends the notion of threshold function from Definition 14.3.13.
The exercises contain examples for various random structures. Here we study
connectivity, independence/clique number, and chromatic number in graphs.
What about clique number? For fixed ¾ , we have derived probability thresh-
olds for the appearance of a ¾-clique, but for constant p the clique number grows
with n. Determining the size of the largest clique in an input graph is NP-
complete, but for the random graph we can guess the correct value with high
probability without looking at the graph! Amazingly, for constant p, whp G p has
one of two possible values for the clique number (as a function of n). Indeed, for
each ¾ ∈ there is a range of n where the clique number is highly likely to be
¾ . The approach is to find bounds on the function r(n) such that whp G p has an
r-clique and whp has no (r + 1)-clique.
14.3.34. Theorem. (Matula [1972]) For constant p and fixed > 0, whp G p
has clique number between ⌊ d − ⌋ and ⌊ d + ⌋ , where d = 2 log1/p n −
2 log1/p log1/p n + 1 + 2 log1/p(e/2).
Proof: (sketch) Let b = 1/p. If X r is the number of r-cliques, then (X r) = (nr)p(2).
r
√
Since r! ∼ (r/e)r 2 r (Stirling ’s Formula),
(X r) ∼ (2 r)−1/2( en
r p
(r −1)/2)r
.
If r → ∞ and (enr−1 p(r−1)/2) ≤ 1, then (X r) → 0. To obtain such r, take
logarithms (base b) in the inequality and solve for r to find
r ≥ 2 logb n − 2 logb r + 1 + 2 logb e.
This is approximately equivalent to r ≥ d(n) as defined above. More precisely, if
r > d + , then whp G p has no clique of size r.
The lower bound uses the Second Moment Method, as in Theorem 14.3.18,
but the dependence of r on n makes the analysis more difficult. The expectation
of X r2 sums the probability of common occurrence for all ordered pairs of r-cliques.
This probability depends only on the number of common vertices, so
r
n r n − r 2(2r)−(¾2)
(X r2) = ( ) ∑ ( )( )p .
r r−
¾ =0
We want to show that the term for = 0 dominates. Hence we write
−1 −1
(X r2)/ (X r)2 = n + n , where n = (nr) (n−r r) and n = (nr) ∑r¾=1 (¾r )(rn−−¾r)b(2).
¾
Proof: For the lower bound, use independent sets as suggested above. For the
upper bound, let h = ⌊(1 + )n/log b n⌋ . We show that greedily coloring v1 , . . . , vn
in order whp uses at most h colors on G p . Among the n-vertex graphs using more
colors, let B m be the set such that vm is the first vertex to use color h + 1. We
prove ∑m=1 (B m) → 0 as n → ∞.
n
Let bn = [1 − (1 − p)n/h ] h . Given G m , the probability that the full graph G belongs
to B m is at most bn . Since the bound holds for each G m , we conclude that (B m) <
bn . This holds for all m, so ∑m=1 (B m) < nbn .
n
yields (1 − p)n/h
= n . The logarithm of the bound is log n − cn1−1/c/logb n. It
− 1/c
tends to −∞ for c > 1, so the bound on the probability that the greedy algorithm
uses more than h colors tends to 0.
14.3.36. Remark. Some properties known to hold for almost every graph occur
in no known examples! For the known lower bound on diagonal Ramsey numbers,
702 Chapter 14: The Probabilistic Method
there is still no construction of a sequence of graphs such that (G) < log√2(| V(G)|)
and (G) < log√2(| V(G)|), even though almost every graph has this property.
The point is that the range from a billion to infinity is much bigger than
from 1 to a billion. A statement that is true for almost every graph may not be
true for many graphs that are small enough to look at. The probabilistic method
gives good results when almost every graph has a desired property, but even then
“almost every” is only asymptotic.
EXERCISES 14.3
14.3.1. (−) Let H be a graph. For constant p, prove that whp G p contains H as an induced
subgraph.
14.3.3. (−) Let ⟨ ⟩ be any sequence tending to ∞ , fix p ∈ (0 , 1), and let b = 1/(1 − p). Prove
that whp the first log b(n n) vertices in [n] form a dominating set in the graph G p .
14.3.4. (−) Determine the smallest connected graph that is not balanced.
14.3.5. For fixed p, and ∈ o(n/ ln n), prove that whp G p is -connected.
14.3.7. (♦) By Theorem 13.2.19 or Theorem 14.2.5, we know ex (n; K r,r) < cn2−1/r for some
constant c. Use the Deletion Method to prove ex (n; K r,r) > cn2−2/(r+1) for some constant c
when n is large. (Erdős–Spencer [1974, p. 61])
14.3.8. (♦) With p = 12 , whp G p has a perfect matching when n is even. Let v1 , . . . , v2¾ be
the vertices. For rounds, iteratively match the least-indexed vertex that remains to a
remaining neighbor, if any exists; otherwise pair it with an arbitrary remaining vertex.
Delete these two vertices and continue. Prove that this “Method of Deferred Decisions”
finds a perfect matching with probability more than 1/3. (Molloy–Reed [2002, p. 20])
14.3.9. For p = 1/n and fixed > 0, show that whp G p has no component with more than
(1 + )n/2 vertices. (Hint: Bound the probability of such a component by the probability
of another event whose probability tends to 0.)
14.3.10. Suppose that years have t days and that each person’s birthday is random among
them. Let (s , t) be the probability that no two among s given people have the same birth-
day. Prove that (s , t) → 0 as s → ∞ if t ∈ o(s2). (Comment: When t = cs2 , (s , t) tends
to a constant depending on c.) (Griggs [1998])
Exercises for Section 14.3 703
14.3.11. (♦) Find a small window around p = 1/2 such that above it whp G p has at least
2 (2)
1 n
edges, below it whp G p has at most 12 (2n) edges, and within it neither statement holds.
14.3.12. Derive a “local” probability threshold in the binomial model for the property “Ev-
ery edge belongs to a triangle” (the property is not monotone, but within an interval for p
there is a threshold). (Hint: Let X be the number of edges of G not in triangles.)
14.3.13. Extend the Second Moment argument of Theorem 14.3.18 to prove that n−1/Ô(H)
is a threshold function for the appearance of H as a subgraph of G p , where (H) is the
maximum density of H . (Bollobás [1981a], Ruc ínski–Vince [1985])
14.3.14. A random tournament T with vertex set [n] is generated by orienting each edge
i j as i → j or j → i independently with probability 12 . A king in a tournament is a vertex
such that every other vertex can be reached from it by a path of length at most 2. By
Proposition 5.2.18, every tournament has a king. Prove that whp in T every vertex is
a king. (Palmer [1985]) (Comment: Moon–Moser [1962b] proved that whp T is strongly
connected, with probability of failure between (2n − 1)/2 n−1 and (2n + 1)/2 n−1 .)
14.3.16. For n-vertex tournaments, let Q¾ be the property that every set of vertices has
a common successor. Prove that if = lg n − (2 + ) lg lg n, where is a positive constant ,
then whp a random n-vertex tournament satisfies Q¾ . (Erdős [1963])
14.3.17. (♦) With p = (1 − ) ln n/n, find a large m such that whp G p has at least m isolated
vertices. In particular, what m(n) results from Chebyshev’s Inequality?
14.3.18. For fixed p, find a threshold for the maximum such that whp every vertices
in G p have a common neighbor.
14.3.19. Let Q¾ be the following graph property (in (n , p)): for every choice of disjoint
vertex sets S, T of size , there is an edge with endpoints in S and T .
(a) For constant , obtain a candidate for a threshold probability for property Q¾ . Ex-
plain what is needed to prove that it is a threshold for occurrence of Q¾ . (It may be helpful
to write it as a threshold on 1 − p.)
(b) For = c lg n, prove that almost every graph (edge probability 12 ) has property Q¾
if c > 2. (Comment: Thus under every vertex ordering, some edge will be “stretched” to
length at least n − 2 log n; see “bandwidth” in Section 16.2.)
14.3.20. (♦) Prove that a longest constant string in a list of n random heads and tails has
length (1 + o(1)) lg n. That is, for > 0, the probability that a random list has at least
(1 + ) lg n consecutive identical flips tends to 0, but the probability that it has at least
(1 − ) lg n consecutive identical flips tends to 1.
14.3.22. (♦) A computer has n messages to send along a channel. Messages are dropped
with constant probability p, independently. The computer chooses the next message to
transmit uniformly at random from among the n messages. Determine a threshold for the
number of transmissions so that whp at least one copy of each message is received.
14.3.23. Each box of cereal contains one of n prizes, equally likely, independently. Obtain
a very accurate threshold for the number of boxes that should be opened to obtain at least
two copies of each prize. In particular, n ln n is not sufficiently accurate; adjusting a lower-
order term changes the situation from almost-certain failure to almost-certain success.
14.3.24. (+) Let º be a random function from [m] to [n]; all nm functions are equally likely.
Let Q be the property that each element of [n] occurs more than ¾ times in the image of
º . Prove that n ln n + cn ln ln n with c = ¾ is a threshold on m for Q.
(Hint: Prove that when p = o(1) and mp → ∞ and ¾ is constant , the probability of at
most ¾ successes in m coin flips with success probability p is asymptotic to the probability
of exactly ¾ successes. Comment: When ¾ = 0, this problem extends the Coupon Collector
Problem (Exercise 14.1.30) by narrowing the threshold.)
14.3.25. (♦) Suppose that each trial produces one of n coupons, uniformly and indepen-
dently. Prove that after n(ln n + x) trials, the number of coupons that have never been seen
has a Poisson distribution with mean e− x .
14.3.26. (♦) For a real constant c, determine the asymptotic probability that a graph
drawn from (n , c/n) has no triangle.
14.3.27. For fixed ¾ ∈ and x ∈ , consider (n , p) with p = 1 − ( ¾ lnnn+ x )1/¾ . Determine
the asymptotic expected number of dominating sets of size ¾ . What does this suggest about
the probability of having a dominating ¾-set , and what would be needed to prove it?
14.3.28. Obtain a sharp threshold for diameter at most 2. In particular, find p(n , x) such
that (diam (G p) ≤ 2) → e− Þ , where Þ is a function of the parameter x, and Þ → 0 as x →
∞ and Þ → ∞ as x → −∞. (Hint: Drop lower-order terms when discussing asymptotics of
the appropriate random variable.)
14.3.29. The moment generating function of a nonnegative integer-valued random
variable is the generating function ∑ an x n , where an = (X n). Show that if the moment
generating function (et X ) is finite for some interval of t around 0, then knowing all the
moments of a distribution of X is equivalent to knowing the distribution.
14.3.30. For X = ∑i=1 X i , let Sr(X) be the rth binomial moment of X (Definition 14.3.20).
m
Given Sr(X) = ∑ j =r ( rj ) (X = j) as in Lemma 14.3.21, use direct substitution and compu-
m
tation to prove (X = ¾) = ∑r=¾ (−1)r−¾ (¾r ) Sr(X).
m
⎧
⎪ 1 if b = 0 ,
⎪
14.3.31. Prove ∑ l=0(−1)l (bl) = ⎨ 0
a
if 0 < b ≤ a ,
⎪
⎪ a b−1
⎩ (−1) ( a ) if b ≥ a .
14.3.32. Let p = c/n for some constant c.
(a) Prove for s < n(20c2) that whp no set of s vertices in G p induces at least 2s edges.
(b) Prove that whp (G) ≤ ln n/ln ln n.
(c) Prove that whp the vertices of degree at least 32lnlnlnnn form an independent set.
14.3.33. (♦) Determine the asymptotic probability that a random d-regular graph gener-
ated using the pairing model has no triangle.
14.3.34. (♦) In the pairing model, one can generate the random matching sequentially,
picking at each step any desired point to initiate the next pair. Use this with d = 2 to prove
that in a random 2-regular n-vertex graph the expected number of cycles is asymptotic to
1
2
ln n. Compare with Theorem 3.1.20. (Alon–Prałat–Wormald [2008])
Exercises for Section 14.3 705
14.3.36. (♦) In the d-regular pairing model on n vertices, prove that the number of ver-
tices in cycles of length at most log d−1 nn is o(n), where n is any sequence tending to ∞.
(Hint: Explore the graph from a given vertex u to get a bound on the expected number of
edges that can yield short cycles through u.)
14.3.37. Consider the model (n , p) with p constant. Let r = c log1/p n, where c is con-
stant; in this range, we can approximate (nr) by (ne/r)r . For c > 2, prove that whp G p has
no r-clique. State what is needed to prove that when c < 2, whp G p has an r-clique.
14.3.38. (♦) The strength of a theorem A ⇒ B in a probability space is (A)
(B) . A theorem
with strength 0 is useless, since the hypothesis never holds; a theorem with strength 1
characterizes its conclusion. (Palmer [1985, pp. 84–85])
(a) Use the Second Moment Method to prove that almost every graph fails Ore’s Con-
dition (Corollary 7.3.7) for spanning cycles, so Ore’s Theorem has asymptotic strength 0.
(b) Prove asymptotic strength 1 for the Chvátal–Erdős Theorem (Theorem 7.3.14).
(Comment: Chvátal’s Condition(Theorem 7.3.11)cannot hold for both G and G (Kostochka–
West [2006]; Exercise 7.3.42). Thus Theorem 7.3.11 has strength at most 12 for each n. It is
stronger than Ore’s Theorem, but whether its asymptotic strength is nonzero is unknown.)
14.3.39. The boxicity of G is the least number of interval graphs whose intersection is G.
The interval number of G is the least t such that G is the intersection graph of subsets
of composed of at most t intervals. Prove that the interval number and boxicity of the
random graph (G1/2) are each at least n/(4 lg n). (Erdős–West [1985])
14.3.40. Suppose that 0 < p < 1 and that 1 , . . . , r are nonnegative integers summing
to m. Prove that ∏i=1 [1 − (1 − p)i ] ≤ [1 − (1 − p)m/r ]r .
r
14.3.41. Given the statements in Example 14.3.31 about the behavior of vertex degrees
in (n , 12 ), prove that the isomorphism algorithm there runs in time O(n2) for n-vertex
graphs and works whp. Assume that n numbers can be sorted using O(n log n) pairwise
comparisons. (Babai–Erdős–Selkow [1980])
14.3.42. (♦) Perfect matchings in bipartite graphs. Fix > 0. Let G be a random subgraph
of K n ,n , with parts A and B and independent edge probability (1 + ) lnnn . Say S fails if
| N(S)| < | S|. By Hall’s Theorem, G has a perfect matching if and only if no set fails.
(a) Prove that if < 0, then whp G has no perfect matching.
(b) For a minimal failing set S, prove | N(S)| = | S| − 1 and G[S ∪ N(S)] is connected.
(c) Prove that if G has no perfect matching, then A or B contains a failing set with at
most ⌈ n/2⌉ elements.
(d) If r, s ≥ 1, then K r,s has r s−1 sr−1 spanning trees. Use this, part (b), part (c), and
Markov’s Inequality to prove that if > 0, then whp G has a perfect matching. (Hint: A
summation in the bound on the expected number of minimal failing sets can be bounded
by a geometric series.)
14.3.43. An X , Y -bigraph G with | X | = | Y | = n is an (n , , , d)-expander if G is regular
of degree d and | N(S)| ≥ | S| whenever | S| < n. Expanders of constant degree permit
rapid widespread communication using only a linear number of edges.
(a) Consider an experiment in which d -subsets of [n] are chosen at random, and let
X be the size of the union. Prove that (X ≤ l) ≤ (nl)( nl )d .
(b) Use the probabilistic method to prove that if < 1, then there is a constant
d such that , for all n sufficiently large, an (n , , , d)-expander exists. (Hint: Using a
suitable probability space on d-regular multigraphs, bound the probability that some set
fails the expansion property by a geometric series. Then choose d so that the sum will be
less than 1. Use (n) < (ne/) .)
706 Chapter 14: The Probabilistic Method
14.4.2. Theorem. Every subset of [n] having distinct sums has size at most
lg n + 1
2 lg lg n + O(1).
¾
Proof: Let {a1 , . . . , a¾ } be a subset of [n] with distinct sums. Let s = ∑i=1 ai . If
¾ is near the bound lg n + lg lg n + 1, then ¾ n is not much bigger than 2¾ , which
suggests that there must be both small sums and sums near s. Our aim is to
show to the contrary that when the sums are distinct, most of them lie in a much
smaller interval near the middle of [s]. This will improve the upper bound.
Since the 2¾ sums are distinct, we can choose uniformly from the sums by
choosing a random subset of a1 , . . . , a¾ . Using each with probability 12 , indepen-
dently, let X be the sum of the elements selected. By linearity, (X) = s/2.
To study the variance, write X as a linear combination of indicator variables:
¾
X = ∑i=1 ai X i . Since (X i2) = 12 and (X i X j ) = 14 ,
¾
1 2
(X 2) =
2 ∑ a2i + 4 ∑ ai aj .
i=1 i< j
¾ ¾
On the other hand, (X) = 1
2 ∑i=1 ai , so (X)2 = 14 ∑i=1 a2i + 24 ∑i< j ai aj . The
¾
difference is 14 ∑i=1 a2i . Since ai ≤ n for all i, we have Var(X) < 4 n ¾.
1 2
Using
√
t = 2 Var(X) in Chebyshev ’s Inequality yields
√
(| X − (X)| ≥ n ¾ ) < 14 .
For binomial random variables, the Chernoff Bound is much tighter on the
probability of large deviations from the mean. This leads to results that cannot
be proved by Chebyshev ’s Inequality. First, Chebyshev for binomial variables:
Using the exponential to improve the tail bound is due to Bernstein in the
1920s. Chernoff [1952] strengthened the analysis for binomial random variables.
14.4.4. Theorem. (Chernoff Bound; Chernoff [1952]) If the variable X has the
binomial distribution Bin(n , p) with 0 < p < 1 and t > 0, then
( X − np ≥ nt) ≤ e−2nt 2
and ( X − np ≤ −nt) ≤ e−2nt 2
.
Proof: It suffices to prove the upper tail bound. For the lower, we then apply the
bound on (X − n(1 − p) ≥ nt), where X = n − X .
Let q = 1 − p. If t ≥ q, then (X − np ≥ nt) = 0, so we may assume t < q. Let
m = n(p + t). For u > 0, Markov ’s Inequality yields
(X ≥ m) = (euX ≥ eum) ≤ (euX )/eum .
To obtain the best bound, we will pick u to minimize (euX )/eum . Note that X =
∑i=1 X i , where X1 , . . . , X n are independent 0 , 1-variables with (X i = 1) = p.
n
Other variations are more useful when the difference from the mean is larger
or when p is small. Another upper tail bound is
(X ≥ + s) ≤ e− s /(2
2
+ s) or (X ≥ (1 + ) ) ≤ e− /(2+). 2
For small deviations from the mean, combining alternative upper and lower
bounds yields (| X − | ≥ ) ≤ 2e− /3 , valid when ≤ 1.
2
Section 14.4: Concentration Inequalities 709
The Chernoff Bound is much stronger because Chebyshev only uses pairwise
independence, while Chernoff uses the full independence of the trials. Exercise 2
compares them. In essence, Chernoff uses all the moments.
Hoeffding [1963] extended the Chernoff Bound to more general sums of in-
dependent random variables. The crucial step in the proof of Theorem 14.4.4
required independence, but the computation did not essentially require that
X 1 , . . . , X n be integer-valued, identical, or of limited range.
The proof generalizes immediately when (X i = 1) = pi , with p = ∑ pi/n,
because the Arithmetic–Geometric Mean Inequality yields ∏(pi eu + 1 − pi) ≤
[∑(pi eu + 1 − pi)/n] = (peu + 1 − p)n . Extending to variables in the interval [0 , 1]
n
uses the convexity of the exponential function, and then arbitrary ranges can be
introduced by transforming variables.
(X − ≥ s) ≤ e−2s / ∑ (b −a ) .
2 2
¾ ¾
n n
With q = 1 − p, we now have (X ≥ n(p + t)) ≤ ( qe+u(ppe+t) ) , which is exactly the
u n
bound we had in the proof of Theorem 14.4.4. The argument to show that the
right side of this inequality is at most e−2nt is exactly the same as there.
2
Although the distribution need not be symmetric around the mean, letting
X i = 1 − X i and applying the bound on the upper tail for ∑ X i again yields the
bound on the lower tail for X .
The extension to arbitrary ranges is requested in Exercise 11.
We multiply by (nr) to consider all S and obtain an upper bound on the prob-
ability of a K r-subdivision. Since (nr) < nr = er ln n , the exponent in this factor is
√
bounded by c n ln n, which grows more slowly than r(r − 1)t2 , which is linear in
n. Hence the bound on the probability of having a K r-subdivision tends to 0.
The Chernoff Bound also enables us to show that the easy lower bound on
the size of bipartite subgraphs proved in Exercise 14.1.27 is surprisingly sharp.
Finding the largest bipartite subgraph can be viewed as finding the largest edge
cut and is thus also called the max-cut problem; determining the maximum
size is NP-hard. Every graph has a cut with at least half of its edges. In Exercise
⌈n/2⌉
14.1.27, the Existence Method is used to improve the lower bound to m 2 ⌈n/2⌉−1 for
a balanced edge cut, meaning that the two part-sizes differ by at most 1.
Section 14.4: Concentration Inequalities 711
The largest cut in the complete graph K n has size ⌊ n2/4⌋ and is balanced. We
show next that the bound from Exercise 14.1.27 is essentially sharp by obtaining
graphs where every balanced cut has roughly the guaranteed size.
14.4.9. Theorem. Let d and be positive constants with d ≥ (12 ln 2)/ 2 and
< 1. If n > d and n is even, then there is an n-vertex graph with between
(1 − ) d(n2−1) and (1 + ) d(n2−1) edges such that every balanced edge cut has size
between (1 − ) dn 4 and
(1 + ) dn 4 .
Proof: We generate a random graph from (n , p), where p = dn . Let Y be the
number of edges in the graph, and X be the number of edges in a specified bal-
anced cut, so (Y) = d(n2−1) and (X) = dn 4 . Both variables are binomial with suc-
cess probability p. In order to study deviation from the mean, we want to bound
( | Z − (Z)| > (Z)) (for Z ∈ {X , Y }), so we set t = p in Theorem 14.4.4.
Using the simple form of the (two-tailed) Chernoff Bound (Theorem 14.4.4),
14.4.10.* Theorem. Given a d-dimensional range space (P, R) and positive con-
stants and , let S randomly sample (d/2) ln(n/) points from P. With
probability at least 1 − 2 2d , it holds for all q ∈ R that
### q(P) q(S) ###
### − ## ≤ ,
### | P | |S| ####
where q(T) is the number of points in T returned by the query q.
Proof: Let = ⌈(d/2) ln(n/)⌉ , and fix a query q. For the ith random choice si
of a point for S, let X i be the indicator variable for its membership in the box for
712 Chapter 14: The Probabilistic Method
q. Thus q(S) is the sum of ¾ identical Bernoulli random variables with success
probability q(P)/ | P | ; the expectation is ¾ q(P)/ | P | . By the Chernoff Bound,
# #
(####### q(S) − |S| q(P) ###
| P | ###
#>¾ ) ≤ 2e−2¾ = 2 2d n−2d .
2
# #
To complete the result, we show that at most n2d distinct subsets of P can be
returned by queries. A box representing a query can shrink without changing the
answer until each endpoint of each of the d intervals defining it agrees in that
coordinate with some point of the answer set. Doing this identifies a set of at
most 2d points in n (in order to indicate the relevant dimensions, with repetition
allowed) that generates this box by specifying its projections on the axes. There
are fewer than n2d ways to specify this canonical box corresponding to a query, so
there are fewer than n2d sets in the range space. Hence with probability at least
1 − 2 2d all the ranges have sizes approximated within .
MARTING ALES
The expected position of the random walk after n steps is at the origin. The
exact position is the sum of n independent ±1-random variables, so after a simple
transformation the Chernoff Bound tells us that the walk is highly unlikely to be
very far from the origin, in terms of n.
A martingale X 1 , . . . , X n allows dependence of successive variables. How-
ever, if successive positions cannot differ by much, then the final position is
still highly concentrated around its expectation. When the technique applies,
it makes the detailed computation in the Second Moment Method unnecessary
and yields better bounds on tail probabilities. The work is accomplished by
Azuma’s Inequality, also called the Martingale Tail Inequality.√This states that
if | X i − X i−1 | ≤ 1, then the probability that X n − X 0 exceeds n is bounded by
e− /2 . We first prove two lemmas.
2
Section 14.4: Concentration Inequalities 713
The proof for Azuma’s Inequality is about the same as that for the Chernoff
Bound, with additional care involving conditional expectation.
2 (2 ¾)! 2 ¾!
Now we have
√ √ √
( X n ≥ ë n) = (etX n ≥ et ë ) ≤ ent /2− ë t
2
n n
for each t > 0. We obtain the best bound by minimizing√ over t. The exponent
√ is
quadratic; we minimize it by choosing t so that tn − ë n = 0, or t = ë/ n. The
resulting bound is e− ë /2 .
2
The martingales we discussed earlier are the special case Y¾ = X ¾ for all ¾ ,
where we drop “with respect to”.
F i−1
Fi
14.4.23. Lemma. Let F0 be the cartesian product space for independent exper-
iments with outcomes X 1 , . . . , X n . Let F i be the random event defined by
X 1 , . . . , X i . Let Y0 , . . . , Yn be the Doob process with respect to X for a ran-
dom variable º (X). Let A be the event defined by {X j : j
= i}. If for each such
A the values of º on A differ by at most 1, then | Yi − Yi−1 | ≤ 1 for all i.
Proof: Consider an instance of F i−1 , with Yi−1 = (º (X) | F i−1). Note that F i−1
is a cartesian product, having all choices for X i , . . . , X n , although X 1 , . . . , X i−1
are fixed in F i−1 . The value of X i determines a block in the partition of F i−1 ,
represented below by a row. Each column is an event A within F i−1 in which all
of X i+1 , . . . , X n are fixed; only X i varies. By hypothesis, in each column s the
minimum and maximum of º (ms and Ms , respectively), differ by at most 1.
Choices
of F i
(or X i)
∑ ms p s ≤ (º (X) | F i) ≤ ∑ Ms ps ≤ 1 + ∑ ms ps .
Since these upper and lower bounds are independent of the row index, taking
the expectation over the entire grid to compute Yi−1 yields the same inequalities.
Hence Yi−1 and Yi lie in one interval of length 1 and differ by at most 1.
Proof: Suppose we discover the instance G p via the vertex martingale. At stage
i, we learn the edges from vi to the previous vertices; this is X i , and the outcomes
of these steps are independent. The event A in which all but X i are specified is
the subgraph G − vi of the random graph G plus the knowledge of edges from vi
to later vertices. Since (G − vi) ≤ (G) ≤ (G − vi) + 1, the value of (X) differs
by at most 1 over all possibilities in A. The hypotheses of Lemma 14.4.23 hold,
and hence Theorem 14.4.19 applies. Using both tails, the claim follows.
Proposition 14.4.24 says nothing about the value of ( (G)). To approximate
this we again use martingales. With constant edge probability p, whp (G p) is
within 1 of 2 logb n− 2 logb logb n+ 1 + 2 log b(e/2), where b = 1/p (Theorem 14.3.34).
The same holds for (G p) using the base c = 1/(1 − p) for the logarithm. To show
that the chromatic number of G p is close to n/(2 log c n), Bollobás showed that one
can extract independent sets of near-maximum size until few vertices remain.
14.4.25. Theorem. (Bollobás [1988]) For p = 1 − 1/c (constant), whp every in-
duced subgraph of G p with order at least m has an independent set of size at
least r, where m = ⌈ n/log2c n⌉ and r = 2 logc n − 5 log c log c n.
Proof: (sketch) Let S be a set of m vertices. We bound the probability that S has
1+
no independent r-set by e−dm for some d , . This bounds the probability that
n − dm1 + 1+
some m-set has no independent r-set by (m )e , which is less than 2 n e−dm .
Since n = m1+o(1) , this bound goes to 0, and Markov ’s Inequality implies that whp
G p has no bad m-set.
It suffices to study the subgraph G induced by [m]. Let (G) be the maximum
number of “pair-disjoint ” independent r-sets in G; any two of them share at most
one vertex. We will show that whp (G) ≥ 1. To do this, we show that (1) (G) is
highly concentrated around its mean, and (2) ( (G)) is unbounded.
We invoke Azuma’s Inequality for (1). Consider the edge-exposure martin-
gale. At each step, we learn whether one additional pair of vertices induces an
edge. We have Y0 = ( (X)) and Y(m) = (X). The status of one edge slot changes
2
e− ë /2 . With = (Y)/(m
2 1/2
2) ,
• • •
• •
•
• •
•
with other independent r-sets, given the event Z that [r] is in fact independent.
Let Y be the number of other independent r-sets overlapping [r] in at least two
elements. By Markov ’s Inequality, (Y | Z) → 0 implies (Y = 0 | Z) → 1. Since
each set counted shares at least two vertices with [r], we have
We remarked earlier that the constructive version of the Local Lemma was
based initially on viewing the underlying probability space as a product space over
independent variables. A similar viewpoint allows us to generalize the setting of
martingales, although the resulting tail inequalities may be weaker. We follow
the development in McDiarmid [1998], beginning by rewriting the Bounded Dif-
ferences Condition (Definition 14.4.18) in terms of a function.
Applying the Martingale Tail Inequality (Theorem 14.4.19) to the Doob pro-
cess for a function satisfying this definition yields another tail inequality.
Note that the distance d c(u , v) does not depend on the value of ui − vi for the
coordinates i where the difference is nonzero, only on which coordinates differ.
Proof: Since A is fixed, we may let º (X) = d H (X , A). Let Þ = (º (X)). Since
d H (X , A) = 0 if and only if X ∈ A, the left side of the desired inequality can be
written as (º (X) − Þ ≤ − Þ) (º (X) − Þ ≥ t − Þ), the product of lower and upper
tail probabilities. We use a bound arising from the first factor when t ≤ 2 Þ and a
bound arising from the second factor when t ≥ 2 Þ.
Since º (X) changes by at most 1 when any one coordinate is changed, º sat-
isfies the condition “ | º (u) − º (v)| ≤ d c(u , v) whenever u , v ∈ n ” in Corollary
14.4.30 with each ci equal to 1. Hence we can apply the IBDI to both the lower
tail and the upper tail. When t ≤ 2 Þ ,
( º (X) − Þ ≤ − Þ) ≤ ( º (x) − Þ ≤ − t/2) ≤ e−t /(8n).
2
When t ≥ 2 Þ ,
( º (X) − Þ ≤ t − Þ) ≤ ( º (x) − Þ ≤ t/2) ≤ e−t /(8n) .
2
With probability at most 1 in the other tail, in each case the claim follows.
r+t
Hamming distance at most t from A is at least ∑¾=0 (¾n). This result is sharp,
since equality holds when A consists of all the subsets with size at most r.
Theorem 14.4.31 leads quickly to an approximate version of Harper ’s result.
Let all subsets X of [n] be equally likely. Given a family A, by Theorem 14.4.31
the probability that a randomly chosen subset of [n] differs in at least t positions
from all sets in A is at most 1a e−t /(8n) , where a is the fraction of all subsets that
2
To compare with Harper ’s result, we must approximate the tail of the bi-
nomial distribution. Using the Chernoff Bound (X > n2 + nÌ) ≤ e−2nÌ as in
2
Harper ’s result then implies that At occupies a fraction at least 1 − 1a e−2t /n of all
2
EXERCISES 14.4
√ (♦) Use the Chernoff Bound for small p (from Remark 14.4.5) to prove that if
14.4.4.
p > c ln n/n for some constant c, then whp diam (G p) ≤ 2. What value of c suffices? (Com-
ment: Exercise 14.3.28 gives the actual threshold.)
14.4.5. (♦) Use the Chernoff√Bound to show that almost always the random graph has
minimum degree at least 2n − cn ln n for some appropriate constant c.
14.4.6. (♦) Use the Chernoff
√ Bound to show that almost always the random graph has
connectivity at least 4n − cn ln n for some appropriate constant c. (Comment: Bollobás
[1981b] showed that the connectivity almost always equals the minimum degree.)
14.4.7. (♦) The expected number of edges joining any two sets of size n/2 in the random n-
vertex graph is n2/8, and hence the expected maximum size of a bipartite subgraph is at
least n2/8. Use the Chernoff Bound and the Union Bound to prove that whp the random
graph has no bipartite subgraph with more than n2/8 + n3/2 edges. (Molloy–Reed [2002])
14.4.8. (♦) Place n balls into n boxes, uniformly and independently.
(a) Use the alternative form of the Chernoff Bound (Remark 14.4.5) to prove that whp
no box has more than 2 ln n balls, asymptotically.
(b) Use a more direct probability computation to prove that whp no box has more than
O( lnlnlnnn ) balls. (Comment: Also whp some box has ( lnlnlnn
n
) balls. When the tail is far from
the expectation the Chernoff Bound may not be strong enough for optimal results.)
14.4.9. A ranking of a tournament T is a linear ordering of its vertices. A good ranking
agrees with T on many pairs. Let DT ( ) = a − b, where and T agree on a vertex pairs
and disagree
√ on b pairs. Prove that there is an n-vertex tournament T such that DT ( ) ≤
2n3/2 ln n for every ranking . (Comment: De la Vega proved further that for some n-
vertex tournament , every ranking agrees with at most o(n3/2) pairs.) (Erdős–Moon [1965])
14.4.10. Polling. The fraction of the population preferring A to B is p. In a poll of n people,
the fraction who prefer A is X . To be accurate, we want (| X − p| ≤ p) > 1 − . Using the
simple Chernoff Bound, how large should n be in terms of and , assuming p > .25?
722 Chapter 14: The Probabilistic Method
14.4.13. Let H be a hypergraph where every edge has size at least r and intersects at
most other edges. Use the Chernoff Bound and the Local Lemma to prove that H has a
coloring with discrepancy at most if ≤ 18 e /6r . (Molloy–Reed [2002])
2
# #
14.4.14. The discrepancy of a signing : E(K n) → {1 , −1} is max S⊆ V(K n) ####∑{u ,v}⊆ S (uv)####.
√ # #
Prove that some signing has discrepancy at most ln 2(n3/2 + 12 n1/2). (J.-H. Kim)
14.4.16. Let be a random function from [n] to [n]. Let Y be the number of elements of
[n] that are missing from the image of . Prove (| Y − (Y)| ≥ t) ≤ e− t /(2n) .
2
14.4.17. (♦) Homogenizing triples. Let G0 be an n-vertex graph. At time t, to form G t from
G t−1 , first select a random triple S of vertices. If S induces j edges in G t−1 , then turn S
into a triangle with probability j/3 and into an independent set with probability 1 − j/3.
(a) Determine the probability p that the process ends by turning the graph into K n .
(b) For | E(G0)| = 12 (n2) , prove the expected number of steps is (n4). (Wormald [1999a])
14.4.18. (♦) Let Ln denote the maximum length of an increasing sublist of a random per-
√
mutation of [n]. Prove (| Ln − (Ln)| ≥ n) ≤ 2e− /2 . (Comment: Logan–Shepp [1977]
2
√
and Versik–Kerov [1977] together proved (Ln) ∼ 2 n; see Section 16.3. Hence the result
here is a bit unsatisfying.
√ √
Frieze [1991] proved a family of stronger bounds, including
(| Ln − (Ln)| ≥ n) ≤ 2e− n . Bollobás–Brightwell [1992] generalized.)
14.4.20. Generate two random binary lists of length n; the bits are chosen by unbiased
coin flips, independently. Let Yn be the length of a longest common subsequence in the two
lists (a common subsequence need not use the same positions in the two lists and need not
appear in consecutive positions). Prove (| Yn − (Yn)| ≥ ) ≤ 2e− /8n .
2
14.4.21. Let X be the number of triangles in the random n-vertex graph. By linearity,
(X) = 18 (3n). Prove
(| X − (X)| > n2 ) ≤ 2e−c for some constant c.
2
14.4.22. (♦) Bin-packing. The numbers a1 , . . . , an are drawn uniformly and independently
from the interval [0 , 1]. They must be placed in bins, each having total capacity 1. Let X
√
be the number of bins needed. Use IBDI to prove that (| X − (X)| ≥ n) ≤ 2e− /2 .
2
14.4.23. Complete the proof of Corollary 14.4.30 for discrete random variables.
Chapter 15
Linear Algebra
Some combinatorial problems have elegant solutions using algebraic tech-
niques. In this chapter we consider applications of linear algebra. We consider
the uses of polynomials and dimension in vector spaces, determinants and per-
manents of matrices, and eigenvalues of matrices associated with graphs. An
important topic that is too large in scope to include here is coding theory.
Two easy examples illustrate the elegance of dimensionality proofs and the
process of turning extremal problems into dimension problems.
15.1.1. Example. Eventown vs. Oddtown. A town with n people contains many
clubs, and every two clubs have an even number of common members. How many
clubs can there be if all clubs have even size? How many if all clubs have odd size?
When the clubs have even size (“Eventown”), we can form 2⌊n/2⌋ clubs by
grouping the residents into pairs and letting each club be a subset of these pairs.
In fact, there is no larger set of clubs (Exercise 4).
When the clubs have odd size (“Oddtown”), we can form n clubs by using
clubs of size 1, or clubs of size n − 1, for example. In fact, there are between
2 n(n+2)/8/(n!)2 and 2 n /n! nonisomorphic constructions of size n (Exercise 5). These
2
are much smaller than the Eventown constructions, but nevertheless we show
next that there cannot be more than n clubs.
723
724 Chapter 15: Linear Algebra
The incidence vector of a subset A of [n] is the binary n-tuple u such that
ui = 1 if i ∈ A and otherwise ui = 0. The simple observation that allows us to con-
vert problems about intersections of sets into algebraic problems is that if u and
v are the incidence vectors of subsets A and B of [n], then u · v = | A ∩ B| , where
u · v is the ordinary dot product of u and v: u · v = ∑i=1 ui vi . Since subscripts
n
15.1.4. Definition. A ¾-distance set is a set of points such that the distances
between points lie in a set of at most ¾ numbers.
When expanded completely, the total degree in each monomial term is at most 4.
The polynomial is a linear combination of such monomials. The number of ways
to distribute total degree at most 4 over n variables, forming such monomials, is
less than n4 . Hence m < n4 .
To prove a better bound, we capture ºi in the span of fewer monomials. When
n 2
expanding the product, the terms with degree 4 are all generated by ( ∑¾=1 x2¾ ) .
Those with degree 3 can be grouped as multiples of x j ( ∑¾=1 x2¾ ) . Thus ºi is a
n
15.1.6. Remark. The proof of Theorem 15.1.5 outlines the dimension argu-
ment to show that a set S has size at most m.
(1) Define polynomials associated with the elements of S.
(2) Show that the polynomials are linearly independent.
(3) Show that the polynomials are spanned by a set of size m.
Step 3 shows that the polynomials lie in a space of dimension at most m. Since
they are linearly independent, there are at most m of them.
The resulting bound can be improved by adding polynomials if the augmented
family is still linearly independent. Blokhuis [1984] did this to improve the bound
in Theorem 15.1.5 from (n + 1)(n + 4)/2 to (n + 1)(n + 2)/2. To the polynomi-
als º1 , . . . , ºm , he added the constant polynomial 1 and the linear polynomials
x1 , . . . , x n of degree 1. The full set is spanned by the same polynomials as before
and is still linearly independent, so the bound | S| ≤ m becomes | S| ≤ m − (n + 1)
(see Exercise 11).
We will apply this augmentation technique in Theorem 15.1.23.
Another criterion for linear independence holds more often than the diagonal
criterion; we will use it to study a measure of graph complexity.
the earlier terms have coefficient 0 and the later functions evaluate to 0. Hence
cj = 0 for 1 ≤ j ≤ m.
726 Chapter 15: Linear Algebra
when i = j and zero when i < j . Using this observation, we construct r linearly
independent vectors in 2 ; this yields r ≤ 2 d and hence d ≥ ⌈ lg r⌉ .
d
Expanding the product ∏¾=1 (w¾ − ¾) for two vectors w , ∈ d yields the
d
sum ∑S⊆[d] ∏i∈S wi ∏ j ∈S(− j). We view this as a dot product of vectors in 2 d-
dimensional space, with coordinates indexed by subsets of [d]. For w ∈ d , we
define two vectors w and ŵ in 2 by setting wS = ∏i∈S wi and ŵS = ∏i/∈S(−wi)
d
for each S ⊆ [d]. With this definition, ∏¾=1 (w¾ − ¾) = w · ˆ . The conditions on
d
Theorem 15.1.11 does not require the two lists to be disjoint, just that vi is
the first vertex in the second list adjacent to ui . When applied to n2 K 2 , both lists
have all n vertices; each list runs through both halves of the matching to prove
pdim n2 K 2 ≥ ⌈ lg n⌉ , and thus the encoding in Example 15.1.10 is optimal.
Section 15.1: Dimension and Polynomials 727
15.1.12. Definition. For L ⊆ 0 , an L-intersecting family of sets is a family
such that | A ∩ B| ∈ L for all A , B ∈ .
Class 0 contains all intersection sizes, but the sizes of the sets are forbidden from
that class. See also Exercise 13.
A variation of Theorem 15.1.14 is proved in Lemma 16.2.40 (by a similar
method) and applied in Theorem 16.2.41 to solve a question asked by Borsuk.
Meanwhile, here we present a modular version of Theorem 15.1.14. The proof is
analogous, and the bound is the same.
Proof: By factoring (ns) from each term and then enlarging (and extending) the
terms to obtain a geometric series,
s
n n s s(s − 1)
∑ ( i ) = ( s ) (1 + n − s + 1 + (n − s + 1)(n − s + 2) + · · ·)
i=0
n s s2
≤ ( ) (1 + + + · · ·)
s n − s + 1 (n − s + 1)2
n 1 n n− s+1 n s
=( ) =( ) = ( ) (1 + )
s 1 − n− s+1
s
s n − 2s + 1 s n − 2s + 1
n n/r n 1
= ( ) (1 + ) < ( ) (1 + ) .
s n − 2n/r + 1 s r−2
These results yield a constructive superpolynomial lower bound for the Ram-
sey number R(t , t), weaker than Erdős’ nonconstructive exponential bound, but
using explicit graphs. Coloring (t − 1)K t−1 red and K t−1 ,... ,t−1 blue yields R(t , t) >
Section 15.1: Dimension and Polynomials 729
(t − 1)2 . Nagy [1972] increased this to (t3 ) (Exercise 18). Frankl [1977] found
3
graphs proving R(t , t) > t (t) using -systems (sunflowers), where (t) → ∞.
Frankl–Wilson [1981] obtained similar results from p-modular L-intersecting
families. (A vertex set is homogeneous if it is a clique or independent set.)
15.1.18. Theorem. (Frankl–Wilson [1981]) Let p be a prime, and choose n > 2p2 .
Let G be the graph with vertex set ( p[n]
2 −1 ) defined by AB ∈ E(G) if and only if
| A ∩ B|
≡ −1 (mod p). The graph G has no homogeneous set with more than
2( p−n1 ) vertices. As a consequence, R(t , t) > t(1−) (t) , where (t) = 4 ln
ln t
ln t .
Proof: If A1 , . . . , Am is a clique in G, then it is a p-modular L-intersecting fam-
ily, where L = {0 , . . . , p − 2}, because | Ai | = p2 − 1 ≡ −1 (mod p), and Ai A j ∈ /
E(G) when | Ai ∩ A j | ≡ −1 (mod p). With | L| = p − 1, Theorem 15.1.16 yields
p−1
m ≤ ∑i=0 (ni) < 2( p−n1 ). If A1 , . . . , Am is an independent set, then | Ai ∩ A j | ∈
{p − 1 , 2p − 1 , . . . , p2 − p − 1}. Here p − 1 intersection sizes are allowed, so Theo-
p−1
rem 15.1.14 yields m ≤ ∑i=0 (ni) < 2( p−n1 ).
Fixing t, let p be the largest prime with 2( pp−1 ) < t, and let n = p3 . We have
3
(1−) (t)
proved R(t , t) > ( p2n−1). The choice of p yields p ∼ 2 ln ln t , and then p2 −1 > t
3
ln t
( p ) ,
where (t) = 4 ln
3 3
ln t
(p ) (p )
ln t . That is, we compare roughly p for t with p2 for the lower
bound on R(t , t). The logarithm of the latter is roughly p/2 times the logarithm
of the former, so roughly R(t , t) > t p/2 (Exercise 16 requests further details).
in | A B| places. If A and B have size ¾ , then the symmetric difference has size
2(¾ − | A ∩ B|). Hence forbidding one distance between the points is equivalent
to forbidding one intersection size for the sets. If ¾ = 2p − 1, then forbidding
intersection size p − 1 is equivalent to forbidding squared distance 2p.
Let p be the largest
√ prime such that 4p − 1 ≤ n; we use only 4p − 1 of the coor-
dinates. Let d = 2p. By Corollary 15.1.19, the maximum size of an independent
set in the subgraph of the distance-d graph induced by the incidence vectors of
−1
the (2p − 1)-sets in [4p − 1] is at most 2(4p
p−1
). Hence the chromatic number is at
4p−1 4p−1 4p 4p p!(3p)!
least (2p−1 )/2( p−1 ), which equals (2p)/( p ) and simplifies further to (2p)!(2p)! .
With Stirling ’s Formula
√ (Application 2.3.8), the ratio is approximately
c(33/4/2)4p , where c = 3/4. When m is large, there is a prime between m and
m − m7/12 (Huxley [1973]). Applying this with m = n/4 completes the proof, since
33/4/2 > 1 .1397. (Note: Exercise 17 improves the bound to about (1 .2)n .)
[s]. Ramanan [1997] proved this. Snevily conjectured and proved a substantial
generalization, after earlier proving special cases (Snevily [1994, 1999]).
at most s.
Let C1 , . . . , Ct be all the sets of size less than s in [n] that omit element 1,
indexed so | C1 | ≤ · · · ≤ | Ct |. Define polynomials hj and j by hj (x) = ∏r∈ Cj xr and
j (x) = (x1 − 1)hj (x). Each j has degree at most s and is multilinear and spanned
by the same set of ∑i=0 (ni) monomials as ˆ1 , . . . , ˆm . Since t = ∑i=1 (ni−−11), it suf-
s s
value tightens the upper bound on the size of an L-intersecting family when
we add the restriction that is a uniform family, even if 0 is allowed in L. The
original proof used linear algebra in a different way; combining the ideas we have
presented led to a shorter proof.
such that P is identically 0. Since is -uniform, the contribution from the sec-
ond sum is 0 when evaluated at vi . Since i(v j ) = 0 when j
= i, evaluating P
at vi thus yields i = 0. With each i being 0, linear independence of 1 , . . . , t
implies also that each j is 0.
We conclude that { 1 , . . . , m} ∪ { 1 , . . . , t } is linearly independent. Again
we may take the multilinear reduction of j since independence was established
by evaluation over {0 , 1}n . The degree of j is at most s, so these vectors also lie
s
in the span of the ∑i=0 (ni) multilinear monomials with degree at most s. Since
s −1
t = ∑ i=0 (ni), we conclude m ≤ (ns).
Proof: We take the result in one variable as the basis for induction on n. For
n > 1, we collect terms to write º as a polynomial in x n . That is, º =
∑ j =n 0 ºj (x1 , . . . , x n−1)x n , where each ºj is a polynomial having degree at most d i in
d j
n−1
each x i . For (x1 , . . . , x n−1) ∈ ∏i=1 Si , evaluating º0 , . . . , ºd n yields a one-variable
polynomial in x n of degree at most d n . Furthermore, the hypothesis implies that
this polynomial is 0 for x n ∈ Sn .
By the basis step (n = 1), the one-variable polynomial we obtain for a fixed
(x1 , . . . , x n−1) ∈ ∏in=−11 Si is the zero polynomial. Thus each ºi is 0 at all values
n−1
in ∏i=1 Si . By the induction hypothesis, each ºi is identically zero. Thus the
coefficients of º are all zero, and º is identically zero.
for formal power series in one variable was used extensively in Chapter 3.
n
15.1.27. Theorem. (Combinatorial Nullstellensatz; Alon [1999]) If ∏i=1 x tii is
a monomial with nonzero coefficient in a polynomial º having degree ∑i=1 t i
n
This short proof illustrates the method for applying the Combinatorial Null-
stellensatz. Using the set of sums, we design º that is 0 at (x , y) when x ∈ A and
y ∈ B. If the set of sums is too small, then A × B is too big for º to be identically
0 there when the appropriate coefficient is nonzero.
When A = B, the lower bound in Theorem 15.1.28 is min{2 | A|− 1 , p}. Erdős–
Heilbronn [1964] conjectured that almost as much is forced even when ignoring
the contributions by adding elements to themselves. Given the ease of proving
this from the Combinatorial Nullstellensatz, it is remarkable that the problem
was open for 30 years. The original proof used exterior algebra and representa-
tion theory of the symmetric group.
are positive, and those choosing − y are negative. Thus [ x a−1 y m− a+2 ] º (x , y) =
m− a+2
−2) − ( a−1 ) = [1 − a−1 ]( a−2). If m ≤ 2a − 4, then this coefficient is nonzero,
(am m m
The theorem below extends Theorem 15.1.29 to restricted sums over many
variables. See Exercises 23–25 for the proof and applications.
polynomials have a common zero, then they have another common zero.
Proof: Let (c1 , . . . , cn) be a common zero. Let
m n
º (x) = ∏(1 − Pi(x)p−1) − ∏(1 − (x j − cj)p−1).
i=1 j =1
Note that º (c) = 1 − 1 = 0. If there is no other common zero, then for x ∈ pn − {c},
there exists i such that Pi(x)
≡ 0 (mod p). Also there exists j such that x j
= cj .
By Fermat ’s Little Theorem, Pi(x)p−1 ≡ 1 ≡ (x j − cj )p−1 (mod p). Hence º (x) = 0.
The degree of the first term in º is bounded by (p − 1) ∑i=1 deg(Pi), which is
m
less than (p − 1)n. The degree of the second term is (p − 1)n, and the coefficient
of ∏ x jp−1 in º is (−1)n+1 , which is nonzero modulo p. Since | p| > p − 1 and we
choose each x i from p , Theorem 15.1.27 guarantees x ∈ pn such that º (x)
= 0.
By this contradiction, the polynomials must have another common zero.
Chevalley proved the case m = 1 and Warning proved the general case; both
in fact obtained p common zeros. We apply Theorem 15.1.31 to determine the
transversal number of a special hypergraph. The vertex set is pn , and for each
hyperplane H in pn we make an edge consisting of all the points in H. These
points are the solutions to a · x = b, where a ∈ pn − {0} and b ∈ p are fixed. Every
edge has pn−1 vertices. The transversal number Ì( ) of a hypergraph is the
minimum size of a vertex set intersecting all the edges.
Proof: First we produce a transversal of this size. Let B be the set of points in pn
having at most one nonzero coordinate; by construction B has the specified size.
To prove that B is a transversal, we use induction on n. For n = 1, each point is
a hyperplane, and indeed B = 1p .
For n > 1, hyperplanes of the form x n = c are hit by the point in B having c in
the last coordinate. For other hyperplanes, consider the fixed hyperplane H con-
sisting of {x ∈ pn : x n = 0}. The hyperplanes of the form x n = c include H and all
hyperplanes disjoint from H. The others intersect H in a hyperplane of pn−1 ob-
tained by dropping the last coordinate (0) from the points in the intersection. By
the induction hypothesis, these hyperplanes are hit by the points in B that have
0 in the last coordinate.
For the lower bound, let B be any transversal. By applying a translation in
each coordinate, we may assume 0 ∈ B. Let A = B − {0}. The set A intersects all
hyperplanes not containing 0. This means that for all x ∈ pn − {0}, the equation
x · y = 1 has a solution y ∈ A.
Let º (x) = ∏a∈ A(x · a − 1). Since x · y = 1 has a solution in A when x
= 0, we
have º (x) = 0 for x ∈ pn − {0} and º (0) = (−1)| A| . Given variables x i for i ∈ [n]
(j)
Since º takes only the values 0 and (−1)| A| , the sum has magnitude p − 1 only
when each summand is nonzero, requiring each variable to have value 0. Hence
P has value 0 only when all n(p − 1) variables have value 0. The contrapositive
of the Chevalley–Warning Theorem (for m = 1) now yields n(p − 1) ≤ deg P =
deg º = | A| = | B| − 1.
Each factor in the first term has degree p − 1, so the degree of the first term
is at most (p − 1)n. This quantity is less than m, since the average degree exceeds
Section 15.1: Dimension and Polynomials 737
2p − 2. Hence the degree is determined by the second term, which has degree m,
with [ ∏e∈ E(G) x e ] º (x) = (−1)m+1
= 0.
By the Combinatorial Nullstellensatz, º (x̂)
= 0 for some x̂ ∈ {0 , 1}m . Since
º (0) = 1 − 1 = 0, this occurs with x̂
= 0. Since x̂
= 0, the second term in º (x̂)
has a factor that is 0. Hence the first term in º (x̂) must be nonzero. By Fermat ’s
Little Theorem, this requires that ∑e∈Γ(v) x̂ e is a multiple of p for every vertex v.
Therefore, the degree of each vertex in the subgraph H of G with edge set
{e ∈ E(G): x̂ e = 1} is a multiple of p. Since (G) ≤ 2p − 1, the degree is always 0
or p. Since x̂
= 0, it cannot always be 0. Thus H has a nontrivial component, and
it is a p-regular subgraph of G.
With no bound on the maximum degree, more edges may be needed to force a
¾-regular subgraph. Pyber [1985] proved that an n-vertex graph having at least
32 ¾ 2 n ln n edges has a ¾-regular subgraph. The bound is not too far from optimal:
Pyber–Rödl–Szemerédi [1995] proved by probabilistic arguments that there are
graphs with at least (n log log n) edges that have no 3-regular subgraph (and
O(n log (G)) edges force a 3-regular subgraph).
Instead of fixing the degree at each nonisolated vertex, we can be more flexi-
ble. Specify for each v ∈ V(G) a bad set B(v) ⊆ {1 , . . . , d G(v)}. We seek a subgraph
H with d H (v) ∈ / B(v) for v ∈ V(H). Shirazi–Verstraëte [2008] gave an easy proof
from the Combinatorial Nullstellensatz that there is a nontrivial such subgraph
H when ∑v∈V(G) B(v) < | E(G)| (Exercise 27), and this inequality is sharp.
They also proved a conjecture of Addario-Berry et al. [2007] that allows 0 to
be in the forbidden sets. This was stated originally in terms of allowed degrees,
but it is a bit cleaner for forbidden degrees. Consider the design of the polynomial
º . We want the multivariate point x with º (x)
= 0 to select the desired subgraph
H. Hence we make a variable for each edge, and we restrict it to the values 0 and
1 to model whether the edge is used in H. For each vertex v, we design a factor
that is 0 when the constraint at v is violated.
The variables set to 1 yield a subgraph with degree ∑e∈Γ(v) x e at v. The factor for
v is 0 if and only if that degree is forbidden. We seek x ∈ {0 , 1}| E(G)| with º (x)
= 0.
Since º is a product of linear factors, deg(º ) ≤ ∑v∈V(G) | B(v)| . By the Com-
binatorial Nullstellensatz, it suffices to find a monomial with this degree having
nonzero coefficient, whose variables all have exponent at most one. Monomials in
the product arise by choosing, for each forbidden degree at each vertex, an edge
incident to that vertex. We must not choose a given edge from both endpoints.
738 Chapter 15: Linear Algebra
To avoid repeated selection, we orient G and pick for the monomial at v only
variables x e such that v is then the tail of e. If the orientation has at least ⌊ d(v)/2⌋
edges leaving each vertex v, then there are enough such edges to choose distinct
ones for the elements of B(v), since | B(v)| ≤ ⌊ d(v)/2⌋ . To form an orientation D
such that d+D(v) ≥ ⌊ d G(v)/2⌋ , simply add a vertex w adjacent to all vertices of odd
degree in G and orient by following an Eulerian circuit in each component.
We thus obtain a linear monomial. Every contribution to the coefficient of
a monomial with degree ∑v∈V(G) | B(v)| is positive, since obtaining that degree re-
quires selecting some x e (and not c) from each factor.
Finally, when x is the point with º (x)
= 0 guaranteed by the Combinatorial
Nullstellensatz, each factor must be nonzero, which means that the number of
edges selected at v (via x e = 1) does not lie in B(v).
Theorem 15.1.34 is sharp; the conclusion may fail when one bad set is a bit
too large. Let G = K 2r,2r with bipartition X , Y . If B(x) = {0 , . . . , r − 1} for x ∈
X and B(y) = {r + 1 , . . . , 2r} for y ∈ Y , then each B(v) has size d(v)/2, and a
subgraph is good if and only if it is r-regular. When r is added to one bad set,
there is no longer a good subgraph.
In this context, what we call circulations have usually been called “Eulerian
subgraphs” (see Alon [1993]). We use “circulation” because there is no connected-
ness requirement and because the term is used analogously with network flows.
• • •
• •
• •
• •
• • • •
15.1.38. Example. A total coloring of a graph colors both the vertices and the
edges so that no adjacent or incident objects have the same color. The total chro-
matic number is the number of colors needed; it is the chromatic number of
the total graph, obtained from a graph G by subdividing every edge and then
taking the square (adding edges joining vertices at distance 2 in the subdivision
graph). For a cycle, subdividing merely doubles the length, so total coloring of a
cycle corresponds to proper coloring of the square of a cycle twice as long.
Note that 3 | n is already needed for Cn2 to be 3-colorable; hence it is also
needed for 3-choosability. (Exercise 10.1.29 computes (Cn¾) in general.)
• •
• •
• •
• •
740 Chapter 15: Linear Algebra
The key idea here is used also in the proof of the Cycle-plus-triangles Theo-
rem and in other applications of Theorem 15.1.36 to 4-regular graphs: show that
the total number of circulations in the specified orientation is an odd multiple
of 2. Woodall–Prowse [2003] generalized the application; a special case of their
result is that l(G) = (G) whenever G is a power of a cycle.
To prove the Alon–Tarsi Theorem (Theorem 15.1.36), we view colors as real
numbers. We associate with each vertex vi a variable x i and define a polynomial
that is nonzero precisely when the assigned numbers form a proper coloring.
[1974], Li–Li [1981]. Indeed, Petersen introduced graphs in order to study such
polynomials (see L ützen–Sabidussi–Toft [1992] for the history).
The relation of pG to orientations is seen by expanding the product.
15.1.42. Lemma. Let G be a graph with m edges and vertices v1 , . . . , vn , and let
(d1 , . . . , d n) be a list with sum m. Let S be the set of orientations D of G such
that d+D(vi) = d i for all i. In the graph polynomial pG , the coefficient of ∏ x di i
is the number of even minus the number of odd orientations in S.
Proof: The polynomial is homogeneous of degree m, since each factor is homoge-
neous of degree 1. Each contribution to the expansion is formed by selecting one
endpoint of each edge. This corresponds to an orientation by letting the selected
vertex be the source of the edge. The resulting contribution to the expansion is
(−1)t ∏ x di i , where d i is the outdegree of vi in the corresponding orientation and
t is the number of decreasing edges. For a given list d of outdegrees, the even
orientations count +1, and the odd orientations count −1.
15.1.43. Lemma. For an orientation D of G with d i = d+D(vi) for each i, the abso-
lute value of the coefficient of ∏ x di i in pG is diff(D).
Proof: Again the vertex ordering v1 , . . . , vn is fixed. Let S be the set of orienta-
tions D of G such that d+D (v) = d+D(v) for all v ∈ V(G). For D ∈ S, let D ⊕ D be
the spanning subdigraph of D whose edges are the edges of D oriented oppositely
in D . Since d+D(v) = d+D (v) for all v, the subdigraph D ⊕ D of D is a circulation.
Reversing the orientation on the edges of any circulation in D does not change
any outdegree, so it yields a member of S. Thus the map taking D to D ⊕ D for
D ∈ S is a bijection from S to the set of circulations contained in D.
For each edge e ∈ D ⊕ D , the reverse edge occurs in D , so exactly one of
them is a decreasing edge. Therefore, D ⊕ D has an even number of edges if and
only if the numbers of decreasing edges in D and D have the same parity. That
is, the number of members of S with the same parity as D is the number of even
circulations in D, and the number with the opposite parity is the number of odd
circulations in D. Hence diff(D) equals the difference between the numbers of
even and odd circulations in S, and Lemma 15.1.42 applies.
Proof of Theorem 15.1.36. The Alon–Tarsi Theorem now follows from the Com-
binatorial Nullstellensatz. We are given a graph G and orientation D. The graph
polynomial pG is homogeneous with degree | E(G)|. If [ ∏ x di i ] pG is nonzero, then
the Combinatorial Nullstellensatz guarantees that pG(s)
= 0 for some s ∈ ∏ Si
when | Si | > d i for each i. By Lemmas 15.1.42–15.1.43, this coefficient is nonzero
precisely when there is an orientation D with outdegrees d1 , . . . , d n such that
diff(D)
= 0. We are given D with these properties.
742 Chapter 15: Linear Algebra
EXERCISES 15.1
15.1.1. (−) Prove that the incidence vectors of the clubs in Oddtown (Example 15.1.1) are
linearly independent over the two-element field. (Berlekamp [1969])
15.1.2. (−) Form a digraph D by replacing every edge of the graph Cn with two oppositely
directed edges having the same endpoints. Count the circulations in D.
15.1.3. (♦) Let A1 , . . . , A m be a family of even subsets of [n] with odd-sized intersections.
(a) Prove that m ≤ n, with equality possible when n is odd.
(b) Prove that m ≤ n− 1 when n is even, with equality possible. (Babai–Frankl [1992])
15.1.4. (♦) Prove that Eventown (Example 15.1.1) has at most 2⌊n/2⌋ clubs. That is, [n]
contains at most 2⌊n/2⌋ even sets whose intersections all have even size. (Hint: Prove that
the span U of the set of incidence vectors of the clubs is contained in the subspace of vectors
orthogonal to all of U.) (Berlekamp [1969])
2 2
15.1.5. For even n, prove that there are between 2 n /4/n! and 2 n /n! sets of n odd-sized
subsets of [n] such that the intersection of any two has even size. (Hint: Let n = 2 ¾ . From
a ¾-by- ¾ binary matrix A, form an n-by-n binary matrix ( A+AI¾ A+A I ).) (M. Szegedy)
¾
15.1.10. Prove that any two-distance set of points in the sphere S n−1 in n has size at most
n(n + 3)/2. (Hint: Follow the proof of Theorem 15.1.5, but confine the resulting indepen-
dent polynomials to a space of dimension n(n + 3)/2.) (Delsarte–Goethals–Seidel [1977])
15.1.11. (+) Improved bound on the size of a two-distance set {v1 , . . . , vm} in n .
(a) In n , the affine hull of vectors {v1 , . . . , vm} is {∑i=1 ci vi : ∑i=1 ci = 0}. Let B be
m m
the m-by-(n + 1) matrix whose ith row is vi plus 1m as column 0. Prove that if the affine
hull is all of n , then the columns of B are linearly independent.
(b) Prove that if the columns of a real m-by-p matrix B are linearly independent , then
B T B is nonsingular.
(c) Prove that adding {1 , x1 , . . . , x n} to the set of polynomials constructed from a two-
distance set in Theorem 15.1.5 yields a linearly independent set. Conclude that the maxi-
mum size of a two-distance set in n is at most ( n+2 2). (Blokhuis [1984])
15.1.12. An equivalence on G is a spanning subgraph whose components are complete.
(a) Prove that pdim (G) is the minimum number of equivalences on G whose union is
G and whose overall intersection is empty.
(b) Prove that pdim (G) ≤ (G) when (G) > 1, with equality if G is triangle-free.
(c) Use Vizing ’s Theorem to prove pdim (G) ≤ n − 1 when | V(G)| = n ≥ 3.
Exercises for Section 15.1 745
15.1.15. Prove that the points of 2 can be colored using asymptotically nn/2 colors so that
points at distance 1 have different colors.
3 3
15.1.16. Use Stirling ’s Formula to approximate ln ( p2p−1)/ ln ( pp−1) for large p.
15.1.17. Choose n , p ∈ with p prime and n > 2p. Let G n ,p be the graph whose vertices
√
are the incidence vectors of (2p − 1)-sets in [n], adjacent when their distance in n is 2p.
Prove that (G n ,p) ≥ (2pn−1 )/( p−n1 ). Improve the lower bound on the chromatic number of
the unit-distance graph in n by choosing p to maximize the lower bound on (G n ,p).
15.1.18. (♦) Color the edges of the complete graph with vertex set ([t3 ]) by making an edge
3
red if its endpoints have one common element and blue otherwise. Conclude R(t , t) > (t3 ) .
3
(Comment: The graph (t − 1)K t−1 gives only R(t , t) > (t − 1)2 .) (Nagy [1972])
15.1.19. Use Snevily’s Theorem (Theorem 15.1.21) to prove the Frankl–Wilson Theorem
(Theorem 15.1.14).
15.1.22. (♦) Let 2m be the vector space of dimension m over 2 . Given nonempty subsets
A and B of 2m , let A + B = {a + b: a ∈ A , b ∈ B}. Use the Combinatorial Nullstellensatz to
prove that | A|+| B| > 2 n implies | A + B| ≥ 2 n . (Comment: The result was proved inductively
in Fon-Der-Flaass & Alekseyev [2012]. R. Chapman and T. Viteam independently found
proofs (unpublished) using the Combinatorial Nullstellensatz.)
15.1.23. Show that Theorem 15.1.29 is a special case of Theorem 15.1.30. Prove Theorem
15.1.30. (Alon–Nathanson–Rusza [1996])
746 Chapter 15: Linear Algebra
15.1.24. Let A and B be nonempty subsets of p , where p is prime. Prove that the number
of sums x + y such that x ∈ A, y ∈ B, and xy
= 1 is at least min{p , | A| + | B| − 3}. (Hint:
Use Theorem 15.1.30.) (Alon–Nathanson–Rusza [1995])
15.1.25. More from Theorem 15.1.30. (Alon–Nathanson–Rusza [1996]) Let p be a prime.
(a) For c1 , . . . , c¾ ∈ ∪ {0} with sum m + (¾2) , where m ≥ 0, prove
¾ ¾ m
m!
[∏ xci i ](∑ xi ) ∏ (xj − xi) = ¾ ∏ (cj − ci).
i =1 i =1 1 ≤ i< j ≤ ¾ ∏i=1 ci ! 1≤i< j ≤¾
(Hint: Use the Hook-Length Formula (Theorem 4.3.4) or give a direct proof.)
(b) Let A1 , . . . , A¾ be nonempty subsets of p . Let S(A1 , . . . , A¾) be the set of sums of
distinct elements a1 , . . . , a¾ such that ai ∈ Ai for all i. Prove that if | A1 | , . . . , | A¾ | are dis-
¾
tinct and sum to less than p + (¾+2 1 ) , then | S(A1 , . . . , A¾)| > ∑i=1 | Ai | − (¾+2 1 ) . (Hint: Use
part (a) and Theorem 15.1.30.)
(c) Let A1 , . . . , A¾ be nonempty subsets of p , indexed so that | A1 | ≥ · · · ≥ | A¾ | . Let
b1 = | A1 | , and let bi = min{bi−1 − 1 , | Ai |} for 2 ≤ i ≤ ¾ . Prove that if b¾ > 0, then
¾
| S(A1 , . . . , A¾)| ≥ min{p , ∑i=1 bi − (¾+2 1) + 1}.
(d) Conclude that if A is a nonempty subset of p , then the number of sums of s dis-
tinct elements of A is at least min{p , s | A| − s2 + 1}. (Comment: Theorem 15.1.29 is the
special case s = 2.) (Dias da Silva–Hamidoune [1994])
15.1.26. Prove that the minimum number of hyperplanes in n that do not contain the
origin but together cover all other points of {0 , 1}n is n. (Alon–Füredi [1993])
15.1.27. (♦) For each vertex v in a graph G, specify B(v) ⊆ {1 , . . . , d G(v)}.
(a) Prove that if ∑v∈V(G) | B(v)| < | E(G)| , then G has a nontrivial subgraph H such
that d H (v) ∈
/ B(v) for all v ∈ V(G) (note that degree 0 is allowed, but not at all vertices).
(Shirazi–Verstraëte [2008])
(b) Show that part (a) is sharp by constructing infinitely many examples such that
∑v∈V(G) | B(v)| = | E(G)| and no such subgraph exists.
15.1.28. For odd prime p, let ¾ be an integer with 1 ≤ ¾ < p. Given a1 , . . . , a¾ ∈ p
and distinct elements b1 , . . . , b¾ ∈ p , prove that for some permutation of [] the values
ai + b (i) are distinct modulo p. (Hint: Use the Vandermonde determinant in an application
of the Combinatorial Nullstellensatz.) (Alon [2000a])
15.1.29. Given a permutation , let d (i , j) = a − b, where i and j occupy positions a and b
in the word form, respectively. For i , j ∈ [] with i < j , specify a forbidden distance (i , j).
Prove that there is a permutation ∈ such that d (i , j)
= (i , j) for 1 ≤ i < j ≤ .
Conclude that for a1 , . . . , a ∈ n with 2 ≤ n + 1, there is a permutation ∈ such that
the elements a (i) + i for 1 ≤ i ≤ are distinct modulo n. (K ézdy–Snevily [2002])
15.1.30. A Kakeya set in nq is a set K such that for all y ∈ nq , there exists b ∈ n such
that b + ay ∈ K for all a ∈ . This means that K contains a line in every direction.
(a) Prove that if K ⊆ nq is a Kakeya set with | K | < (q+ nn−1 ) , then there is a nonzero
polynomial ∈ q [x1 , . . . , x n] of degree less than q that is 0 at all points of K .
(b) Conclude that for all y ∈ nq , there exists b ∈ nq such that (b + ay) = 0 for all
a ∈ . As a polynomial in a, conclude that is identically 0, contradicting (a) and proving
that every Kakeya set has size at least (q+ nn−1 ) . (N. Alon and T. Tao; see Dvir [2017+])
15.1.31. Prove that K4 is 3-edge-choosable.
15.1.32. (♦) Hakimi [1965] (Corollary 6.1.5) proved that a graph G has an orientation in
which each vertex has outdegree at most d if and only if every subgraph H has at most
d | V(H)| edges. Conclude that planar bipartite graphs are 3-choosable. (Alon–Tarsi [1992])
Section 15.2: Matrices 747
15.1.33. For a plane graph G, let H be the hypergraph with vertex set V(G) whose edges
are the vertex sets of faces of G. Use the 5-choosability of G (Theorem 9.3.5) and the 3-
choosability of planar bipartite graphs (Exercise 15.1.32) to prove that H is 3-choosable.
(Comment: It is conjectured that H is 2-choosable.) (Ramamurthi [2001])
15.1.34. (♦) Let e be an edge in an AT-orientation D of a graph G. If e lies in no cycle in
D, then D − e is an AT-orientation of G − e.
(a) Prove that if e lies in a cycle C in D, then the orientation D obtained from D by
reversing the edges of C is an AT-orientation.
(b) Prove that D − e or D − e is an AT-orientation of G in which every vertex has
outdegree at most its outdegree in D (here e is the reverse of e).
15.2. Matrices
In this section we consider enumerative aspects of matrices. We use determi-
nants to count spanning trees in graphs, permanents to count perfect matchings
in bipartite graphs, and matrix inversion to study inversion formulas for func-
tions on partially ordered sets.
15.2.1. Example. The Matrix Tree Theorem (Theorem 15.2.5) tells us to form
the diagonal matrix of vertex degrees, subtract the adjacency matrix, delete a
row and a column, and take the determinant. For the graph K 4 − e, the ver-
tex degrees are 3 , 3 , 2 , 2, so we form the matrix on the left below and take the
determinant of the matrix in the middle. We get the number of spanning trees.
⎛ 3 −1 −1 −1 ⎞
⎛ 3 −1 −1 ⎞
⎜ −1 3 −1 −1 ⎟
⎜
⎜ −1
⎟ → ⎜ −1 2 0 ⎟ → 8
−1 2 0 ⎟ ⎝ −1
⎝ −1 0 2 ⎠
−1 0 2 ⎠
To state and prove the theorem, we need some basic linear algebra.
748 Chapter 15: Linear Algebra
15.2.4. Lemma. If every row of an n-by-n matrix A has sum 0, then the cofactors
of any row are all equal.
Proof: When every row has sum 0, the columns are dependent, so rank (A) < n. If
rank (A) < n − 1, then all cofactors are 0. Otherwise, rank (A) = n − 1 and det A =
0. The equation AAdj A = 0 now puts every column of Adj A into the nullspace of
A. Every row-sum of A being 0 means that 1n is in the nullspace. Since rank A =
n − 1, every vector in the nullspace is a multiple of 1n . Hence the columns of Adj A
are constant-valued, making the cofactors in each row of A equal.
15.2.8. Example. The digraph below has two out-trees rooted at 1 and two in-
trees rooted at 3. The determinants behave as claimed.
1• •3
⎛ 0 0 0⎞ ⎛ 2 0 0⎞
Q− = ⎜ −1 1 0⎟ Q+ = ⎜ −1 1 0⎟
⎝ −1 −1 2⎠ ⎝ −1 −1 0⎠
•
2
Since the earlier theorems hold for multigraphs, it is natural to generalize
using edge weights; non-edges are represented by weight 0. To generalize The-
orem 15.2.7, we let the weight of a tree or arborescence in a digraph D be the
product of its edge weights. For further generality and a combinatorial proof, we
use variables to encode the outdegree of each vertex. This leads to a determinan-
tal formula for the sum of the weights of arborescences with specified roots.
750 Chapter 15: Linear Algebra
Proof: For S = ∅, the sum is empty and det Q∅ = det Q = 0, so the claim holds.
Let ¾ = | S| and V = {v1 , . . . , vn}. For nonempty S, we use induction on n − ¾ . If
¾ = n, then there is one arborescence (no edges) in the sum, with weight 1 (empty
product), and the 0-by-0 determinant by convention also equals 1.
Now suppose ¾ < n. Both expressions are polynomials in {x j } in which each
nonzero term has total degree n − ¾ ; we write det QS = ºS(x1 , . . . , x n) to empha-
size this. With total degree n − ¾ , each term has degree 0 in at least ¾ variables.
Let {x i : i ∈ S} be “root variables” and the others “non-root variables”. To com-
plete the proof, we prove (1) each term in both ∑ w A and ºS has degree 0 in some
non-root variable, and (2) the terms in which a particular non-root variable has
degree 0 agree in ∑ w A and ºS . The second claim uses the induction hypothesis.
Proof of Claim 1. In w A , the degree of a variable x j is the outdegree of vj in
A. When ¾ < n, there is a non-root leaf, and it has outdegree 0.
Now consider ºS . Deleting the rows and columns of Q indexed by S does not
remove the root variables; they remain in the diagonal terms. Setting the root
variables to 0 makes each row of QS sum to 0, so det QS and ºS have value 0 re-
gardless of the values of the non-root variables when the root variables are set to
0. Since a polynomial that is 0 at all points has every coefficient 0, each term in
ºS has a root variable with positive degree. Since each term has degree 0 in at
least ¾ variables, it has degree 0 in some non-root variable.
Proof of Claim 2. Consider terms having degree 0 in a fixed x t with t ∈ / S.
In ∑ w A , these arise from arborescences where vt is a leaf. Such an arborescence
A arises from an arborescence A on n − 1 vertices with roots in S by adding some
edge vj vt , yielding w A = w A at , j x j . Let T be the set of arborescences on V − {vt }
with root set S. Since j is arbitrary and we can start with any arborescence in
T , the sum of the terms omitting x t equals (∑ A ∈ T w A )(∑j
=t at , j x j ).
Now consider the terms of ºS that omit x t ; setting x t = 0 in ºS yields their
sum. The column for vt in QS becomes 0 except for the diagonal term M , which
is ∑j
=t at , j x j . Terms involving x t disappear from other entries in the matrix.
Expanding the determinant along column t yields M times the determinant of
the matrix Q S obtained from QS by deleting the tth row and column and setting
x t = 0. This is just the determinant defined for the smaller problem with ver-
tex set V − {vt } and the same root set S. By the induction hypothesis, det Q S =
∑ A ∈ T w A . Thus the terms omitting x t are the same in ∑ w A and in ºS .
0
• 0
• vj
• S• • •vt ∑j
=t at , j x j QS at
A • 0 xt = 0
• 0
Section 15.2: Matrices 751
15.2.10. Example. To obtain the Directed Matrix Tree Theorem from the Ma-
trix Arborescence Theorem, let ai , j be the number of edges from vj to vi , set each
variable to 1, and let S consist of one vertex.
Keeping the variables x j as indeterminates yields a generating function that
enumerates the arborescences rooted at S by their outdegrees. For the digraph
in Example 15.2.8, the matrix Q appears below. If S = {1}, then the determinant
is º (S) = x12 + x1 x2 ; one branching consists of two edges from v1 and one is the
path ⟨v1 , v2 , v3 ⟩. If S = {1 , 2}, then the determinant is º (S) = x1 + x 2 , and the
choices for the arborescence are the edge v1 v3 or the edge v2 v3 .
⎛ 0 0 ⎞
0
⎜ − x1 x1 ⎟
0
⎝ − x1 − x2 x1 + x 2 ⎠
15.2.11. Example. In the digraph below, the edges labeled in order from 1 form
an Eulerian circuit C starting along e from v. Each bold edge is the last edge in
C that departs from its tail. The bold edges form an in-tree to v.
11
• • 4
12 10 •
13
14
5 3
v• •
15
e 6 •
7
9 1 2
• •
8
15.2.12. Lemma. For any Eulerian circuit that begins from v along edge e in a
digraph G, the set T of edges along which vertices other than v are exited for
the last time is the edge set of an in-tree to v.
Proof: Each vertex other than v is left for the last time only once, so | E(T)| =
|V(G)| − 1. Each vertex other than v has outdegree 1 in T , and v has outdegree
0. A vertex other than v cannot be left for the last time until it is entered for the
last time, so T contains no cycle. These properties make T an in-tree to v.
The Matrix Tree Theorem uses the relationship between cycles and the inci-
dence matrix of an oriented graph. In Section 11.3, we used the incidence matrix
to represent cycle matroids over 2 . The incidence vectors of cycles formed the
null space of the matrix.
15.2.17. Theorem. The cycle space and bond space of a connected graph G with
n vertices and m edges are binary vector spaces with dimensions m − n + 1
and n − 1, respectively.
Proof: We have vector spaces over 2 because the subsets are closed under binary
addition: the symmetric difference of two even subgraphs is an even subgraph,
and the symmetric difference of two edge cuts is an edge cut (Exercise 12).
Choose a spanning tree T . Each edge of E(G)− E(T) forms a unique cycle with
edges in T ; these are the fundamental cycles relative to T . These cycles are
linearly independent in C(G), since each has a nonzero coordinate outside E(T)
that is zero in all other incidence vectors in this set. Hence dim C(G) ≥ m − n + 1.
Choose n − 1 vertices in G. Let v1 , . . . , vn−1 be the incidence vectors for the
corresponding edge cuts. Let ∑ ci vi = 0 be an equation of dependence. Since each
coefficient is 0 or 1, we are just summing the vectors for a set S of vertices. The
resulting coordinate for an edge is 0 if and only if the edge has an even number
of endpoints in S. Edges in [S, S] appear once in the sum, and such coordinates
remain nonzero. Since G is connected, [S, S]
= ∅ unless S or S is empty. Hence
there is no nontrivial equation of dependence, the vectors are linearly indepen-
dent, and dim B(G) ≥ n − 1. We have also shown that [S, S] = ∑i∈S vi for every
edge cut [S, S], so dim B(G) = n − 1.
The n − 1 vectors v1 , . . . , vn−1 are rows in the incidence matrix M(G). By def-
inition, every even subgraph has an even number of edges at each vertex, so the
vectors in C(G) are those satisfying M(G)x = 0. Thus C(G) is the nullspace of
M(G), and we have shown that the matrix has rank n − 1. The famous Rank–
Nullity Theorem of linear algebra states that the dimension of the nullspace
is the number of columns minus the rank of the matrix (over any field), so
dim C(G) = m − n + 1. (Alternatively, one can show explicitly that the funda-
mental cycles span the cycle space.)
15.2.18. Definition. A 2-basis for a graph G is a basis for C(G) such that each
coordinate is nonzero in at most two members of the basis.
The argument for Theorem 15.2.19 is analogous to that for Whitney ’s char-
acterization of planarity by matroid duality (Theorem 11.3.35). Also Theorem
15.2.19 can be used to prove Theorem 11.3.35; see Exercise 17.
When we omit the signs on the terms in the permutation expansion of a de-
terminant, the computation still has meaning.
Terms in the permanent are products of one entry from each row and column.
For the biadjacency matrix of a bipartite multigraph G, the permanent counts
the perfect matchings. Using row-reduction operations, determinants are easy
to compute, but no fast algorithm is known to compute the permanent. Counting
the perfect matchings in a bipartite graph belongs to the class of difficult count-
ing problems called #P (Valiant [1979]; see also Jerrum–Sinclair–Vigoda [2001]).
In contrast, determining whether there is at least one such matching is easy.
Computing per A from the definition takes superexponential time in n, as
does computing det A by the permutation expansion. Elementary row operations
can compute determinants quickly, but these transformations do not preserve the
permanent. When G is planar, however, the permanent of the biadjacency matrix
A can be found by computing the determinant of a matrix obtained by negating
some entries of A. At first the result is surprising, but the main idea is simple.
Nonzero terms in computing per A correspond to 1-factors in G. When we
negate some entries to form A and compute det A , the nonzero terms in the ex-
pansion still correspond to the 1-factors in G. The task is to cleverly negate some
entries so that all nonzero terms when computing det A have the same sign. This
would yield per A = |det A | . The proof is valid for multigraphs, but we phrase it
just for graphs. The method was presented in Vazirani–Yannakakis [1989].
Section 15.2: Matrices 755
The most famous use of the method is the computation by K asteleyn [1961] of
the number of perfect matchings in Pn Pn . K asteleyn [1963, 1967] extended the
method to all planar bipartite graphs (see also Percus [1969]). We need to show
that the biadjacency matrix of any planar bipartite graph has a coherent signing.
The argument is based on a special orientation that exists for every planar graph.
15.2.24. Example. Summation and difference. When (n) = ∑i=1 (i) for n ∈ ,
n
we obtain from by (1) = (1) and (n) = (n) − (n − 1) for n > 1. This is a
discrete version of the Fundamental Theorem of Calculus: just as differentiation
is the inverse of integration, so differencing is the inverse of summation.
15.2.26. Example. Möbius inversion in number theory. Let (n) be the number
of -ary sequences with period n. Every n-tuple generates a periodic sequence,
but (n)
= n , since we must exclude those whose periods divide n. Letting (n)
be the number of -ary n-tuples, we have (n) = n and (n) = ∑d|n (d). The
classical Möbius Inversion Formula of number theory inverts such summations:
(n) = ∑d|n ( dn )(d), (∗)
where (j) = (−1)¾ when j is the product of distinct primes, and (j) = 0 when
j is divisible by the square of a prime, and (1) = (−1)0 = 1.
We can prove (∗) by substituting for (d) its definition in terms of and check-
ing that the resulting weighted sum of values of gives weight 1 to (n) and
weight 0 to all other values of . The Inclusion-Exclusion Formula can also be
proved this way, but we want to prove all such inversion formulas at once.
The functions in these examples are defined on posets: a chain, 2[n] , or a divi-
sor lattice. In general we want to invert (x) = ∑ y≤ x (y), where “ ≤ ” is the order
relation in a poset. We need functions on the intervals of a poset.
Restricting to locally finite posets makes each convolution a finite sum. For
convenience, we further restrict to finite posets. The set of functions on a set
S forms a vector space with S as a canonical basis. Each function is then a lin-
ear combination of basis elements. Scalar multiplication and vector addition are
coordinate-wise, as in Definition 15.2.27. A vector space becomes an algebra when
endowed with a suitable multiplication rule for vectors; here we use convolution.
1 x=y
(b) (x , y) = { ; the zeta function.
1 x<y
0 x=y
(c) (x , y) = { ; the “strictly less-than” function; = − 1.
1 x<y
(d) (x , y) = { 1 x≺y ; the cover function.
0 otherwise
¾
15.2.31. Lemma. Multiplication in A(P) is associative, and ∏i=1 i is specified
by ∑ x= 0 ≤···≤ ¾ = y ∏i=1 i(i−1 , i). In particular,
(a) (x , y) is the number of weak x , y-chains of length ,
with 2(x , y) = |[x , y]| .
(b) (x , y) is the number of strict x , y-chains of length .
(c) (1 − )−1 (x , y) is the total number of strict x , y-chains.
(d) (x , y) is the number of maximal x , y-chains of length .
(e) (1 − )−1 (x , y) is the total number of maximal x , y-chains.
Proof: Any order for computing the product yields ∏i=1 i as an iterated sum-
mation. The distributive law pulls the summations to the front, expressing the
formula as one sum. The possible nonzero terms correspond to successive related
elements (not necessarily distinct) forming chains from the bottom to the top of
the interval. The sum is over all such weak chains of length .
This yields (a)–(e). If each factor in the term for a weak chain is 1, accom-
plished by using , then the sum counts the weak chains. To forbid repetitions,
use instead. Maximal chains are those where no additional element can be in-
serted; successive elements satisfy the cover relation, and we use .
To count all strict chains, form the series 1 + + 2 + · · ·. The function 1
(that is, 0) counts chains of length 0; there are none if x
= y. A geometric series
of incidence functions behaves like a geometric series of numbers (Exercise 32).
We need 1 − to be nonzero on every interval [x , x], which holds by definition.
Counting all maximal x , y-chains using ∑≥0 is analogous to this.
1 if x = y
(x , y) = { −
∑ x≤ < y (x , ) if x < y.
Proofs 2 and 3 avoid detailed manipulation and make clear that the validity
of (x) = ∑ y≤ x (y) for all x is not only sufficient but also necessary for (x) =
∑ y≤ x (y)(y , x) to hold for all x.
Viewing , as column vectors instead of row vectors or convolving with
and on the left instead of the right yields a dual form of the Möbius Inversion
Formula, which reduces to the usual Inclusion-Exclusion Formula when P = 2 n .
15.2.35. Example. For the chain formed by under the usual ordering, Defini-
tion 15.2.32 yields (j , j) = 1, (j , j + 1) = −1, and (j , ) = 0 if > j + 1. Hence
Theorem 15.2.33 explains why differencing is inverse to summation.
To compute Möbius functions for posets such as 2[n] and the divisor poset, we
use a combining formula for Möbius functions on products.
15.2.36. Theorem. (Product Formula) The Möbius function for the product of
locally finite posets P and Q is given by
P × Q((x , y) , (x , y )) = P (x , x ) Q(y , y ).
Section 15.2: Matrices 761
Proof: Let I = [(x , y) ,(x , y )], and let IP = [x , x ] and IQ = [y , y ]. We use in-
duction on | I |. When | I | = 1, both sides equal 1. For | I | > 1, the definition of P × Q
yields ∑(x ,y )∈ I P × Q((x , y) , (x , y )) = 0. Using I = IP × IQ and the definitions
of P and Q , we also compute
∑ P (x , x ) Q(y , y ) = ∑ P (x , x ) ∑ Q(y , y ) = 0.
(x ,y )∈ I x ∈ IP y ∈ IQ
When formulas for both and in the Möbius Inversion Formula are known,
the formula can be used to find . Helped by the Polynomial Principle, this works
for the special lattices Ln(q) (Exercise 34) and Π n .
15.2.39. Remark. Whitney numbers. For a graded poset P with lower bound
0̂, the rank generating function ∑ W x has the Whitney numbers (rank sizes)
as coefficients; it sums (0̂ , a) over a ∈ P , weighted by x r(a) . The character-
istic polynomial ∑ w x sums (0̂ , a) over a ∈ P , weighted by xr(P)−r(a). The
coefficient w is the th Whitney number of the first kind, while W is the th
Whitney number of the second kind. For the partition lattice Π n , we obtain the
Stirling numbers: W (Π n) = Sn ,n− and wn−(Π n) = sn , .
762 Chapter 15: Linear Algebra
EXERCISES 15.2
15.2.1. (−) Use the Matrix Tree Theorem to find (G) for the graph below.
• •
• •
15.2.4. Use the Matrix Tree Theorem to prove Cayley’s Formula (Ì(K n) = nn−2).
15.2.5. Use the Matrix Tree Theorem to find Ì(K r,s). (Lovász [1979, p. 223])
15.2.6. (♦) The generalized book Bn ,¾ is the graph K ¾ K n−¾ . Compute Ì(Bn ,¾).
15.2.8. (♦) de Bruijn cycle (see Exercise 10.1.28). Prove that the following explicit al-
gorithm generates a binary de Bruijn cycle of length 2 n: start with n copies of 0. Sub-
sequently, append 1 if doing so does not repeat a previous string of length n; otherwise
append 0. (Martin [1934], Ungar [1950], and others)
15.2.9. (♦) Tarry’s Algorithm (Tarry [1895], as presented by D.G. Hoffman). A castle has
finitely many rooms and corridors. Each corridor has a door into a room at each end. Any
room can be reached from any other by traversing corridors and rooms. Initially, no doors
have marks. A robot starting in some room explores the castle using the following rules.
(1) After entering a corridor, traverse it into the room at the other end.
(2) Upon entering a room with all doors unmarked, mark I on the entry door.
(3) In a room, mark O on an unmarked door (if any exists), and use it.
(4) In a room with all doors marked, exit via a door marked I if one exists.
(5) In a room with all doors marked O, stop.
Prove that the robot stops only after using every corridor exactly twice, once in each direc-
tion. (Comment: All decisions are completely local; the robot sees nothing but the current
room or corridor. See also K önig [1936, pp. 35–56] and Fleischner [1983, 1991].)
15.2.11. Prove the Cauchy–Binet Formula det C = ∑S⊆[m] det AS det BS by considering
the matrix equation DE = F below.
Im 0 −I B −I B
( )( m )=( m )
A In A 0 0 AB
15.2.12. Given a graph G, prove combinatorially that the symmetric difference of any two
even subgraphs is an even subgraph, and the symmetric difference of any two edge cuts is
an edge cut. (Comment: This completes the proof of Theorem 15.2.17.)
15.2.13. (♦) Apply the results of this section to obtain the following statements about edge
cuts in graphs that earlier were proved combinatorially.
(a) A set of edges in a graph is an edge cut if and only if it has an even number of edges
in every cycle (Exercise 7.1.31).
(b) Every edge cut is a union of pairwise edge-disjoint bonds (Exercise 7.1.30).
15.2.14. (♦) Without using the bond space, show directly that the dimension of the cycle
space of a connected graph G is | E(G)|−| V(G)|+ 1. That is, show that the incidence vectors
of the cycles generated by adding one edge to a spanning tree T form a basis.
764 Chapter 15: Linear Algebra
15.2.15. Let G be a graph with n vertices, m edges, and ¾ components. Determine the
dimensions of the cycle space and the bond space of G.
15.2.16. Prove that the cycle space and bond space of a graph are the null space and row
space of its incidence matrix.
15.2.17. Prove Theorem 11.3.35 from Theorem 15.2.19.
15.2.18. (♦) Let W be a subspace of 2n . Prove that every coordinate that is not identically
0 in W is 1 in exactly half the elements of W . Conclude that the sum of the sizes of the
even subgraphs of a 2-edge-connected graph G with n vertices and m edges is n2 m− n .
15.2.19. A cycle C in a graph G is isometric if d C(x , y) = d G(x , y) for all x , y ∈ V(C).
Prove that the set of isometric cycles in G spans the cycle space of G. (see Naatz [2000])
15.2.20. Let Q be a nonempty family of subsets of [n]. Prove that the number of subsets
of Q using each element of [n] an even number of times equals the number using each
element of n an odd number of times. (Beckwith [2001])
15.2.21. (+) Light bulbs l1 , . . . , ln are controlled by switches s1 , . . . , sn . The ith switch
flips the status of the ith light and possibly others, but si flips the status of lj if and only
if sj flips the status of li . Initially all lights are off. Prove that it is possible to turn all the
lights on. (Lovász [1979], Peled [1992])
15.2.22. Prove that the number of 1-factors in the ¾-dimensional hypercube Q¾ is at least
exponential in ¾ . (Clark–George–Porter [1997], Lovász–Plummer [1986])
15.2.23. (♦) Show that Lemma 15.2.22 can generate the orientation of the grid below.
Use it and Theorem 15.2.23 to count the 1-factors in P4 P4 .
• • • •
• • • •
• • • •
• • • •
ming over all partitions of [2n] into pairs. Establish a bijection that associates a set of
terms in the computation of (Pf B)2 with an equivalence class of permutations of [n] whose
cycles all have even length. Conclude det B = (Pf B)2 . (Muir [1882, 1906])
Exercises for Section 15.2 765
15.2.26. For an oriented graph G with adjacency matrix B, prove (A)–(C) equivalent:
(A) |Pf B| is the number of 1-factors of G (see Exercise 15.2.25 for Pf B).
(B) For every perfect matching M in G, every M-alternating cycle traverses an odd
number of edges of G in each direction.
(C) For some perfect matching M in G, every M-alternating cycle traverses an odd
number of edges of G in each direction.
15.2.27. For m ≥ n/2, with n even, determine the multigraph with m edges and n vertices
that has the most perfect matchings. (Hajek–Narayanan [1994])
15.2.28. Let Mn be the graph obtained from the cycle C2n by adding edges joining opposite
vertices. Count the perfect matchings in Mn and in the graph Cn K 2 . (Hosoya–Harary
[1993], McSorley [1998]) (Comment: Esperet–Kardoš–King–Král’–Norine [2011] proved
that the minimum number of perfect matchings in 3-regular bridgeless graphs grows ex-
ponentially with the number of vertices.)
15.2.29. Let G n be the class of 3-regular connected graphs with n white vertices, n black
vertices, and no monochromatic cycles. In a good orientation of G ∈ G n , white vertices
have indegree 2 and black vertices have outdegree 2. (R.E. Prather)
(a) Prove that the numbers of purely white edges and purely black edges are equal, and
both color classes induce forests, with white trees W1 , . . . , W¾ and black trees B1 , . . . , B¾ .
(b) Let M(G) denote the ¾-by- ¾ matrix in which entry mi , j is the number of edges from
Wi to Bj . Prove that the number of good orientations of G is the permanent of M(G).
(c) Find the least n such that G n has a graph with no good orientation.
(d) For even n, construct a member of G n with 1 + 3n/2 good orientations.
15.2.30. A matrix is doubly stochastic if all entries are nonnegative and rows and
columns all sum to 1. Egorychev [1981] and Falikman [1981] proved the van der Waer-
den Conjecture that the permanent of such a matrix of order n is at least n!/nn , with
equality only when every entry is 1/n. Here are some initial steps.
(a) Prove that a nonnegative matrix of order n has permanent 0 if and only if it has a
¾-by-(n + 1 − ¾) submatrix of 0s for some ¾ .
(b) A matrix of order n is decomposable if it has a ¾-by-(n−¾)submatrix of 0s, for some
¾ . Prove that a doubly stochastic matrix minimizing the permanent is indecomposable.
(c) A doubly stochastic matrix has 1 as an eigenvalue. Prove that the multiplicity of
1 as an eigenvalue is 1 if and only if the matrix is indecomposable.
15.2.31. (+) van der Waerden Conjecture for matrices with all entries nonzero. Doubly
stochastic matrices of order n having the smallest permanent are called optimal.
(a) Prove that if A is an indecomposable matrix with nonnegative entries (Exercise
15.2.30), then A A T and A T A are also indecomposable.
(b) Let Ai , j be obtained from A by deleting row i and column j . Prove that if A is an
optimal matrix with ai , j > 0, then per Ai , j = per A. (Marcus–Newman [1959])
(c) Show that if per Ai , j = per A for every i , j , then replacing a column by an arbi-
trary vector with the same sum does not change the permanent.
(d) Conclude that the doubly stochastic matrix with all entries equal has the smallest
permanent among doubly stochastic matrices with all entries nonzero.
15.2.32. Properties of invertible incidence functions.
(a) If º is an invertible incidence function, prove that the left inverse of º computed
in Lemma 15.2.29 is also a right inverse.
(b) If 1 − º is an invertible incidence function, prove that (1 − º )−1 = ∑¾≥0 º ¾ .
15.2.33. Let º and ½ be functions on poset P such that ½(x) = ∑ y≤ x º (x) for all x ∈ P.
Using the recursive definition of the Möbius function, prove by algebraic manipulation
that ∑ y≤ x ½(y)Þ(y , x) = º (x). (Comment: This completes Proof 1 of Theorem 15.2.33.)
766 Chapter 15: Linear Algebra
15.2.35. Let and be incidence functions on a poset P. Let A be the matrix with
rows and columns indexed by elements of P whose (x , y)-entry is ∑ ∈ P ( , x)( , y). Prove
that det A = ∏ ∈ P ( , )( , ). (Hint: Generalize the argument for Exercise 4.1.65.)
(Altinisik–Sagan–Tuglu [2005])
15.2.36. Let F be a family of finite sets closed under taking subsets (this is the definition
of a simplicial complex). For A ∈ F , let U(A) denote the family of all members of F that
contain A. Fix ∈ . Suppose that ∑ B∈U(A)(−1)| B| = 0 whenever | A| < . Prove that | F | is
divisible by 2 . (Stanley [2009])
15.3. Eigenvalues
There are important applications of eigenvalues of various combinatorial ma-
trices, such as transition matrices of Markov chains. We restrict our attention
to matrices arising from the adjacency matrix of a graph. The classical approach
uses the adjacency matrix itself; see Biggs [1974] and a more encyclopedic treat-
ment in Cvetković–Doob–Sachs [1979]. Other texts with further applications
and eigenvalues of other graph matrices include Bapat [2010], Brouwer–Haemers
[2012], and the broader Godsil–Royle [2001], which studies many algebraic top-
ics in graph theory. We consider first the classical eigenvalues and then briefly
discuss a modern alternative.
SPECTRA OF GRAPHS
(2) ∏ i = (−1)n (G; 0) = det A = ∑ sign( ) ∏ni=1 ai , (i) , where the sum runs
over permutations of [n].
(3) For a symmetric real n-by-n matrix A and ∈ , the multiplicity of as
an eigenvalue of A is n − rank( I − A).
(4) Adding c to the diagonal shifts the eigenvalues by c, since + c is a root
of det( I − (cI + A)) if and only if is a root of det( I − A).
By = x and B x = y.
T
− y)
Let v = (−xy). Compute Av = ( B(BT x
) = (−ëëyx) = − v . Hence v is an eigen-
vector of A with eigenvalue − . Furthermore, m independent eigenvectors for
yield m independent eigenvectors for − . Since the same argument holds for − ,
we conclude that − is an eigenvalue with the same multiplicity as .
768 Chapter 15: Linear Algebra
Standard results from linear algebra are useful. For a real symmetric ma-
trix of order n, the Spectral Theorem guarantees real eigenvalues and n or-
thonormal eigenvectors. Also, x T Ax attains its maximum and minimum over
unit vectors at eigenvectors of A, where it equals the corresponding eigenvalue.
The Cayley–Hamilton Theorem states (A) = 0. Finally, the minimum poly-
nomial of a matrix A is the polynomial of least degree such that (A) = 0; it is
given by (A) = ∏i( − i), where 1 , . . . , r are the distinct eigenvalues of A.
15.3.7. Theorem. The diameter of a graph G is less than the number of distinct
eigenvalues of G.
Proof: The adjacency matrix A satisfies a polynomial of degree r if and only if
some linear combination of A0 , . . . , Ar is 0. Since the number of distinct eigenval-
ues is the degree of the minimum polynomial, we need only show that A0 , . . . , A¾
are linearly independent when ≤ diam (G).
Finally, for ≤ diam (G) choose vi , vj ∈ V(G) such that d(vi , vj ) = . By
counting walks, we have A¾i , j
= 0 but Ati , j = 0 for t < . Hence A¾ cannot be a
linear combination of the smaller powers.
Let max(G) and min(G) denote the largest and smallest eigenvalues.
15.3.8. Lemma. If G is an induced subgraph of G, then
min(G) ≤ min(G ) ≤ max(G ) ≤ max(G) .
Proof: The adjacency matrix A of G is real and symmetric, so min(A) ≤ x T Ax ≤
max(A) for every unit vector x. Index V(G) to put the adjacency matrix A of
G in the upper left of A. Let be the unit eigenvector of A such that A =
max(G ) . Let be the unit vector in n obtained by appending zeros to . Now
max(G ) = T A = T A ≤ max(G).
Similarly, min(G ) ≥ min(G).
Section 15.3: Eigenvalues 769
Lemma 15.3.10 enables us to improve the trivial bound (G) ≤ 1 + (G) given
by the greedy coloring algorithm. Replacing (G) with the average degree is too
small; K n + K 1 has chromatic number n and average degree less than n − 1. Since
max is always at least the average degree, 1 + max (G) has a chance to work and
cannot be much improved.
The relationship between max and the average degree 2m/n also aids in de-
veloping an eigenvalue proof of the upper bound in Mantel’s Theorem, the case of
Turán’s Theorem (Theorem 5.2.11) for triangle-free graphs. The essence of this
argument can be found in Bapat [2010, p. 74].
15.3.12. Theorem. Every n-vertex triangle-free graph has at most n2/4 edges.
Proof: Let G be an n-vertex graph with m edges, t triangles, adjacency matrix
A, and eigenvalues 1 , . . . , n in nonincreasing order.
The triangles in a graph are its 3-cycles, which are closed walks. Each cycle
of length 3 through vertex vi is counted twice in the ith diagonal entry of A3 ;
770 Chapter 15: Linear Algebra
hence Trace A3 counts each triangle six times. The trace of a matrix is the sum
of its eigenvalues, and the eigenvalues of A¾ are ë¾1 , . . . , ë¾n . Hence
6t = Trace A3 = ∑i=1 ë3i = ë31 + ∑ i=2 ë3i .
n n
We want to prove that the number of triangles is positive when m > n2/4.
For this it suffices to show that the assumption m > n2/4 implies ë31 > ####∑i=2 ë3i ####.
n
√ √ # #
If m > n2/4, then m > n/2, and hence ë 1 ≥ 2m/n > m. Since the ith
diagonal element of A2 counts the edges incident to vi ,
2m = Trace A2 = ∑i=1 ë2i > m + ∑i=2 ë2i .
n n
√
From this and ë 1 > m we obtain ë21 > m > ∑i=2 ë2i . Thus ë 1 is the only eigen-
n
value of largest absolute value. Now we use the triangle inequality and these
facts to compute
###∑n ë3 ### ≤ ∑ n ### ë3 ### = ∑n | ë i |3 < ∑n ë 1 | ë i |2 < ë 1 ë2 = ë3 .
## i=2 i ## i=2 ## i ## i=2 i=2 1 1
15.3.13.* Remark. Mantel’s Theorem is just the beginning. Recall that T n ,r de-
notes the r-partite Turán graph with n vertices (Definition 5.2.10), and tr(n) =
| E(T n ,r)|. Nikiforov [2007] proved that if G is an n-vertex graph not contain-
ing K r+1 , then ë max(G) ≤ ë max(T n ,r), with equality only when G = T n ,r . Using
Lemma 15.3.10 and the fact that | E(T n ,r)| = ⌊ n ë max(T n ,r)/2⌋ , Turán’s Theorem
that T n ,r is the unique such graph with the most edges is a corollary.
Nikiforov went further. Fixing s ∈ and c > 0, the Erdős–Stone Theorem
(Theorem 11.1.10) states that for sufficiently large n, every n-vertex graph with
at least tr(n) + cn2 edges contains a complete (r + 1)-partite graph with s vertices
in each part. Bollobás–Erdős [1973] showed that exponentially large n suffices, or
equivalently that one can guarantee s to be (log n).
Nikiforov [2009] proved a stronger version of these results using eigenvalues,
r −1
showing for r ≥ 3 that if s = ⌊(c/r r)r log n⌋ ≥ 1 and t = ⌈ n1−c ⌉ , then every n-
vertex graph with ë max ≥ (1 − 1/(r − 1) + c)n contains a complete r-partite graph
with r − 1 parts of size s and one part of size t. Note that | E(G)| ≥ tr−1 (n) + cn2/2
implies this condition on ë max .
15.3.14. Theorem. For every graph G, the number of bicliques needed to par-
tition E(G) is at least max{p , q}, where p and q count (including repetition)
the positive and negative eigenvalues of the adjacency matrix A.
Proof: When G decomposes into subgraphs G 1 , . . . , G t , we may write A =
t
∑i=1 Bi , where Bi is the adjacency matrix of the spanning subgraph of G with
edge set E(G i). To write this algebraically, let {Ri , Si} be the bipartition of G i ,
and for U ⊆ V(G) let 1U denote the vector that is 1 in the positions for U and 0
elsewhere. Now A = ∑i=1 (1 Ri 1STi + 1Si 1 TRi).
t
Section 15.3: Eigenvalues 771
Sylvester ’s Law of Inertia states that for any symmetric real matrix Q with p
positive eigenvalues and q negative eigenvalues, the number of products of linear
functionals needed to express x t Qx is at least max{p , q}. The special case above
for biclique decomposition is directly tailored to the graph application.
The biclique decomposition problem arose with a network addressing motiva-
tion in Graham–Pollak [1971], where the focus was especially on decomposing K n .
They attribute Theorem 15.3.14 to H.S. Witsenhausen. The proof given here is
from Gregory & Vander Meulen [1996] (see also Brouwer–Haemers [2012]). For
other discussions of the lower bound, see Tverberg [1982], Peck [1984], Reznick–
Tiwari–West [1985]. A conjecture of Erdős from the 1980s that a random n-vertex
graph decomposes into no fewer than n − (G) bicliques was disproved in Alon
[2015] and more strongly in Alon–Bohman–Huang [2017].
• • •
• • • • • •
• • • • • • • • •
• • • • • •
• • •
772 Chapter 15: Linear Algebra
Now suppose ë = (G). Removing the absolute value signs, equality requires
d(vj) = (G) and x i = x j for all vi ∈ N(vj). Iterating the argument reaches all
coordinates, since G is connected. Hence the eigenvalue associated with x equals
(G) only if G is regular and x is constant.
Counting arguments and then eigenvalue arguments greatly restrict the pos-
sibilities for the parameters ( , , ) of a strongly regular graph.
The argument above can also be traced in the opposite direction: a -regular
connected graph G is strongly regular with parameters , , if and only if it has
exactly three eigenvalues > r > s and these satisfy r + s = − and rs = −( − ).
Next we obtain a further necessary condition for the parameters of a strongly
regular graph, again using that the multiplicities of the eigenvalues are integers.
1 (n − 1)( − ) − 2
(n − 1 ± √ ).
2 ( − )2 + 4( − )
Proof: We show that these numbers are the multiplicities a and b of the eigen-
values r and s in Lemma 15.3.23. Remark 15.3.22 describes all cases when = 0.
Hence we may assume > 0, and thus G is connected.
Because G is connected, eigenvalue has multiplicity 1, and 1 + a + b = n.
Also the eigenvalues sum to 0, so + ra + sb = 0. The solution to these two lin-
ear equations is a = − ¾+ s(n−1)
r− s and b = ¾+r(n−1)
r− s . Letting r and s be the numbers
computed in Lemma 15.3.23 yields the claimed formulas as the multiplicities.
15.3.25. Example. Classes of strongly regular graphs. Consider the two cases
(n − 1)( − ) = 2 and (n − 1)( − )
= 2 .
Excluding trivial values, in the first case = + 1, since 0 < 2 < 2n − 2, and
hence = (n − 1)/2. By Exercise 23, G and G are thus strongly regular with the
same parameters. Using = + 1 and = (n − 1)/2, Proposition 15.3.21 yields
n = 4 + 1. Furthermore, the eigenvalues r and s have the same multiplicity.
In the second case, rationality requires ( − )2 + 4( − ) = d2 for some d ∈
, and d must divide (n − 1)( − ) − 2 . By Lemma 15.3.23, the eigenvalues are
integer multiples of 1/2. For ( , ) = (0 , 2), three such graphs are known, but
Section 15.3: Eigenvalues 775
it is not known whether the list is finite! The known examples, with parameters
(n , ¾ , ë , Þ), are C4 (4 , 2 , 0 , 2), the Clebsch graph (16 , 5 , 0 , 2) (see Exercise 24),
and the Gewirtz graph (56 , 10 , 0 , 2) (see Cameron–van Lint [1991], p. 43). Other
strongly regular graphs appear in Exercises 25–27.
ity are Moore graphs. Damerell [1973] and Bannai–Ito [1973] independently
proved that no Moore graph exists with diameter at least 3. The Integrality Con-
dition eliminates almost all possibilities when d = 2.
• •
• •
• •
•
• •
• •
• •
The symmetry of the condition suggests that G might be regular. The Inte-
grality Condition excludes this; the non-regular case is combinatorial.
Since the powers of the adjacency matrix count walks of fixed lengths, eigen-
values are related to distance and diameter. Eigenvalues of regular graphs are
also related to vertex degrees. Some of those results extend to non-regular graphs
(using essentially the same proofs) when the adjacency matrix is replaced with a
matrix that adjusts for the differences in vertex degrees. The “Laplacian matrix”
achieves this. A thorough treatment of the resulting “Lapacian eigenvalues”
appears in Chung [1997]; see also Grone–Merris–Sunder [1990], Mohar [1991,
1992], Mohar–Poljak [1993], Merris [1994, 1995], and Grone–Merris [1994].
15.3.31. Lemma. For a graph G with Laplacian matrix Q, the number of span-
ning trees is det(J + Q)/n2 .
Proof: The Matrix Tree Theorem states Adj Q = Ì(G)J. Since the Laplacian of
K n is nI − J , Cayley ’s Formula yields Adj (nI − J) = nn−2 J. Since J 2 = nJ and
JQ = 0, we have (nI − J)(J + Q) = nQ. Thus
(nn−2 J)Adj (J + Q) = Adj (nI − J) Adj (J + Q) = Adj [(nI − J)(J + Q)]
= Adj (nQ) = nn−1 Adj Q.
Canceling nn−2 yields JAdj (J + Q) = nÌ(G)J. By Remark 15.2.3, multiply-
ing both sides on the right by (J + Q) yields J(det(J + Q)I) = nÌ(G)nJ. Both sides
are multiples of J, so the desired equality holds.
Other methods for counting spanning trees appear in Kelmans [1965/66] and
Hartsfield–Kelmans–Shen [1996].
The second smallest Laplacian eigenvalue has important structural aspects.
The larger it is, the more highly connected the graph is. We have seen that 2(G)
is nonzero if and only if G is connected; this is a special case of (G) ≥ 2(G)(Corol-
lary 15.3.36). Since it bounds the connectivity from below, the second smallest
Laplacian eigenvalue is called the algebraic connectivity.
15.3.34. Lemma. If G 1 and G 2 are edge-disjoint graphs with the same vertex
set, then 2(G 1) + 2(G 2) ≤ 2(G 1 ∪ G 2).
Proof: Let G = G 1 ∪ G 2 . With Q , Q1 , Q2 denoting the Laplacian matrices of the
three graphs, respectively, we have Q = Q1 + Q2 .
The Laplacian matrix is a real symmetric matrix. By the Spectral Theorem,
1 (G) is the minimum of x Qx over unit vectors. Its value is 0, using eigenvector
T
1. Since a real symmetric matrix has a full set of orthonormal eigenvectors, 2(G)
is the minimum of x T Qx over the set C of unit vectors orthogonal to 1.
Since x T (A + B)x = x T Ax + x T Bx and Q = Q1 + Q2 ,
2(G) = min(x T Q1 x + x T Q2 x) ≥ min x T Q1 x + min x T Q2 x = 2(G 1) + 2(G 2).
x∈ C x∈ C x∈ C
x Q+I −1 ) ( x ) = (
Q ( ) = ( 2(H) + 1) ( x ) .
0 −1 T n−1 0 0
The bound fails for K n , since 2(K n) = n. It holds with equality for non-
complete cographs (Exercise 30). de Abreu [2007] surveyed results on 2(G).
Meanwhile, the algebraic connectivity also yields an important lower bound for
the density of edge cuts.
Section 15.3: Eigenvalues 779
We choose x so that edges crossing the cut contribute positively. Let s = | S| , and
set x i = −(n − s) for i ∈ S and x i = s for i ∈ / S. The sum on the right becomes
# #
n2 #### [S, S]#### . Our choice of x yields ∑ x i = (n − s)s − s(n − s) = 0, so x · 1 = 0. Since
1 is an eigenvector for Þ1 (G), the Spectral Theorem yields xx TQx ≥ Þ2(G). Hence
T
Since x T Qx = n2 #### [S, S]#### , we have #### [S, S]#### ≥ Þ2(G)s(n − s)/n.
# # # #
When applied to ¾-regular graphs, these results can be stated using ordinary
eigenvalues by substituting ¾ − ë 2 for Þ2 . Corollary 15.3.38 states that an n-
vertex graph having maximum degree ¾ and second Laplacian eigenvalue Þ is an
(n , ¾ , c)-magnifier with c = Þ/(2 ¾), as defined below.
EXERCISES 15.3
15.3.1. (−) Let A¾ be the ¾ th power of the adjacency matrix of a graph G. Prove that the
value in position (i , j) of A¾ is the number of vi , vj -walks of length ¾ in G.
15.3.2. (−) Prove that if a graph G has s vertices with identical neighborhoods, then 0
is an eigenvalue of G with multiplicity at least s − 1. Prove that if G has s vertices with
identical closed neighborhoods, then −1 is an eigenvalue with multiplicity at least s − 1.
15.3.3. (−) Obtain the eigenvalues of G 2 in terms of the eigenvalues of G, where G 2 is
obtained from G by adding the edges xy such that d G(x , y) = 2.
15.3.4. (−) Let F be a cartesian product where any two nonadjacent vertices have exactly
two common neighbors. Prove that both factors are complete graphs.
15.3.5. (−) Let G be an (n , ¾ , c)-magnifier with vertices v1 , . . . , vn . Define an X , Y -bigraph
H with X = {x1 , . . . , x n} and Y = {y1 , . . . , yn} by xi yj ∈ E(H) if and only if i = j or vi vj ∈
E(G). Prove that H is an (n , ¾ + 1 , c)-expander.
15.3.6. Let ¾ be the number of -cycles in G. Let L¾ = ∑ ¾i and D¾ = ∑ d ¾i , summing
the th powers of the eigenvalues and the vertex degrees, respectively. Obtain formulas
for 3 and 4 in terms of {L¾ } and {D¾ }.
n−1
15.3.7. (♦) Coefficients of the characteristic polynomial ∑i=0 ci n−i .
(a) Let H be the set of spanning subgraphs of a graph G such that every compo-
nent is an edge or a cycle. Let (H) and s(H) denote the number of components of H
and the number of components of H that are cycles, respectively. Prove that det A(G) =
∑ H∈H(−1)|V(H)|−¾(H) 2 s(H) . (Harary [1962b])
(b) Prove that ci = (−1)i ∑| S|=i det A(G[S]). (Hence c3 = −2t when G has t triangles.)
(c) Let Hi be the set of i-vertex subgraphs of a graph G whose components are edges
or cycles. Prove that ci = ∑ H ∈H (−1)¾(H) 2 s(H) . (Sachs [1967])
i
15.3.8. Write (G; ) as G . Let v and xy denote a fixed vertex and edge in G; let Z(v) and
Z(xy) denote the sets of cycles containing v or xy. Use Sach’s formula above to:
(a) Prove G = G −v − ∑u∈ N(v) G −v−u − 2 ∑ C∈ Z(v) G − V(C) .
(b) Prove G = G − x y − G − x− y − 2 ∑ C∈ Z(x y) G − V(C) .
(c) Obtain recurrences for the characteristic polynomials of paths and cycles.
Exercises for Section 15.3 781
matrix satisfying this equation has rank at least n − 1. Since the rank of the sum of two
matrices is at most the sum of their ranks, conclude rank S ≤ m and hence m ≥ n − 1.
15.3.20. (♦) For a graph G, a squashed cube embedding in dimension t encodes each
vertex as a vector in {0 , 1 , ∗}t such that d G(u , v) is the number of coordinates where one
of {u , v} has 0 and the other has 1. (Graham–Pollak [1972])
(a) Prove that every n-vertex graph G has a squashed cube embedding. (Comment:
Winkler [1983] proved qdim (G) ≤ n − 1, where qdim (G) is the least dimension needed.)
(b) Use a bijection between biclique decompositions and squashed-cube embeddings of
K n to show that qdim K n is the least size of a biclique decomposition.
15.3.21. (♦) Let G be a graph with eigenvalues 1 , . . . , n (in nonincreasing order).
(a) Let H be an induced subgraph of G with eigenvalues 1 , . . . , t . From Theorem
15.3.9 (Interlacing), conclude that i ≤ i for 1 ≤ i ≤ t and that 2 < 0 implies G = K n .
(b) Prove that (G) ≤ n − max{p , q}, where G has p positive and q negative eigenval-
ues (including repetition). (Comment: This approach proves the Erdős–Ko–Rado Theorem
from the eigenvalues of the Kneser graph K(n , ). See Godsil–Meagher [2016, 2.9–10].)
15.3.22. Given a real symmetric matrix partitioned as M = ( QPT QR) with P, R square, a
lemma in linear algebra yields max(M) + min(M) ≤ max(P) + max(R).
(a) Let A be a real symmetric matrix partitioned into t2 submatrices Ai , j such that
each Ai ,i is square. Prove that max(A) + (t − 1) min(A) ≤ ∑i=1 max(Ai ,i).
m
15.3.23. (♦) Let G be strongly regular with n vertices and parameters ( , , ). Prove
that G is strongly regular, and compute its parameters ( , , ).
782 Chapter 15: Linear Algebra
15.3.24. (♦) Let G be a triangle-free n-vertex graph in which any two nonadjacent ver-
tices have exactly two common neighbors.
(a) Prove that G is ¾-regular, where ¾ satisfies n = 1 + (¾+2 1 ) .
(b) Prove that ¾ is one more than the square of an integer not divisible by 4.
(c) Construct such graphs for ¾ ∈ {1 , 2 , 5}. Let H be the graph for ¾ = 5. Prove
that H − N[v] is the Petersen graph (for v ∈ V(H)) and that H is obtained from the 4-
dimensional hypercube by adding edges joining antipodal vertices. (Comment: A realiza-
tion for ¾ = 10 is known using combinatorial designs.)
15.3.25. Let G be a strongly regular graph containing K n+1 + K n ,n as an induced subgraph.
Use the Interlacing Theorem and the eigenvalue theorem for strongly regular graphs to
prove that G must have more than n2 vertices. (Comment: Vu proved this. Fon-Der-Flaass
[2002] proved that every graph with n vertices is an induced subgraph of a strongly regu-
lar graph with at most 4n2 vertices.)
15.3.26. (♦) Prove that the Petersen graph is strongly regular and determine its spec-
trum. Apply the spectrum to show that K10 does not decompose into three copies of the
Petersen graph. (Hint: Use the spectrum to prove that two copies of the Petersen matrix
have a common eigenvector other than the constant vector.) (Schwenk [1983])
15.3.27. The subconstituents of a graph G are the induced subgraphs of the form G[U]
where v ∈ V(G) and U = N(v) or U = N[v]. Vince [1989] defined G to be superregu-
lar if G has no vertices or if G is regular and every subconstituent of G is superregular.
Let S be the class consisting of {aK b : a , b ≥ 0} (disjoint unions of isomorphic cliques),
{K m K m : m ≥ 0}, C5 , and their complements.
(a) Prove that every graph in S is superregular and that every disconnected super-
regular graph is in S. (Comment: S is the set of all superregular graphs, but the full
inductive proof requires several pages. (Maddox [1996], West [1996])
(b) Prove that every superregular graph is strongly regular.
15.3.28. A ¾-regular connected graph of diameter d is distance-regular if there exist
c1 , . . . , cd and b0 , . . . , bd−1 such that whenever d(x , y) = i, the neighborhood of y contains
exactly ci vertices with distance i − 1 from x and bi vertices with distance i + 1 from x.
(a) Prove that the ¾-dimensional hypercube Q¾ is distance-regular.
(b) The Odd graph O¾ is the disjointness graph of the ¾-element subsets of [2 ¾ + 1]
(the Petersen graph is O2). Prove that O¾ is distance-regular.
(c) Given a distance-regular graph G, let Ai be the matrix with 1 in position (r, s) if
d(vi , vj ) = i and 0 otherwise. Note that ∑i=0 Ai = J. Prove that Ai is a polynomial of
d
degree i in the adjacency matrix, that (A − ¾ I)(∑ i=0 Ai) = 0, and that A0 , . . . , A d is a basis
d
EMBEDDINGS ON GRIDS
783
784 Chapter 16: Geometry and Topology
1 1 1
2• 3 2
•3
1 3 1 1
3 2 2
2•3
3 1 2
• 3 2 •
•
j
y• i ¾ •x
i i j
¾
•
x1 x 2 x1 x 2
3• • 3• •
2 32 2 32
2
3 • x3 3 • x3
1
3 • 11 2 ↔ 2
u2 3 x4 3• x4
1 3 • 11
1 2 1 2
1 1
• 1 1
a a•
G G
The labeling of a cell in G is inherited from the labeling of G , with u replac-
ing a in the triangles at a having no external edges, and the two triangles involv-
ing ua labeled as shown above. The requirements of consecutivity and clockwise
order at internal vertices are also inherited from the labeling of G , except for
being explicitly enforced at u.
angles at a have label 1, the angles at yr and yr+1 in their triangle with a have
the labels 2 and 3, respectively. Therefore, in the edge-coloring and orientation
of Remark 16.1.4, the edge yr yr+1 has color 2 if oriented from yr+1 to yr and color
3 if oriented from yr to yr+1 .
Since y0 and yt are external vertices, y0 y1 has color 2 and yt−1 yt has color
3. Hence there exists ¾ such that y¾−1 y¾ has color 2 and y¾ y¾+1 has color 3. The
angles between them (not involving a) have label 1, and the edges between them
have color 1 and enter y¾ . The only edges leaving y¾ go to a, y¾−1 , and y¾+1 .
If a and y¾ have a common neighbor outside {y¾−1 , y¾+1 }, then we have
shown that y¾ has color 1 and enters y¾ . However, a has color 1 and enters a.
Since no vertex has two exiting edges colored 1, there is no such vertex . Hence
y¾ is the desired vertex u.
y ¾ −1
• •
1
2 1 •
1 •
y¾ 3 •y¾+1
1
1
a•
to show that as a digraph T i has no cycle. This follows from the Uniform Angle
Lemma. A cycle in color i would have an inside angle of label i at the head of each
edge and an inside angle of another color at the tail of each edge, so it would have
no uniform angle in any label.
For the second statement, let {i , j , ¾} = {1 , 2 , 3}. If T i and T j each contain
v , u-paths Pi and P j , then Pi ∪ P j is a cycle C in G. However, along Pi inside C
is an angle of color i at the head of each edge and an angle of another color at the
tail of each edge. The same holds for P j with color j . Hence the only candidates
for uniform vertices are v and u, but the Uniform Angle Lemma requires three
such vertices on C.
Let Pi(v) denote the path from v to the root in the tree T i . Since no two of
P1 (v), P2(v), and P3(v) have a common internal vertex, they establish three re-
gions associated with v, as on the left below. Let Ri(v) denote the region (with
boundary) enclosed by Pi+1 (v), Pi+2 (v), and the external edge not containing wi .
As shown on the right, regions for distinct vertices can be ordered by inclusion;
we prove this and use it to obtain the barycentric representation.
w1
• •
1
1
v
v 3 • 2
R2(v) • R3(v) • •
3 • 2
x y
3 R (v) 2 u
1
w3• •w2 • •
Theorem 16.1.13 completes the proof that every planar graph with n vertices
has a straight-line embedding with the vertices at grid points in the triangle with
corners (2n − 5 , 0), (0 , 2n − 5), and (0 , 0).
Using a similar approach, the proof can be modified to obtain a more compact
embedding using only the points in a grid with side-length n − 1. The trick is to
count vertices instead of regions, but we must be more careful about the order
relation, and we need a more general notion of barycentric representation.
Let v i be the number of vertices in Ri(v) − Pi−1 (v), so v 1 + v 2 + v 3 = n − 1.
When v is the jth external vertex, Rj (v) contains all the vertices, P j (v) contains
one vertex, and P j +1 (v) contains two vertices. Hence we use the triples (n− 2 , 1 , 0),
(0 , n − 2 , 1), and (1 , 0 , n − 2) for these vertices. Note that again the coordinates
sum to n − 1.
Below we list the steps of converting these triples to a straight-line embed-
ding in the grid with side-length n − 1, leaving verification of the details as exer-
cises. The arguments are like those using the count of cells.
16.1.18. Example. For K 4 and for the octahedron labeled as at the start of this
subsection, the resulting embeddings appear below, with the image of the jth
external vertex labeled as j .
790 Chapter 16: Geometry and Topology
2• .
. . .
2• . . • • .
. • •1 . . • . •1
. • . . • . .
3 3
For an n-vertex graph G, the poset P(G) is a subposet of 2 n using only 1-sets
and 2-sets. Thus dim P(G) ≤ lg lg n + 12 lg lg lg n + O(1) (Corollary 12.3.35).
CROSSING NUMBER
Every drawing of a nonplanar graph in the plane has edge crossings. A nat-
ural objective is to minimize the number of crossings. There are several related
parameters, but for now we focus on the most common model. Recall that a cross-
ing is a common internal point of two edges.
Section 16.1: Graph Drawings 791
The notation cr(G) is the modern choice; other notations have been used but
are now less prevalent. We observed in Section 9.1 that all graphs have proper
drawings in the plane; we henceforth consider only proper drawings.
Crossing numbers of small graphs can often be found by extracting maximal
planar subgraphs.
•
• •
•
• • •
• • • •
• •
of cr(K n) is quartic, not cubic. The crossing number cannot exceed (4n), since we
can place the vertices on the circumference of a circle and draw chords. In this
drawing of K n , each set of four vertices contributes one crossing.
In fact, this is the worst straight-line drawing, since four vertices never pro-
duce more than one crossing in such a drawing. How much can be saved by a
better drawing? We give a recursive lower bound.
Since always cr(K n)/(n4) < 1, the recursive inequality implies that cr(K n)/(n4) has
a limit as n → ∞. However, the value of that limit is unknown.
n = 2 ¾ . View the sphere as a tin can. Place ¾ vertices on the top of the can and ¾
vertices on the bottom, drawing chords on the top and bottom for those ¾-cliques.
The edges from top to bottom fall into ¾ natural classes. The “class number ”
is the circular separation between the top and bottom endpoints, ranging from
⌈ −¾2+1 ⌉ to ⌈ ¾−2 1 ⌉ . We draw these edges to wind around the can as little as possible
in passing from top to bottom, so edges in the same class don’t cross. We now
twist the can to make the class displacements run from 1 to ¾ . This makes the
crossings easier to count but does not change the pairs of edges that cross.
• • •
x• y •
• • •
• • •
• •w
• • •
a
Crossings on the side of the can involve two top vertices and two bottom ver-
tices. For top vertices x , y and bottom vertices , w, where x has smaller posi-
tive displacement than xw, edges xw and y cross if and only if the displacements
Section 16.1: Graph Drawings 793
from x to y , , w are distinct positive values in increasing order. (This holds for
x , y , , w as shown, but not for x , y , , a, since ya winds around the can.) Hence
there are ¾ (¾3) crossings on the side of the can, so
cr(K n) ≤ 2(¾4) + ¾ (¾3) = 1 4
64 n + O(n3).
16.1.27. Example. For cr(K m ,n), a naive drawing puts the m vertices of one part
on one side of a channel and the n vertices of the other part on the other side,
with all edges drawn straight across. This produces (n2)(m )
2 crossings, but we can
do much better. Place the vertices along two perpendicular axes. Put the ver-
tices of the m-vertex part along the x-axis, with ⌈ m/2⌉ vertices on the positive
side and ⌊ m/2⌋ on the negative side. Similarly split the n-vertex part between
the positive and negative portions of the y-axis. Summing the four types of cross-
ings generated by adding straight-line segments for the edges yields cr(K m ,n) ≤
⌊m2
⌋ ⌊ m2−1 ⌋ ⌊ n2 ⌋ ⌊ n−2 1 ⌋ (Zarankiewicz [1954]).
The construction is conjectured optimal (Guy [1969] tells the history). K leit-
man [1970] proved this for min{n , m} ≤ 6. Aided by a computer search, Woodall
[1993] brought the smallest unknown cases to K 7 ,11 and K 9 ,9 . Using K leitman’s
result, Guy [1970] showed cr(K m ,n) ≥ m(m5−1) ⌊ n2 ⌋ ⌊ n−2 1 ⌋ (Exercise 15), not far from
the upper bound.
For dense graphs, the inductive argument of Theorem 16.1.26 yields a gen-
eral lower bound for crossing number conjectured in Erdős–Guy [1973]. There
is also an elegant probabilistic proof, which we present here. Stronger results
appear in Pach–Tóth [1997].
16.1.29. Example. The order of magnitude for the lower bound in Theorem
16.1.28 is best possible. Consider G = 2m n2
K 2m/n , where 2m is a multiple of n.
The total number of vertices is n, and the total number of edges is asymptotic to
( ) , which equals m. Since cr(K r) ≤ 64
n2 1 2m 2
r , we have cr(G) ≤ 2m ( ) = 18 m
n2 1 2m 4 3
1 4
2m 2 n 64 n n2
.
This is within a constant factor of the lower bound from Theorem 16.1.28.
16.1.30. Example. Unit distances among n points. Erdős [1946] asked how many
unit distances can occur among n points in the plane. In a unit grid, n points
794 Chapter 16: Geometry and Topology
√
can achieve about 2n − O( n) unit distances. The points of a finer grid within an
appropriate distance from the origin can achieve about n1+c/log log n unit distances
(Erdős). This growth is superlinear but slower than n1+ for all positive .
Erdős also proved an upper bound of O(n3/2). Let m count the pairs at distance
1 in a given set of n points. Let G be the graph with those pairs forming edges.
Since two circles of radius 1 intersect in at most two points, G does not contain
K 2 ,3 , so any two points have at most two common neighbors. Since each vertex v is
a common neighbor for its (d(v) 2
) pairs of neighbors, ∑ (d(v)
2
) ≤ 2(n2). Since 2m/n is
the average vertex degree, convexity yields ∑ (d(v) 2
) ≥ n(2m/n
2
). Thus (2m/n
2
) ≤ n − 1,
which yields the upper bound of O(n 3/2). (This
is the special case for , t) = (3 , 2)
(s
of the argument given for the upper bound on ex (n; K 2 ,3) in Theorem 13.2.19.)
16.1.32. Example. Products of cycles. After cr(K n) and cr(K m ,n), the question of
computing cr(Cm Cn) arises. For m ≤ n, a natural drawing proves an upper bound
of (m − 2)n, which Harary–K ainen–Schwenk [1973] conjectured to be optimal.
This has been proved for m = 3 (Ringeisen–Beineke [1978]), m = 4 (Dean–Richter
[1995]), m = 5 (Richter–Thomassen [1995] and K lešč–Richter–Stobert [1996],
and m ∈ {6 , 7} (Anderson–Richter–Rodney [1996, 1997]). Juarez–Salazar [2001]
gave a short proof that cr(Cm Cn) ≥ (m − 2)n/2.
Section 16.1: Graph Drawings 795
16.1.34. Definition. The linear crossing number cr1 (G) is the minimum num-
ber of crossings in a drawing of G whose edges are drawn as straight-line
segments. More generally, the t-linear crossing number cr t(G) is the min-
imum number of crossings when the edges are drawn as unions of at most t
line segments, allowing t − 1 “bends”.
The linear crossing number has historically been called the rectilinear
crossing number, but the t-linear generalization and the permissibility of arbi-
trary slopes (there is no relation to rectangles or axes) suggest dropping “recti”.
Guy [1972] proved that cr1 (K 8) > cr(K 8). The smallest graph for which this
occurs seems to be K 2 ,2 ,2 ,2 . Bienstock–Dean [1992, 1993] proved many startling
results. For graphs with crossing number at most 3, the crossing number and lin-
ear crossing number are equal. For ¾ ≥ 4, there are graphs with crossing number
¾ and linear crossing number arbitrarily high, but cr1(G) ≤ c (G)cr(G)2 . Also,
allowing one bend in the edges permits a better bound: cr 2(G) ≤ 2cr(G)2 . It is not
known whether these bounds are sharp. Bienstock [1991] proved that there is no
fixed t such that cr t(G) = cr(G) for all G.
• • •
•• •• •••• ••••
• • • • • • • • • • • •
•• •• •••• ••••
• • •
Form H by adding to H eight more edges, joining each vertex in the original
part of size 2 in the bipartition to the four neighbors of the other such vertex in
H. Call these chords of H . As shown above, H has crossing number at most 4.
We complete the construction by replacing each edge of H in H with a copy
of K 2 ,m , forming G. Since the crossings in our drawing of H do not involve edges
of H , we also have cr(G) ≤ 4 (in fact, equality holds).
If cr1 (G) < m, then each copy of K 2 ,m has a “clean” (uncrossed) path joining
its “endpoints”. Extracting this path yields a drawing of H in which the edges of
H are drawn using two segments, and the edges of H − H are drawn as straight
segments. The contradiction arises from a technical argument showing that this
yields a planar embedding of H that is not of the forms on the left above.
16.1.36. Theorem. (Bienstock–Dean [1993]) cr 2(G) < 2[cr(G)]2 for any graph G.
Proof: Let D be a drawing of G in the plane with cr(G) crossings. Obtain G from
D by deleting all edges involved in crossings; G is a plane graph. From G , form
a graph H by placing a vertex inside each face of G that lost edges. Let vC be
the vertex placed inside a face bounded by a cycle C, and make vC adjacent to the
vertices of C. Note that H is planar.
By Fáry ’s Theorem, H has a straight-line drawing D . Deleting vC from D
still leaves C as the boundary of a face. Finiteness of C allows us to assume that
vC does not lie on a segment joining vertices of C.
To embed G, we replace each deleted edge xy that was removed from the face
bounded by C in D. We add it to D − {vC } as the union of two segments close to
xvC and yvC , meeting near vC at a point on the bisector of the angle made by
xvC and yvC . We may need to adjust how far is from vC .
Let t C be the number of crossings inside C removed from the original drawing
of G; they involved at most 2t C edges, now replaced. We want any two such edges
to cross at most once, forming at most (2t2C ) crossings by replacing the edges.
One segment of x y may cross both segments of x y if x and y are on the
x , y-path along . To avoid this, we make close to vC when the x , y-path along
is long, farther from vC when the path is short. The narrower wedge is then
captured inside the wider wedge, avoiding crossings. We can make this precise
by placing the points near vC using a linear extension of the containment poset
of the paths along C. When the endpoints alternate along C, as in (x , x , y , y ),
there is only one crossing, behaving like the original crossing edges.
We have a 2-linear drawing of G. Since the original drawing was optimal,
∑C t C ≤ cr(G). Hence cr 2(G) ≤ ∑ (2t2C ) < 2 ∑ t2C ≤ 2[cr(G)]2 .
Exercises for Section 16.1 797
EXERCISES 16.1
16.1.1. (−) Prove that each point in a triangular region has a unique expression as a convex
combination of the vertices of the triangle (convex combinations are linear combinations
where the coefficients are nonnegative and sum to 1).
16.1.2. Find a Schnyder labeling and small grid embedding of the icosahedron.
16.1.3. Prove Lemmas 16.1.15–16.1.16 and Theorem 16.1.17 to complete the straight-line
embeddability of planar graphs in small grids.
16.1.4. Compute the crossing numbers for K4 ,4 , K 2 ,2 ,2 ,2 , and the Petersen graph.
16.1.5. Determine cr(K1 ,2 ,2 ,2) and use it to compute cr(K 2 ,2 ,2 ,2 ).
16.1.6. Prove that K3 ,2 ,2 has no planar subgraph with 15 edges. Use this to give another
proof that cr(K3 ,2 ,2) ≥ 2.
16.1.7. Prove that the crossing number of the graph below is at most 5.
• •
•
• •
• •
16.1.8. (♦) Let Mn be the graph obtained from the cycle Cn by adding chords between ver-
tices that are opposite (if n is even) or nearly opposite (if n is odd). The graph is 3-regular
if n is even, 4-regular if n is odd. Determine cr(Mn). (Guy–Harary [1967])
16.1.9. (♦) The graph Pn¾ has vertex set [n] and edge set {i j : |i − j | ≤ ¾}. Use a planar
embedding of Pn3 to prove cr(Pn4) = n − 4. (Harary–Kainen [1993])
16.1.10. Determine the crossing number of the graph below.
• • • • • •
• • • • • •
16.1.11. (♦) For each positive integer ¾ , show constructively that some graph embeddable
on the torus requires at least ¾ crossings when drawn in the plane.
16.1.12. (♦) A graph is 1-planar if it can be drawn in the plane with each edge involved
in at most one crossing. Prove that a 1-planar graph with n vertices has at most 4n − 8
edges, for n ≥ 2. The bound is sharp for n ≥ 12; prove sharpness for multiples of 4 at least
8. (Pach–Tóth [1997], Albertson–Mohar [2006], Nagasawa–Noguchi–Suzuki [2018])
16.1.13. (♦) Use the Four Color Theorem to prove that every 2-edge-connected 3-regular
graph with crossing number 1 is 3-edge-colorable. (Jaeger [1980])
16.1.14. (♦) Suppose that n is odd. Prove that in all proper drawings of K n , the parity of
the number of edge crossings is the same. Conclude that cr(K n) is even when n is congruent
to 1 or 3 modulo 8 and is odd when n is congruent to 5 or 7 modulo 8.
798 Chapter 16: Geometry and Topology
16.1.15. (♦) Use cr(K6 ,n) = 6⌊ n2 ⌋ ⌊ n−2 1 ⌋ (Kleitman [1970]) to prove the following.
(a) cr(K m ,n) ≥ m m5−1 ⌊ n2 ⌋ ⌊ n−2 1 ⌋ . (Guy [1970])
(b) cr(Kp) ≥ 80 p + O(p3).
1 4
m−1 n−1
16.1.16. It is conjectured that cr(K m ,n) = ⌊ m
2 ⌋ ⌊ 2 ⌋ ⌊ 2⌋ ⌊ 2 ⌋
n
. Suppose that this conjec-
ture holds for K m ,n and that m is odd. Prove that the conjecture then holds also for K m+1 ,n .
(Kleitman [1970])
16.1.17. Suppose that m and n are odd. Prove that in all proper drawings of K m ,n , the
parity of the number of edge crossings is the same. Conclude that cr(K m ,n) is odd when
m − 3 and n − 3 are divisible by 4 and even otherwise.
16.1.18. Use Exercise 16.1.17 and Kleitman’s computation of cr(K6 ,n) to prove cr(K7 ,7) ∈
{77 , 79 , 81}. (Comment: Woodall [1993] proved cr(K7 ,7) = 81.)
16.1.20. Prove cr(C3 C3) ≥ 2. (Hint: Find three subdivisions of K3 ,3 that together use
each edge exactly twice.)
16.1.21. Let Q¾ denote the ¾-dimensional hypercube. Prove cr(Q4) ≤ 8. (Comment: Faria–
de Figueiredo–S ýkora–Vrt ’o [2008] proved cr(Q¾ ) ≤ 32 4 − ⌊ ¾ 2+1 ⌋ 2 ¾−2 , conjectured to hold
5 ¾ 2
with equality by Erdős–Guy [1973]. S ýkora–Vrt ’o [1993] proved cr(Q¾) ≥ 20 4 + O(¾ 2 2 ¾).)
1 ¾
16.1.22. (♦) Let º (n) = cr(K n ,n ,n). Prove that n3(n − 1)/6 ≤ º (n) ≤ (9/16)n4 + O(n3). (Hint:
For the lower bound, use Lemma 16.1.24 after proving cr(K3 ,3 ,2) ≥ 5 and cr(K3 ,3 ,3) ≥ 9.
For the upper bound, embed K l ,m ,n on a tetrahedron or generalize a drawing of K n .)
√ (♦) In the plane, let P be a set of n points, and let L be a set of m lines, with
16.1.23.
m ≥ n. Each occurrence of a point in P on a line in L is an incidence. Prove that there
are fewer than 4n2/3 m2/3 incidences. (Szemerédi–Trotter [1983]) (Hint: Use the technique
of Theorem 16.1.31. Comment: This short proof is due to Székely [1997].)
Sperner ’s Lemma in the plane involves only parity arguments, but its induc-
tive higher-dimensional generalization to simplices takes us toward the applica-
tions of simplices considered later.
In a proper labeling, each label appears at one corner of T , and label i avoids
the edge of T joining the corners not labeled i. The figure below illustrates a
simplicial subdivision and the graph we will obtain from it to prove that it has a
completely labeled cell.
1
0 1 2 • •
• • •
0 2 • •
1
1
0 1 • •• • • • •
1 2 • • • • •
0 • • • •
0 0 2 0 2
16.2.3. Definition. When the vertices of a graph G are numbered with distinct
integers, the dilation is the maximum difference between integers assigned
to adjacent vertices. The bandwidth B(G) of G is the minimum dilation of
a numbering of G.
Dilation is minimized when the numbering has no gaps, but gaps can be con-
venient (Exercise 8). One motivation for studying bandwidth is to minimize the
delay between adjacent vertices when the vertices must be processed in a linear
order. The name originates from sparse matrix computations; the bandwidth of
a matrix is the maximum of |i − j | for a nonzero position (i , j). Computation of
bandwidth is NP-hard even for trees with maximum degree 3 (Garey–Graham–
Johnson–Knuth [1978]). We present two simple lower bounds.
Proof: For each value of , some set S of vertices must be the first vertices in
an optimal numbering of G. The bandwidth of G must be at least | S| , because
the vertex among S that has the highest label has an edge of dilation at least
| S| to a neighbor in S.
row r, with position (r, s) being the only element of row r omitted by S. In every
column other than s, there is an element of S, but S contains no column, so each
such column contains an element of S. Finally, position (r, s) itself lies in S,
since it completes row r. Thus | S| ≥ n, and Proposition 16.2.7 applies.
√
The local density bound for Pn Pn is only about (2 − 2)n (Exercise 3). The
boundary bound for a graph may be smaller than the bound in Proposition 16.2.7,
but for Pn Pn they are equal (Exercise 4).
•
• •
• • •
• • • •
• • • • •
Proof: We use induction on d, proving the stronger statement that the number
of completely labeled cells is odd. For d = 0 the claim is trivial. For d > 0, form a
graph G having a vertex for each cell inside T and one vertex w for the “outside”.
Join two vertices by an edge in G if their intersection is a (d − 1)-dimensional
simplex whose corners have every label except d.
Every completely labeled cell has degree 1 in G. Every other cell has degree
0 or 2, since having d labels without label d requires a repeated label, and a facet
generating an edge is formed by taking either vertex having the repeated label
plus all the remaining vertices (if they have distinct colors).
The vertex w has neighbors in G only via the facet T omitting the corner of
T with color d, since no other facet has vertices with all labels but d. Restrict-
ing the subdivision to T yields a properly labeled simplicial subdivision in d − 1
dimensions. Its completely labeled cells yield the edges incident to w in G.
By the induction hypothesis, w has odd degree in G. Since the number of
vertices of odd degree is even and all other vertices of odd degree in G correspond
to completely labeled cells, the number of completely labeled cells is odd.
16.2.15. Example. The game of Hex. In two dimensions, n-by-n Hex is played on
a grid of n2 hexagons, shown below on the left for n = 4. Two players alternately
seize hexagonal cells. One player wants to seize cells forming a path connecting
the upper-left border and the lower-right border; the other wants a path connect-
ing the upper-right border and the lower-left border.
The game was invented by the Danish poet and engineer Piet Hein in 1942
and reinvented by John Nash in 1948 as a graduate student at Princeton. Our
account comes from Nasar [1998, Chapter 6]. At Princeton the game was known
as “Nash” or “ John”. David Gale suggested the name “Hex” under which Parker
Brothers later marketed the game with n = 11. Nash proved that, unlike 2-
dimensional Tic-Tac-Toe, every game of Hex has a winner. Gale [1979] published
the equivalence in d between the extension of this result and the Brouwer Fixed-
Point Theorem. Tanaka [2007] showed that the Hex game theorem is also equiv-
alent to Arrow’s Impossibility Theorem of social choice theory.
The (weak) dual of the Hex board, for n = 4 on the right below, is the square
grid graph plus diagonal edges in one direction. In d dimensions, it is the cubical
grid plus edges within cubelets for the comparability graph of 2 n .
804 Chapter 16: Geometry and Topology
1 2
S
2 2
2 2
2
corners. Since the labeling is proper, points with that missing label are forbidden
/ U , so again º (x)
= x.
from U. Hence some corner of R is not in U , which yields x ∈
Since Brouwer ’s Theorem requires a fixed point, it cannot happen that there
is no completely labeled cell.
By this cycle of implications, the statements of these five theorems are equiv-
alent. Since we proved Sperner ’s Lemma (Theorem 16.2.13), they are all true.
2 1
−2 1 1
−2 2
1 1 1
2
1 2
2
−1 2
−1
Section 16.2: Combinatorial Topology 807
The special subdivision of B̂2 shown above is adapted from Matoušek [2003,
pp. 37–40], which also presents the proof we give for Tucker ’s Lemma. “Refining ”
the octahedral subdivision means that each orthant is a union of cells in the spe-
cial subdivision. Labels from {±1 , . . . , ± n} are given to the vertices, with each
vertex in Ŝ n−1 given the negation of the label on the antipodal vertex. We say that
labels i and −i are complementary and that an edge (1-dimensional simplex) with
complementary labels is a complementary edge. We seek a complementary edge.
Our proof of Tucker ’s Lemma uses the same tool as Sperner ’s Lemma: we
only need that the number of odd-degree vertices in a special graph is even. In
both cases, the resulting proof is algorithmic. That is, following a path in the
special graph leads to the desired configuration. Tucker [1946] published a 2-
dimensional version. A proof for n dimensions via simplicial topology appears in
Lefschetz [1949].
• • 2 2
1 1 1 1 1 1
1 1 −2 −2
1
1 1
2 2 2 −1 −1
Now we prove the degree claims. Let ¾ be the number of labels required on a
fully labeled simplex , and let C be the smallest orthant containing . Since
is fully labeled, C has dimension , and has dimension − 1 or .
Suppose first that has dimension − 1. Since it has vertices and requires
labels for distinct indices, has no complementary edge. If
⊂ Ŝ n−1 , then is a
facet of exactly two -dimensional simplices in C. They are fully labeled because
they have the same smallest orthant as and already is fully labeled; this gives
two neighbors in G. Although a facet of may be fully labeled (this can happen
when the facet lies in a smaller orthant), it cannot be adjacent to , because it
has only − 1 vertices and thus cannot have all labels required by . If ⊂ Ŝ n−1 ,
then by the same argument is a facet of one neighbor that is a -dimensional
simplex in C, but the antipodal simplex to is also fully labeled and a neighbor.
In both cases, has degree 2.
Now suppose that has dimension ; it has + 1 vertices. Since only re-
quires labels, the + 1 labels on it may (a) have a duplicate label, (b) have a
complementary pair, or (c) have an unrequired label ± j with s j = 0. In case (a),
has two fully labeled facets with the required labels, in the same smallest or-
thant, and any larger fully labeled simplex containing and adjacent to would
force another label on ; hence has degree 2. In case (b), contains a complemen-
tary edge; since larger neighbors are forbidden by the same argument as above,
and only one facet has the required labels, has degree 1.
In case (c), form a new sign vector t from the sign vector s associated with
by setting the jth coordinate to the sign of the extra label on . Since s j = 0,
orthant C(s) is contained in orthant C(t), and is a facet of a fully labeled simplex
in C(t) that requires + 1 labels. The other ( + 1)-dimensional simplex of which
is a facet has the opposite sign in the jth coordinate, so even if it is fully labeled
it is not adjacent to . Meanwhile, as in the paragraph above, has exactly one
fully labeled facet that has the labels required by , so has degree 2. The one
exception is that when = O there is no smaller facet, so O has degree 1.
The central symmetry of the subdivision on the boundary is crucial for giv-
ing degree 2 to simplices there. No such symmetry is needed inside, since the
adjacency conditions are local. Refinement of the octahedral subdivision allows
the proof to use orthants of all dimensions, starting the path from the origin.
Tucker ’s Combinatorial Lemma sounds somewhat like Pouzet ’s Lemma (The-
orem 16.2.17). A short proof of Tucker ’s Lemma from Pouzet ’s Lemma would
complete a cycle of implications including the Borsuk–Ulam Theorem with only
Section 16.2: Combinatorial Topology 809
Sperner ’s Lemma proved directly. Tucker ’s Lemma holds also without requiring
refinement of the octahedral subdivision (Exercise 12, using Borsuk’s Theorem).
To obtain Borsuk’s Theorem from Tucker ’s Lemma any sequence of successively
refined subdivisions suffices, so we only need the restricted version proved above.
There are many versions of the Borsuk–Ulam Theorem. We start with one
well suited for the use of Tucker ’s Lemma and one used in our first application.
16.2.22. Definition. Let S n−1 denote the (n − 1)-dimensional sphere (in n), con-
sisting of the points having Euclidean distance 1 from the origin; the ball Bn
consists of those with distance at most 1. A function º on S n is antipodal if
º (− x) = −º (x) for all x ∈ S n .
16.2.23. Theorem. (Borsuk–Ulam Theorem; Borsuk [1933]) (A) If a continu-
ous function º : Bn → n is antipodal on the boundary S n−1 , then º (x) = 0
for some x ∈ Bn . (B) If a continuous function º : S n → n is antipodal on S n ,
then there exists x ∈ S n with º (x) = 0.
Proof: (Tucker [1946]; see Freund–Todd [1981]) Consider (A). To facilitate appli-
cation of Tucker ’s Lemma, we may use compositions with continuous functions as
in Theorem 16.2.18 (preserving antipodality) to assume instead that º is defined
on B̂n and antipodal on its boundary, which we have called Ŝ n−1 .
Suppose that º (x) is never zero. For any special subdivision T of B̂n , label
each vertex x with the least index i such that ºi(x) has the largest magnitude
among the coordinates of º (x), and let the sign of the label be the sign of ºi(x).
Since º (− x) = −º (x) when x ∈ Ŝ n−1 , antipodal points have complementary labels.
The subdivision and labeling satisfy the hypotheses of Theorem 16.2.21, and
hence there is a complementary edge. Successively refining the triangulation so
that the maximum length of edges tends to 0 yields a sequence of positive ends
and a sequence of negative ends of complementary edges. Since B̂n is compact,
the sequence of positive ends has a convergent subsequence. Since the distance
between points in the two sequences tends to 0, the corresponding points in the
sequence of negative ends converge to the same point x∗ , which lies in B̂n . It is ap-
proached through points on which the largest nonzero coordinate in º is positive
and through points on which it is negative. By continuity, º (x∗) = 0.
(A)⇒(B): let º : S n → n be continuous and antipodal. Note that S n ⊆ n+1 ,
so points in S n have n + 1 coordinates. For x ∈ Bn ⊆ n , define x ∈ S n by letting
x i = x i for 1 ≤ i ≤ n and x n+1 = (1 − ∑i=1 x2i )1/2 . Define ½ : Bn → n by ½(x) =
n
The next theorem yields bisections with at most ¾ cuts. Giving the positively
signed intervals to one thief and the negatively signed intervals to the other gives
each half the measure of each color. When consecutive signs are equal, fewer in-
tervals (and cuts) can be used.
only need to work our way down to E; but we include the return trip for complete-
ness. See Exercises 14–16 for other equivalent statements. We mostly follow the
presentation of Matoušek [2003].
The special case of Theorem 16.2.26E in which all n + 1 sets are open is also
called the Lyusternik–Shnirel’man Theorem. The case in which each set is open
or closed (slightly weaker than E) was shown by Greene [2002]. Aigner–Ziegler
[2014, Chapter 42] observed that no condition is needed on the last set.
16.2.30.* Remark. Lovász [1978] proved the Kneser Conjecture using topolog-
ical methods (homotopy). Bárány [1978] gave a short proof from Gale ’s Lemma
(Theorem 16.2.33) and the open set version of the Lyusternik–Shnirel’man Theo-
rem (see Exercise 19). These proofs appear in the book of Matoušek [2003], along
with proofs of the Kneser Conjecture by Dol’nikov [1981] and Sarkaria [1990]
using other variants of the Borsuk–Ulam Theorem.
Matoušek [2004] found a combinatorial argument for Kneser ’s Conjecture
using Tucker ’s Lemma without the Borsuk–Ulam Theorem, thereby avoiding
Section 16.2: Combinatorial Topology 813
Schrijver [1978] showed that a small subgraph of K(n , ¾) already has the full
chromatic number n − 2 ¾ + 2. For the proof we need to develop several tools.
b. Hence the intersection points are zeros of the polynomial p defined by p(t) =
(∑di=1 ai t i) − b. Since p has degree d, there are at most d points of intersection.
Furthermore, if there are d distinct points of intersection, then p has d sim-
ple zeros, and the derivative of p is nonzero at all those points. Thus p changes
sign at each of those points, which means that crosses H at each of them.
The moment curve has many applications in discrete geometry. Here we use
it to prove a stronger version of Gale’s Lemma; the original result of Gale [1956]
is the weaker version of the next result obtained by omitting the requirement of
cyclically nonconsecutive indices.
w1 H+ w11
H−
We claim that black and white points alternate along ¯ . Let j be the number
of times that ¯ crosses H between w and the next point w of W1 . The points of
crossing all lie in W0 , and by Lemma 16.2.32 the curve crosses through H at each
such point. Hence w and w are on the same side of H if and only if j is even, but
they have the same parity in W if and only if j is odd. Hence exactly one of the
two properties changes, which gives w and w opposite colors.
If wi is odd and lies in H − , then x i is in H + . Thus points of X that lie in H +
correspond to the white points in W1 , and the points of X that lie in H − corre-
spond to the black points in W1 . Since the colors alternate on the 2 points of
W1 along ¯ and 2 is even, there are points of each color, and no two cyclically
consecutive points in the indexing lie on the same side of H.
In [5], the 2-sets having no cyclically consecutive elements are the pairs of
the form {i , i + 2}, computed modulo 5. In the Petersen graph, which is K(5 , 2),
these vertices induce C5 ; already (C5) = 3. Schrijver proved that one can always
restrict K(n , ) to such sets without reducing the chromatic number.
vector can be normalized so that (u0 , . . . , ud) ∈ S d . For u ∈ S d , let H +(u) denote
the half-space specified by this correspondence.
Define º : S d → d by ºi(u) = Þi(H +(u)). Since H +(−u) = {x ∈ d : ∑i=1 ui x i >
d
u0}, the half-spaces associated with u and −u are disjoint and omit only the hy-
perplane defined by ∑i=1 ui x i = u0 . If º is continuous, then the Borsuk–Ulam
d
Theorem (Theorem 16.2.26B) provides u ∈ S d such that º (u) = º (−u). This can-
not occur when u = (1 , 0 , . . . , 0), since then H +(u) = d and H +(−u) = ∅. Thus
º (u) = º (−u) provides a hyperplane that bisects each mass.
We omit the argument that º is continuous. In more general versions of the
theorem this is a matter of some delicacy, but for the integrable functions we use
as masses it is intuitive.
Other interesting applications arise when the Ham Sandwich Theorem is ap-
plied to bisect finite sets of points. Recall that a set of points in general position
in d has no more than d points on any hyperplane.
816 Chapter 16: Geometry and Topology
16.2.38. Corollary. Every open necklace with colors of beads can be cut using
at most cuts, so that the union of odd-indexed intervals captures half the
beads of each color, with each color having an odd number of beads rounded
up or down as specified arbitrarily.
Proof: Place the beads of the necklace in order as points along the moment curve.
Let H be a hyperplane as guaranteed by Theorem 16.2.37, bisecting the point
sets. The cuts of the necklace correspond to where H crosses the moment curve.
No color with an even number of beads has a point on H , but each color with an
odd number of beads does. The cut made at each such bead can be put before
or after the bead depending on whether the half of that color in the odd-indexed
intervals should be rounded up or down.
Given n red points and n blue points in 2 , one can find a pairing so that the
resulting n segments are disjoint: just take a pairing to minimize the total length
of the segments. Like the necklace problem, this has a higher-dimensional gener-
alization that is nontrivial but follows easily from the Ham Sandwich Theorem.
BORSUK’S CONJECTURE
16.2.40. Lemma. Let n = 4p, where p is an odd prime. Let V be the set of
n-tuples in {−1 , 1}n such that the first coordinate is positive and the total
number of positive coordinates is even. If U is a subset of V containing no
p−1
two orthogonal vectors, then | U | ≤ ∑i=0 (ni).
Proof: Consider u , v ∈ U. Since u and v agree in the first coordinate, u · v
= − n.
If u
= v, then u · v
= n. Since u , v ∈ U , they are not orthogonal, so u · v
= 0.
We claim u · v ≡ 0 (mod 4). Let A and B be the subsets of [n] consisting of the
positions where u and v are positive, respectively. Now u · v = 4p − 2 | A B| , where
818 Chapter 16: Geometry and Topology
Furthermore, each p(v) has length n. Since V does contain orthogonal pairs of
vectors and p(u) · p(v) ≥ 0, it follows that the distance between p(u) and p(v) equals
the diameter of P if and only if u · v = 0.
Let m(n) = ∑i=0 (ni). By Lemma 16.2.40, each subset of P with no orthogonal
n/4
pairs has size at most m(n). Hence the number of sets needed to partition P into
pieces with smaller diameter is at least | P | /m(n), which equals 2 n−2/m(n).
For a slight further improvement, note that P is spanned by a set of (n2) vec-
√
tors (Exercise 26). With d = (n2), we have n ≈
√
2d, and º (d) ≥ 2 n−2/m(n) >
for large d. In the computations, we use ∑ (ni) < 32 (n/4
n/4
(1 .203) d n
) (see The-
√ i=0
orem 14.4.4) and (n/4) ≈ 8/(3 n)( 33/4
n 4 )n (by
Stirling ’s Formula). Thus (d) ≥
√ √
c(33/4/2)n ≈ (1 .136)n . With n ≈ 2d, we then raise 1 .136 to the 2 power.
EXERCISES 16.2
16.2.3. Prove that the local density lower bound for B(Pn Pn) is about n/2.
n+1
(b) For each such that (2) < < ( 2 ) , prove that | S| ≥ n whenever S ⊆ V(G) with
n
=
| | . Thus the boundary bound is n. (Chvatalová [1975])
S
16.2.5. (♦) Prove that B(Cn Cn) = 2n − 1 when n is odd. (Hint: For the lower bound, use
the technique of Theorem 16.2.8. Comment: The answer is also 2n − 1 when n is even, but
the argument for the upper bound is messier then.) (Li–Tao–Shen [1981])
16.2.6. Prove that every tree with leaves is the union of ⌈ /2⌉ pairwise intersecting
paths, and use this to prove that the bandwidth of a tree with leaves is at most ⌈ /2⌉ .
(Ando–Kaneko–Gervacio [1996])
16.2.7. (♦) Define a graph on the infinite grid 2 by making two vertices adjacent if they
are consecutive along a line with slope in {0 , ∞ , 1 , −1} (thus the graph is 8-regular). Prove
that for any set S having vertices from r rows and s columns, the boundary of S is at least
2r + 2s + 4. (Hint: The lower bound is immediate when S is an r-by-s rectangle. Comment:
This lemma was applied in Balogh–Kaul [2007] to random geometric graphs.)
16.2.8. (+) Bandwidth of caterpillars. Let G be a caterpillar, and let be an integer such
that ⌈ |V(H)|−1
diam H
⌉ ≤ for all H ⊆ G. Prove that B(G) ≤ . (Hint: Prove that G has a number-
ing in which (v) is a multiple of whenever v is on the spine and | (u) − (v)| ≤ for
all uv ∈ E(G). (Sysło–Zak [1982], Miller [1981])
16.2.11. Prove Brouwer ’s Theorem (Theorem 16.2.18) from the Borsuk–Ulam Theorem.
16.2.12. Prove the general form of Tucker ’s Combinatorial Lemma (Theorem 16.2.21)
from the Borsuk–Ulam Theorem (Theorem 16.2.23). That is, if T is a simplicial subdi-
vision of Bn that is antipodally symmetric on the boundary, and the vertices are labeled
from {±1 , . . . , ± n} so that labels on antipodal points of the boundary are complementary,
then there is a complementary edge.
16.2.13. Consider a circular necklace with beads of colors. To capture half the beads of
each color from such a necklace, an even number of cuts must be made. Show that 2⌈ /2⌉
cuts suffice, and that when is odd the first cut can be made between any two beads.
16.2.14. Prove that in Theorem 16.2.23, the second statement implies the first. That is,
if every continuous antipodal function from S n to n is somewhere zero, prove that every
continuous function from Bn to n that is antipodal on S n−1 is somewhere zero.
16.2.15. Prove that the following statement is equivalent to Theorem 16.2.26C: There is
no continuous : Bn → S n−1 that is antipodal on S n−1 .
16.2.16. For ∈ with 0 < < 2, the Borsuk graph B(n + 1 , ) has vertex set S n , with
points adjacent when separated by distance at least . Prove that the Borsuk–Ulam The-
orem is equivalent to the statement that (B(n + 1 , )) ≥ n + 2 for all n and .
820 Chapter 16: Geometry and Topology
16.2.18. (♦) Let P be the inclusion poset on the -sets and (n − )-sets in [n]. Apply The-
orem 16.2.29 to prove dim P ≥ n − 2 + 2 for n > 2 . (Hint: Given a realizer L1 , . . . , Lt ,
consider the unforced pairs consisting of a -set and its complement.) (Füredi [1994])
16.2.19. Kneser from Gale. For d ≥ 0 and ≥ 1, Gale [1956] proved that there is a set X
of 2 + d points in S d such that every open hemisphere contains at least points of X . Use
such a set X to give a proof of Theorem 16.2.29. (Hint: Given a proper (n − 2 + 1)-coloring
of K(n , ), use X to define appriopriate open sets A1 , . . . , A d+1 in S d and apply the open
set version of the Lyusternik–Shnirel’man Theorem.) (Bárány [1978])
16.2.20. Given a family of sets, the generalized Kneser graph K( ) has a vertex set ,
with vertices adjacent when the corresponding sets are disjoint.
(a) Prove that every graph is a generalized Kneser graph.
(b) Construct families of sets such that is the edge set of a hypergraph with chro-
matic number 2, but (K( )) is arbitrarily large.
16.2.21. (♦) Let G be the generalized Kneser graph of a family , defined in Exercise
16.2.20. Let c( ) be the minimum size of a set Y ⊆ ⋃( ) such that the hypergraph whose
edges are the members of disjoint from Y is 2-colorable. Prove (G) ≥ c( ). Show
c(([n]
¾ )) = n − 2 + 2. (Hint: Use the Lyusternik–Schirelman Theorem.)
16.2.22. (♦) The Schrijver graph S(n , ) is the subgraph of the Kneser graph K(n , ) in-
duced by the vertices that are -sets of [n] whose elements are nonconsecutive, viewed
cyclically. Recall that (S(n , )) = n − 2 + 2.
(a) Schrijver proved that S(n , ) is vertex-color-critical (deleting any vertex reduces
the chromatic number). Prove that not all Schrijver graphs are edge-critical.
(b) Prove that S(n , ) is guaranteed to be regular only when = 2.
16.2.24. Construct a spanning cycle in the 4-dimensional hypercube Q4 using four edges
in each direction. Use this to show that any 16 distinct points on the moment curve in 4
can be separated using 4 hyperplanes. (Comment: Robinson–Cohn [1981] showed that Qd
has a spanning cycle with 2 d/d edges in each direction if and only if d is a power of 2.)
16.2.26. Prove that there is a set S of (n2) vectors in n such that every point in the
2
MONOTONE SUBSEQUENCES
Ulam asked for the expected maximum length of a monotone sublist in a ran-
√ permutation of [n]. The Erdős–Szekeres Theorem guarantees always at least
dom √
n. Hammersley [1972] proved that the expected maximum is asymptotic to c n
for some c. Logan–Shepp [1977] proved c ≥ 2; Versik–Kerov [1977] proved c ≤ 2.
Pilpel [1990] provided a combinatorial proof of the upper bound. √
Here we show only that the expected maximum length is between (1 − 1/e) n
√
and e n, but we extend to higher dimensions. The proof of the lower bound follows
ideas in Winkler [1985] and Bollobás–Winkler [1988]. Recall from Chapter 10
that a d-dimensional permutation has a permutation of [n] in each coordinate;
we can view it as a d-tuple of permutations of [n]. Also, a list of d-dimensional
vectors is monotone if in each coordinate the list of values is monotone; some
coordinates may be strictly increasing and some weakly decreasing.
16.3.1. Theorem. For large n, the expected maximum length º (n) of a monotone
sublist of a d-dimensional permutation of [n] satisfies
(1 − 1/e)n1/(d+1) < º (n) < en1/(d+1) .
Proof: For the upper bound, we consider only d = 1, leaving the generalization
as Exercise 3. For the lower bound, we treat all dimensions.
Upper bound. Let X be the random variable counting monotone sublists
of length t. Each such list occurs in some t positions. For a given set of t posi-
tions, the probability that they form a monotone list is 2/t!. By the linearity of
expectation, (X) ≤ (nt) t!2 ≤ 2nt/(t!)2 . Using Stirling ’s Formula to approximate
√
t!, the bound becomes (ne2/t2)t/( t). In particular, if t ≥ e n, then (X) → 0. By
√
Markov ’s Inequality, whp there is no monotone sublist with length at least e n,
so the expected maximum length is less than that.
Lower bound. Instead of studying random d-permutations of [n], we study
n random points in a unit cube in d + 1 dimensions. Each coordinate of each point
is drawn uniformly from [0 , 1]. Equal values occur with probability 0, so each co-
ordinate gives an ordering. The first d coordinates give permutations by ordering
the indices according to the last coordinate. A chain in the product then means
822 Chapter 16: Geometry and Topology
points having the values in each coordinate in the same order. This allows us to
ignore the order of the generated points; we just look for a chain in the set.
When generating the permutations from n random points, each set of per-
mutations has the same probability. The jth coordinate gives the permutation
such that 0 ≤ a −1(1) < · · · < a −1(n) ≤ 1, where ai is the jth coordinate of the point
whose last coordinate is ith smallest. The n-tuples in the jth coordinate that map
to form an n-dimensional simplex in [0 , 1]n with volume independent of . (We
will revisit this simplex in Definition 16.3.7.) The choices of n points in the cube
mapping to a particular d-permutation form a cartesian product of d such sim-
plices. Thus when we generate a random element of ([0 , 1]d+1 )n , the volume (the
probability) that maps to any d-permutation is the same.
We claim that n random points in [0 , 1]d+1 expect to include a chain of the de-
sired size among chains of a restricted type. For large n, consider ⌊ n1/(d+1)⌋ small
cubes along the main diagonal in the unit cube; each has side length 1/⌊ n1/(d+1)⌋
and volume at least 1/n. The upper corner of each cube is the lower corner of the
next. If the n chosen random points hit X of these small cubes, then picking a
point from each of those cubes yields a chain of size X .
It thus suffices to show that (1 − 1/e)n1/(d+1) is a lower bound on (X). We
have X = ∑ X i , where X i = 1 if and only if the ith small cube is nonempty. It
is empty only if the n independent points all miss it, which has probability at
most (1 − 1/n)n since the small cube has volume at least 1/n. This probability is
bounded by 1/e, so (X i = 1) > 1 − 1/e. By the linearity of expectation, (X) =
⌊ n1/(d+1)⌋ (X i) > n1/(d+1)(1 − 1/e), where we have ignored lower-order terms.
If every poset contains a -balanced pair, then sorting from initial informa-
tion P takes at most log1/(1− ) e(P) comparisons. The closer is to 12 , the better.
16.3.4. Example. The poset 1 + 2 has just three linear extensions, so (x < y) ∈
{0 , 13 , 32 , 1} for all (x , y). Thus Conjecture 16.3.3 is best possible.
16.3.5. Remark. Conjecture 16.3.3 remains open, but K ahn–Saks [1984] proved
that = 113 3
suffices: in any finite poset, 11 < (x < y) < 11
8
for some pair (x , y).
Brightwell–Felsner–Trotter [1995] improved the guarantee to ≥ 12 − √1 for
2 5
finite posets and many infinite posets, using the machinery of K ahn–Saks plus
the Ahlswede–Daykin Inequality (see also Felsner–Trotter [1993]).
There is reason to think that the conjecture might fail on a semiorder (Defini-
tion 12.4.1). Brightwell [1988] constructed infinite semiorders where one cannot
guarantee a -balanced pair with > 12 − √1 (Exercise 8), but Brightwell [1989]
2 5
proved the 13 , 23 -conjecture for finite semiorders (Exercise 9). Brightwell–Wright
[1992] proved it for posets in which every element is incomparable to at most five
others, Trotter–Gehrlein–Fishburn [1992] for bipartite posets, and Olson–Sagan
[2018] for some other classes. Brightwell [1999] provides a survey.
The K ahn–Saks result implies that sorting can be completed using about
2.2 · lg e(P) comparisons. The proof does not produce a balanced comparison in
polynomial time, but K ahn–K im [1995] later addressed this using entropy (Sec-
tion 11.2), which is easy to compute, unlike e(P) (see Brightwell–Winkler [1991]).
Fredman [1976] presented an algorithm using lg e(P) + 2 | P | comparisons.
K ahn and Saks proposed a more detailed conjecture. Let w be the largest
such that every poset of width w has a -balanced pair. They conjectured that
w increases with w, approaching 2 from below. Komlós [1990] used functional
1
analysis to prove this for bipartite posets. It is known that 2 = 13 and 3 > 13 .
The proof below that 2 = 13 is easy; this case includes merging of two lists.
H+
H
H−
Since r(y1) is concave, u ≥ 1. Let S = (−1 , 0), and choose R on the line PQ so that
the double cone D obtained by revolving the triangle PRS has volume Vol (B).
R
(0 , r(0)) = Q
O
S = (−1 , 0) ( , 0) (1 , 0) (u , 0) = P
In both the left and the right half-planes, the volume under D is shifted to
t
the right from the volume under B. That is, ∫−1 [r(y1) − s(y1)]dy1 ≥ 0, where
s(y1) is the height of the piecewise linear curve SRP at y1 . This follows from the
concavity of r. Hence c D(y1) ≥ c B(y1). The problem thus reduces to showing the
following for the double cone:
If D is an n-dimensional double cone with apexes (−1 , 0 , . . . , 0) and
(u , 0 , . . . , 0) and centroid ( , 0 , . . . , 0) such that u ≥ 1 and ≥ −1/(n+ 1),
+)
then Vol(D
Vol (D)
> 2e1 .
Let C1 and C2 be the cones comprising D, with common base containing R, apexes
(−1 , 0 , . . . , 0) and (u , 0 , . . . , 0), and heights h1 , h2 with h1 + h2 = u + 1. Because
(C2) (C2)
C1 and C2 have the same base, we have Vol Vol (C1 )
= hh12 , or Vol
Vol(D)
= uh+21 . The volume of
an n-dimensional cone from a point is proportional to the nth power of its height,
so we can rewrite the ratio as
Vol (D+) Vol (D+) Vol (C2) u n h2
= · =( ) .
Vol (D) Vol (C2) Vol (D) h2 u + 1
Because this formula is minimized by maximizing h2 , which is equivalent to min-
imizing when Vol (D) is fixed, we may assume = n−+11 .
The distance from the apex to the centroid of an n-dimensional right cone is
n
n+1 times the height. Hence the centroids of C1 and C2 have y1 -coordinates −1 +
h1 n+n1 and u − h2 n+n 1 . Taking the weighted average of the centroids in proportion
to their volume yields the centroid of D, so
−1 1 h1 n h2 n
= [h1 (−1 + ) + h2 (u − )] .
n+1 u+1 n+1 n+1
Using h1 + h2 = u + 1 and solving for h2 yields h2 = nun
−1 . Substituting this
in our expression for the volume ratio and using u ≥ 1 yields
Vol (D+) n − 1 n−1 u 1
=( ) > .
Vol (D) n u+1 2e
the centroid of the order polytope if h(qi) = h(qj ). Hence when h(qi) = h(qj ) we
can conclude e−1 < (qi < qj ) < 1 − e−1 by Mityagin’s Theorem.
The K ahn–Saks [1984] proof uses the Alexandrov–Fenchel Inequalities for
mixed volumes. We only present a simpler application of these inequalities by
Stanley that motivated the K ahn–Saks approach.
Here “Inequalities” refers to a2i ≥ ai−1 ai+1 , the log-concavity of ⟨a⟩. The name
“mixed volume” for ai arises from a0 = Vol (K 0) and ad = Vol (K 1). A shorthand
notation for K ë is K ë = (1 − )K 0 + K 1 . Stanley applied Theorem 16.3.11 to ap-
propriate subsets of the order polytope to study the height distribution. Since
here we view a linear extension of an n-element poset as a map into [n], we say
“position ” rather than “height ”.
CONTAINMENT ORDERS
Every family of sets, under inclusion, forms a poset. We have studied such
posets for subsets of a finite set, for down-sets in a poset, etc. Specifying a family
from which the sets must be drawn yields a “containment class” of posets.
16.3.14. Example. When is the set of discs in the plane, the -containment
posets are the circle orders. When is the set of planar “wedges” separated
from the rest of the plane by two rays with a common endpoint, the -containment
posets are the angle orders. Allowing the set of polygonal regions bounded by a
path of ¾ segments yields the ¾-gon orders. We may also use boxes in t dimen-
sions, unions of t intervals, etc. When we must use finite sets, we are embedding
P in 2 t , where t is the size of the union of the sets, and we seek to minimize t.
16.3.15. Example. When is the set of ¾-dimensional boxes having one corner
at the origin and another with all coordinates positive, the -containment posets
are precisely the ¾-dimensional posets.
Angles are specified by four numbers: the coordinates of the center and the
angles of the rays. As expected, every 4-dimensional poset is an angle order (Ex-
ercise 12; Fishburn–Trotter [1985]), but some 5-dimensional posets are not. A
¾-gon is specified by 2 ¾ numbers, and every 2 ¾-dimensional poset is a ¾-gon order
(Exercise 16; Sidney–Sidney–Urrutia [1988]).
Circles in the plane are specified by three numbers: the radius and position of
the center. Some 4-dimensional posets are not circle orders. Hurlbert [1988] and
Scheinerman–Wierman [1988] proved that some infinite 3-dimensional posets are
not circle orders, leaving the finite case open. Finally, Felsner–Fishburn–Trotter
[1999] proved the existence of finite 3-dimensional posets that are not contain-
ment orders of spheres in any dimension; hence they are not circle orders.
◦
◦ ◦
◦ ◦
◦
Section 16.3: Volumes and Containment 829
To express Sn as a circle order, assign the 1-set i a tiny disc Ci so that the
centers of these are equally spaced on the unit circle, and assign each (n − 1)-set
i a large disc so that these centers are equally spaced on a large circle centered
at the origin. Arrange them so that Ci does not contain the unit circle, and the
segment joining the centers of Ci and Ci contains the origin. Choose the radii so
that Ci does not contain Ci but contains all Cj with j
= i.
To express Sn as an angle order, assign the 1-sets thin wedges pointing down
from corners on a horizontal line, and assign the (n − 1)-sets reflex-angle wedges
with corners directly below the corners of their complements. Such a wedge con-
tains all the narrow wedges except the one for the complementary set.
Our objective now is a general argument to show that when has ¾ degrees
of freedom, not all (¾ + 1)-dimensional posets are -containment posets. At the
time, many instances of this question for particular were open. To prove the
result, we need a lower bound on the number of n-element posets of a fixed di-
mension and an upper bound on the number of distinct n-element posets that are
-containment posets. When the dimension is too large, the former exceeds the
latter. Here we take logarithms with respect to any base, since only the ratio of
the logarithms matters.
For the lower bound, we construct nearly this many distinct posets. A poset
P has dimension at most ¾ if there exists º : P → ¾ such that x ≤ y if and only
if º (x)t ≤ º (y)t for all x , y , t. We construct point-sets {º (r) ∈ ¾ : 1 ≤ r ≤ n} that
yield distinct posets on [n].
Let m be a parameter, which we will later set to n/log n. Define m¾ boxes in
¾ as follows: for 1 ≤ j ≤ ¾ and 1 ≤ i ≤ m, let B
i , j be the product of [i , i + 2 ]
1
16.3.19. Example. Discs are 3-generated. Let be the set of discs in the plane.
For each disc, let º give the radius r and the coordinates (x , y) of the center. For
discs C1 and C2 , we then have C1 ⊆ C2 if and only if r1 − r2 ≤ 0 and (x1 − x2)2 +
(y1 − y2)2 − (r1 − r2)2 ≤ 0. In this example, only one sign pattern corresponds to
containment, but in general there may be more than one.
EXERCISES 16.3
16.3.1. (−) Show that if is the set of ¾-dimensional axis-parallel boxes, then the -
containment posets are precisely the 2 ¾-dimensional posets. (Dushnik–Miller [1941] for
¾ = 1; Golumbic–Scheinerman [1989] for all ¾)
16.3.2. Give a formula for the number of linear extensions of m × n. (Hint: Model the
linear extensions using objects counted in Part I of this book.)
16.3.3. (♦) Prove that the expected maximum length of a monotone sublist of a d-
dimensional permutation of [n] is at most en1/(d+1) . (Hint: See Theorem 16.3.1.)
16.3.4. Let Q be a poset with n elements. Suppose that element qi ∈ Q has height ¾ on a
linear extension . Prove that c( ( ))i = n+¾ 1 (statement (c) of Lemma 16.3.8).
16.3.5. Merging many chains. Let P be a disjoint union of chains with sizes n1 , . . . , n¾ .
(a) Determine the information-theoretic lower bound for the number of comparisons
needed to sort from the partial information P.
(b) Construct algorithms that come close to this lower bound when all but one chain
have size 1 and when all the chains have the same size. (Saks [1985])
16.3.6. Consider arbitrary sets of linear orders equally likely to be the “true underlying
linear order ”. Balanced comparisons are no longer guaranteed. Fix > 0. Show that there
is a set of linear orders on some finite set admitting no -balanced comparison, even when
the orders are a subset of the linear extensions of one poset. (Hint: Use orderings obtained
from a single ordering by transposing two consecutive elements.)
16.3.8. (♦) Define a poset Q on {xi : i ∈ } by xi < xj if and only if i ≤ j − 2. Let Qn and Q n
be the subposets consisting of {x1 , . . . , x n} and {x− n+1 , . . . , x0 , . . . , x n}, respectively.
(a) Determine the number of linear extensions of Qn . Compute limn→∞ (x1 > x2).
(b) Within Q n , let n = (x0 > x1). Compute limn→∞ n . What does this say about
balanced pairs in Q? (Brightwell [1988])
16.3.9. (+) In a poset P , say that an element is good for an ordered incomparable pair
(x , y) if covers x and is incomparable to y or if is covered by y and is incomparable to x.
(a) Prove that if 1 > (x < y) > 23 and every element ∈ P − {x , y} satisfies ( < x) ≥
2
3
or (y < ) ≥ 23 , then at least two elements are good for (x , y).
(b) Recall that a semiorder (Definition 12.4.1) is a poset representable by a function
such that x < y if and only if (y) − (x) > 1. Prove that if a semiorder P has no 13 -
balanced pair, then (x < y) > 23 whenever (x) < (y).
(c) Prove that every finite semiorder has a 13 -balanced pair. (Brightwell [1989])
832 Chapter 16: Geometry and Topology
16.3.10. Show that every poset is a containment poset of substars of a star. (Golumbic–
Scheinerman [1989])
16.3.11. Interval orders as containment orders. Let be the family of point-deleted real
intervals unbounded below; that is, a set A(a , b) ∈ is determined by two numbers a , b
with a < b by setting A(a , b) = {x ≤ b: x
= a}. Prove that the class of interval orders is
properly contained in the set of -containment orders.
16.3.12. Prove that every interval order and every 4-dimensional poset is an angle order.
(Fishburn–Trotter [1985])
16.3.13. Prove that every bipartite poset is a sphere containment order for spheres in
some dimension. (Scheinerman [1993])
16.3.14. Prove that every 3-dimensional poset is the containment poset of some set of equi-
lateral triangles with the same orientation. (Santoro–Urrutia [1987])
16.3.15. (♦) 2[4] − {∅ , [4]} is not a circle order. A function representation of P assigns each
i ∈ P a continuous function ºi : [0 , 1] → such that i ≤ j in P if and only if ºi(x) ≤ ºj (x)
for all x ∈ [0 , 1]. The crossing number of P is the minimum over all function diagrams of
the maximum number of crossings of two curves.
(a) Consider a function representation of the standard example Sn . Prove that there
are n different points x1 , . . . , x n such that ºi(xi) < ºi(xi) for 1 ≤ i ≤ n.
(b) For n even, let T n be the subposet of 2[n] consisting of the elements of size
1 , n/2 , n − 1. Prove that the crossing number of T n is n − 1.
(c) Prove that the crossing number of a circle order is at most 2. (Hint: Show first that
any finite circle order has a circle representation in which all the circles have a common
interior point. Use such a representation to construct a suitable function representation.)
(Sidney–Sidney–Urrutia [1988])
16.3.16. For ¾ ≥ 3, prove that every 2 ¾-dimensional poset is the containment order of a
family of ¾-gons, where ¾-gon is a polygonal region bounded by a closed curve consisting of
¾ segments. (Sidney–Sidney–Urrutia [1988])
16.3.17. Use Theorem 16.3.20 to prove that there are (2 ¾ + 1)-dimensional posets that are
not containment orders of ¾-gons, where a ¾-gon is the region enclosed by a simple polygon
with ¾ sides. (Hint: Show that if the segment from (x , y) to (x , y ) is not vertical, then it
intersects the segment from (a , b) to (a , b ) if and only if ( ba −−yx − yx −− xy ) ( ba−− yx − yx −− xy ) ≤ 0.)
16.3.18. (♦) Interval number of posets. The interval inclusion number of a poset P , written
i(P), is the least t such that P is a containment poset of a family of sets in which each set
is the union of at most t real intervals. (Madej–West [1991])
(a) Prove that i(Sn) = 2, where Sn is the standard example of dimension n.
(b) Prove that i(P) ≤ ⌈ r/2⌉ when dim P = r.
(c) Use Theorem 16.3.20 to show that part (b) is sharp for large r.
(d) Prove that | i(P) − i(P ∗)| ≤ 1, where P ∗ is the dual of P. (Comment: The difference
can be 1; i(P) is not a comparability invariant.)
16.3.19. Prove that the poset obtained from the n-dimensional subset lattice 2[n] by delet-
ing the top and bottom element has interval inclusion number ⌈ n/2⌉ . (Madej–West [1991])
16.3.20. Use Warren’s Theorem (see Theorem 16.3.20) to show that r polynomials in l
variables have at most (8edr/l)l plus/zero/minus sign patterns (Alon–Scheinerman [1988])
Hints to Selected Exercises
833
834 Hints to Selected Exercises
⌊n/2⌋
2.1.26. Prove ∑i=1 F̂ n+1−2i < F̂ n for n ∈ .
2.1.29. For length at least 2, solve the problem first for d = 1.
2.1.39. Interpret am ,n as counting strings in three types of steps, one vertical
and two horizontal.
2.1.42. Consider the argument for the derangement recurrence.
2.1.43. Count the permutations satisfying the increase condition. Eliminate the
non-derangements by considering the smallest and largest fixed points.
2.1.46. Both sides count the permutations of [n + ¾] with no fixed points in [n].
2.1.54. Use induction.
2.1.56. With bn = an/n, prove that bn+1 = bn + Cn(pq)n .
2.1.57. Find recurrences for both sequences.
2.1.63. One can introduce auxiliary sequences, obtain a system of recurrences,
and turn them into a single recurrence for ⟨a⟩, or obtain a single recurrence of
unbounded order and manipulate it to eliminate summations.
2.1.68. Use row and column operations and then induction.
2.2.27. Manipulate the expression for the sum so that the Binomial Formula can
be used to simplify it.
2.2.34. Divide (1 − x) and (1 − y) into the denominator and use the remainder
to express the denominator using (1 − x) and (1 − y) as factors. Expanding the
remaining factor leads to an infinite sum for the generating function. From the
¾ th term in the sum, extract its coefficient of x m y n .
2.2.37. With corners x0 , . . . , x n+1 , let x ¾+1 be the least indexed vertex such that
x¾+1 x n+1 is a chord; note that there may be no such chord.
2.2.39. Develop a system of recurrences for tilings of several types of boards.
2.2.40. Show that ⌊ n⌋ satisfies the recurrence that defines .
2.3.16. For part (a), consider the possible locations of the first ball.
2.3.18. For part (c), give a recurrence for in terms of which seat is filled last,
and use this to prove (n) = (n) by induction.
3.2.34. For part (a), use induction. For part (b), use part (a). For part (c), use
induction and integration without part (a).
3.2.36. First find the generating function, then use partial fractions.
3.2.40. Compare with Example 3.2.17.
3.3.15. For part (a), see Example 3.3.7.
3.3.16. Use the recurrence to obtain a differential equation for the EGF.
3.3.18. Use the correspondence between trees and n-ary lists.
3.3.22. Give a bijective argument using one Stirling number.
3.3.32. For part (a), begin with ∑ j =1 S(n , j)¾(j) = ¾ n from Theorem 3.3.13.
n
3.3.37. For part (a), consider the position of element n in a permutation of [n].
3.3.38. Express the even graphs with vertex set [n] in terms of general graphs
with vertex set [n − 1].
3.3.43. For part (a), modify the Exponential Formula to require an even number
of component structures.
3.3.48. Generalize the proof of Lemma 3.3.33.
3.3.53. Write the left side as a function of y.
3.4.17. Prove that they satisfy the same recurrence.
3.4.21. Interpret both sides using partitions, and then show bijectively that the
coefficients are the same.
3.4.34. Count permutations of [n].
3.4.37. For each multiset, choose a canonical path associated with it such that
the peak heights occur in nonincreasing order.
3.4.43. Interpret the two multisets using paths along the boundary of the Fer-
rers diagrams of the partitions.
3.4.45. Build an infinite sum in which each factorization of n contributes 1/n2 .
3.4.46. Reduce the problem to showing that negative entries can be eliminated.
3.4.49. Express the answer in terms of the greatest integer ¾ such that (¾2) < n.
4.1.15. Group the fractions j/n for j ∈ [n] by their denominators in lowest terms.
4.1.27. When is a number both an rth power and an sth power?
4.1.30. Count the n-sets in [2n] whose intersection with [n] is [t].
4.1.31. Group [2n] into pairs and consider the subsets of a certain size.
4.1.32. Count a certain type of subsets from a family of ¾ sets of size n.
4.1.33. For the inclusion-exclusion part, count a particular family of 0 , 1-lists
with no consecutive 1s.
4.1.44. View the squares as 1s in a permutation matrix, and interpret the color
of a square using parity.
4.1.46. Show that the left side is the inclusion-exclusion formula to count a set
counted more directly by the right side.
836 Hints to Selected Exercises
4.1.49. Expand the factor (n − ¾)n and interchange the order of summation to in-
troduce Stirling numbers, which eliminates most terms. For one nontrivial term
1
that remains, use ¾ −1 = ∫0 x¾−1 .
4.1.52. Consider the board B obtained from B by adding x columns of n squares
to the left of B.
4.1.57. Say that a partition has Property i if 2i is a part or i is a repeated part.
4.1.64. In summing the weights of paths from x i to y j , consider how the paths
arrive at yj .
4.1.65. The identity n = ∑d|n (d) of Exercise 4.1.15 is needed.
4.1.68. Use induction on the number of rows.
4.1.69. For part (a), interpret terms in the product of determinant expansions as
pairs of matchings in a weighted bipartite graph.
4.2.12. Encode caterpillars as binary lists or compositions of integers.
4.2.15. Color a crown with pl positions. Use induction on l.
4.2.18. Use the pattern inventory or Burnside ’s Lemma with inclusion-exclusion.
4.2.27. Among the graphs with vertex set [n], compare those with even size and
odd size left fixed by a given permutation of [n].
4.2.30. In part (b), the answer depends on the parity of d.
4.3.5. How many comparisons are made when an element is processed, in terms
of where the shape grows?
4.3.12. Using planarization is shorter than using the bumping procedure.
4.3.13. In part (b), show that both sides satisfy the same recurrence and initial
conditions; in particular, () = 0 when i+1 = i + 1.
4.3.16. For part (a), consider the location of element n.
4.3.21. For necessity in part (a), use induction on n − i − j . Part (a) is needed to
prove in part (b) that is surjective.
5.1.14. For the impossibility part, consider the usage of the cross edges (copies of
the factor K 2) in the two cycles.
5.1.25. When n is divisible by 4, generalize the structure of P4 . When n − 1 is
divisible by 4, add one vertex to the graph constructed for n − 1.
5.1.26. Consider the pairs of consecutive vertices and pairs of opposite vertices
along a cycle in .
5.1.34. How many independent sets of size 4 or 3 contain a given vertex?
5.1.38. Consider a maximal path. Remember that a construction is needed to
prove that the bound cannot be improved.
5.1.43. How many coordinates can change along a cycle of length 2r?
5.1.45. There may be no 6-cycle. Begin with an edge.
5.1.46. For the last part, use induced subgraphs with n − 1 and n − 2 vertices.
5.2.12. Define an appropriate graph and use parity of the degrees.
5.2.13. Define a graph to model the movements, and use the even parity of the
number of vertices with odd degree.
Hints to Selected Exercises 837
5.2.15. When n is even, prove that the number of paths of length 2 starting any
vertex is odd. Counted in another way, use this to prove that some vertex has odd
degree. By studying the triangles at such a vertex, obtain a contradiction.
5.2.16. Use induction on n. In the induction step, be careful to verify the condi-
tions required to apply the induction hypothesis.
5.2.18. Use induction on ¾ .
5.2.20. Follow the method of Theorem 5.2.6.
5.2.27. A short inductive proof uses the statement in the proof of Theorem 5.2.9
about having a bipartite subgraph capturing half the degree at each vertex.
5.2.28. Show that the underlying graph has no triangles.
5.2.29. In part (a), be careful about the base step.
5.2.31. Can G contain K 4 ?
5.2.34. Show that in every orientation D not having the desired property, there
is a path from some vertex x with d+D(x) > ¾ to some vertex y with d+D(y) < ¾ .
5.2.41. What does switching two consecutive vertices in the order do to S?
5.3.28. For the edge vi vi+1 in an odd cycle [v1 , . . . , v¾ ] of G, what happens when
the edge is not oriented from vi to vi+1 ?
5.3.36. Use induction on the number of vertices.
5.3.37. Consider a component that omits some vertex of maximum degree.
5.3.38. Consider a maximal path.
5.3.39. For part (b), use part (a) and the hypothesis on minimum degree to obtain
upper and lower bounds on the number of edges joining V(C) and V(G) − V(C).
For part (c), construct a graph with vertices grouped into sets of size ¾/2.
5.3.41. Consider a realization with the fewest components.
5.3.42. Use induction or show that there is such a realization among the realiza-
tions whose underlying graphs have the fewest edges.
5.3.53. Delete two vertices to apply induction.
5.3.56. For part (a), think about for what kind of graphs it is easy to obtain such
an orientation.
5.3.57. For the first part, use an Eulerian circuit in a related even graph.
5.3.60. For part (a), build a list of trails starting at u. For part (b), consider all
cycles through v.
5.4.18. Use Exercise 5.4.17 and induction.
5.4.19. For part (a), show that among all the ways to map the vertices of G onto
the vertices of H , at least one maps no edge of G onto an edge of H.
5.4.20. Use induction on ¾ . In the induction step, delete one vertex from each
component of the subgraph of G induced by the vertices with degree less than ¾ .
5.4.27. Reduce to connected graphs and add edges to a spanning tree.
5.4.29. For part (a), use induction or explicit construction.
5.4.33. For part (a), build a graph H whose vertices are decompositions of G into
two subgraphs each having | V(G)|− 1 edges, such that the desired decompositions
into trees with the right degrees are the odd-degree vertices. The even-degree
838 Hints to Selected Exercises
vertices are decompositions (Ŝ , T̂) where the degrees agree with S and T except
at two vertices: Ŝ isolates a fixed leaf w of S and has one cycle through the one
other vertex whose degree does not agree with S, and T̂ is a spanning tree.
5.4.39. Let x ∈ n be a vertex such that d G(0 , x) ≥ 3. Consider the maximum
size of an independent set in the graph with vertex set n in which vertices are
adjacent if and only if they differ by x.
5.4.41. Use induction on the number of leaves or the number of vertices.
5.4.56. Use induction on n. One can prove the stronger statement that an n-
vertex tree other than a star occurs in edge-disjoint copies such that each non-leaf
vertex appears at distinct vertices in the two copies. Another proof treats stars
with one edge subdivided as a special case and then proves the claim for other
trees from the induction hypothesis.
5.4.58. Given vertices x and y as in the hint, form G from G − x − y by adding
¾ disjoint edges joining NG(x) to NG(y).
6.1.31. For part (a), reduce the problem to the case where r = d − 1 and the
vertices of degree d form an independent set, and then apply Hall’s Theorem.
6.1.38. Translate the statements “v belongs to some smallest vertex cover ” and
“v is covered by every maximum matching ” into notation.
6.1.42. When G has incident edges e1 and e2 , let S1 and S2 be minimal ver-
tex covers of G − e1 and G − e2 . Add to S1 ∩ S2 an appropriate vertex cover of
G [(S1 S2) ∪ {x}] to contradict (G ) = (G).
6.2.8. Use inclusion-exclusion.
6.2.18. For sufficiency, consider a subgraph with the most vertices among those
whose components are nontrivial stars with at most m edges.
6.2.22. If (G) < ⌊n/2⌋, then every maximum matching leaves at least two ver-
tices uncovered.
6.2.31. For part (b), consider the edges joining S and S, where S is the vertex
set of a maximum matching. For part (c), use induction on s and the idea of 2-
switches (Definition 5.2.7); remember that multiedges are allowed.
6.2.41. For part (a), consider a maximal Tutte set S in G − {x , y}, and apply
Lemma 6.2.7 to S ∪ {x , y} in G. For part (b), use induction on n.
6.2.42. Design an auxiliary graph H in which the -factors of G are the vertices
of odd degree. The other vertices are spanning subgraphs with the desired num-
ber of edges, but they have degree (w) − 1 at a fixed vertex w and degree (u) + 1
at some other vertex u, otherwise agreeing with .
Hints to Selected Exercises 839
6.3.7. How do the various edges contribute to the sum of the degrees of the ver-
tices covered by M? Use that relationship to obtain an upper bound on m.
6.3.24. Suppose that the first such occurrence is a rejecting x even though xa is
a pair in some stable matching M , and a rejects x for y. Let b be the mate of y in
M. What can be deduced about the preferences of these people?
7.3.43. Consider the location of the vertices of a largest independent set A rela-
tive to a smallest separating set S.
7.3.44. Proving the two claims together permits a simpler proof.
7.3.45. In part (b), transform the graph to apply a known result.
7.3.47. Apply Ore ’s Theorem.
7.3.48. Apply Chvátal’s Theorem to a modified graph.
7.3.49. Use induction on ¾ , making an argument like that of Ore ’s Theorem.
7.3.54. Consider the degree sum for the vertices in a largest independent set,
and use the Chvátal–Erdős Theorem.
7.3.56. Use induction on ¾ , after choosing an appropriate cycle in G.
7.3.61. Reduce to trees and use induction on | S| .
8.1.13. For the upper bound, present an explicit coloring by regions, with atten-
tion to the boundaries.
8.1.17. For the upper bound, cover the vertices with n − 2 ¾ + 2 independent sets.
8.1.19. Use induction on | V(G)|.
8.1.27. Use large neighborhoods and induction on r.
8.1.29. Consider a smallest-last ordering.
8.1.30. Prove that an optimal coloring of G has many color classes of size 1.
8.1.36. Obtain an independent n-set in G K r from a proper r-coloring of G and
vice versa.
8.1.40. For part (a), use induction on n or degeneracy.
8.2.17. For Ò(G) = 4, consider a shortest odd cycle.
8.2.19. When G − xy is ¾-colorable and G is not, obtain a cycle through xy with
length congruent to 1 modulo ¾ for each cyclic permutation of the ¾ colors.
8.2.27. For part (a), consider a partition V1 , . . . , Vt minimizing ∑i | E(G i)|
Di .
8.2.28. Modify G by adding vertices to make a graph G where an argument
similar to that for part (a) of the previous problem yields the desired result on G.
8.2.30. Construct a special list assignment with list sizes equal to degree.
8.2.33. For part (a), choose a bad assignment L with smallest union, and consider
a maximal X such that | L(X)| < | X | . For part (b), the union of the bad lists should
have size 2 ¾ ; force many colors to appear by using the same two disjoint lists on
each part of size 2. The construction should restrict to the bad 2-uniform list
assignment for K 4 ,2 .
8.2.34. Reduce to the case where the lists on each part are disjoint, and apply
Hall’s Theorem to choose a proper coloring from the lists.
8.2.43. Delete one leaf from each nontrivial component of F to obtain F . Let R
be the set of neighbors of the deleted vertices. Map R onto an m-set X ⊆ V(G)
chosen to minimize | E(G[X])| . Extend X to a copy of F . Use Hall’s Theorem to
match X into the remaining vertices.
8.2.46. When an optimal coloring º has a color class of size 1, use ½ to make an
alteration in º .
Hints to Selected Exercises 841
9.1.15. Show that G ∗ can be drawn so that each edge of G ∗ intersects only the
edge corresponding to it in G.
9.1.23. Show that a separating 2-set must induce two edges.
9.1.26. The solution is easier to write when the characterization used for j-vertex
trees is “connected and j − 1 edges” rather than “connected and acyclic”.
9.1.30. Use induction or duality.
9.1.33. Prove that the complement of any 7-vertex maximal outerplanar graph
is not outerplanar.
9.1.34. Show that the edge set decomposes into triangles.
842 Hints to Selected Exercises
9.1.40. Add a point at infinity or a circle that encloses all intersection points.
9.1.41. Find a simple formula in terms of n for the number of crossings of chords.
9.1.48. Use Euler ’s Formula or induction on the number of facial triangles.
9.2.12,14b,16. Use Kuratowski’s Theorem.
√
9.2.22. Use the corollary that guarantees a (c n , 1/2)-separation (where c =
√ √
(2 2)/(1 − 2/3)).
9.3.16. Find a way to use Grinberg ’s Theorem.
9.3.17. Consider distance from a fixed vertex.
9.3.18. Consider distance from a fixed vertex.
9.3.23. For the first part, use an idea from the proof of Tait ’s Theorem (Theorem
9.3.1). The proof using the Four Color Theorem is easy.
9.3.25. For part (c), build ⌊n/3⌋ areas that must be watched by different guards.
9.3.27. For the induction step in part (c), delete the edges of a face neighboring
the unbounded face.
9.3.31. Prove that a counterexample with fewest vertices has no 4-face, by show-
ing that some two vertices of a 4-face can be merged.
9.3.34. It may help first to construct such a graph with 114 vertices and then
one with 86 vertices.
9.3.38. Given a separating cycle C with length at most 4, prove that the C-lobes
of G have proper 4-colorings that agree on C. In particular, when C has length 4,
show that a C-lobe has a proper 4-coloring where two specified opposite vertices
of C receive distinct colors.
9.3.39. Begin by showing that w4 and w6 can be assumed not to be adjacent out-
side the ring.
9.3.40. Force two vertices on the unbounded face to have the same coloring in
any proper 3-coloring, and then make them adjacent.
9.3.42. Consider complete bipartite graphs.
9.3.43. Use degree charging, and let each vertex needing charge take what it
needs equally from its neighbors.
9.3.44. In part (a), design a discharging argument without knowing b, and de-
termine how small b must be to make it work. Part (b) can be done with face
charging or with balanced charging. This exercise completes the bottom line in
Remark 9.3.23 in the same way that the first and third lines were completed.
9.3.51. Show that edges of weight at most 2t + 1 are reducible. When there is
no such edge, Lemma 9.3.30 guarantees a 4-cycle through two 3-vertices. Use a
decomposition into t linear forests for the graph G obtained by deleting those
two 3-vertices to obtain such a decomposition for G.
9.3.57. Use vertex charging, with 5-vertices taking 12 from incident 4+-faces and
the remaining needed charge from neighbors along edges shared by two triangles.
9.3.58. Use vertex charging; 6-vertices that give charge to 5-neighbors will need
charge from 7+-neighbors.
9.3.64. Use degree charging. Let vertices of degree at most 4 take what they
need equally from their neighbors, but let a vertex of degree 5 or 6 take 14 from
Hints to Selected Exercises 843
each 6+-neighbor. In checking that vertex v ends happy, consider cases depending
on d(v), and let j be the least degree among the neighbors of v.
9.3.68. For part (c), use the existence of planar graphs that are not 4-choosable.
10.1.10. Find a set S of size (m+ 1)n in [2 m n] partitioned into n divisibility chains.
10.1.14. Consider the players with positive scores.
10.1.18. Compare the number of nonempty subsets of ¾ elements with the largest
sum of ¾ elements.
10.1.19. Use induction, deleting a largest element of S.
10.1.23. Reduce the problem to the case m = 2n.
10.1.25. Use a scheme in which 90 members each get only one key.
10.1.26. Break the sequence into segments whose length is one more than the
size of the alphabet.
10.1.31. For odd n, use a decomposition into (n − 1)/2 isomorphic subgraphs con-
sisting of a 4-cycle plus pendant edges. Use different constructions for n = 4¾ − 1
and n = 4¾ + 1. In the latter case, use one central vertex and distribute the others
evenly over two concentric circles, as (n − 1)/2 pairs.
10.1.36. Generalize the argument of Exercise 10.1.35 by fixing positions that do
not end increasing lists of length ¾ − 1.
10.2.8. Define a weighted transitive tournament with the points as vertices,
where edges point to the right and weights correspond to slopes.
10.2.10. 2-color triples of points so that m points whose triples all have the same
color will form a convex m-gon. Possible color criteria include convex/concave
shape, indices clockwise or not, and parity of the number of points inside.
10.2.11. Use induction. Consider the neighbors or nonneighbors of one vertex.
10.2.21. Be careful about parity.
10.2.28. Obtain a bow-tie with monochromatic triangles, plus complementary
monochromatic 5-cycles, and then use symmetry.
10.2.30. The answer depends on the relationship between n and (G).
10.2.32. For the first part, consider the average of (x) + d(y) over edges xy in a
subgraph G of K s ,t .
10.2.34. Prove a more general statement by induction, or prove that if ∑v∈ X (d(v)s )>
(t − 1)(ns) for an X , Y-bigraph G contained in K n ,n , then G contains K s ,t .
10.2.37. For the upper bound, use induction on m. After finding a red copy of
Pm−1 in a given coloring, consider blue paths that alternate between vertices out-
side this path and vertices inside it.
10.2.39. For part (a), determine the colors of the edges at displacement 2, 3, and
4 on the monochromatic (2 + 1)-cycle. For part (b), consider the edges with even
displacement on the monochromatic 2 -cycle.
10.3.4. Take n ≥ R¾ (3; 2), as defined in Definition 10.2.10, and consider the proof
of Theorem 10.3.1. One need not use all the nonempty subsets of [n].
10.3.9. Use van der Waerden’s Theorem on the indices corresponding to a long
arithmetic progression in ⟨a⟩.
844 Hints to Selected Exercises
/ E(G) and xu , xv
= 0, then (x ) ≥ (x) for
11.1.8. For the first part of (a), if uv ∈
some x such that x u xv = 0.
11.1.12. Solve it first for (G), and then use that to give the answer for (G).
11.1.15. Reduce part (b) to Mantel’s Theorem.
11.1.33. Use induction on n. Consider the larger family of graphs in which adding
any edge increases the number of t-cliques, regardless of whether the graph al-
ready contains a t-clique.
11.1.37. For part (b), first find a vertex in A having at least n neighbors in each
of B and C. For part (c), prove that if G has (1/8 + )n2 edges, then G contains
K 4 or an independent set of size at least (2/cM)n for some appropriate constant
c, where M is the bound on the number of classes when the Regularity Lemma
is applied with the arguments and l, where = /6 and l = 1/ . From the
resulting partition with classes, where 1/ ≤ ≤ M , delete edges except for
those in -regular pairs with density more than 2 . Now applying parts (a) and
(b) to the remaining graph shows that with no K 4 and no large independent set,
| E(G)| < (1/8 + )n2 .
11.1.39. For part (a), first show that (G) > n − (G). Then show that a non-
perfect maximum matching admits an augmenting path of length 5.
11.1.40. In part (a), the path needs to be grown in two phases. First obtain a path
with length at least (d − 3)2m − 2K , and then show that a path at least this long
can be modified to obtain a longer path until length (1 − − d− )2m is reached.
11.1.41. Let P be a longest path in G having an even number of vertices. Let
2t = | V(P)| . If t ≤ (1 − d− )n, then find a detour to obtain a longer such path. If
t > (1 − d− )n, then find a cycle of length 2t through V(P) and then a longer path.
11.1.42. For part (a), use induction on . In the induction step, consider sep-
arately the -tuples where the first − 1 elements have at most (d − )¾−1 | Y |
common neighbors in Y and those having more such common neighbors.
11.1.43. For part (c), reduce to when every vertex is in at least two edges and no
two edges share two vertices. The link graph of v has as its edges the pairs that
with v form edges of H. Apply part (b) to the union of all the link graphs.
11.2.11. The -sets in F must avoid the shadows of higher elements.
11.2.15. Use shift operators to compress the family.
11.2.35. Count the elements used in a sunflower of size s.
11.2.39. Express a random subset of [n] in terms of the sizes of its intersections
with the members of a distinguishing family.
11.2.41. Let F consist of congruence classes modulo .
11.3.33. For part (c), use induction on | X Y |.
Hints to Selected Exercises 845
11.3.35. For part (b), use property (J) and induction on | I1 − I2 | to obtain the
augmentation.
11.3.40. For part (a), use transitivity of dependence or properties of cocircuits.
For part (c), using induction on | X 1 |.
11.3.42. For equality, define a special chain using the weights of the elements.
11.3.53. Devise a strategy using deletions and contractions.
11.3.56. Use the set-counting formula that appears in the proof of the Matroid
Union Theorem.
13.1.10. After normalizing all the top rows to be the same, only one choice re-
mains for each other position of the square being added. Show that it works.
13.1.14. Given Latin squares L1 and L2 , let á(s) = (s3 − L1 (s1 , s2) , s4 − L2(s1 , s2)).
13.2.4. Prove that in a complete orthogonal family, any pair of positions not in
the same row or column have the same value in exactly one of the squares.
13.2.10. View K 2 ,t as two vertices with t common neighbors.
846 Hints to Selected Exercises
13.2.13. For part (b), partition [n] into sets X1 , . . . , X ¾ of size m, and form pair-
wise edge-disjoint graphs H1 , . . . , H¾ such that each Hi uses q + 1 of the sets
X 1 , . . . , X ¾ as its vertex set.
13.2.18. After obtaining the orbits under a purported multiplier, consider the
pairs generating the difference 28.
13.3.6. The operation table of an idempotent quasigroup is a Latin square with
element i in position i on the diagonal. For even n, it cannot be commutative, but
it can be built from an idempotent commutative quasigroup of order n − 1.
13.3.23. Sum the absolute edge differences (mod 2) in two different ways.
13.3.25. Partition the vertices into three copies of 3 , so the graph has twelve
types of edges. Define two 6-cycles that together use one of each type of edge.
15.1.3. For part (a), one approach applies Theorem 15.1.2 after adding a new res-
ident. For part (b), let M be the incidence matrix of the family. Show that MM T
is nonsingular over 2 if m = n (when n is even), and hence the incidence vectors
are linearly independent over 2 . However, show that they can’t be independent.
15.1.6. Use a family of disjoint sets.
15.1.8. Compare det A with det J − I, and then model the partitioning condition
as a matrix equation.
15.1.11. For part (c), consider an equation of dependence for the set consisting
of the polynomials º1 , . . . , ºm from Theorem 15.1.5 plus {1 , x1 , . . . , x n}. Take
partial derivatives 2/ x i x j to obtain equations that the coefficients must sat-
isfy. Describe these equations using the matrix B formed as in part (a) from the
row vectors v1 , . . . , vm}. Use parts (a) and (b) to show that the coefficients on the
added polynomials must be 0.
15.1.15. Make use of a cubical grid.
15.1.26. Use the Combinatorial Nullstellensatz.
15.1.31. The claim can be proved using case analysis or the Alon–Tarsi Theorem.
15.2.9. Prove that the process ends in the initial room, that all incident corridors
of a reached room are followed both ways, and that every room is reached.
15.2.18. Use induction on + n.
15.2.19. Use induction on the length of C.
15.2.21. Express the desired situation as a matrix equation over 2 .
848 Hints to Selected Exercises
15.2.31. For part (b), Use the Birkhoff–von Neumann Theorem (Theorem 6.1.8)
to argue that optimal matrices are interior points in the space of n-by-n matrices,
and then apply Lagrange multipliers.
15.2.36. Although the statement involves the inclusion relation on a family of
sets, incidence functions are not needed for the solution.
15.3.9. Use Exercise 15.3.7(b) to interpret the coefficients.
15.3.11. Involve the vertex cover number, the fact that the spectrum of a bipar-
tite graph is symmetric around 0, and Exercise 15.3.9.
15.3.13. Construct eigenvectors for the product from eigenvectors for the factors.
15.3.18. Use the complement.
15.3.29. Recall that a matrix M is positive semidefinite, meaning that all eigen-
values are nonnegative, if and only if x T Mx ≥ 0 for all real vectors x. Recall also
that a real symmetric matrix has an orthonormal basis of eigenvectors.
15.3.30. Use the properties in Theorem 15.3.30, proved in Exercise 8.3.58. For
part (b), prove that the largest Laplacian eigenvalue of the complement of a con-
nected cograph G equals the number of vertices in the largest component of G.
15.3.31. Generate subgraphs of K n ,n as the union of ¾ random perfect matchings.
16.1.11. A single toroidal family with arbitrarily large crossing number suffices.
16.1.12. Consider the graph obtained from a maximal such graph by deleting one
edge from each crossing. Argue that edges remaining from the crossings do not
lie on the same face in the resulting plane graph.
16.1.13. Consider proper 3-edge-colorings of the 3-regular plane graph in which
the crossing is replaced with a 4-cycle through four new vertices.
16.1.14. Consider what happens when a vertex moves across an edge. For the
second part, consider a drawing where the crossings are easy to count.
16.1.16. Consider the copies of K m ,n in a drawing of K m+1 ,n .
16.1.17. Consider what happens when a vertex moves across an edge. For the
second part, consider a drawing where the crossings are easy to count.
16.2.6. Choose suitable paths with maximum total length.
16.2.9. For part (b), add a suitable troublesome edge to an appropriate graph.
16.2.10. Use the fact that every infinite sequence of points in a closed and
bounded set has a convergent subsequence.
16.2.13. Use the Hobby–Rice Theorem.
16.3.8. For e(Qn), group the extensions by which element is at the top. For part
(b), compare the limit with 1/3 and with other incomparable pairs.
16.3.9. For part (a), begin by mapping extensions having x before y but no el-
ement between them that is good for (x , y) injectively into the set of extensions
with y before x. Conclude that many extensions with x before y have some ele-
ment between them that is good for (x , y).
16.3.11. For the second part, consider 2 + 2.
16.3.14. Use a realizer to specify triangles all containing the origin.
16.3.19. Prove the lower bound by induction on n.
References
The final item in each entry is the number of the citing page in the text.
Abbott H.L., Lower bounds for some Ramsey numbers. Discr. Math. 2 (1972), 289–293. [459]
Abbott H.L., D. Hanson, and N. Sauer, Intersection theorems for systems of sets. J. Combin. Th. A 12
(1972), 381–389. [504]
Abbott H.L. and B. Zhou, On small faces in 4-critical planar graphs. Ars Combin. 32 (1991), 203–207.
[414]
Abeledo H. and G. Isaak, A characterization of graphs that ensure the existence of a stable matching.
Math. Soc. Sci. 22 (1991), 93–96. [288]
Aberth O., On the sum of graphs. Rev. Fr. Rech. Opér. 33 (1964), 353–358. [343]
Abrham J. and A. Kotzig, Construction of planar Eulerian multigraphs. In Proc. 10th Southeastern Intl.
Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 23/24 (1979), 123–130. [388]
Abrishami T., A combinatorial analysis of the eigenvalues of the Laplacian matrices of cographs (Johns
Hopkins Univ., 2019). Masters Thesis. [782]
Acharya B.D. and M. Las Vergnas, Hypergraphs with cyclomatic number zero, triangulated graphs, and
an inequality. J. Combin. Th. B 33 (1982), 52–56. [374]
Achlioptas D. and F. Iliopoulos, Random walks that find perfect objects and the Lovász local lemma. J.
ACM 63 (2016), Art. 22, 29. [680]
Addario-Berry L., K. Dalal, C.J.H. McDiarmid, B.A. Reed, and A.G. Thomason, Vertex-colouring edge-
weightings. Combinatorica 27 (2007), 1–12. [737]
Adrian C., Problem E3459. Amer. Math. Monthly 98 (1991), 754. Solution 100 (1993), 593–594. [511]
Aharoni R., Ryser’s conjecture for tripartite 3-graphs. Combinatorica 21 (2001), 1–4. [803]
Aharoni R. and P. Haxell, Hall’s theorem for hypergraphs. J. Graph Theory 35 (2000), 83–88. [803]
Ahlswede R. and D.E. Daykin, An inequality for the weights of two families of sets, their unions and
intersections. Z. Wahrsch. Verw. Gebiete 43 (1978), 183–185. [597]
Ahlswede R. and L.H. Khachatrian, The complete intersection theorem for systems of finite sets. Euro-
pean J. Combin. 18 (1997), 125–136. [500, 511]
Ahlswede R. and L.H. Khachatrian, Katona’s intersection theorem: four proofs. Combinatorica 25 (2005),
105–110. [497]
Ahuja R.K., T.L. Magnanti, and J.B. Orlin, Network Flows (Prentice Hall, 1993). [246]
Aigner M., Lexicographic matching in Boolean algebras. J. Combin. Th. B 14 (1973), 187–194. [556]
Aigner M., Combinatorial Theory (Springer-Verlag, 1979). [123, 520, 529, 538, 607, 761]
Aigner M., Graphentheorie, Eine Entwicklung aus dem 4-Farben problem (B.G. Teubner Verlagsge-
sellschaft, 1984). (English transl. BCS Assoc., 1987). [399]
Aigner M., Turán’s graph theorem. Amer. Math. Monthly 102 (1995), 808–816. [476]
Aigner M., Lattice paths and determinants. In Computational discrete mathematics, Lect. Notes Comp.
Sci. 2122 (Springer, 2001), 1–12. [165, 168, 170, 176, 177]
Aigner M. and G.M. Ziegler, Proofs from The Book (Springer-Verlag, 1999). Also 2001, 2004, 2009, 2014.
[37, 476, 811]
849
850 References
Ajtai M., V. Chvátal, M.M. Newborn, and E. Szemerédi, Crossing-free subgraphs. In Theory and Practice
of Combinatorics, Ann. Discr. Math. 12 (North-Holland, 1982), 9–12. [793]
Ajtai M., J. Komlós, and E. Szemerédi, A note on Ramsey numbers. J. Combin. Th. A 29 (1980), 354–
360. [226, 451, 663, 664]
Ajtai M., J. Komlós, and E. Szemerédi, Sorting in c log n parallel steps. Combinatorica 3 (1983), 1–19.
[779]
Ajtai M. and E. Szemerédi, Sets of lattice points that form no squares. Stud. Sci. Math. Hungar. 9 (1974),
9–11 (1975). [492]
Akin E. and M. Davis, Bulgarian solitaire. Amer. Math. Monthly 92 (1985), 237–250. [143, 144, 152]
Akiyama J. and N. Alon, Disjoint simplices and geometric hypergraphs. In Combinatorial Mathematics:
Proceedings of the Third International Conference (New York, 1985), Ann. New York Acad. Sci.
555 (New York Acad. Sci., 1989), 1–3. [816]
Akiyama J., H. Era, S.V. Gervacio, and M. Watanabe, Path chromatic numbers of graphs. J. Graph
Theory 13 (1989), 569–575. [418]
Akiyama J., G. Exoo, and F. Harary, Covering and packing in graphs. III. Cyclic and acyclic invariants.
Math. Slovaca 30 (1980), 405–417. [412]
Akiyama J., G. Exoo, and F. Harary, Covering and packing in graphs. IV. Linear arboricity. Networks 11
(1981), 69–72. [677]
Akiyama J. and M. Kano, Factors and factorizations of graphs—a survey. J. Graph Th. 9 (1985), 1–42.
[268]
Akiyama J. and M. Watanabe, Maximum induced forests of planar graphs. Graphs Combin. 3 (1987),
201–202. [419]
Aksionov V.A. and L.S. Mel nikov, Essay on the theme: the three-color problem. In Combinatorics (Proc.
5th Hung. Colloq., Keszthely, 1976), I, Colloq. Math. Soc. János Bolyai 18 (North-Holland, 1978),
23–34. [414]
Albert M.H., M. Elder, A. Rechnitzer, P. Westcott, and M. Zabrocki, On the Stanley–Wilf limit of 4231-
avoiding permutations and a conjecture of Arratia. Adv. Appl. Math. 36 (2006), 96–105. [433]
Albertson M.O., A lower bound for the independence number of a planar graph. J. Combin. Th. B 20
(1976), 84–93. [423]
Albertson M.O., You can’t paint yourself into a corner. J. Combin. Th. B 73 (1998), 189–194. [356]
Albertson M.O. and D.M. Berman, A conjecture on planar graphs. In Graph Theory and Related Topics
(J.A. Bondy and U.S.R. Murty, eds.) (Academic Press, 1979), 357. [419]
Albertson M.O. and B. Mohar, Coloring vertices and faces of locally planar graphs. Graphs Combin. 22
(2006), 289–295. [797]
Alexanderson G.L. and J.E. Wetzel, Dissections of a plane oval. Amer. Math. Monthly 84 (1977), 442–
449. [388]
Alkan E., Problem 10473. Amer. Math. Monthly 102 (1995), 745–746. Solution 104 (1997), 371. [80]
Alladi K. and V.E. Hoggatt, Jr., Compositions with ones and twos. Fibonacci Quart. 13 (1975), 233–239.
[59]
Alon N., On the number of subgraphs of prescribed type of graphs with a given number of edges. Israel
J. Math. 38 (1981), 116–130. [510]
Alon N., Eigenvalues and expanders. Combinatorica 6 (1986), 83–96. [780]
Alon N., Splitting necklaces. Advances in Math. 63 (1987), 246–253. [810]
Alon N., The linear arboricity of graphs. Israel J. Math. 62 (1988), 311–325. [412, 677, 678]
Alon N., Transversal numbers of uniform hypergraphs. Graphs Combin. 6 (1990), 1–4. [666, 670]
Alon N., Choice numbers of graphs: a probabilistic approach. Combin. Probab. Comput. 1 (1992), 107–
114. [356]
Alon N., Restricted colorings of graphs. In Surveys in Combinatorics, London Math. Soc. Lect. Notes 187
(Cambridge Univ. Press, 1993), 1–33. [661, 738]
Alon N., Probabilistic methods in coloring and decomposition problems. Discr. Math. 127 (1994), 31–46.
[678]
Alon N., Disjoint directed cycles. J. Combin. Th. B 68 (1996), 167–178. [663, 685]
References 851
Alon N., Combinatorial Nullstellensatz. Combin. Probab. Comput. 8 (1999), 7–29. [733]
Alon N., Additive Latin transversals. Israel J. Math. 117 (2000a), 125–130. [746]
Alon N., Degrees and choice numbers. Random Structures & Algorithms 16 (2000b), 364–358. [661]
Alon N., Bipartite decomposition of random graphs. J. Combin. Th. B 113 (2015), 220–235. [771]
Alon N., L. Babai, and H. Suzuki, Multilinear polynomials and Frankl–Ray-Chaudhuri–Wilson type
intersection theorems. J. Combin. Th. A 58 (1991), 165–180. [728, 731]
Alon N., T. Bohman, R. Holzman, and D.J. Kleitman, On partitions of discrete boxes. Discr. Math. 257
(2002), 255–258. [665]
Alon N., T. Bohman, and H. Huang, More on the bipartite decomposition of random graphs. J. Graph
Th. 84 (2017), 45–52. [771]
Alon N. and R.B. Boppana, The monotone circuit complexity of Boolean functions. Combinatorica 7
(1987), 1–22. [504]
Alon N., P. Frankl, and L. Lovász, The chromatic number of Kneser hypergraphs. Trans. Amer. Math.
Soc. 298 (1986), 359–370. [503]
Alon N. and S. Friedland, The maximum number of perfect matchings in graphs with a given degree
sequence. Electron. J. Combin. 15 (2008), Note 13, 2. [510]
Alon N., S. Friedland, and G. Kalai, Regular subgraphs of almost regular graphs. J. Combin. Theory B
37 (1984), 79–91. [736]
Alon N. and Z. Füredi, Covering the cube by affine hyperplanes. European J. Combin. 14 (1993), 79–83.
[746]
Alon N., Z. Füredi, and M. Katchalski, Separating pairs of points by standard boxes. European J. Combin.
6 (1985), 205–210. [442]
Alon N., A. Kostochka, B. Reiniger, D.B. West, and X. Zhu, Coloring, sparseness and girth. Israel J.
Math. 214 (2016), 315–331. [434, 442]
Alon N., M. Krivelevich, and B. Sudakov, Turán numbers of bipartite graphs and related Ramsey-type
questions. 12 (2003), 477–494. [672, 673, 684]
Alon N., C.J.H. McDiarmid, and M. Molloy, Edge-disjoint cycles in regular directed graphs. J. Graph
Theory 22 (1996), 231–237. [685]
Alon N. and V.D. Milman, Eigenvalues, expanders and superconcentrators. In Proc. 25th IEEE Symp.
Found. Comp. Sci. (IEEE, 1984), 320–322. [779, 780]
Alon N. and V.D. Milman, ë 1 , isoperimetric inequalities for graphs, and superconcentrators. J. Combin.
Th. B 38 (1985), 73–88. [778, 779]
Alon N., M.B. Nathanson, and I. Rusza, Adding distinct congruence classes modulo a prime. Amer. Math.
Monthly 102 (1995), 250–255. [746]
Alon N., M.B. Nathanson, and I. Rusza, The polynomial method and restricted sums of congruence
classes. J. Number Theory 56 (1996), 404–417. [734, 735, 745, 746]
Alon N., P. Prałat, and N. Wormald, Cleaning regular graphs with brushes. SIAM J. Discrete Math. 23
(2008/09), 233–250. [704]
Alon N. and P. Pudlák, Constructive lower bounds for off-diagonal Ramsey numbers. Israel J. Math. 122
(2001), 243–251. [504]
Alon N., L. Rónyai, and T. Szabó, Norm-graphs: variations and applications. J. Combin. Th. B 76 (1999),
280–290. [633]
Alon N. and E.R. Scheinerman, Degrees of freedom versus dimension for containment orders. Order 5
(1988), 11–16. [829, 830, 832]
Alon N., P.D. Seymour, and R. Thomas, Planar separators. SIAM J. Discr. Math. 7 (1994), 184–193.
[396, 397]
Alon N., A. Shpilka, and C. Umans, On sunflowers and matrix multiplication. Comput. Complexity 22
(2013), 219–243. [504]
Alon N. and J. Spencer, The Probabilistic Method (Wiley, 1992). Also 2000, 2008, 2016.
[504, 657, 662, 663, 666, 669, 672–674, 688, 696, 706, 721, 722, 780]
Alon N. and M. Tarsi, A nowhere-zero point in linear mappings. Combinatorica 9 (1989), 393–5. [764]
852 References
Alon N. and M. Tarsi, Colorings and orientations of graphs. Combinatorica 12 (1992), 125–134.
[738, 739, 746]
Alon N. and D.B. West, The Borsuk–Ulam theorem and bisection of necklaces. Proc. Amer. Math. Soc.
98 (1986), 623–628. [809]
Alon N. and N. Wormald, High degree graphs contain large-star factors. In Fete of combinatorics and
computer science, Bolyai Soc. Math. Stud. 20 (János Bolyai Math. Soc., 2010), 9–21. [671]
Alspach B., Research problem 3. Discr. Math. 36 (1981), 333. [646]
Alspach B. and H. Gavlas, Cycle decompositions of K n and K n − I. J. Combin. Th. B 81 (2001), 77–99.
[646]
Alspach B. and R. Häggkvist, Some observations on the Oberwolfach problem. J. Graph Th. 9 (1985),
177–187. [647]
Alspach B., P.J. Schellenberg, D.R. Stinson, and D. Wagner, The Oberwolfach problem and factors of
uniform odd length cycles. J. Combin. Th. A 52 (1989), 20–43. [647]
Altinisik E., B.E. Sagan, and N. Tuglu, GCD matrices, posets, and nonintersecting paths. Linear Mul-
tilinear Algebra 53 (2005), 75–84. [177, 766]
Amahashi A. and M. Kano, On factors with given components. Discr. Math. 42 (1982), 1–6. [273]
Andersen L.D., On edge-colourings of graphs. Math. Scand. 40 (1977), 161–175. [360]
Andersen L.D., The strong chromatic index of a cubic graph is at most 10. 108 (1992), 231–252. [373]
Anderson I., Perfect matchings of a graph. J. Combin. Th. B 10 (1971), 183–186. [264]
Anderson I., Sufficient conditions for matchings. Proc. Edinburgh Math. Soc. (2) 18 (1973), 129–136.
[275]
Anderson I., Intersection theorems and a lemma of Kleitman. Discr. Math. 16 (1976), 181–185.
[497, 561, 595, 607]
Anderson I., Combinatorial Designs: Construction Methods (Ellis Horwood, 1990). [654]
Anderson I., Combinatorial designs and tournaments, Oxford Lecture Series in Mathematics and its
Applications 6 (Oxford Univ. Press, 1997). [609, 612, 649]
Anderson M., R.B. Richter, and P. Rodney, The crossing number of C6 × C6 . In Proc. 27th Southeastern
Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 118 (1996), 97–107. [794]
Anderson M., R.B. Richter, and P. Rodney, The crossing number of C7 × C7 . In Proc. 28th Southeastern
Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 125 (1997), 97–117. [794]
Ando K., A. Kaneko, and S.V. Gervacio, The bandwidth of a tree with ¾ leaves is at most ⌈¾/2⌉. Discr.
Math. 150 (1996), 403–406. [249, 819]
André D., Sur les permutations alternées. J. Math. Pures et Appliquées 7 (1881), 167–184. [208]
André D., Théorème sur les formes quadratiques. Bull. Soc. Math. France 15 (1887), 188–192. [40]
Andreae T., On the unit interval number of a graph. Discrete Appl. Math. 22 (1988), 1–7. [366]
Andrews G. and E. Deutsch, Problem 11908. Amer. Math. Monthly 123 (2016), 504. [148]
Andrews G.E., The theory of partitions (Addison-Wesley, 1976). [140]
Andrews G.E., Problem 10627. Amer. Math. Monthly 104 (1997a), 974. Solution 107 (2000), 86. [150]
Andrews G.E., Problem 10628. Amer. Math. Monthly 104 (1997b), 974. Solution 107 (2000), 87. [151]
Andrews G.E. and P. Paule, Solution to problem E3376. Amer. Math. Monthly 99 (1992), 63–65. Proposed
97 (1990), 240. [66]
Andrews P. and E.T. Wang, Problem E3260. Amer. Math. Monthly 95 (1988), 350. Solution 97 (1990),
74–75. [174]
Appel K. and W. Haken, Every planar map is four colorable. Bull. Amer. Math. Soc. 82 (1976), 711–712.
[402]
Appel K., W. Haken, and J. Koch, Every planar map is four colorable. Part II: Reducibility. Illinois J.
Math. 21 (1977), 491–567. [406]
Arnautov V.I., Estimation of the exterior stability number of a graph by means of the minimal degree of
the vertices (Russian). Prikl. Mat. i Programmirovanie 11 (1974), 3–8, 126. [670]
Arratia R., On the Stanley–Wilf conjecture for the number of permutations avoiding a given pattern.
Electron. J. Combin. 6 (1999), Note, N1, 4 pp. (electronic). [432, 433]
References 853
Arrow K.J., Social Choice and Individual Values, Cowles Commission Monograph No. 12 (Wiley & Sons;
Chapman & Hall, 1951). [585]
Ash P., Problem 11520. Amer. Math. Monthly 117 (2010), 649. Solution 119 (2012), 701. [34]
Avis D., Nonpartitionable point sets. Inform. Process. Lett. 19 (1984), 125–129. [820]
Axenovich M., Z. Füredi, and D. Mubayi, On generalized Ramsey theory: the bipartite case. J. Combin.
Th. B 79 (2000), 66–86. [686]
Ayel J., Hamiltonian cycles in particular ¾-partite graphs. J. Combin. Th. B 32 (1982), 223–228. [331]
Azuma K., Weighted sums of certain dependent random variables. Tôhoku Math. J. (2) 19 (1967), 357–
367. [715, 722]
Babai L., A short proof of the nonuniform Ray-Chaudhuri–Wilson inequality. Combinatorica 8 (1988),
133–135. [727]
Babai L., Graph isomorphism in quasipolynomial time (2015). (arXiv:1512.03547). [699]
Babai L., P. Erdős, and S.M. Selkow, Random graph isomorphisms. SIAM J. Comput. 9 (1980), 628–635.
[699, 705]
Babai L. and P. Frankl, Linear algebra methods in combinatorics with applications to geometry and
computer science (Univ. of Chicago, 1992). [723, 744]
Babai L., W.M. Kantor, and E.M. Luks, Computational complexity and the classification of finite simple
groups. In Proc. 24th IEEE Symp. Found. Comp. Sci. (1983), 162–171. [699]
Babai L. and L. Kučera, Canonical labelling of graphs in linear average time. In Proc. 20th IEEE Symp.
Found. Comp. Sci. (IEEE, 1979), 39–46. [699]
Bäbler F., über die Zerlegung regulärer Streckenkomplexe ungerader Ordnung (German). Comment.
Math. Helv. 10 (1938), 275–287. [267]
Bäbler F., Über eine spezielle Klasse Euler’scher Graphen. Comment. Math. Helv. 27 (1953), 81–100.
[250]
Bach E., Exact analysis of a priority queue algorithm for random variate generation. In Proc. 5th ACM-
SIAM Symp. Discrete Algorithms (Arlington, 1994) (ACM, 1994), 48–56. [105]
Bacher R., Problem 10891. Amer. Math. Monthly 108 (2001), 668. Solution 110 (2003), 439–440. [66]
Bachmann P., Die Analytische Zahlentheorie (German) (Teubner, 1894). [10]
Backelin J., J. West, and G. Xin, Wilf-equivalence for singleton classes. Adv. in Appl. Math. 38 (2007),
133–148. [442]
Bagga J.S. and B.N. Varma, Hamiltonian properties in bipartite graphs. Bull. Inst. Combin. Appl. 26
(1999), 71–85. [325]
Baker K.A., Dimension, join-independence, and breadth in partially ordered sets (1961). Mimeographed
notes. [571]
Baker K.A., A generalization of Sperner’s lemma. J. Combinatorial Theory 6 (1969), 224–225. [561]
Balko M., J. Cibulka, D. Král’, and J. Kynčl, Ramsey numbers of ordered graphs 49 (2015), 419–424.
[457]
Ball S. and V. Pepe, Asymptotic improvements to the lower bound of certain bipartite Turán numbers.
Combin. Probab. Comput. 21 (2012), 323–329. [633]
Ball S. and V. Pepe, Forbidden subgraphs in the norm graph. Discr. Math. 339 (2016), 1206–1211.
[633]
Ball W.W.R., Mathematical Recreations and Essays (McMillan, 1892). [70]
Balof B. and K.P. Bogart, Simple inductive proofs of the Fishburn and Mirkin theorem and the Scott–
Suppes theorem. Order 20 (2003), 49–51. [586]
Balogh J. and J.A. Csirik, Index assignment for two-channel quantization. IEEE Trans. Inform. Theory
50 (2004), 2737–2751. [801]
Balogh J. and H. Kaul, A threshold for random geometric graphs with a hamiltonian cycle (2007). Un-
published manuscript. [819]
Balogh J., M. Kochol, A. Pluhár, and X. Yu, Covering planar graphs with forests. J. Combin. Th. B 94
(2005), 147–158. [421, 424]
Banderier C. and S.R. Schwer, Why Delannoy numbers? J. Statist. Plann. Inference 135 (2005), 40–54.
[28, 41]
854 References
Bandlow J., An elementary proof of the hook formula. Electron. J. Combin. 15 (2008), Research paper
45, 14. [190]
Bang C.M. and H. Sharp, Jr., Score vectors of tournaments. J. Combin. Th. B 26 (1979), 81–84. [261]
Bang S.-J., Problem 10490. Amer. Math. Monthly 102 (1995), 930. Solution 106 (1999), 588–589. [32]
Bang-Jensen J., S. Bessy, and S. Thomassé, Disjoint 3-cycles in tournaments: a proof of the Bermond–
Thomassen conjecture for tournaments. J. Graph Theory 75 (2014), 284–302. [685]
Bannai E. and T. Ito, On finite Moore graphs. J. Fac. Sci. Univ. Tokyo Sect. IA Math. 20 (1973), 191–
208. [244, 775]
Bapat R.B., Graphs and matrices, Universitext (Springer, 2010). [766, 769]
Bárány I., A short proof of Kneser’s conjecture. J. Combin. Theory A 25 (1978), 325–326. [812, 820]
Bárány I., S.B. Shlosman, and A. Szűcs, On a topological generalization of a theorem of Tverberg. J.
London Math. Soc. (2) 23 (1981), 158–164. [810]
Barát J. and C. Thomassen, Claw-decompositions and Tutte-orientations. J. Graph Theory 52 (2006),
135–146. [238]
Barber B., D. Kühn, A. Lo, R. Montgomery, and D. Osthus, Fractional clique decompositions of dense
graphs and hypergraphs. J. Combin. Th. B 127 (2017), 148–186. [640]
Barber B., D. Kühn, A. Lo, and D. Osthus, Edge-decompositions of graphs with high minimum degree.
Adv. Math. 288 (2016), 337–385. [640]
Barra M., Editorial comment to solution of problem 10663. Amer. Math. Monthly 107 (2000), 370. Pro-
posed 105 (1998), 464. [62]
Barrera-Cruz F. and P. Haxell, A note on Schnyder’s theorem. Order 28 (2011), 221–226. [790]
Basavaraju M., L.S. Chandran, and M. Kummini, d-regular graphs of acyclic chromatic index at least
d + 2. J. Graph Theory 63 (2010), 226–230. [329]
Basin S.L. and V.E. Hoggatt, Jr., A primer on the Fibonacci sequence, part II. Fibonacci Quart. 1 (1963),
61–68. [61]
Batagelj V. and T. Pisanski, Hamiltonian cycles in the Cartesian product of a tree and a cycle. Discr.
Math. 38 (1982), 311–312. [330]
Bauer D., Regular K n -free graphs. J. Combin. Th. B 35 (1983), 193–200. [490]
Bauer D., H.J. Broersma, and E.F. Schmeichel, Toughness in graphs—a survey. Graphs Combin. 22
(2006), 1–35. [318]
Bauer D., H.J. Broersma, and H.J. Veldman, Not every 2-tough graph is Hamiltonian. In Proc. 5th
Twente Workshop on Graphs and Combin. Optimization (Enschede, 1997), 99 (2000), 317–321.
[318]
Bauer D. and E.F. Schmeichel, Hamiltonian degree conditions which imply a graph is pancyclic. J. Com-
bin. Th. B 48 (1990), 111–116. [326]
Baumert L.D., Cyclic difference sets, Lect. Notes Math. 182 (Springer-Verlag, 1971). [637]
Baumert L.D., S.W. Golomb, and M. Hall, Jr., Discovery of an Hadamard matrix of order 92. Bull. Amer.
Math. Soc. 68 (1962), 237–238. [622]
Bean D.R., Effective coloration. J. Symbolic Logic 41 (1976), 469–480. [342]
Beck J., On 3-chromatic hypergraphs. Discr. Math. 24 (1978), 127–137. [659, 673]
Beck J., On size Ramsey number of paths, trees, and circuits. I. J. Graph Th. 7 (1983), 115–129. [455]
Beck J., An algorithmic approach to the Lovász local lemma. I. Random Structures Algorithms 2 (1991),
343–365. [680]
Beckwith D., Problem 10669. Amer. Math. Monthly 105 (1998), 559. Solution 107 (2000), 568–9. [152]
Beckwith D., Problem 10809. Amer. Math. Monthly 107 (2000), 566. Solution 109 (2002), 477–8. [149]
Beckwith D., Problem 10865. Amer. Math. Monthly 108(2001),371. Solution 109 (2002), 859–60. [764]
Beckwith D., Problem 11183. Amer. Math. Monthly 112 (2005), 839. Solution 114 (2007), 551–2. [148]
Beckwith D., Problem 11212. Amer. Math. Monthly 113(2006a),268. Solution 115 (2008), 366–7. [173]
Beckwith D., Problem 11249. Amer. Math. Monthly 113(2006b),760. Solution 115 (2008), 859–60. [49]
Beckwith D., Problem 11343. Amer. Math. Monthly 115 (2008), 166. Solution 116 (2009), 944–5. [32]
Beckwith D., Problem 11464. Amer. Math. Monthly 116 (2009), 845. Solution 118 (2011), 750. [149]
Beckwith D., Problem 11583. Amer. Math. Monthly 118 (2011), 558. Solution 120 (2013), 756–7. [149]
References 855
Beckwith D., Problem 11754. Amer. Math. Monthly 121 (2014), 170. Solution 123 (2016), 298. [59]
Behrend F.A., On sets of integers which contain no three terms in arithmetical progression. Proc. Nat.
Acad. Sci. U. S. A. 32 (1946), 331–332. [484]
Behzad M., Graphs and their chromatic numbers (Michigan State U., 1965). Ph.D. Thesis. [373, 654]
Behzad M. and S.E. Mahmoodian, On topological invariants of the product of graphs. Canad. Math. Bull.
12 (1969), 157–166. [329, 343, 398]
Beineke L.W. and R.D. Ringeisen, On the crossing numbers of products of cycles and graphs of order
four. J. Graph Theory 4 (1980), 145–155. [798]
Beineke L.W. and A.J. Schwenk, On a bipartite form of the Ramsey problem. In Proc. 5th British Combin.
Conf. (Univ. Aberdeen, 1975), Congr. Numer. 15 (Utilitas Math., 1976), 17–22. [620, 621, 624]
Belck H.B., Reguläre Faktoren von Graphen. J. Reine Angew. Math. 188 (1950), 228–252. [268, 276]
Belevitch V., Theory of 2n-terminal networks with applications to conference telephony. Electr. Commun.
27 (1950), 231–244. [621]
Bender E.A. and E.R. Canfield, The asymptotic number of labeled graphs with given degree sequences.
J. Combin. Th. A 24 (1978), 296–307. [697, 704]
Bender E.A. and J.R. Goldman, Enumerative uses of generating functions. Indiana Univ. Math. J. 20
(1971), 753–765. [127]
Bender E.A. and D.E. Knuth, Enumeration of plane partitions. J. Combin. Th. A 13 (1972), 40–54.
[207]
Bender E.A., F. Kochman, and D.B. West, Adding up to powers. Amer. Math. Monthly 97 (1990), 139–
143. [62]
Benevides F.S. and J. Skokan, The 3-colored Ramsey number of even cycles. J. Combin. Th. B 99 (2009),
690–708. [461]
Benhocine A. and A.P. Wojda, The Geng–Hua Fan conditions for pancyclic or Hamilton-connected
graphs. J. Combin. Th. B 42 (1987), 167–180. [326]
Benjamin A.T., G.M. Levin, K. Mahlburg, and J.J. Quinn, Random approaches to Fibonacci identities.
Amer. Math. Monthly 107 (2000), 511–516. [664]
Benjamin A.T. and J.J. Quinn, The Fibonacci numbers—exposed more discretely. Math. Mag. 76 (2003),
182–192. [53]
Bennett G., Problem 10216. Amer. Math. Monthly 99 (1992), 363. Solution 101 (1994), 917. [152]
Bentz H.J., Proof of the Bulgarian Solitaire conjectures. Ars Combin. 23 (1987), 151–170. [144, 152]
Benzer S., On the topology of the genetic fine structure. Proc. Nat. Acad. Sci. USA 45 (1959), 1607–1620.
[337]
Berge C., Two theorems in graph theory. Proc. Nat. Acad. Sci. U.S.A. 43 (1957), 842–844. [277]
Berge C., Sur le couplage maximum d’un graphe. C.R. Acad. Sci. Paris 247 (1958), 258–259. [266]
Berge C., Les problèmes de coloration en théorie des graphes. Publ. Inst. Statist. Univ. Paris 9 (1960),
123–160. [366, 367]
Berge C., Perfect graphs. In Six papers on Graph Theory (Indian Stat. Institute, 1963), 1–21. [370]
Berge C., Une propriété des graphes ¾ -stables-critiques. In Combinatorial Structures and Their Appli-
cations (R. Guy, H. Hanani, N.W. Sauer, and J. Schönheim, eds.) (Gordon and Breach, 1970), 7–
11. [222, 263]
Berge C., Graphs and Hypergraphs (North-Holland, 1973). (translation and revision of Graphes et Hy-
pergraphes, Dunod, 1970). [267, 333, 335, 667]
Berge C., Nombres de coloration de l’hypergraphe h-parti complet. Ann. Mat. Pura Appl. (4) 103 (1975),
3–9. [501]
Berge C., A theorem related to the Chvátal conjecture. In Proc. 5th British Combin. Conf. (Univ. Ab-
erdeen, 1975), 15 (Utilitas Math., 1976), 35–40. [501]
Berge C., ¾ -optimal partitions of a directed graph. European J. Combin. 3 (1982), 97–101. [549]
Berge C., Path-partitions in directed graphs and posets. In Graphs and order (Banff, Alta., 1984), NATO
Adv. Sci. Inst. C Math. Phys. Sci. 147 (Reidel, 1985), 447–464. [549]
Berge C. and V. Chvátal, Topics on Perfect Graphs, Ann. Discr. Math. 21 (North-Holland, 1984). [370]
856 References
Berge C. and J.L. Ramı́rez-Alfonsı́n, Origins and genesis. In Perfect graphs, Wiley-Intersci. Ser. Discr.
Math. Optim. (Wiley, 2001), 1–12. [368]
Berger E. and I.B-A. Hartman, Proof of Berge’s strong path partition conjecture for ¾ = 2. European J.
Combin. 29 (2008), 179–192. [549]
Berger E. and I.B-A. Hartman, A unified approach to known and unknown cases of Berge’s conjecture.
J. Graph Th. 71 (2012), 317–330. [549]
Berlekamp E.R., On subsets with intersections of even cardinality. Canad. Math. Bull. 12 (1969), 471–
474. [724, 744]
Berman K.A., Parity results on connected º -factors. Discr. Math. 59 (1986), 1–8. [241, 249]
Bermond J.-C., On Hamiltonian walks. In Proc. Fifth Brit. Combin. Conf. (C.St.J.A. Nash-Williams and
J. Sheehan, eds.) (Utilitas Math., 1976), 41–51. [323]
Bermond J.-C. and C. Thomassen, Cycles in digraphs—a survey. J. Graph Theory 5 (1981), 1–43.
[316, 685]
Bernardi C., On a theorem about vertex colorings of graphs. Discr. Math. 64 (1987), 95–96. [355]
Bernshteyn A., The local cut lemma. European J. Combin. 63 (2017), 95–114. [680]
Bertrand J., Solution d’un problème. Comptes Rendus Acad. Sci., Paris 105 (1887), 369. [39]
Beth T., D. Jungnickel, and H. Lenz, Design Theory (Cambridge Univ. Press, 1986). [609]
Beutelspacher A. and W. Brestovansky, Generalized Schur numbers. In Combinatorial theory (Schloss
Rauischholzhausen, 1982), Lecture Notes in Math. 969 (Springer, 1982), 30–38. [473]
Bey C. and J.R. Griggs, Problem 10932. Amer. Math. Monthly 109 (2002), 298. Solution 111 (2004), 262–
263. [511]
Bhanu K.S. and M.N. Deshpande, Problem 11503. Amer. Math. Monthly 117 (2010), 458. Solution 119
(2012), 349–350. [669]
Bhasker J., T. Samad, and D.B. West, Size, chromatic number, and connectivity. Graphs Combin. 10
(1994), 209–213. [353]
Bhatt S.N. and C.E. Leiserson, Minimizing the longest edge in a VLSI layout (1981). MIT memo. [809]
Bialostocki A. and J. Schönheim, On some Turán and Ramsey numbers for C4 . In Graph theory and
combinatorics (Cambridge, 1983) (Academic Press, 1984), 29–33. [490]
Biedl T., E.D. Demaine, C.A. Duncan, R. Fleischer, and S.G. Kobourov, Tight bounds on maximal and
maximum matchings. Discr. Math. 285 (2004), 7–15. [286]
Bienstock D., Some provably hard crossing number problems. Discrete Comput. Geom. 6 (1991), 443–
459. [795]
Bienstock D. and N. Dean, New results on rectilinear crossing numbers and plane embeddings. J. Graph
Theory 16 (1992), 389–398. [795]
Bienstock D. and N. Dean, Bounds for rectilinear crossing numbers. J. Graph Theory 17 (1993), 333–
348. [795, 796]
Biggs N., Algebraic graph theory (Cambridge Univ. Press, 1974). [766]
Biggs N.L., E.K. Lloyd, and R.J. Wilson, Graph theory: 1736–1936 (Clarendon Press, 1976). [37, 46]
Binet J.P., Mémoire sur l’intégration des équations linéaires aux différences finies, d’un ordre quel-
conque, à coefficients variables. Comptes Rendus hebdomadaires des séances de l’Académie des
Sciences 17 (1843), 559–567. [67]
Birkhoff G., The reducibility of maps. Amer. J. Math. 35 (1913), 114–128. [405, 421]
Birkhoff G., On the structure of abstract algebras. Proc. Cambridge Phil. Soc 31 (1935), 433–454.
[594]
Birkhoff G., Tres observaciones sobre el algebra lineal. Rev. Univ. Nac. Tucumán, Series A 5 (1946), 147–
151. [257]
Birkhoff G., Lattice theory, Third edition. American Mathematical Society Colloquium Publications, Vol.
XXV (AMS, 1967). [607]
Biró C., P. Hamburger, A. Pór, and W.T. Trotter, Forcing posets with large dimension to contain large
standard examples. Graphs Combin. 32 (2016), 861–880. [580]
Bixby R.E., Matroids and operations research. In Advanced techniques in practice of operations research
(H.J. Greenberg, F.H. Murphy, and S.H. Shaw, eds.) (North-Holland, 1981), 333–458. [520]
References 857
Björner A., J. Matoušek, and G.M. Ziegler, Using Brouwer’s fixed point theorem, A Journey through Discr.
Mathematics. A Tribute to Jiřı́Matoušek (Springer, to appear). (arXiv:1409.7890). [804]
Blagojević P.V.M., F. Frick, A. Haase, and G.M. Ziegler, Hyperplane mass partitions via relative equi-
variant obstruction theory. Doc. Math. 21 (2016), 735–771. [815]
Blagojević P.V.M., F. Frick, A. Haase, and G.M. Ziegler, Topology of the Grünbaum–Hadwiger–Ramos
hyperplane mass partition problem. Trans. Amer. Math. Soc. 370 (2018), 6795–6824. [815]
Blass A. and F. Harary, Properties of almost all graphs and complexes. J. Graph Th. 3 (1979), 225–240.
[690]
Blokhuis A., A new upper bound for the cardinality of 2-distance sets in Euclidean space. In Convexity
and graph theory (Jerusalem, 1981), North-Holland Math. Stud. 87 (1984), 65–66. [725, 744]
Bloom D.M., Problem 10921. Amer. Math. Monthly 109 (2002), 201. Solution 110 (2003), 958–9. [33]
Bloome L., P. Johnson, and N. Saritzky, Problem 11625. Amer. Math. Monthly 119 (2012), 162. Solution
121 (2014), 273. [344]
Boesch F. and R. Tindell, Robbins’s theorem for mixed multigraphs. Amer. Math. Monthly 87 (1980),
716–719. [237]
Bogart K.P., Introductory combinatorics, 2nd ed. (Harcourt Brace Jovanovich, 1990). Also 1983, 2000.
[147]
Bogart K.P., An obvious proof of Fishburn’s interval order theorem. Discr. Math. 118 (1993), 239–242.
[586]
Bogart K.P. and W.T. Trotter, Maximal dimensional partially ordered sets. II. Characterization of 2n-
element posets with dimension n. Discr. Math. 5 (1973), 33–43. [583]
Bogart K.P. and D.B. West, A short proof that “proper = unit”. Discr. Math. 201 (1999), 21–23. [587]
Bognár J., J. Mogyoródi, A. Prékopa, A. Rényi, and D. Szász, Problem Book on Probability (Hungarian)
(Tankönyvkiadó, 1970). [105]
Bohman T., The triangle-free process. Adv. Math. 221 (2009), 1653–1677. [682, 685]
Bohman T. and P. Keevash, Dynamic concentration of the triangle-free process. In 7th European Conf.
Combin. Graph Th. Appl., CRM Series 16 (Ed. Norm., 2013), 489–495. [682]
Bollobás B., On generalized graphs. Acta Math. Acad. Sci. Hungar. 16 (1965), 447–452. [568, 668]
Bollobás B., Graphs with given diameter and maximal valency and with a minimal number of edges.
In Combinatorial mathematics and its applications (Proc. Conf., Oxford, 1969) (Academic Press,
1971), 25–37. [244]
Bollobás B., Sperner systems consisting of pairs of complementary subsets. J. Combin. Th. A 15 (1973),
363–366. [511]
Bollobás B., On complete subgraphs of different orders. Math. Proc. Cambridge Philos. Soc. 79 (1976a),
19–24. [238]
Bollobás B., Relations between sets of complete subgraphs. In Proc. 5th British Combin. Conf. (Univ.
Aberdeen, 1975), Congr. Numer. 15 (Utilitas Math., 1976b), 79–84. [478]
Bollobás B., Extremal graph theory, London Mathematical Society Monographs 11 (Academic Press,
1978). [215, 272, 311, 316, 335, 478, 632]
Bollobás B., A probabilistic proof of an asymptotic formula for the number of labelled regular graphs.
European J. Combin. 1 (1980), 311–316. [697]
Bollobás B., Threshold functions for small subgraphs. Math. Proc. Camb. Phil. Soc 90 (1981a), 197–206.
[703]
Bollobás B., Degree sequences of random graphs. Discr. Math. 33 (1981b), 1–19. [699, 700, 721]
Bollobás B., Vertices of given degree in a random graph. J. Graph Th. 6 (1982), 147–155. [699]
Bollobás B., Random Graphs (Academic Press, 1985). Also 2001. [657, 688]
Bollobás B., Combinatorics: Set systems, hypergraphs, families of vectors and combinatorial probability
(Cambridge Univ. Press, 1986). [499]
Bollobás B., The chromatic number of random graphs. Combinatorica 8 (1988), 49–55. [701, 717, 718]
Bollobás B., Modern graph theory, Graduate Texts in Mathematics 184 (Springer-Verlag, 1998). [488]
Bollobás B. and G.R. Brightwell, The height of a random partial order: concentration of measure. Ann.
Appl. Probab. 2 (1992), 1009–1018. [722]
858 References
Bollobás B. and P. Erdős, On the structure of edge graphs. Bull. London Math. Soc. 5 (1973), 317–321.
[482, 770]
Bollobás B. and P. Erdős, Cliques in random graphs. Math. Proc. Camb. Phil. Soc. 80 (1976), 419–427.
[701]
Bollobás B., P. Erdős, and M. Simonovits, On the structure of edge graphs. II. J. London Math. Soc. (2)
12 (1976), 219–224. [482]
Bollobás B. and A.J. Harris, List-colourings of graphs. Graphs Combin. 1 (1985), 115–127. [362, 373]
Bollobás B. and Y. Kohayakawa, An extension of the Erdős–Stone theorem. Combinatorica 14 (1994),
279–286. [482]
Bollobás B. and E. Szemerédi, Girth of sparse graphs. J. Graph Theory 39 (2002), 194–200. [250]
Bollobás B. and A. Thomason, Random graphs of small order. In Random graphs ’83 (Poznań, 1983),
North-Holland Math. Stud. 118 (North-Holland, 1985), 47–97. [692]
Bollobás B. and A.G. Thomason, On the girth of Hamiltonian weakly pancyclic graphs. J. Graph Theory
26 (1997), 165–173. [250]
Bollobás B. and A.G. Thomason, Proof of a conjecture of Mader, Erdős and Hajnal on topological complete
subgraphs. Europ. J. Combin. 19 (1998), 883–887. [351]
Bollobás B. and P. Winkler, The longest chain among random points in Euclidean space. Proc. Amer.
Math. Soc. 103 (1988), 347–353. [821]
Bóna M., Problem E3378. Amer. Math. Monthly 97 (1991), 340. Solution 99 (1992), 65-66. [474]
Bóna M., Permutations avoiding certain patterns: the case of length 4 and some generalizations. Discr.
Math. 175 (1997), 55–67. [432]
Bóna M., The solution of a conjecture of Stanley and Wilf for all layered patterns. J. Combin. Th. A 85
(1999), 96–104. [432]
Bóna M., A walk through combinatorics (World Scientific Publishing Co., Inc., River Edge, NJ, 2002).
[440]
Bóna M., Combinatorics of permutations, Discr. Mathematics and its Applications (Boca Raton) (Chap-
man & Hall/CRC, 2004). [101, 102, 106, 133, 158, 432, 442]
Bonamy M., Planar graphs with ≥ 8 are ( + 1)-edge-choosable. SIAM J. Discr. Math. 29 (2015), 1735–
1763. [413]
Bonamy M., T. Perrett, and L. Postle, Colouring graphs with sparse neighbourhoods: Bounds and appli-
cations (2018). (arXiv:1810.06704). [685]
Bonato A. and P. Prałat, Graph searching games and probabilistic methods, Discr. Mathematics and its
Applications (Boca Raton) (CRC Press, 2018). [708]
Bondarenko A., On Borsuk’s conjecture for two-distance sets. Discrete Comput. Geom. 51 (2014), 509–
515. [817]
Bondy J.A., Properties of graphs with constraints on degrees. Stud. Sci. Math. Hung. 4 (1969), 473–475.
[296]
Bondy J.A., Pancyclic graphs. I. J. Combin. Th. B 11 (1971a), 80–84. [326, 330, 460]
Bondy J.A., Large cycles in graphs. Discr. Math. 1 (1971b), 121–132. [323]
Bondy J.A., Induced subsets. J. Combin. Th. B 12 (1972a), 201–202. [251]
Bondy J.A., Variation on the Hamiltonian theme. Canad. Math. Bull. 15 (1972b), 57–62. [332]
Bondy J.A., A remark on two sufficient conditions for Hamilton cycles. Discr. Math. 22 (1978a), 191–193.
[316]
Bondy J.A., Hamilton cycles in graphs and digraphs. In Proc. 9th Southeastern Intl. Conf. Combin. Graph
Th. Comput. (Boca Raton), 21 (Utilitas Math., 1978b), 3–28. [332]
Bondy J.A., Longest paths and cycles in graphs of high degree, Res. Rep. No. CORR (Univ. Waterloo,
1980). [326]
Bondy J.A., Integrity in graph theory. In The theory and applications of graphs (Kalamazoo, Mich., 1980)
(Wiley, 1981), 117–125. [327]
Bondy J.A., Basic graph theory: paths and circuits. In Handbook of combinatorics, Vol. 1, 2 (Elsevier,
1995), 3–110. [316]
Bondy J.A. and V. Chvátal, A method in graph theory. Discr. Math. 15 (1976), 111–136. [320]
References 859
Bondy J.A. and M. Kouider, Hamiltonian cycles in regular 2-connected graphs. J. Combin. Th. B 44
(1988), 177–186. [326]
Bondy J.A. and S.C. Locke, Largest bipartite subgraphs in triangle-free graphs with maximum degree
three. J. Graph Theory 10 (1986), 477–504. [227]
Bondy J.A. and L. Lovász, Cycles through specified vertices of a graph. Combinatorica 1 (1981), 117–
140. [302]
Bondy J.A. and U.S.R. Murty, Graph Theory with Applications (North-Holland, 1976). Also 2007.
[215, 228, 330, 489, 639]
Bondy J.A. and U.S.R. Murty, Graph theory, Grad. Texts Math. 244 (Springer, 2008). [215]
Bondy J.A. and M. Simonovits, Cycles of even length in graphs. J. Combin. Th. B 16 (1974), 97–105.
[479, 684]
Bonnice W.E., On convex polygons determined by a finite planar set. Amer. Math. Monthly 81 (1974),
749–752. [458]
Booth K.S. and G.S. Luecker, Testing for the consecutive ones property, interval graphs, and graph
planarity using PQ-tree algorithms. J. Comp. Syst. Sci. 13 (1976), 335–379. [393]
Borchardt C.W., Ueber eine der Interpolation entsprechende Darstellung der Eliminations-Resultante.
J. Reine Angew. Math. 57 (1860), 111–121. [37]
Borg P., On Chvátal’s conjecture and a conjecture on families of signed sets. European J. Combin. 32
(2011), 140–145. [503]
Borg P. and K. Meagher, The Katona cycle proof of the Erdős–Ko–Rado theorem and its possibilities. J.
Algebraic Combin. 43 (2016), 915–939. [500]
Borodin O.V., Criterion of chromaticity of a degree prescription (in Russian). In Abstracts of IV All-Union
Conf. on Theoretical Cybernetics (Novosibirsk) (1977), 127–128. Details in “Problems of colour-
ing and of covering the vertex set of a graph by induced subgraphs,” Ph.D. Thesis (in Russian),
Novosibirsk, 1979. [348]
Borodin O.V., Solution of the Ringel problem on vertex-face coloring of planar graphs and coloring of 1-
planar graphs. Metody Diskret. Analiz. (1984), 12–26, 108. [416]
Borodin O.V., Solving the Kotzig and Grünbaum problems on the separability of a cycle in planar graphs.
Mat. Zametki 46 (1989a), 9–12, 103. [423]
Borodin O.V., On the total coloring of planar graphs. J. Reine Angew. Math. 394 (1989b), 180–185.
[411]
Borodin O.V., A generalization of Kotzig’s theorem and prescribed edge coloring of planar graphs. Mat.
Zametki 48 (1990), 22–28, 160. [412, 413, 423]
Borodin O.V., A new proof of the 6 color theorem. J. Graph Theory 19 (1995), 507–521. [416]
Borodin O.V., Structural properties of plane graphs without adjacent triangles and an application to 3-
colorings. J. Graph Theory 21 (1996a), 183–186. [414, 415]
Borodin O.V., Structural theorem on plane graphs with application to the entire coloring number. J.
Graph Theory 23 (1996b), 233–239. [423]
Borodin O.V., Colorings of plane graphs: A survey. Discr. Math. 313 (2013), 517–539. [407]
Borodin O.V., A.N. Glebov, A. Raspaud, and M.R. Salavatipour, Planar graphs without cycles of length
from 4 to 7 are 3-colorable. J. Combin. Th. B 93 (2005), 303–311. [414]
Borodin O.V. and A.O. Ivanova, 2-distance ( + 2)-coloring of planar graphs with girth six and ≥ 18.
Discr. Math. 309 (2009), 6496–6502. [412]
Borodin O.V. and A.V. Kostochka, On an upper bound of the graph’s chromatic number depending on
the graph’s degree and density. J. Combin. Th. B 23 (1977), 247–250. [355]
Borodin O.V., A.V. Kostochka, and D.R. Woodall, Total colorings of planar graphs with large maximum
degree. J. Graph Theory 26 (1997), 53–59. [364, 365, 413, 414]
Borodin O.V. and D.P. Sanders, On light edges and triangles in planar graphs of minimum degree five.
Math. Nachr. 170 (1994), 19–24. [416, 423]
Borozan V., G.J. Chang, N. Cohen, S. Fujita, N. Narayanan, R. Naserasr, and P. Valicov, From edge-
coloring to strong edge-coloring. Electron. J. Combin. 22 (2015). [373]
860 References
Borsuk K., Drei Sätz über die n-dimensionale euklidische Sphäre (German). Fundamenta Mathematicae
20 (1933), 177–190. [809, 810, 817]
Borůvka O., O jistém problému minimálnı́m (Czech). Práce mor. přı́rodevěd. spol. v Brně 3 (1926), 37–
58. [246, 519]
Bosák J., Hamiltonian lines in cubic graphs. In Theory of Graphs (Internat. Sympos., Rome, 1966) (Gor-
don and Breach; Dunod, 1967), 35–46. [319, 331, 418]
Bose R.C., On the construction of balanced incomplete block designs. Ann. Eugenics 9 (1939), 353–399.
[610, 615, 627, 641–643, 655]
Bose R.C. and S.S. Shrikhande, On the falsity of Euler’s conjecture about the non-existence of two or-
thogonal Latin squares of order 4t + 2. Proc. Nat. Acad. Sci. U.S.A. 45 (1959), 734–737. [651]
Bose R.C., S.S. Shrikhande, and E.T. Parker, Further results on the construction of mutually orthogonal
Latin squares and the falsity of Euler’s conjecture. Canad. J. Math. 12 (1960), 189–203.
[612, 652–654]
Bouchet A. and J.L. Fouquet, Trois types de décompositions d’un graphe en chaı̂nes. In Combinatorial
mathematics (Marseille-Luminy, 1981), North-Holland Math. Stud. 75 (North-Holland, 1983),
131–141. [273]
Boyer J. and W. Myrvold, Stop minding your P’s and Q’s: a simplified O(n) planar embedding algorithm.
In Proc. 10th ACM-SIAM Symp. Discrete Algs. (Baltimore) (Assoc. Comput. Mach., 1999), 140–
146. [393]
Brandstädt A., V.B. Le, and J.P. Spinrad, Graph classes: a survey, SIAM Monographs on Discr. Mathe-
matics and Applications (Society for Industrial and Applied Mathematics (SIAM), 1999).
[370]
Brandt A., M. Ferrara, M. Kumbhat, S. Loeb, D. Stolee, and M. Yancey, I,F-partitions of sparse graphs.
European J. Combin. 57 (2016), 1–12. [422]
Brandt J., Cycles of partitions. Proc. Amer. Math. Soc. 85 (1982), 483–486. [143–145]
Brandt S., Subtrees and subforests of graphs. J. Combin. Th. B 61 (1994), 63–70. [262, 356]
Brandt S., Expanding graphs and Ramsey numbers (1996). Bielefeld preprint server, No. A 96-24.
[454]
Branin F.H., Jr., The relation between Kron’s method and the classical methods of network analysis. In
IRE Wescon Convention Record, II (1959), 3–28. [763]
Brègman L.M., Certain properties of nonnegative matrices and their permanents. Dokl. Akad. Nauk
SSSR 211 (1973), 27–30. [510]
Brightwell G.R., Linear extensions of infinite posets. Discr. Math. 70 (1988), 113–136. [823, 831]
Brightwell G.R., Semiorders and the 13 – 23 conjecture. Order 5 (1989), 369–380. [823, 831]
Brightwell G.R., On the complexity of diagram testing. Order 10 (1993), 297–303. [543]
Brightwell G.R., Balanced pairs in partial orders. Discr. Math. 201 (1999), 25–52. [823]
Brightwell G.R., S. Felsner, and W.T. Trotter, Balancing pairs and the cross product conjecture. Order
12 (1995), 327–349. [823]
Brightwell G.R. and E.R. Scheinerman, Representations of planar graphs. SIAM J. Discr. Math. 6 (1993),
214–229. [394]
Brightwell G.R. and W.T. Trotter, The order dimension of convex polytopes. SIAM J. Discr. Math. 6
(1993), 230–245. [790]
Brightwell G.R. and W.T. Trotter, The order dimension of planar maps. SIAM J. Discr. Math. 10 (1997),
515–528. [790]
Brightwell G.R. and W.T. Trotter, A combinatorial approach to correlation inequalities. Discr. Math. 257
(2002), 311–327. [600]
Brightwell G.R. and P. Winkler, Counting linear extensions. Order 8 (1991), 225–242. [823]
Brightwell G.R. and C. Wright, The 1/3–/3 conjecture for 5-thin posets. SIAM J. Discr. Math. 5 (1992),
467–474. [823]
Broersma H., Z. Ryjáček, and I. Schiermeyer, Closure concepts: a survey. Graphs Combin. 16 (2000), 17–
48. [320]
References 861
Broersma H. and H. Tuinstra, Independence trees and Hamilton cycles. J. Graph Th. 29 (1998), 227–
237. [327]
Broersma H.J., On some intriguing problems in Hamiltonian graph theory—a survey. Discr. Math. 251
(2002), 47–69. [318]
Broersma H.J., F.V. Fomin, P.A. Golovach, and G.J. Woeginger, Backbone colorings for graphs: tree and
path backbones. J. Graph Theory 55 (2007), 137–152. [342]
Broline D.M., Renumbering of the faces of dice. Math. Mag. 52 (1979), 312–314. [103]
Broline D.M. and D.E. Loeb, The combinatorics of Mancala-type games: Ayo, Tchoukaillon, and 1/ .
UMAP J. 16 (1995), 21–36. [144]
Brooks R.L., On colouring the nodes of a network. Proc. Cambridge Phil. Soc. 37 (1941), 194–197.
[336]
Brouwer A.E. and W.H. Haemers, Spectra of graphs, Universitext (Springer, 2012). [766, 771]
Brouwer A.E. and A. Schrijver, The blocking number of an affine space. J. Combin. Th. A 24 (1978), 251–
253. [735]
Brouwer L.E.J., Über Abbildung von Mannigfaltigkeiten. Math. Ann. 71 (1911), 97–115. [805]
Brown J.L., Note on complete sequences of integers. Amer. Math. Monthly 68 (1961), 557–560. [441]
Brown T.C., P. Erdős, F.R.K. Chung, and R.L. Graham, Quantitative forms of a theorem of Hilbert. J.
Combin. Th. A 38 (1985), 210–216. [473]
Brown W.G., On graphs that do not contain a Thomsen graph. Canad. Math. Bull. 9 (1966), 281–285.
[632, 633]
Brown W.G. and F. Harary, Extremal digraphs (1970), 135–198. [228]
Brualdi R.A., Comments on bases in dependence structures. Bull. Austral. Math. Soc. 1 (1969), 161–167.
[538]
Brualdi R.A., Introductory combinatorics (5th ed.) (Pearson Prentice Hall, 2010). First ed. North–
Holland, 1977. [174]
Brualdi R.A. and S. Kirkland, Aztec diamonds and digraphs, and Hankel determinants of Schröder
numbers. J. Combin. Th. B 94 (2005), 334–351. [34]
Bruck R.H. and H.J. Ryser, The nonexistence of certain finite projective planes. Canadian J. Math. 1
(1949), 88–93. [616, 627]
Bruhn H., P. Charbit, and J.A. Telle, The graph formulation of the union-closed sets conjecture. In The
Seventh European Conference on Combinatorics, Graph Theory and Applications, CRM Series 16
(Ed. Norm., 2013), 73–78. [512]
Bruhn H. and O. Schaudt, The journey of the union-closed sets conjecture. Graphs Combin. 31 (2015),
2043–2074. [503]
Bryant D. and P. Danziger, On bipartite 2-factorizations of K n − I and the Oberwolfach problem. J.
Graph Th. 68 (2011), 22–37. [647, 648]
Bryant D., D. Horsley, and W. Pettersson, Cycle decompositions V: Complete graphs into cycles of arbi-
trary lengths. Proc. Lond. Math. Soc. (3) 108 (2014), 1153–1192. [646]
Bryant D. and C.A. Rodger, Cycle decompositions. In The CRC Handbook of Combinatorial Designs (2nd
ed.) (Colbourn, Charles J. and Dinitz, Jeffrey H., eds.) (CRC Press, 2007), 373–382. [647]
Bryant P.R., Graph theory applied to electrical networks. In Graph Theory and Theoretical Physics (Aca-
demic Press, 1967), 111–137. [763]
Brylawski T.H., Some properties of basic families of subsets. Discr. Math. 6 (1973), 333–341. [538]
Brylawski T.H., Appendix of matroid cryptomorphisms. In Theory of matroids (N. White, ed.), Encyc.
Math. Appl. 26 (Cambridge Univ. Press, 1986), 298–316. [528, 529]
Bucić M., An improved bound for disjoint directed cycles. Discr. Math. 341 (2018), 2231–2236. [685]
Bucić M., S. Letzter, and B. Sudakov, Three colour bipartite Ramsey number of cycles and paths (2018).
(arXiv:1803.03689). [460]
Buckley F. and M. Lewinter, A Friendly Introduction to Graph Theory (Prentice Hall, 2002). [215]
Bukh B. and Z. Jiang, A bound on the number of edges in graphs without an even cycle. Combin. Probab.
Comput. 26 (2017), 1–15. [479]
862 References
Bunde D.P., E.W. Chambers, D.W. Cranston, K.G. Milans, and D.B. West, Pebbling and optimal pebbling
in graphs. J. Graph Theory 57 (2008), 215–238. [668]
Buneman P., A characterization of rigid circuit graphs. Discr. Math. 9 (1974), 205–212. [373]
Buneman P. and L. Levy, The Towers of Hanoi problem. Info. Process. Lett. 10 (1980), 243–244. [80]
Buratti M., Rotational ¾ -cycle systems of order v < 3¾ ; another proof of the existence of odd cycle systems.
J. Combin. Des. 11 (2003), 433–441. [646]
Burns D. and S. Schuster, Embedding (p , p − 1) graphs in their complements. Israel J. Math. 30 (1978),
313–320. [251]
Burr S.A., Generalized Ramsey theory for graphs—a survey. In Graphs and Combinatorics, Proc. Capital
Conf. (Washington, 1973), Lect. Notes Math. 486 (Springer, 1974), 52–75. [459, 460]
Burr S.A., Ramsey numbers involving graphs with long suspended paths. J. London Math. Soc. (2) 24
(1981), 405–413. [459]
Burr S.A. and P. Erdős, On the magnitude of generalized Ramsey numbers for graphs. In Infinite and
finite sets (Colloq., Keszthely, 1973), I, Colloq. Math. Soc. János Bolyai 10 (North-Holland, 1975),
215–240. [484]
Burr S.A. and P. Erdős, Extremal Ramsey theory for graphs. Utilitas Math. 9 (1976), 247–258. [460]
Burr S.A. and P. Erdős, Generalizations of a Ramsey-theoretic result of Chvátal. J. Graph Th. 7 (1983),
39–51. [454]
Burr S.A., P. Erdős, and L. Lovász, On graphs of Ramsey type. Ars Combinatoria 1 (1976), 167–190.
[456, 457, 461]
Burr S.A., P. Erdős, and J. Spencer, Ramsey theorems for multiple copies of graphs. Trans. Amer. Math.
Soc. 209 (1975), 87–99. [454]
Burr S.A. and J.A. Roberts, On Ramsey numbers for stars. Utilitas Math. 4 (1973), 217–220. [459]
Buršteı̆n M.I., An upper bound for the chromatic number of hypergraphs. Sakharth. SSR Mecn. Akad.
Moambe 75 (1974), 37–40. [418, 419]
Burungale A., Problem 11262. Amer. Math. Monthly 113 (2006), 940. Solution 115 (2008), 862. [238]
Butler S. and J. Mao, Problem 11265. Amer. Math. Monthly 114 (2007), 77. Solution 116 (2009), 181.
[237]
Butterfield J., T. Grauman, W.B. Kinnersley, K.G. Milans, C. Stocker, and D.B. West, On-line Ramsey
theory for bounded degree graphs. Electron. J. Combin. 18 (2011), Paper 136, 17. [457]
Cabello S. and B. Mohar, Adding one edge to planar graphs makes crossing number and 1-planarity
hard. SIAM J. Comput. 42 (2013), 1803–1829. [795]
Callan D., Problem 10643. Amer. Math. Monthly 105 (1998), 175. Solution 107 (2000), 278–279. [63]
Callan D., Solution to problem 10596. Amer. Math. Monthly 106 (1999), 367. Proposed 104 (1997), 456.
[174]
Callan D., Solution to problem 10878. Amer. Math. Monthly 110 (2003a), 342–343. Proposed 108 (2001),
470. [35]
Callan D., Solution to problem 10894. Amer. Math. Monthly 110 (2003b), 443–444. Proposed 108 (2001),
770. [64]
Callan D., Problem 11013. Amer. Math. Monthly 110 (2003c), 438. Solution 112 (2005), 184. [81]
Callan D., Problem 11091. Amer. Math. Monthly 111 (2004), 534. Solution 113 (2006), 462–463. [49]
Callan D., Problem 11362. Amer. Math. Monthly 105 (2008), 461. Solution 117 (2010), 187. [59]
Callan D., Problem 11567. Amer. Math. Monthly 118 (2011), 371. Solution 120 (2013), 370. [134]
Callan D. and E. Deutsch, The run transform. Discr. Math. 312 (2012), 2927–2937. [151]
Cameron K. and J. Edmonds, Some graphic uses of an even number of odd nodes. Ann. Inst. Fourier
(Grenoble) 49 (1999), 815–827. [241, 242, 249, 276]
Cameron K.B., Polyhedral and Algorithmic Ramifications of Antichains (ProQuest, 1982). Ph.D. Thesis,
Univ. Waterloo. [549]
Cameron K.B., On ¾ -optimum dipath partitions and partial ¾ -colourings of acyclic digraphs. European
J. Combin. 7 (1986), 115–118. [549]
Cameron P.J. and J.H. van Lint, Designs, graphs, codes and their links, London Math. Soc. Student Texts
22 (Cambridge Univ Press, 1991). [609, 774]
References 863
Cameron P.J. and I.M. Wanless, Covering radius for sets of permutations. Discr. Math. 293 (2005), 91–
109. [261]
Camion P., Chemins et circuits hamiltoniens des graphes complets. C. R. Acad. Sci. Paris 249 (1959),
2151–2152. [334]
Campbell C. and W. Staton, On extremal regular graphs with given odd girth. In Proc. 22nd Southeastern
Intl. Conf. Combin. Graph Th. Comput. (Baton Rouge), Congr. Num. 81 (1991), 157–159. [238]
Canfield E.R., On a problem of Rota. Adv. in Math. 29 (1978), 1–10. [567]
Cannings C. and J. Haigh, Montreal solitaire. J. Combin. Th. A 60 (1992), 50–66. [144]
Cantor D.G. and W.H. Mills, Determination of a subset from certain combinatorial properties. Canadian
J. Math. 18 (1966), 42–48. [513]
Cao W., K.W. Hwang, and D.B. West, Improved bounds on families under ¾ -wise set-intersection con-
straints. Graphs Combin. 23 (2007), 381–386. [731]
Carlitz L., Eulerian numbers and polynomials. Math. Mag. 32 (1958/1959), 247–260. [101]
Carlitz L., D.P. Roselle, and R.A. Scoville, Some remarks on ballot-type sequences of positive integers.
J. Combinatorial Theory A 11 (1971), 258–271. [177]
Caro N. and C. Pohoata, Solution to problem 11403 (solved independently). Amer. Math. Monthly 118
(2011), 276–277. Proposed 115 (2008), 949. [174]
Caro Y., New results on the independence number. Tech. Rep. 05-79, Tel-Aviv University (1979).
[263, 662]
Caro Y., Zero-sum problems—a survey. Discr. Math. 152 (1996), 93–113. [461]
Caro Y., I. Krasikov, and Y. Roditty, On the largest tree of given maximum degree in a connected graph.
J. Graph Th. 15 (1991), 7–13. [327]
Caro Y. and Y. Roditty, Connected colorings of graphs. Ars Combin. 70 (2004), 191–196. [236]
Caro Y. and Z. Tuza, Improved lower bounds on ¾ -independence. J. Graph Theory 15 (1991), 99–107.
[263]
Cartwright D.P. and F. Harary, Structural balance: a generalization of Heider’s theory. Psychological
Review 63 (1956), 277–293. [237]
Catalan E., Note sur une équation aux différences finies. J. Math. Pures Appl. 3 (1838), 508–516. [41]
Catlin P.A., A bound on the chromatic number of a graph. Discr. Math. 22 (1978), 81–83. [355]
Catlin P.A., Hajós’ graph-coloring conjecture: variations and counterexamples. J. Combin. Th. B 26
(1979), 268–274. [349, 356]
Cayley A., A theorem on trees. Quart. J. Math. 23 (1889), 376–378. [36, 37, 47]
Chaiken S. and D.J. Kleitman, Matrix tree theorems. J. Combin. Th. A 24 (1978), 377–381. [749]
Chandrasekharan K., Arithmetical functions, Die Grundlehren der mathematischen Wissenschaften,
Band 167 (Springer-Verlag, 1970). [140]
Chang W.I. and E.L. Lawler, Edge coloring of hypergraphs and a conjecture of Erdős, Faber, Lovász.
Combinatorica 8 (1988), 293–295. [439]
Chappell G.G., Polyunsaturated posets and graphs and the Greene–Kleitman theorem. Discr. Math. 257
(2002), 329–340. [551]
Charalambides C.A., Enumerative combinatorics, CRC Press Series on Discr. Mathematics and its Ap-
plications (Chapman & Hall/CRC, 2002). [101]
Chartrand G., D. Geller, and S. Hedetniemi, Graphs with forbidden subgraphs. J. Combinatorial Theory
B 10 (1971), 12–41. [418]
Chartrand G. and F. Harary, Planar permutation graphs. Ann. Inst. H. Poincaré Sect. B (N.S.) 3 (1967),
433–438. [398]
Chartrand G. and F. Harary, Graphs with prescribed connectivities. In Theory of Graphs (Tihany, 1966)
(P. Erdős and G. Katona, eds.) (Academic Press, 1968), 61–63. [295]
Chartrand G., S.F. Kapoor, L.M. Lesniak, and S. Schuster, Near 1-factors in graphs. In Proc. 2nd West
Coast Conf. Combin. Graph Th. Comput. (Eugene, OR, 1983), Congr. Numer. 41 (1984), 131–147.
[273]
Chartrand G. and H.V. Kronk, The point-arboricity of planar graphs. J. London Math. Soc. 44 (1969),
612–616. [343]
864 References
Chartrand G. and L.M. Lesniak, Graphs and Digraphs (2nd ed.) (Wadsworth, 1986). Also 1996, 2005,
2011. [215, 250, 315, 377]
Chartrand G., A.D. Polimeni, and M.J. Stewart, The existence of 1-factors in line graphs, sqaures, and
total graphs. Indagationes Math. 35 (1973), 228–232. [272]
Chein M., Graphe régulièrement décomposable. Rev. Fran.̧ Info. Rech. Opér. 2 (1968), 27–42. [312]
Chen G., R.J. Gould, and X. Yu, Graph connectivity after path removal. Combinatorica 23 (2003), 185–
203. [314]
Chen G., M.S. Jacobson, A.E. Kézdy, and J. Lehel, Tough enough chordal graphs are Hamiltonian. Net-
works 31 (1998), 29–38. [318]
Chen G., J. Lehel, M.S. Jacobson, and W.E. Shreve, Note on graphs without repeated cycle lengths. J.
Graph Theory 29 (1998), 11–15. [249]
Chen G., R.H. Schelp, and B. Wei, Monochromatic-rainbow Ramsey numbers (2001). Presented 14th
Cumberland Conference. [473]
Chen Z.H. and H.J. Lai, The higher-order edge toughness of a graph and truncated uniformly dense
matroids. J. Combin. Math. Combin. Comput. 22 (1996), 157–160. [539]
Cherkashin D.D. and J. Kozik, A note on random greedy coloring of uniform hypergraphs. Random
Structures Algorithms 47 (2015), 407–413. [660, 673]
Chernoff H., A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations.
Ann. Math. Statistics 23 (1952), 493–507. [707]
Chetwynd A.G. and A.J.W. Hilton, Partial edge-colourings of complete graphs or of graphs which are
nearly complete. In Graph theory and combinatorics (Cambridge, 1983) (Academic Press, London,
1984), 81–97. [359]
Chetwynd A.G. and A.J.W. Hilton, Star multigraphs with three vertices of maximum degree. Math. Proc.
Cambridge Math. Soc. 100 (1986), 303–317. [359]
Chetwynd A.G. and A.J.W. Hilton, 1-factorizing regular graphs of high degree—an improved bound. In
Graph Theory and Combinatorics (Cambridge, 1988), Discr. Math. 75 (1989), 103–112. [359]
Chevalley C., Démonstration d’une hypothèse de M. Artin. Abh. Math. Sem. Univ. Hamburg 11 (1935),
73–75. [735]
Chevalley H. and E. Warning, Bemerkung zur vorstehenden Arbeit. Abh. Math. Sem. Univ. Hamburg
11 (1935), 76–83. [735]
Chiba S. and T. Yamashita, Degree conditions for the existence of vertex-disjoint cycles and paths: a
survey. Graphs Combin. 34 (2018), 1–83. [326]
Chiue W.S. and B.S. Shieh, On connectivity of the Cartesian product of two graphs. Appl. Math. Comput.
102 (1999), 129–137. [292]
Choi J.O., L. Özkahya, and D.B. West, Degree-splittability of multigraphs and caterpillars. In Proc. 41st
Southeastern Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 202 (2010),
137–147. [239]
Chow T., A short proof of the rook reciprocity theorem. Electron. J. Combin. 3 (1996), R10. [175]
Chowla S. and H.J. Ryser, Combinatorial problems. Canadian J. Math. 2 (1950), 93–99. [616]
Chudnovsky M., N. Robertson, P.D. Seymour, and R. Thomas, The strong perfect graph theorem. Ann.
of Math. (2) 164 (2006), 51–229. [370]
Chung F.R.K., On partitions of graphs into trees. Discr. Math. 23 (1978a), 23–30. [249]
Chung F.R.K., On concentrators, superconcentrators, generalizers and nonblocking networks. Bell Syst.
Tech. J. (1978b), 1765–1777. [779]
Chung F.R.K., Spectral graph theory, CBMS Conf. Series 92 (Amer. Math. Soc., 1997). [776]
Chung F.R.K. and R.L. Graham, On multicolor Ramsey numbers for complete bipartite graphs. J. Com-
bin. Th. B 18 (1975), 164–169. [460]
Chung F.R.K. and R.L. Graham, Erdős on graphs (A K Peters, 1998). [341, 446]
Chung F.R.K., R.L. Graham, P. Frankl, and J.B. Shearer, Some intersection theorems for ordered sets
and graphs. J. Combin. Th. A 43 (1986), 23–37. [508, 509]
Chung F.R.K. and C.M. Grinstead, A survey of bounds for classical Ramsey numbers. J. Graph Th. 7
(1983), 25–37. [451]
References 865
Chung F.R.K. and L. Lu, An upper bound for the Turán number t3(n , 4). J. Combin. Theory A 87 (1999),
381–389. [491]
Chung K.L. and W. Feller, On fluctuations in coin-tossing. Proc. Nat. Acad. Sci. U. S. A. 35 (1949), 605–
608. [50]
Chung M.-S. and D.B. West, Large P4 -free graphs with bounded degree. J. Graph Th. 17 (1993), 109–
116. [490]
Chvátal V., Planarity of graphs with given degrees of vertices. Nieuw Arch. Wisk. (3) 17 (1969), 47–60.
[389]
Chvátal V., The smallest triangle-free 4-chromatic 4-regular graph. J. Combin. Th. 9 (1970), 93–94.
[354]
Chvátal V., On Hamilton’s ideals. J. Combin. Th. B 12 (1972), 163–168. [320, 326, 332]
Chvátal V., Tough graphs and Hamiltonian circuits. Discr. Math. 2 (1973), 215–223. [318]
Chvátal V., Intersecting families of edges in hypergraphs having the hereditary property. In Hypergraph
Seminar (Proc. First Working Sem., Ohio State Univ., 1972; dedicated to Arnold Ross), Lecture
Notes in Math. 411 (Springer, 1974), 61–66. [458, 501, 502]
Chvátal V., A combinatorial theorem in plane geometry. J. Combin. Th. B 18 (1975), 39–41. [419]
Chvátal V., Tree-complete graph Ramsey numbers. J. Graph Th. 1 (1977), 93. [453]
Chvátal V., Star-cutsets and perfect graphs. J. Combin. Th. B 39 (1985b), 138–154. [375]
Chvátal V. and P. Erdős, A note on Hamiltonian circuits. Discr. Math. 2 (1972), 111–113. [321]
Chvátal V. and F. Harary, Generalized Ramsey theory for graphs, III. Small Off-diagonal Numbers. Pac.
J. Math. 41 (1972), 335–345. [454]
Chvátal V. and F. Harary, Generalized Ramsey theory for graphs, I. Diagonal numbers. Period. Math.
Hungar. 3 (1973), 115–124. [666]
Chvátal V. and J. Komlós, Some combinatorial theorems on monotonicity. Canad. Math. Bull. 14 (1971),
151–157. [458]
Chvátal V. and L. Lovász, Every directed graph has a semi-kernel. In Hypergraph Seminar (Columbus,
1972), Lect. Notes Math. 411 (Springer, 1974), 175. [229]
Chvátal V., V. Rödl, E. Szemerédi, and W.T. Trotter, The Ramsey numbers of a graph with bounded
maximum degree. J. Combin. Th. B 34 (1983), 239–243. [455, 483]
Chvátalová J., Optimal labelling of a product of two paths. Discr. Math. 11 (1975), 249–253. [800, 818]
Cigler J., Some remarks on Catalan families. European J. Combin. 8 (1987), 261–267. [50]
Clapham C.R.J., Hamiltonian arcs in self-complementary graphs. Discr. Math. 8 (1974), 251–255.
[332]
Clark D.S. and J.T. Lewis, Avoiding-sequences with minimum sum. Discrete Appl. Math. 22 (1989), 103–
108. [429]
Clark D.S. and J.T. Lewis, Circular avoiding sequences with prescribed sum. Discrete Appl. Math. 43
(1993), 27–36. [429]
Clark L.H., J.C. George, and T.D. Porter, On the number of 1-factors in the n-cube. In Proc. 28th South-
eastern Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 127 (1997), 67–69.
[764]
Clark P.L., The Combinatorial Nullstellensätze revisited. Electron. J. Combin. 21 (2014), Paper 4.15, 17.
[732]
Clements G.F., A minimization problem concerning subsets of a finite set. Discr. Math. 4 (1973), 123–
128. [511]
Clements G.F. and B. Lindström, A generalization of a combinatorial theorem of Macaulay. J. Combi-
natorial Theory 7 (1969), 230–238. [496]
Cohen N. and F. Havet, Planar graphs with maximum degree ≥ 9 are ( + 1)-edge-choosable—a short
proof. Discr. Math. 310 (2010), 3049–3051. [413]
Cohen-Addad V., M. Hebdige, D. Král’, Z. Li, and E. Salgado, Steinberg’s conjecture is false. J. Combin.
Th. B 122 (2017), 452–456. [414]
Colbourn C.J. and J.H. Dinitz (eds.), The CRC handbook of combinatorial designs, CRC Press Series on
Discr. Math. Appl. (CRC Press, 1996). Also 2007. [609, 646]
866 References
Colbourn C.J. and A. Rosa, Triple systems, Oxford Mathematical Monographs (Clarendon Press, 1999).
[641]
Coleman M., An answer to a question by Wilf on packing distinct patterns in a permutation. Electron.
J. Combin. 11 (2004), Note 8, 4 pp. [434, 442]
Comtet L., Analyse combinatoire. Tomes I, II, Collection SUP: “Le Mathématicien”, 4 5 (Presses Univer-
sitaires de France, 1970). [65]
Comtet L., Advanced combinatorics (D. Reidel Publishing Co., 1974). [65]
Conlon D., A new upper bound for diagonal Ramsey numbers. Ann. of Math. (2) 170 (2009a), 941–960.
[450]
Conlon D., On-line Ramsey numbers. SIAM J. Discr. Math. 23 (2009b/10), 1954–1963. [457]
Conlon D. and J. Fox, Graph removal lemmas. In Surveys in combinatorics 2013, London Math. Soc.
Lecture Note Ser. 409 (Cambridge Univ. Press, 2013), 1–49. [485]
Conlon D., J. Fox, C. Lee, and B. Sudakov, Ordered Ramsey numbers. J. Combin. Th. B 122 (2017), 353–
383. [457]
Conlon D., J. Fox, and B. Sudakov, Hypergraph Ramsey numbers. J. Amer. Math. Soc. 23 (2010), 247–
266. [451, 459, 608]
Conlon D., J. Fox, and B. Sudakov, On two problems in graph Ramsey theory. Combinatorica 32 (2012),
513–535. [484]
Conlon D., J. Fox, and B. Sudakov, An improved bound for the stepping-up lemma. Discrete Appl. Math.
161 (2013), 1191–1196. [451, 453]
Conlon D., J. Fox, and B. Sudakov, Cycle packing. Rand. Struct. Alg. 45 (2014), 608–626. [334]
Conlon D., J. Fox, and B. Sudakov, Recent developments in graph Ramsey theory. In Surveys in combi-
natorics 2015, London Math. Soc. Lecture Note Ser. 424 (Cambridge Univ. Press, 2015), 49–118.
[425]
Cook S., The complexity of theorem proving procedures. In Proc. 3rd ACM Symposium on Theory of
Computing (1971), 151–158. [11]
Corrádi K., Problem at Schweitzer competition. Mat. Lapo 20 (1969), 159–162. [511]
Corradi K. and A. Hajnal, On the maximal number of independent circuits in a graph. Acta Math. Acad.
Sci. Hungar. 14 (1963), 423–439. [490]
Cox D.A. and U. Thieu, Problem 11862. Amer. Math. Monthly 122 (2015), 802. Solution 124 (2017), 473.
[173]
Cranston D.W., Strong edge-coloring of graphs with maximum degree 4 using 22 colors. Discr. Math.
306 (2006), 2772–2778. [373]
Cranston D.W., Edge-choosability and total-choosability of planar graphs with no adjacent 3-cycles. Dis-
cuss. Math. Graph Theory 29 (2009), 163–178. [413, 423]
Cranston D.W., R. Erman, and R. Škrekovski, Choosability of the square of a planar graph with maxi-
mum degree four. Australas. J. Combin. 59 (2014), 86–97. [424]
Cranston D.W., S. Jahanbekam, and D.B. West, The 1 , 2 , 3-conjecture and 1 , 2-conjecture for sparse
graphs. Discuss. Math. Graph Theory 34 (2014), 769–799. [422]
Cranston D.W. and S.J. Kim, List-coloring the square of a subcubic graph. J. Graph Theory 57 (2008),
65–87. [424]
Cranston D.W., S.J. Kim, and G. Yu, Injective colorings of sparse graphs. Discr. Math. 310 (2010), 2965–
2973. [423, 424]
Cranston D.W. and L. Rabern, Brooks’ theorem and beyond. J. Graph Th. 80 (2015), 199–225. [336]
Cranston D.W. and D.B. West, Problem 11712. Amer. Math. Monthly 120 (2013), 569. Solution 122 (2015),
505–506. [152]
Cranston D.W. and D.B. West, An introduction to the discharging method via graph coloring. Discr.
Math. 340 (2017), 766–793. [407, 411]
Cranston D.W. and G. Yu, Linear choosability of sparse graphs. Discr. Math. 311 (2011), 1910–1917.
[423]
Crapo H.H. and G.C. Rota, On the Foundations of Combinatorial Theory: Combinatorial Geometries
(MIT Press, 1970). [520]
References 867
Cruse A.B., A note on i-factors in certain regular multigraphs. Discr. Math. 18 (1977), 213–216. [274]
Cull P., Tours of graphs, digraphs, and sequential machines. IEEE Trans. Comp. C29 (1980), 50–54.
[237]
Cull P. and E.F. Ecklund, On the Towers of Hanoi and generalized Towers of Hanoi problems. In Proc.
13th Southeastern Intl. Conf. Combin. Graph Th. comput. (Boca Raton), Congr. Numer. 35 (1982),
229–238. [80]
Curran S., O. Lee, and X. Yu, Finding four independent trees. SIAM J. Comput. 35 (2006), 1023–1058.
[315]
Cushing W. and H.A. Kierstead, Planar graphs are 1-relaxed, 4-choosable. European J. Combin. 31
(2010), 1385–1397. [742]
Cvetković D.M., M. Doob, and H. Sachs, Spectra of graphs: Theory and applications, Pure and Applied
Mathematics 87 (Academic Press, 1979). Also 1982, 1995. [766, 781]
Czipzer J., Solution to problem 127 (Hungarian). Mat. Lapok 14 (1963), 373–374. [216]
Dályay P.P., Problem 11631. Amer. Math. Monthly 119 (2012), 247–8. Solution 121 (2014), 367. [623]
Dályay P.P., Problem 11897. Amer. Math. Monthly 123 (2016), 297. Solution 125 (2018), 86. [115]
Damerell R.M., On Moore graphs. Proc. Cambridge Philos. Soc. 74 (1973), 227–236. [244, 775]
David K., Solution to problem 11144. Amer. Math. Monthly 114 (2007), 262–264. Proposed 112 (2005),
274. [47]
Daykin D.E., Erdős–Ko–Rado from Kruskal–Katona. J. Combin. Th. A 17 (1974a), 254–255. [500]
Daykin D.E., A simple proof of the Kruskal–Katona theorem. J. Combin. Th. A 17 (1974b), 252–253.
[496]
Daykin D.E., A lattice is distributive if and only if | A | | B |≤| A ⋁ B | | A ⋀ B |. Nanta Math. 10 (1977),
58–60. [596, 608]
Daykin D.E., J. Godfrey, and A.J.W. Hilton, Existence theorems for Sperner families. J. Combinatorial
Theory A 17 (1974), 245–251. [511]
Daykin D.E., A.J.W. Hilton, and D. Miklós, Pairings from down-sets and up-sets in distributive lattices.
J. Combin. Th. A 34 (1983), 215–230. [501, 512]
Daykin D.E., D.J. Kleitman, and D.B. West, The number of meets between two subsets of a lattice. J.
Combin. Th. A 26 (1979), 135–156. [596]
Daykin D.E. and L. Lovász, The number of values of a Boolean function. J. London Math. Soc. (2) 12
(1976), 225–230. [497, 607, 608]
de Abreu N.M.M., Old and new results on algebraic connectivity of graphs. Linear Algebra Appl. 423
(2007), 53–73. [778]
de Bruijn N.G., A combinatorial problem. Nederl. Akad. Wetensch., Proc. 49 (1946), 758–764; Indaga-
tiones Math. 8, 461–467 (1946). [239]
de Bruijn N.G. and P. Erdős, A colour problem for infinite graphs and a problem in the theory of relations.
Nederl. Akad. Wetensch. Proc. A. 54 = Indagationes Math. 13 (1951), 369–373. [468]
de Bruijn N.G. and T. van Aardenne-Ehrenfest, Circuits and trees in oriented linear graphs. Simon
Stevin 28 (1951), 203–217. [752]
de Bruijn N.G., E. van Tengbergen, and D. Kruyswijk, On the set of divisors of a number. Nieuw Arch.
Wisk. (2) 23 (1951), 191–193. [554]
de Fraysseix H., J. Pach, and R. Pollack, How to draw a planar graph on a grid. Combinatorica 10 (1990),
41–51. [783]
de Grey A., The chromatic number of the plane is at least 5. Geombinatorics 28 (2018), 18–31. (Also
arXiv:1804.02385) [342]
de Moivre A., The Doctrine of Chances (Pearson, 1718). [153]
de Moivre A., Miscellanea Analytica (London, 1730). [67]
de Werra D., Equitable colorations of graphs. Rev. Française Informat. Recherche Opérationnelle 5
(1971), 3–8. [372]
Dean A.M. and R.B. Richter, The crossing number of C4 × C4 . J. Graph Theory 19 (1995), 125–129.
[794]
868 References
Dean N., Contractible Edges and Conjectures about Path and Cycle Numbers (ProQuest, 1987). Ph.D.
Thesis, Vanderbilt University. [249]
Dean R.A. and G. Keller, Natural partial orders. Canad. J. Math. 20 (1968), 535–554. [587, 604]
DeBiasio L., A. Gyárfás, R.A. Krueger, M. Ruszinkó, and G.N. Sárközy, Monochromatic bal-
anced componenets, matchings, and paths in multicolored complete bipartite graphs (2018).
(arXiv:1804.04195). [460]
DeBiasio L. and A. Lo, Spanning trees with few branch vertices (2017). (arXiv:1709.04937). [327, 334]
Dekster B.V., The Borsuk conjecture holds for bodies of revolution. J. Geom. 52 (1995), 64–73. [817]
Delannoy H., Emploi de l’échiquier pour la résolution de divers problèmes de probabilité. Assoc. Franç.
Paris 18 (1889), 43–52. [28, 29]
Delcourt M. and L. Postle, On the list coloring version of Reed’s conjecture. Elec. Notes Discr. Math. 61
(2017), 343–349. [685]
Delsarte P., J.M. Goethals, and J.J. Seidel, Spherical codes and designs. Geometriae Dedicata 6 (1977),
363–388. [744]
Demoucron G., Y. Malgrange, and R. Pertuiset, Graphes planaires: reconnaissance et construction des
représentations planaires topologiques. Rev. Française Recherche Opérationnelle 8 (1964), 33–
47. [393]
Dénes J. and A.D. Keedwell, Latin squares and their applications (Academic Press, 1974). Also 2015
(Elsevier/North-Holland). [610, 623]
Dénes J. and A.D. Keedwell, Latin squares, Annals Discr. Math. 46 (North-Holland, 1991). [610]
Derbyshire J., Prime obsession (Joseph Henry Press, 2003). [10]
DeSario R., Problem 10931. Amer. Math. Monthly 109 (2002), 298. Solution 111 (2004), 169–70. [442]
Descartes B., A three colour problem. Eureka (1947). Solution 1948. [434]
Deshpande B. and M.N. Deshpande, Problem 11350. Amer. Math. Monthly 115 (2008), 262. Solution 117
(2010), 89. [668]
Deshpande B. and M.N. Deshpande, Problem 11500. Amer. Math. Monthly 117 (2010), 371. Solution 119
(2012), 348. [92]
Deshpande M.N. and K. Laghate, Problem 11042. Amer. Math. Monthly 110 (2003), 843–842. Solution
112 (2005), 574. [104]
Deshpande M.N. and R.M. Welukar, Problem 11033. Amer. Math. Monthly 110 (2003), 742. Solution 112
(2005), 470–472. [115]
DeTemple D. and J.M. Robertson, The equivalence of Euler’s and Pick’s theorems. Math. Teacher 67
(1974), 222–226. [389]
Deuber W., Partitionen und lineare Gleichungssysteme. Math. Z. 133 (1973), 109–123. [462]
Deutsch E., Problem 10649. Amer. Math. Monthly 105 (1998), 271. Solution 107 (2000), 279–280. [62]
Deutsch E., Problem 10751. Amer. Math. Monthly 106 (1999), 686. Solution 108 (2001), 872–873. [49]
Deutsch E., Problem 10795. Amer. Math. Monthly 107 (2000), 367. Solution 108 (2001), 980. [49]
Deutsch E., Problem 10877. Amer. Math. Monthly 108 (2001), 470. Solution 110 (2003), 245–246. [82]
Deutsch E., Problem 10902. Amer. Math. Monthly 108 (2001a), 871. Solution 110 (2003), 639–640.
[22, 62]
Deutsch E., Problem 11071. Amer. Math. Monthly 111 (2004a), 259. Solution 113 (2006), 460–1. [50]
Deutsch E., Problem 11108. Amer. Math. Monthly 111 (2004b), 725. Solution 113 (2006), 466–7. [59]
Deutsch E., Problem 11150. Amer. Math. Monthly 112 (2005), 367. Solution 114 (2007), 264–265.
[48, 164]
Deutsch E., Problem 11237. Amer. Math. Monthly 113 (2006), 655. Solution 115 (2008), 666–7. [149]
Deutsch E., Problem 11373. Amer. Math. Monthly 115 (2008), 568. Solution 117 (2010), 462. [105]
Deutsch E., Problem 11424. Amer. Math. Monthly 116 (2009), 277. Solution 118 (2011), 376. [21]
Deza M. and P. Frankl, Problem. In Combinatorics (1976), Coll. Math. Soc. J. Bolyai 18 (North-Holland,
1978), 1193. [511]
Deza M., P. Frankl, and N.M. Singhi, On functions of strength t. Combinatorica 3 (1983), 331–339.
[728]
References 869
Dias da Silva J.A. and Y.O. Hamidoune, Cyclic spaces for Grassman derivatives and additive theory.
Bull. London Math. Soc. 26 (1994), 140–146. [734, 746]
Dı́az-Barrero J.L., Problem 11164. Amer. Math. Monthly 112 (2005), 568. Solution 114 (2007), 364–365.
[32]
Dickson L.E., College Algebra (Wiley & Sons, 1902). [48]
Dickson L.E., Lower limit for the number of sets of solutions of x e + y e + e ≡ 0 (mod p). J. Reine Angew.
Math. 135 (1909), 181–188. [473]
Diestel R., Graph theory, Graduate Texts in Mathematics 173 (Springer-Verlag, 1997). Also 2000, 2006,
2010, 2016. [215, 377, 488]
Dijkstra E.W., A note on two problems in connexion with graphs. Numer. Math. 1 (1959), 269–271.
[246, 252]
Dilcher K., Some q-series identities related to divisor functions. Discr. Math. 145 (1995), 83–93. [32]
Dilworth R.P., A decomposition theorem for partially ordered sets. Ann. of Math. (2) 51 (1950), 161–166.
[546, 574, 607]
Dilworth R.P., Some combinatorial problems on partially ordered sets. In Proc. Sympos. Appl. Math. 10
(Amer. Math. Soc., 1960), 85–90. [606]
Dinitz J.H. and D.R. Stinson, A brief introduction to design theory. In Contemporary design theory,
Wiley-Intersci. Ser. Discr. Math. Optim. (Wiley, 1992), 1–12. [609]
Dirac G.A., On the Colouring of Graphs: Combinatorial Topology of Linear Complexes (Univ. London,
1951). Ph.D. Thesis. [349]
Dirac G.A., A property of 4-chromatic graphs and some remarks on critical graphs. J. London Math.
Soc. 27 (1952a), 85–92. [349]
Dirac G.A., Some theorems on abstract graphs. Proc. London Math. Soc. (3) 2 (1952b), 69–81.
[320, 323, 349]
Dirac G.A., The structure of -chromatic graphs. Fund. Math. 40 (1953), 42–55. [345]
Dirac G.A., A theorem of R. L. Brooks and a conjecture of H. Hadwiger. Proc. London Math. Soc. (3) 7
(1957), 161–195. [355]
Dirac G.A., In abstrakten Graphen vorhandene vollständige 4-graphen und ihre Unterteilungen. Math.
Nachr. 22 (1960), 61–85. [301, 302]
Dirac G.A., On rigid circuit graphs. Abh. Math. Sem. Univ. Hamburg 25 (1961), 71–76. [367]
Dirac G.A., Extension of Turán’s theorem on graphs. Acta Math. Acad. Sci. Hungar. 14 (1963), 417–422.
[490]
Dirac G.A., Homomorphism theorems for graphs. Math. Ann. 153 (1964), 69–80. [351, 353]
Dirac G.A., Minimally 2-connected graphs. J. Reine Angew. Math. 228 (1967), 204–216. [315, 316]
Dirac G.A., B.A. Sørensen, and B. Toft, An extremal result for graphs with an application to their colour-
ings. J. Reine Angew. Math. 268/269 (1974), 216–221. [345]
Djidjev H.N., A linear algorithm for partitioning graphs. C. R. Acad. Bulgare Sci. 35 (1982), 1053–1056.
[397]
Djidjev H.N., On the constants of separator theorems. C. R. Acad. Bulgare Sci. 40 (1987), 31–34. [397]
Djidjev H.N. and S.M. Venkatesan, Reduced constants for simple cycle graph separation. Acta Inform.
34 (1997), 231–243. [397]
Djokovic D., Problem E3465. Amer. Math. Monthly 98 (1991), 852. Solution 100 (1993), 800. [32]
Dmitriev I.G., Weakly cyclic graphs with integral chromatic spectra. Metody Diskret. Analiz. (1980), 3–
7, 100. [374]
m
Dobiński G., Summirung der Reihe ∑ nn! für m = 1 , 2 , 3 , 4 , 5 , . . .. Grunert’s Archiv 61 (1877), 333–336.
[134]
Dodgson C.L., Condensation of determinants. Proc. Roy. Soc. A 15 (1866), 150–155. [170, 178]
Dol’nikov V.L., Transversals of families of sets. In Studies in the theory of functions of several real vari-
ables (Russian) (Yaroslav. Gos. Univ., 1981), 30–36, 109. [812]
Došlić T. and D. Rautenbach, Factor-critical graphs with the minimum number of near-perfect match-
ings. Discr. Math. 338 (2015), 2318–2319. [275]
Doster D., Problem E3391. Amer. Math. Monthly 97 (1990), 528. Solution 98 (1991), 860–861. [82]
870 References
Doster D., Problem 10403. Amer. Math. Monthly 101 (1994), 792. Solution 104 (1997), 368. [91]
Doubilet P., G.C. Rota, and R.P. Stanley, On the foundations of combinatorial theory. VI. The idea of
generating function. In Proceedings of the Sixth Berkeley Symposium on Mathematical Statistics
and Probability (Univ. California, Berkeley, Calif., 1970/1971), Vol. II: Probability theory (Univ.
California Press, 1972), 267–318. [127]
Dross F., Fractional triangle decompositions in graphs with large minimum degree. SIAM J. Discr. Math.
30 (2016), 36–42. [640]
Dubhashi D.P. and A. Panconesi, Concentration of measure for the analysis of randomized algorithms
(Cambridge Univ. Press, 2009). [706, 721]
Dudek A. and P. Prałat, An alternative proof of the linearity of the size-Ramsey number of paths. Combin.
Probab. Comput. 24 (2015), 551–555. [455]
Dudek A. and J.R. Schmitt, On the size and structure of graphs with a constant number of 1-factors.
Discr. Math. 312 (2012), 1807–1811. [276]
Duffus D., H. Lefmann, and V. Rödl, Shift graphs and lower bounds on Ramsey numbers r¾ (l; r). Discr.
Math. 137 (1995), 177–187. [601]
Dujmović V., G. Joret, J. Kozik, and D.R. Wood, Nonrepetitive colouring via entropy compression. Com-
binatorica 36 (2016), 661–686. [680]
Duraj L., G. Gutowski, and J. Kozik, Chip games and paintability. Electron. J. Combin. 23 (2016), Paper
3.3, 12. [742]
Dushnik B., Concerning a certain set of arrangements. Proc. Amer. Math. Soc. 1 (1950), 788–796.
[576, 577]
Dushnik B. and E.W. Miller, Partially ordered sets. Amer. J. Math. 63 (1941), 600–610. [569, 570, 831]
Dvir Z., On the size of Kakeya sets in finite fields (to appear). [746]
Dvořák Z., K.I. Kawarabayashi, and R. Thomas, Three-coloring triangle-free planar graphs in linear
time. ACM Trans. Algorithms 7 (2011), Art. 41, 14. [414]
Dvořák Z. and L. Postle, Correspondence coloring and its application to list-coloring planar graphs with-
out cycles of lengths 4 to 8. J. Combin. Th. B 129 (2018), 38–54. [356, 414]
Dvoretzky A. and T.S. Motzkin, A problem of arrangements. Duke Math. J. 14 (1947), 305–313. [42]
Dzhumadiĺdaeva A.A., Problem 11406. Amer. Math. Monthly 116 (2009), 82. Solution 117 (2010), 935.
[115]
Dziobek O., Eine Formel der Substitutionstheorie. Sitzungsber. Berl. Math. G. 17 (1917), 64–67. [46]
Eaton N., Ramsey numbers for sparse graphs. Discr. Math. 185 (1998), 63–75. [484]
Eaton N. and D.A. Grable, Set intersection representations for almost all graphs. J. Graph Theory 23
(1996), 309–320. [745]
Eckhoff J. and G. Wegner, Über einen Satz von Kruskal. Period. Math. Hungar. 6 (1975), 137–142.
[496]
Edelman P. and C. Greene, Balanced tableaux. Adv. in Math. 63 (1987), 42–99. [208]
Edmonds J., Existence of ¾ -edge connected ordinary graphs with prescribed degrees. J. Res. Nat. Bur.
Standards Sect. B 68B (1964), 73–74. [297]
Edmonds J., Minimum partition of a matroid into independent subsets. J. Res. Nat. Bur. Standards Sect.
B 69B (1965a), 67–72. [251, 520, 535]
Edmonds J., Lehman’s switching game and a theorem of Tutte and Nash-Williams. J. Res. Nat. Bur.
Standards Sect. B 69B (1965b), 73–77. [251, 520, 535]
Edmonds J., Paths, trees, and flowers. Canad. J. Math. 17 (1965c), 449–467. [264, 275, 278]
Edmonds J., Maximum matchings and a polyhedron with 0,1-vertices. J. Res. Nat. Bur. Standards 69B
(1965d), 125–130. [278, 282]
Edmonds J., Submodular functions, matroids and certain polyhedra. In Combinatorial Structures and
Their Applications (Calgary, 1969) (Gordon and Breach, 1970), 69–87. [529]
Edmonds J., Matroid intersection. In Discrete Optimization I (P.L. Hammer, E.L. Johnson, and B.H.
Korte, eds.), Ann. Discr. Math. 4 (1979), 39–49. [532]
Edmonds J. and D.R. Fulkerson, Transversals and matroid partition. J. Res. Nat. Bur. Standards Sect.
B 69B (1965), 147–153. [517, 533]
References 871
Edwards K., D.P. Sanders, P. Seymour, and R. Thomas, Three-edge-colouring doublecross cubic graphs.
J. Combin. Th. B 119 (2016), 66–95. [416]
Egawa Y., H. Matsuda, T. Yamashita, and K. Yoshimoto, On a spanning tree with specified leaves. Graphs
Combin. 24 (2008), 13–18. [327]
Eğecioğlu Ö. and J.B. Remmel, Bijections for Cayley trees, spanning trees, and their q-analogues. J.
Combin. Th. A 42 (1986), 15–30. [36]
Egerváry E., On combinatorial properties of matrices (Hungarian with German summary). Mat. Lapok
38 (1931), 16–28. [258, 530]
Eggleston H.G., Covering a three-dimensional set with sets of smaller diameter. J. London Math. Soc.
30 (1955), 11–24. [817]
Egorychev G.P., The solution of van der Waerden’s problem for permanents. Adv. in Math. 42 (1981),
299–305. [256, 765]
Eitner P.G., The bandwidth of the complete multipartite graph (1979). Presentation at Toledo Sympo-
sium on Applications of Graph Theory. [818]
Eliahou S. and M. Kervaire, Sumsets in vector spaces over finite fields. J. Number Theory 71 (1998), 12–
39. [745]
Elkies N., G. Kuperberg, M. Larsen, and J.G. Propp, Alternating-sign matrices and domino tilings. I. J.
Algebraic Combin. 1 (1992), 111–132. [34]
Ellingham M. and P. Salehi Nowbandegani, The Chvátal–Erdős condition for prism-Hamiltonicity
(2018). Unpublished preprint. [334]
Ellingham M.N., Spanning paths, cycles, trees and walks for graphs on surfaces. Congr. Numer. 115
(1996), 55–90. [326]
Ellingham M.N. and J.D. Horton, Non-Hamiltonian 3-connected cubic bipartite graphs. J. Combin. Th.
B 34 (1983), 350–353. [330]
Ellingham M.N. and X. Zha, Toughness, trees, and walks. J. Graph Th. 33 (2000), 125–137. [327]
Ellis D., Y. Filmus, and E. Friedgut, Triangle-intersecting families of graphs. J. Eur. Math. Soc. (JEMS)
14 (2012), 841–885. [509]
Enchev O., Problem 10390. Amer. Math. Monthly 101 (1994), 574. Solution 104 (1997), 367–368. [261]
Engel A., Problem-Solving Strategies (Springer, 1998). [226]
Engel K., Sperner theory, Encyclopedia of Mathematics and its Applications 65 (Cambridge Univ. Press,
1997). [493, 496, 511]
Enomoto H., B. Jackson, P. Katerinis, and A. Saito, Toughness and the existence of ¾ -factors. J. Graph
Th. 9 (1985), 87–95. [318]
Enomoto H., K. Ohba, K. Ota, and J. Sakamoto, Choice number of some complete multi-partite graphs.
Discr. Math. 244 (2002), 55–66. [355]
Enomoto H. and B. Péroche, The linear arboricity of some regular graphs. J. Graph Theory 8 (1984),
309–324. [412]
Entringer R.C., A short proof of Rubin’s block theorem. In Cycles in graphs (Burnaby, B.C., 1982), North-
Holland Math. Stud. 115 (North-Holland, 1985), 367–368. [347]
Entringer R.C. and E.F. Schmeichel, Edge conditions and cycle structure in bipartite graphs. Ars Com-
bin. 26 (1988), 229–232. [330]
Erdős P., Problem 3739. Amer. Math. Monthly 42 (1935), 396. Solution 44 (1937), 120. [426]
Erdős P., On a lemma of Littlewood and Offord. Bull. Amer. Math. Soc. 51 (1945), 898–902. [561]
Erdős P., On sets of distances of n points. Amer. Math. Monthly 53 (1946), 248–250. [793]
Erdős P., Some remarks on the theory of graphs. Bull. Amer. Math. Soc. 53 (1947), 292–294. [450, 658]
Erdős P., Some remarks on set theory. Proc. Amer. Math. Soc. 1 (1950), 127–141. [468]
Erdős P., Some theorems on graphs. Riveon Lematematika 9 (1955), 13–17. [478]
Erdős P., Graph theory and probability. Can. J. Math. 11 (1959), 34–38. [434, 671]
Erdős P., Graph theory and probability, II. Canad. J. Math. 13 (1961), 346–352. [341, 664, 682]
Erdős P., Remarks on a paper of Pósa. Magyar Tud. Akad. Mat. Kut. Int. Közl. 7 (1962a), 227–229.
[332]
872 References
Erdős P., On the number of complete subgraphs contained in certain graphs. Magy. Tud. Akad. Mat.
Kutató Int. Közl. 7 (1962b), 459–464. [476, 478]
Erdős P., On a combinatorial problem. Nord. Mat. Tidskr. 11 (1963), 5–10. [659, 703]
Erdős P., Extremal problems in graph theory. In Theory of Graphs and Its Applications (Academic Press,
1964), 29–36. [489, 659]
Erdős P., Extremal problems in number theory. In Proc. Sympos. Pure Math., Vol. VIII (AMS, 1965),
181–189. [669]
Erdős P., Problem 2. In Theory of Graphs (Tihany, 1966) (P. Erdős and G. Katona, eds.) (Academic Press,
1968). [354]
Erdős P., On the graph theorem of Turán. Mat. Lapok 21 (1970), 249–251 (1971). [223]
Erdős P., Problems and results on finite and infinite combinatorial analysis. In Infinite and finite sets
(Colloq., Keszthely, 1973), I, Colloq. Math. Soc. János Bolyai 10 (North-Holland, 1975), 403–424.
[504]
Erdős P., Problems and results in graph theory and combinatorial analysis. In Proceedings of the Fifth
British Combinatorial Conference (Aberdeen, 1975), Congr. Numer. 15 (Utilitas Math., 1976),
169–192. [438]
Erdős P., Problem E3284. Amer. Math. Monthly 95 (1988a), 762. Solution 97 (1990), 248–249. [490]
Erdős P., Problem E3255. Amer. Math. Monthly 95 (1988b), 259. Solution 97 (1990), 848–849. [490]
Erdős P., Some of my favourite unsolved problems. In A tribute to Paul Erdős (Cambridge Univ. Press,
1990), 467–478. [497]
Erdős P. and S. Fajtlowicz, On the conjecture of Hajós. Combinatorica 1 (1981), 141–143. [709]
Erdős P., R.J. Faudree, C.C. Rousseau, and R.H. Schelp, The size Ramsey number. Period. Math. Hungar.
9 (1978), 145–161. [455]
Erdős P., Z. Füredi, R.J. Gould, and D.S. Gunderson, Extremal graphs for intersecting triangles. J.
Combin. Th. B 64 (1995), 89–100. [491]
Erdős P. and T. Gallai, On maximal paths and circuits of graphs. Acta Math. Acad. Sci. Hung. 10 (1959),
337–356. [322, 334, 460]
Erdős P. and T. Gallai, Graphs with prescribed degrees of vertices (Hungarian). Mat. Lapok 11 (1960),
264–274. [269, 276]
Erdős P. and T. Gallai, On the minimal number of vertices representing the edges of a graph. Publ. Math.
Inst. Hung. Acad. Sci. 6 (1961), 181–203. [273, 354]
Erdős P., A. Ginzburg, and A. Ziv, Theorem in the additive number theory. Bull. Res. Council Israel 10
(1961). [764]
Erdős P., A.W. Goodman, and L. Pósa, The representation of graphs by set intersections. Canad. J. Math.
18 (1966), 106–112. [238]
Erdős P., R.L. Graham, and E. Szemeredi, On sparse graphs with dense long paths. In Computers and
mathematics with applications (Pergamon, 1976), 365–369. [394]
Erdős P. and R.K. Guy, Crossing number problems. Amer. Math. Monthly 80 (1973), 52–58. [793, 798]
Erdős P. and A. Gyárfás, A variant of the classical Ramsey problem. Combinatorica 17 (1997), 459–467.
[686]
Erdős P. and A. Hajnal, On chromatic numbers of graphs and set systems. Acta Math. Acad. Sci. Hung.
17 (1966), 61–99. [343]
Erdős P., A. Hajnal, and J.W. Moon, A problem in graph theory. Amer. Math. Monthly 71 (1964), 1107–
1110. [491]
Erdős P. and H. Heilbronn, On the addition of residue classes mod p. Acta Arith. 9 (1964), 149–159.
[734]
Erdős P., M. Herzog, and J. Schönheim, An extremal problem on the set of noncoprime divisors of a
number. Israel J. Math. 8 (1970), 408–412. [512]
Erdős P., C. Ko, and R. Rado, Intersection theorems for systems of finite sets. Quart. J. Math. Oxford (2)
12 (1961), 313–320. [498]
Erdős P. and J. Komlós, On a problem of Moser. In Combinatorial theory and its applications, I (Proc.
Colloq., Balatonfüred, 1969) (North-Holland, 1970), 365–367. [551]
References 873
Erdős P. and L. Lovász, Problems and results on 3-chromatic hypergraphs and some related questions.
In Infinite and finite sets (Colloq., Keszthely, 1973), II, Colloq. Math. Soc. János Bolyai 10 (North-
Holland, 1975), 609–627. [675, 679]
Erdős P. and J.W. Moon, On sets of consistent arcs in a tournament. Canad. Math. Bull. 8 (1965), 269–
271. [721]
Erdős P. and L. Pósa, On the maximal number of disjoint circuits of a graph. Publ. Math. Debrecen 9
(1962), 3–12. [273, 490]
Erdős P. and R. Rado, A combinatorial theorem. J. London Math. Soc. 25 (1950), 249–255. [470]
Erdős P. and R. Rado, Combinatorial theorems on classifications of subsets of a given set. Proc. London
Math. Soc. (3) 2 (1952), 417–439. [451, 608]
Erdős P. and R. Rado, A partition calculus in set theory. Bull. Amer. Math. Soc. 62 (1956), 427–489.
[456]
Erdős P. and R. Rado, Intersection theorems for systems of sets. J. London Math. Soc. 35 (1960), 85–90.
[503, 504]
Erdős P. and A. Rényi, On random graphs, I. Publ. Math. Debrecen 6 (1959), 290–297. [687, 698]
Erdős P. and A. Rényi, On a problem in the theory of graphs. Magyar Tud. Akad. Mat. Kutató Int. Közl.
7 (1962), 623–641. [252]
Erdős P. and A. Rényi, On two problems of information theory. Magyar Tud. Akad. Mat. Kutató Int. Közl.
8 (1963), 229–243. [513]
Erdős P. and A. Rényi, On the existence of a factor of degree one of a connected random graph. Acta
Math. Acad. Sci. Hung. 17 (1966), 359–368. [699]
Erdős P., A. Rényi, and V.T. Sós, On a problem of graph theory. Studia Sci. Math. Hungar. 1 (1966), 215–
235. [244, 632]
Erdős P., A.L. Rubin, and H. Taylor, Choosability in graphs. In Proc. West Coast Conf. Combin. Graph Th.
Comput. (Arcata), Congr. Numer. 26 (Utilitas Math., 1979), 125–157. [346, 348, 356, 660, 667]
Erdős P. and H. Sachs, Reguläre Graphen gegebener Taillenweite mit minimaler Knotenzahl. Wiss. Z.
Martin-Luther-Univ. Halle-Wittenberg Math.-Natur. Reihe 12 (1963), 251–257. [219, 251, 274]
Erdős P. and S. Shelah, Separability properties of almost-disjoint families of sets. Israel J. Math. 12
(1972), 207–214. [551]
Erdős P. and M. Simonovits, A limit theorem in graph theory. Studia Sci. Math. Hungar. 1 (1966), 51–
57. [479]
Erdős P., M. Simonovits, and V.T. Sós, Anti-Ramsey theorems 10 (1975), 633–643. Colloq. Math. Soc.
János Bolyai. [457]
Erdős P. and J. Spencer, Probabilistic methods in combinatorics (Academic Press, 1974). [702]
Erdős P. and A.H. Stone, On the structure of linear graphs. Bull. Amer. Math. Soc. 52 (1946), 1087–1091.
[479, 491]
Erdős P. and G. Szekeres, A combinatorial problem in geometry. Composito Math 2 (1935), 464–470.
[344, 430, 446]
Erdős P. and G. Szekeres, On some extremum problems in elementary geometry. Ann. Univ. Sci. Bu-
dapest. Eötvös Sect. Math. 3–4 (1960/1961), 53–62. [446, 458]
Erdős P. and E. Szemerédi, Combinatorial properties of systems of sets. J. Combin. Th. A 24 (1978),
308–313. [504]
Erdős P. and P. Turán, On Some Sequences of Integers. J. London Math. Soc. S1-11 (1936), 261. [484]
Erdős P. and D.B. West, A note on the interval number of a graph. Discr. Math. 55 (1985), 129–133.
[705]
Erdős P. and R.J. Wilson, On the chromatic index of almost all graphs. J. Combin. Th. B 23 (1977), 255–
257. [699]
Erdős P.L. and L.A. Székely, Applications of antilexicographic order. I. An enumerative theory of trees.
Adv. in Appl. Math. 10 (1989), 488–496. [47, 135]
Eršov A.P. and G.I. Kožuhin, Estimates of the chromatic number of connected graphs (Russian). Dokl.
Akad. Nauk. SSSR 142 (1962), 270–273. [353]
874 References
Esperet L., F. Kardoš, A.D. King, D. Král’, and S. Norine, Exponentially many perfect matchings in cubic
graphs. Adv. Math. 227 (2011), 1646–1664. [765]
Esperet L. and A. Parreau, Acyclic edge-coloring using entropy compression. European J. Combin. 34
(2013), 1019–1027. [680]
Etienne G., Tableaux de Young et solitaire bulgare. J. Combin. Th. A 58 (1991), 181–197. [144, 152]
Euler L., Solutio problematis ad geometriam situs pertinentis (Latin). Comment. Acad. Sci. U. Petrop 8
(1736), 128–140. [234]
Euler L., Introductio in analysin infinitorum (Latin) (Culture et civilisation (Bruxelles), 1748). Reprinted
in 2000 (Sociedad Andaluza de Educación Matemática “Thales”). [141, 148, 151]
Euler L., Demonstratio nonnullarum insignium proprietatum, quibus solida hedris planis inclusa sunt
praedita (Latin). Novi Commentarii acad. sci. Petropolitanae 4 (1758), 140–160. [383]
Evans A.B., G. Isaak, and D.A. Narayan, Representations of graphs modulo n. Discr. Math. 223 (2000),
109–123. [624]
Everman D., A.E. Danese, and K. Venkannayah, Problem e1396. Amer. Math. Monthly 67 (1960), 63–64.
Solution 67 (1960), 694. [61]
Faà di Bruno F., Sullo sviluppo delle funzioni (Italian). Ann. di Sci. Math. e Fisiche 6 (1855), 479–480.
[127]
Faà di Bruno F., Note sur une nouvelle formule de dalcul differentiel (French). Quart. J. Pure and Appl.
Math. 1 (1857), 359–360. [127]
Faigle U., Matroids in combinatorial optimization. In Combinatorial Geometries (N. White, ed.) (Cam-
bridge Univ. Press, 1987), 161–210. [532]
Falgas-Ravry V. and E.R. Vaughan, Applications of the semi-definite method to the Turán density prob-
lem for 3-graphs. Combin. Probab. Comput. 22 (2013), 21–54. [475]
Falikman D.I., Proof of the van der Waerden conjecture on the permanent of a doubly stochastic matrix.
Mat. Zametki 29 (1981), 931–938, 957. [256, 765]
Fan G., New sufficient conditions for cycles in graphs. J. Combin. Th. B 37 (1984), 221–227. [324–326]
Farber M. and R.E. Jamison, Convexity in graphs and hypergraphs. SIAM J. Algeb. Disc. Meth. 7 (1986),
433–444. [374]
Faria L., C.M.H. de Figueiredo, O. Sýkora, and I. Vrt’o, An improved upper bound on the crossing number
of the hypercube. J. Graph Theory 59 (2008), 145–161. [798]
Fáry I., On the straight line representations of planar graphs. Acta Sci. Math. 11 (1948), 229–233.
[393]
Farzad B., M. Mahdian, E.S. Mahmoodian, A. Saberi, and B. Sadri, Forced orientation of graphs. Bull.
Iranian Math. Soc. 32 (2006), 79–89, 98. [237]
Fasenmyer M.C., Some Generalized Hypergeometric Polynomials (ProQuest, 1946). Ph.D. Thesis, Univ.
Michigan. [90]
Faudree R.J., Forbidden subgraphs and Hamiltonian properties: a survey. Congr. Numer. 116 (1996),
33–52. [316]
Faudree R.J., Survey of results on ¾ -ordered graphs. Discr. Math. 229 (2001), 73–87. [316]
Faudree R.J., R.J. Gould, M.S. Jacobson, and L.M. Lesniak, Neighborhood unions and a generalization
of Dirac’s theorem. Discr. Math. 105 (1992), 61–71. [327]
Faudree R.J., R.J. Gould, M.S. Jacobson, and R.H. Schelp, Neighborhood unions and Hamiltonian prop-
erties in graphs. J. Combin. Th. B 47 (1989), 1–9. [327]
Faudree R.J., A. Gyárfás, R.H. Schelp, and Z. Tuza, Induced matchings in bipartite graphs. Discr. Math.
78 (1989), 83–87. [262]
Faudree R.J. and R.H. Schelp, Various length paths in graphs. In Theory and applications of graphs
(Proc. Internat. Conf., Western Mich. Univ., Kalamazoo, Mich., 1976), Lecture Notes in Math. 642
(Springer, 1978), 160–173. [454]
Faudree R.J. and R.H. Schelp, A survey of results on the size Ramsey number. In Paul Erdős and his
mathematics, II (Budapest, 1999), Bolyai Soc. Math. Stud. 11 (János Bolyai Math. Soc., 2002),
291–309. [455]
References 875
Favaron O., F. Genest, and M. Kouider, Regular path decompositions of odd regular graphs. J. Graph
Theory 63 (2010), 114–128. [273]
Feige U., M.M. Halldórsson, G. Kortsarz, and A. Srinivasan, Approximating the domatic number. SIAM
J. Comput. 32 (2002), 172–195. [684]
Feller W., An introduction to probability theory and its applications, I, Third edition (Wiley & Sons,
1968). [40, 668]
Felsner S., Convex drawings of planar graphs and the order dimension of 3-polytopes. Order 18 (2001),
19–37. [784]
Felsner S., Geodesic embeddings and planar graphs. Order 20 (2003), 135–150. [790]
Felsner S., Geometric graphs and arrangements, Advanced Lectures in Mathematics (Friedr. Vieweg &
Sohn, 2004). [783]
Felsner S., The order dimension of planar maps revisited. SIAM J. Discr. Math. 28 (2014), 1093–1101.
[790]
Felsner S., P.C. Fishburn, and W.T. Trotter, Finite three-dimensional partial orders which are not sphere
orders. Discr. Math. 201 (1999), 101–132. [828]
Felsner S., C.M. Li, and W.T. Trotter, Adjacency posets of planar graphs. Discr. Math. 310 (2010), 1097–
1104. [790]
Felsner S. and W.T. Trotter, Balancing pairs in partially ordered sets. In Combinatorics, Paul Erdős is
eighty, Vol. 1, Bolyai Soc. Math. Stud. (János Bolyai Math. Soc., 1993), 145–157. [823]
Feng W., Bounds on maximum b-matchings. Discr. Math. 309 (2009), 4162–4165. [286]
Ferguson T. and C. Melolidakis, Problem E3061. Amer. Math. Monthly 91 (1984), 580. Solution 94 (1987),
189. [669]
Fiedler M., Algebraic connectivity of graphs. Czech. Math. J. 23 (1973), 298–305. [778]
Fielder D.C., Fibonacci numbers in tree counts for sector and related graphs. Fibonacci Quart. 12 (1974),
355–359. [65]
Figaj A. and T. Łuczak, The Ramsey number for a triple of long even cycles. J. Combin. Th. B 97 (2007),
584–596. [492]
Finck H.-J., On the chromatic numbers of a graph and its complement. In Theory of Graphs (Tihany,
1966) (P. Erdős and G. Katona, eds.) (Academic Press, 1968), 99–113. [344]
Finck H.-J. and H. Sachs, Über eine von H. S. Wilf angegebene Schranke für die chromatische Zahl
endlicher Graphen. Math. Nachr. 39 (1969), 373–386. [338]
Fink J., Perfect matchings extend to Hamilton cycles in hypercubes. J. Combin. Th. B 97 (2007), 1074–
1076. [330]
Fink J., Matching graphs of hypercubes and complete bipartite graphs. European J. Combin. 30 (2009),
1624–1629. [330]
Fiorini S., Some remarks on a paper by Vizing on critical graphs (“Critical graphs with a given chro-
matic class” (Russian), Diskret. Analiz. No. 5 (1965), 9-17). Math. Proc. Cambridge Philos. Soc.
77 (1975), 475–483. [414]
Fiorini S. and R.J. Wilson, Edge-colourings of graphs (Pitman; distrib. Fearon-Pitman, 1977). [361]
Firke F.A., P.M. Kosek, E.D. Nash, and J. Williford, Extremal graphs without 4-cycles. J. Combin. Th.
B 103 (2013), 327–336. [630]
Fishburn P. and B. Monjardet, Norbert Wiener on the theory of measurement (1914, 1915, 1921). J.
Math. Psych. 36 (1992), 165–184. [586]
Fishburn P.C., Intransitive indifference with unequal indifference intervals. J. Mathematical Psychology
7 (1970), 144–149. [586]
Fishburn P.C., Interval lengths for interval orders: a minimization problem. Discr. Math. 47 (1983), 63–
82. [604]
Fishburn P.C., A correlational inequality for linear extensions of a poset. Order 1 (1984a), 127–137.
[600]
Fishburn P.C., Numbers of lengths for representations of interval orders. In Progress in combinatorial
optimization (Waterloo, 1982) (Academic Press, 1984b), 131–146. [587]
876 References
Fishburn P.C., Interval orders and interval graphs, Wiley-Interscience Series in Discr. Mathematics (Wi-
ley & Sons, 1985). [587]
Fishburn P.C. and R.L. Graham, Classes of interval graphs under expanding length restrictions. J.
Graph Theory 9 (1985), 459–472. [604]
Fishburn P.C. and W.T. Trotter, Angle orders. Order 1 (1985), 333–343. [828, 832]
Fisher D.C., K.L. Collins, and L.B. Krompart, Problem 10406. Amer. Math. Monthly 101 (1994), 793.
Solution 104 (1997), 572–573. [418]
Fisher D.C., K. Fraughnaugh, L. Langley, and D.B. West, The number of dependent arcs in an acyclic
orientation. J. Combin. Th. B 71 (1997), 73–78. [550]
Fisher R.A., An examination of the different possible solutions of a problem in incomplete blocks. Ann.
Eugenics 10 (1940), 52–75. [614]
Fisk S., A short proof of Chvátal’s watchman theorem. J. Combin. Th. B 24 (1978), 374. [419]
Fiz Pontiveros G., S. Griffiths, and R. Morris, The triangle-free process and r(3 , ¾) (2013).
(arXiv:1302.6279). [682]
Fleischner H., The square of every two-connected graph is hamiltonian. J. Combin. Th. B 16 (1974), 29–
34. [331]
Fleischner H., Eulerian graphs. In Selected Topics in Graph Theory, 2 (L.W. Beineke and R.J. Wilson,
eds.) (Academic Press, 1983), 17–54. [763]
Fleischner H. and M. Stiebitz, A solution to a colouring problem of P. Erdős. Discr. Math. 101 (1992),
39–48. [739]
Floyd R.W., Problem E3399. Amer. Math. Monthly 97 (1990), 611–612. [257]
Foata D. and J. Riordan, Mappings of acyclic and parking functions. Aequationes Math. 10 (1974), 10–
22. [50]
Foata D. and M.P. Schützenberger, Théorie géométrique des polynômes eulériens, Lecture Notes in Math-
ematics, Vol. 138 (Springer-Verlag, 1970). [99, 101, 106, 127, 177]
Folkman J., Graphs with monochromatic complete subgraphs in every edge coloring. SIAM J. Appl.
Math. 18 (1970), 19–24. [455, 466]
Fon-Der-Flaass D.G., New prolific constructions of strongly regular graphs. Adv. Geom. 2 (2002), 301–
306. [649, 782]
Ford G.W. and G.E. Uhlenbeck, Combinatorial problems in the theory of graphs. I and III. Proc. Nat.
Acad. Sci. U.S.A. 42 (1956), 122–128, 529–535. [135]
Ford K., Problem 10383. Amer. Math. Monthly 101 (1994), 473. Solution 104 (1997), 457. [669]
Ford L.R., Jr. and D.R. Fulkerson, Maximal flow through a network. Canad. J. Math. 8 (1956), 399–404.
[300]
Ford L.R., Jr. and D.R. Fulkerson, Network flows and systems of representatives. Canad. J. Math. 10
(1958), 78–85. [302, 531]
Fortuin C.M., P.W. Kasteleyn, and J. Ginibre, Correlation inequalities on some partially ordered sets.
Comm. Math. Phys. 22 (1971), 89–103. [596]
Foulkes H.O., Enumeration of permutations with prescribed up-down and inversion sequences. Discr.
Math. 15 (1976), 235–252. [197]
Fouquet J.L. and J.-L. Jolivet, In “problémes”. In Problémes combinatoires et théorie des graphes (Orsay,
1976), Colloq. Internat. CNRS, 260 (1978), 437–443. [334]
Fournier J.-C., Colorations des arêtes d’un graphe. In Colloque Théorie des Graphes (Bruxelles, 1973),
Cahiers Ctr. Étud. Rech. Opér 15 (1973), 311–314. [372]
Fox J., A new proof of the graph removal lemma. Ann. of Math. (2) 174 (2011), 561–579. [485]
Fox J., C. Lee, and B. Sudakov, Maximum union-free subfamilies. Israel J. Math. 191 (2012), 959–971.
[551]
Fox J., J. Pach, B. Sudakov, and A. Suk, Erdős–Szekeres-type theorems for monotone paths and convex
bodies. Proc. Lond. Math. Soc. (3) 105 (2012), 953–982. [457, 601]
Fox J. and B. Sudakov, Density theorems for bipartite graphs and related Ramsey-type results. Combi-
natorica 29 (2009), 153–196. [673, 684]
References 877
Fox J. and B. Sudakov, Dependent random choice. Random Structures Algorithms 38 (2011), 68–99.
[672, 673, 684]
Frame J.S., G.de B. Robinson, and R.M. Thrall, The hook graphs of the symmetric groups. Canadian J.
Math. 6 (1954), 316–324. [190]
Frank A., On the orientation of graphs. J. Combin. Th. B 28 (1980a), 251–261. [310]
Frank A., On chain and antichain families of a partially ordered set. J. Combin. Th. B 29 (1980b), 176–
184. [548]
Frank A., Applications of submodular functions. In Surveys in Combinatorics, 1993 (K. Walker, ed.),
Lond. Math. Soc. Lect. Notes 187 (Cambridge Univ. Press, 1993), 85–136. [307, 310]
Frank A. and E. Tardos, Matroids from crossing families. In Finite and infinite sets (Eger, 1981), I–II,
Colloq. Math. Soc. János Bolyai 37 (North-Holland, 1984), 295–304. [310]
Frankl P., Families of finite sets satisfying an intersection condition. Bull. Austral. Math. Soc. 15 (1976),
73–79. [500]
Frankl P., A constructive lower bound for some Ramsey numbers. Ars Combinatoria 3 (1977), 297–302.
[728]
Frankl P., The Erdős–Ko–Rado theorem is true for n = c¾ t. In Combinatorics (Proc. 5th Hung. Colloq.,
Keszthely, 1976), I, Colloq. Math. Soc. János Bolyai 18 (North-Holland, 1978), 365–375.
[500, 511]
Frankl P., A new short proof for the Kruskal–Katona theorem. Discr. Math. 48 (1984), 327–329.
[495, 496, 510]
Frankl P., The shifting technique in extremal set theory. In Surveys in combinatorics 1987 (New Cross,
1987), London Math. Soc. Lecture Note Ser. 123 (Cambridge Univ. Press, 1987), 81–110.
[493, 499]
Frankl P., Constructive Ramsey bounds and intersection theorems for sets. In Mathematics of Ramsey
theory, Algorithms Combin. 5 (Springer, 1990), 53–56. [450]
Frankl P., Extremal set systems. In Handbook of combinatorics, Vol. 1, 2 (Elsevier Sci. B. V., Amsterdam,
1995), 1293–1329. [497]
Frankl P. and M. Deza, On the maximum number of permutations with given maximal or minimal
distance. J. Combin. Th. A 22 (1977), 352–360. [510]
Frankl P. and Z. Füredi, Families of finite sets with missing intersections. In Finite and infinite sets
(Eger, 1981), I–II, Colloq. Math. Soc. János Bolyai 37 (North-Holland, 1984), 305–318. [730]
Frankl P. and Z. Füredi, A new short proof of the EKR theorem. J. Combin. Th. A 119 (2012), 1388–
1390. [500]
Frankl P. and R.L. Graham, Old and new proofs of the Erdős–Ko–Rado theorem. Sichuan Daxue Xuebao
26 (1989), 112–122. [500]
Frankl P. and V. Rödl, Extremal problems on set systems. Random Structures Algorithms 20 (2002),
131–164. [488]
Frankl P. and N. Tokushige, Invitation to intersection problems for finite sets. J. Combin. Th. A 144
(2016), 157–211. [493]
Frankl P. and R.M. Wilson, Intersection theorems with geometric consequences. Combinatorica 1 (1981),
357–368. [459, 727–729]
Franklin F., On Newton’s Method of Approximation. Amer. J. Math. 4 (1881), 275–276. [151]
Franklin P., The Four Color Problem. Amer. J. Math. 44 (1922), 225–236. [406]
Franzblau D.S. and D. Zeilberger, A bijective proof of the hook-length formula. J. Algorithms 3 (1982),
317–343. [192]
Fraughnaugh (Jones) K., Minimum independence graphs with maximum degree four. In Graphs and
applications (Boulder, 1982), Wiley-Intersci. Publ. (Wiley, 1985), 221–230. [420]
Fredman M.L., How good is the information theory bound in sorting? Theoret. Comput. Sci. 1 (1976),
355–361. [823]
Fredman M.L. and D.E. Knuth, Recurrence relations based on minimization. J. Math. Anal. Appl. 48
(1974), 534–559. [92]
878 References
Freund R.M. and M.J. Todd, A constructive proof of Tucker’s combinatorial lemma. J. Combin. Th. A 30
(1981), 321–325. [807, 809]
Friedgut E. and J. Kahn, On the number of copies of one hypergraph in another. Israel J. Math. 105
(1998), 251–256. [510]
Friedgut E., J. Kahn, G. Kalai, and N. Keller, Chvátal’s conjecture and correlation inequalities. J. Com-
bin. Th. A 156 (2018), 22–43. [503]
Frieze A., On the length of the longest monotone subsequence in a random permutation. Ann. Appl.
Probab. 1 (1991), 301–305. [722]
Frieze A. and M. Karoński, Introduction to Random Graphs (Cambridge, 2016). [657]
Fritsch R. and G. Fritsch, The Four-Color Theorem (Springer, 1998). (published in German by F.A. Brock-
haus, 1994). [399]
Frobenius G., Ueber die Congruenz nach einem aus zwei endlichen Gruppen gebildeten Doppelmodul.
J. Reine Angew. Math. 101 (1887), 273–299. [181]
Frobenius G., über die Charaktere der symmetriscen Gruppe (German). Sitzungberichte der Königlich
Preussischen Akademie der Wissenschaften zu Berlin (1900), 516–534. [189, 190, 207]
Frobenius G., Über zerlegbare Determinanten. Sitzungsber. König. Preuss. Adad. Wiss. XVIII (1917),
274–277. [256]
Fronček D., Locally linear graphs. Math. Slovaca 39 (1989), 3–6. [684]
Fujita S., C. Magnant, and K. Ozeki, Rainbow generalizations of Ramsey theory: a survey. Graphs Com-
bin. 26 (2010), 1–30. [457]
Fulkerson D.R., Note on Dilworth’s decomposition theorem for partially ordered sets. Proc. Amer. Math.
Soc. 7 (1956), 701–702. [547]
Fulkerson D.R. and O.A. Gross, Incidence matrices and interval graphs. Pac. J. Math. 15 (1965), 835–
855. [370]
Fulkerson D.R., A.J. Hoffman, and M.H. McAndrew, Some properties of graphs with multiple edges.
Canad. J. Math. 17 (1965), 166–177. [222]
Fulton W., Young tableaux, London Mathematical Society Student Texts 35 (Cambridge Univ. Press,
1997). [189]
Füredi Z., Graphs without quadrilaterals. J. Combin. Th. B 34 (1983), 187–190. [630]
Füredi Z., Turán type problems. In Surveys in combinatorics, 1991 (Guildford, 1991), London Math. Soc.
Lecture Note Ser. 166 (Cambridge Univ. Press, 1991), 253–300. [475, 672]
Füredi Z., The order dimension of two levels of the Boolean lattice. Order 11 (1994), 15–28.
[582, 584, 819]
Füredi Z., On the number of edges of quadrilateral-free graphs. J. Combin. Th. B 68 (1996a), 1–6.
[630]
Füredi Z., New asymptotics for bipartite Turán numbers. J. Combin. Th. A 75 (1996b), 141–144. [633]
Füredi Z., An upper bound on Zarankiewicz’ problem. Combin. Probab. Comput. 5 (1996c), 29–33.
[632, 639]
Füredi Z., A proof on the stability of extremal graphs, Workshop on Extremal Graphs and Hypergraphs
(Carnegie-Mellon) (2007). [491]
Füredi Z., A proof of the stability of extremal graphs, Simonovits’ stability from Szemerédi’s regularity.
J. Combin. Th. B 115 (2015), 66–71. [228]
Füredi Z., J.R. Griggs, and D.J. Kleitman, A minimal cutset of the Boolean lattice with almost all mem-
bers. Graphs Combin. 5 (1989), 327–332. [550]
Füredi Z. and D.S. Gunderson, Extremal numbers for odd cycles. Combin. Probab. Comput. 24 (2015),
641–645. [479]
Füredi Z. and P. Hajnal, Davenport–Schinzel theory of matrices. Discr. Math. 103 (1992), 233–251.
[432, 442]
Füredi Z., P. Hajnal, V. Rödl, and W.T. Trotter, Interval orders and shift graphs. In Sets, graphs and
numbers (Budapest, 1991), Colloq. Math. Soc. János Bolyai 60 (North-Holland, 1992), 297–313.
[581, 604]
References 879
Füredi Z. and J. Kahn, On the dimensions of ordered sets of bounded degree. Order 3 (1986), 15–20.
[576, 578]
Füredi Z. and G.O.H. Katona, 2-Bases of quadruples. Combin. Probab. Comput. 15 (2006), 131–141.
[490]
Füredi Z., A.V. Kostochka, R. Škrekovski, M. Stiebitz, and D.B. West, Nordhaus–Gaddum-type theorems
for decompositions into many parts. J. Graph Theory 50 (2005), 273–292. [239, 639]
Füredi Z. and M. Simonovits, The history of degenerate (bipartite) extremal graph problems. In Erdős
centennial, Bolyai Soc. Math. Stud. 25 (János Bolyai Math. Soc., 2013), 169–264. [479]
Fuss N., Solutio quaestionis, quot modis polygonum n laterum in polygona m laterum, per diagonales
resolvi queat. Nova Acta Academiae Sci. Petropolitanae 9 (1791), 243–251. [42]
Gabber O. and Z. Galil, Explicit construction of linear-sized superconcentrators. J. Comput. Systems Sci.
22 (1981), 407–420. [779]
Gabow H.N., An efficient implementation of Edmonds’ algorithm for maximum matchings on graphs. J.
Assoc. Comput. Mach. 23 (1975), 221–234. [282]
Gabow H.N., Data structures for weighted matching and nearest common ancestors with linking. In
Proc. 1st ACM-SIAM Symp. Disc. Algs (San Francisco) (SIAM, 1990), 434–443. [282]
Gabow H.N., Z. Galil, T. Spencer, and R.E. Tarjan, Efficient algorithms for finding minimum spanning
trees in undirected and directed graphs. Combinatorica 6 (1986), 109–122. [246]
Gabow H.N. and R.E. Tarjan, Faster scaling algorithms for general graph matching problems. Tech.
Rep. CU-CS-432-89, Dept. Comp. Sci., Univ. Colorado–Boulder (1989). [282]
Gale D., Neighboring vertices on a convex polyhedron. In Linear inequalities and related system, Annals
of Mathematics Studies, no. 38 (Princeton Univ. Press, 1956), 255–263. [813, 820]
Gale D., The game of Hex and the Brouwer fixed-point theorem. Amer. Math. Monthly 86 (1979), 818–
827. [803, 804]
Gale D. and L.S. Shapley, College admissions and the stability of marriage. Amer. Math. Monthly 69
(1962), 9–15. [285, 288]
Gallai T., On factorisation of graphs. Acta Math. Acad. Sci. Hungar. 1 (1950), 133–153. [264]
Gallai T., Über extreme Punkt- und Kantenmengen. Ann. Univ. Sci. Budapest, Eötvös Sect. Math. 2
(1959), 133–138. [260, 263]
Gallai T., Kritische Graphen I. Magyar Tud. Akad. Mat. Kut. Int. Közl. 8 (1963a), 165–192. [355]
Gallai T., Neuer Beweis eines Tutte’schen Satzes. Magyar Tud. Akad. Mat. Kut. Int. Közl. 8 (1963b),
135–139. [275]
Gallai T., Kritische Graphen II. Magyar Tud. Akad. Mat. Kut. Int. Közl. 8 (1963c), 373–395. [357]
Gallai T., On directed paths and circuits. In Theory of Graphs (Tihany, 1966) (P. Erdős and G. Katona,
eds.) (Academic Press, 1968), 115–118. [339]
Gallai T. and A.N. Milgram, Verallgemeinerung eines graphentheoretischen Satzes von Rédei. Acta Sci.
Math. Szeged 21 (1960), 181–186. [548]
Gallian J.A., A dynamic survey of graph labeling. Electron. J. Combin. 5 (1998), Dynamic Survey 6, 43.
[646]
Gallian J.A. and D.J. Rusin, Cyclotomic polynomials and nonstandard dice. Discr. Math. 27 (1979), 245–
259. [103]
Galperin G. and H. Gauchman, Problem 11103. Amer. Math. Monthly 111 (2004), 724. Solution 113
(2006), 465–466. [61]
Galvin D., Three tutorial lectures on entropy and counting (2014). (arXiv:1406.7872). [504, 506, 509]
Galvin F., Problem 6034. Amer. Math. Monthly 82 (1975), 592. Solution 84 (1977), 224. [474]
Galvin F., The list chromatic index of a bipartite multigraph. J. Combin. Th. B 63 (1995), 153–158.
[363, 364]
Galvin F., Problem 10701. Amer. Math. Monthly 105 (1998), 956. Solution 108 (2001), 79–80. [355]
Galvin F., Problem 10761. Amer. Math. Monthly 106 (1999), 864. Solution 108 (2001), 773–774. [228]
Ganter B. and L. Teirlinck, A combinatorial lemma. Math. Z. 154 (1977), 153–156. [441]
Gardner M., Mathematical games (a.k.a. Bulgarian Solitaire and other seemingly endless tasks). Sci.
Amer. 249 (1983), 8–13. [143]
880 References
Garey M.R., R.L. Graham, D.S. Johnson, and D.E. Knuth, Complexity results for bandwidth minimiza-
tion. SIAM J. Appl. Math. 34 (1978), 477–495. [800]
Garey M.R. and D.S. Johnson, The complexity of near-optimal graph coloring. J. Assoc. Comp. Mach. 23
(1976), 43–49. [701]
Garey M.R. and D.S. Johnson, Computers and intractability (W. H. Freeman and Co., 1979). A guide to
the theory of NP-completeness, A Series of Books in the Mathematical Sciences. [11]
Garey M.R. and D.S. Johnson, Crossing number is NP-complete. SIAM J. Algebraic Discrete Methods 4
(1983), 312–316. [795]
Gargano L., M. Hammar, P. Hell, L. Stacho, and U. Vaccaro, Spanning spiders and light-splitting
switches. Discr. Math. 285 (2004), 83–95. [327, 334]
Gaskell R.W., M.S. Klamkin, and P. Watson, Triangulations and Pick’s theorem. Math. Mag. 49 (1976),
35–37. [389]
Gasparyan G.S., Minimal imperfect graphs: a simple approach. Combinatorica 16 (1996), 209–212.
[369]
Gavril F., The intersection graphs of subtrees in trees are exactly the chordal graphs. J. Combin. Th. B
16 (1974), 47–56. [373]
Gazit H. and G.L. Miller, Planar separators and the Euclidean norm. In Algorithms (Tokyo, 1990), Lec-
ture Notes in Comput. Sci. 450 (Springer, Berlin, 1990), 338–347. [397]
GCHQ Problem Solving Group, Solution to problem 11883. Amer. Math. Monthly 125 (2018), 82–83.
Proposed 123 (2016), 97. [149]
Geetha J., N. Narayanan, and K. Somasundaram, Total colorings-A survey (2018). (arXiv:1812.05833v1).
[373]
George J.C., 1-Factorizations of tensor products of graphs (ProQuest, 1991). Ph.D. Thesis, Univ. Illinois
at Urbana–Champaign. [273, 371]
Georges J.P., Non-Hamiltonian bicubic graphs. J. Combin. Th. B 46 (1989), 121–124. [317]
Gerbner D. and B. Patkós, Extremal Finite Set Theory (CRC Press, 2019). [493]
Gerencsér L. and A. Gyárfás, On Ramsey-type problems. Ann. Univ. Sci. Budapest. Eötvös Sect. Math.
10 (1967), 167–170. [460]
Gerke S. and A. Steger, The sparse regularity lemma and its applications. In Surveys in combinatorics
2005, London Math. Soc. Lecture Note Ser. 327 (Cambridge Univ. Press, 2005), 227–258. [488]
Gessel I.M., Generating Functions and Enumeration of Sequences (ProQuest LLC, 1977). Ph.D. Thesis,
Massachusetts Inst. Tech. [102]
Gessel I.M., Problem 10357. Amer. Math. Monthly 101 (1994), 75. Solution 104 (1997), 177–178. [115]
Gessel I.M., Problem 10424. Amer. Math. Monthly 102 (1995), 70. Solution 104 (1997), 466–467. [117]
Gessel I.M., The Smith College diploma problem. Amer. Math. Monthly 108 (2001), 55–57. [106]
Gessel I.M., Lagrange inversion. J. Combin. Th. A 144 (2016), 212–249. [129]
Gessel I.M. and R.P. Stanley, Stirling polynomials. J. Combin. Th. A 24 (1978), 24–33. [102]
Gessel I.M. and G. Viennot, Binomial determinants, paths, and hook length formulae. Adv. in Math. 58
(1985), 300–321. [165, 167, 168]
Gessel I.M. and G. Viennot, Determinants, paths, and plane partitions (1989). Available online at
http://contscience.xavierviennot.org/xavier/articles_files/determinant_89.pdf
[169]
Getz M. and D. Jones, Problem 11005. Amer. Math. Monthly 110 (2003), 340. Solution 112 (2005), 89–
90. [61]
Ghouila-Houri A., Une condition suffisante d’existence d’un circuit Hamiltonien. C. R. Adac. Sci. Paris
251 (1960), 495–497. [334]
Ghouila-Houri A., Caractérisation des graphes non orientés dont on peut orienter les arětes de manière
à obtenir le graphe d’une relation d’ordre. C. R. Acad. Sci. Paris 254 (1962), 1370–1371. [550]
Gilbert E.N., Lattice theoretic properties of frontal switching functions. J. Math. Physics 33 (1954), 57–
67. [564]
Gilbert E.N., Random graphs. Ann. Math. Stat. 30 (1959), 1141–1144. [688]
References 881
Gilmore P.C. and A.J. Hoffman, A characterization of comparability graphs and of interval graphs.
Canad. J. Math. 16 (1964), 539–548. [374, 549]
Glaisher J., A theorem in partitions. Messenger of Math. 12 (1883), 158–170. [142, 148]
Glock S., F. Joos, J. Kim, D. Kühn, and D. Osthus, Resolution of the Oberwolfach problem (2018).
(arXiv:1806.04644). [647]
Glock S., D. Kühn, A. Lo, and D. Osthus, The existence of designs via iterative absorption (2016).
(arXiv:1611.06827). [640]
Goddard W., Acyclic colorings of planar graphs. Discr. Math. 91 (1991), 91–94. [418]
Godsil C. and K. Meagher, Erdős–Ko–Rado theorems: algebraic approaches, Cambridge Studies in Ad-
vanced Mathematics 149 (Cambridge Univ. Press, 2016). [500, 781]
Godsil C. and G. Royle, Algebraic graph theory, Graduate Texts in Mathematics 207 (Springer-Verlag,
2001). [766]
Goldberg C.H. and D.B. West, Bisection of circle colorings. SIAM J. Algebraic Discrete Methods 6 (1985),
93–106. [809]
Goldberg M.K., Structure of multigraphs with restrictions on the chromatic class (Russian). Metody
Diskret. Analiz. 30 (1977), 3–12. [360]
Goldman J.R., J.T. Joichi, and D.E. White, Rook theory. I. Rook equivalence of Ferrers boards. Proc.
Amer. Math. Soc. 52 (1975), 485–492. [175]
Golomb S.W. and L.R. Welch, Perfect codes in the Lee metric and the packing of polyominoes. SIAM J.
Appl. Math. 18 (1970), 302–317. [29]
Golovina L.I. and I.M. Yaglom, Introduction in Geometry, Topics in mathematics (Heath, 1963). [419]
Golumbic M.C., Trivially perfect graphs. Discr. Math. 24 (1978), 105–107. [366]
Golumbic M.C., Algorithmic Graph Theory and Perfect Graphs (Academic Press, 1980, 2004). [370]
Golumbic M.C., D. Rotem, and J. Urrutia, Comparability graphs and intersection graphs. Discr. Math.
43 (1983), 37–46. [582]
Golumbic M.C. and E.R. Scheinerman, Containment graphs, posets, and related classes of graphs. In
Combinatorial Mathematics: Proceedings of the Third International Conference (New York, 1985),
Ann. New York Acad. Sci. 555 (New York Acad. Sci., 1989), 192–204. [831, 832]
Gonçalves D., Covering planar graphs with forests, one having bounded maximum degree. J. Combin.
Th. B 99 (2009), 314–322. [421]
Gondran M. and M. Minoux, Graphs and algorithms, Wiley-Interscience Series in Discr. Mathematics
(Wiley & Sons, 1984). [287]
Good I.J., Normal recurring decimals. J. Lond. Math. Soc. 21 (1946), 167–169. [239]
Goodman A.W., On sets of acquaintances and strangers at any party. Amer. Math. Monthly 66 (1959),
778–783. [477]
Goodman S. and S. Hedetniemi, Sufficient conditions for a graph to be Hamiltonian. J. Combin. Th. B
16 (1974), 175–180. [330]
Gosper R.W., Jr., Decision procedure for indefinite hypergeometric summation. Proc. Nat. Acad. Sci.
U.S.A. 75 (1978), 40–42. [89]
Gottschalk W.H., Choice functions and Tychonoff’s theorem. Proc. Am. Math. Soc. 2 (1951), 172. [468]
Gould H.W., Explicit formulas for Bernoulli numbers. Amer. Math. Monthly 79 (1972), 44–51.
[23, 30, 65]
Gould R.J., Graph Theory (Benjamin/Cummings, 1988). Also 2012. [215, 393]
Gould R.J., Updating the Hamiltonian problem—a survey. J. Graph Theory 15 (1991), 121–157. [316]
Gould R.J., Advances on the Hamiltonian problem—a survey. Graphs Combin. 19 (2003), 7–52. [316]
Gould R.J., Recent advances on the Hamiltonian problem: Survey III. Graphs Combin. 30 (2014), 1–46.
[316]
Goulden I.P. and L.G. Serrano, Maintaining the spirit of the reflection principle when the boundary has
arbitrary integer slope. J. Combin. Th. A 104 (2003), 317–326. [42]
Govorčin J. and R. Škrekovski, On the connectivity of Cartesian product of graphs. Ars Math. Contemp.
7 (2014), 293–297. [297]
882 References
Gowers W.T., A new proof of Szemerédi’s theorem for arithmetic progressions of length four. Geom. Funct.
Anal. 8 (1998), 529–551. [672]
Gowers W.T., A new proof of Szemerédi’s theorem. Geom. Funct. Anal. 11 (2001), 465–588. [466, 484]
Graham N., R.C. Entringer, and L.A. Székely, New tricks for old trees: maps and the pigeonhole principle.
Amer. Math. Monthly 101 (1994), 664–667. [428, 441]
Graham N. and F. Harary, Changing and unchanging the diameter of a hypercube. Discrete Appl. Math.
37-38 (1992), 265–274. [428, 565]
Graham N., F. Harary, M. Livingston, and Q.F. Stout, Subcube fault-tolerance in hypercubes. Inform.
and Comput. 102 (1993), 280–314. [584]
Graham R.L., Linear extensions of partial orders and the FKG inequality. In Ordered sets (Banff, Alta.,
1981), NATO Adv. Study Inst. C: Math. Phys. Sci. 83 (Reidel, 1982), 213–236. [597]
Graham R.L. and S. Butler, Rudiments of Ramsey theory (2nd ed.), CBMS Regional Conference Series in
Mathematics 123 (AMS, 2015). [425]
Graham R.L. and L.H. Harper, Some results on matching in bipartite graphs. SIAM J. Appl. Math. 17
(1969), 1017–1022. [559, 560]
Graham R.L. and D.J. Kleitman, Increasing paths in edge ordered graphs. Period. Math. Hungar. 3
(1973), 141–148. [431, 442]
Graham R.L., D.E. Knuth, and O. Patashnik, Concrete mathematics (Addison-Wesley, 1989). 2nd edition
1994. [24, 33, 41, 61, 89, 101]
Graham R.L. and H.O. Pollak, On the addressing problem for loop switching. Bell Sys. Tech. J. 50 (1971),
2495–2519. [771]
Graham R.L. and H.O. Pollak, On embedding graphs in squashed cubes. In Graph Th. and Appl. (Proc.
Conf., Western Michigan Univ., Mich., 1972; dedicated to the memory of J. W. T. Youngs), Lect.
Notes Math. 303 (Springer, 1972), 99–110. [781]
Graham R.L., V. Rödl, and A. Ruciński, On graphs with linear Ramsey numbers. J. Graph Theory 35
(2000), 176–192. [484]
Graham R.L., V. Rödl, and A. Ruciński, On bipartite graphs with linear Ramsey numbers. Combinatorica
21 (2001), 199–209. [484, 673]
Graham R.L. and B.L. Rothschild, A short proof of van der Waerden’s theorem on arithmetic progres-
sions. Proc. Amer. Math. Soc. 42 (1974), 385–386. [463, 464]
Graham R.L., B.L. Rothschild, and J. Spencer, Ramsey Theory (Wiley, 1980). Also 1990.
[425, 452, 463, 465, 470]
Graver J.E. and J. Yackel, Some graph theoretic results associated with Ramsey’s Theorem. J. Combin.
Th. 4 (1968), 125–175. [449, 451]
Gravier S. and F. Maffray, Graphs whose choice number is equal to their chromatic number. J. Graph
Theory 27 (1998), 87–97. [356]
Greene C., A multiple exchange property for bases. Proc. Amer. Math. Soc. 39 (1973), 45–50. [538]
Greene C., An extension of Schensted’s theorem. Advances in Math. 14 (1974), 254–265. [205]
Greene C., G.O.H. Katona, and D.J. Kleitman, Extensions of the Erdős–Ko–Rado theorem. Studies in
Appl. Math. 55 (1976), 1–8. [511]
Greene C. and D.J. Kleitman, The structure of Sperner ¾ -families. J. Combin. Th. A 20 (1976a), 41–68.
[548, 551]
Greene C. and D.J. Kleitman, Strong versions of Sperner’s theorem. J. Combin. Th. A 20 (1976b), 80–
88. [555, 565]
Greene C. and D.J. Kleitman, Proof techniques in the theory of finite sets. In Studies in combinatorics,
MAA Stud. Math. 17 (Math. Assoc. Amer., 1978), 22–79. [496, 561, 607]
Greene C. and T.L. Magnanti, Some abstract pivot algorithms. SIAM J. Appl. Math. 29 (1975), 530–539.
[538]
Greene C., A. Nijenhuis, and H.S. Wilf, A probabilistic proof of a formula for the number of Young
tableaux of a given shape. Adv. in Math. 31 (1979), 104–109. [190]
Greene J.E., A new short proof of Kneser’s conjecture. Amer. Math. Monthly 109 (2002), 918–920.
[811, 812]
References 883
Greenwell D.L. and H.V. Kronk, Uniquely line colorable graphs. Canad. Math. Bull. 16 (1973), 525–529.
[329]
Greenwood R.E. and A.M. Gleason, Combinatorial relations and chromatic graphs. Canad. J. Math. 7
(1955), 1–7. [449]
Gregory D.A. and K.N. Vander Meulen, Sharp bounds for decompositions of graphs into complete r-
partite subgraphs. J. Graph Theory 21 (1996), 393–400. [771]
Griggs J.R., Sufficient conditions for a symmetric chain order. SIAM J. Appl. Math. 32 (1977), 807–809.
[557, 561]
Griggs J.R., Collections of subsets with the Sperner property. Trans. AMS 269 (1982), 575–591. [568]
Griggs J.R., Problem 10665. Amer. Math. Monthly 105 (1998), 464. Solution 107 (2000), 653–4. [702]
Griggs J.R. and C.C. Ho, The cycling of partitions and compositions under repeated shifts. Adv. in Appl.
Math. 21 (1998), 205–227. [144, 145, 152]
Griggs J.R., J. Stahl, and W.T. Trotter, A Sperner theorem on unrelated chains of subsets. J. Combin.
Th. A 36 (1984), 124–127. [568]
Grimmett G.R. and C.J.H. McDiarmid, On colouring random graphs. Math. Proc. Camb. Phil. Soc. 77
(1975), 313–324. [701]
Grimmett G.R. and D.R. Stirzaker, Probability and random processes, 2nd ed. (Oxford Univ. Press, 1992).
Also 1982, 2001. [666]
Grinberg E.J., Plane homogeneous graphs of degree three without hamiltonian circuits. Latvian Math.
Yearbook 5 (1968), 51–58. [400]
Grinstead C.M. and S.M. Roberts, On the Ramsey numbers R(3 , 8) and R(3 , 9). J. Combin. Th. B 33
(1982), 27–51. [449]
Grolmusz V. and B. Sudakov, On ¾ -wise set-intersections and ¾ -wise Hamming-distances. J. Combin.
Th. A 99 (2002), 180–190. [731]
Grone R. and R. Merris, The Laplacian spectrum of a graph. II. SIAM J. Discr. Math. 7 (1994), 221–229.
[776]
Grone R., R. Merris, and V.S. Sunder, The Laplacian spectrum of a graph. SIAM J. Matrix Anal. Appl.
11 (1990), 218–238. [776]
Gross J.L. and T.W. Tucker, Topological graph theory, Wiley-Interscience Series in Discr. Mathematics
and Optimization (Wiley & Sons, 1987). [377]
Gross J.L. and J. Yellen, Graph Theory (CRC Press, 1999). [377]
Grötzsch H., Ein Dreifarbensatz für dreikreisfreie Netze auf der Kugel. Wiss. Z. Martin-Luther-U., Halle-
Wittenberg, Math.-Nat. Reihe 8 (1959), 109–120. [414]
Grünbaum B., Acyclic colorings of planar graphs. Israel J. Math. 14 (1973), 390–408. [423]
Grünbaum B. and T.S. Motzkin, The number of hexagons and the simplicity of geodesics on certain
polyhedra. Canad. J. Math. 15 (1963), 744–751. [387, 389]
Grytczuk J., J. Kozik, and P. Micek, New approach to nonrepetitive sequences. Random Structures Al-
gorithms 42 (2013), 214–225. [680]
Grytczuk J. and X. Zhu, The Alon–Tarsi number of a planar graph minus a matching (2020).
(arXiv:1811.12012). [403, 742]
Guan M., Graphic programming using odd and even points. Chinese Math. 1 (1962), 273–277. [287]
Guldan F., The linear arboricity of 10-regular graphs. Math. Slovaca 36 (1986), 225–228. [412]
Gunderson D.S. and V. Rödl, Extremal problems for affine cubes of integers. Combin. Probab. Comput.
7 (1998), 65–79. [473]
Guo S. and Z.W. Sun, Determination of the two-color Rado number for a1 x1 +· · ·+ am x m = x0 . J. Combin.
Th. A 115 (2008), 345–353. [473]
Gupta H., Combinatorial proof of a theorem on partitions into an even or odd number of parts. J. Combin.
Th. A 21 (1976), 100–103. [176]
Gupta R.P., The chromatic index and the degree of a graph (Abstract 66T-429). Notices Amer. Math. Soc.
13 (1966), 719. [358, 359, 372]
Gurgel M.A. and Y. Wakabayashi, On ¾-leaf-connected graphs. J.Combin. Th.B 41 (1986), 1–16. [327]
884 References
Gusfield D. and R.W. Irving, The Stable Marriage Problem: Structure and Algorithms (MIT Press, 1989).
[286]
Gustavsson T., Decompositions of Large Graphs and Digraphs with High Minimum Degree (Univ. of
Stockholm, 1991). Ph.D. Thesis. [640]
Gutin G., Finding a longest path in a complete multipartite digraph. SIAM J. Discr. Math. 6 (1993),
270–273. [334]
Gutner S., The complexity of planar graph choosability. Discr. Math. 159 (1996), 119–130. [402, 420]
Guy R.K., A problem of Zarankiewicz. In Theory of Graphs (Proc. Colloq., Tihany, 1966) (Academic Press,
1968), 119–150. [632]
Guy R.K., The decline and fall of Zarankiewicz’s Theorem. In Proof Techniques in Graph Theory (F.
Harary, ed.) (Academic Press, 1969), 63–69. [793]
Guy R.K., Sequences associated with a problem of Turán and other problems. In Combin. Conf. Bala-
tonfüred, 1969 (North-Holland, 1970), 553–569. [793, 797]
Guy R.K., Crossing numbers of graphs. In Graph Theory and Applications (Y. Alavi et al, ed.), Lect. Notes
Math. 303 (Springer, 1972), 111–124. [792, 795]
Guy R.K., The strong law of small numbers. Amer. Math. Monthly 95 (1988), 697–712. [105]
Guy R.K., Catwalks, sandsteps, and Pascal pyramids. J. Integer Seq. 3 (2000), Article 00.1.6 (electronic).
[64]
Guy R.K. and F. Harary, On the Möbius ladders. Canad. Math. Bull. 10 (1967), 493–496. [797]
Gyárfás A., On Ramsey covering-numbers. In Infinite and finite sets (Colloq., Keszthely, 1973), II, Colloq.
Math. Soc. János Bolyai 10 (North-Holland, 1975), 801–816. [351]
Gyárfás A., Particiófedések és lefogóhalmazok hipergráfokban. Tanulmányok-MTA Számitástechn. Au-
tomat. Kutató Int. Budapest (1977), 62. [460]
Gyárfás A., Vertex coverings by monochromatic paths and cycles. J. Graph Th. 7 (1983), 131–135.
[460]
Gyárfás A., Problems from the world surrounding perfect graphs. Tanulmányok—MTA Számitástech.
Automat. Kutató Int. Budapest (1985), 53. [351, 352]
Gyárfás A., Large monochromatic components in edge colorings of graphs: a survey. In Ramsey theory,
Progr. Math. 285 (Birkhäuser/Springer, 2011), 77–96. [460]
Gyárfás A., Vertex covers by monochromatic pieces—a survey of results and problems. Discr. Math. 339
(2016), 1970–1977. [460]
Gyárfás A., J. Lehel, J. Nešetřil, V. Rödl, R.H. Schelp, and Z. Tuza, Local ¾ -colorings of graphs and
hypergraphs. J. Combin. Th. B 43 (1987), 127–139. [472]
Gyárfás A. and G. Simonyi, Edge colorings of complete graphs without tricolored triangles. J. Graph
Theory 46 (2004), 211–216. [474]
Gyárfás A., E. Szemerédi, and Z. Tuza, Induced subtrees in graphs of large chromatic number. Discr.
Math. 30 (1980), 235–244. [352, 357]
Győri E., On division of graphs to connected subgraphs. In Combinatorics (Proc. 5th Hung. Colloq.,
Keszthely, 1976), I, Colloq. Math. Soc. János Bolyai 18 (North-Holland, 1978), 485–494. [312]
Habib M., C.J.H. McDiarmid, J. Ramirez-Alfonsin, and B.A. Reed (eds.), Probabilistic methods for algo-
rithmic discrete mathematics, Algorithms and Combin. 16 (Springer-Verlag, 1998). [657]
Hadamard J., Résolution d’une question relative aux déterminants (French). Bull. Sci. Math. 17 (1893),
240–246. [618, 619]
Hadamard J., Note sur quelques applications de l’indice de Kronecker in Jules Tannery. In Introduction
à la théorie des fonctions d’une variable 2 (Hermann & Fils, 1910), 737–477. [805]
Hadwiger H., Über eine Klassifikation der Streckenkomplexe. Vierteljschr. Naturforsch. Ges. Zürich 88
(1943), 133–142. [349]
Hadwiger H., Ueberdeckung des Euklidischen Raumes durch kongruente Mengen. Portugaliae Math. 4
(1945), 238–242. [729]
Hadwiger H., Mitteilung betreffend meine Note: Überdeckung einer Menge durch Mengen kleineren
Durchmessers. Comment. Math. Helv. 19 (1946), 72–73. [817]
Hadwiger H., Simultane Vierteilung zweier Körper. Arch. Math. (Basel) 17 (1966), 274–278. [815]
References 885
Haemers W.H., Eigenvalue techniques in design and graph theory, Mathematical Centre Tracts 121
(Mathematisch Centrum, 1980). [772]
Hagelstein P. and D. Herden, Problem 12071. Amer. Math. Monthly 125 (2018), 851. Solution 127 (2020),
464. [461]
Hagelstein P., D. Herden, and D. Young, Ramsey-type theorems for sets satisfying a geometric regularity
condition. J. Math. Anal. Appl. 447 (2017), 951–956. [461]
Häggkvist R., A lemma on cycle decompositions. In Cycles in graphs (Burnaby, B.C., 1982), North-
Holland Math. Stud. 115 (North-Holland, 1985), 227–232. [647, 648]
Häggkvist R. and J.C.M. Janssen, New bounds on the list-chromatic index of the complete graph and
other simple graphs. Combin. Probab. Comput. 6 (1997), 295–313. [362]
Häggkvist R. and C. Thomassen, Circuits through specified edges. Discr. Math. 41 (1982), 29–34.
[326]
Hajek B. and B. Narayanan, Multigraphs with the most edge covers. Inst. Math. Appl. Preprint Series
(1994). [765]
Hajós G., Über eine Konstruktion nicht n-färbbarer Graphen. Wiss. Z. Martin-Luther-Univ. Halle-
Wittenberg Math.-Nat. Reihe 10 (1961), 116–117. [355, 709]
Hakimi S.L., On the realizability of a set of integers as degrees of the vertices of a graph. SIAM J. Appl.
Math. 10 (1962), 496–506. [221, 238]
Hakimi S.L., On the degrees of the vertices of a directed graph. J. Franklin Inst. 279 (1965), 290–308.
[255, 261, 746]
Hakimi S.L. and E.F. Schmeichel, Improved bounds for the chromatic number of a graph. J. Graph
Theory 47 (2004), 217–225. [354]
Hales A.W. and R.I. Jewett, Regularity and positional games. Trans. Amer. Math. Soc. 106 (1963), 222–
229. [467, 474]
Halin R., A theorem on n-connected graphs. J. Combin. Th. 7 (1969), 150–4. [310]
Hall M., Distinct representatives of subsets. Bull. Amer. Math. Soc. 54 (1948), 922. [254, 255, 262]
Hall M. and H.J. Ryser, Cyclic incidence matrices. Canadian J. Math. 3 (1951), 495–502. [637]
Hall M., Jr., Cyclic projective planes. Duke Math. J. 14 (1947), 1079–1090. [637]
Hall P., On representatives of subsets. J. Lond. Math. Soc. 10 (1935), 26–30. [254]
Halmos P.R. and H.E. Vaughan, The marriage problem. Amer. J. Math 72 (1950), 214–215. [254]
Hammersley J.M., A few seedlings of research. In Proceedings of the Sixth Berkeley Symposium on Math-
ematical Statistics and Probability (Univ. California, Berkeley, Calif., 1970/1971), Vol. I: Theory
of statistics (Univ. California Press, 1972), 345–394. [821]
Hanani H., Über wesentlich unplättbare Kurven im drei-dimensionalen Raume (German). Fund. Math.
23 (1934), 135–142. As Chaim Chojnacki. [398]
Hanani H., The existence and construction of balanced incomplete block designs. Ann. Math. Statist. 32
(1961), 361–386. [656]
Hanani H., On balanced incomplete block designs with blocks having five elements. J. Combin. Th. A
12 (1972), 184–201. [641]
Hanani H., Balanced incomplete block designs and related designs. Discr. Math. 11 (1975), 255–369.
[639]
Hanlon P., Counting interval graphs. Trans. Amer. Math. Soc. 272 (1982), 383–426. [587]
Hansel G., Sur le nombre des fonctions booléennes monotones de n variables. C. R. Acad. Sci. Paris Sér.
A-B 262 (1966), A1088–A1090. [557]
Hansel G., Complexes et décompositions binomiales. J. Combinatorial Theory A 12 (1972), 167–183.
[496]
Hansen H.M., Scheduling with minimum waiting periods (Danish) (Odense Univ., 1992). Master Thesis.
[373]
Hanson D., C.O.M. Loten, and B. Toft, On interval colourings of bi-regular bipartite graphs. Ars Combin.
50 (1998), 23–32. [273, 373]
Harary F., On the notion of balance of a signed graph. Michigan Math. J. 2 (1953–54), 143–146. [237]
886 References
Harary F., The number of linear, directed, rooted, and connected graphs. Trans. Amer. Math. Soc. 78
(1955a), 445–463. [224]
Harary F., Note on the Pólya and Otter formulas for enumerating trees. Michigan Math. J. 3 (1955b),
109–112. [184]
Harary F., The maximum connectivity of a graph. Proc. Nat. Acad. Sci. U.S.A. 48 (1962a), 1142–1146.
[290]
Harary F., The determinant of the adjacency matrix of a graph. SIAM Review 4 (1962b), 202–210.
[780]
Harary F., Graph Theory (Addison-Wesley, 1969). [215]
Harary F., Reviews: The Polya Picture Album–Encounters of a Mathematician. Amer. Math. Monthly 96
(1989), 750–753. [224]
Harary F., D.F. Hsu, and Z. Miller, The biparticity of a graph. J. Graph Th. 1 (1977), 131–133. [343]
Harary F. and P.C. Kainen, The cube of a path is maximal planar. Bull. Inst. Combin. Appl. 7 (1993),
55–56. [797]
Harary F., P.C. Kainen, and A.J. Schwenk, Toroidal graphs with arbitrarily high crossing numbers.
Nanta Math. 6 (1973), 58–67. [794, 798]
Harary F. and P. Kovács, The smallest graphs with prescribed odd and even girth. Caribbean J. Math.
1 (1982), 24–26. [216]
Harary F. and C.St.J.A. Nash-Williams, On eulerian and hamiltonian graphs and line graphs. Canad.
Math. Bull. 8 (1965), 701–709. [329]
Harary F. and E.M. Palmer, Graphical enumeration (Academic Press, 1973). [135]
Harary F. and G. Prins, The block-cutpoint-tree of a graph. Publ. Math. Debrecen 13 (1966), 103–107.
[297]
Harary F. and A.J. Schwenk, The number of caterpillars. Discr. Math. 6 (1973), 359–365. [187]
Hardy G.H. and S. Ramanujan, Asymptotic formulæ in combinatory analysis. Proc. London Math. Soc.
(2) 17 (1918), 75–115. [140]
Harper L.H., Optimal numberings and isoperimetric problems on graphs. J. Combin. Th. 1 (1966), 385–
393. [496, 720, 800]
Harper L.H., The morphology of partially ordered sets. J. Combinatorial Theory A 17 (1974), 44–58.
[563]
Hartke S.G., D. Stolee, D.B. West, and M. Yancey, Extremal graphs with a given number of perfect
matchings. J. Graph Theory 73 (2013), 449–468. [276]
Hartman I.B-A., Berge’s conjecture on directed path partitions—a survey. Discr. Math. 306 (2006), 2498–
2514. [549]
Hartsfield N., A.K. Kelmans, and Y.Q. Shen, On the Laplacian polynomial of a K -cube extension. In
Proc. 27th Southeastern Intl. Conf. Combin. Graph Th. Comput. (Baton Rouge), Congr. Numer.
119 (1996), 73–77. [778]
Harzheim E., Remarks on Dilworth’s decomposition theorem. Ars Combin. 16 (1983), 27–31. [551]
Hasse M., Zur algebraischen Begründung der Graphentheorie. I. Math. Nachr. 28 (1964/1965), 275–290.
[339]
Havel I. and J. Morávek, b-valuations of graphs. Czechoslovak Math. J. 22 (1972), 338–351. [373]
Havel V., A remark on the existence of finite graphs (Czech). Časopis Pěst. Mat 80 (1955), 477–480.
[221]
Havet F. and J.S. Sereni, Improper choosability of graphs and maximum average degree. J. Graph Theory
52 (2006), 181–199. [412]
Haxell P.E., Partitioning complete bipartite graphs by monochromatic cycles. J. Combin. Th. B 69 (1997),
210–218. [492]
Haxell P.E., A note on vertex list colouring. Combin. Probab. Comput. 10 (2001), 345–347. [677]
Haxell P.E., Y. Kohayakawa, and T. Łuczak, The induced size-Ramsey number of cycles. Combin. Probab.
Comput. 4 (1995), 217–239. [455]
Hayes P.J., A note on the Towers of Hanoi problem. Computer J. 20 (1977), 282–285. [80]
Hayward R.B., Weakly triangulated graphs. J. Combin. Th. B 39 (1985), 200–208. [375]
References 887
Hladký J., D. Král’, and U. Schauz, Brooks’ theorem via the Alon–Tarsi theorem. Discr. Math. 310 (2010),
3426–3428. [347]
Hliněný P., Crossing number is hard for cubic graphs. J. Combin. Th. B 96 (2006), 455–471. [795]
Hoare A.H.M., An involution of blocks in the partitions of n. Amer. Math. Monthly 93 (1986), 475–476.
[152]
Hobby C.R. and J.R. Rice, A moment problem in L1 approximation. Proc. Amer. Math. Soc. 16 (1965),
665–670. [810]
Hochberg R., C.J.H. McDiarmid, and M.E. Saks, On the bandwidth of triangulated triangles. In 14th
Brit. Combin. Conf. (Keele, 1993) 138 (Discr. Math., 1995), 261–5. [801–803]
Hoeffding W., Probability inequalities for sums of bounded random variables. J. Amer. Statist. Assoc. 58
(1963), 13–30. [708, 715, 722]
Hoffman A.J., On the polynomial of a graph. Amer. Math. Monthly 70 (1963), 30–36. [772]
Hoffman A.J., On eigenvalues and colorings of graphs. In Graph Theory and Its Applications (B. Harries,
ed.) (Academic Press, 1970), 79–91. [781]
Hoffman A.J., Extending Greene’s theorem to directed graphs. J. Combin. Theory A 34 (1983), 102–107.
[549]
Hoffman A.J. and R.R. Singleton, On Moore graphs with diameters 2 and 3. IBM J. Res. Develop. 4
(1960), 497–504. [244, 775]
Hoffman D.G. and P.J. Schellenberg, The existence of C¾ -factorizations of K 2n − F. Discr. Math. 97 (1991),
243–250. [647]
Holland F., Problem 11798. Amer. Math. Monthly 121 (2014), 798. Solution 124 (2017), 370. [23, 117]
Holley R., Remarks on the FKG inequalities. Comm. Math. Phys. 36 (1974), 227–231. [597]
Hollingsworth S., Packing trees into complete bipartite graphs. Discr. Math. 313 (2013), 945–948.
[248]
Holton D. and R.E.L. Aldred, Planar graphs, regular graphs, bipartite graphs and Hamiltonicity. Aus-
tralas. J. Combin. 20 (1999), 111–131. [326]
Holton D.A. and J. Sheehan, The Petersen Graph (Cambridge Univ. Press, 1993). [213]
Holyer I., The NP-completeness of edge-coloring. SIAM J. Comput. 10 (1981), 718–720. [359, 699]
Holzmann C.A. and F. Harary, On the tree graph of a matroid. SIAM J. Appl. Math. 22 (1972), 187–193.
[540]
Hook J. and G. Isaak, Star-critical Ramsey numbers. Discrete Appl. Math. 159 (2011), 328–334. [459]
Hopcroft J.E. and R.M. Karp, An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM J.
Comput. 2 (1973), 225–231. [283, 284]
Hopcroft J.E. and R.E. Tarjan, Efficient planarity testing. J. Assoc. Comput. Mach. 21 (1974), 549–568.
[393]
Horadam A.F., A generalized Fibonacci sequence. Amer. Math. Monthly 68 (1961), 455–459. [61]
Horák P., Q. He, and W.T. Trotter, Induced matchings in cubic graphs. J. Graph Th. 17 (1993), 151–160.
[373]
Horák P. and Z. Tuza, A coloring problem related to the Erdős–Faber–Lovász conjecture. J. Combin. Th.
B 50 (1990), 321–322. [344]
Horton J.D., On two-factors of bipartite regular graphs. Discr. Math. 41 (1982), 35–41. [317]
Hosoya H. and F. Harary, On the matching properties of three fence graphs. In Appl. Graph Th. and
Discr. Math. Chem. (Saskatoon, 1991) 12 (1993), 211–218. [765]
Hoşten S. and W.D. Morris, Jr., The order dimension of the complete graph. Discr. Math. 201 (1999),
133–139. [580]
Howard F.T., The number of multinomial coefficients divisible by a fixed power of a prime. Pacific J.
Math. 50 (1974), 99–108. [48]
Hsieh W.N. and D.J. Kleitman, Normalized matching in direct products of partial orders. Studies in
Appl. Math. 52 (1973), 285–289. [563]
Huang D. and D. Scully, Problem 11052. Amer. Math. Monthly 110 (2003), 957. Solution 113 (2006), 183.
[152]
Huneke C., The friendship theorem. Amer. Math. Monthly 109 (2002), 192–194. [776]
References 889
Hurlbert G.H., A short proof that n3 is not a circle containment order. J. Order 5 (1988), 235–237.
[828]
Hutchinson J.P., Problem 10478. Amer. Math. Monthly 102 (1995), 746. Solution 105 (1998), 274–275.
[419]
Hutchinson J.P., Three- and four-coloring nearly triangulated surfaces. In Proc. 32nd Southeastern Intl.
Conf. Combin. Graph Th. Comput. (Boca Raton), 150 (2001), 129–143. [419]
Hutchinson J.P., Arc- and circle-visibility graphs. Australas. J. Combin. 25 (2002), 241–262. [394]
Hutchinson J.P. and P.B. Trow, Some pigeonhole principle results extended. Amer. Math. Monthly 87
(1980), 648–651. [429]
Huxley M., The difference between consecutive primes. In Analytic Number Theory (St. Louis Univ.,
1972), Proc. Sympos. Pure Math 24 (Amer. Math. Soc., 1973), 141–145. [730]
Igusa K., Solution of the Bulgarian solitaire conjecture. Math. Mag. 58 (1985), 259–271. [144, 152]
Ionin Y., Solution to problem 11678. Amer. Math. Monthly 121 (2014), 952–953. Proposed 119 (2012),
880. [178]
Isaacs R., Infinite families of nontrivial trivalent graphs which are not Tait colorable. Amer. Math.
Monthly 82 (1975), 221–239. [372]
Ishigami Y., Proof of a conjecture of Bollobás and Kohayakawa on the Erdős–Stone theorem. J. Combin.
Th. B 85 (2002), 222–254. [482]
Itai A. and M. Rodeh, Covering a graph by circuits. In Automata, Langs. and Prog. (Udine, 1978), Lect.
Notes Comp. Sci. 62 (Springer-Verlag, 1978), 289–299. [249]
Jackson B., Hamilton cycles in regular 2-connected graphs. J. Combin. Th. B 29 (1980), 27–46. [326]
Jackson B., Hamilton cycles in 7-connected line graphs (1989). Unpublished preprint. [326]
Jackson B. and O. Ordaz, Chvátal–Erdős conditions for paths and cycles in graphs and digraphs. A
survey. Discr. Math. 84 (1990), 241–254. [321]
Jacobi C.G.J., De resolutione aequationum per series infinitas. J. Reine Angew. Math. 6 (1830), 257–
286. [129]
Jacobson M.S., F.R. McMorris, and H.M. Mulder, Tolerance intersection graphs. In Graph Theory, Com-
binatorics, and Applications (Kalamazoo, 1988) (Y. Alavi, G. Chartrand, O.R. Oellerman and A.J.
Schwenk, eds.) (Wiley, 1991), 705–724. [374]
Jaeger F., Tait’s theorem for graphs with crossing number at most one. Ars Combin. 9 (1980), 283–287.
[797]
Jahanbekam S., J. Kim, S. O, and D.B. West, On r-dynamic coloring of graphs. Discrete Appl. Math. 206
(2016), 65–72. [668]
Jahanbekam S. and D.B. West, New lower bounds for matching numbers of general and bipartite graphs.
Congr. Numer. 218 (2013), 57–59. [262, 273]
Jahanbekam S. and D.B. West, Anti-Ramsey problems for t edge-disjoint rainbow spanning subgraphs:
cycles, matchings, or trees. J. Graph Th. 82 (2016), 75–89. [333]
Jamison R.E., Covering finite fields with cosets of subspaces. J. Combin. Th. A 22 (1977), 253–266.
[735]
Jamison R.E., Orientable edge colorings of graphs. Discrete Appl. Math. 159 (2011), 595–604. [472]
Jamison R.E., T. Jiang, and A.C.H. Ling, Constrained Ramsey numbers of graphs. J. Graph Theory 42
(2003), 1–16. [473]
Jamison R.E. and D.B. West, On pattern Ramsey numbers of graphs. Graphs Combin. 20 (2004), 333–
339. [472]
Janson S., T. Łuczak, and A. Ruciński, Random Graphs (Wiley-Interscience, 2000). [657, 696, 708]
Janssen J.C.M., The Dinitz problem solved for rectangles. Bull. Amer. Math. Soc. (N.S.) 29 (1993), 243–
249. [363]
Jarnı́k V., O jistém problému minimálnim. Acta Societatis Scientiarum Natur. Moravicae 6 (1930), 57–
63. [246, 252]
Jendrol’ S., A short proof of Kotzig’s theorem on minimal edge weights of convex 3-polytopes (1999), 35–
38. [411]
890 References
Jendrol’ S. and H.-J. Voss, Light subgraphs of graphs embedded in the plane—a survey. Discr. Math.
313 (2013), 406–421. [407]
Jensen T.R. and B. Toft, Graph coloring problems, Wiley-Interscience Series in Discr. Mathematics and
Optimization (Wiley & Sons, 1995). [335]
Jenssen M. and J. Skokan, Exact Ramsey numbers of odd cycles via nonlinear optimisation (2016).
(arXiv:1608.05705). [461]
Jerrum M., A. Sinclair, and E. Vigoda, A polynomial-time approximation algorithm for the permanent of
a matrix with non-negative entries. In Proceedings of the Thirty-Third Annual ACM Symposium
on Theory of Computing (ACM, 2001), 712–721. [754]
Jiang T., K.G. Milans, and D.B. West, Degree Ramsey numbers for cycles and blowups of trees. European
J. Combin. 34 (2013), 414–423. [685]
Jiang T. and D. Mubayi, New upper bounds for a canonical Ramsey problem. Combinatorica 20 (2000),
141–146. [471]
Jichang S. and D.J. Kleitman, Superantichains in the lattice of partitions of a set. Studies in applied
mathematics 71 (1984), 207–241. [567]
Johannson K.R., Variations on a theorem by van der Waerden (Univ. Manitoba, 2007). Mas-
ters Thesis. Available online at http://mspace.lib.umanitoba.ca/bitstream/handle/1993/321/
thesismain.pdf [466]
Johnson D.M., A.L. Dulmage, and N.S. Mendelsohn, Orthomorphisms of groups and orthogonal latin
squares. I. Canad. J. Math. 13 (1961), 356–372. [654]
Johnson N.L. and S. Kotz, Urn models and their application (Wiley, 1977). [106]
Johnson R.T. and T.P. Vaughan, On union-closed families. I. J. Combin. Th. A 84 (1998), 242–249.
[503]
Jonsson J. and J.G. Propp, Problem 11298. Amer. Math. Monthly 114 (2007), 547. Solution 116 (2009),
371–372. [387]
Jordan C., Sur les assemblages de lignes. J. Reine Angew. Math. 70 (1869), 185–190. [243, 251]
Jordan C., Questions de probabilités. Bull. Soc. Math. France 1 (1872), 256–258. [669]
Jorza A., Problem 10856. Amer. Math. Monthly 108 (2001), 172. Solution 113 (2006), 180–183. [388]
Joyal A., Une théorie combinatoire des séries formelles. Adv. in Math. 42 (1981), 1–82. [37, 127]
Józsa S. and E. Szemerédi, The number of unit distances on the plane. In Infinite and finite sets (Colloq.,
Keszthely, 1973), II, Colloq. Math. Soc. Jáanos Bolyai 10 (North-Holland, 1975), 939–950.
[794]
Juarez H.A. and G. Salazar, Drawings of Cm × Cn with one disjoint family. II. J. Combin. Th. B 82 (2001),
161–165. [794]
Jukna S., Extremal combinatorics (2nd ed.), Texts in Theoretical Computer Science. An EATCS Series
(Springer, 2011). [493]
Juvan M., B. Mohar, and R. Škrekovski, On list edge-colorings of subcubic graphs. Discr. Math. 187
(1998a), 137–149. [412]
Juvan M., B. Mohar, and R. Škrekovski, List total colourings of graphs. Combin. Probab. Comput. 7
(1998b), 181–188. [60, 739]
Juvan M., B. Mohar, and R. Škrekovski, Graphs of degree 4 are 5-edge-choosable. J. Graph Theory 32
(1999), 250–264. [412]
Kabela A. and T. Kaiser, 10-tough chordal graphs are Hamiltonian. J. Combin. Th. B 122 (2017), 417–
427. [318]
Kahn J., Asymptotically good list-colorings. J. Combin. Th. A 73 (1996), 1–59. [362]
Kahn J., On some hypergraph problems of Paul Erdős and the asymptotics of matchings, covers and
colorings. In The mathematics of Paul Erdős, I, Algorithms Combin. 13 (Springer, 1997), 345–
371. [439]
Kahn J. and G. Kalai, A counterexample to Borsuk’s conjecture. Bull. Amer. Math. Soc. (N.S.) 29 (1993),
60–62. [817, 818]
Kahn J. and J.H. Kim, Entropy and sorting. J. Comput. System Sci. 51 (1995), 390–399. [823]
References 891
Kahn J. and N. Linial, Balancing extensions via Brunn–Minkowski. Combinatorica 11 (1991), 363–368.
[824, 825]
Kahn J. and M.E. Saks, Balancing poset extensions. Order 1 (1984), 113–126. [823, 824, 826, 831]
Kainen P.C., A generalization of the 5-color theorem. Proc. Amer. Math. Soc. 45 (1974), 450–453. [419]
Kaiser T., E. Rollová, and R. Lukot’ka, Nowhere-zero flows in signed graphs: A survey. Lect. Notes. Sem-
inar. Interdiscip. Matematica 14 (2017), 85–104. [237]
Kaiser T., Z. Ryjáček, D. Král’, M. Rosenfeld, and H.J. Voss, Hamilton cycles in prisms. J. Graph Th. 56
(2007), 249–269. [326]
Kalbfleisch J.D., J.G. Kalbfleisch, and R. Stanton, A combinatorial problem on convex n-gons. In
Proc. Louisiana Conf. on Combinatorics, Graph Theory and Computing (Louisiana State Univ.,
1970)(RC Mullin, KB Reid, and DP Roselle, eds.) (1970), 180–188. [458]
Kalbfleisch J.G., Upper bounds for some Ramsey numbers. J. Combin. Th. 2 (1967), 35–42. [449]
Kamat V.M., Erdős–Ko–Rado Theorems: New Generalizations, Stability Analysis and Chvatal’s Conjec-
ture (ProQuest LLC, 2011). Thesis (Ph.D.)–Arizona State University. [503]
Kampen G.R., Orienting planar graphs. Discr. Math. 14 (1976), 337–341. [786]
Kano M. and X. Li, Monochromatic and heterochromatic subgraphs in edge-colored graphs—a survey.
Graphs Combin. 24 (2008), 237–263. [457]
Kantrowitz M., Problem E3130. Amer. Math. Monthly 93 (1986), 131. Solution 95 (1988), 555–6. [61]
Kapoor S.F., A.D. Polimeni, and C.E. Wall, Degree sets for graphs. Fund. Math. 95 (1977), 189–194.
[227]
Karaganis J.J., On the cube of a graph. Canad. Math. Bull. 11 (1968), 295–296. [331]
Karaivanov B. and T.S. Vassilev, Solution to problem 11798. Amer. Math. Monthly 124 (2017). Proposed
121 (2014). [35]
Karger D.R., P.N. Klein, and R.E. Tarjan, A randomized linear-time algorithm to find minimum spanning
trees. J. Assoc. Comput. Mach. 42 (1995), 321–328. [246]
Karp R.M., Reducibility among combinatorial problems. In Complexity of computer computations (Proc.
Sympos., IBM Thomas J. Watson Res. Center, Yorktown Heights, N.Y., 1972) (Plenum, 1972), 85–
103. [11]
Kárteszi F., Piani finiti ciclici come risoluzioni di un certo problema di minimo. (Italian). Boll. Un. Mat.
Ital. (3) 15 (1960), 522–528. [639]
Kasteleyn P.W., The statistics of dimers on a lattice, I. The number of dimer arrangements on a quadratic
lattice. Physica 27 (1961), 1209–1225. [755]
Kasteleyn P.W., Dimer statistics and phase transitions. J. Math. Phys. 4 (1963), 287–293. [755, 756]
Kasteleyn P.W., Graph theory and crystal physics. In Graph Theory and Theoretical Physics (Academic
Press, 1967), 43–110. [755]
Kászonyi L. and Z. Tuza, Saturated graphs with minimal number of edges. J. Graph Theory 10 (1986),
203–210. [491]
Katerinis P., Some conditions for the existence of º -factors. J. Graph Theory 9 (1985), 513–521. [276]
Katona G.O.H., Intersection theorems for systems of finite sets. Acta Math. Acad. Sci. Hungar. 15 (1964),
329–337. [497, 511]
Katona G.O.H., On a conjecture of Erdős and a stronger form of Sperner’s theorem. Studia Sci. Math.
Hungar. 1 (1966), 59–63. [565]
Katona G.O.H., A theorem of finite sets. In Theory of graphs (Proc. Colloq., Tihany, 1966) (Academic
Press, 1968), 187–207. [495, 496]
Katona G.O.H., A generalization of some generalizations of Sperner’s theorem. J. Combinatorial Theory
B 12 (1972a), 72–81. [554]
Katona G.O.H., A simple proof of the Erdős–Chao Ko–Rado theorem. J. Combin. Th. B 13 (1972b), 183–
184. [498]
Kauers M., Problem 11545. Amer. Math. Monthly 118 (2011), 84. Solution 119 (2012), 885–886. [174]
Kawarabayashi K.i., A survey on Hamiltonian cycles. In Proc. Workshop on Graph. Th. and Related
Topics (Sendai, 1999), 7 (2001), 25–39. [316]
892 References
Kearnes K.A. and E.W. Kiss, Finite algebras of finite complexity. Discr. Math. 207 (1999), 89–135.
[665]
Keedwell A.D. and J. Dénes, Latin squares and their applications (Elsevier/North-Holland, 2015), second
edn. [610]
Keevash P., Shadows and intersections: stability and new proofs. Adv. Math. 218 (2008), 1685–1703.
[496]
Keevash P., Hypergraph Turán problems. In Surveys in combinatorics 2011, London Math. Soc. Lecture
Note Ser. 392 (Cambridge Univ. Press, 2011), 83–139. [475]
Keevash P., The existence of designs (2014). (arXiv:1401.3665). [640]
Keevash P., Counting designs. J. Eur. Math. Soc. (JEMS) 20 (2018), 903–927. [640]
Kellogg A., Problem 10585. Amer. Math. Monthly 104 (1997), 361. Solution 106 (1999), 170–171. [177]
Kelly D., The 3-irreducible partially ordered sets. Canad. J. Math. 29 (1977), 367–383. [573]
Kelly D., On the dimension of partially ordered sets. Discr. Math. 35 (1981), 135–156. [571, 606]
Kelly D. and W.T. Trotter, Dimension theory for ordered sets. In Ordered sets (Banff, Alta., 1981), NATO
Adv. Study Inst. C: Math. Phys. Sci. 83 (Reidel, 1982), 171–211. [572, 573, 583]
Kelly J.B. and L.M. Kelly, Paths and circuits in critical graphs. Amer. J. Math. 76 (1954), 786–792.
[434]
Kelmans A.K., The number of trees in a graph, I and II. Automat. Remote Control 26/27 (1965/66), 2118–
2129, 233–241. [778]
Kelmans A.K., The properties of the characteristic polynomial of a graph (Russian). Cybernetics 4 (Izdat.
“Énergija”, 1967), 27–41. [777, 782]
Kelmans A.K., A new planarity criterion for 3-connected graphs. J. Graph Th. 5 (1981), 259–267.
[393]
Kelmans A.K., A strengthening of the Kuratowski planarity criterion for 3-connected graphs. Discr.
Math. 51 (1984), 215–220. [393]
Kelmans A.K., On Hamiltonicity of {claw, net}-free graphs. Discr. Math. 306 (2006), 2755–2761. [297]
Kelmans A.K. and V.M. Chelnokov, A certain polynomial of a graph and graphs with an extremal number
of trees. J. Combin. Th. B 16 (1974), 197–214. [777]
Kempe A.B., On the geographical problem of four colours. Amer. J. Math. 2 (1879), 193–200. [399]
Kempe A.B., A memoir on the theory of mathematical form. In Philosophical Transactions of the Royal
Society of London 177 (1886), 1–70. [213]
Kendall M.G. and B.B. Smith, On the method of paired comparisons. Biometrika 31 (1940), 324–345.
[228]
Kerimov A., Problem 11454. Amer. Math. Monthly 116 (2009), 746. Solution 118 (2011), 659. [315]
Keselman G., Solution to problem 11274. Amer. Math. Monthly 115 (2008). Proposed 114 (2007), 165.
[116]
Kézdy A.E. and H.St.C. Snevily, Distinct sums modulo n and tree embeddings. Combin. Probab. Comput.
11 (2002), 35–42. [746]
Khan M.A., Problem E3451. Amer. Math. Monthly 98 (1991), 645. Solution 100 (1993), 303. [133]
Kharaghani H. and B. Tayfeh-Rezaie, A Hadamard matrix of order 428. J. Combin. Des. 13 (2005), 435–
440. [622]
Khare C.B., Problem E3315. Amer. Math. Monthly 96 (1989), 253. Solution 98 (1991), 366–367. [440]
Kierstead H.A., Long stars specify -bounded classes. In Sets, graphs and numbers (Budapest, 1991),
Colloq. Math. Soc. János Bolyai 60 (North-Holland, 1992), 421–428. [352]
Kierstead H.A., On the choosability of complete multipartite graphs with part size three. Discr. Math.
211 (2000), 255–259. [355, 356]
Kierstead H.A. and G. Konjevod, Coloring number and on-line Ramsey theory for graphs and hyper-
graphs. Combinatorica 29 (2009), 49–64. [457]
Kierstead H.A. and A.V. Kostochka, Efficient graph packing via game colouring. Combin. Probab. Com-
put. 18 (2009), 765–774. [248]
Kierstead H.A. and S.G. Penrice, Recent results on a conjecture of Gyárfás. In Proc. 21st Southeastern
Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), 79 (1990), 182–186. [352]
References 893
Kierstead H.A. and S.G. Penrice, Radius two trees specify -bounded classes. J. Graph Th. 18 (1994),
119–129. [352]
Kierstead H.A., A. Salmon, and R. Wang, On the choice number of complete multipartite graphs with
part size four (2014). (arXiv:1407.3817v1). [356]
Kierstead H.A. and W.T. Trotter, Explicit matchings in the middle levels of the Boolean lattice. Order 5
(1988), 163–171. [50]
Kierstead H.A. and W.T. Trotter, A note on removable pairs. In Graph theory, combinatorics, and appli-
cations. Vol. 2 (Kalamazoo, MI, 1988), Wiley-Intersci. Publ. (Wiley, 1991), 739–742. [584]
Kierstead H.A. and Y. Zhu, Radius three trees in graphs with large chromatic number. SIAM J. Discr.
Math. 17 (2004), 571–581. [352]
Kim J.H., The Ramsey number R(3 , t) has order of magnitude t2/log t. Random Structures Algorithms
7 (1995), 173–207. [451, 664, 682]
Kim S.J. and W.J. Park, List dynamic coloring of sparse graphs. In Combinatorial optimization and
applications, Lecture Notes in Comput. Sci. 6831 (Springer, 2011), 156–162. [424]
Kimble R.J., Jr, Extremal Problems in Dimension–Theory for Partially-Ordered Sets (ProQuest, 1973).
Ph.D. Thesis, Massachusetts Inst. Tech. [573]
Kimble R.J., Jr. and A.J. Schwenk, On universal caterpillars. In The theory and applications of graphs
(Kalamazoo, 1980) (Wiley, 1981), 437–447. [187]
King A.D. and B.A. Reed, A short proof that can be bounded away from + 1 toward . J. Graph
Th. 81 (2016), 30–34. [685]
Kirchhoff G., über die Auflösung der Gleichungen, auf welche man bei der Untersuchung der linearen
Verteilung galvanischer Ströme geführt wird. Ann. Phys. Chem. 72 (1847), 497–508. [37]
Kirdar M.S. and T.H.R. Skyrme, On an identity relating to partitions and repetitions of parts. Canad.
J. Math. 34 (1982), 194–195. [152]
Kirkman T.P., On a problem in cominations. Cambridge and Dublin Math. J. 2 (1847), 191–204.
[612, 641]
Kirkman T.P. In The Lady’s and Gentleman’s Diary, (J. Greenhill, 1850) (1850). [649]
Kislicyn S.S., Finite partially ordered sets and their corresponding permutation sets. Mat. Zametki 4
(1968), 511–518. [823]
Klavžar S., U. Milutinović, and C. Petr, On the Frame–Stewart algorithm for the multi-peg Tower of
Hanoi problem. Discrete Appl. Math. 120 (2002), 141–157. [70]
Klavžar S. and M. Petkovšek, Problem E3281. Amer. Math. Monthly 95 (1988), 655. Solution 97 (1990),
924–925. [606]
Klazar M., The Füredi–Hajnal conjecture implies the Stanley–Wilf conjecture. In Formal power series
and algebraic combinatorics (Moscow, 2000) (Springer, 2000), 250–255. [432]
Kleitman D., On Dedekind’s problem: The number of monotone Boolean functions. Proc. Amer. Math.
Soc. 21 (1969), 677–682. [509, 558]
Kleitman D., Review of “On a problem of Moser”. MathSciNet Review (1973). MR0297582 (45 #6636)
[551]
Kleitman D.J., On a lemma of Littlewood and Offord on the distribution of certain sums. Math. Z. 90
(1965), 251–259. [565]
Kleitman D.J., Families of non-disjoint subsets. J. Combin. Th. 1 (1966), 153–155. [595, 608]
Kleitman D.J., On families of subsets of a finite set containing no two disjoint sets and their union. J.
Combinatorial Theory 5 (1968), 235–237. [500]
Kleitman D.J., The crossing number of K 5 ,n. J. Combin. Th. 9 (1970), 315–323. [566, 793, 797]
Kleitman D.J., On an extremal property of antichains in partial orders. The LYM property and some of
its implications and applications. In Combinatorics (Proc. NATO Advanced Study Inst., Breuke-
len, 1974), Part 2: Graph theory; foundations, partitions and combinatorial geometry (Math. Cen-
trum, 1974), 77–90. Math. Centre Tracts, No. 56. [559]
Kleitman D.J., A note on some subset identities. Studies in Appl. Math. 54 (1975), 289–292. [40]
894 References
Kleitman D.J., Extremal hypergraph problems. In Surveys in combinatorics (Proc. Seventh British Com-
binatorial Conf., 1979), London Math. Soc. Lecture Note Ser. 38 (Cambridge Univ. Press, 1979),
44–65. [501]
Kleitman D.J., Extremal problems on hypergraphs. In Extremal problems for finite sets (Visegrád, 1991),
Bolyai Soc. Math. Stud. 3 (János Bolyai Math. Soc., 1994), 355–374. [493]
Kleitman D.J. and T.L. Magnanti, On the number of latent subsets of intersecting collections. J. Combin.
Th. A 16 (1974), 215–220. [501]
Kleitman D.J. and G. Markowsky, On Dedekind’s problem: the number of isotone Boolean functions. II.
Trans. Amer. Math. Soc. 213 (1975), 373–390. [558, 580]
Kleitman D.J., J. Shearer, and D. Sturtevant, Intersections of ¾ -element sets. Combinatorica 1 (1981),
381–384. [507]
Klešč M., R.B. Richter, and I. Stobert, The crossing number of C5 × Cn . J. Graph Theory 22 (1996), 239–
243. [794]
Klotz W., A constructive proof of Kuratowski’s Theorem. Ars Combinatoria 28 (1989), 51–54. [393]
Klove T., Problem 10460. Amer. Math. Monthly 102 (1995), 553. Solution 105 (1998), 69. [22]
Kneser M., Aufgabe 300 (German). Jahresber Deutsch. Math.-Verein 58 (1955), 27. [251, 811]
Knuth D., Problem 12055. Amer. Math. Monthly 125 (2018), 660. Solution 127 (2020), 186. [152]
Knuth D.E., The Art of Computer Programming, Vol. 1: Fundamental Algorithms (Addison-Wesley,
1968). Also 1973, 1997. [99, 101, 122]
Knuth D.E., Permutations, matrices, and generalized Young tableaux. Pacific J. Math. 34 (1970), 709–
727. [193, 195, 198, 208]
Knuth D.E., The Art of Computer Programming. Vol. 3: Sorting and searching (Addison-Wesley, 1973).
[50, 101, 190, 193]
Knuth D.E., Big omicron and big omega and big theta. ACM SIGACT News 8 (1976a), 18–24. [10]
Knuth D.E., Mariages Stables (Les Presses de l’Univ. de Montréal, 1976b). English trans. AMS, 1997.
[286]
Knuth D.E., Problem E3463. Amer. Math. Monthly 98 (1991), 852. Solution 100 (1993), 693–4. [441]
Knuth D.E., Problem 10298. Amer. Math. Monthly 100 (1993), 400. Solution 103 (1996), 80–81. [133]
Knuth D.E., Problem 10546. Amer. Math. Monthly 103 (1996), 695. Solution 105 (1998), 867–8. [176]
Knuth D.E., Problem 10720. Amer. Math. Monthly 106 (1999), 264. Solution 110 (2003), 60–61. [669]
Knuth D.E., Problem 11151. Amer. Math. Monthly 112 (2005), 367. Solution 114 (2007), 265–266. [81]
Knuth D.E., Problem 11274. Amer. Math. Monthly 114 (2007), 165. Solution 116 (2009), 548–549.
[35, 116]
Knuth D.E., Problem 11452. Amer. Math. Monthly 116 (2009), 648. Solution 118 (2011), 657. [65]
Knuth D.E., Problem 11985. Amer. Math. Monthly 124 (2017), 275. Solution 126 (2019), March. [567]
Knuth D.E. and T.J. Buckholtz, Computation of tangent, Euler, and Bernoulli numbers. Math. Comp.
21 (1967), 663–688. [65]
Knuth D.E. and J. McCarthy, Problem E3429. Amer. Math. Monthly 98 (1991), 264. Solution 99 (1992),
684. [667]
Koebe P., Contaktprobleme der konformen Abbildung (German). Berichte Über die Verhandlungen der
Sächsischen Akad. Wissen. Leipzig, Math.-Phys. Klasse 88 (1936), 141–164. [394]
Kohayakawa Y., Szemerédi’s regularity lemma for sparse graphs. In Foundations of computational math-
ematics (Rio de Janeiro, 1997) (Springer, 1997), 216–230. [488]
Kohayakawa Y. and V. Rödl, Szemerédi’s regularity lemma and quasi-randomness. In Recent advances
in algorithms and combinatorics, CMS Books Math./Ouvrages Math. SMC 11 (Springer, 2003),
289–351. [488]
Kohayakawa Y., V. Rödl, M. Schacht, and E. Szemerédi, Sparse partition universal graphs for graphs of
bounded degree. Adv. Math. 226 (2011), 5041–5065. [455]
Köhler E., über das Oberwolfacher Problem. In Beiträge zur geometrischen Algebra (Proc. Sympos.,
Duisburg, 1976), Lehrbücher Monograph. Geb. Exakten Wissensch., Math. Reihe 21 (Birkhäuser,
Basel, 1977), 189–201. [647]
References 895
Kollár J., L. Rónyai, and T. Szabó, Norm-graphs and bipartite Turán numbers. Combinatorica 16 (1996),
399–406. [633, 672]
Komlós J., A strange pigeonhole principle. Order 7 (1990), 107–113. [823]
Komlós J., G.N. Sárközy, and E. Szemerédi, Blow-up lemma. Combinatorica 17(1997),109–123. [481]
Komlós J., A. Shokoufandeh, M. Simonovits, and E. Szemerédi, The regularity lemma and its applica-
tions in graph theory. In Theoretical aspects of computer science (Tehran, 2000), Lect. Notes Comp.
Sci. 2292 (Springer, 2002), 84–112. [488]
Komlós J. and M. Simonovits, Szemerédi’s regularity lemma and its applications in graph theory. In
Combinatorics, Paul Erdős is eighty, Vol. 2 (Keszthely, 1993), Bolyai Soc. Math. Stud. 2 (János
Bolyai Math. Soc., 1996), 295–352. [488, 492]
Komlós J. and E. Szemerédi, Topological cliques in graphs II. Combin. Probab. Comput. 5 (1996), 79–
90. [351]
Komm H., On the dimension of partially ordered sets. Amer. J. Math. 70 (1948), 507–520. [571]
Konheim A.G. and B. Weiss, An occupancy discipline and applications. SIAM J. Applied Math. 14 (1966),
1266–1274. [50]
König D., Über Graphen und ihre Anwendung auf Determinantentheorie und Mengenlehre. Math. Ann.
77 (1916), 453–465. [256, 259, 359, 371]
König D., Graphen und Matrizen. Mat. Lapok 38 (1931), 116–119. [258, 530]
König D., Theorie der endlichen und unendlichen Graphen (Akademische Verlagsgesellschaft, 1936).
Also Chelsea, 1950; Teubner, 1986. [763]
Kopylov G.N., Maximal paths and cycles in a graph. Dokl. Akad. Nauk SSSR 234 (1977), 19–21. [323]
Korshunov A.D., The number of monotone Boolean functions. Problemy Kibernet. (1981), 5–108, 272.
[558]
Koshy T., Fibonacci and Lucas numbers with applications, Pure and Applied Mathematics (New York)
(Wiley-Interscience, 2001). [53]
Kostochka A.V., The total coloring of a multigraph with maximal degree 4. Discr. Math. 17 (1977), 161–
163. [373]
Kostochka A.V., The minimum Hadwiger number for graphs with a given mean degree of vertices.
Metody Diskret. Analiz. (1982), 37–58. [710]
Kostochka A.V., The total chromatic number of any multigraph with maximum degree five is at most
seven. Discr. Math. 162 (1996), 199–214. [373]
Kostochka A.V., Extremal problems on -systems. In Numbers, information and complexity (Bielefeld,
1998) (Kluwer Acad. Publ., 2000), 143–150. [504]
Kostochka A.V., A new tool for proving Vizing’s theorem. Discr. Math. 326 (2014), 1–3. [360]
Kostochka A.V., M.J. Pelsmajer, and D.B. West, A list analogue of equitable coloring. J. Graph Theory
44 (2003), 166–177. [374]
Kostochka A.V. and V. Rödl, On graphs with small Ramsey numbers. J. Graph Th. 37 (2001), 198–204.
[484]
Kostochka A.V. and V. Rödl, On graphs with small Ramsey numbers. II. Combinatorica 24 (2004), 389–
401. [672]
Kostochka A.V. and N. Sheikh, On the induced Ramsey number IR(P3 , H). In Topics in discrete mathe-
matics, Algorithms Combin. 26 (Springer, 2006), 155–167. [460]
Kostochka A.V. and D.B. West, Chvátal’s condition cannot hold for both a graph and its complement.
Discuss. Math. Graph Theory 26 (2006), 73–76. [332, 705]
Kostochka A.V. and M. Yancey, Ore’s conjecture for ¾ = 4 and Grötzsch’s theorem. Combinatorica 34
(2014), 323–329. Generalized in “Ore’s conjecture on color-critical graphs is almost true,” J. Com-
bin. Th. B (2014). [355, 414, 420]
Kotzig A., Contribution to the theory of Eulerian polyhedra. Mat.-Fyz. Časopis. Slovensk. Akad. Vied 5
(1955), 101–113. [411]
Kotzig A., Aus der Theorie der endlichen regulären Graphen dritten und vierten Grades. Časopis Pěst.
Mat. 82 (1957), 76–92. [273]
896 References
Kotzig A., On the theory of finite graphs with a linear factor. I, II, III. Mat.-Fyz. Časopis. Slovensk. Akad.
Vied. 9/10 (1959), 73–91, 136–159; 205–215. [264, 276]
Kotzig A., On even regular graphs of the third degree. Mat.-Fyz. C̆asopis Sloven. Akad. Vied 16 (1966a),
72–75. [227]
Kotzig A., 1-factorizations of Cartesian products of regular graphs. J. Graph Th. 3(1979),23–34. [371]
Kotzig A. and A. Rosa, Nearly Kirkman systems. In Proc. 5th Southeastern Intl. Conf. Combin. Graph
Th. Comput. (Boca Raton), Congr. Numer. 10 (1974), 607–614. [647]
Kouider M. and P.D. Vestergaard, Connected factors in graphs—a survey. Graphs Combin. 21 (2005),
1–26. [327]
Kouril M., Computing the van der Waerden number W(3 , 4) = 293. Integers 12 (2012), Paper No. A46,
13. [465]
Kouril M. and J.L. Paul, The van der Waerden number W(2 , 6) is 1132. Experiment. Math. 17 (2008),
53–61. [465]
Kovář P., M. Kubesa, and M. Meszka, Factorizations of complete graphs into brooms. Discr. Math. 312
(2012), 1084–1093. [239]
Kövari T., V.T. Sós, and P. Turán, On a problem of K. Zarankiewicz. Colloquium Math. 3 (1954), 50–57.
[631, 672]
Kraitchik M., The Gambler’s Ruin. Mathematical Recreations (W. W. Norton, 1942), 140. [66]
Kratochvı́ l J., Z. Tuza, and M. Voigt, Brooks-type theorems for choosability with separation. J. Graph
Theory 27 (1998), 43–49. [403]
Krattenthaler C., Bijective proofs of the hook formulas for the number of standard Young tableaux,
ordinary and shifted. Electron. J. Combin. 2 (1995), Research Paper 13. [192]
Krattenthaler C., The enumeration of lattice paths with respect to their number of turns. In Ad-
vances in combinatorial methods and applications to probability and statistics, Stat. Ind. Tech-
nol. (Birkhäuser Boston, 1997), 29–58. [50]
Krattenthaler C., Advanced determinant calculus. Sém. Lothar. Combin. 42 (1999), Art. B42q, 67 pp.
(electronic). The Andrews Festschrift (Maratea, 1998). [170]
Kratzke T., B. Reznick, and D.B. West, Eigensharp graphs: decomposition into complete bipartite sub-
graphs. Trans. Amer. Math. Soc. 308 (1988), 637–653. [771]
Kriz I., A hypergraph-free construction of highly chromatic graphs without short cycles. Combinatorica
9 (1989), 227–229. [341, 434]
Król M., On a sufficient and necessary condition of 3-colorableness for the planar graphs. I, II. Prace
Nauk. Inst. Mat. Fiz. Teoret. Politechn. Wrocław. Ser. Studia i Materiały (1972), 37–40. [419]
Kruskal J.B., On the shortest spanning subtree of a graph and the traveling salesman problem. Proc.
Am. Math. Soc. 7 (1956), 48–50. [245]
Kruskal J.B., The number of simplices in a complex. In Mathematical optimization techniques (Univ.
California Press, 1963), 251–278. [495, 496]
Kruskal J.B., Jr., Monotonic subsequences. Proc. Amer. Math. Soc. 4 (1953), 264–274. [431]
Kubale M. (ed.), Graph colorings, Contemporary Mathematics 352 (AMS, 2004). [335]
Kuczma M.S., A multi-well problem for phase transformations. In The mathematics of finite elements
and applications, X, MAFELAP 1999 (Uxbridge) (Elsevier, 2000), 271–282. [24]
Kühn D. and D. Osthus, Embedding large subgraphs into dense graphs. In Surveys in combinatorics
2009, London Math. Soc. Lecture Note Ser. 365 (Cambridge Univ. Press, 2009), 137–167. [488]
Kühn D. and D. Osthus, Hamilton cycles in graphs and hypergraphs: an extremal perspective. In Proc.
of the Int. Congr. Math. IV (Seoul, 2014) (Kyung Moon Sa, 2014), 381–406. [316]
Kuhn H.W., The Hungarian method for the assignment problem. Naval Research Logistics Quarterly 2
(1955), 83–97. [280]
Kündgen A., Art galleries with interior walls. Discrete Comput. Geom. 22 (1999), 249–258. [419]
Kündgen A. and R. Ramamurthi, Coloring face-hypergraphs of graphs on surfaces. J. Combin. Th. B 85
(2002), 307–337. [287]
Kuo E.H., Applications of graphical condensation for enumerating matchings and tilings. Theoret. Com-
put. Sci. 319 (2004), 29–57. [34]
References 897
Kuperberg G., Symmetries of plane partitions and the permanent-determinant method. J. Combin. Th.
A 68 (1994), 115–151. [756]
Kuperberg G., An exploration of the permanent-determinant method. Electron. J. Combin. 5 (1998),
Research Paper 46. [756]
Kuperberg G., Kasteleyn cokernels. Electron. J. Combin. 9 (2002), Research Paper 29, 30. [34]
Kupka J., Problem E3402. Amer. Math. Monthly 97 (1990), 612. Solution 99 (1992), 367. [49]
Kuratowski K., Sur le problème des courbes gauches en topologie. Fund. Math. 15 (1930), 271–283.
[390]
Labelle G., Une nouvelle démonstration combinatoire des formules d’inversion de Lagrange. Adv. in
Math. 42 (1981), 217–247. [129]
Lagrange J.L., Nouvelle méthode pour résoudre des équations littérales par le moyen des séries. Mém.
Acad. Roy. des Sci. et Belles-Lettres de Berlin 24 (1770). [129]
Lam C.W.H., L. Thiel, and S. Swiercz, The nonexistence of finite projective planes of order 10. Canad.
J. Math. 41 (1989), 1117–1123. [612]
Lamé G., Note sur la limite du nombre des divisions dans la recherche du plus grand commun diviseur
entre deux nombres entiers. C. R. Acad. Sci. Paris 19 (1844), 867–870. [67]
Landau E., Handbuch der Lehre von der Verteilung der Primzahlen (German) (Teubner, 1909). [10]
Landau H.G., On dominance relations and the structure of animal societies, III: The condition for score
structure. Bull. Math. Biophys. 15 (1953), 143–148. [225, 228, 261]
Lander E.S., Symmetric designs and self-dual codes. J. London Math. Soc. (2) 24 (1981), 193–204.
[623]
Lander E.S., Symmetric designs: an algebraic approach, London Mathematical Society Lecture Note Se-
ries 74 (Cambridge Univ. Press, 1983). [637]
Landman B.M. and A. Robertson, Ramsey theory on the integers (2nd ed.), Student Mathematical Library
73 (AMS, 2014). [425]
Larman D.G., J. Matoušek, J. Pach, and J. Törőcsik, A Ramsey-type result for convex sets. Bull. London
Math. Soc. 26 (1994), 132–136. [461]
Larman D.G. and C.A. Rogers, The realization of distances within sets in Euclidean space. Mathematika
19 (1972), 1–24. [729]
Larman D.G., C.A. Rogers, and J.J. Seidel, On two-distance sets in Euclidean space. Bull. London Math.
Soc. 9 (1977), 261–267. [724]
Las Vergnas M., Sur l’existence de cycles hamiltoniens dans un graphe. C. R. Acad. Sci. Paris Sér. A-B
270 (1970), A1361–A1364. [333]
Las Vergnas M., A note on matchings in graphs. Cahiers Centre Études Recherche Opér. 17 (1975), 257–
260. [272]
Lassak M., An estimate concerning Borsuk partition problem. Bull. Acad. Polon. Sci. Sér. Sci. Math. 30
(1982), 449–451 (1983). [817]
Lavallée I., Note sur le problème des Tours de Hanoı̈. Acta Math. Vietnam. 7 (1982), 131–137 (1984).
[80]
Lawler E.L., Combinatorial Optimization: Networks and Matroids (Holt, Rinehart, and Winston, 1976).
[282, 532]
Lawrence J., Covering the vertex set of a graph with subgraphs of smaller degree. Discr. Math. 21 (1978),
61–68. [355]
Lawrence S.L., Cycle-star Ramsey numbers. Notices Amer. Math. Soc. 20 (1973), A–420 (Notice #73T–
157). [460]
Laywine C.F. and G.L. Mullen, Discrete mathematics using Latin squares, Wiley-Interscience Series in
Discr. Mathematics and Optimization (Wiley & Sons, 1998). [623, 656]
Lazarson T., Independence functions in algebra (U. London, 1957). Thesis. [537]
Lebesgue H., Quelques conséquences simples de la formule d’Euler. J. Math. Pures Appl. 19 (1940), 27–
43. [422]
Lederberg J., Systematics of organic molecules, graph topology and Hamiltonian circuits (Instrumenta-
tion Res. Lab. Rept.). Tech. Rep. 1040, Stanford Univ. (1966). [418]
898 References
Lee C., Lecture notes for Extremal Combinatorics (Spring 2015 course at mit) (2015). Available online
at http://math.mit.edu/˜cb_lee/18.318/materials.html. [488, 672]
Lee C., Ramsey numbers of degenerate graphs (2017). (arXiv:1505.04773). [484]
Lefmann H., V. Rödl, and R. Thomas, Monochromatic vs multicolored paths. Graphs Combin. 8 (1992),
323–332. [471]
Lefschetz S., Introduction to Topology, Princeton Mathematical Series, vol. 11 (Princeton Univ. Press,
1949). [807]
Lehman A., A solution of the Shannon switching game. J. Soc. Indust. Appl. Math. 12 (1964), 687–725.
[528, 539]
Lehmer D.H., Lacunary recurrence formulas for the numbers of Bernoulli and Euler. Ann. of Math. (2)
36 (1935), 637–649. [65]
Leighton F.T., Complexity Issues in VLSI: optimal layouts for the shuffle-exchange graph and other net-
works, Foundations of Computing (MIT Press, 1983). [793]
Lekkerkerker C.G., Representation of natural numbers as a sum of Fibonacci numbers. Simon Stevin
29 (1952), 190–195. [61]
LeSaulnier T., Finding a repeated difference (solution to problem 11084). Amer. Math. Monthly 113
(2006), 371–372. Proposed 111 (2004), 440. [441]
Lesniak L.M., Hamiltonicity in some special classes of graphs. Congr. Numer. 116 (1996), 53–70.
[316]
Leuck D.H., Solution to problem E3057. Amer. Math. Monthly 94 (1987), 187–188. Proposed 91 (1984),
515. [175]
Li H., Generalizations of Dirac’s theorem in Hamiltonian graph theory—a survey. Discr. Math. 313
(2013), 2034–2053. [316]
Li Q., M.Q. Tao, and Y.Q. Shen, The bandwidth of the discrete tori Cm × Cn. J. China Univ. Sci. Tech.
11 (1981), 1–16. [801, 819]
Li S.Y.R. and W.C.W. Li, Independence numbers of graphs and generators of ideals. Combinatorica 1
(1981), 55–61. [740]
Li X.L., The connectivity of path graphs. In Combinatorics, graph theory, algorithms and applications
(Beijing, 1993) (World Sci. Publ., 1994), 187–192. [312]
Lick D.R., Characterizations of n-connected and n-line-connected graphs. J. Combin. Th. B 14 (1973),
122–124. [312]
Liggett T.M., Extensions of the Erdős–Ko–Rado theorem and a statistical application. J. Combinatorial
Th. A 23 (1977), 15–21. [511]
Lih K.W., C.Y. Lin, and L.D. Tong, On an interpolation property of outerplanar graphs. Discrete Appl.
Math. 154 (2006), 166–172. [287]
Lindner C.C. and C.A. Rodger, Design Theory (CRC Press, 1997). Also 2009. [609, 641]
Lindström B., On a combinatorial problem in number theory. Canad. Math. Bull. 8 (1965), 477–490.
[513]
Lindström B., On the vector representations of induced matroids. Bull. London Math. Soc. 5 (1973), 85–
90. [165, 167, 169]
Lindström B., A partition of L(3 , n) into saturated symmetric chains. European J. Combin. 1 (1980),
61–63. [557]
Linial N., A lower bound for the circumference of a graph. Discr. Math. 15 (1976), 297–300. [323]
Linial N., Extending the Greene–Kleitman theorem to directed graphs. J. Combin. Th. A 30 (1981), 331–
334. [549]
Linial N., A new derivation of the counting formula for Young tableaux. J. Combin. Theory A 33 (1982),
340–342. [207]
Linial N., The information-theoretic bound is good for merging. SIAM J. Comput. 13 (1984), 795–801.
[823]
Liouville B., Sur la connectivité des produits de graphes. C. R. Acad. Sci. Paris Sér. A-B 286 (1978),
A363–A365. [292]
Lipski W., Jr., On strings containing all subsets as substrings. Discr. Math. 21 (1978), 253–259. [566]
References 899
Lipton R.J. and R.E. Tarjan, A separator theorem for planar graphs. SIAM J. Appl. Math. 36 (1979),
177–189. [394–396, 399]
Lipton R.J. and R.E. Tarjan, Applications of a planar separator theorem. SIAM J. Comput. 9 (1980),
615–627. [399]
Littlewood D.E., The Theory of Group Characters and Matrix Representations of Groups (Oxford Univ.
Press, 1940). Also 1950. [207]
Liu B., The theorem on partition of connected graph and its applications in graphical enumeration. J.
South China Normal Univ. (Natural Science) 1 (1985), 51–56. [236]
Liu C.L., Topics in combinatorial mathematics (MAA, 1972). MAA Summer Seminar lect. notes. [17]
Liu H., R. Morris, and N. Prince, Highly connected monochromatic subgraphs of multicolored graphs.
J. Graph Th. 61 (2009), 22–44. [460]
Liu J. and H. Zhou, Maximum induced matchings in graphs. Discr. Math. 170 (1997), 277–281. [262]
Locke S.C., Problem 10447. Amer. Math. Monthly 102 (1995), 360. Solution 104 (1997), 976. [229]
Locke S.C., Problem 10892. Amer. Math. Monthly 108 (2001), 668. Solution 110 (2003), 440–1. [330]
Logan B.F. and L.A. Shepp, A variational problem for random Young tableaux. Advances in Math. 26
(1977), 206–222. [722, 821]
Long C.T., On the Moessner theorem on integral powers. Am. Math. Monthly 73 (1966), 846–851. [62]
Long C.T., Strike it out: Add it up. Math. Gazette 66 (1982), 273–277. [62]
Long C.T., A note on Moessner’s process. Fibonacci Quart. 24 (1986), 349–355. [62]
Longyear J.Q. and T.D. Parsons, The friendship theorem. Nederl. Akad. Wetensch. Proc. A 75=Indag.
Math. 34 (1972), 257–262. [776]
Loomis L.H. and H. Whitney, An inequality related to the isoperimetric inequality. Bull. Amer. Math.
Soc 55 (1949), 961–962. [513]
Lossers O.P. and R.S. Pinkham, Noncrossing trees, solution I to problem e3170. Amer. Math. Monthly
96 (1989), 359–361. Proposed by Howard University Group, 93 (1986), 650. [129]
Lovász L., On graphs not containing independent circuits. Mat. Lapok 16 (1965), 289–299. [272]
Lovász L., On decomposition of graphs. Studia Sci. Math. Hungar. 1 (1966), 237–238. [249, 262, 355]
Lovász L., On covering of graphs. In Theory of Graphs (Tihany, 1966) (P. Erdős and G. Katona, eds.)
(Academic Press, 1968a), 231–236. [232]
Lovász L., On chromatic number of finite set-systems. Acta Math. Acad. Sci. Hung. 19 (1968b), 59–67.
[434, 436]
Lovász L., Normal hypergraphs and the perfect graph conjecture. Discr. Math. 2 (1972a), 253–267.
[368, 369, 375, 376]
Lovász L., A characterization of perfect graphs. J. Combin. Th. B 13 (1972b), 95–98. [369]
Lovász L., On the structure of factorizable graphs. Acta Math. Hungarica 23 (1972c), 179–195. [276]
Lovász L., On the sieve formula. Mat. Lapok 23 (1972d), 53–69 (1973). [477]
Lovász L., Problem 5. Period. Math. Hungar. 4 (1974), 82. [308, 310]
Lovász L., Three short proofs in graph theory. J. Combin. Th. B 19 (1975), 269–271. [263, 264]
Lovász L., A homology theory for spanning trees of a graph. Acta Math. Acad. Sci. Hungar. 30 (1977),
241–251. [312]
Lovász L., Kneser’s conjecture, chromatic number, and homotopy. J. Combin. Th. A 25 (1978), 319–324.
[342, 532, 812]
Lovász L., Combinatorial problems and exercises (North-Holland, 1979).
[47, 104, 495, 496, 510, 762, 764]
Lovász L., Combinatorial problems and exercises, 2nd ed. (North-Holland, 1993). [419, 491]
Lovász L., J. Nešetřil, and A. Pultr, On a product dimension of graphs. J. Combin. Th. B 28 (1980), 47–
67. [511, 726]
Lovász L. and M.D. Plummer, Matching Theory, Ann. Discrete Math. 29 (Akademiai Kiado and North-
Holland, 1986). [262, 275, 756, 764]
Lovász L. and M. Simonovits, On the number of complete subgraphs of a graph. In Proc. 5th British
Combin. Conf. (Univ. Aberdeen, 1975), 15 (Utilitas Math., 1976), 431–441. [478]
900 References
Lovász L. and M. Simonovits, On the number of complete subgraphs of a graph. II. In Studies in pure
mathematics (Birkhäuser, 1983), 459–495. [478]
Lovász L. and P. Winkler, A note on the last new vertex visited by a random walk. J. Graph Theory 17
(1993), 593–596. [668]
Lu X., A Chvátal–Erdős type condition for Hamiltonian graphs. J. Graph Th. 18 (1994), 791–800.
[322]
Lu X., D.W. Wang, and C.K. Wong, On avoidable and unavoidable claws. Discr. Math. 184 (1998), 259–
265. [566]
Lubell D., A short proof of Sperner’s lemma. J. Combinatorial Theory 1 (1966), 299. [558]
Lubell D., Problem 10992. Amer. Math. Monthly 110 (2003), 155. Solution 111 (2004), 827–829. [34]
Lubotzky A., R. Phillips, and P. Sarnak, Explicit expanders and the Ramanujan conjectures. In Proc.
18th ACM Symp. Th. Comp. (Assoc. Comput. Mach., 1986), 240–246. [780]
Lubotzky A., R. Phillips, and P. Sarnak, Ramanujan graphs. Combinatorica 8 (1988), 261–277.
[341, 434]
Lucas F.E.A., Sur les congruences des nombres eulériens et les coefficients différentiels des functions
trigonométriques suivant un module premier. Bull. Soc. Math. France 6 (1878), 49–54. [47]
Lucas F.E.A., Note sur les intersections de trois quadriques. Bull. Soc. Math. France 19 (1891), 118–119.
[162]
Lucas F.E.A., Sur les polygones inscrits dans les coniques. Bull. Soc. Math. France 20 (1892), 33–34.
[238]
Luce R.D., Semiorders and a theory of utility discrimination. Econometrica 24 (1956), 178–191. [585]
Luo R. and C.Q. Zhang, Edge coloring of graphs with small average degrees. Discr. Math. 275 (2004),
207–218. [423]
Lützen J., G. Sabidussi, and B. Toft, Julius Petersen 1839–1910. A biography. Discr. Math. 100 (1992),
5–82. [740]
Lyusternik L.A. and L. Shnirel’man, Topological Methods in the Calculus of Variations (Russian)
(Moscow, 1930). [810]
Ma M. and D.B. West, Problem 11731. Amer. Math. Monthly 120 (2013), 755. Solution 122 (2015), 807.
[371]
Mabry R., Bipartite graphs and the Four-color Theorem. Bull. ICA 14 (1995), 119–112. [417]
MacLane S., Some interpretations of abstract linear dependence in terms of projective geometry. Amer.
J. Math. 58 (1936), 236–240. [514, 529]
MacMahon P.A., Combinatory analysis, I and II (Cambridge Univ. Press, 1916). Reprinted Chelsea, 1960;
Dover, 2004. [45, 149, 169, 178, 207]
MacNeish H.F., Euler squares. Ann. of Math. (2) 23 (1922), 221–227. [611]
Maddox R., The superregular graphs (solution to Problem 6617). Amer. Math. Monthly 103 (1996), 600–
603. Proposed 96 (1989), 942. [782]
Madej T. and D.B. West, The interval inclusion number of a partially ordered set. Discr. Math. 88 (1991),
259–277. [832]
Mader W., Homomorphieeigenschaften und mittlere Kantendichte von Graphen. Math. Ann. 174 (1967),
265–268. [350]
Mader W., Homomorphiesätze für Graphen. Math. Ann. 178 (1968), 154–168. [710]
Mader W., Minimale n-fach kantenzusammenhängende Graphen. Math. Ann. 191 (1971), 21–28.
[309]
Mader W., Existenz n-fach zusammenhängender Teilgraphen in Graphen genügend grosser Kanten-
dichte. Abh. Math. Sem. Univ. Hamburg 37 (1972), 86–97. [296, 310, 311, 315, 316]
Mader W., 1-Faktoren von Graphen. Math. Ann. 201 (1973), 269–282. [264]
Mader W., A reduction method for edge-connectivity in graphs. Ann. Discr. Math. 3 (1978), 145–164.
[308, 310]
Mader W., Zur Struktur minimal n-fach zusammenhängender Graphen. Abh. Math. Sem. Univ. Ham-
burg 49 (1979), 49–69. [311, 316]
References 901
Mader W., On vertices of degree n in minimally n-connected graphs and digraphs. In Combinatorics,
Paul Erdős is eighty (Keszthely, 1993), Bolyai Soc. Math. Stud. (János Bolyai Math. Soc., 1996),
423–449. [311]
Mader W., 3n − 5 edges do force a subdivision of K 5 . Combinatorica 18 (1998), 569–595. [351, 353]
Mahmoodian S.E., On edge-colorability of Cartesian products of graphs. Canad. Math. Bull. 24 (1981),
107–108. [371]
Maillet E., Contributions à la théorie des groupes. TIM (9) 6 (1894), 258–280. [623]
Majumdar K.N., On some theorems in combinatorics relating to incomplete block designs. Ann. Math.
Statistics 24 (1953), 377–389. [730]
Mann H.B., On orthogonal Latin squares. Bull. Amer. Math. Soc. 50 (1950), 249–257. [623]
Mann H.B. and H.J. Ryser, Systems of distinct representatives. Amer. Math. Monthly 60 (1953), 397–
401. [254]
Mantel W., Problem 28, soln. by H. Gouwentak, W. Mantel, J. Teixeira de Mattes, F. Schuh and W.A.
Wythoff. Wiskundige Opgaven 10 (1907), 60–61. [224, 475]
Marcus A. and G. Tardos, Excluded permutation matrices and the Stanley–Wilf conjecture. J. Combin.
Th. A 107 (2004), 153–160. [432, 433]
Marcus M. and M. Newman, On the minimum of the permanent of a doubly stochastic matrix. Duke
Math. J. 26 (1959), 61–72. [765]
Marcus M. and R. Ree, Diagonals of doubly stochastic matrices. Quart. J. Math. 2 (1959), 295–302.
[257]
Margulis G.A., Explicit constructions of concentrators. Problems of Information Transmission 9 (1973),
325–332. [779]
Margulis G.A., Explicit group-theoretic constructions of combinatorial schemes and their applications
in the construction of expanders and concentrators (Russian). Problems of Information Trans-
mission 24 (1988), 39–46. [780]
Marica J., Orthogonal families of sets. Canad. Math. Bull. 14 (1971), 573. [512]
Martin M.H., A problem in arrangements. Bull. Amer. Math. Soc. 40 (1934), 859–864. [763]
Martin R., Notes on Extremal Graph Theory (2012), 101. Available online at
http://orion.math.iastate.edu/rymartin/ISU608EGT/EGTbook.pdf. [488]
Martinov N., Uncontractible 4-connected graphs. J. Graph Th. 6 (1982), 343–344. [313]
Massey J.L., On the fractional weight of distinct binary n-tuples. IEEE Trans. Information Theory IT-
20 (1974), 131. [507]
Matoušek J., Using the Borsuk–Ulam theorem, Universitext (Springer-Verlag, 2003). [806, 810, 812]
Matoušek J., A combinatorial proof of Kneser’s conjecture. Combinatorica 24 (2004), 163–170. [812]
Matoušek J., Thirty-three miniatures, Student Mathematical Library 53 (AMS, 2010). [723]
Matoušek J. and G.M. Ziegler, Topological lower bounds for the chromatic number: a hierarchy. Jahres-
ber. Deutsch. Math.-Verein. 106 (2004), 71–90. [812, 813]
Matsko V.J., D.B. West, and J.E. Wetzel, Trifold arrangements and cevian dissections. J. Geom. 72
(2001), 115–127. [565]
Matthews M.M. and D.P. Sumner, Hamiltonian results in K1 ,3 -free graphs. J. Graph Th. 8 (1984), 139–
146. [326, 330]
Matula D.W., The cohesive strength of graphs. In The Many Facets of Graph Theory (Proc. Conf., Western
Mich. Univ., Kalamazoo, Mich., 1968) (Springer, 1969), 215–221. [353]
Matula D.W., The employee party problem. Notices Amer. Math. Soc. 19 (1972), A–382. [700]
Matula D.W., An extension of Brooks’ Theorem. Tech. Rep. 69, Center for Numerical Analysis, University
of Texas–Austin (1973). [354]
Matula D.W., Ramsey theory for graph connectivity. J. Graph Theory 7 (1983), 95–103. [297]
Matula D.W. and L. Kučera, An expose-and-merge algorithm and the chromatic number of a random
graph. In Random graphs ’87 (Poznań, 1987) (Wiley, 1990), 175–187. [718]
Maunsell F.G., A note on Tutte’s paper “The factorization of linear graphs.”. J. London Math. Soc. 27
(1952), 127–128. [264]
Maurer R., E2404. Amer. Math. Monthly 80 (1973), 316. Proposed 81 (1974), 287. [106]
902 References
Maurer S., The king chicken theorems. Math. Mag. 53 (1980), 67–80. [228]
Maurer S. and I. Rabinovitch, Large minimal realizers of a partial order. Proc. Amer. Math. Soc. 66
(1977), 211–216. [584]
Maurer S., I. Rabinovitch, and W.T. Trotter, Large minimal realizers of a partial order II. Discr. Math.
31 (1980), 297–314. [228]
McConnell R.M. and J.P. Spinrad, Modular decomposition and transitive orientation. Discr. Math. 201
(1999), 189–241. [573]
McDiarmid C.J.H., The solution of a timetabling problem. J. Inst. Math. Appl. 9 (1972), 23–34. [372]
McDiarmid C.J.H., Concentration. In Probabilistic methods for algorithmic discrete mathematics, Algo-
rithms Combin. 16 (Springer, 1998), 195–248. [706, 719, 721]
McFarland R. and H.B. Mann, On multipliers of difference sets. Canad. J. Math. 17 (1965), 541–542.
[637]
McKay B.D., Asymptotics for symmetric 0-1 matrices with prescribed row sums. Ars Combin. 19 (1985),
15–25. [697]
McKay B.D. and S.P. Radziszowski, The first classical Ramsey number for hypergraphs is computed. In
2nd Symp. Disc. Alg. (San Francisco), ACM-SIAM (1991), 304–308. [449]
McKay B.D. and S.P. Radziszowski, R(4 , 5) = 25. J. Graph Th. 19 (1995), 309–322. [449]
McKay B.D. and N.C. Wormald, Asymptotic enumeration by degree sequence of graphs with degrees
o(n1/2). Combinatorica 11 (1991), 369–382. [697]
McKay B.D. and K.M. Zhang, The value of the Ramsey number R(3 , 8). J. Graph Th. 16 (1992), 99–105.
[449]
McKee T.A., Recharacterizing Eulerian: intimations of new duality. Discr. Math. 51 (1984), 327–242.
[239]
McKee T.A., How chordal graphs work. Bull. ICA 9 (1993), 27–39. [374]
McSorley J.P., Counting structures in the Möbius ladder. Discr. Math. 184 (1998), 137–164. [765]
Melham R.S. and A.G. Shannon, A generalization of the Catalan identity and some consequences. Fi-
bonacci Quart. 33 (1995), 82–84. [60]
Menger K., Zur allgemeinen Kurventheorie. Fund. Math. 10 (1927), 95–115. [298, 300]
Merca M., Problem 11767. Amer. Math. Monthly 121 (2014a), 267. Solution 123 (2016), 505–506. [150]
Merca M., Problem 11772. Amer. Math. Monthly 121 (2014b), 366. Solution 123 (2016), 614. [148]
Merris R., Laplacian matrices of graphs: a survey. 197/198 (1994), 143–176. [776]
Merris R., A survey of graph Laplacians. Linear and Multilinear Algebra 39 (1995), 19–31. [776]
Merris R., Laplacian graph eigenvectors. Linear Algebra Appl. 278 (1998), 221–236. [782]
Meshalkin L.D., Generalization of Sperner’s theorem on the number of subsets of a finite set (Russian).
Th. Prob. Appl. 8 (1963), 203–204. [558]
Meyniel H., On the perfect graph conjecture. Discr. Math. 16 (1976), 339–342. [375]
Miao L. and Q. Sun, On the size of critical graphs with maximum degree 8. Discr. Math. 310 (2010),
2215–2218. [414]
√
Micali S. and V.V. Vazirani, An O( | V |·| E|) algorithm for finding maximum matching in general graphs.
In Proc. 21th IEEE Symp. Found. Comp. Sci. (Assoc. Comput. Mach., 1980), 17–27. [284]
Mihók P., On vertex partition numbers of graphs. In Graphs and Other Combin. Topics (Prague, 1982),
Teubner-Texte Math. 59 (Teubner, 1983), 183–8. [418]
Mikola M., The Lucas number as the number of spanning trees. Práce Štúd. Vysokej Školy Doprav. Žiline
Sér. Mat.-Fyz. 2 (1980), 69–77. [65]
Milans K.G., D. Stolee, and D.B. West, Ordered Ramsey theory and track representations of graphs. J.
Comb. 6 (2015), 445–456. [602, 608]
Miller E., Planar graphs as minimal resolutions of trivariate monomial ideals. Doc. Math. 7 (2002), 43–
90. [784]
Miller Z., The bandwidth of caterpillar graphs. In Proc. 12th Southeastern Intl. Conf. Combin. Graph
Th. Comput. (Baton Rouge), Congr. Numer. 33 (1981), 235–252. [819]
Mills G., A quintessential proof of van der Waerden’s theorem on arithmetic progressions. Discr. Math.
47 (1983), 117–120. [463]
References 903
Minty G.J., A theorem on n-coloring the points of a linear graph. Amer. Math. Monthly 69 (1962), 623–
624. [338]
Minty G.J., On the axiomatic foundations of the theories of directed linear graphs, electrical networks
and network-programming. J. Math. Mech. 15 (1966), 485–520. [539]
Mirkin B.G., Description of some relations on the set of real-line intervals. J. Mathematical Psychology
9 (1972), 243–252. [586]
Mirsky L., Transversal theory. Mathematics in Science and Engineering 75 (Academic Press, 1971).
[547]
Mirsky L. and H. Perfect, Applications of the notion of independence to combinatorial analysis. J. Com-
bin. Th. 2 (1967), 327–357. [517]
Mirzakhani M., A small non-4-choosable planar graph. Bull. Inst. Combin. Appl. 17 (1996), 15–18.
[402, 421]
Mitas J., Minimal representation of semiorders with intervals of same length. In Orders, algorithms,
and applications (Lyon, 1994), Lect. Notes Comp. Sci. 831 (Springer, 1994), 162–175. [587]
Mitchem J. and E.F. Schmeichel, Pancyclic and bipancyclic graphs—a survey. In Graphs and applica-
tions (Boulder, Colo., 1982), Wiley-Intersci. Publ. (Wiley, 1985), 271–278. [326]
Mitzenmacher M. and E. Upfal, Probability and computing (Cambridge University Press, Cambridge,
2017), second edn. [708]
Moessner A., Eine Bemerkung über die Potenzen der natürlichen Zahlen. S.-B. Math.-Nat. Kl. Bayer.
Akad. Wiss. 1951 (1951), 29 (1952). [62]
Moews D., Optimally pebbling hypercubes and powers. Discr. Math. 190 (1998), 271–276. [668]
Mohanty S.G., Lattice path counting and applications (Academic Press, 1979). [50]
Mohar B., The Laplacian spectrum of graphs. In Graph theory, combinatorics, and applications. Vol. 2
(Kalamazoo, MI, 1988), Wiley-Intersci. Publ. (Wiley, 1991), 871–898. [776]
Mohar B., Laplace eigenvalues of graphs—a survey. 109 (1992), 171–183. [776]
Mohar B. and S. Poljak, Eigenvalues in combinatorial optimization. In Combinatorial and graph-
theoretical problems in linear algebra (Minneapolis, MN, 1991), IMA Vol. Math. Appl. 50
(Springer, 1993), 107–151. [776]
Mohar B. and C. Thomassen, Graphs on surfaces, Johns Hopkins Studies in the Mathematical Sciences
(Johns Hopkins Univ. Press, 2001). [377]
Möhring R.H., Algorithmic aspects of comparability graphs and interval graphs. In Graphs and order
(Banff, 1984), NATO Adv. Sci. Inst. C Math. Phys. Sci. 147 (Reidel, 1985), 41–101. [573]
Molloy M., The probabilistic method. In Probabilistic methods for algorithmic discrete mathematics, Al-
gorithms Combin. 16 (Springer, 1998), 1–35. [706]
Molloy M. and B.A. Reed, A bound on the strong chromatic index of a graph. J. Combin. Th. B 69 (1997),
103–109. [373]
Molloy M. and B.A. Reed, Near-optimal list colorings. In Proceedings of the Ninth International Confer-
ence “Random Structures and Algorithms” (Poznan, 1999), 17 (2000), 376–402. [362]
Molloy M. and B.A. Reed, Graph colouring and the probabilistic method, Algorithms and Combinatorics
23 (Springer-Verlag, 2002). [335, 657, 668, 674, 677, 681, 686, 702, 706, 721, 722]
Montágh B., A simple proof and a generalization of an old result of Chung and Feller. Discr. Math. 87
(1991), 105–108. [50]
Montellano-Ballesteros J.J. and V. Neumann-Lara, An anti-Ramsey theorem on cycles. Graphs Combin.
21 (2005), 343–354. [457]
Montgomery B., Dynamic coloring of graphs (ProQuest LLC, 2001). Ph.D. Thesis, West Virginia Univer-
sity. [424]
Montgomery R., A. Pokrovskiy, and B. Sudakov, A proof of Ringel’s conjecture (2020).
(arXiv:2001.02665v2). [646]
Montmort P.R., Essay d’Analyse sur les Jeux de Hazard (Paris, 1708). [162]
Moon J.W., On the diameter of a graph. Michigan Math. J. 12 (1965a), 349–351. [251]
Moon J.W., On a problem of Ore. Math. Gaz. 49 (1965b), 40–41. [333]
904 References
Moon J.W., On the number of complete subgraphs of a graph. Canad. Math. Bull. 8 (1965c), 831–834.
[489]
Moon J.W., On subtournaments of a tournament. Canad. Math. Bull. 9 (1966), 297–301. [334]
Moon J.W., Various proofs of Cayley’s formula for counting trees. In A seminar on Graph Theory (Holt,
Rinehart and Winston, 1967), 70–78. [37, 47]
Moon J.W., Counting Labeled Trees (Canad. Math. Congress, 1970). [37]
Moon J.W. and L. Moser, On a problem of Turán. Magyar Tud. Akad. Mat. Kutató Int. Közl. 7 (1962a),
283–286. [477]
Moon J.W. and L. Moser, Almost all tournaments are irreducible. Canad. Math. Bull. 5 (1962b), 61–65.
[703]
Moon J.W. and L. Moser, On Hamiltonian bipartite graphs. Israel J. Math. 1 (1963), 163–165.
[325, 332]
Moore B.R. and D.B. West, Cycles in color-critical graphs (2019). (arXiv:1912.03754v2). [354]
Moore E.H., Concerning triple systems. Math. Ann. 43 (1893), 271–285. [641]
Moore E.H., Tactical memoranda I–III. Am. J. Math. 18 (1896), 264–303. [610, 611]
Morris W. and V. Soltan, The Erdős–Szekeres problem. In Open problems in mathematics (Springer,
[Cham], 2016), 351–375. [446]
Morris W.D., Jr. and V. Soltan, The Erdős–Szekeres problem on points in convex position—a survey.
Bull. Amer. Math. Soc. (N.S.) 37 (2000), 437–458. [446]
Moser L., Problem 4300. Amer. Math. Monthly 55 (1948), 369. Solution 57 (1950), 47. [441]
Moser L., Problem B-6: Some reflections. Fibonacci Quarterly 1 (1963), 75–76. [59]
Moser L., The second moment method in combinatorial analysis. In Combin. Struct. Appl. (Proc. Calgary
Internat. Conf., 1969) (Gordon and Breach, 1970), 283–284. [513]
Moser R.A., A constructive proof of the Lovász local lemma. In STOC’09—Proceedings of the 2009 ACM
International Symposium on Theory of Computing (ACM, 2009), 343–350. [680]
Moser R.A. and G. Tardos, A constructive proof of the general Lovász local lemma. J. ACM 57 (2010),
Art. 11, 15. [680]
Moshkovitz G. and A. Shapira, Ramsey theory, integer partitions and a new proof of the Erdős–Szekeres
theorem. Adv. Math. 262 (2014), 1107–1129. [602, 603]
Motwani R. and P. Raghavan, Randomized algorithms (Cambridge University Press, 1995). [657]
Motzkin T.S. and E.G. Straus, Maxima for graphs and a new proof of a theorem of Turán. Canad. J.
Math. 17 (1965), 533–540. [489, 781]
Mozhan N.N., Twice critical graphs with chromatic number five. Metody Diskret. Analiz. (1987), 50–59,
73. [354]
Mubayi D., Generalizing the Ramsey problem through diameter. Electron. J. Combin. 9 (2002), Research
Paper 42, 10. [460]
Mubayi D., Counting substructures I: color critical graphs. Adv. Math. 225 (2010), 2731–2740. [478]
Mubayi D., Variants of the Erdős–Szekeres and Erdős–Hajnal Ramsey problems. European J. Combin.
62 (2017), 197–205. [457]
Mubayi D. and A. Suk, Off-diagonal hypergraph Ramsey numbers. J. Combin. Th. B 125 (2017), 168–
177. [451]
Mubayi D. and J. Verstraëte, A survey of Turán problems for expansions. In Recent trends in combina-
torics, IMA Vol. Math. Appl. 159 (Springer, [Cham], 2016), 117–143. [500]
Muir T., A Treatise on the Theory of Determinants (Macmillan, 1882). Also 1906. [764]
Mulder H.M., Julius Petersen’s theory of regular graphs. Discr. Math. 100 (1992), 157–175. [253, 274]
Mullin R. and G.C. Rota, On the foundations of combinatorial theory. III. Theory of binomial enumera-
tion. In Graph Theory and its Applications (Proc. Advanced Sem., Madison, WI, 1969) (Academic
Press, 1970), 167–213. [123]
Munkres J., Algorithms for the assignment and transportation problems. J. Soc. Indust. Appl. Math. 5
(1957), 32–38. [280]
Mycielski J., Sur le coloriage des graphes. Coll. Math. 3 (1955), 161–162. [340]
References 905
Myers B.R., On spanning trees, weighted compositions, Fibonacci numbers, and resistor networks. SIAM
Rev. 17 (1975), 465–474. [65]
Myers B.R. and R. Liu, A lower bound on the chromatic number of a graph. Networks 1 (1972), 273–277.
[354]
Naatz M., A connectivity lemma. In 6th International Conference on Graph Theory (Marseille, 2000),
Electron. Notes Discr. Math. 5 (Elsevier, 2000), 4. [312, 764]
Nagasawa T., K. Noguchi, and Y. Suzuki, Optimal 1-embedded graphs on the projective plane which
triangulate other surfaces. J. Nonlinear Convex Anal. 19 (2018), 1759–1770. [797]
Nagy Z., A certain constructive estimate of the Ramsey number. Mat. Lapok 23 (1972), 301–302.
[459, 728, 745]
Nakasawa T., Zur Axiomatik der linearen Abhängigkeit. I, II, III (in German). Sci. Rep. Tokyo Bunrika
Daigaku Sect. A 2 (1935), 129–149. II and III in 3 (1936), 17–41 and 77–90. [514]
Nakayama A. and B. Péroche, Linear arboricity of digraphs. Networks 17 (1987), 39–53. [678]
Narayana T.V., A combinatorial problem and its application to probability theory. I. J. Indian Soc. Agric.
Statist. 7 (1955), 169–178. [45]
Nasar S., A beautiful mind (Simon & Schuster, 1998). Also 2001. [803]
Nash-Williams C.St.J.A., On orientations, connectivity and odd-vertex-pairings in finite graphs. Canad.
J. Math. 12 (1960), 555–567. [307, 309]
Nash-Williams C.St.J.A., Edge-disjoint spanning trees in finite graphs. J. Lond. Math. Soc. 36 (1961),
445–450. [251, 535, 540]
Nash-Williams C.St.J.A., Decomposition of finite graphs into forests. J. Lond. Math. Soc. 39 (1964), 12.
[251, 535]
Nash-Williams C.St.J.A., An application of matroids to graph theory. In Theory of Graphs, Intl. Sympos.,
Rome (Dunod, 1966), 263–265. [533]
Nash-Williams C.St.J.A., An unsolved problem concerning decomposition of graphs into triangles. Com-
binatorial Theory and Its Applications III (1970), 1179–1183. [238, 640]
Nash-Williams C.St.J.A., Connected detachments of graphs and generalized Euler trails. J. London
Math. Soc. (2) 31 (1985), 17–29. [540]
Naslund E. and W.F. Sawin, Upper bounds for sunflower-free sets (2016). (arXiv:1606.09575). [504]
Nemhauser G.L. and L.A. Wolsey, Integer and combinatorial optimization (Wiley, 1988). [520]
Nešetřil J., A combinatorial classic—sparse graphs with high chromatic number. In Erdős Centennial,
Bolyai Soc. Math. Stud. 25 (János Bolyai Math. Soc., Budapest, 2013), 383–407. [434]
Nešetřil J. and V. Rödl, The Ramsey property for graphs with forbidden complete subgraphs. J. Combin.
Th. B 20 (1976), 243–249. [455]
Nešetřil J. and V. Rödl, A short proof of the existence of highly chromatic hypergraphs without short
cycles. J. Combin. Th. B 27 (1979), 225–227. [434, 436, 437]
Nešetřil J. and V. Rödl, Complexity of diagrams. Order 3 (1987), 321–330. Corrigendum: Order 10 (1993),
393. [543]
Nešetřil J. and V. Rödl (eds.), Mathematics of Ramsey theory, Algorithms and Combinatorics 5 (Springer-
Verlag, 1990). [425]
Netto E., Lehrbuch der Combinatorik (German) (Teubner, 1901). Also 1927. [41]
Neumann-Lara V. and E. Rivera-Campo, Spanning trees with bounded degrees. Combinatorica 11
(1991), 55–61. [327]
Nicoaescu L.I., Problem E3157. Amer. Math. Monthly 93 (1986), 482. Solution 95 (1988), 557. [22]
Niessen T. and B. Randerath, Regular factors of simple regular graphs and factor-spectra. Discr. Math.
185 (1998), 89–103. [273]
Niessen T. and L. Volkmann, Class 1 conditions depending on the minimum degree and the number of
vertices of maximum degree. J. Graph Th. 14 (1990), 225–246. [359]
Nikiforov V., The cycle-complete graph Ramsey numbers. Combin. Probab. Comput. 14 (2005), 349–370.
[454]
Nikiforov V., Bounds on graph eigenvalues. II. Linear Algebra Appl. 427 (2007), 183–189. [770]
906 References
Nikiforov V., Graphs with many r-cliques have large complete r-partite subgraphs. Bull. Lond. Math.
Soc. 40 (2008), 23–25. [482]
Nikiforov V., A spectral Erdős–Stone–Bollobás theorem. Combin. Probab. Comput. 18 (2009), 455–458.
[770]
Nikiforov V., The number of cliques in graphs of given order and size. Trans. Amer. Math. Soc. 363 (2011),
1599–1618. [478]
Nikšić F., Are surjections [n] → [¾] more common than injections [¾] → [n]? Available online at
www.mathoverflow.net/questions/268544 (2017). Solution by M. Wildon, July 2, 2017. [133]
Nilli A., On the second eigenvalue of a graph. Discr. Math. 91 (1991), 207–210. [780]
Nilli A., On Borsuk’s problem. In Jerusalem combinatorics ’93, Contemp. Math. 178 (AMS, 1994), 209–
210. [817, 818]
Nishimura H. and S. Kuroda, A Lost Mathematician, Takeo Nakasawa: The Forgotten Father of Matroid
Theory, Mathematics and Statistics (Mirkhäuser, 2009). [514]
Niu Y.Y. and B.W. Zhu, Connectivities of Cartesian products of graphs. In Combinatorics, graph theory,
algorithms and applications (Beijing, 1993) (World Sci. Publ., 1994), 301–305. [292]
Niven I., Formal power series. Amer. Math. Monthly 76 (1969), 871–889. [107]
Noel J.A., B.A. Reed, and H. Wu, A proof of a conjecture of Ohba. J. Graph Theory 79 (2015), 86–102.
[355]
Noel J.A., D.B. West, H. Wu, and X. Zhu, Beyond Ohba’s conjecture: a bound on the choice number of ¾ -
chromatic graphs with n vertices. European J. Combin. 43 (2015), 295–305. [356]
Nordhaus E.A. and J.W. Gaddum, On complementary graphs. Amer. Math. Monthly 63 (1956), 175–177.
[344]
Norman R.Z. and M. Rabin, Algorithm for a minimal cover of a graph. Proc. Amer. Math. Soc. 10 (1959),
315–319. [263]
Novelli J.C., I. Pak, and A.V. Stoyanovskii, A direct bijective proof of the hook-length formula. Discr.
Math. Theor. Comput. Sci. 1 (1997), 53–67. [192]
Nyblom M., Problem 11117. Amer. Math. Monthly 111 (2004), 915. Solution 113 (2006), 762. [172]
O S. and D.B. West, Balloons, cut-edges, matchings, and total domination in regular graphs of odd de-
gree. J. Graph Theory 64 (2010), 116–131. [237, 274]
O S., D.B. West, and H. Wu, Longest cycles in ¾ -connected graphs with given independence number. J.
Combin. Th. B 101 (2011), 480–485. [334]
O’Hara K.M., Unimodality of Gaussian coefficients: a constructive proof. J. Combin. Th. A 53 (1990),
29–52. [557]
Ohba K., On chromatic-choosable graphs. J. Graph Theory 40 (2002), 130–135. [355]
Ohtsuka H. and R. Tauraso, Problem 12016. Amer. Math. Monthly 125 (2018), 81. Solution 126 (2019),
665. [33]
Olmsted C., Problem E3175. Amer. Math. Monthly 93 (1986), 732. Solution 96 (1989), 59–60. [176]
Olson E.J. and B.E. Sagan, On the 1/3–2/3 conjecture. Order 35 (2018), 581–596. [823]
Ore O., A problem regarding the tracing of graphs. Elemente der Math. 6 (1951), 49–53. [250]
Ore O., Graphs and matching theorems. Duke Math. J. 22 (1955), 625–639. [258, 531]
Ore O., Graphs and subgraphs. II. Trans. Amer. Math. Soc. 93 (1959), 185–204. [332]
Ore O., Note on Hamilton circuits. Amer. Math. Monthly 67 (1960), 55. [319]
Ore O., Arc coverings of graphs. Ann. Mat. Pura Appl. 55 (1961), 315–321. [321]
Ore O., Theory of graphs, Amer. Math. Soc. Colloquium Publications 38 (Amer. Math. Soc., 1962).
[260, 571]
Ore O., Hamiltonian connected graphs. J. Math. Pures Appl. 42 (1963), 21–7. [332, 333]
Ore O., The four-colour problem (Academic Press, 1967). [355, 360, 387, 399, 420]
Ore O., Diameters in graphs. J. Combinatorial Theory 5 (1968), 75–81. [249, 359]
O’Rourke J., Art gallery theorems and algorithms, International Series of Monographs on Computer Sci-
ence (Oxford Univ. Press, 1987). [394]
Owens A.B., On the planarity of regular incidence sequences. J. Combinatorial Theory B 11 (1971), 201–
212. [389]
References 907
Oxley J.G., Matroid theory, Oxford Science Publications (Oxford Univ. Press, 1992). 2nd edition 2011.
[514, 525]
Ozeki K. and T. Yamashita, Spanning trees: a survey. Graphs Combin. 27 (2011), 1–26. [327, 334]
Paasche I., Eine Verallgemeinerung des Moessnerschen Satzes. Compositio Math. 12 (1956), 263–270.
[62]
Pach J. and P.K. Agarwal, Combinatorial geometry, Wiley-Interscience Ser. Discr. Math. Optim. (Wiley &
Sons, 1995). [783]
Pach J. and M. Sharir, Combinatorial geometry and its algorithmic applications, Mathematical Surveys
and Monographs 152 (AMS, 2009). [783]
Pach J. and G. Tardos, Forbidden paths and cycles in ordered graphs and matrices. Israel J. Math. 155
(2006), 359–380. [491]
Pach J. and G. Tóth, Graphs drawn with few crossings per edge. Combinatorica 17 (1997), 427–439.
[793, 797]
Pach J. and G. Tóth, Thirteen problems on crossing numbers. Geombinatorics 9 (2000a), 194–207.
[795]
Pach J. and G. Tóth, Which crossing number is it anyway? J. Combin. Th. B 80 (2000b), 225–246.
[795]
Pak I., Partition bijections, a survey. Ramanujan J. 12 (2006), 5–75. [141, 142, 152]
Palacios J.L., Problem 11672. Amer. Math. Monthly 119 (2012), 800. Solutions by P. Condon and R.
Strong 121 (2014), 948–949. [66]
Palacios J.L. and D.P. Sandell, Problem 6665. Amer. Math. Monthly 98 (1991), 655. Solution 100 (1993),
405–407. [668]
Paley R.E.A.C., On orthogonal matrices. J. Math. Phys. 12 (1933), 311–320. [621]
Palmer C., Extremal Combinatorics (2015). Lecture notes. [484, 488]
Palmer E.M., Graphical Evolution: An Introduction to the Theory of Random Graphs (Wiley, 1985).
[657, 700, 703, 705]
Palumbı́ny D., On decompositions of complete graphs into factors with equal diameters. Boll. Un. Mat.
Ital.(4) 7 (1973), 420–428. [249]
Papadimitriou C.H. and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity (Prentice
Hall, 1982). Also Dover, 1998. [520]
Parker E.T., Orthogonal latin squares. Proc. Nat. Acad. Sci. U.S.A. 45 (1959), 859–862. [652]
Paulraja P., A characterization of Hamiltonian prisms. J. Graph Th. 17 (1993), 161–171. [326]
Payan C., Sur le nombre d’absorption d’un graphe simple. In Colloque sur la Théorie des Graphes (Paris,
1974), Cahiers Centre Études Recherche Opér. 17 (1975), 307–317. [670]
Peart P. and W.J. Woan, A bijective proof of the Delannoy recurrence. In Proc. 33rd Southeastern Intl.
Conf. Combin. Graph Th. Comput. (Boca Raton), Congr. Numer. 158 (2002), 29–33. [64]
Peck G.W., A new proof of a theorem of Graham and Pollak. Discr. Math. 49 (1984), 327–328. [771]
Peck G.W., Noncrossing trees, solution II to problem e3170. Amer. Math. Monthly 96 (1989), 359–361.
Proposed by Howard University Group, 93 (1986), 650. [42]
Peled U., Problem 10197. Amer. Math. Monthly 99 (1992), 162. Solution 100 (1993), 806–807. [764]
Pelsmajer M.J., M. Schaefer, and D. Štefanovič, Odd crossing number is not crossing number. In Graph
drawing, Lect. Notes Comp. Sci. 3843 (Springer, 2006), 386–396. [795]
Peltesohn R., Eine Lösung der beiden Heffterschen Differenzenprobleme. Compositio Math. 6 (1939),
251–257. [645]
Penaud J.G., Une propriété de bicoloration des hypergraphes planaires. In Colloque sur la Théorie des
Graphes (Paris, 1974), Cahiers Centre Études Recherche Opér. 17 (1975), 345–349. [418, 419]
Penrose M., Random geometric graphs, Oxford Studies in Probability 5 (Oxford Univ. Press, 2003).
[783]
Percus J.K., Combinatorial methods, Notes recorded by Ora Engelberg Percus (Courant Inst. Math. Sci.,
New York Univ., 1969). [755]
Perkovic L. and B.A. Reed, Edge coloring regular graphs of high degree. In Graphs Combinatorics (Mar-
seille, 1995) 165/166 (Discr. Math., 1997), 567–578. [359]
908 References
Perles M.A., A proof of Dilworth’s decomposition theorem for partially ordered sets. Israel J. Math. 1
(1963), 105–107. [546]
Perron O., Beweis des Moessnerschen Satzes. S.-B. Math.-Nat. Kl. Bayer. Akad. Wiss. 1951 (1951), 31–
34 (1952). [62]
Perz S. and S. Rolewicz, Norms and perfect graphs. Z. Oper. Res. 34 (1990), 13–27. [369]
Petersen J., Die Theorie der regulären Graphen. Acta Math. 15 (1891), 193–220.
[213, 267, 268, 273, 274, 277, 740]
Petersen T.K., Eulerian numbers, Birkhäuser Advanced Texts: Basler Lehrbücher. (Birkhäuser/Springer,
2015). [101]
Petkovsek M., Finding closed-form solutions of difference equations by symbolic methods (ProQuest LLC,
1991). Ph.D. Thesis, Carnegie Mellon Univ. [90]
Petkovšek M., H.S. Wilf, and D. Zeilberger, A = B (A K Peters, 1996). [87, 89, 90]
Phillips J., Chernoff–Hoeffding inequality and applications (2013). (arXiv:1209.63946). [711]
Pikhurko O., Borsuk’s conjecture fails in dimensions 321 and 322 (2002). (arXiv:math/0202112). [817]
Pikhurko O., A note on the Turán function of even cycles. Proc. Amer. Math. Soc. 140 (2012), 3687–3692.
[479]
Pilpel S., Descending subsequences of random permutations. J. Combin. Th. A 53 (1990), 96–116.
[821]
Pinsker M., On the complexity of a concentrator. 7th International Teletraffic Conference (1973), 318/1–
318/4. [779]
Piotrowski W.L., Untersuchungen über das Oberwolfacher Problem (1979). Unpublished manuscript.
[647]
Piotrowski W.-L., The solution of the bipartite analogue of the Oberwolfach problem. Discr. Math. 97
(1991), 339–356. [647]
Pippenger N., Superconcentrators. SIAM J. Comput. 6 (1977), 298–304. [779]
Pippenger N., Entropy and enumeration of Boolean functions. IEEE Trans. Inform. Theory 45 (1999),
2096–2100. [509]
Pité E., Problem 11957. Amer. Math. Monthly 124 (2017), 179. Solution 125 (2018), November. [133]
Pitman J., Coalescent random forests. J. Combin. Th. A 85 (1999), 165–193. [37]
Plantholt M., Overfull conjecture for graphs with high minimum degree. J. Graph Theory 47 (2004), 73–
80. [359]
Plaza A. and S. Falcón, Problem 11920. Amer. Math. Monthly 123 (2016), 296. Solution 125 (2018), 374–
375. [80]
Plesnevič P.S. and V.G. Vizing, On the problem of the minimal coloring of the vertices of a graph (Rus-
sian). Sibirsk. Mat. Zh. 6 (1965), 234–236. [343]
Plesnı́k J., Connectivity of regular graphs and the existence of 1-factors. Mat. Časopis Sloven. Akad.
Vied 22 (1972), 310–318. [267]
Plesnı́k J., Critical graphs of given diameter. Acta Fac. Rerum Natur. Univ. Comenian. Math. 30 (1975),
71–93. [294]
Plesnı́k J. and Š. Znám, On equality of edge-connectivity and minimum degree of a graph. Arch. Math.
(Brno) 25 (1989), 19–25. [296]
Plummer M.D., On minimal blocks. Trans. Amer. Math. Soc. 134 (1968), 85–94. [315, 316]
Plummer M.D., On the cyclic connectivity of planar graphs. In Graph theory and applications (Proc.
Conf., Western Michigan Univ., 1972; dedicated to the memory of J. W. T. Youngs), Lecture Notes
in Math. 303 (Springer, 1972), 235–242. [297]
Plummer M.D., Problem. In Infinite and finite sets (A. Haynal, R. Rado, and V.T. Sós, eds.) 10 (North-
Holland, 1975), 1549–1550. [401]
Plummer M.D., Matching theory—a sampler: from Dénes König to the present. Discr. Math. 100 (1992),
177–219. [253]
Plummer M.D., Graph factors and factorization: 1985–2003: a survey. Discr. Math. 307 (2007), 791–821.
[268]
References 909
Pnueli A., A. Lempel, and S. Even, Transitive orientation of graphs and identification of permutation
graphs. Canad. J. Math. 23 (1971), 160–175. [343]
Pólya G., Kombinatorische Anzahlbestimmungen für Gruppen, Graphen und chemische Verbindungen.
Acta Math. 68 (1937), 145–254. [37, 128, 184]
Poonen B., Union-closed families. J. Combin. Th. A 59 (1992), 253–268. [503]
Popadić M.S., On the number of antichains of finite power sets. Mat. Vesnik 7 (22) (1970), 199–203.
[550]
Popescu C., Problem 10770. Amer. Math. Monthly 106 (1999), 963. Solution 108 (2001), 979–80. [172]
Pósa L., On the circuits of finite graphs. Magyar Tud. Akad. Mat. Kutató Int. Közl. 8 (1963), 355–361
(1964). [326, 333]
Pournin L., The diameter of associahedra. Adv. Math. 259 (2014), 13–42. [387]
Pratt R., Problem 11573. Amer. Math. Monthly 118 (2011), 463. Solution 120 (2013), 372. [22]
Preen J., A census of all 5-regular planar graphs with diameter 3. Ars Combin. 106 (2012), 129–135.
[386]
Prim R.C., Shortest connection networks and some generalizations. Bell Syst. Tech. J. 36 (1957), 1389–
1401. [246, 252]
Proctor R.A., Solution of two difficult combinatorial problems with linear algebra. Amer. Math. Monthly
89 (1982), 721–734. [557]
Proctor R.A., Let’s expand Rota’s twelvefold way for counting partitions! (2006). (arXiv:math/0606404).
[147]
Prodinger H., A correspondence between ordered trees and noncrossing partitions. Discr. Math. 46
(1983), 205–206. [49, 64]
Prömel H.J., Ramsey theory for discrete structures (Springer, 2013). [425]
Propp J.G., Problem 10679. Amer. Math. Monthly 105 (1998), 666. Solution 107 (2000), 374. [511]
Prowse A. and D.R. Woodall, Choosability of powers of circuits. Graphs Combin. 19 (2003), 137–144.
[740]
Prüfer H., Neuer beweis eines satzes über permutationen (German). Arch. Math. Phys. 27 (1918), 742–
744. [37]
Pudaite P.R., Problem 10801. Amer. Math. Monthly 107 (2000), 368. Solution 109 (2002), 394–5. [66]
Puleo G.J., Maximal ¾ -edge-colorable subgraphs, Vizing’s theorem, and Tuza’s conjecture. Discr. Math.
340 (2017), 1573–1580. [372]
Pyber L., An extension of a Frankl–Füredi theorem. Discr. Math. 52 (1984), 253–268. [249]
Pyber L., Regular subgraphs of dense graphs. Combinatorica 5 (1985), 347–349. [737]
Pyber L., V. Rödl, and E. Szemerédi, Dense graphs without 3-regular subgraphs. J. Combin. Th. B 63
(1995), 41–54. [737]
Pyke R., The supremum and infimum of the Poisson process. Ann. Math. Statist. 30 (1959), 568–576.
[50]
Pym J.S., The linking of sets in graphs. J. London Math. Soc. 44 (1969), 542–550. [299]
Qiao P. and X. Zhan, The largest graphs with given order and diameter: A simple proof. Graphs and
Combinatorics 36 (2019), 1715–1716. [249]
Rabinovitch I., The Dimension-Theory of Semiorders and Interval-Orders (ProQuest LLC, 1973). Ph.D.
Thesis, Dartmouth College. [604]
Rabinovitch I., The Scott–Suppes theorem on semiorders. J. Mathematical Psychology 15 (1977), 209–
212. [604]
Rabinovitch I., The dimension of semiorders. J. Combin. Th. A 25 (1978), 50–61. [574, 583, 604]
Rademacher H., On the partition function p(n). Proc. London Math. Soc. 43 (1937), 241–254. [140]
Radhakrishnan J., An entropy proof of Brégman’s theorem. J. Combin. Th. A 77 (1997), 161–164.
[510]
Radhakrishnan J., Entropy and counting. In Computational mathematics, modeling and algorithms (J.
C. Misra, ed.) (Narosa, 2003), 146–148. [504, 508]
Radhakrishnan J. and A. Srinivasan, Improved bounds and algorithms for hypergraph 2-coloring. Ran-
dom Structures Algorithms 16 (2000), 4–32. [660, 673]
910 References
Rado R., Studien zur Kombinatorik. Math. Z. 36 (1933), 424–470. [462, 467]
Rado R., Axiomatic treatment of rank in infinite sets. Canadian J. Math. 1 (1949), 337–343. [468]
Rado R., Note on independence functions. Proc. Lond. Math. Soc. 7 (1957), 300–320. [519]
Rado R., Some partition theorems. In Combinatorial Theory and its Applications, III (Proc. Colloq., 1969)
(North-Holland, 1970), 929–936. [466]
Radoux C., Nombres de Catalan généralisés. Bull. Belg. Math. Soc. Simon Stevin 4 (1997), 289–292.
[177]
Radziszowski S.P., Small Ramsey numbers. Electronic J. Combin. (1994), Dynamic Survey 1. [449]
Raı̆gorodskiı̆ A.M., On the dimension in Borsuk’s problem (Russian). Uspekhi Mat. Nauk 52 (1997), 181–
182. [817]
Ramalingam G. and C. PanduRangan, A unified approach to domination problems on interval graphs.
Inform. Process. Lett. 27 (1988), 271–274. [374]
Ramamurthi R., Coloring problems on graphs and hypergraphs (ProQuest, 2001). Ph.D. Thesis, Univ.
Illinois, Urbana-Champaign. [746]
Ramanan G.V., Proof of a conjecture of Frankl and Füredi. J. Combin. Th. A 79 (1997), 53–67. [730]
Ramı́rez-Alfonsı́n J.L. and B.A. Reed (eds.), Perfect graphs, Wiley-Interscience Series in Discr. Mathe-
matics and Optimization (Wiley & Sons, 2001). [370]
Ramos E.A., Equipartition of mass distributions by hyperplanes. Discr. Comput. Geom. 15 (1996), 147–
167. [815]
Ramras M., Minimum cutsets in hypercubes. Discr. Math. 289 (2004), 193–198. [295]
Ramsey F.P., On a Problem of Formal Logic. Proc. Lond. Math. Soc. 30 (1930), 264–286.
[443, 444, 468]
Raney G.N., Functional composition patterns and power series reversion. Trans. Amer. Math. Soc. 94
(1960), 441–451. [50, 129]
Ray-Chaudhuri D.K., Characterization of line graphs. J. Combin. Th. 3 (1967), 201–214. [370]
Ray-Chaudhuri D.K. and R.M. Wilson, Solution of Kirkman’s schoolgirl problem (1971), 187–203.
[647, 649]
Ray-Chaudhuri D.K. and R.M. Wilson, On t-designs. Osaka J. Math. 12 (1975), 737–744. [731]
Raynaud H., Sur le circuit hamiltonien bi-coloré dans les graphes orientés. Period. Math. Hungar. 3
(1973), 289–297. [460]
Razborov A.A., Lower bounds on the monotone complexity of some Boolean functions. Dokl. Akad. Nauk
SSSR 281 (1985), 798–801. [504]
Razborov A.A., Flag algebras. J. Symbolic Logic 72 (2007), 1239–1282. [475]
Razborov A.A., On the minimal density of triangles in graphs. Combin. Probab. Comput. 17 (2008), 603–
618. [478]
Razborov A.A., On 3-hypergraphs with forbidden 4-vertex configurations. SIAM J. Discr. Math. 24
(2010), 946–963. [475]
Razborov A.A., On the Fon-der-Flaass interpretation of extremal examples for Turán’s (3 , 4)-problem.
Tr. Mat. Inst. Steklova 274 (2011), 269–290. [491]
Read R.C., Review of “die chromatischen Polynome unterringfreier Graphen”. MathSciNet Review
(1975). MR0354428 (50 #6906) [374]
Rédei L., Ein kombinatorischer Satz. Acta Litt. Szeged 7 (1934), 39–43. [334]
Redfield J.H., The Theory of Group-Reduced Distributions. Amer. J. Math. 49 (1927), 433–455. [184]
Reed B.A., , , and . J. Graph Th. 27 (1998), 177–212. [339, 685]
Reed B.A., A strengthening of Brooks’ Theorem. J. Combin. Th. B 76 (1999), 136–149. [677]
Reed B.A. and B. Sudakov, Asymptotically the list colouring constants are 1. J. Combin. Th. B 86 (2002),
27–37. [355, 677]
Rees D., Note on a paper by I.J. Good. J. Lond. Math. Soc. 21 (1946), 169–172. [239]
Regev A., Asymptotic values for degrees associated with strips of Young diagrams. Adv. in Math. 41
(1981), 115–136. [433]
Reiher C., The clique density theorem. Ann. of Math. (2) 184 (2016), 683–707. [478]
References 911
Reiman I., Über ein Problem von K. Zarankiewicz. Acta. Math. Acad. Sci. Hungar. 9 (1958), 269–273.
[632]
Remmel J.B., Bijective proofs of formulae for the number of standard Young tableaux. Linear and Mul-
tilinear Algebra 11 (1982), 45–100. [192]
Renault M., Lost (and found) in translation: André’s actual method and its application to the generalized
ballot problem. Amer. Math. Monthly 115 (2008), 358–363. [40]
Rényi A., Some remarks on the theory of trees. Magyar Tud. Akad. Mat. Kut. Int. Közl. 4 (1959), 73–85.
[133]
Rényi A., Théorie des éléments saillants d’une suite d’observations (French). Ann. Fac. Sci. Univ.
Clermont-Ferrand No. 8 (1962), 7–13. [99]
Rényi A., On the enumeration of trees. In Combinatorial Structures and their Applications (Proc. Calgary
Internat. Conf., 1969) (Gordon and Breach, 1970), 355–360. [37]
Reuter K., On the dimension of the Cartesian product of relations and orders. Order 6 (1989a), 277–293.
[572]
Reuter K., Removing critical pairs. Order 6 (1989b), 107–118. [584]
Rey J.G., Problem 10615. Amer. Math. Monthly 104 (1997), 767. Solution 106 (1999), 692–693. [47]
Reznick B., P. Tiwari, and D.B. West, Decomposition of product graphs into complete bipartite sub-
graphs. Discr. Math. 57 (1985), 179–183. [771]
Ribó Mor A., G. Rote, and A. Schulz, Small grid embeddings of 3-polytopes. Discrete Comput. Geom. 45
(2011), 65–87. [783]
Richter R.B., Problem 10330. Amer. Math. Monthly 100 (1993), 796. Solution 103 (1996), 700–1. [489]
Richter R.B. and C. Thomassen, Intersections of curve systems and the crossing number of C5 × C5 .
Discrete Comput. Geom. 13 (1995), 149–159. [794]
Riddell R.J., Contributions to the theory of condensation (Univ. Michigan, Ann Arbor, 1951). Ph.D. Thesis.
[135]
Riddell R.J., Jr. and G.E. Uhlenbeck, On the theory of the virial development of the equation of state of
mono-atomic gases. J. Chem. Phys. 21 (1953), 2056–2064. [127]
Riesling A.S., Boruk’s problem in three-dimensional spaces of constant curvature. Ukr. Geom. Sborni 11
(1971), 78–83. [817]
Rieß W., Zwei Optimierungsprobleme auf Ordnungen. Arbeitsber. Inst. Math. Masch. Datenverarb. (In-
form.) 11 (1978), 59. [557]
Riguet J., Les relations de Ferrers. C. R. Acad. Sci. Paris 232 (1951), 1729–1730. [605]
Ringeisen R.D. and L.W. Beineke, The crossing number of C3 × Cn. J. Combin. Th. B 24 (1978), 134–
136. [794]
Ringel G., Selbstkomplementare graphen. Arch. Math. 14 (1963), 354–358. [218]
Ringel G., Problem 25. In Theory of Graphs and Its Applications (Smolenice, 1963) (Czech. Acad. Sci.,
1964), 162. [646, 656]
Riordan J., An introduction to combinatorial analysis (Wiley; Chapman & Hall, 1958). [153, 161]
Riordan J., Inverse relations and combinatorial identities. Amer. Math. Monthly 71 (1964), 485–498.
[133]
Riordan J., Combinatorial identities (Wiley & Sons, 1968). Also 1979. [47, 65]
Robbins H., A theorem on graphs, with an application to a problem in traffic control. Amer. Math. Monthly
46 (1939), 281–283. [306]
Roberts F.S., Graph Theory and Its Applications to the Problems of Society, CBMS-NSF Monograph 29
(SIAM Publications, 1978). [337]
Robertson N., D. Sanders, P. Seymour, and R. Thomas, The four-colour theorem. J. Combin. Th. B 70
(1997), 2–44. [406, 416, 417]
Robertson N., P. Seymour, and R. Thomas, Excluded minors in cubic graphs. J. Combin. Th. B 138
(2019), 219–285. [416]
Robertson N., P.D. Seymour, and R. Thomas, Hadwiger’s conjecture for K6 -free graphs. Combinatorica
13 (1993), 279–361. [349]
912 References
Robertson N., P.D. Seymour, and R. Thomas, Tutte’s edge-colouring conjecture. J. Combin. Th. B 70
(1997), 166–183. [416]
Robinson G.de B., On the representations of the symmetric group. Amer. J. Math. 60 (1938), 745–760.
[193, 195]
Robinson J.P. and M. Cohn, Counting sequences. IEEE Trans. Comput. 30 (1981), 17–23. [820]
Rödl V. and M. Schacht, Generalizations of the removal lemma. Combinatorica 29 (2009), 467–501.
[485]
Rödl V. and M. Schacht, Regularity lemmas for graphs. In Fete of combinatorics and computer science,
Bolyai Soc. Math. Stud. 20 (János Bolyai Math. Soc., 2010), 287–325. [488]
Rödl V. and J. Skokan, Regularity lemma for ¾ -uniform hypergraphs. Random Structures Algorithms 25
(2004), 1–42. [488]
Rödl V. and E. Szemerédi, On size Ramsey numbers of graphs with bounded degree. Combinatorica 20
(2000), 257–262. [455]
Roman S.M., On a Problem of Zarankiewicz Concerning Matrices of Zeros and Ones (ProQuest, 1975).
Ph.D. Thesis, Univ. Washington. [632]
Roman S.M., The umbral calculus, Pure and Applied Mathematics 111 (Academic Press, 1984). [123]
Roman S.M. and G.C. Rota, The umbral calculus. Advances in Math. 27 (1978), 95–188. [123]
Rosa A., On certain valuations of the vertices of a graph. In Theory of Graphs (Rome, 1966), Intl. Symp.
(Gordon and Breach; Dunod, 1967), 349–355. [646, 656]
Rosenfeld M., On the total coloring of certain graphs. Israel J. Math. 9 (1971), 396–402. [373]
Rota G.C., On the foundations of combinatorial theory I. Z. Wahrsch. Verw. Gebiete 2 (1964), 340–368.
[520, 529]
Roth K.F., On certain sets of integers. J. London Math. Soc. 28 (1953), 104–109. [484, 485]
Rotman J.J., Problem E3462. Amer. Math. Monthly 98 (1991), 755. Solution 100 (1993), 594. [238]
Rousseau C.C. and J. Sheehan, A class of Ramsey problems involving trees. J. London Math. Soc. (2) 18
(1978), 392–396. [459]
Roussel F., I. Rusu, and H. Thuillier, The strong perfect graph conjecture: 40 years of attempts, and its
resolution. Discr. Math. 309 (2009), 6092–6113. [370]
Roy B., Nombre chromatique et plus longs chemins d’un graphe. Rev. Française Automat. Informat.
Recherche Opérationelle sér. Rouge 1 (1967), 127–132. [339]
Royle G., Graphs where every two vertices have odd number of mutual neighbours (2010).
Available online at https://mathoverflow.net/questions/17809/graphs-where-every-
two-vertices-have-odd-number-of-mutual-neighbours. [226]
Rubel L.A., Problem 6565. Amer. Math. Monthly 95 (1988), 60. Solution 97 (1990), 80–81. [473]
Ruciński A. and A. Vince, Balanced graphs and the problem of subgraphs of random graphs. In Proc. 16th
Southeastern Intl. Conf. Combin. Graph Th. Comput. (Boca Raton), 49 (1985), 181–190. [703]
Rupp C.A., Problem 3468. Amer. Math. Monthly 37 (1930), 552. Solution 38 (1931), 355. [178]
Ruzsa I.Z. and E. Szemerédi, Triple systems with no six points carrying three triangles. In Combinatorics
(Proc. Fifth Hungarian Colloq., Keszthely, 1976), II, Colloq. Math. Soc. János Bolyai 18 (North-
Holland, 1978), 939–945. [485, 492, 684]
Ryjáček Z., On a closure concept in claw-free graphs. J. Combin. Th. B 70 (1997), 217–224. [320, 326]
Rymer N.W., Projects, problems and patience. Math. Gazette 63 (1979), 1–7. [66]
Ryser H.J., Combinatorial properties of matrices of zeros and ones. Canad. J. Math. 9 (1957), 371–377.
[227]
Ryser H.J., Combinatorial mathematics, The Carus Mathematical Monographs, No. 14 (Math. Assoc.
Amer.; distributed by Wiley, 1963). [314]
Ryser H.J., Matrices of zeros and ones in combinatorial mathematics. In Recent Advances in Matrix
Theory (Madison, 1963) (Univ. Wisc. Press, 1964), 103–124. [228]
Saaty T.L. and P.C. Kainen, The four-color problem (McGraw-Hill, 1977). [399, 418]
Sabidussi G., Graphs with given group and given graph-theoretical properties. Canad. J. Math. 9 (1957),
515–525. [343]
References 913
Sachs H., Über Teiler, Faktoren und charakteristische Polynome von Graphen II. Wiss. Z. Techn.
Hochsch. Ilmenau 13 (1967), 405–412. [780]
Sachs H., Finite graphs (Investigations and generalizations concerning the construction of finite graphs
having given chromatic number and no triangles). In Recent Progress in Combinatorics (Proc.
3rd Waterloo Conf. Combin., 1968) (Academic Press, 1969), 175–184. [339]
Sachs H., Elementary proof of the cycle-plus-triangles theorem. In Combinatorics, Paul Erdős is eighty,
Vol. 1, Bolyai Soc. Math. Stud. (János Bolyai Math. Soc., 1993), 347–359. [739]
Sachs H. and H. Zernitz, Remark on the dimer problem. Discrete Appl. Math. 51 (1994), 171–179. [34]
Sagan B., On selecting a random shifted Young tableau. J. Algorithms 1 (1980), 213–234. [207]
Sagan B.E., The symmetric group, The Wadsworth & Brooks/Cole Mathematics Series (Wadsworth &
Brooks, 1991). [189]
Saito A., Chvátal–Erdős theorem: old theorem with new aspects. In Computational geometry and graph
theory, Lecture Notes in Comput. Sci. 4535 (Springer, Berlin, 2008), 191–200. [321]
Šajna M., Cycle decompositions. III. Complete graphs and fixed length cycles. J. Combin. Des. 10 (2002),
27–78. [646]
Saks M.E., A short proof of the existence of ¾ -saturated partitions of partially ordered sets. Adv. in Math.
33 (1979), 207–211. [548]
Saks M.E., Duality Properties of Finite Set Systems (ProQuest, 1980). Ph.D. Thesis, Mass. Inst. Tech.
[549]
Saks M.E., A class of perfect graphs associated with planar rectilinear regions. SIAM J. Algebraic Dis-
crete Methods 3 (1982), 330–342. [831]
Saks M.E., The information theoretic bound for problems on ordered sets and graphs. In Graphs and
order (Banff, Alta., 1984), NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci. 147 (Reidel, 1985), 137–
168. [831]
Salamon G. and G. Wiener, Leaves of spanning trees and vulnerability. In 5th Hungarian–Japanese
Sym. Discr. Math. and Appl. (2007), 225–235. [334]
Sanders D.P. and Y. Zhao, A note on the three color problem. Graphs Combin. 11 (1995), 91–94.
[414, 415]
Sanders D.P. and Y. Zhao, Planar graphs of maximum degree seven are class I. J. Combin. Th. B 83
(2001), 201–212. [422]
Sanders D.P. and Y. Zhao, On the size of edge chromatic critical graphs. J. Combin. Th. B 86 (2002),
408–412. [414]
Sanders P.R., The central automorphisms of a finite group. J. London Math. Soc. 44 (1969), 225–228.
[466]
Sands A.D., On generalised Catalan numbers. Discr. Math. 21 (1978), 219–221. [50]
Santoro N. and J. Urrutia, Angle orders, regular n-gon orders and the crossing number. Order 4 (1987),
209–220. [832]
Sarkaria K.S., A generalized Kneser conjecture. J. Combin. Theory B 49 (1990), 236–240. [812]
Sarvate D.G. and J.-C. Renaud, On the union-closed sets conjecture. Ars Combin. 27 (1989), 149–153.
[503, 512]
Sauer N., A generalization of a theorem of Turán. J. Combinatorial Th. B 10 (1971), 109–112. [476]
Sauer N. and J. Spencer, Edge disjoint placement of graphs. J. Combin. Theory B 25 (1978), 295–302.
[248]
Sauvé L., On chromatic graphs. Amer. Math. Monthly 68 (1961), 107–111. [477]
Savage C.D. and C.Q. Zhang, The connectivity of acyclic orientation graphs. Discr. Math. 184 (1998),
281–287. [312]
Scarpis U., Sui determinanti di valore massimo (Italian). Rendiconti della R. Istituto Lombardo di Sci.
e Lettere 31 (1898), 1441–1446. [622]
Schaal D., On generalized Schur numbers. In Proc. 24th Southeastern Intl. Conf. Combin. Graph Th.
Comput. (Boca Raton), 98 (1993), 178–187. [473]
Schäuble M., Bemerkungen zur Kounstruktion dreikreisfreier ¾ -chromatischer Graphen. Wiss.
Zeitschrift TH Ilmenau 15 (1969), 59–63. [354]
914 References
Schauz U., Mr. Paint and Mrs. Correct. Electron. J. Combin. 16 (2009), Research Paper 77, 18. [741]
Scheim D.E., The number of edge 3-colorings of a planar cubic graph as a permanent. Discr. Math. 8
(1974), 377–382. [740]
Scheinerman E.R., A note on graphs and sphere orders. J. Graph Theory 17 (1993), 283–289. [832]
Scheinerman E.R. and J.C. Wierman, On circle containment orders. Order 4 (1988), 315–318. [828]
Schensted C., Longest increasing and decreasing subsequences. Canad. J. Math. 13 (1961), 179–191.
[193, 195, 198, 206]
Schläfli L., Theorie der vielfachen Kontinuität (German, completed 1852) (George & Co., 1901). Reprinted
in Collected mathematical works Vol. I (Verlag Birkhäuser, 1949). [48]
Schmeichel E.F. and S.L. Hakimi, Pancyclic graphs and a conjecture of Bondy and Chvátal. J. Combin.
Th. B 17 (1974), 22–34. [326]
Schmeichel E.F. and S.L. Hakimi, A cycle structure theorem for Hamiltonian graphs. J. Combin. Theory
B 45 (1988), 99–107. [326]
Schmidt F.W., Problem 10285. Amer. Math. Monthly 100 (1993), 185. [188]
Schmidt F.W., Problem 10364. Amer. Math. Monthly 101 (1994), 177. Solution 104 (1997), 179. [105]
Schmidt F.W., Problem 10481. Amer. Math. Monthly 102 (1995), 840. Solution 104 (1997), 877–878.
[134]
Schmidt F.W., Problem 10629. Amer. Math. Monthly 104 (1997), 974. Solution 107 (2000), 87–8. [152]
Schmuland B., Solution to problem 11590. Amer. Math. Monthly 120 (2013), 760–761. Proposed by Bibak
118 (2011), 653. [176]
Schnyder W., Planar graphs and poset dimension. Order 5 (1989), 323–343. [783, 790]
Schnyder W., Embedding planar graphs on the grid. In Proc. 1st Annual. ACM–SIAM Symp. Discrete.
Algorithms, SODA (SIAM, 1990), 138–148. [394, 783]
Schönberger T., Ein Beweis des Petersenschen Graphensatzes. Acta Scientia Mathematica Szeged 7
(1934), 51–57. [267]
Schönheim J., On a problem of Daykin concerning intersecting families of sets. In Combinatorics (Proc.
British Combinatorial Conf. Univ. Coll. Wales, 1973), London Math. Soc. Lecture Note Ser. 13
(Cambridge Univ. Press, 1974), 139–140. [497, 607]
Schönheim J., Hereditary systems and Chvátal’s conjecture. In Proc. 5th British Combin. Conf. (Ab-
erdeen), Congr. Numer. 15 (Utilitas Math., 1976), 537–539. [512]
Schramm O., Illuminating sets of constant width. Mathematika 35 (1988), 180–189. [817]
Schrijver A., Vertex-critical subgraphs of Kneser graphs. Nieuw Arch. Wisk. (3) 26 (1978), 454–461.
[813, 814]
Schrijver A., Combinatorial optimization. Polyhedra and efficiency. Vol. A, B, C, Algorithms and Combi-
natorics 24 (Springer-Verlag, 2003). [277, 520, 533, 540]
Schröder E., Vier combinatorische Probleme. Zeit. fur Math. 15 (1870), 361–376. [47, 64, 81, 135]
Schur I., Über die Kongruenz x m + y m ≡ m(mod p). Jber. Deutsch. Math.-Verein. 25 (1916), 114–116.
[462, 473]
Schützenberger M.P., A non-existence theorem for an infinite family of symmetrical block designs. Ann.
Eugenics 14 (1949), 286–287. [616]
Schützenberger M.P., A characteristic property of certain polynomials of E.F. Moore and C.E. Shannon.
In RLE Quarterly Progress Report 55 (1959), 117–118. [496]
Schützenberger M.P., Quelques remarques sur une construction de Schensted. Math. Scand. 12 (1963),
117–128. [197, 198, 206, 208]
Schützenberger M.P., Sur un théorème de G. de B. Robinson. C. R. Acad. Sci. Paris Sér. A-B 272 (1971),
A420–A421. [129]
Schützenberger M.P., La correspondance de Robinson. In Combinatoire et représentation du groupe
symétrique (Strasbourg, 1976), Lect. Notes Math. 579 (Springer, 1977), 59–113. [203]
Schwenk A.J., Problem 6434. Amer. Math. Monthly 90 (1983), 403. Solution 94 (1987), 885–887. [782]
Schwenk A.J., Problem E3143. Amer. Math. Monthly 93 (1986), 299. Solution 95 (1988), 352. [206]
Schwer S.R., S-arrangements avec répétitions. C. R. Math. Acad. Sci. Paris 334 (2002), 261–266. [31]
References 915
Scott A., Szemerédi’s regularity lemma for matrices and sparse graphs. Combin. Probab. Comput. 20
(2011), 455–466. [488]
Scott A.D., Induced trees in graphs of large chromatic number. J. Graph Th. 24 (1997), 297–311. [352]
Scott D. and P. Suppes, Foundational aspects of theories of measurement. J. Symb. Logic 23 (1958), 113–
128. [587]
Seberry J., A computer listing of Hadamard matrices. In Combinatorial mathematics (Proc. Internat.
Conf. Combinatorial Theory, Australian Nat. Univ., 1977), Lect. Notes Math. 686 (Springer, 1978),
275–281. [622]
Sedláček J., On the skeletons of a graph or digraph. In Proc. Calgary Intl. Conf. Combin. Structures and
Their Applications (Univ. Calgary, 1969) (Gordon & Breach, 1970), 387–391. [65]
Segner J.A., Enumeratio modorum quibus figurae planae (Latin). Novi Comment. Acad. Sci. Imp.
Petropol. 7 (1759), 203–210. [41]
Seidenberg A., A simple proof of a theorem of Erdős and Szekeres. J. London Math. Soc. 34 (1959), 352.
[430]
Seinsche D., On a property of the class of n-colorable graphs. J. Combin. Th. B 16 (1974), 191–193.
[375, 490]
Sekanina M., On an ordering of the set of vertices of a connected graph. Spisy Přı́rod. Fak. Univ. Brno
1960 (1960), 137–141. [331]
Servedio R. and Y.N. Yeh, A bijective proof on circular compositions. Bull. Inst. Math. Acad. Sinica 23
(1995), 283–293. [144]
Seymour P., Hadwiger’s conjecture. In Open problems in mathematics (Springer, 2016), 417–437.
[349]
Seymour P.D., On incomparable collections of sets. Mathematika 20 (1973), 208–209. [497, 607, 608]
Seymour P.D., A short proof of the matroid intersection theorem (1976). Unpublished note. [530]
Seymour P.D., Disjoint paths in graphs. Discr. Math. 29 (1980), 293–309. [314]
Shamir E. and J. Spencer, Sharp concentration of the chromatic number on random graphs G n ,p. Com-
binatorica 7 (1987), 121–129. [717]
Shannon A.G., Fibonacci and Lucas numbers and the complexity of a graph. Fibonacci Quart. 16 (1978),
1–4. [65]
Shannon C.E., A theorem on coloring the lines of a network. J. Math. Phys. 28 (1949), 148–151.
[358, 360, 365, 372]
Shapira A., Extremal Graph Theory (2016). Lecture notes scribed by Guy Rutenberg. Available online
at http://www.math.tau.ac.il/˜asafico/ext-graph-theory/notes.pdf. [488]
Shapiro L.W., A short proof of an identity of Touchard’s concerning Catalan numbers. J. Combin. Th. A
20 (1976), 375–376. [82]
Shapiro L.W., Problem 10753. Amer. Math. Monthly 106 (1999), 777. Solution 108 (2001), 873–4. [48]
Shapiro L.W. and W. Hamilton, The Catalan numbers visit the world series. Math. Mag. 66 (1993), 20–
22. [65]
Shapiro L.W. and D. Rogers, Problem E3343. Amer. Math. Monthly 96 (1989), 734–735. Solution 97
(1991), 368. [64]
Shearer J.B., A simple counterexample to a conjecture of Rota. Discr. Math. 28 (1979), 327–330. [567]
Shearer J.B., A note on the independence number of triangle-free graphs. Discr. Math. 46 (1983), 83–87.
[663, 682]
Shearer J.B., On a problem of Spencer. Combinatorica 5 (1985), 241–245. [675]
Shearer J.B., On the independence number of sparse graphs. Random Structures Algorithms 7 (1995),
269–271. [663]
Shearer J.B. and D.J. Kleitman, Probabilities of independent choices being ordered. Stud. Appl. Math.
60 (1979), 271–276. [566]
Shelah S., Primitive recursive bounds for van der Waerden numbers. J. Amer. Math. Soc. 1 (1988), 683–
697. [466]
Shepp L.A., The FKG inequality and some monotonicity properties of partial orders. SIAM J. Algebraic
Discrete Methods 1 (1980), 295–299. [608]
916 References
Shepp L.A., The X YZ conjecture and the FKG inequality. Ann. Probab. 10 (1982), 824–827. [599]
Shih W.K. and W.L. Hsu, A new planarity test. Theoret. Comput. Sci. 223 (1999), 179–191. [393]
Shirazi H. and J. Verstraëte, A note on polynomials and º -factors of graphs. Electron. J. Combin. 15
(2008), Note 22, 5. [737, 746]
Shrikhande S.S., The impossibility of certain symmetrical balanced incomplete block designs. Ann.
Math. Statistics 21 (1950), 106–111. [616]
Shrikhande S.S., A note on mutually orthogonal Latin squares. Sankhyā Ser. A 23 (1961), 115–116.
[623]
Sidney J.B., S.J. Sidney, and J. Urrutia, Circle orders, n-gon orders and the crossing number. Order 5
(1988), 1–10. [828, 832]
Silwal S., Problem 12039. Amer. Math. Monthly 125 (2018), 371. Solution 127 (2020), 86. [226]
Simion R. and F.W. Schmidt, Restricted permutations. European J. Combin. 6 (1985), 383–406. [442]
Simonovits M., A method for solving extremal problems in graph theory, stability problems. In Theory
of Graphs (Proc. Colloq., Tihany, 1966) (Academic Press, 1968), 279–319. [479]
Simonovits M., How to solve a Turán type extremal graph problem? (linear decomposition). In Contem-
porary trends in discrete mathematics (Štiřı́n Castle, 1997), DIMACS Ser. Discr. Math. Theoret.
Comput. Sci. 49 (Amer. Math. Soc., 1999), 283–305. [490]
Sinclair A., Lecture notes for Randomness and Computation (Spring 2018) (U California–Berkeley, 2018).
Available at https://people.eecs.berkeley.edu/˜sinclair/cs271/s18.html. [680]
Singleton R.R., On minimal graphs of maximum even girth. J. Combinatorial Theory 1 (1966), 306–332.
[639]
Singmaster D., Problem E2897. Amer. Math. Monthly 88 (1981), 537. Solution by J.W. Grossman 90
(1983), 287–288. [388]
Singmaster D., Reviews: After Math. Puzzles and Brainteasers // The Chicken from Minsk // New Math-
ematical Diversions. Amer. Math. Monthly 105 (1998), 579–587. [70]
Skolem T., Some remarks on the triple systems of Steiner. Math. Scand. 6 (1958), 273–280. [641, 644]
Sleator D.D., R.E. Tarjan, and W.P. Thurston, Rotation distance, triangulations, and hyperbolic geome-
try. J. Amer. Math. Soc. 1 (1988), 647–681. [387]
Slivnik T., Short proof of Galvin’s theorem on the list-chromatic index of a bipartite multigraph. Combin.
Probab. Comput. 5 (1996), 91–94. [364]
Sloane N.J.A., Hamiltonian cycles in a graph of degree 4. J. Combinatorial Theory 6 (1969), 311–312.
[318]
Smith H.J.S., On the value of a certain arithmetical determinant. J. Reine Angew. Math. 251 (1876),
100–109. [177]
Smolenskii E.A., A method for the linear recording of graphs (English translation). U.S.S.R. Comput.
Math. and Math. Phys. 2 (1962), 396–397. [250]
Smoot N., Solution to problem 11908. Amer. Math. Monthly 125 (2018). Proposed 123 (2015), 504.
[148]
Snevily H.St.C., Combinatorics of finite sets (ProQuest LLC, 1991). Ph.D. Thesis, Univ. Illinois, Urbana–
Champaign. [502]
Snevily H.St.C., On generalizations of the de Bruijn–Erdős theorem. J. Combin. Th. A 68 (1994), 232–
238. [730]
Snevily H.St.C., A generalization of Fisher’s inequality. J. Combin. Th. A 85 (1999), 120–125. [730]
Snevily H.St.C., A sharp bound for the number of sets that pairwise intersect at ¾ positive values. Com-
binatorica 23 (2003), 527–533. [730]
Snevily H.St.C. and D.B. West, The bricklayer problem and the strong cycle lemma. Amer. Math. Monthly
105 (1998), 131–143. [50]
Soderberg S. and H.S. Shapiro, A Combinatory Detection Problem. Amer. Math. Monthly 70 (1963),
1066–1070. [513]
Sofair I., Problem 11775. Amer. Math. Monthly 121 (2014), 455. Solution 123 (2016), 508. [174]
Soifer A., The Mathematical Coloring Book: Mathematics of Coloring and the Colorful Life of its Creators
(Springer, 2008). [342]
References 917
Soifer A., Ramsey Theory: Yesterday, Today, and Tomorrow 285 (Birkhauser, 2011). [425]
Soifer A., Progress in my favorite open problem of mathematics, chromatic number of the plane: An
étude in five movements. Geombinatorics 28 (2019), 206–210. [342]
Solymosi J., Note on a generalization of Roth’s theorem. In Discrete and Computational Geometry: The
Goodman–pollack Festschrift (B. Aronov, S. Basu, J. Pach, and M. Sharir, eds.), Algorithms and
Combinatorics 25 (Springer, Berlin, 2003), 825–827. [492]
Sondow J., Problem 11026. Amer. Math. Monthly 110 (2003), 636. Solution 112 (2005), 367–369. [32]
Soneoka T., H. Nakada, M. Imase, and C. Peyrat, Sufficient conditions for maximally connected dense
graphs. Discr. Math. 63 (1987), 53–66. [296]
Sorel J., Problem 11899. Amer. Math. Monthly 123 (2016), 297. Solution 125 (2018), 88. [33]
Sós V.T., P. Erdős, and W.G. Brown, On the existence of triangulated spheres in 3-graphs, and related
problems. Period. Math. Hungar. 3 (1973), 221–228. [684]
Špacapan S., Connectivity of Cartesian products of graphs. Appl. Math. Lett. 21 (2008), 682–685.
[292, 297]
Spencer J., Minimal scrambling sets of simple orders. Acta Math. Acad. Sci. Hungar. 22 (1971/72), 349–
353. [576, 579, 580, 584]
Spencer J., A generalized Rota conjecture for partitions. Studies in Appl. Math. 53 (1974), 239–241.
[567]
Spencer J., Ramsey’s theorem—a new lower bound. J. Combin. Th. A 18 (1975), 108–115. [675]
Spencer J., Asymptotic lower bounds for Ramsey functions. Discr. Math. 20 (1977), 69–76. [682, 685]
Spencer J., Six standard deviations suffice. Trans. Amer. Math. Soc. 289 (1985), 679–706. [722]
Spencer J., Ten lectures on the probabilistic method, CBMS-NSF Regional Conference Series in Applied
Mathematics 52 (SIAM, 1987). [682]
Spencer J., E. Szemerédi, and W. Trotter, Unit distances in the Euclidean plane. In Graph theory and
combinatorics (Cambridge, 1983) (Academic Press, London, 1984), 293–303. [794]
Sperner E., Neuer Beweis für die Invarianz der Dimensionszahl und des Gebietes. Hamburger Abhand.
6 (1928), 265–272. [496, 558, 561, 799, 802, 805]
Spinrad J.P., Two-dimensional partial orders (ProQuest LLC, 1982). Ph.D. Thesis, Princeton Univ.
[573]
Spitzer F., A combinatorial lemma and its application to probability theory. Trans. Amer. Math. Soc. 82
(1956), 323–339. [50]
Stanley R.P., Problem E2315. Amer. Math. Monthly 78 (1971), 904. Solution 79 (1972), 908–910.
[81, 565]
Stanley R.P., Ordered structures and partitions (AMS, 1972). [207]
Stanley R.P., Combinatorial reciprocity theorems. Advances in Math. 14 (1974), 194–253. [761]
Stanley R.P., Generating functions. In Studies in Combinatorics, MAA Stud. Math. 17 (Math. Assoc.
America, 1978), 100–141. [127, 132, 135]
Stanley R.P., Two combinatorial applications of the Aleksandrov–Fenchel inequalities. J. Combin. Th.
A 31 (1981), 56–65. [824, 827]
Stanley R.P., Some aspects of groups acting on finite posets. J. Combin. Th. A 32 (1982), 132–161.
[557, 606]
Stanley R.P., On the number of reduced decompositions of elements of Coxeter groups. European J.
Combin. 5 (1984), 359–372. [208]
Stanley R.P., Enumerative combinatorics. Vol. I, The Wadsworth & Brooks/Cole Mathematics Series
(Wadsworth & Brooks, 1986). [48, 76, 93, 145, 150, 177, 761]
Stanley R.P., Log-concave and unimodal sequences in algebra, combinatorics, and geometry. In Graph
theory and its applications: East and West (Jinan, 1986), Ann. New York Acad. Sci. 576 (New
York Acad. Sci., 1989), 500–535. [564]
Stanley R.P., Problem 10199. Amer. Math. Monthly 99 (1992), 162. Solution 101 (1994), 278–279. [61]
Stanley R.P., Enumerative combinatorics. Vol. 2, Cambridge Studies in Advanced Mathematics 62 (Cam-
bridge Univ. Press, 1999). [42, 127, 129, 135, 136, 189]
Stanley R.P., Problem 11453. Amer. Math. Monthly 116 (2009), 746. Solution 118 (2011), 658–9. [766]
918 References
Stanley R.P., A survey of alternating permutations. In Combinatorics and graphs, Contemp. Math. 531
(AMS, 2010), 165–196. [207]
Stanley R.P., Problem 11610. Amer. Math. Monthly 118 (2011), 937. Solution 120 (2013), 943. [116]
Stanley R.P., Problem 11762. Amer. Math. Monthly 121 (2014), 266. Solution 123 (2016). [150, 206]
Stanley R.P., Catalan Numbers (Cambridge Univ. Press, 2015a). [41, 42]
Stanley R.P., Problem 11838. Amer. Math. Monthly 122 (2015b), 500. [261]
Stanley R.P. and J.M. Steele, Problem E3344. Amer. Math. Monthly 96 (1989), 734. Solution 98 (1991),
649. [669]
Stanton D. and D.E. White, Constructive combinatorics, Undergraduate Texts in Mathematics (Springer-
Verlag, 1986). [100]
Stathopoulos D., Problem 11668. Amer. Math. Monthly 119 (2012), 700. Solution 121 (2014), 743–744.
[62, 135]
Steele J.M., Variations on the monotone subsequence theme of Erdős and Szekeres. In Discrete proba-
bility and algorithms (Minneapolis, 1993), IMA Vol. Math. Appl. 72 (Springer, 1995), 111–131.
[430]
Stein S.K., Convex maps. Proc. Amer. Math. Soc. 2 (1951), 464–466. [393]
Stein S.K., b-sets and coloring problems. Bull. Amer. Math. Soc. 76 (1970), 805–806. [387]
Steiner J., Einige Gesetze über die Theilung der Ebene und des Raumes. J. Reine Angew. Math. 1 (1826),
349–364. [48]
Steiner J., Combinatorische aufgabe. J. Reine Angew. Math. 45 (1853), 181–182. [641]
Steinlein H., Borsuk’s antipodal theorem and its generalizations and applications: a survey. In Topolog-
ical methods in nonlinear analysis, Sém. Math. Sup. 95 (Presses Univ. Montréal, 1985), 166–235.
[806, 815]
Stevens W.L., Solution to a geometrical problem in probability. Ann. Eugenics 9 (1939), 315–320.
[610]
Stiebitz M., K 5 is the only double-critical 5-chromatic graph. Discr. Math. 64 (1987), 91–93. [354]
Stiebitz M. and M. Voigt, List-colourings. In Topics in chromatic graph theory, Encyclopedia Math. Appl.
156 (Cambridge Univ. Press, 2015), 114–136. [346]
Stinson D.R., A short proof of the nonexistence of a pair of orthogonal Latin squares of order six. J.
Combin. Th. A 36 (1984), 373–376. [612]
Stinson D.R., Combinatorial designs (Springer-Verlag, 2004). [609]
Stockmeyer P.K., Solution to problem 10663. Amer. Math. Monthly 107 (2000), 370. Proposed 105 (1998),
464. [92]
Stong R., Solution to problem 10892. Amer. Math. Monthly 110 (2003), 440–441. Proposed 108 (2001),
668. [330]
Stong R., Solution to problem 11086. Amer. Math. Monthly 113 (2006), 372. Proposed 111 (2004), 440.
[343]
Stong R., Solution to problem 1192. Amer. Math. Monthly 114 (2007), 839–840. Proposed 112 (2005),
930. [623]
Stong R., Solution to problem 11931. Amer. Math. Monthly 125 (2018). Proposed 123 (2016), 831.
[461]
Strehl V., Binomial identities—combinatorial and algorithmic aspects. Discr. Math. 136 (1994), 309–
346. [31]
Subba Rao K., Some properties of Fibonacci numbers. Amer. Math. Monthly 60 (1953), 680–684. [60]
Sudakov B., Recent developments in extremal combinatorics: Ramsey and Turán type problems. In Proc.
Inter. Congr. Math IV (Hindustan Book Agency, 2010), 2579–2606. [425]
Suk A., On the Erdős–Szekeres convex polygon problem (2016). (arXiv:1604.08657v1). [446]
Sulanke R.A., Bijective recurrences concerning Schröder paths. Electron. J. Combin. 5 (1998), Research
Paper 47, 11. [64]
Sulanke R.A., Problem 10894. Amer. Math. Monthly 108 (2001), 770. Solution 110 (2003), 443–444.
[62]
References 919
Sulanke R.A., Objects counted by the central Delannoy numbers. J. Integer Seq. 6 (2003), Article 03.1.5,
19 pages. [28, 29, 34]
Sumner D.P., Graphs with 1-factors. Proc. Amer. Math. Soc. 42 (1974), 8–12. [272]
Sumner D.P., 1-factors and antifactor sets. J. London Math. Soc. (2) 13 (1976), 351–359. [273]
Sumner D.P., Subtrees of a graph and the chromatic number. In The theory and applications of graphs
(Kalamazoo, Mich., 1980) (Wiley, 1981), 557–576. [351]
Sved M., Counting and recounting: the aftermath. Math. Intelligencer 6 (1984), 44–45. [40]
Sýkora O. and I. Vrt’o, On crossing numbers of hypercubes and cube connected cycles. BIT 33 (1993),
232–237. [798]
Sylvester J.J., On the change of systems of independent variables. Quart. J. Math. 1 (1857), 42–56.
[37]
Sylvester J.J., Thoughts on orthogonal matrices, simultaneous sign-successions, and tessellated pave-
ments in two or more colours, with applications to Newton’s rule, ornamental tile-work, and the
theory of numbers. Phil. Mag. 34 (1867), 461–475. [618]
Sylvester J.J. and F. Franklin, A Constructive Theory of Partitions, Arranged in Three Acts, an Interact
and an Exodion. Amer. J. Math. 5 (1882), 251–330. [141, 142]
Sysło M.M. and J. Zak, The bandwidth problem: critical subgraphs and the solution for caterpillars. In
Bonn Workshop on Combin. Opt. (Bonn, 1980) (North-Holland, 1982), 281–286. [819]
Szegedy M., The Lovász local lemma—a survey. In Computer science—theory and applications, Lecture
Notes in Comput. Sci. 7913 (Springer, 2013), 1–11. [674]
Székely L.A., Crossing numbers and hard Erdős problems in discrete geometry. Combin. Probab. Com-
put. 6 (1997), 353–358. [794, 798]
Szekeres G. and L. Peters, Computer solution to the 17-point Erdős–Szekeres problem. ANZIAM J. 48
(2006), 151–164. [458]
Szekeres G. and H.S. Wilf, An inequality for the chromatic number of a graph. J. Combin. Th. 4 (1968),
1–3. [338]
Szele T., Combinatorial investigations concerning complete directed graphs (Hungarian). Mat. Fiz.
Lapok 50 (1943), 223–236. [666]
Szemerédi E., On sets of integers containing no four elements in arithmetic progression. In Number
Theory (János Bolyai Math. Soc., Debrecen, 1968) (North-Holland, 1970), 197–204. [484]
Szemerédi E., On graphs containing no complete subgraph with 4 vertices. Mat. Lapok 23 (1972), 113–
116. [492]
Szemerédi E., On sets of integers containing no ¾ elements in arithmetic progression. Acta Arith. 27
(1975), 199–245. [480, 484]
Szemerédi E., Regular partitions of graphs. In Problémes combinatoires et théorie des graphes (Orsay,
1976), Colloq. Internat. CNRS, 260 (1978), 399–401. [480]
Szemerédi E., Arithmetic progressions, different regularity lemmas and removal lemmas. Commun.
Math. Stat. 3 (2015), 315–328. [480, 484]
Szemerédi E. and W.T. Trotter, Extremal problems in discrete geometry. Combinatorica 3 (1983), 381–
392. [794, 798]
Szpilrajn E., Sur l’extension de l’ordre partiel (French). Fundamenta Mathematicae 16 (1930), 386–389.
[569]
’t Woord A.N., Solution to problem 10490. Amer. Math. Monthly 106 (1999), 589. Proposed 102 (1995),
930. [32]
Tagiuri A., On some recurrent sequences with positive integer terms (Italian). Periodico di Mat. (2) 3
(1900), 1–12. [61]
Tait P.G., Remarks on the colourings of maps. Proc. R. Soc. Edinburgh 10 (1880), 729. [399, 400]
Talagrand M., Concentration of measure and isoperimetric inequalities in product spaces. Inst. Hautes
Études Sci. Publ. Math. (1995), 73–205. [712, 720]
Tamassia R. and I.G. Tollis, A unified approach to visibility representations of planar graphs. Discrete
Comput. Geom. 1 (1986), 321–341. [394]
920 References
Tanaka Y., Equivalence of the HEX game theorem and the Arrow impossibility theorem. Appl. Math.
Comput. 186 (2007), 509–515. [803]
Tanner R.M., Explicit construction of concentrators from generalized n-gons. SIAM J. Algebr. Discrete
Meth. 5 (1984), 287–293. [779]
Tao T., Moser’s entropy compression argument (blog post) (2009). Available at http://terrytao.
wordpress.com/2009/08/05/mosers-entropy-compression-argument. [680]
Tao T., Algebraic combinatorial geometry: the polynomial method in arithmetic combinatorics, incidence
combinatorics, and number theory. EMS Surv. Math. Sci. 1 (2014), 1–46. [732]
Tao T. and V. Vu, Additive combinatorics, Cambridge Studies in Advanced Mathematics 105 (Cambridge
Univ. Press, 2006). [488]
Tarjan R.E., A simple version of Karzanov’s blocking flow algorithm. Oper. Res. Letters 2 (1984), 265–
268. [246]
Tarry G., Le problème des labyrinthes (French). Nouv. Ann. Math. 14 (1895), 187–190. [763]
Tarry G., Le problème de 36 officiers. Compte Rendu de l’Assoc. Français Avanc. Sci. Naturel 1 (1900),
122–123. [612]
Tarry G., Le problème de 36 officiers. Compte Rendu de l’Assoc. Français Avanc. Sci. Naturel 2 (1901),
170–203. [612]
Tashkinov V.A., 3-regular subgraphs of 4-regular graphs. Mat. Zametki 36 (1984), 239–259. [736]
Tator C., On the Dimension of Ordered Sets (Technische Hochschule Darmstadt, 1983). Thesis.
[575, 583]
Tauraso R., Problem 11241. Amer. Math. Monthly 113 (2006), 656. Solution 115 (2008), 858–859. [81]
Taylor H., Problem E3448. Amer. Math. Monthly 98 (1991), 553. Solution 100 (1993), 298–300. [91]
Thomas R. and P. Wollan, An improved linear edge bound for graph linkages. European J. Combin. 26
(2005), 309–324. [314]
Thomason A.G., Hamiltonian cycles and uniquely edge colourable graphs. Ann. Discr. Math. 3 (1978),
259–268. [242, 249, 318, 331, 332]
Thomason A.G., An extremal function for contractions of graphs. Math. Proc. Cambridge Philos. Soc. 95
(1984), 261–265. [710]
Thomason A.G., The extremal function for complete minors. J. Combin. Th. B 81 (2001), 318–338.
[710]
Thomassen C., Planarity and duality of finite and infinite graphs. J. Combin. Th. B 29 (1980a), 244–
271. [304, 392]
Thomassen C., 2-linked graphs. European J. Combin. 1 (1980b), 371–378. [314]
Thomassen C., Kuratowski’s Theorem. J. Graph Th. 5 (1981a), 225–241. [392]
Thomassen C., Nonseparating cycles in ¾ -connected graphs. J. Graph Theory 5 (1981b), 351–354.
[305, 313]
Thomassen C., A remark on the factor theorems of Lovász and Tutte. J. Graph Theory 5 (1981c), 441–
442. [262]
Thomassen C., A theorem on paths in planar graphs. J. Graph Th. 7 (1983), 169–176. [334, 401]
Thomassen C., A refinement of Kuratowski’s Theorem. J. Combin. Th. B 37 (1984), 245–253. [393]
Thomassen C., Interval representations of planar graphs. J. Combin. Th. B 40 (1986), 9–20. [394]
Thomassen C., Paths, circuits and subdivisions. In Selected topics in graph theory, 3 (Academic Press,
1988), 97–131. [333, 350]
Thomassen C., Grötzsch’s 3-Color Theorem. J. Combin. Th. B 62 (1994a), 268–279. [414]
Thomassen C., Every planar graph is 5-choosable. J. Combin. Th. B 62 (1994b), 180–181. [402, 742]
Thomassen C., 3-list-coloring planar graphs of girth 5. J. Combin. Th. B 64 (1995a), 101–107. [403]
Thomassen C., Decomposing a planar graph into degenerate graphs. J. Combin. Th. B 65 (1995b), 305–
314. [419]
Thomassen C., A short list color proof of Grötzsch’s theorem. J. Combin. Th. B 88 (2003), 189–192.
[414]
Thrall R.M., A combinatorial problem. Michigan Math. J. 1 (1952), 81–88. [192, 207]
References 921
Thurston W.P., Three-dimensional geometry and topology. Vol. 1, Princeton Mathematical Series 35
(Princeton Univ. Press, 1997). Also 1991. [394]
Tian F., A short proof of a theorem about the circumference of a graph. J. Combin. Th. B 45 (1988), 373–
375. [325]
Tian F., A short proof of Fan’s theorem. Discr. Math. 286 (2004), 285–286. [325]
Tian F. and R.H. Shi, A new class of pancyclic graphs. J. Systems Sci. Math. Sci. 6 (1986), 258–262.
[326]
Timmons C., Star coloring high girth planar graphs. Electron. J. Combin. 15 (2008), Research Paper
124, 17. [422]
Toft B., On the maximal number of edges of critical ¾ -chromatic graphs. Studia Sci. Math. Hungar. 5
(1970), 461–470. [354]
Toft B., Colouring, stable sets and perfect graphs. In Handbook of combinatorics, Vol. 1, 2 (Elsevier,
1995), 233–288. [335]
Toida S., Properties of an Euler graph. J. Franklin Inst. 295 (1973), 343–5. [239]
Tomescu I., Sur le problème du coloriage des graphes généralisés. C. R. Acad. Sci. Paris Sér. A-B 267
(1968), A250–A252. [667]
Tomescu I., Problem E3188. Amer. Math. Monthly 94 (1987), 72. Solution 95 (1988), 876–877. [512]
Tomescu I., Problem E3409. Amer. Math. Monthly 97 (1990), 916. Solution 99 (1991), 860–861. [355]
Touchard J., Sur les cycles des substitutions. Acta Math. 70 (1939), 243–297. [127]
Tracy P., Problem 10811. Amer. Math. Monthly 107 (2000), 566. Solution 109 (2002), 478. [249]
Trotignon N., Perfect graphs. In Topics in chromatic graph theory, Encyclopedia Math. Appl. 156 (Cam-
bridge Univ. Press, 2015), 137–160. [370]
Trotter W.T., Dimension of the crown Sn¾ . Discr. Math. 8 (1974a), 85–103. [584]
Trotter W.T., Irreducible posets with large height exist. J. Combin. Th. A 17 (1974b), 337–344. [583]
Trotter W.T., Inequalities in dimension theory for posets. Proc. Amer. Math. Soc. 47 (1975), 311–316.
[573, 583]
Trotter W.T., A generalization of Hiraguchi’s: inequality for posets. J. Combin. Th. A 20 (1976), 114–
123. [583]
Trotter W.T., The dimension of the Cartesian product of partial orders. Discr. Math. 53 (1985), 255–263.
[572]
Trotter W.T., W.G. Gehrlein, and P.C. Fishburn, Balance theorems for height-2 posets. Order 9 (1992),
43–53. [823]
Trotter W.T. and J.I. Moore, Jr., Some theorems on graphs and posets. Discr. Math. 15 (1976a), 79–84.
[583]
Trotter W.T. and J.I. Moore, Jr., Characterization problems for graphs, partially ordered sets, lattices,
and families of sets. Discr. Math. 16 (1976b), 361–381. [573]
Tsai M.T. and D.B. West, A new proof of 3-colorability of Eulerian triangulations. Ars Math. Contemp. 4
(2011), 73–77. [419]
Tsai S.F., Problem 11987. Amer. Math. Monthly 124 (2017), 563. Solution 126 (2019), March. [551]
Tucker A.W., Some topological properties of disk and sphere. In Proc. First Canadian Math. Congress,
Montreal, 1945 (Univ. Toronto Press, 1946), 285–309. [807, 809]
Turán P., Eine Extremalaufgabe aus der Graphentheorie. Mat. Fiz Lapook 48 (1941), 436–452.
[223, 475, 476, 489, 491]
Tutte W.T., On Hamiltonian circuits. J. Lond. Math. Soc. 21 (1946), 98–101. [242, 401]
Tutte W.T., The factorization of linear graphs. J. Lond. Math. Soc. 22 (1947), 107–111. [264]
Tutte W.T., The dissection of equilateral triangles into equilateral triangles. Proc. Cambridge Philos.
Soc. 44 (1948), 463–482. [749]
Tutte W.T., The factors of graphs. Canad. J. Math. 4 (1952), 314–328. [268, 270, 276]
Tutte W.T., A short proof of the factor theorem for finite graphs. Canad. J. Math. 6 (1954), 347–352.
[269, 270, 276]
Tutte W.T., A theorem on planar graphs. Trans. Amer. Math. Soc. 82 (1956), 99–116. [401]
Tutte W.T., A homotopy theorem for matroids, I, II. Trans. Amer. Math. Soc. 88 (1958), 144–174. [398]
922 References
Tutte W.T., Convex representations of graphs. Proc. Lond. Math. Soc. 10 (1960), 304–320. [392, 783]
Tutte W.T., A theory of 3-connected graphs. Indag. Math. 23 (1961), 441–55. [304, 305, 314, 535]
Tutte W.T., On the problem of decomposing a graph into n connected factors. J. Lond. Math. Soc. 36
(1961a), 221–230. [251]
Tutte W.T., How to draw a graph. Proc. London Math. Soc. (3) 13 (1963), 743–767. [398]
Tutte W.T., Connectivity in Graphs (Toronto Univ. Press, 1966). [314]
Tutte W.T., Introduction to the Theory of Matroids (Amer. Elsevier, 1970). [398, 520]
Tutte W.T., On the 2-factors of bicubic graphs. Discr. Math. 1 (1971), 203–208. [317, 330]
Tutte W.T., The subgraph problem. Ann. Discr. Math. 3 (1978), 289–295. [370]
Tutte W.T. and C.A.B. Smith, On Unicursal Paths in a Network of Degree 4. Amer. Math. Monthly 48
(1941), 233–237. [752]
Tuza Z., Graph coloring in linear time. J. Combin. Th. B 55 (1992), 236–243. [339, 343]
Tverberg H., A proof of the Jordan Curve Theorem. Bull. Lond. Math. Soc. 12 (1980), 34–38. [378]
Tverberg H., On the decomposition of K n into complete bipartite subraphs. J. Graph Th. 6 (1982), 493–
494. [771]
Ungar P., Problem 4385. Amer. Math. Monthly 57 (1950), 189. Solution 58 (1951), 573. [763]
Ungar P., Problem E3052. Amer. Math. Monthly 91 (1984), 438. Solution 94 (1987), 185–186. [175]
Valencia-Pabon M. and J.C. Vera, On the diameter of Kneser graphs. Discr. Math. 305 (2005), 383–385.
[251]
Valiant L.G., The complexity of enumeration and reliability problems. SIAM J. Comput. 8 (1979), 410–
421. [754]
van den Heuvel J. and S. McGuinness, Coloring the square of a planar graph. J. Graph Theory 42 (2003),
110–124. [424]
van der Waerden B.L., Beweis einer Baudetschen Vermutung (in German). Niew. Arch. Wisk. 15 (1927),
212–216. [463, 464]
van der Waerden B.L., Moderne Algebra Vol. 1 (2nd ed.) (Springer-Verlag, 1937). (Many editions.)
[514, 520]
van Lint J.H., Combinatorial Theory Seminar, Eindhoven University of Technology, Lect. Notes in Math.
382 (Springer-Verlag, 1974). [139]
van Lint J.H. and R.M. Wilson, A course in combinatorics (Cambridge Univ. Press, 1992).
[609, 622, 639]
Vanden Eynden C., Problem E3435. Amer. Math. Monthly 98 (1991), 365. Solution 99 (1992), 881–882.
[92]
Vandenbussche J. and D.B. West, Matching extendability in hypercubes. SIAM J. Discr. Math. 23 (2009),
1539–1547. [260]
Vandermonde A.-T., Mémoire sur des irrationanelles de différents ordres avec une application au cercle
(French). Acad. des Sci. (1772). [26]
Vapnik V.N. and A.Y. Chervonenkis, Theory of uniform convergence of frequencies of events to their
probabilities and problems of search for an optimal solution from empirical data. Avtomat. i Tele-
meh. (1971), 42–53. [711, 712]
Vassilev M. and K. Atanassov, On Delanoy numbers. Annuaire Univ. Sofia Fac. Math. Inform. 81 (1994),
153–162. [29]
Vazirani V.V., A theory of alternating paths and blossoms for proving correctness of the O(| V 1/2 || E|)
general graph matching algorithm. Combinatorica 14 (1994), 71–91. [284]
Vazirani V.V. and M. Yannakakis, Pfaffian orientations, 0-1 permanents, and even cycles in directed
graphs. Discrete Appl. Math. 25 (1989), 179–190. [754, 756]
Veršik A.M. and S.V. Kerov, Asymptotic behavior of the Plancherel measure of the symmetric group and
the limit form of Young tableaux. Dokl. Akad. Nauk SSSR 233 (1977), 1024–1027. [722, 821]
Verstraëte J., On arithmetic progressions of cycle lengths in graphs. Combin. Probab. Comput. 9 (2000),
369–373. [479]
References 923
Wallis W.D. (ed.), Computational and constructive design theory, Mathematics and its Applications 368
(Kluwer Acad., 1996). [609]
Wallis W.D., A beginner’s guide to graph theory (Birkhäuser Boston, 2000). [215]
Wallis W.D. (ed.), Designs 2002, Mathematics and its Applications 563 (Kluwer Acad., 2003). [609]
Walsh T.R., The towers of Hanoi revisited: moving the rings by counting the moves. Inform. Process. Lett.
15 (1982), 64–67. [80]
Walsh T.R., Iteration strikes back—at the cyclic Towers of Hanoi. Inform. Process. Lett. 16 (1983), 91–
93. [80]
Walter J.R., Representations of rigid cycle graphs (Wayne State Univ., 1972). Ph.D. Thesis. [373]
Walters I.C., Jr., The ever expanding expander coefficients. Bull. Inst. Combin. Appl. (1996), 97. [779]
Wang D.L. and D.J. Kleitman, On the existence of n-connected graphs with prescribed degrees (n ≥ 2).
Networks 3 (1973), 225–239. [226]
Wang D.L. and P. Wang, Some results about the Chvátal conjecture. Discr. Math. 24 (1978), 95–101.
[501]
Wang J.F., D.B. West, and B. Yao, Maximum bandwidth under edge addition. J. Graph Theory 20 (1995),
87–90. [819]
Wang W. and K.W. Lih, Choosability and edge choosability of planar graphs without five cycles. Appl.
Math. Lett. 15 (2002), 561–565. [413]
Wang Y., Notes on Chvátal’s conjecture. Discr. Math. 247 (2002), 255–259. [503]
Wardlaw W.P., Problem E3358. Amer. Math. Monthly 96 (1989), 928. Solution 98 (1991), 650.
[116, 173]
Warren H.E., Lower bounds for approximation by nonlinear manifolds. Trans. Amer. Math. Soc. 133
(1968), 167–178. [830]
Watkins M.E., A lower bound for the number of vertices of a graph. Amer. Math. Monthly 74 (1967), 297.
[313]
Watkins M.E., On the existence of certain disjoint arcs in graphs. Duke Math. J. 35 (1968), 231–246.
[314]
Weaver W., Questions, Discussions, and Notes: Lewis Carroll and a Geometrical Paradox. Amer. Math.
Monthly 45 (1938), 234–236. [60]
Wei V.K., A Lower Bound on the Stability Number of a Simple Graph. Tech. Rep. TM 81-11217-9, Bell
Laboratories (1981). [263, 662]
Weinstein J.M., On the number of disjoint edges in a graph. Canad. J. Math. 15 (1963), 106–111.
[263]
Welsh D.J.A., Matroid Theory (Academic Press, 1976). [514, 520, 532]
Welsh D.J.A., Colouring problems and matroids. In Surveys in combinatorics (Proc. 7th British Combi.
Conf., 1979), London Math. Soc. Lecture Note Ser. 38 (Cambridge Univ. Press, 1979), 229–257.
[538, 539]
Welsh D.J.A. and M.B. Powell, An upper bound for the chromatic number of a graph and its application
to timetabling problems. Computer J. 10 (1967), 85–87. [337]
Wendel J.G., A problem in geometric probability. Math. Scand. 11 (1962), 109–111. [669]
Wernicke P., Über den kartographischen Vierfarbensatz. Math. Ann. 58 (1904), 413–426. [406]
West D.B., Pairs of adjacent Hamiltonian circuits with small intersection. Stud. Appl. Math. 59 (1978),
245–248. [331]
West D.B., A symmetric chain decomposition of L(4 , n). European J. Combin. 1 (1980), 379–383.
[557, 565]
West D.B., Extremal problems in partially ordered sets. In Ordered sets (Banff, Alta., 1981), NATO Adv.
Study Inst. C: Math. Phys. Sci. 83 (Reidel, 1982a), 473–521. [493]
West D.B., The number of complete subgraphs in graphs with non-majorizable degree sequences. In
Proc. Silver Jubilee Conf. (Waterloo, 1982), Progress in Graph Theory (Academic Press, 1982b),
509–521. [491]
West D.B., “Poly-unsaturated” posets: the Greene–Kleitman theorem is best possible. J. Combin. Th. A
41 (1986), 105–116. [551]
References 925
West D.B., Introduction to graph theory (Prentice Hall, 1996). Also 2001. [215]
West D.B., The superregular graphs. J. Graph Th. 23 (1996), 289–295. [782]
West D.B., Short proofs for interval digraphs. Discr. Math. 178 (1998), 287–292. [605]
West D.B., Introduction to graph theory, 2nd ed. (Prentice Hall, 2001). Also 1996. [539]
West D.B., A short proof of the Berge–Tutte formula and the Gallai–Edmonds structure theorem. Euro-
pean J. Combin. 32 (2011), 674–676. [275]
West D.B., L.H. Harper, and D.E. Daykin, Some remarks on normalized matching. J. Combin. Th. A 35
(1983), 301–308. [564, 567]
West D.B. and D.J. Kleitman, Skew chain orders and sets of rectangles. Discr. Math. 27 (1979), 99–102.
[565]
West D.B., W.T. Trotter, G.W. Peck, and P. Shor, Regressions and monotone chains: a Ramsey-type ex-
tremal problem for partial orders. Combinatorica 4 (1984), 117–119. [442]
West D.B. and W.H. Wiedemann, Problem E3290. Amer. Math. Monthly 95 (1988), 872. Solution 97
(1990), 428–429. [176]
West Don, Solution to problem E2404. Amer. Math. Monthly 81 (1974), 287. Proposed 80 (1973), 316.
[106]
White D.E. and S.G. Williamson, Recursive matching algorithms and linear orders on the subset lattice.
J. Combinatorial Theory A 23 (1977), 117–127. [566]
Whiting P.D. and J.A. Hillier, A method for finding the shortest route through a road network. Operations
Research Quart. 11 (1960), 37–40. [246]
Whitney H., A theorem on graphs. Ann. of Math. (2) 32 (1931), 378–390. [401, 418]
Whitney H., Congruent graphs and the connectivity of graphs. Amer. J. Math. 54 (1932a), 150–168.
[293, 300, 306, 314]
Whitney H., A logical expansion in Mathematics. Bull. Amer. Math. Soc. 38 (1932b), 572–579. [158]
Whitney H., Non-separable and planar graphs. Trans. Amer. Math. Soc. 34 (1932c), 339–362. [526]
Whitney H., 2-isomorphic graphs. Amer. J. Math. 55 (1933), 245–254. [380, 398]
Whitney H., On the abstract properties of linear dependence. Amer. J. Math. 57 (1935), 509–533.
[514, 520, 523, 536]
Whitworth W.A., Choice and Chance (2nd ed.) (Deighton, Bell & Co., 1897). First edition 1867.
[33, 40, 46, 115]
Wiener N., A contribution to the theory of relative position. Proc. Cambridge Philos. Soc. 17 (1914), 441–
449. [586, 605]
Wilf H.S., The eigenvalues of a graph and its chromatic number. J. Lond. Math. Soc. 42 (1967), 330–
332. [769]
Wilf H.S., The friendship theorem. In Combinatorial Mathematics and Its Applications (Oxford, 1969)
(Academic Press, 1971), 307–309. [775]
Wilf H.S., generatingfunctionology (Academic Press, 1990). [87, 112, 117, 129, 135, 136, 140]
Wilf H.S., Problem 10578. Amer. Math. Monthly 104 (1997), 270. Solution 106 (1999), 169. [91]
Will T.G. and H. Hulett, Parsimonious multigraphs. SIAM J. Discr. Math. 18 (2004), 241–245. [238]
Williamson J., Hadamard’s determinant theorem and the sum of four squares. Duke Math. J. 11 (1944),
65–81. [622]
Wilson R.M., Constructions and uses of pairwise balanced designs. In Combin. (Proc. NATO Advanced
Study Inst., 1974) Part 1: Theory of designs, finite geometry and coding theory, Centre Tracts 55
(Math. Centrum, 1974), 18–41. [641]
Wilson R.M., An existence theory for pairwise balanced designs, II–III. J. Combin. Th. A 18 (1975), 71–
79. [640]
Wilson R.M., The exact bound in the Erdős–Ko–Rado theorem. Combinatorica 4 (1984),247–257.
[500]
Win S., Existenz von Gerüsten mit vorgeschriebenem Maximalgrad in Graphen. Abh. Math. Sem. Univ.
Hamburg 43 (1975), 263–267. [327, 328]
Win S., On a conjecture of Las Vergnas concerning certain spanning trees in graphs. Resultate Math. 2
(1979), 215–224. [327]
926 References
Win Z., On the windy postman problem on Eulerian graphs. Math. Programming 44 (1989), 97–112.
[327]
Winkler P., Random orders. Order 1 (1985), 317–331. [821]
Winkler P.M., Average height in a partially ordered set. Discr. Math. 39 (1982), 337–341. [608]
Winkler P.M., Proof of the squashed cube conjecture. Combinatorica 3 (1983), 135–139. [781]
Winkler P.M., Correlation and order. In Combinatorics and ordered sets (Arcata, 1985), Contemp. Math.
57 (Amer. Math. Soc., 1986), 151–174. [600]
Winkler P.M., Mathematical puzzles: a connoisseur’s collection (A K Peters, 2004). [221, 667]
Winkler P.M., Puzzled: Solutions and sources. Commun. ACM 51 (2008), 118–118. [431]
Wismath S.K., Characterizing bar line-of-sight graphs. In Proc. 1st Symp. Comput. Geo. (Baltimore,
1985) (ACM, 1985), 147–152. [394]
Witt E., Ein kombinatorischer Satz der Elementargeometrie (in German). Math. Nachr. 6 (1952), 261–
262. [467]
Wood D., The towers of Brahma and Hanoi revisited. J. Recreational Math. 14 (1981/82), 17–24. [80]
Woodall D.R., Sufficient conditions for circuits in graphs. Proc. Lond. Math. Soc. 24 (1972), 739–755.
[323]
Woodall D.R., An exchange theorem for bases of matroids. J. Combin. Th. B 16 (1974), 227–228. [538]
Woodall D.R., Cyclic-order graphs and Zarankiewicz’s crossing-number conjecture. J. Graph Th. 17
(1993), 657–671. [793, 798]
Woodall D.R., The average degree of an edge-chromatic critical graph. II. J. Graph Th. 56 (2007), 194–
218. [414]
Woodall D.R., The average degree of a multigraph critical with respect to edge or total choosability. Discr.
Math. 310 (2010), 1167–1171. [414]
Woolhouse W.S.B., Prize question 1733. Lady’s and Gentleman’s Diary (1844). [641]
Wormald N.C., Some problems in the enumeration of labelled graphs (Univ. Newcastle, 1978). Ph.D.
Thesis. [697, 704]
Wormald N.C., The differential equation method for random graph processes and greedy algorithms. In
Lectures on Approximation and Randomized Algorithms (M. Karonski and H.J. Proemel, eds.)
(PWN, Warsaw, 1999a), 73–155. [722]
Wormald N.C., Models of random regular graphs. In Surveys in combinatorics, 1999 (Canterbury), Lon-
don Math. Soc. Lecture Note Ser. 267 (Cambridge Univ. Press, 1999b), 239–298. [697]
Worpitzky J., Studien über die bernoullischen und eulerschen Zahlen (German). J. Reine Angewandte
94 (1883), 203–232. [101]
Wu J.L., On the linear arboricity of planar graphs. J. Graph Theory 31 (1999), 129–134. [412, 422]
Wu J.L. and Y.W. Wu, The linear arboricity of planar graphs of maximum degree seven is four. J. Graph
Theory 58 (2008), 210–220. [412]
Xiao S., Solution to problem 11509. Amer. Math. Monthly 119 (2012), 430. Proposed 117 (2010), 558.
[24]
Xiao Y. and H. Zhao, New method for counting the number of spanning trees in a two-tree network. Phys.
A 392 (2013), 4576–4583. [65]
Yaglom A.M. and I.M. Yaglom, Challenging mathematical problems with elementary solutions. Vol. I:
Combinatorial analysis and probability theory, Translated by James McCawley, Jr.; revised and
edited by Basil Gordon (Holden-Day, 1964). [24]
Yamamoto K., Logarithmic order of free distributive lattice. J. Math. Soc. Japan 6 (1954), 343–353.
[558]
Yamashita T., Degree sum conditions and Chvátal–Erdős conditions for cycles. In The COE Seminar on
Mathematical Sciences 2004, Sem. Math. Sci. 31 (Keio Univ., 2004), 185–199. [316]
Yan C.H., Parking functions. In Handbook of enumerative combinatorics, Discr. Math. Appl. (Boca Raton)
(CRC Press, 2015), 835–893. [50]
Yannakakis M., The complexity of the partial order dimension problem. SIAM J. Algebraic Discrete
Methods 3 (1982), 351–358. [573]
Yao A.C.C., Should tables be sorted? J. Assoc. Comput. Mach. 28 (1981), 615–628. [447, 448]
References 927
Yao F.F., D.P. Dobkin, H. Edelsbrunner, and M.S. Paterson, Partitioning space for range queries. SIAM
J. Comput. 18 (1989), 371–384. [815]
Yap H.P., Total colourings of graphs. Bull. London Math. Soc. 21 (1989), 159–163. [373, 654]
Yates F., A new method of arranging field trials involving a large number of varieties. J. Agric. Sci. Comb.
26 (1936), 424–455. [612]
Yeh Y.N., A remarkable endofunction involving compositions. Stud. Appl. Math. 95 (1995), 419–432.
[144]
Young A., Quantitative substitutional analysis I. Proc. London Math. Soc. 33 (1901), 97–146. [189]
Young A., Quantitative substitutional analysis II. Proc. London Math. Soc. 35 (1902), 361–397.
[190, 207]
Yu X., Problem 10575. Amer. Math. Monthly 104 (1997), 168–169. Solution 106 (1999), 266–268. [134]
Zaker M., On lower bounds for the chromatic number in terms of vertex degree. Discr. Math. 311 (2011a),
1365–1370. [341]
Zaker M., Bounds for chromatic number in terms of even-girth and booksize. Discr. Math. 311 (2011b),
197–204. [342]
Zaks J., Towards a simpler proof of the Brouwer fixed point theorem. Geombinatorics 5 (1995), 35–37.
[804]
Zamani R. and D.B. West, Spanning cycles through specified edges in bipartite graphs. J. Graph Theory
71 (2012), 1–17. [326]
Zarankiewicz K., On a problem of P. Turán concerning graphs. Fund. Math. 41 (1954), 137–145. [793]
Zaslavsky T., Glossary and bibliography of signed and gain graphs and allied areas. Electron. J. Combin.
5 (1998), Dynamic Surveys 8, 124 and 9, 41. [237]
Zeckendorf E., A generalized Fibonacci numeration. Fibonacci Quart. 10 (1972), 365–372. [61]
Zehavi A. and A. Itai, Three tree-paths. J. Graph Theory 13 (1989), 175–188. [315]
Zeilberger D., Sister Celine’s technique and its generalizations. J. Math. Anal. Appl. 85 (1982), 114–145.
[90]
Zeilberger D., A short hook-lengths bijection inspired by the Greene–Nijenhuis–Wilf proof. Discr. Math.
51 (1984), 101–108. [192]
Zeilberger D., Kathy O’Hara’s constructive proof of the unimodality of the Gaussian polynomials. Amer.
Math. Monthly 96 (1989), 590–602. [557]
Zeilberger D., A fast algorithm for proving terminating hypergeometric identities. Discr. Math. 80 (1990),
207–211. [90]
Zeilberger D., The method of creative telescoping. J. Symbolic Comput. 11 (1991), 195–204. [90]
Zeilberger D., Reverend Charles to the aid of Major Percy and Fields medalist Enrico. Amer. Math.
Monthly 103 (1996), 501–502. [178]
Zeilberger D., Dodgson’s determinant-evaluation rule proved by two-timing men and women. Electron.
J. Combin. 4 (1997), Research Paper 22. [178]
Zhan S., On Hamiltonian line graphs and connectivity. Discr. Math. 89 (1991), 89–95. [326]
Zhang K.M. and Z.M. Song, Cycles in digraphs—a survey. Nanjing Daxue Xuebao Ziran Kexue Ban 27
(1991), 188–215. [316]
Zhang L., Every planar graph with maximum degree 7 is of class 1. Graphs Combin. 16 (2000), 467–
495. [422]
Zhang L. and B. Wu, Edge choosability of planar graphs without small cycles. Discr. Math. 283 (2004),
289–293. [413]
Zhou B., A note on the Erdős–Sós conjecture. Acta Math. Sci. (English Ed.) 4 (1984), 287–289. [248]
Zhou L., Problem 11187. Amer. Math. Monthly 112 (2005), 929. Solution 114 (2007), 554. [66]
Zhu Q.C., The structure of -critical graphs with | V(G)|− 2 (G) = 3. In Graph theory and its applications:
East and West (Jinan, 1986), Ann. New York Acad. Sci. 576 (1989), 716–722. [458]
Zhu X., The fractional version of Hedetniemi’s conjecture is true. European J. Combin. 32 (2011), 1168–
1175. [461]
Zhu X., The Alon–Tarsi number of planar graphs. J. Combin. Th. B 134 (2019), 354–358. [742]
928 References
Zhu Y.J., Z.H. Liu, and Z.G. Yu, An improvement of Jackson’s result on Hamilton cycles in 2-connected
regular graphs. In Cycles in Graphs (Burnaby, 1982) (B. Alspach and C. Godsil, eds.) (North-
Holland, 1985), 237–247. [326]
Ziegler G.M., Generalized Kneser coloring theorems with combinatorial proofs. Invent. Math. 147 (2002),
671–691. [812]
Zito J., The structure and maximum number of maximum independent sets in trees. J. Graph Theory
15 (1991), 207–221. [264]
Znám Š., Two improvements of a result concerning a problem of K. Zarankiewicz. Colloq. Math. 13
(1965), 255–258. [631]
Zykov A.A., On some properties of linear complexes (Russian). Mat. Sbornik 24 (1949), 163–188.
[354, 476]
Author Index
Luo, R. 423 McDiarmid, C. J. H. 372, 657, Molloy, M. 335, 362, 373, 657,
Lützen, J. 740 685, 701, 706, 719, 721, 801–3 668, 674, 677, 681, 685–6,
Lyusternik, L. A. 810 McFarland, R. 637 702, 706, 721–2
McGuinness, S. 424 Monjardet, B. 586
McKay, B. D. 449, 697 Montágh, B. 50
Ma, M. 371 McKee, T. A. 239, 374 Montellano-Ballesteros, J. J.
Mabry, R. 417 McMorris, F. R. 374 457
MacLane, S. 515, 530 McSorley, J. P. 765 Montgomery, B. 424
MacMahon, P. A. 45, 149, 169, Meagher, K. 500, 781 Montgomery, R. 640, 646
178, 207 Melham, R. S. 60 Montmort, P. R. 162
MacNeish, H. F. 611 Mel nikov, L. S. 414 Moon, J. W. 37, 47, 251, 325,
Maddox, R. 782 Melolidakis, C. 669 332–4, 477, 489, 491, 703, 721
Madej, T. 832 Mendelsohn, N. S. 654 Moore, B. R. 354
Mader, W. 264, 296, 308–11, Menger, K. 298, 300 Moore, E. H. 610–1, 641
315–6, 350–1, 353, 710 Merca, M. 148, 150 Moore, J. I., Jr. 573, 583
Maffray, F. 356 Merris, R. 776, 782 Morávek, J. 373
Magnant, C. 457 Meshalkin, L. D. 558 Morris, R. 460, 682
Magnanti, T. L. 501, 539 Meszka, M. 239 Morris, W. 446
Mahdian, M. 237 Meyniel, H. 375 Morris, W. D., Jr. 446, 580
Mahlburg, K. 664 Miao, L. 414 Moser, L. 59, 325, 332, 441, 477,
Mahmoodian, E. S. 237 Micali, S. 284 514, 703
Mahmoodian, S. E. 329, 343, Micek, P. 680 Moser, R. A. 680
371, 398 Mihók, P. 418 Moshkovitz, G. 602–3
Maillet, E. 623 Miklós, D. 501, 512 Motwani, R. 657
Majumdar, K. N. 730 Mikola, M. 65 Motzkin, T. S. 42, 387, 389, 489,
Malgrange, Y. 393 Milans, K. G. 457, 602, 608, 668, 781
Mann, H. B. 254, 623, 637 685 Mozhan, N. N. 354
Mantel, W. 224, 475 Milgram, A. N. 548 Mubayi, D. 451, 457, 460, 471,
Mao, J. 237 Miller, E. 784 478, 500, 686
Marcus, A. 432–3 Miller, E. W. 569–70, 831 Muir, T. 764
Marcus, M. 257, 765 Miller, G. L. 397 Mulder, H. M. 253, 274, 374
Margulis, G. A. 779–80 Miller, Z. 343, 819 Mullen, G. L. 623, 656
Marica, J. 512 Mills, G. 463 Mullin, R. 123
Markowsky, G. 558, 580 Mills, W. H. 514 Munkres, J. 280
Martin, M. H. 763 Milman, V. D. 778–80 Murty, U. S. R. 215, 228, 330,
Martin, R. 488 Milner, E. C. 499, 511 489, 639
Martinov, N. 313 Milutinović, U. 70 Mycielski, J. 340
Massey, J. L. 507 Minoux, M. 287 Myers, B. R. 65, 354
Matoušek, J. 723, 804, 806, 810, Minty, G. J. 338, 540 Myrvold, W. 393
812–3 Mirkin, B. G. 586
Matoušek, J. 461 Mirsky, L. 518, 547 Naatz, M. 312, 764
Matsko, V. J. 565 Mirzakhani, M. 402, 421 Nagasawa, T. 797
Matsuda, H. 327 Mitas, J. 587 Nagy, Z. 459, 728, 745
Matthews, M. M. 326, 330 Mitchem, J. 326 Nakada, H. 296
Matula, D. W. 297, 353–4, 700, Mitzenmacher, M. 708 Nakasawa, T. 515
718 Moessner, A. 62 Nakayama, A. 678
Maunsell, F. G. 264 Moews, D. 668 Narayan, D. A. 624
Maurer, R. 106 Mogyoródi, J. 105 Narayana, T. V. 45
Maurer, S. 228, 584 Mohanty, S. G. 50 Narayanan, B. 765
McAndrew, M. H. 222 Mohar, B. 60, 377, 412, 739, 776, Narayanan, N. 373
McCarthy, J. 667 795, 797 Nasar, S. 803
McConnell, R. M. 573 Möhring, R. H. 573 Naserasr, R. 373
Author Index 937
Quinn, J. J. 53, 664 Rényi, A. 37, 99, 105, 133, 244, Rothschild, B. L. 425, 452,
252, 514, 632, 687, 698–9 463–5, 470
Reuter, K. 572, 584 Rotman, J. J. 238
Rabern, L. 336 Révész, P. 817 Rousseau, C. C. 455, 459
Rabin, M. 263 Rey, J. G. 47 Roussel, F. 370
Rabinovitch, I. 228, 574, 583–4, Reznick, B. 771 Roy, B. 339
604 Ribó Mor, A. 783 Royle, G. 226, 766
Rademacher, H. 140 Rice, J. R. 810 Rubel, L. A. 473
Radhakrishnan, J. 504, 508, Richter, C. 817 Rubin, A. L. 346, 348, 356, 660,
510, 660, 673 Richter, R. B. 489, 794 667
Rado, R. 451, 456, 462, 466–8, Riddell, R. J. 135 Ruciński, A. 484, 657, 673, 696,
470, 498, 503–4, 520, 608 Riddell, R. J., Jr. 127 703, 708
Radoux, C. 177 Riesling, A. S. 817 Rupp, C. A. 178
Radziszowski, S. P. 449 Rieß, W. 557 Rusin, D. J. 103
Raghavan, P. 657 Riguet, J. 605 Rusu, I. 370
Raı̆gorodskiı̆, A. M. 817 Ringeisen, R. D. 794, 798 Rusza, I. 734–5, 745–6
Ramalingam, G. 374 Ringel, G. 218, 646, 656 Ruszinkó, M. 460
Ramamurthi, R. 287, 746 Riordan, J. 47, 50, 65, 133, 153, Ruzsa, I. Z. 485, 492, 684
Ramanan, G. V. 730 161 Ryjáček, Z. 320, 326
Ramanujan, S. 140 Rivera-Campo, E. 327 Ryjáček, Z. 320
Ramirez-Alfonsin, J. 657 Robbins, H. 306 Rymer, N. W. 66
Ramı́rez-Alfonsı́n, J. L. 368, 370 Roberts, F. S. 337 Ryser, H. J. 227–8, 254, 314,
Ramos, E. A. 815 Roberts, J. A. 459 616, 627, 637
Ramras, M. 295 Roberts, S. M. 449
Ramsey, F. P. 443–4, 468 Robertson, A. 425 Saaty, T. L. 399, 418
Randerath, B. 273 Robertson, J. M. 389 Saberi, A. 237
Raney, G. N. 50, 129 Robertson, N. 349, 370, 406, Sabidussi, G. 343, 740
Rasch, D. 655 416–7 Sachs, H. 34, 219, 251, 274,
Raspaud, A. 414 Robinson, G. de. B. 190, 193, 338–9, 739, 766, 780–1
Rautenbach, D. 275 195 Sadri, B. 237
Ray-Chaudhuri, D. K. 370, 647, Robinson, J. P. 820 Sagan, B. 207
649, 731 Rodeh, M. 249 Sagan, B. E. 177, 189, 766, 823
Raynaud, H. 460 Rodger, C. A. 609, 641, 647 Saito, A. 318, 321
Razborov, A. A. 475, 478, 491, Roditty, Y. 236, 327 Šajna, M. 646
504 Rödl, V. 425, 434, 436–7, 455, Sakamoto, J. 355
Read, R. C. 374 471–3, 483–4, 488, 543, 581, Saks, M. E. 548–9, 801–3,
Rechnitzer, A. 433 604, 672, 737 823–4, 826, 831
Rédei, L. 334 Rodney, P. 794 Salamon, G. 334
Redfield, J. H. 184 Rogers, C. A. 724, 729 Salavatipour, M. R. 414
Ree, R. 257 Rogers, D. 64 Salazar, G. 794
Reed, B. A. 335, 339, 355, 359, Rolewicz, S. 369 Salehi Nowbandegani, P. 334
362, 370, 373, 657, 668, 674, Rollová, E. 237 Salgado, E. 414
677, 681, 685–6, 702, 706, Roman, S. M. 123, 632 Salmon, A. 356
721–2 Rónyai, L. 633, 672 Samad, T. 353
Rees, D. 239 Rosa, A. 641, 646–7, 656 Sandell, D. P. 668
Regev, A. 433 Roselle, D. P. 177 Sanders, D. 406, 416–7
Reiher, C. 478 Rosenfeld, M. 326, 373 Sanders, D. P. 414–6, 422–3
Reiman, I. 632 Rota, G. C. 521, 530 Sanders, P. R. 466
Reiniger, B. 434, 442 Rote, G. 783 Sands, A. D. 50
Remmel, J. B. 36, 192 Rotem, D. 582 Santoro, N. 832
Renaud, J.-C. 503, 512 Roth, K. F. 484–5 Saritzky, N. 344
Renault, M. 40 Sarkaria, K. S. 812
Author Index 939
Steele, J. M. 430, 669 Szele, T. 666 Toft, B. 273, 335, 345, 354, 373,
Štefanovič, D. 795 Szemerédi, E. 226, 250, 351–2, 740
Steger, A. 488 357, 451, 455, 480–1, 483–5, Toida, S. 239
Steiglitz, K. 521 488, 492, 504, 663–4, 684, Tokushige, N. 493
Stein, S. K. 387, 393 737, 779, 793–4, 798 Tollis, I. G. 394
Steiner, J. 48, 641 Szpilrajn, E. 569 Tomescu, I. 355, 512, 667
Steinlein, H. 806, 815 Szűcs, A. 810 Tong, L.-D. 287
Stevens, W. L. 610 Törőcsik, J. 461
Stewart, M. J. 272 Tóth, G. 793, 795, 797
Stiebitz, M. 239, 346, 354, 639, ’t Woord, A. N. 32 Touchard, J. 127
739 Tagiuri, A. 61 Tracy, P. 249
Stinson, D. R. 609, 612, 647 Tait, P. G. 399–400 Trotignon, N. 370
Stirzaker, D. R. 666 Talagrand, M. 712, 720 Trotter, W. 794
Stobert, I. 794 Tamassia, R. 394 Trotter, W. T. 50, 228, 373, 442,
Stocker, C. 457 Tanaka, Y. 803 455, 483, 568, 572–3, 580–1,
Stockmeyer, P. K. 92 Tanner, R. M. 779 583–4, 600, 604, 790, 794,
Stolee, D. 276, 422, 602, 608 Tao, M. Q. 801, 819 798, 823, 828, 832
Stone, A. H. 479, 491 Tao, T. 488, 680, 732 Trow, P. B. 429
Stong, R. 330, 343, 461, 623 Tardos, E. 310 Tsai, M.-T. 419
Stout, Q. F. 584 Tardos, G. 432–3, 491, 680 Tsai, S.-F. 551
Stoyanovskii, A. V. 192 Tarjan, R. E. 246, 282, 387, Tucker, A. W. 807, 809
Straus, E. G. 489, 781 393–6, 399 Tucker, T. W. 377
Strehl, V. 31 Tarry, G. 612, 763 Tuglu, N. 177, 766
Stufken, J. 651 Tarsi, M. 738–9, 746, 764 Tuinstra, H. 327
Sturtevant, D. 507 Tashkinov, V. A. 736 Turán, P. 223, 475–6, 484, 489,
Subba Rao, K. 60 Tator, C. 575, 583 491, 631, 672
Sudakov, B. 334, 355, 425, 451, Tauraso, R. 33, 81 Tutte, W. T. 242, 251, 264,
453, 457, 459–60, 484, 551, Tayfeh-Rezaie, B. 622 268–70, 276, 304–5, 314, 317,
601, 608, 646, 672–3, 677, Taylor, H. 91, 346, 348, 356, 330, 370, 392, 398, 401, 521,
684, 731 660, 667 536, 749, 752, 783
Suk, A. 446, 451, 457, 601 Teirlinck, L. 441 Tuza, Z. 262–3, 339, 343–4, 352,
Sulanke, R. A. 28–9, 34, 62, 64 Telle, J. A. 512 357, 403, 472, 491
Sumner, D. P. 272–3, 326, 330, Thiel, L. 612 Tverberg, H. 378, 771
351 Thieu, U. 173
Sun, Q. 414 Thomas, R. 314, 349, 370, Uhlenbeck, G. E. 127, 135
Sun, Z.-W. 473 396–7, 406, 414, 416–7, 471 Umans, C. 504
Sunder, V. S. 776 Thomason, A. 692 Ungar, P. 175, 763
Suppes, P. 587 Thomason, A. G. 242, 249–50, Upfal, E. 708
Suzuki, H. 728, 731 318, 331–2, 351, 710 Urrutia, J. 582, 828, 832
Suzuki, Y. 797 Thomassé, S. 685
Sved, M. 40 Thomassen, C. 238, 262, 304–5, Vaccaro, U. 327, 334
Swiercz, S. 612 313–4, 316, 326, 333–4, 350, Valencia-Pabon, M. 251
Sýkora, O. 798 377, 392–4, 401–3, 414, 419, Valiant, L. G. 754
Sylvester, J. J. 37, 141–2, 618 685, 742, 794 Valicov, P. 373
Sysło, M. M. 819 Thrall, R. M. 190, 192, 207 van Aardenne-Ehrenfest, T. 752
Szabó, T. 633, 672 Thuillier, H. 370 van den Heuvel, J. 424
Szász, D. 105 Thurston, W. P. 387, 394 van der Waerden, B. L. 463–4,
Szegedy, M. 674 Tian, F. 325–6 515, 521
Székely, L. A. 47, 135, 428, 441, Timmons, C. 422 van Lint, J. H. 139, 609, 622,
794, 798 Tindell, R. 237 639, 774
Szekeres, G. 338, 344, 430, 446, Tiwari, P. 771 van Tengbergen, E. 554
458 Todd, M. J. 807, 809 Vanden Eynden, C. 92
Author Index 941
{} - set
∩ , ∪ , ∈ , - intersection, union, membership, symmetric difference
⌊x⌋ , ⌈x⌉ - floor, ceiling (nearest integer at most or at least x)
[ ] - {1 , . . . , }
-object - “object ” with parameter value
[a , b] - {a , . . . , b}, if a , b are integers
[x , y] - { : x ≤ ≤ y}, if x , y are real numbers or poset elements
[x¾ ] - coefficient of x ¾ in a formal power series in x
[S, T] - cut consisting of all edges from S to T
⟨v1 , . . . , vn⟩ - path with vertices v1 , . . . , vn in order
[v1 , . . . , vn] - cycle with vertices v1 , . . . , vn in order
n
n! - ∏i=1 i
⌊(n−1)/2⌋
n!! - ∏i=0 (n − 2i)
n(r) - n(n − 1) · · · (n − r + 1)
n(r) - n(n + 1) · · · (n + r − 1)
d | n - d divides n
d n - d does not divide n
|S| - size of set S
#{i: i ∈ S} - size of described set
#(G) - number of components of a graph
A T - transpose of a matrix A
S - complement of set S (within a given universe)
G - complement of graph G
G ∗ , P ∗ , M ∗ - dual (of a planar graph, poset, or matroid)
↔ - adjacency relation on vertices of graph
→ - succession relation on nodes (vertices) of digraph
- incomparability relation on elements of poset
≺ , - cover relation on elements of poset
an ∼ bn - asymptotic to (ratio approaching 1)
n - partitioning the integer n, with 1 ≥ · · · ≥ ¾ and ∑ i = n
943
944 Glossary of Notation
- density
(X) - span of a set X in a matroid
- universe of sets for intersection classes, surface
∑ - summation
(G) - number of spanning trees in a graph G
(G) - minimum partition into complete bipartite subgraphs
(G) - arboricity of a graph G
- a mapping, often an isomorphism, coloring, or homomorphism
(m) - Euler totient function (numbers in [m] relatively prime to m)
(G) - chromatic number of a graph G
(G) - edge-chromatic number of G
(G) - total chromatic number of G
(G) - list-chromatic number of G
(G) - list-edge-chromatic number of G
(G) - clique number of a graph G
n - unbounded sequence
(A) - intersection graph of collection A
(∑) - intersection class for subsets of ∑
( (n)) - functions at least a constant multiple of (n) (for large n)
Subject Index
A page number in italics indicates a definition. A single listing in italics may
indicate the definition for a concept so prevalent (such as “graph”) that it would not
be productive to list its occurrences. An item that appears on few pages may have
none italicized for the definition.
Page ranges in bold indicate material such as the proof of a major result or the
main treatment of the concept; this may also include a definition. Pages ranges may
also include isolated pages where the term does not appear.
Parenthetic clarifiers act as subheadings. Terms consisting of a word modified by
prefatory notation are alphabetized according to the root word.
automorphism (of graph) base (in vector space) 122–3, 78, 86, 88–9, 92, 111, 132,
212–4, 216, 218–9, 250, 568 156, 166, 178, 658, 734
459, 565, 666, 693, 699 Bell number 126, 134, 147 binomial convolution
automorphism (of poset) Berge cycle 435 118–20, 123–6, 132
565, 606 Berge’s Theorem 501, 512 binomial distribution 687,
average distance 251 Berge–Tutte Formula 707–10, 714, 720–1
-avoiding permutation 265–6, 272–4, 277 -binomial expansion 494–5
431–3, 442 Bernoulli number 123, 133 binomial inversion 124, 132
Aztec diamond 34 Bernoulli random variables rth binomial moment 694–6,
Azuma’s Inequality 706, 707, 712 704
712–7, 722 Bertrand’s Ballot Problem binomial random graph
39, 46, 49, 189 model 687–8, 692
BEST Theorem 752 Binomial Theorem 18, 26–7,
backbone chromatic number
biadjacency matrix 256–7, 33, 77, 85, 119–23, 157,
342
754–6 161, 185, 674
balanced charging 409–11,
biclique 770–1, 781 binomial type 123
413, 415, 422, 424
X , Y -bigraph 211, 216, 227, biorder 605
balanced edge cut 710–1
253–68, 278–9, 287, 332, bipartite graph 211, 231,
balanced graph 692–3, 702,
359, 364–5, 480, 486–7, 253–97, 359, 364–5,
822–4, 831
492, 517, 522, 566–7, 631, 368–9, 517–8, 529, 531,
balanced incomplete block
672–3, 755–6, 779–80 547, 660, 667, 746–7,
design (BIBD) 612–8
bigraphic 227 754–6, 767–8
balanced signed graph 237
bijection 2–4, 8, 15–6, 25, 36, bipartite poset 547, 575–80,
balanced tableau 208
41–50, 63–4, 99, 170, 177, 584, 790, 832
-balanced pair 822–4, 831
196, 212, 442, 526–7, 538, bipartite Ramsey number
ballot list 41–5, 48–9, 56, 63,
545, 626, 741, 764, 781 620, 624
605
Bijection Principle 15 bipartite tournament 334
q-ballot list 42, 50, 64, 128
bijective proof 15, 22, 29–30, bipartition 211, 223, 231,
ballot path 41, 45, 49, 55,
55–6, 63, 66, 105–6, 115, 280, 329, 426, 456, 770
166
132–5, 141–3, 148, 192–3 biplane 616
Ballot Problem 39, 46, 49,
binary n-tuple 2, 25–6, 53, Birkhoff diamond 405, 421
189–90
58–9, 62, 236, 426, 507, Birkhoff–von Neumann
bandwidth 703, 799–801,
555, 580, 619, 699, 722, Theorem 257, 261
818–9
724, 726, 729, 745, 754 bisection 810, 820
bar visibility graph 394
binary list 15, 21, 25, 39, 41, block (in a design) 9, 612–5,
barred permutation 102, 158
93, 116, 121, 505, 513, 669 622–6, 634, 640–1, 645–6,
X , Y -barrier 299, 395
binary matrix 2, 431–4, 510, 649–56, 730
barycenter 251
744 block (in a graph) 136,
barycentric coordinates 783
binary maze 669 294–7, 314, 341–2, 348,
barycentric representation
binary relation 2, 8, 224, 355, 606
784–5, 788–90
542, 605 block (in a matrix) 432–3,
base exchange graph 541
binary search 84, 91, 447 462, 611, 618, 763, 778
base exchange property 516,
binary tree 43–4, 47–9, 135, block (in a partition) 3, 46,
520–4, 537, 539, 541
440 49, 56, 64, 121–2, 125–7,
base (in ideal of sets) 501–2,
Binet’s Formula 68, 664 133–4, 145–7, 157, 175,
512
binomial coefficient 18, 194, 488, 522, 567–8, 588,
base (in matroid) 515–6,
24–35, 40, 56, 59, 62, 74, 605, 607, 678, 716, 761
520–6, 530, 536–41
Subject Index 951
block design 9, 609, 612–9, Brooks’ Theorem 337, 342, Cayley’s Formula 36–7,
623 347–8, 355, 371 46–7, 58, 127–8, 136, 747,
block structure 463–7 broom 239, 352 763, 777–8
block-cutpoint graph 295, Brouwer Fixed-Point Cayley–Hamilton Theorem
297 Theorem 802–6, 819 768
blow-up graph 269, 330 Bruck–Chowla–Ryser cell 154, 191–3, 196, 578,
Blow-up Lemma 481 Theorem 616–7, 626 784–9, 799–807
blow-up poset 560 Brun’s sieve 696 center 233, 239, 243, 250–1,
board of forbidden positions Brunn–Minkowski Theorem 441, 502, 620, 771, 828–30
160–3, 171–2, 175–6 825 central Delannoy number
bond 293, 297, 380–1, 386, Bulgarian Solitaire 143 28, 34, 52, 62, 64, 117
395, 525–7, 763 bumping procedure centroid 251, 440, 474,
bond matroid 525–7 195–200, 203, 206, 208 824–7
bond space 752–3, 763–4 Burnside’s Lemma 179–85, chain 538, 543–71, 574,
Bondy–Chvátal Theorem 187 583–92, 595–7, 600–8,
320 757–62, 821–3, 831
Bondy’s Lemma 323–5 chain decomposition 546–8,
cactus 295
Bonferroni Inequalities 553–7, 561–2, 565–7, 606
(¾ , ½)-cage 219
695–6 chain rule 125, 130, 506–8
canonical basis 758
book 763 character 622
canonical coloring 443, 470
Boolean algebra 545 characteristic equation
canonical cycle represen-
Borsuk’s Conjecture 817–8 67–80, 173
tation 99–100, 104–6
Borsuk–Ulam Theorem 798, characteristic function 17,
Canonical Ramsey Theorem
806–12, 815, 817, 819 597–600
461, 470–2, 474
Bose Construction 642–3 characteristic polynomial
canonical simplex 824, 827
bottleneck 252 67–71, 74, 79, 81, 761,
cardinality 2–3
boundary 11, 379–93, 398–9, 766, 780–1
Caro–Wei Theorem 662–3,
402, 411, 415, 719–20, characteristic root 67–72,
684
755, 784, 788, 796, 800–1, 76, 79, 81, 84
cartesian product 2, 7, 14,
806–9, 813, 816, 819 charge 406–16, 421–4
214–6, 224, 244, 292, 326,
boundary bound 800 Chebyshev’s Inequality
329, 334, 344, 359, 372,
¾ -bounded 327–8, 334 595–7, 692, 703, 706–10,
394, 541, 545, 665, 716,
Ò-bounded 351–2 721–2
771, 773, 780–1, 804, 822
Bounded Differences Chernoff Bound 706–14,
Cassini’s Identity 60–1
Condition 714–6, 719, 722 720–2
Catalan numbers 41–6, 48,
bounded poset 571–2, 762 Chernoff–Hoeffding Bound
52, 55–6, 63–4, 77, 115–6,
boxicity 705 709, 722
136, 177, 206, 432, 587
bracketing structure 555–8, Chevalley–Warning
Catalan recurrence 55–6,
565–6 Theorem 735–6
63–4, 77, 136
branch vertex 327, 334, 356, child 43–4, 47, 136, 177, 443
Catalan’s Identity 61
390, 392, 710 Chinese Postman Problem
caterpillar 187, 654, 819
¾ -branched 327 287
Cauchy–Binet Formula 168,
branching 749, 751 Chinese Remainder
748–9, 763
Breadth-First Search (BFS) Theorem 441
Cauchy–Davenport Theorem
247, 252, 336 choice number 346–7, 355–6,
733–4, 745
bridge 231, 233, 765 660–1
952 Subject Index
choosability 346–8, 362, 365, circuit (in graph) 233–6, ¾ -colorable/¾ -coloring 182,
403, 407–8, 414, 417, 424, 239, 250, 268, 307, 389, 335–46, 352–7, 369,
660, 739, 742, 747 419, 678, 738, 751–2 399–407, 414–22, 434–9,
(¾ , d)-choosable 403–4 circuit (in matroid) 514–29, 443–4, 448–9, 453–69,
º -choosable 347, 356, 363, 536–9, 657 473–4, 573, 581–2, 601–3,
365, 738 circulation 738–44 638, 658–62, 666–7,
¾ -choosable 346–7, 353–6, circumference 322–5, 332 673–5, 684–6, 801–4,
363–5, 402–3, 414, 417, Class 1 358–9, 369–73, 812–4, 820
420–4, 623, 660, 667, 677, 422–3 2-colored bipartite graph
738–40, 746–7 Class 2 358–9, 372 135
chordal graph 366–7, 370, claw 212, 297, 330 ¾ -colored graph 104
374–6, 386 clique 210, 336, 357, 366–71, coloring 158–9, 335
chordless cycle 366–7, 374 374–6, 444, 459, 685, 700, H-coloring 422, 457
chord (geometric) 21, 24, 48, 726, 729 L-coloring 346–7, 355–6,
79, 82, 128, 387–8, 792 ¾ -clique 210, 337, 375, 363–5, 403, 407–8, 661,
chord (in graph) 213, 216, 449–50, 476–8, 483, 667, 677
315–6, 348, 366–7, 377, 489–90, 504 coloring number 338
382, 393, 396, 401, 403, clique covering 368 column matroid 516–7, 537
411, 415, 550, 698, 742–3, clique number 336, 343, 368, column-canonical
786, 796–7 374, 685, 687, 700 permutation 208
¾ -chromatic 335, 340–4, clique Ramsey number 455 column-strict tableau 189,
349–57, 405, 421, 434–7, clique tree 374 192–6, 203–5, 207
442, 451, 461, 478–9, 682, closed ear 305–7 Columns Condition 462–3,
684, 709–10 closed form 89 474
chromatic index 357–62 closed set (geometric) 811, Combinatorial
chromatic number 335–57, 813, 817 Nullstellensatz 732–8,
366–70, 402, 421, 434–8, closed set (in matroid) 741–2, 745–6, 764
442–3, 451, 454, 550, 528–9, 534–9, 595 combinatorial proof 15,
572–3, 581, 671–2, 684–5, closure (geometric) 807, 811 22–3, 26, 31–4, 40, 48,
701, 709–10, 716–7, closure (Hamiltonian) 60–6, 96, 102, 109, 114–7,
729–30, 738–9, 745, 769, 320–1, 325, 332–3 132–4, 156, 173, 176, 208
812–4, 820 closure operator 529 combinatorial reciprocity
chromatic polynomial 159, cobases 523–4 762
174, 374, 762 cocircuit 523–4, 537–9 Combinatorial Shearer’s
chromatic Ramsey number cocycle matroid 524 Lemma 508–9
455–7, 461 coefficient operator 73, 96–7, Committee-Chair Identity
Chvátal’s Condition 320–1, 110, 733 26, 40, 42
326, 332–3, 705 cofactor 748–9, 752, 777 common system of distinct
Chvátal’s Conjecture 318, cograph 375, 778, 782 representatives (CSDR)
501–3, 512 coherent signing 755–6 302–3, 314, 532, 562
Chvátal’s Theorem 320–1, colex ordering 493–5 compact set 805, 809
332–3 co-lexicographic 493 Compactness Principle
Chvátal–Erdős Theorem color fan 360–1 468–9
321–2, 327, 332, 334, 705 ¾ -color Ramsey number 459, comparability digraph
circle order 828–30, 832 461, 601 542–3, 548, 570
color-critical 344–5, 352–4,
820
Subject Index 953
crown 22, 185, 584 cyclic rotation/shift 41–2, 45, deletion method 670–2, 682,
cryptomorphism 529 48, 50, 145, 178, 185, 634, 684–5, 702
CSDR 302–3, 313, 532 643–4 deletion operator 208
cube 182–3, 214, 219, 248, density 371, 407, 479–87,
251–2, 260, 291, 296, 492, 693, 703, 778–9,
d’Ocagne’s Identity 60–1
329–30, 358, 373, 380, 800–1, 810, 819
decision problems 10
385, 388, 428, 461, 467, dependent edge 550
decomposable matrix 765
473–4, 566, 584, 668, 684, dependent event 679, 685
decomposition (of graph)
720, 764, 781–2, 798, 800, dependent set 514–5, 527,
232–9, 249–51, 275,
803–5, 820–2, 829 538
305–7, 312, 315, 318–9,
cubic graph 210 Dependent Random Choice
389, 407, 411–2, 422, 534,
curve 377–81 672–3, 684
639–40, 646–50, 677–8,
cut-edge 231, 237–41, 249, dependent vectors 748, 753
771, 781
252, 267, 272–6, 295, 305, derangement 46, 52, 54–5,
decomposition (of poset) 546,
373, 379–80, 523, 753 59, 62–3, 82–3, 123–4,
548, 553–7, 561–2, 565–7,
cut-vertex 231–2, 240, 276, 134–5, 154–5, 159–62,
574, 606
289, 294–5, 297, 315, 371, 174–5
deconditioning 506–8
382, 391, 421 derivative (for series) 107–8,
Dedekind’s Problem 557–8,
cutset 296, 375–6, 550 116, 125, 130
603
¾ -cycle 135, 184, 186, 213, descent (in permutation) 65,
Defect Formula 258, 262,
218–20, 252, 323–4, 372, 101, 148, 172, 197, 206,
265, 531, 540
377, 411–5, 420–3, 457, 667
deficiency 258, 265–7, 275,
460, 630, 646–7, 684–5, descent (in poset) 602
567
755, 780 descent set 101, 172
degeneracy 338, 347, 639,
cycle (in graph) 4–6, 209, (v , ¾ , ë)-design 612–29, 634,
667
231–4, 316–48, etc. 639–41, 645–6, 649–50,
¾ -degenerate graph 338,
cycle (in digraph) 36–7, 60, 653–6
343, 347–8, 373, 402, 417,
144–5, 152, 225–45, 389 deterministic algorithm 10
419, 421, 484, 677, 739
cycle (in hypergraph) 435–7 de Bruijn cycle 239, 763
degree (of vertex) 5
cycle (in permutation) 8, Diagonal Criterion 724, 728,
degree charging 407–10,
54–7, 62, 66, 98–100, 731, 818
414, 423
104–6, 109, 112, 122, 126, diagonal Ramsey number
degree list 221–2, 238–9,
135, 147, 172, 175, 181–6 449, 465, 504, 675, 685,
249, 269, 295, 297, 320–1,
cycle index 181–7 701
332, 387, 398, 663
Cycle Lemma 42, 49, 425 diagram (of poset) 542–4,
degree Ramsey number 455
cycle matroid 515–8, 523–9, 549, 552, 559, 565
degree sequence 221
536–40 diameter 243–5, 248–52,
degree set 227
cycle representation 99–100, 275, 294, 296, 313, 386–7,
degree-choosable 347–8,
104–6 395, 399, 428, 441, 566,
355, 415
cycle space 752–3, 764 628, 630, 689–91, 704,
Degree-Density Lemma 484
cycle structure 100, 182, 768, 775–6, 780, 782,
Degree-Sum Formula 220,
185–6 817–8
223, 233, 290, 311, 380,
cycle-factor 260 difference family 639
385, 476–7, 527, 630
Cycle-plus-triangles difference set 460, 634–9,
Delannoy number 28–31,
Theorem 739–40 645
33–4, 52, 57, 62, 64, 81,
cyclic edge-connectivity 297 difference triple 645
113, 117
cyclic group 185 digraph 8, 165–9, 224–6, etc.
Subject Index 955
dihedral group 186 distance (between points) dual graph 379–89, 395,
Dijkstra’s Algorithm 246–7 342, 440, 490, 619–20, 400, 406, 409, 419, 513,
dilation 800 633, 639, 719–20, 724, 524, 799, 803
Dilworth decomposition 546, 729–30, 744–5, 793–4, dual hypergraph 438–9
548, 551, 554, 556, 566, 805, 809, 811, 817–9, 826 dual ideal 545
574 distance (in graph) 189, dual matroid 523–7, 537–40
Dilworth’s Theorem 430, 242–52, 287, 314, 325, Dual Möbius Inversion
546–8, 551–3, 564, 580, 336, 374, 389, 399, 422, Formula 760
606–7, 823 428, 442–3, 583, 667–8, dual poset 543–4, 549, 553,
dimension (of poset) 545, 739, 782, 800–2 557, 560, 562, 567, 591–2,
568–84, 607, 783, 790, ¾ -distance set 724, 730, 744, 607, 832
828–32 817 dual problem 259, 272, 276,
dimension (of space) 9, 29, distance-regular 782 279–83, 287–8, 298–9,
39, 48–9, 64, 68–9, 76, 96, distributive lattice 591–600, 366, 368
170, 261, 388, 431, 464–7, 606–8 Durfee square 143
474, 520, 568, 606, 633, divide-and-conquer 84, 394 Dushnik’s Theorem 576–7,
711, 723–30, 744–5, 753, F-divisible 640 584
763–6, 814–8, 821–32 Dixon’s Identity 88 Dyck n-path 45, 48, 64, 151
¾ -dimension 584 Dobiński’s Formula 134 dynamic coloring 424, 668
dimension argument 723–30 dodecahedron 316, 328, 385,
d-dimensional permutation 416
ear decomposition 305–7,
821, 831 domain 2, 17, 99, 190, 444
312, 315, 389
d-dimensional simplex 799, dominating set 639, 670–1,
eccentricity 243, 250
802–8, 822, 827 684, 702, 704
edge 4
Dirac’s Condition 320, 327, Doob process 715–6, 719
edge cover 259–60, 263
330 dot product 9, 614, 618–9,
edge cut 293–8, 306–7, 345,
Dirac’s Theorem 320, 324 724–6, 745, 748, 817
372, 380–1, 395, 710–1,
direct sum 533 double jump 698
752–3, 763, 778–9
Directed Matrix Tree double shift graph 581
edge set 4
Theorem 749–50 double-partition 150
edge-choosability 362–5,
Dirichlet Drawer Principle double-star 249, 460
407–8, 413–4, 746
425 doubly stochastic matrix
edge-chromatic number
Discharging Method 407–17 256–7, 261, 765
357–62, 365, 370–3, 414,
disconnecting set 293 down-set 501, 544–6, 557,
420, 423, 439
discrepancy 722 564, 569, 581–2, 589,
¾ -edge-colorable/coloring
discrete probability space 593–608, 759, 828
357–65, 371–3, 400, 407,
6–8, 657, 662 DP-coloring 356
416–7, 420, 422, 685, 797
discrete random variable 7, drawing 4, 8, 211–3, 225,
edge-coloring (hypergraph)
111, 662, 695, 713, 722 377–85, 398, 421, 542–4,
438–9, 602–3
disjoint ¾ -split 305 663, 718, 791–8
L-edge-coloring 362–5, 413
disjoint union 215 dual augmentation property
¾ -edge-connected 267, 293,
disjoint-path system 539
296–8, 301, 305–15, 329,
166–70, 172 dual base exchange 520–1,
345, 355, 372, 386, 400,
disjointness graph/relation 538–9
416–7, 420, 536, 540, 797
3, 213–4, 218–9, 782 Dual Degree-Sum Formula
edge-connectivity 293–301,
displacement 22, 176, 186, 380
417
792
956 Subject Index
falling factorial 17, 22, 69, 412, 414, 419–23, 515–9, Gaussian polynomial 152,
122–3, 170, 176, 694 524, 535, 567, 677–8 568
family 2 formal Laurent series GCD matrix 177
¾ -family 548, 549, 551, 130–1, 136 general solution (for
553–4, 561, 565, 567 formal power series 73, 77, recurrence) 67–72, 91
x , U-fan 301–2, 350 93–7, 107–8, 114, 116, generalized Catalan
Fan Lemma 301–2, 350 118, 125, 129–31, 136, numbers 42
Fan’s Theorem 324–5 140, 553, 733 generalized partition
Fano matroid 537 Four Color Theorem 316, matroid 534
Fano plane 435, 613–6, 349, 377, 399–401, 404–6, generalized Petersen graph
623–8, 634, 638, 641 414–23, 781, 797 373
Fáry’s Theorem 393, 398, Four Function Inequality generalized Young tableau
783, 796 597 189
Fermat’s Little Theorem fractional chromatic number ¾ -generated family 830
38–9, 48, 428, 441, 735–7 812 generating function
Ferrers diagram 141–5, fragment 398–9 (ordinary) 14, 73–82,
148–52, 175, 177, 185, H-free (graph) 223, 297, 93–118, 137–9, 142, 146,
189–90, 557, 604, 819 330, 342, 351–2, 375–6, 148–9, 161–2, 169, 172–3,
Ferrers relation/digraph 605 489–91, 631–3 178, 182–4, 431, 553, 557,
Fibonacci numbers 52, 53–4, free matroid 522 564, 567, 704, 707, 709,
58, 60–2, 65, 67–8, 80, Friendship Theorem 775–6 751, 761
104, 112, 115, 150, 434, frugal coloring 681 generating function method
442, 664, 740 fullerene 387 66, 72–81, 105, 124, 132
FILL (in tableaux) 202–4 functional digraph 8, 36–8, generating series 93–4
filter 466, 545 54, 166, 185, 224 geometric distribution 111
first-fit coloring 336 fundamental cycle 753 Geometric random variable
Fisher’s Inequality 614–5, fundamental set of circuits 668
641, 655, 730 537 Ghouilà-Houri graph 550
Five Color Theorem 402, Füredi–Hajnal Conjecture girth 213, 218–20, 237, 244,
404, 419 432–3 248–52, 275, 296, 312,
fixed point 8, 54, 59, 63, 98, Fuss–Catalan numbers 42, 332–3, 357, 388, 403,
105–6, 123, 135, 144, 152, 128 409–10, 414, 417, 422–4,
154–5, 159–67, 174, 178, 434–7, 442–3, 527, 550,
206, 250, 631, 666, 805–6 639, 671–2, 754
Gale’s Lemma 811–3, 820
FKG Inequality 596–600, Glaisher’s Theorem 149
Gale–Shapley Proposal
608 global discharging 413
Algorithm 285, 288
flat (in matroid) 529 Golden Ratio 68
Gallai coloring 474
flower snark 372 Gosper’s Algorithm 89–90
Gallai’s Theorem 260, 263,
Folkman’s Theorem 466–7, Grötzsch graph 340, 550
355, 540
474 Grötzsch’s Theorem 414, 420
Gallai–Edmonds Theorem
Ford–Fulkerson CSDR Grünbaum–Hadwiger–
268, 275
Theorem 302–3, 313, 530, Ramos problem 815
Gallai–Roy Theorem 339,
532, 562 graceful labeling 22, 646,
342, 344
forest 47, 128, 136, 239, 654, 656
Gallai–Witt Theorem 467
247–51, 262, 297, 311, Graceful Tree Conjecture
gambler problems 66, 116,
338, 351, 357, 381, 382–3, 646
714
958 Subject Index
join (of graphs) 213, 336 Lagrange’s Theorem 616–7 line graph 300, 314, 316,
join-irreducible 592–3, Laplacian eigenvalues / 326, 329, 357, 362–3, 368,
604–7 matrix / spectrum 776–82 371, 608, 678
joint random variable 505 Las Vergnas’ Theorem 333 linear arboricity 412, 677
Jordan Curve Theorem Latin square 9, 609–12, t-linear crossing number
378–83, 400, 402 622–4, 627–8, 642–3, 648, 795–6
651–2, 656 linear extension 568–84,
lattice (poset) 529, 571, 595, 599–602, 604, 608,
König’s Other Theorem
588–608, 757, 761–2, 766, 760, 822–7, 831
259–60, 263, 368–9, 540
832 linear forest 412, 422, 677–8
König–Egerváry Theorem
lattice ball 29–30, 33, 57 linear hypergraph 438
258–9, 262–3, 273, 278,
lattice path 24–8, 30, 39–42, linear independence 68–9,
280, 282, 287, 302, 313,
49, 55, 61, 64, 104, 115, 76, 80, 176, 516, 519, 538,
368–9, 530–1, 547
165–8, 170, 172, 176 614, 723–32, 744, 753,
Kakeya set 746
lattice point 25, 57, 169, 176, 767–8, 818
Kempe chain 404, 406, 421
221, 389, 426, 440, 464, linear matroid 516, 519, 528,
kernel/kernel-perfect 363–4
474 532
king (in tournament) 225,
lattice polygon 389 linear recurrence 51–2,
228, 703
lattice walk 25, 49, 64, 117 67–9, 74, 79, 84
Kirkman Schoolgirls
layered block structure linearity of expectation 7–8,
Problem 649
464–5 104, 162, 662–72, 689,
Kirkman triple system 650
leaf 5–6, 240–2, etc. 694, 707, 713, 722, 793,
Kleitman’s Inequality 595,
leaf block 295, 297, 348 821–2
597, 608
-leaf-connected 327 X , Y -link 299–300, 395
Kneser Conjecture 342, 798,
left subtree 43–4, 47, 135, -linked 314
811–2
177 Lipschitz condition 719
Kneser graph 251, 342, 781,
length 2, 17, 25, 41, 209, etc. n-ary list 2, 26, 667
798, 811–2, 820
level (in poset) 553, 556, 0 , 1-list 2, 40, 51, 173
knight’s tour 330
561–2, 567 1 , 2-list 53–4, 59, 104, 112,
Knuth-equivalent 208
lexical 472–3 664–5, 740
Kotzig’s Theorem 371, 411
lexicographic order 192, list assignment 346–8,
Kruskal’s Algorithm 245,
195–6, 198, 201, 493, 512, 355–6, 362–3, 403, 421,
252
556, 566, 789 661, 677, 686, 742
Kruskal–Katona Theorem
lexicographic product 459, list chromatic number
495–6, 500, 510
583 346–8, 362, 685, 738
Kuratowski subgraph 391–3
lg 87, 447, 505–9, 580, etc. List Color Conjecture 362–3,
Kuratowski’s Theorem
light edge 407–13, 416 373, 412
390–3, 397–9, 526–7, 753
line (geometric) 30, 48, 52–3, list -colorable 346
59, 72–3, 79, 199–201, list edge-chromatic number
Λ n 606 342–3, 388, 427, 565, 613, 362–5
L(m , n) 557, 562, 567, 589, 794, 798, 813, 815, 820 S-lobe 349–50, 353, 367, 375,
605 line (in projective plane) 9, 391, 399
labeled structure 119–20, 624–30, 635, 638, 649–50, Local Cut Lemma 680
125, 128, 132, 188 653 local density bound 800
-labeling 656 line digraph 300 Local Lemma 674–86, 719,
Lagrange Inversion Formula 2-line form 99 722
127–31, 136 local Ramsey number 473
Subject Index 961
locally finite 590, 757 Matroid Partition 537 minimal element (in poset)
locally linear graph 684 Matroid Union 533–5, 543–7, 551, 565, 571,
log-concave 563–4, 567–8, 539–40 576–7, 582–4, 588–93,
827 max-cut problem 710 606, 760, 790
log-supermodular 596–600 max-flow min-cut 303 minimal imperfect graph
lollipop graph 331 maximal 4 369–70
Lovász Local Lemma 674, maximal antichain 544, 551 minimal LYM order 567
679 maximal chain 544, 547, minimal nonplanar graph
lower extension 574, 605 550, 552–3, 558–61, 565, 390–1
Lu’s Theorem 322 759 minimal vertex separator
Lucas numbers 53, 61, 65 maximal element (in poset) 375
LYM inequality / order / 512, 543–6, 551–2, 557, minimal separating set 304,
property 558–65, 567–8 571, 576–7, 582–3, 586, 322, 367, 375
Lyusternik–Shnirel’man 588–93, 606, 790 minimax spanning tree 252
Theorem 811–4, 817, 820 maximal outerplanar graph minimum polynomial (of
382, 387–9 matrix) 768, 772
maximal planar graph minimum weighted cover
Mader’s Theorem 311, 316
384–7, 400, 419 279–82
(n , ¾ , c)-magnifier 779–80
maximally connected 289, minor 525, 527, 539, 710
Markov’s Inequality 671,
291 Minty’s Theorem 338–9
689–92, 705–9, 713,
maximum antichain 497, Mityagin’s Theorem 826–7
717–8, 821
544, 546–51, 553, 558, mixed difference system 655
Marriage Theorem 256, 262,
568, 583, 606 Möbius function 759–62, 765
268, 359, 678
maximum average degree Möbius Inversion Formula
martingale 706, 712–9, 722
408–9, 414, 417, 421–4 163, 757, 760–1
matching 253–88, 312–4,
maximum density 693, 703 Möbius ladder 235
329, 356–8, 364–6, 434,
maximum weighted p-modular L-intersecting
442, 460, 492, 510, 517–8,
matching 279–83, 287–8 family 728–30
522, 529–31, 547, 559–63,
meet (in poset) 588–600, modular lattice 594–5, 607
566–7, 645–9, 668, 702–5,
605–8, Moessner’s Process 62, 105
726, 742–3, 754–6, 765
meet-irreducible 592, 606–7 moment (of variable) 691,
º -matching 287
membership function 17 694, 696, 704–9
matching number 253
Menger’s Theorem 298–303, moment curve 813, 815–6,
0 , 1-matrix 2–3, 160, 211,
313, 546, 560 820
224, 432–3, 442, 542, 570,
Method of Deferred moment generating function
604, 620, 781
Decisions 702 704, 707, 709
Matrix Arborescence
Method of Moments 696 monotone 430, 458, 821
Theorem 750
Meyniel graph 375 monotone (Boolean)
Matrix Tree Theorem
min-max relation 259, functions 557, 596,
747–52, 762–3, 777
264–5, 273, 298–9, 303, 599–600
matroid 9, 251, 513–40, 595,
357, 366, 368, 513, monotone list/sequence 206,
656, 754
529–33, 538, 546–7 430–1, 442, 452–3, 703,
Matroid Covering/Packing
minimal 4 821–2, 831
536
minimal ¾ -connected graph monotone path 601–3, 608
Matroid Intersection
310–1, 315–6 monotone property 691, 694,
529–34, 537, 540
minimal ¾ -edge-connected 703
Matroid Matching 532
multigraph 309–10 monotone tournament 458
Matroid Parity 532
962 Subject Index
oriented graph 225–6, 237, parity subgraph 237, 249 path (in digraph) 166–70,
752, 756, 765 parking function 50 225, 229, 339, etc.
orthant 806–8 2-part Sperner property 565 path (in graph) 4–6, 209–12,
orthogonal array 651–3, 656 partial ¾ -coloring 549 232–8, 277–84, 323–34
orthogonal chain partitions partial partition 134 path (in integer lattice)
566 partial tableau 201–3, 208 24–30, 33–4, 39–45,
orthogonal vectors 618, 621, partially ordered set 48–50, 55, 59, 64, 104,
744, 771, 773, 777–8, 541–608, 821–32 115–7, 151, 172, 199, etc.
817–8 particular solution 70–5 u , v-path 4–6, 229–31,
orthogonal Latin squares ¾ -partite graph 211, 223–4, 239–42, 246–7, 298–303,
609–12, 622–4, 627–8, 226, 228, 331, 335, 355–6, 314–6, etc.
638, 651–6 454, 456, 475–9, 489, 491, X , Y -path 299–300, 313
out-neighborhood 224 513, 655, 663, 770, 773, path matrix 166–8
out-tree 247, 749, 752 781 path system 165–70
outcome 6–7 N-partite hypergraph 435–7 pattern (in permutation)
outdegree 224–5, 228–9, partition (into chains) 206, 431–4, 442
235, 238, 255, 261, 363–5, 546–57, 560, 566, 574 pattern inventory 181–8
370, 404, 678, 686, 738–51 partition (of edge set) 232–5 pattern Ramsey number
outerplanar graph 382–3, partition (of integer) 137–52, 472–4
387–9, 398–9, 419 175–6, 185–90, 202, 207, paw 330, 489
outstanding line 199–201 557, 606, 647–8, 762 peak 45, 48, 151, 177, 452–3
overfull subgraph 359, 371 partition (of set) 3, 14, 49, pebbling move 668
56, 64, 121–2, 125–7, Pell sequence 62, 81, 92
133–4, 157, 175, 251, 343, Pentagonal Number
packing (of two graphs) 248
354–5, 419, 443–4, 461–5, Theorem 151
pair group 183–4, 186
468–72, 480–8, 492, 501, perfect elimination ordering
[¾]-pair-covering 624
568, 649, 815, 817–8 366
pair-crossing number 794–5
I , F-partition 422 perfect graph 366–71, 374–6
pairing model 697, 704–5
, -partition 480–3, 487–8 Perfect Graph Theorem
pairwise balanced design
523, 530–8, 368–70, 547
650–3, 655
partition lattice 567, 588, perfect matching 253, 256,
Paley matrix 621–2
590, 605, 607, 761 260–88, 314, 329–30, 333,
pancyclic 326, 330
partition matroid 522, 356, 358, 365, 492, 510,
parallel classes 628, 649–50,
529–37 560, 567, 645, 702, 705,
654–5
parts (of bi/ -partite graph) 754–6, 765
parallel elements 516–7
135, 211–2, 221, 223–4, perfectly orderable graph
parent 43, 443
256, 269, 280, 295, 364, 375
parity (applications) 231,
456–7, 475–6, 491, 517, permanent 510, 754–6,
330, 379, 382, 400, 426,
531, 607, 655, 770 764–5
465, 755–6, 797–9, 814
parts (of composition) 19–20, Permanent-Determinant
parity (of circulation)
23, 30, 45, 53, 60, 81, 137 Method 755–6
738–43
parts (of integer partition) permutation 2, 22, 54, 57,
parity (of closed walk) 231
137–52, 175–6, 186–7, 62–6, 98–106, 109, 112,
parity (of dissection) 165
192, 206–7, 606, 647 123–6, 135, 158–86,
parity (of permutation)
Pascal’s Formula 25, 27, 31, 192–200, 205–8, 261,
163–4
39, 56–7, 78, 98, 450 431–4, 442, 576–80,
parity edge-coloring 373
Pascal’s Triangle 24–5
Parity Lemma 265–7, 276
964 Subject Index
666–8, 754–5, 764, 821–2, polynomial-time 10–1, 298, product representation 726
etc. 360, 550, 606, 687 projective plane 9, 244–5,
permutation graph 343 polyunsaturated 552 479, 612, 616, 624–35,
permutation matrix 160, poset 541–608, 757–62, 638–9, 645, 649–50, 653
196, 256–7, 432–3, 755 765–6, 790, 820, 822–32 proper coloring (graph)
permutation statistics positional game 261, 474 158–9, 174, 335–48,
98–102 positive lattice walk 49, 64, 399–424, 581, 661, 677,
Petersen graph 213–4, 117 684–6, 739–40, 812–4, etc.
218–20, 226–7, 236, 238, positive semidefinite 134 proper coloring (hypergraph)
244, 272, 318, 326, positively correlated 435–40, 659–60
329–30, 335, 353, 358–9, 595–601, 608 proper dissection 665–6
373, 397, 416, 490, 773, Pouzet’s Lemma 804–5, 808 proper edge-coloring
775, 782, 797, 814, etc. Prüfer code 46 357–65, 371–3, 438–40
Petersen’s 2-Factor Theorem Prague dimension 726 proper labeling 799, 802–5
268, 274, 372 predecessor 54, 225, 324, 15-puzzle 202
Pfaffian 756, 764 605 Pym’s Theorem 299–300,
PGT 368–70, 375–6 Prim’s Algorithm 252 395, 546
Pick’s Theorem 389 prime factors 21, 155, 172,
PIE 155–61, 164, 172–4 428, 553, 592–3, 626
quasigroup 642–4, 655
Pigeonhole Principle 16, principal submatrix 134, 767
query 447, 711–2
302, 339, 425–34, 440–6, Principle of Counting Two
quota 426, 444–5, 448, 451,
449, 451, 456, 466, 468, Ways 14
468
504, 513, 577, 602, 651, prism 326, 334
659, 800, 803, 825 prism-Hamiltonian 326
pigeonhole property 7, probability 6–8, 16, 20–4, radius 29, 243, 248, 250,
662–3, 670–1 39–40, 46, 54, 65–6, 83, 352, 794, 825, 828, 830
planar graph 316, 351, 86, 99, 103–6, 111, 116, Rado Selection Principle 468
377–424, 523–7, 537, 739, 135, 171–4, 189–92, Rado’s Theorem 462–3, 466,
742–3, 746–7, 753–6, 781, 505–7, 512–3, 578, 584, 473–4
783–4, 789–91, 795–7 595–6, 657–722, 793, rainbow 470–4
1-planar graph 797 821–4 Ramsey family (of patterns)
Planar Separator Theorem probability generating 472
394–7, 399 function -Ramsey number 455–7
planarization 199–201 product (of formal power Ramsey number 444–5,
plane multigraph 378–87, series) 94–7 448–62, 472–4, 483–4,
401, 411 product (of graphs) 214–6, 504, 601–2, 620, 624, 663,
Poisson distribution 695–7, 244–5, 273, 292, 319, 326, 673, 675, 682–5, 703, 728
704 329, 334, 359, 372, 376, Ramsey Theorems 468–74
Poisson Paradigm 696 394, 459, 773, 780–1, 794 Ramsey’s Theorem 443–9,
polarity 629–32 product (of posets) 545, 453, 461–4, 468–9, 474–5,
Pólya’s Theorem 184–5, 188 553–5, 559, 562–8, 583, 483–4, 601, 604, 658
Pólya’s Urn 106 588, 590–2, 595–6, 600–1, Ramsey–Turán problem 492
polychromatic 470 607–8, 760–1 random graph 338, 671–722
polygonal curves 378, 385 product dimension 624, 726 random variable 7–8, 50,
polynomial method 732 Product Formula (Möbius 111, 505–6, 512–3, 561,
Polynomial Principle 16, 18, functions) 760–1 608, 662–72, 687–722, 821
22, 26, 34, 100–2, 122, 761 Product Principle 14–8, 94 range space 711–2
Subject Index 965
rank (in matrix) 369, 388, regular polyhedron 188, 385 247, 347, 399, 443, 749–51,
614, 748, 753, 767, 781 -regular pair/partition 785–8
rank (in matroid) 514–40, 480–8, 492 Roth’s Theorem 484–6
656 regular system (of row-canonical permutation
rank (in poset) 552–68, 576, equations) 462 208
583, 585, 588, 594–5, Regularity Lemma 461, RSK Correspondence
603–7, 761–2 478–89, 492, 673, 794 193–201, 206
rank generating function relation 2–3 Rubin’s Block Theorem 348
552–3, 557, 564, 567, 761 removable pair 575, 583 run (in list/subset) 21, 45,
Rank–Nullity Theorem 388, representable matroid 516 49, 59, 174, 669
753 residue 130–1, 140, 622 run (in permutation) 101–2,
rank-symmetric / unimodal resolution class 649 105–6, 135, 147, 158, 432,
553–4, 557, 561, 564, 567 resolvable cycle systems 647 442, 667
ranking 133, 285–8, 585–6, resolvable design 648–50
604, 721 retreat (in permutation) 197
sample point 7–8, 662, 716
rational function 74–5, 88–9 reverse canonical
SATISFIABILITY (SAT) 11,
realizer 569–84, 820 representation 105
667
rectilinear crossing number reverse plane partition 189
-saturated partition 548,
795 rhombicosidodecahedron
551–2
recurrence relation 51–92, 388
F-saturated graph 491–2
101–4, 115, 127–9, 132–6, right subtree 43–4, 47, 135,
saturates (in matching) 253
146–9, 161–3, 173–6, 177
Schensted’s Algorithm 195
189–91, 207–8, 399, 433, right-left sequence 197
Schensted’s Theorem 198,
452, 462, 747, 780 rigid circuit graph 366
201, 430, 432
redressé 203 ring (in configurations)
Schnyder labeling 784–90,
reduced adjacency matrix 404–6, 421, 520
797
256, 631 Ringel–Kotzig Conjecture
Schröder n-path 59
reduced graph 480–4, 492 646
Schröder number 64
reducible configuration rising antichain 511
Schröder–Bernstein
404–17, 421–3 rising factorial 17, 23,
Theorem 24
reduction 11, 203 122–3, 147
Schur’s Theorem 462
reduction (of tableau) 202–6 Robbins’ Theorem 306–7
Scott–Suppes Theorem 587
refinement (of matroid) 538 Robinson–Schensted
-scrambling 578–80, 584
refinement (of partition) Correspondence (see RSK)
SDR 253–4, 302, 517
486–8, 588, 606, 784, 195
secant-and-tangent numbers
808–9 Rogers–Ramanujan
65
reflection principle 40 partition 151
Second Moment Method
reflexive 3–4, 8, 180, 541–2 rook polynomial 160–1, 163,
692–3, 698, 700, 703,
region 6, 24, 48, 52–3, 59, 171–5
705–6, 712
72–3, 79, 154, 165, 220–1, root (characteristic) 67–76,
self-complementary graph
378–401, 418, 566, 784–9, 79, 81, 84, 766–7
218, 232, 370, 388, 477,
797, 799, 802–4, 824, 832 rooted forest 128, 136, 278,
490
regular covering 559–68 750–1
self-conjugate partition 143
regular digraph 678, 686 rooted graph 43, 136
self-dual poset 543–5, 549,
regular graph 9, 210 rooted labeled structure 128
553, 557, 560, 567, 592
regular polygon 22, 169, 179, rooted tree 43–4, 47, 106,
semiantichain 565
385 128, 135, 177, 189, 206,
966 Subject Index
semimodular lattice 595, simple hypergraph 438–9 spectrum 766, 770, 772,
607 simple word 17–8, 120, 146 776–8, 781–2
semiorder 585–7, 594, 605, simplicial complex 766 Sperner property 553–4,
823, 831 simplicial elimination 557–61, 567–8, 606
separating set 289–92, ordering 367, 373 Sperner’s Lemma 799–809,
295–304, 310, 318, 322, simplicial subdivision 799, 819
367, 375, 387, 391–2, 802–6, 819 Sperner’s Theorem 497, 511,
396–7 simplicial vertex 65, 367, 374 564, 666, 668
x , y-separating set 298, 303 sink 224, 561, 787 split (of necklace) 809–10
(m , )-separation 394, 396, Six Color Conjecture 417 split (of poset) 547
399 size 2 split graph 376
x , y-separator 375 size Ramsey number 455–6 squashed cube embedding
( , )-separator 394 skeleton 199–200 781
sequence 2 skew chain order 565 stable matching 284–8
-sequence (in tableaux) skew tableau 202–5, 207–8 stable set 210, 368–9, 375–6,
201–5 skew-overlap graph 399 536, 710
-set 17 skew-symmetric matrix 756, stack-sortable 43, 63
set system 493 764 stage of evolution 698–9
shade 493, 497–8, 510, skipless chain 553–6, 562, staircase tableau 152, 208
559–60 565 standard deviation 691–2,
shadow 200, 493–7, 500, Skolem Construction 644 707
510, 559, 562, 567 Small Pot Lemma 355 standard example 570, 573,
t-shadow 493, 500 smallest-last ordering 338 576, 584, 605, 828, 832
Shannon switching game Snake Oil method 112–3, Stanley–Wilf Conjecture
539 117, 176 432–4
shape (of tableau) 189–96, snark 372 star (graph) 212, 227, 233,
202–8 Snevily’s Theorem 730, 745 243, 248–9, 251, 262,
Shapiro n-paths 64 -soluble 276 351–2, 368, 510, 832
Shearer’s Lemma 508–10, source 104, 224, 228, 548, t-star (of sets) 497–503, 511
513 561, 741 star -coloring 422
SHIFT (in tableaux) 202–5, span function 527–9, 537, star property 501, 512
208 539 star-cutset 375
shift graph 581, 602, 604 spanning set 523, 525, 527, Star-Cutset Lemma 375–6
shift operator 495–6, 498–9, 539–40 Steinberg’s 3-Color
512 spanning subgraph 5, 159, Conjecture 414, 421
shifted tableau 192, 207 210, 239, 249, 263–4, 268, Steiner system 640
Shortcut Lemma 308–10 326, 334, 370, 384, 396, Steiner triple system (STS)
u , v-shortcut 308–10 420, 516, 518, 537–8, 566, 641–5, 655
shuffle 206, 442 605, 657, 744, 770, 780 Steinitz exchange 528–9
Sicherman dice 103 spanning tree 5, 46, 58, 65, Stepping-Up Lemma 452–3
signed graph 237, 297 239–52, 266, 297, 327–8, Stirling Inversion 132
signed involution 163–8, 334, 342–3, 347, 374, 399, Stirling number 121–2,
176, 178 428, 474, 515, 523–4, 535, 132–3, 146, 174–7, 567,
signing 297, 755–6 540, 747–53, 763, 777–8 761
signless Stirling number 122 special subdivision 806–9 Stirling permutation 134
simple graph 234, 359, 362, Spectral Theorem 768, 773,
527, 697, 794 778–9
Subject Index 967
tournament 225–9, 261, 334, 434, 451, 479, 485, unavoidable set 404–7, 413,
342, 374, 441, 458, 666–7, 489–90, 663, 682, 685, 416, 423
686, 702–3, 721 744, 769, 782, 791, 812 underlying graph 225, 234,
tower function 452–3, 459, Triangle-Removal Lemma 238–9, 443, 540
465–6, 484, 488, 602–4, 485–6, 492 unforced pair 573, 576, 584,
673 triangular chord 550 606, 620
Tower of Hanoi 70, 80, 84 Triangular Criterion 725–7, Uniform Angle Lemma
trace 766–7, 770 730 787–8
track number 608 triangular grid 173, 801 uniform distribution 99, 505
trail 234–5, 239, 250, 287, triangular matrix 758, 760 uniform family/hypergraph
313, 315, 329, 431, 442, triangular number 144, 151 9, 435–7, 442, 452, 475,
752 triangulated graph 366 489–500, 503–4, 510, 568,
transitive closure 543, 572 triangulation 43–4, 48, 56, 601, 608, 613, 616, 640–1,
transitive graph 212, 214, 384, 387–8, 395–6, 659–62, 666–7, 673–4,
218–9, 386, 812, 819 402–12, 416–23, 784–9, 684, 686, 727–32, 787
transitive orientation 226, 799, 809 uniform list assignment
374, 542, 550, 570 tripartite 460, 667 355–6, 667, 686, 742
transitive relation 3–4, 8, triple system 613, 640–5, uniformly at random 7, 91,
180, 230, 517, 541–3, 549, 649–50 507, 509, 561, 665, 668–9,
transitive tournament 374, truncation (of matroid) 540 677–8, 681, 685–7, 697,
703 Tucker’s Combinatorial 704, 707, 721–2, 821
transitivity of dependence Lemma 806–9, 812–3, 819 uniform matroid 522, 533,
528, 539 n-tuple 2 537
translate 512, 634–5, 638–9, Turán graph 223, 228, uniform random graph
655 475–8, 489–90, 770 model 688, 691–2, 698
transversal (of hypergraph) Turán number 479, 672 uniformity property 520–1,
504, 638, 735–6 Turán problem 478, 493, 524–5, 536
transversal (of matrix) 496, 498, 630 union (of graphs) 4
279–81, 287–8, 518–9, Turán’s Theorem 223–4, Union Bound 658–60, 671,
523, 532–3, 537, 541, 623, 228, 475–6, 478, 480, 483, 674, 685, 711, 721
638, 657, 735–6 489–91, 663, 769–70, 781 union-closed family 503, 512
transversal (of Latin square) Tutte graph 401 Union-Closed Sets
623, 638, 657, 735–6 Tutte set 265–7, 272–5 Conjecture 503, 512
transversal design 656 Tutte’s Condition 265–7, 269 union-free family 551
transversal matroid 517–8, Tutte’s 1-Factor Theorem unipathic graph 228
522, 531–2, 536, 540 264–75, 314, 756 unit-distance graph 342,
Traveling Salesman Tutte’s º -Factor Theorem 729, 745
Problem (TSP) 316 270–1, 276 universal search list 669
tree 5–6, 35–8, 239–52, etc. Tutte’s 3-Edge-Coloring universal subset list 566
¾ -tree 65, 375 Conjecture 416 unlabeled graph 212
triangle 142, 212, etc. Two Squares Theorem 428, unstable pair 284
Triangle-Counting Lemma 627 up-down permutation 65
485 Two-Point Removal up-down sequence 197, 203,
triangle-free 223–4, 227, Conjecture 575 207
238, 296, 305, 313, 316, two-step method 670 up-set 544–6, 595, 608
326, 334, 339–43, 351–4, upper extension 574
375, 384, 414, 417, 420,
ultrafilter 466
Subject Index 969