Starting from a safe base, an Infiltrator tries to reach a sensitive zone within a given time limit without being detected by a Guard. The Infiltrator can move with speed at most u , while the Guard can only perform a restricted number of searches. A discrete variant of this zero-sum game played on
A Hamiltonian game on Kn,n
β Scribed by Xiaoyun Lu
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 426 KB
- Volume
- 142
- Category
- Article
- ISSN
- 0012-365X
No coin nor oath required. For personal study only.
β¦ Synopsis
Let K,,, be the complete bipartite graph of order 2n. Two players, maker and breaker, alternately take previously untaken edges of K,.,, one edge per move, with the breaker going first. The game ends when all edges of K,,, have been taken. Then the edges taken by the maker induce a graph G. The maker wants G to have as many edge disjoint Hamilton cycles as possible, and the breaker wants G to have as few such cycles as possible. We prove that the maker can achieve & n edge-disjoint Hamilton cycles for large n.
π SIMILAR VOLUMES
The object of this paper is to introduce a new technique for showing that the number of labelled spanning trees of the complete bipartite graph K,,,, is IT(m, n)l = m"-'n"-'. As an application, we use this technique to give a new proof of Cayley's formula IT(n)1 = nnm2, for the number of labelled s
## Abstract Let __G__ be an undirected and simple graph on __n__ vertices. Let Ο, Ξ± and Ο denote the number of components, the independence number and the connectivity number of __G. G__ is called a 1βtough graph if Ο(__G__ β __S__) β©½ |__S__| for any subset __S__ of __V__(__G__) such that Ο(__G__ β