Extracting List Colorings from Large Independent Sets
نویسندگان
چکیده
We take an application of the Kernel Lemma by Kostochka and Yancey [10] to its logical conclusion. The consequence is a sort of magical way to draw conclusions about list coloring (and online list coloring) just from the existence of an independent set incident to many edges. We use this to prove an Ore-degree version of Brooks’ Theorem for online list-coloring. The Ore-degree of an edge xy in a graph G is θ(xy) = dG(x) + dG(y). The Ore-degree of G is θ(G) = maxxy∈E(G) θ(xy). We show that every graph with θ ≥ 18 and ω ≤ θ 2 is online ⌊ θ 2 ⌋ -choosable. In addition, we prove an upper bound for online list-coloring triangle-free graphs: χOL ≤ ∆+1−b14 lg(∆)c. Finally, we characterize Gallai trees as the connected graphs G with no independent set incident to at least |G| edges.
منابع مشابه
Algorithms to Approximately Count and Sample Conforming Colorings of Graphs
Conforming colorings naturally generalize many graph theory structures, including independent sets, vertex colorings, list colorings, H-colorings and adapted colorings. Given a multigraph G and a function F that assigns a forbidden ordered pair of colors to each edge e, we say a coloring C of the vertices is conforming to F if, for all e = (u, v), F (e) 6= (C(u), C(v)). We consider Markov chain...
متن کاملSome Problems Involving H-colorings of Graphs
by John Alan Engbers For graphs G and H, an H-coloring of G, or homomorphism from G to H, is an edge-preserving map from the vertices of G to the vertices of H. H-colorings generalize such graph theory notions as proper colorings and independent sets. In this dissertation, we consider four questions involving H-colorings of graphs. Recently, Galvin [27] showed that the maximum number of indepen...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملDefective List Colorings of Planar Graphs
We combine the concepts of list colorings of graphs with the concept of defective colorings of graphs and introduce the concept of defective list colorings. We apply these concepts to vertex colorings of various classes of planar graphs. A defective coloring with defect d is a coloring of the vertices such that each color class corresponds to an induced subgraph with maximum degree at most d. A...
متن کاملExtremal H-colorings of trees and 2-connected graphs
For graphs G and H, an H-coloring of G is an adjacency preserving map from the vertices of G to the vertices of H. H-colorings generalize such notions as independent sets and proper colorings in graphs. There has been much recent research on the extremal question of finding the graph(s) among a fixed family that maximize or minimize the number of H-colorings. In this paper, we prove several res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Graph Theory
دوره 86 شماره
صفحات -
تاریخ انتشار 2017