Extracting List Colorings from Large Independent Sets

نویسندگان

  • Hal A. Kierstead
  • Landon Rabern
چکیده

We take an application of the Kernel Lemma by Kostochka and Yancey [10] to its logical conclusion. The consequence is a sort of magical way to draw conclusions about list coloring (and online list coloring) just from the existence of an independent set incident to many edges. We use this to prove an Ore-degree version of Brooks’ Theorem for online list-coloring. The Ore-degree of an edge xy in a graph G is θ(xy) = dG(x) + dG(y). The Ore-degree of G is θ(G) = maxxy∈E(G) θ(xy). We show that every graph with θ ≥ 18 and ω ≤ θ 2 is online ⌊ θ 2 ⌋ -choosable. In addition, we prove an upper bound for online list-coloring triangle-free graphs: χOL ≤ ∆+1−b14 lg(∆)c. Finally, we characterize Gallai trees as the connected graphs G with no independent set incident to at least |G| edges.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algorithms to Approximately Count and Sample Conforming Colorings of Graphs

Conforming colorings naturally generalize many graph theory structures, including independent sets, vertex colorings, list colorings, H-colorings and adapted colorings. Given a multigraph G and a function F that assigns a forbidden ordered pair of colors to each edge e, we say a coloring C of the vertices is conforming to F if, for all e = (u, v), F (e) 6= (C(u), C(v)). We consider Markov chain...

متن کامل

Some Problems Involving H-colorings of Graphs

by John Alan Engbers For graphs G and H, an H-coloring of G, or homomorphism from G to H, is an edge-preserving map from the vertices of G to the vertices of H. H-colorings generalize such graph theory notions as proper colorings and independent sets. In this dissertation, we consider four questions involving H-colorings of graphs. Recently, Galvin [27] showed that the maximum number of indepen...

متن کامل

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Defective List Colorings of Planar Graphs

We combine the concepts of list colorings of graphs with the concept of defective colorings of graphs and introduce the concept of defective list colorings. We apply these concepts to vertex colorings of various classes of planar graphs. A defective coloring with defect d is a coloring of the vertices such that each color class corresponds to an induced subgraph with maximum degree at most d. A...

متن کامل

Extremal H-colorings of trees and 2-connected graphs

For graphs G and H, an H-coloring of G is an adjacency preserving map from the vertices of G to the vertices of H. H-colorings generalize such notions as independent sets and proper colorings in graphs. There has been much recent research on the extremal question of finding the graph(s) among a fixed family that maximize or minimize the number of H-colorings. In this paper, we prove several res...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Graph Theory

دوره 86  شماره 

صفحات  -

تاریخ انتشار 2017