GraphCliques
 Original Paper
 Open Access
 Published:
Contributions of Jayme Luiz Szwarcfiter to graph theory and computer science
Journal of the Brazilian Computer Society volume 18, pages 153–165 (2012)
Abstract
This is an account of Jayme’s contributions to graph theory and computer science. Due to restrictions in length, it is not possible to provide an indepth coverage of every aspect of Jayme’s extensive scientific activities. Thus, I describe in detail only some of his principal contributions, touch upon some, and merely list the other articles.
I found it easier to write the article in the first person, as though it is an account of a previously given lecture.
Mucho Gusto en Conocerlo
According to Marisa Gutierrez, this is the way people say “nice to meet you” in Argentina.
The first time I heard of Jayme was back in 1974. At that time, I was a graduate student at the University of Waterloo, in Canada. In those days, I used to become quite upset with the general lack of knowledge about Brazil. The standard joke among the Brazilian students was that every foreigner thought that Buenos Aires was the capital of our country.
A friend of mine came by my office and showed me a copy of one of Jayme’s articles, a joint paper with Knuth [30]; a very nice paper. However, my friend’s intention was not to contribute to my education, but to irritate me with the title page of the article. It showed Jayme’s name, followed by the affiliation, and I quote: Universidade Federal do Rio de Janeiro, Argentina.
I must say that the elegance and simplicity of the paper was worth the irritation. There was also the added pleasure of seeing a Brazilian publishing a paper with Knuth. As you know, Knuth is one of the most illustrious researchers in computer science. Almost 20 years later, in 1992, Knuth wrote a book entitled Literate Programming [29]. Chapter 3 of this book contains a reproduction of the original article.
This paper was one of Jayme’s first contributions to make Brazil better known abroad. Since then, Jayme has produced a significant number of papers, some of which, like the paper mentioned above, are milestones in the history of Brazilian science. Jayme’s activity has also helped to foster the integration of the scientific community in our country. He also has an important role in the integration of the Latin American scientific communities, through collaboration with many researchers from different countries. And that includes colleagues from Argentina, of course.
Exercise 1
Determine the list of Latin American researchers who are coauthors of Knuth.
A Universidade do Brasil
As many of you know, the Universidade Federal do Rio de Janeiro is actually the Universidade do Brasil. Jayme participated in the creation of the three departments in that university where most of the research in computer science and graph theory takes place: (i) the Núcleo de Computação Eletrônica, created in 1970, (ii) the Department of Computer Science, created in 1971, part of the Institute of Mathematics, and (iii) the Systems Engineering and Computer Science Program, created in 1971.
Jayme taught the first computer science undergraduate course at the Universidade do Brasil, “Introduction to Computing,” to undergraduate Physics students, back in 1971.
He has supervised 16 Master’s students and 15 Ph.D. students, from several regions of Brazil and Latin America, who are today university professors in these regions.
Jayme’s influence extends to more than one generation of students and was enhanced by two textbooks, one on data structures [55], a joint work with Markenson, the other on graphs and algorithms [42].
He has also written three comprehensive surveys: (i) a joint work with Villanueva, a survey on chordal graphs [60], (ii) a joint work with Figueiredo, a survey on matchings in graphs [18], and (iii) a survey on clique graphs [50].
Theorems × algorithms
Jayme’s work seems to be characterized by the search of mathematical properties that help in determining efficient algorithms for solving problems, or that help in showing that the problem is probably computationally intractable. That is clearly the case of most of his papers, particularly the aforementioned paper with Knuth [30].
There are occasions, however, in which the opposite direction seems to have been followed. There is a very nice little note that he published [46], on the closure of a graph, as defined by Bondy and Chvátal in [9], in the search of sufficient conditions for a graph to be Hamiltonian. Whenever one reads that note, it immediately comes to mind the similarity involving the technique used by the closure algorithm and the technique used to enumerate the topological sorting arrangements in [30]. Indeed, Jayme calls the reader’s attention to that similarity at the end of the note, and takes advantage of that similarity in order to define a duality that relates mathematically the two situations, so obviously similar from the algorithmic point of view.
Having studied the many facets of his work, it is unclear to me whether Jayme views his mathematical activity as a vehicle for finding efficient algorithms or he uses the search for efficient algorithms as a means for discovering nice mathematical properties. It might be both. But whatever his guiding principle might be, it is clear that these two aspects of his work enrich each other.
Let us examine now some of Jayme’s work. The standard definitions in graph theory and in algorithm complexity may be found in classical books such as [10] and [21].
Topological sorting
Let us now take a look at the joint work with Knuth [30] on topological sorting arrangements, mentioned at the beginning of this lecture.
A topological sorting of a directed graph G is an enumeration T:=(v_{1},v_{2},…,v_{ n }) of the n vertices of G such that for each edge (v_{ i },v_{ j }) of G, i<j.
The authors give a very nice backtracking algorithm for generating all topological sortings of a directed graph. There are two fundamental ideas behind the algorithm. The first observation is that any subsequence S:=(v_{1},v_{2},…,v_{ r }) (0≤r<n) of consecutive terms of T is a topological sorting of G[S]; the subgraph of G spanned by the vertices in S. The second observation is that vertex v_{r+1} must be a source of G−S, the subgraph of G spanned by the vertices not in S; that is, v_{r+1} must have indegree zero in G−S.
With these two observations in mind, it is easy to understand the algorithm for enumerating all topological sortings of G. The algorithm is recursive. It receives (i) a sequence S:=(v_{1},v_{2},…,v_{ r }) (0≤r<n) that is a topological sorting of G[S], (ii) a vector d on n entries such that for each vertex v of G, the entry d[v] is equal to zero if v lies in S, otherwise d[v] is the indegree of v in G−S, and (iii) a linked list L of vertices of G−S that have indegree zero in G−S.
The initial call to this algorithm passes as arguments the empty sequence S, the vector d of indegrees of each vertex in G, and the list of sources of G.
The algorithm then recursively extends the sequence received, in all possible ways. For this, it must extend the sequence with a source of G−S: it does that by extracting from the list L its first element, say v. It is then easy to update vector d, by subtracting one from d[w], for each vertex w such that (v,w) is an edge of G. For each such w, if the new value of d[w] is zero then w is added at the end of list L. The algorithm is then ready to call itself recursively. On the return from the recursive call, vector d is restored to its original value, by adding one to d(w), for each edge (v,w) in G. Each vertex added at the end of L, in the set of sources of G−S−v that are not sources of G−S, is removed from L. Vertex v is removed from S and added back to the end of list L. The algorithm then proceeds with the next source of G−S, until the complete list L is scanned and the first vertex v is again the first vertex in the list. At this point, the algorithm returns.
Whenever the algorithm completes a sequence of length n, it prints the sequence as output. So after the return to the first call to the algorithm, the complete enumeration of all topological sortings has been printed.
Every effort is made in order to avoid any unnecessary searching in the graph. The list L is a very efficient way of having the sources ready for use, without the need to scan vector d. The first vertex v in L is added to S and removed from L. This requires constant time. Vector d is then updated in time linear with respect to the outdegree of v in G. So, too, is list L, which must now contain the sources of G−S−v. On the return from the recursive call, a reverse procedure, also linear in the outdegree of v, restores the initial values for L and d, except that v is now at the end of L.
It is thus easy to see that the time required for each topological sorting is linear on the size of G. Therefore, the algorithm has complexity O((m+n)α), where m is the number of edges of G and α the number of distinct topological sorting arrangements of G.
The authors even have a very elegant way of avoiding repeating the printing of the common prefix S, for each topological sorting arrangement that starts with S. For example, in an acyclic directed graph on 5 vertices, the output could look like this:
1  2  3  4  5 
4  3  5  
3  2  4  5  
2  1  3  4  5 
4  3  5  
3  1  4  5  
3  1  2  4  5 
2  1  4  5 
By the way:
Exercise 2
Reconstruct graph G, given the topological sortings of G.
The closure of a graph
Bondy and Chvátal proved the following nice result [9].
Theorem 1
LetGbe a simple graph onnvertices, vandwtwo nonadjacent vertices ofGsuch that the sumd(v)+d(w) of the degrees ofvandwinGis at leastn. ThenGis Hamiltonian if and only ifG+vwis Hamiltonian.
The proof of this result is an application of the pigeonhole principle. If G is Hamiltonian, then clearly so is G+vw. For the converse, get a Hamiltonian circuit C of G+vw. If C does not use edge vw, then it is a Hamiltonian circuit of G itself. If C uses edge vw, then C−vw has a path P:=(v=v_{1},v_{2},…,v_{ n }=w) that is a Hamiltonian path in G; moreover, by the pigeonhole principle, there exists i such that 1<i<n−1, v_{ i } is adjacent to w and v_{i+1} is adjacent to v. In that case, (v=v_{1},v_{i+1},v_{i+2},…,v_{ n }=w,v_{ i },v_{i−1},…,v_{1}) is a Hamiltonian circuit of G.
We may repeatedly add edges satisfying the inequality stated in the assertion of the theorem, until addition is no longer possible, thereby getting a sequence of graphs G=G_{0},G_{1},…,G_{ r }=c(G) such that either each graph in the sequence is Hamiltonian or no graph in the sequence is. Moreover, although the sequence is not unique, the last graph c(G) of the sequence, called the closure of G, is unique. If c(G) is the complete graph, clearly a Hamiltonian graph, then G is also Hamiltonian.
It is not difficult to have a polynomial algorithm of complexity O(n^{4}) steps, which computes c(G), given G: for each pair {v,w} of vertices of G, determine whether v and w are nonadjacent and d(v)+d(w)≥n. If v and w pass both tests, add vw to G and repeat the algorithm. This verification may be done in time O(1) for each pair, whence the determination of the next graph in the sequence takes O(n^{2}). The length of the sequence is O(n^{2}), therefore, the algorithm has complexity O(n^{4}).
Let us now see how Jayme was able to reduce the complexity to O(n^{3}) in [46], by making the computation of each new graph in the sequence linear. In the initialization phase, compute the adjacency matrix A of G, and the deficiency matrix D, an n×n matrix such that for each pair {v,w} of distinct nonadjacent vertices of G, D[v,w]:=max{0,n−(d[v]+d[w])}. Compute also a list L of pairs {v,w} of nonadjacent vertices v and w of G such that D[v,w]=0. All this can be clearly done in time O(n^{2}).
Let me now describe one step of the iteration phase, in which a new graph in the sequence is obtained in time O(n), or, alternatively, the algorithm concludes that G=c(G) in time O(1).
If the list L is empty, then G=c(G). If L is nonempty, remove from it a pair {v,w}, add vw to G. Update A in time O(1). For each vertex x of G−v−w, such that x is not adjacent to v and D[v,x]>0, subtract one from D[v,x]. If D[v,x] becomes equal to zero, add the pair {v,x} to the list L. Repeat this, with w in the role of v. One step of the iteration phase can certainly be done in time O(n). Therefore, the computation of c(G) can be done in time O(n^{3}).
The similarity between the idea of having a deficiency matrix dynamically computed in this algorithm and the idea of having an indegree vector dynamically computed in the algorithm of topological sorting enumeration prompted Jayme to observe a duality involving the two problems, which I will describe in a moment.
The line graphL(G) of G is the intersection graph of the edges of G. That is, the set of vertices of L(G) is the set of edges of G and two vertices e_{1} and e_{2} of L(G) are adjacent if and only if edges e_{1} and e_{2} are adjacent in G. Jayme expressed the duality in the following statement.
Theorem 2
LetGbe an undirected graph. Thenc(G) is complete if and only if there is an acyclic orientation of the line graph\(L(\overline{G})\)of the complement\(\overline{G}\)ofGin which the indegree of each vertex {v,w} of\(L(\overline{G})\)is at least the deficiencyD[v,w] of the pair {v,w} inG.
Hamiltonian paths in grid graphs
Speaking of Hamiltonian paths and circuits, let me talk now about another very important result of Jayme, in a joint work with Alon Itai and Christos Papadimitriou [26].
Let G^{∞} denote the infinite graph whose vertices are the points in the plane having integral coordinates and in which two vertices are adjacent if and only if the Euclidean distance between them is equal to one.
A grid graph is a finite vertexinduced subgraph of G^{∞}. Thus, a grid graph is completely specified by its set of vertices. For each vertex v, let v_{ x } and v_{ y } denote the coordinates of v. The parity of v is the parity of the sum v_{ x }+v_{ y } of its coordinates. Thus, v is even if v_{ x }+v_{ y } is even, and is odd otherwise. All grid graphs are bipartite, with the edges connecting an even vertex to an odd vertex.
Denote by R(m,n) the grid graph whose set of vertices is {v:1≤v_{ x }≤m, 1≤v_{ y }≤n}. A rectangular graphG is a grid graph that is isomorphic to R(m,n), for some integers m and n, called the dimensions of G. Note that the dimensions of a rectangular graph completely specify the graph, up to isomorphism.
Let s and t be distinct vertices of a grid graph G. The Hamilton path problem (G,s,t) consists in determining whether there is in G a Hamiltonian path from s to t.
The problem of determining whether or not an instance (G,s,t) of a Hamilton path problem has a solution is NPcomplete. This result was proven by Jayme and his coauthors in the paper I just mentioned. This result is the most important known NPcomplete restriction of the Traveling Salesman Problem. Indeed, the book The Traveling Salesman Problem [31], edited by Lawler et al., contains a chapter written by Johnson and Papadimitriou where the authors mention the importance of the NPcompleteness result and transcribe its proof as originally published in [26].
The proof of the NPcompleteness is too technical to be presented here. But it uses grid graphs G that have “holes,” that is, G^{∞}−G is not connected. In the paper, the authors indicate that it is not known whether or not the Hamilton path problem is NPcomplete for grid graphs without holes.
The paper also presents a very nice positive result for rectangular graphs: for every rectangular graph G:=R(m,n), there is an algorithm of complexity O(mn) that either determines that the instance (G,s,t) of the Hamilton path problem has no solution or determines a solution. As usual, the algorithm is a byproduct of the proof of theorems. I will not present the details here, but let me at least tell you the characterization of the instances that do have a solution.
Consider a rectangular graph G of dimensions m and n. We have seen that G is bipartite. If m and n are both odd, then the number mn of the vertices of G is odd, one of the parts of the bipartition has one vertex more than the other part. In that case, every Hamiltonian path in G must start and end in vertices that lie in the majoritarian part. On the other hand, if at least one of m and n is even, then G has an even number of vertices, and each part of the bipartition of G has precisely half of the vertices of G. In that case, every Hamiltonian path has its origin and terminus in distinct parts of the bipartition.
Without loss of generality, let us assume that G=R(m,n), m≥n. A necessary condition for (G,s,t) to have a solution is that the parities of s and t coincide if and only if (i) mn is odd and (ii) each of s and t is even. The authors call this the color compatibility condition of the (G,s,t) problem.
The color compatibility condition is not sufficient in general. It is sufficient for “large” rectangles, in which both dimensions are at least four. It is also sufficient for rectangles in which m is odd and n=3 (under the hypothesis that m≥n).
The problems appear when either n≤2 or when n=3 and m is even. If n=1, then the problem has a solution if and only if
If n=2, then the problem has a solution if and only if
The description of the necessary and sufficient condition for the case in which n=3 and m is even is more elaborate: We have seen that the color compatibility condition implies that in this case one of s and t must be even, the other odd; adjust the notation so that s is odd and t is even. The additional condition is then the following.
Under the hypothesis that m is even, n=3, s is odd and t is even, the instance (G,s,t) has a solution if and only if
In sum, the color compatibility condition is necessary. Assume that m≥n. The condition is sufficient for the cases in which n≥4. It is also sufficient for the case in which n=3 and m is odd. For the cases in which (i) n=1, or (ii) n=2, or (iii) n=3 and m is even, the condition has the additional requirement of (1), (2), and (3), respectively.
As I said, there are too many details to describe the proof and the algorithm here. The following exercises may prompt you to try to prove the result.
Exercise 3
Assume that s_{ x },t_{ x }≤m−2. Let G′:=R(m−2,n). Show that if the problem (G′,s,t) has a solution then so too does (G,s,t). Prove also that if n=3 and (G,s,t) has a solution then (G′,s,t) has a solution.
Exercise 4
Prove that the additional conditions (1), (2), and (3) are necessary for small rectangles.
Optimal multiway search trees
The most popular data structure used in large databases is the Btree, or a variation thereof. Btrees were invented by Bayer and McCreight in 1971 [5], in order to minimize the number of input operations in secondary storage. In fact, in the worst case, this number is the height of the tree, and a Btree may hold millions of keys with a height equal to three. This means that in order to find a key in a database of that size it suffices to perform at most three input operations from disk.
I am now going to describe a solution found by Jayme to an open problem posed by McCreight himself. That solution was published in 1984 [43]. I shall also describe some related work published in that same paper. For this, we need some definitions.
Let E:=(e_{1},…,e_{ n }) be a sequence of elements called keys. Associated with each key e_{ i } there is its sizes_{ i } and its value, an integer y_{ i }. We assume that y_{1}<y_{2}<⋯<y_{ n }.
A multiway search tree forE is an ordered rooted tree T such that each key e in E is assigned to exactly one node x(e) of T, while each node x keeps a subset E(x) of keys that satisfies the following properties:

(i)
E(x) is empty if and only if x is a leaf of T.

(ii)
Each nonleaf x of T has exactly E(x)+1 sons.

(iii)
If y is the kth son of x in the ordering of T and e_{ j } is an arbitrary key of E(y), then exactly k−1 keys e_{ i } of E(x) satisfy the inequality y_{ i }<y_{ j }.
The n+1 leaves of T are called gaps and denoted g_{0},g_{1},…,g_{ n }. Each gap g_{ i } corresponds to the interval I_{ i }:={y:y_{ i }<y<y_{i+1}}, where y_{0}:=−∞ and y_{n+1}:=+∞.
Let x be a node of T. The sizes(x) of x is the sum of the sizes of the keys of E(x). The heighth(x) of x is the number of nodes in the path from the root to x. The height of T is the maximum height of the nonleaves of T. The space of T is the number of nonleaf nodes.
Let L be any integer. We say that T has page limitL if s(x)≤L, for each node x of T.
Let L_{1} and L_{2} be integers such that 0<L_{1}≤L_{2}. A weakBtree of limits (L_{1},L_{2}) is a multiway search tree T of page limit L_{2} such that:

(i)
s(x)≥L_{1}, for each nonleaf node x of T distinct from the root of T.

(ii)
All leaves of T have the same height.
A Btree is a weak Btree of limits (⌈L_{2}/2⌉,L_{2}).
Suppose that there are associated with each key e_{ i } a probability p_{ i } and with each interval I_{ i } a probability q_{ i } such that \(\sum_{i=1}^{n} p_{i} + \sum_{i=0}^{n} q_{i} = 1\).
In a search for a value y, p_{ i } is the probability that y=y_{ i } and q_{ i } is the probability that y∈I_{ i }. The cost for determining whether a given value y is the value associated with some key is equal to h(x(e_{ i })) if y=y_{ i } for some key e_{ i }; otherwise, the cost is h(g_{ i })−1, where y∈I_{ i }. As you see, the cost is the number of input operations from disk that are necessary in order to have the answer to the problem “does there exist a key e_{ i } such that y=y_{ i }?” Taking into account the probabilities mentioned earlier, we deduce that the average search cost of T, or simply, the cost of T, is the sum
One of the problems is to minimize the cost of a tree, given the limit L, in the generic case of multiway trees, or the limits (L_{1},L_{2}), in the case of a weak Btree.
There is a particular case of the problem that is solvable in polynomial time, using standard dynamic programming techniques. It is the case in which the sizes of the keys are equal (see [22, 25]).
In the paper I mentioned, Jayme showed that the general problem of optimizing the cost of a tree, given the keys, the probabilities and the page limit, is NPhard. More precisely, he proved the following result.
Theorem 3
Deciding whether there exists a multiway search tree forEhaving limitLand cost at mostCis NPcomplete. It remains so even if all gap probabilities are equal to zero and each key probability is proportional to the size of the key.
He also proved another similar result in that paper, which implies the previous one.
Theorem 4
Deciding whether there exists a weakBtree forEhaving limits (L_{1},L_{2}) and cost at mostCis NPcomplete. It remains so even if all gap probabilities are equal to zero and each key probability is proportional to the size of the key.
Both proofs use a reduction of the partition problem, an NPcomplete problem [21]. Given a set A:={a_{1},a_{2},…,a_{ n }} of integers, the partition problem consists in determining whether or not there exists a partition of A in two blocks such that the sums of the elements in each block coincide.
Jayme also gave pseudopolynomial algorithms for the problems considered in Theorems 3 and 4, using dynamic programming. His algorithm determines a cost optimal multiway tree in time O(n^{3}L) and a cost optimal weak Btree in time O(n^{3}L_{2}). He also gave polynomial algorithms for minimizing either the height or the space of a multiway tree.
Let us get now to the problem posed by McCreight and solved by Jayme. The problem is the following: given a sequence E, and limits (L_{1},L_{2}), give an efficient algorithm for determining a weak Btree that has height two, precisely M keys in the root and minimum root size. As usual, we are assuming that 0<L_{1}≤L_{2}. We are also assuming that ∑s_{ i }>L_{1}, otherwise there is no reason for a tree of height two.
Let us first show how Jayme solved a simpler problem: solve McCreight’s problem relaxing the condition on the number of keys in the root. That is, the root may have any number of keys, subject to the upper limit condition on its size.
Here is a description of the very elegant solution for this simpler problem. Define a complete, acyclic directed graph D on the set {v_{0},v_{1},…,v_{n+1}} of vertices, in which for every pair (i,j) such that 0≤i<j≤n+1, an edge leaves vertex v_{ i }, enters vertex v_{ j } and the cost of that edge is d[i,j], defined as follows:
where s_{n+1}:=0.
Let the cost of a directed path P be the sum of the costs of its edges. For each directed path P from v_{0} to v_{n+1} of cost at most L_{2}, the set of vertices V(P) gives a (possibly not optimal) solution to the simplified problem: the set of keys in the root is precisely the set {e_{ i }:v_{ i }∈V(P)−v_{0}−v_{n+1}} and the size of the root is the cost of P. If, in addition, the cost of P is minimum, then the tree has minimum root size.
Thus, Jayme reduced the simplified version of the problem to that of finding in D a path of minimum cost from v_{0} to v_{n+1}. A straightforward implementation of a minimum cost path algorithm in D takes time O(n^{2}). Well, Jayme discovered a structure in the costs in the graph that allowed him to decrease the complexity of the algorithm to O(nlogn).
Let us now see how to solve the original problem, in which we would like to have not only minimum root size, but also precisely M keys in the root. The solution described here seems simpler than that originally given by Jayme in the paper, but is somewhat equivalent. In terms of the complete acyclic directed graph D defined above, the problem is equivalent to that of finding in D, among all directed paths of length M+1 from v_{0} to v_{n+1}, one that has minimum cost.
So, it is easy to solve: define an (n+1)×(n+1) matrix A, initialized with ∞ everywhere, except at entry A[0,0], which is initialized with zero. Then
Of course, A[i,r] is the cost of the minimum cost path from v_{0} to v_{ i } that has length r. In particular, if A[n+1,M+1]≤L_{2}, then A[n+1,M+1] is the size of the root of a weak Btree for E with limits (L_{1},L_{2}) having precisely M keys in the root and minimum root size. A straightforward implementation of this algorithm takes time O(n^{2}M). Jayme was able to lower the complexity to O(nMlogn).
Iterated clique graphs with increasing diameters
Let us now examine a result proved by Jayme and Bornstein [12]. The result answered a question that had been open for 12 years, it was posed in two articles and also in the book Graph Dynamics, by Prisner [35].
Let G be a graph. A clique of G is a set of pairwise adjacent vertices of G. A clique of G is maximal if it is not a proper subset of some other clique of G. The clique graphK(G) of G is the intersection graph of the family of maximal cliques of G. That is, the set of vertices of K(G) is the set of maximal cliques of G, and two vertices k_{1} and k_{2} of K(G) are adjacent if and only if the cliques k_{1} and k_{2} of G intersect.
For each nonnegative integer i, define K^{i}(G):=G if i=0 and K^{i}(G):=K(K^{i−1}(G)), if i>0. Likewise, for each nonnegative integer i, define L^{i}(G):=G if i=0 and L^{i}(G):=L(L^{i−1}(G)), if i>0, where L(G) denotes the line graph of G. For each vertex k of K(G), and each positive integer i, the ith inverse imageK^{−i}(k) of k is the clique k of G if i=1, otherwise it is \(\bigcup_{v \in K^{1} (k)} K^{(i1)}(v)\).
The diameter diam (G) of G is the maximum distance between any two vertices of G. That is, if d(v,w) denotes the distance between v and w in G, then diam (G):=max{d(v,w):v,w∈V(G)}. A pair of vertices of G is diametrical if their distance is equal to the diameter of G.
Hedman [24] showed that
The proof of the above inequalities is not difficult. In fact, if you want to warm up for this subject, here is a nice problem.
Exercise 5
Let G be a connected graph with at least one edge. Let F be a family of nonnull cliques of G such that for every edge e of G, both ends of e lie in some member of F. Let I denote the intersection graph ofGinduced byF, that is the set of vertices of I is F, two vertices f_{1} and f_{2} of I are adjacent if and only if the cliques f_{1} and f_{2} of G intersect. Prove that
Prove also that diam (I)=diam (G)+1 if and only if there exist two cliques k_{1} and k_{2} in F such that for each vertex v_{1} of k_{1} and each vertex v_{2} of k_{2}, vertices v_{1} and v_{2} are diametrical in G.
Note that the inequality proved by Hedman is a particular case of Exercise 5. It suffices to define F to be the family of maximal cliques of G: graph I will be the clique graph of G in that case. Another application of Exercise 5 is to define F to be set of pairs of vertices of G that are adjacent: in that case, graph I will be the line graph of G. The inequality for line graphs was proved by Knor et al. [28].
Hedman also described a family of graphs G for which diam (K(G))=diam (G)+1, and asked if graphs G exist with diam (K^{i}(G))=diam (G)+i for each positive integer i≥2.
The existence of such graphs G for i=2 was established by Balakrishnan and Paulraja [2] and independently by Peyrat, Rall, and Slater [34], who also proved the existence in the cases i=3 and i=4.
Jayme and Claudson were able to prove the existence of such a G for all positive integers i. In order to do that, they defined a graph H(d,G), where d is a positive integer and G is a graph. Graph H(d,G) was defined as follows: (i) take two copies G′ and G″ of G; (ii) take a new vertex v, and join it to each vertex of each of G′ and G″ by a path of length d. Then they showed the following result.
Theorem 5
LetGbe a graph whose diameter is at most 2d, v_{1}andv_{2}two vertices ofK^{i}(H(d,G)). If the inverseith images ofv_{1}andv_{2}are contained inG′ andG″, respectively, thenv_{1}andv_{2}are diametrical with distance diam (H(d,G))+i.
Thus, Hedman’s problem was reduced to finding a suitable graph G. They were able to use a relatively complicated argument to show that L^{i}(K_{ n }) is a good choice. More specifically, they proved the following result.
Theorem 6
Leti, dandnbe positive integers such that 2d>i+2, n≥4 andi≤⌊n/2⌋−1. LetGbe the graphH(d,L^{i}(K_{ n })). Then
With the above theorem, they solved completely the question, which had remained open for 12 years.
Clique graphs of directed path graphs and of rooted path graphs
Let us now examine another important contribution of Jayme. It is a joint work with Prisner [36]. The paper was selected to be part of the Editors’ Choice 1999 of the Discrete Applied Mathematics, an indication that it was one the best articles published by the periodical in 1999.
In that paper, the authors characterize the clique graphs of two families of graphs, the directed path graphs, and the rooted path graphs.
A directed path graph (or a DV graph) is the intersection graph of the family of directed paths of a directed tree. A dually directed path graph (or dually DV graph) is a graph G that admits a spanning directed tree T such that, for each edge (v,w) of G, T contains a directed v−w path or a directed w−v path whose vertices form a clique in G.
In order to describe their characterization of a dually DV graph, we need some definitions.
A family \(\mathcal{F}\) of sets has the Helly property if, for every nonnull subcolletion \(\mathcal{G}\) of \(\mathcal{F}\), either \(\mathcal{G}\) contains two disjoint sets or all the sets in \(\mathcal{G}\) have a common element. A graph is cliqueHelly if its family of maximal cliques has the Helly property.
For any graph G, let G′ denote the graph obtained from G by adding, for each vertex v of G, a new vertex v′ and a new edge joining v to v′.
Here is the characterization of dually DV graphs.
Theorem 7
A graphGis a dually DV graph if and only ifGis cliqueHelly andK(G′) is a DV graph.
The authors also derive an algorithm of complexity O(E(G)^{4}) to determine whether a given graph G is dually DV.
Let us now describe their characterization of clique graphs of rooted path graphs. A rooted tree is a directed tree having precisely one vertex with indegree zero (a rooted tree is sometimes called a branching). A rooted path graph (or RDV graph) is the intersection graph of the family of directed paths of a rooted tree. A dually rooted path graph (or dually RDV graph) is a graph G that admits a spanning rooted tree T such that, for each edge (v,w) of G, T contains a directed v−w path or a directed w−v path whose vertices form a clique in G.
A chordal graph is a graph that contains no induced cycle of length four or greater. A strong chord of a cycle of a graph is a chord that joins two vertices of the cycle with an odd distance in the cycle. A strongly chordal graph is a graph in which every cycle on six or more vertices contains a strong chord.
Here is the characterization for dually RDV graphs.
Theorem 8
The following statements are equivalent for a graphG:

(i)
Gis a dually RDV graph.

(ii)
Gis cliqueHelly andK(G′) is an RDV graph.

(iii)
Gis strongly chordal andK(G′) is an RDV graph.
The authors also derive an algorithm O(V(G)^{2.38}) to determine whether or not a given graph G is dually RDV.
Other results
We now examine very briefly other results obtained by Jayme.
Comparability graphs
Let D be an acyclic orientation of a graph G. Then D is transitive if, for each pair (u,v) and (v,w) of edges of D, edge (u,w) also lies in D. A graph is a comparability graph if it admits a transitive orientation.
For any two vertices v and w of D, let 〈v,w〉 denote the set consisting of those vertices that are simultaneously descendants of v and ancestors of w. Orientation D is locally transitive if G[〈v,w〉] is transitive, for each edge (v,w) of D. Graph G is local comparability if it admits a locally transitive orientation.
A graph G is P_{4}comparability if it admits an orientation D such that the restriction of D to the subgraph of G spanned by the set of vertices of each path of length three is transitive.
A circle graph is the intersection graph of chords of a circle, in which no two chords have a common point in the circle.
A pair {v,w} of vertices of G is even if every induced path from v to w has even length. A pair {v,w} is odd if v and w are nonadjacent and each induced path from v to w has odd length.
There are four papers on this subject that should be mentioned. In the first one [48], Jayme introduces the concept of local comparability graphs, as a generalization of comparability graphs. The class of local comparability graphs includes the comparability graphs and the circle graphs.
The first main result in that paper is that every local comparability graph is a difference of two comparability graphs. The second main result is that the class of local comparability graphs of dimension 1 is precisely the class of connected interval graphs that correspond to a set of totally noncomparable intervals of the real line. Circle graphs are similarly but less concisely characterized.
The next three papers show a beautiful evolution of thought, culminating with a nice characterization of source and sink sets, and also a characterization of even and odd pairs in a comparability graph.
The first of these three papers considers the problem of determining whether a comparability graph has a transitive orientation with specified sources and sinks. It is a joint work with Mello and Figueiredo [58]. They consider clique partitions of a comparability graph and determine some necessary conditions for the existence of a solution to the problem. This condition turns out to be sufficient for graphs with at most three maximal cliques. In particular, if only sources are specified, then the set is a source set if and only if each pair of vertices in S is an even pair and each vertex of S is a source of some transitive orientation.
In the second paper of the series, a new author joins the team: Gimbel [19]. The authors find a condition that is necessary and sufficient for the problem to have a solution. For a specified set S of sources and a specified set T of sinks, the authors construct a graph G(S,T) that is trivially obtained from G, S, and T and has size linear on the size of G. Then they show that the problem has a solution if and only if G(S,T) is a comparability graph. So, not only they solve the problem from a mathematical point of view, but they also give a polynomial algorithm for deciding whether the problem has a solution.
Finally, in the third paper of the series [20], they characterize even and odd pairs in comparability and in P_{4}comparability graphs. The characterizations lead to simple algorithms for deciding whether a given pair of vertices forms an even or odd pair in these classes of graphs. The complexities of the proposed algorithms are O(n+m) for comparability graphs and O(n^{2}m) for P_{4}comparability graphs. The former represents an improvement over a recent algorithm of complexity O(nm).
Cliques
There is an enormous number of significant results involving cliques. Some of these have already been described. Here are some more.
Clique graphs free of K_{3} and K_{4}
This is joint work with Protti [37]. The authors characterize the graphs whose clique graphs are free of triangles in terms of forbidden induced subgraphs: K_{1,3}, the 4fan and K_{4}. The 4fan is the graph obtained from the 4wheel by deleting an edge from the rim. They give a similar characterization for graphs whose clique graphs are free of K_{4}.
Cliqueinverse graphs of bipartite graphs
This is also joint work with Protti [39]. The authors characterize the families of graphs whose clique graphs are bipartite, in terms of forbidden configurations. The clique graph of a graph G is bipartite if and only if G is free of induced subgraphs in the following list: K_{1,3}, the 4fan, the 4wheel, C_{2n+5} (n≥0). They also characterize two more classes: (i) those graphs whose clique graphs are chordal bipartite graphs and (ii) those graphs whose clique graphs are a tree.
Clique graphs with linear size
Another joint work with Protti [38]. Let G be a graph. By examining K(G), the authors describe some sufficient conditions for the number of maximal cliques of G to be bounded by O(V(G)). These conditions are then applied to analyze the complexity of recognizing cliqueinverse graphs of various classes of graphs. In some cases, polynomial time algorithms are obtained, such as in the case of K^{−1}(K_{ r }free). In other cases, the bound is used to show that certificates may be verified in polynomial time, within a proof of NPcompleteness.
CliqueHelly graphs
In this paper [49], Jayme describes a characterization of cliqueHelly graphs, leading to a polynomial time algorithm for recognizing them.
Cliquecomplete graphs
This is a joint work with Lucchesi and Mello [32]. At the time, Mello had just completed her doctoral thesis, under the supervision of Jayme. Some years prior to that, Mello had written her Master’s dissertation under my supervision. So, it was a very pleasant opportunity to be a coauthor with Jayme and a former student of both of us.
For a natural number n, a graph G is nconvergent if K^{n}(G) is isomorphic to K_{1}, the onevertex graph. A graph G is convergent if it is nconvergent for some natural number n. A 2convergent graph is called cliquecomplete. A universal vertex is a vertex adjacent to every vertex of the graph.
The authors describe the family of minimal graphs which are cliquecomplete but have no universal vertices. The minimality used there refers to induced subgraphs. In addition, they show that recognizing cliquecomplete graphs is CoNP complete.
Clique convergent graphs
This is a joint work with Bornstein [11]. The index of a convergent graph G is the smallest n such that G is nconvergent, while its Helly defect is the smallest n such that K^{n}(G) is cliqueHelly. Bandelt and Prisner [3] proved that the Helly defect of a chordal graph is at most one and asked whether there is a graph whose Helly defect exceeds the difference of its index and diameter by more than one. In this paper, an affirmative constructive answer to the above question is given: for any arbitrary finite integer n≥0 a graph is exhibited in which the Helly defect exceeds by n the difference of its index and diameter.
Clique graphs of chordal graphs and of path graphs
Another joint work with Bornstein [52], where the authors characterize the clique graphs of chordal graphs and the clique graphs of path graphs.
Computing all maximal cliques distributedly
This is joint work with Protti and França [40]. The authors present a parallel algorithm for generating all maximal cliques of a graph. The time complexity of the algorithm is restricted to the induced neighborhood of a vertex and the communication complexity is O(MΔ), where M is the number of connections and Δ the maximum degree in the graph.
Enumeration of maximal cliques of a circle graph
This is joint work with Barroso [51]. The authors apply the notion of locally edge transitive orientations of an undirected graph and obtain an algorithm for generating all maximal cliques of a circle graph G in time O(n(m+α)), where n, m, and α are the number of vertices, edges and maximal cliques of G. In addition, they show that the actual number of such cliques can be computed in O(nm) time.
Maximal cliques in circle graphs
This is joint work with Cáceres and Song [14]. A Coarse Grained Multicomputer (cgm) consists of a set of p processors with O(N/p) local memory per processor and an arbitrary communication network (or a shared memory). A cgm algorithm consists of alternating local computation and global communication rounds. At each communication round, each processor sends and receives O(N/p) data.
In this paper, the authors present a parallel algorithm for finding the maximal cliques of a circle graph using the cgm model. The proposed algorithm requires O(logp) communication rounds. In a regular, sequential depth search, normally each edge is visited a constant number of times. The authors devised a new technique, called the unrestricted depth search, in which each edge may be visited an unbounded (but finite) number of times. The authors regard this technique as the main contribution of the paper. The three authors also have another paper on unrestricted depth search in parallel [15].
Edge clique graphs
The edge clique graphK_{ e }(G) of a graph G is the graph whose set of vertices is the set of edges of G, two vertices of K_{ e }(G) are adjacent if and only if the corresponding edges lie in a (common) clique of G.
An edge component of a graph G is a component of its edge clique graph.
Characterization of edge clique graphs
This is joint work with Cerioli [16]. A klabeling of a graph G with n vertices is an assignment of a set l(v)⊂{1,2,…,n} to each vertex v of G, such that l(v)=k and all label sets are distinct. A set S of vertices is triangular if \(S=\binom{r}{2}\) for some integer r. A set S of vertices is strongly triangular, with respect to a 2labeling l, if \(S =\binom{l(S)}{2}\). The authors show that a graph G is an edge clique graph if and only if it has a 2labeling that satisfies the following two properties: (i) every maximal clique is strongly triangular and (ii) every strongly triangular set is a clique.
Starlike graphs
Denote by N(v) the set of vertices that are adjacent to v in a graph G and by N[v] the set {v}∪N(v). A graph G is starlike if there exists a partition C,D_{1},…,D_{ s } (s≥0) of the set of vertices of G such that C is a maximal clique and, for u∈D_{ i }, v∈D_{ j }, i≠j implies that \(\{u,v\} \not \in E(G)\), whereas i=j implies that N[u]=N[v]. It follows that each D_{ i } is included by precisely one maximal clique C_{ i }, and D_{ i }=C_{ i }−C. If, in addition, C∩C_{ i }⊂C∩C_{i+1} for 1≤i<s, then G is a starlikethreshold graph.
A generalized starlike graph is a graph G such that precisely one of its edge components is a starlike graph, the others complete graphs.
A generalized starlikethreshold graph is a graph G such that precisely one of its edge components is a starlikethreshold graph, the others complete graphs.
A split graph is a graph that admits a partition C,I of its set of vertices such that C is a clique and I an independent set of vertices. Thus, a split graph is a particular case of a starlike graph, in which each D_{ i } is a singleton, for 1≤i≤s.
This is also joint work with Cerioli [17]. In this paper, the authors show that the class of starlike (starlikethreshold) graphs contains the class of edge clique graphs of generalized starlike (starlikethreshold) graphs. In addition, every starlike (starlikethreshold) graph which is an edge clique graph is an edge clique graph of a generalized starlike (starlikethreshold) graph. They also prove that a starlikethreshold graph is an edge clique graph if and only if its maximal cliques and intersections of maximal cliques are triangular sets.
Directed graphs
Jayme published several papers related to efficient algorithms for directed graphs. Let us take a brief look at each one of them.
Enumeration of directed circuits
This is a joint work with Lauer [54]. The authors give an O(n+mc) algorithm for enumerating all the directed circuits of a directed graph on m edges, n vertices, and c directed circuits.
Enumeration of kernels
A kernelN of a directed graph D is an independent set of vertices of D such that for every w∈V(D)−N there is an edge from w to N. The existence of a kernel in an directed graph with no odd directed cycles was proved by Richardson [41].
This is a joint work with Chaty [53]. The authors give an algorithm for generating all distinct kernels in a directed graph D with no odd directed circuits. The complexity of the algorithm is O(nm(k+1)), where n, m, and k are the number of vertices, edges, and kernels of D. Also, they show that the problem of determining the number of kernels in a directed graph D is #Pcomplete, even if the longest directed circuit of D has length two.
A minimax equality
The problem of finding the minimum set of vertices that intersects all circuits in a directed graph is NPcomplete [21]. Jayme published a paper [47] in which he introduces the class of connectively reducible digraphs and shows that it contains two classes known to admit polynomial solutions: the class of fully reducible subgraphs and the class of cyclically reducible digraphs. He also describes an algorithm O(n^{2}(n+m)) that recognizes connectively reducible directed graphs and determines a (minimum) set T of vertices that intersects all directed circuits for those graphs and a (maximum) vertexdisjoint set of directed circuits having cardinality equal to that of T.
Orientations with single source and sink
This is joint work with Persiano and Oliveira [57]. Given an undirected graph G, possibly with multiple edges, and distinct vertices s and t of G, the authors consider several orientations D of G. One of these orientations is acyclic and has s and t as the only source and sink of D, respectively. They show that this is possible if and only if graph G+st is 2connected. For each of the problems considered, they use depthfirst search to give linear time algorithms for finding the orientations or determine that they do not exist.
Generation of acyclic orientations
This is joint work with Barbosa [4]. The authors describe an algorithm for finding all the acyclic orientations of a graph G in overall time O((n+m)α) and delay complexity O(n(n+m)), where G has n vertices, m edges, and α acyclic orientations. The space required is O(n+m).
Rooted tree structure
A directed graph D=D(V,E) with a given root vertex s is reducible if every depthfirst search tree with root s has the same set B of back edges. Thus, for a reducible directed graph D, the associated dag (the subgraph with vertex set V and edge set E−B) is uniquely defined. A tree reducible graph is a reducible subgraph for which the transitive reduction (a smallest directed graph with the same reachability) of the associated dag is an arborescence (outdirected tree) with root s.
In this paper [44], Jayme gives the polynomial algorithm for (1) recognizing, (2) finding isomorphisms between, and (3) finding minimum equivalent directed graphs for tree reducible graphs.
Splitindifference graphs
This is a joint work with Ortiz and Maculan [33]. An indifference graph is an intersection graph on a set of unit intervals on the real line. A splitindifference graph is a split graph that is also an indifference graph. The authors give the following characterization of splitindifference graphs.
Theorem 9
A connected graphGis splitindifference if and only if

(i)
Gis complete, or

(ii)
Gis the union of two cliquesG_{1}andG_{2}such thatG_{1}−G_{2}=K_{1}, or

(iii)
Gis the union of three cliquesG_{1}, G_{2}, G_{3}such thatG_{1}−G_{2}=K_{1}, G_{2}−G_{3}=K_{1}and
$$V(G_1) \cap V(G_3) = \emptyset\quad\mbox{or} \quad V(G_1) \cup V(G_3) = V(G).$$
Using that characterization, they determine the chromatic index χ′(G) of splitindifference graphs. In order to do that, they construct an edge coloring of K_{2n}, n≥3, using 2n−1 colors such that K_{2n} has a perfect matching without color repetitions.
The resulting algorithm is very simple. It determines in linear time an optimum edge coloring of a splitindifference graph.
Other results
There are many other results that I should describe, but length restrictions force me to be very concise.
Task scheduling
Jayme has four papers in this area, three of them with Błażewicz and Kubiak [6–8, 45].
Euler tours
A joint work with Cáceres, Deo, and Sastry [13] describes an alternative implementation of Atallah and Vishkin’s parallel algorithm for finding an Euler tour of a graph [1].
Search
I should mention here three papers. The first paper is a joint work with Wilson, on ternary trees [56]. The second paper is joint work with Navarro et al., on optimal binary search trees with costs depending on the access paths [59].
The third paper is a joint work with Moscarini and Petreschi, Node Searching and Starlike Graphs. It is a very interesting paper. Let G be a graph whose vertices are contaminated. Assigning a searcher to a contaminated vertex makes it become guarded. Removing the searcher of a guarded vertex turns it clear. However, a clear vertex becomes contaminated again if it has a contaminated neighbor. The nodesearch number of G is the least number of searchers needed to clear all its vertices. Gustedt [23] has shown that the problem of determining the node search number of G is NPhard for uniform kstarlike graphs. These graphs are generalizations of split graphs, obtained when each vertex of the independent set of the bipartition of the split graph is replaced by a kvertex clique. The authors describe necessary and sufficient conditions for finding the nodesearch number of a uniform kstarlike graph. The characterization described extends a corresponding result for split graphs by Kloks [27]. In addition, it leads to a new algorithm for finding the nodesearch number for graphs of this class.
References
 1.
Atallah M, Vishkin U (1984) Finding Euler tours in parallel. J Comput Syst Sci 29(3):330–337
 2.
Balakrishnan R, Paulraja P (1986) Selfclique graphs and diameters of iterated clique graphs. Util Math 29:263–268
 3.
Bandelt HJ, Prisner E (1991) Clique graphs and Helly graphs. J Comb Theory, Ser B 51(1):34–45
 4.
Barbosa VC, Szwarcfiter JL (1999) Generating all the acyclic orientations of an undirected graph. Inf Process Lett 72(1–2):71–74
 5.
Bayer R, McCreight E (1971) Organization and maintenance of logic ordered indexes. Acta Inform 1:173–189
 6.
Błażewicz J, Kubiak W, Röck H, Szwarcfiter J (1987) Minimizing mean flowtime with parallel processors and resource constraints. Acta Inform 24(5):513–524
 7.
Błażewicz J, Kubiak W, Szwarcfiter J (1988) Scheduling unittime tasks on flowshops under resource constraints. Ann Oper Res 16(1–4):255–266. Multiattribute decision making via ORbased expert systems (Passau, 1986)
 8.
Błażewicz J, Kubiak W, Szwarcfiter J (1989) Scheduling independent fixedtype tasks. In: Advances in project scheduling. Elsevier, Amsterdam, pp 225–236
 9.
Bondy JA, Chvátal V (1976) A method in graph theory. Discrete Math 15(2):111–135
 10.
Bondy JA, Murty USR (1976) Graph theory with applications. Macmillan, London
 11.
Bornstein CF, Szwarcfiter JL (1995) On clique convergent graphs. Graphs Comb 11(3):213–220
 12.
Bornstein CF, Szwarcfiter JL (1998) Iterated clique graphs with increasing diameters. J Graph Theory 28(3):147–154
 13.
Cáceres EN, Deo N, Sastry S, Szwarcfiter JL (1993) On finding Euler tours in parallel. Parallel Process Lett 3(3):223–231
 14.
Cáceres EN, Song SW, Szwarcfiter JL (2001) A coarsegrained parallel algorithm for maximal cliques in circle graphs. In: Alexandrov V, Dongarra J, Juliano B, Renner R, Tan C (eds) Proceedings of computational science—ICCS 2001—Part II. Lecture notes in computer science, vol 2074. Springer, Berlin, pp 638–647
 15.
Cáceres EN, Song SW, Szwarcfiter JL (2001) A parallel unrestricted depth search algorithm. In: Arabnia HR (ed) Proceedings of the international conference on parallel and distributed processing techniques and applications—PDPTA’2001, Part II, pp 521–526
 16.
Cerioli MR, Szwarcfiter JL (2001) A characterization of edge clique graphs. Ars Comb 60:287–292
 17.
Cerioli MR, Swzarcfiter JL (2002) Edge clique graphs and some classes of chordal graphs. Discrete Math 242:31–39
 18.
de Figueiredo CMH, Szwarcfiter JL (1999) Emparelhamentos em grafos. In: Anais do XIX congresso nacional da Sociedade Brasileira de Computação, Jornada de atualização em informática, pp 127–161. In Portuguese
 19.
de Figueiredo CMH, Gimbel J, Mello CP, Szwarcfiter JL (1997) Sources and sinks in comparability graphs. Order 14(1):75–83
 20.
de Figueiredo CMH, Gimbel J, Mello CP, Szwarcfiter JL (1999) Even and odd pairs in comparability and in P_{4}comparability graphs. Discrete Appl Math 91(1–3):293–297
 21.
Garey MR, Johnson DS (1979) Computers and intractability: A guide to the theory of NPcompleteness. WH Freeman, San Francisco
 22.
Gilbert EN, Moore EF (1959) Variablelength binary encodings. Bell Syst Tech J 38:933–967
 23.
Gustedt J (1993) On the pathwidth of chordal graphs. Discrete Appl Math 45(3):233–248
 24.
Hedman B (1984) Clique graphs of time graphs. J Comb Theory, Ser B 37(3):270–278
 25.
Itai A (1976) Optimal alphabetic trees. SIAM J Comput 5(1):9–18
 26.
Itai A, Papadimitriou CH, Szwarcfiter JL (1982) Hamilton paths in grid graphs. SIAM J Comput 11(4):676–686
 27.
Kloks T (1994) Treewidth. Springer, Berlin,
 28.
Knor M, Niepel L, Šoltés L (1993) Centers in line graphs. Math Slovaca 43(1):11–20
 29.
Knuth DE (1992) Literate programming. CSLI lecture notes, vol 27. Center for the Study of Language and Information, Stanford
 30.
Knuth DE, Szwarcfiter JL (1974) A structured program to generate all topological sorting arrangements. Inf Process Lett 2(6):153–157
 31.
Lawler EL, Lenstra JK, Kan AHGR, Shmoys DB (eds) (1990) The traveling salesman problem. A guided tour of combinatorial optimization. Wiley, New York. Reprint of the 1985 original
 32.
Lucchesi CL, de Mello CP, Szwarcfiter JL (1998) On cliquecomplete graphs. Discrete Math 183(1–3):247–254
 33.
Ortiz CZ, Maculan N, Szwarcfiter JL (1998) Characterizing and edgecolouring splitindifference graphs. Discrete Appl Math 82(1–3):209–217
 34.
Peyrat C, Rall DF, Slater PJ (1986) On iterated clique graphs with increasing diameters. J Graph Theory 10(2):167–171
 35.
Prisner E (1995) Graph dynamics. Longman, Harlow
 36.
Prisner E, Szwarcfiter JL (1999) Recognizing clique graphs of directed and rooted path graphs. In: Proceedings of the third international conference on graphs and optimization, GOIII, Leukerbad, 1998, vol 94, pp 321–328
 37.
Protti F, Szwarcfiter JL (2000) Cliqueinverse graphs of K_{3}free and K_{4}free graphs. J Graph Theory 35(4):257–272
 38.
Protti F, Szwarcfiter JL (2000) On clique graphs with linear size. In: Proceedings of the thirtyfirst southeastern international conference on combinatorics, graph theory and computing, Boca Raton, FL, 2000. vol 143, pp 207–219
 39.
Protti F, Szwarcfiter JL (2002) Cliqueinverse graphs of bipartite graphs. J Comb Math Comb Comput 40, to appear
 40.
Protti F, França FMG, Szwarcfiter JL (1997) On computing all maximal cliques distributedly. In: Solving irregularly structured problems in parallel, Paderborn, 1997. Springer, Berlin, pp 37–48
 41.
Richardson M (1953) Solutions of irreflexive relations. Ann Math, 58:573–590; errata 60 (1954), 595
 42.
Szwarcfiter JL (1984) Grafos e algoritmos computacionais. Editora Campus, Rio de Janeiro. In Portuguese
 43.
Szwarcfiter JL (1984) Optimal multiway search trees for variable size keys. Acta Inform 21(1):47–60
 44.
Szwarcfiter JL (1985) On digraphs with a rooted tree structure. Networks 15(1):49–57
 45.
Szwarcfiter JL (1987) Job shop scheduling with unit time operations under resource constraints and release dates. Discrete Appl Math 18(2):227–233. Rio conference on combinatorial optimization (Rio de Janeiro, 1985)
 46.
Szwarcfiter JL (1987) A note on the computation of the kclosure of a graph. Inf Process Lett 24(4):279–280
 47.
Szwarcfiter JL (1989) On minimum cuts of cycles and maximum disjoint cycles. In: Graphs and algorithms, Boulder, CO, 1987. Amer Math Soc, Providence, pp 153–166
 48.
Szwarcfiter JL (1995) On edge transitivity of directed graphs. Discrete Math 141(1–3):227–235
 49.
Szwarcfiter JL (1997) Recognizing cliqueHelly graphs. Ars Comb 45:29–32
 50.
Szwarcfiter JL (2003) A survey on clique graphs. In: Reed BA, Sales CL (eds) Recent advances in algorithms and combinatorics. Springer, Berlin
 51.
Szwarcfiter JL, Barroso MMA (1991) Enumerating the maximal cliques of a circle graph. In: Graph theory, combinatorics, algorithms, and applications, San Francisco, CA, 1989. SIAM, Philadelphia, pp 511–517
 52.
Szwarcfiter JL, Bornstein CF (1994) Clique graphs of chordal and path graphs. SIAM J Discrete Math 7:331–336
 53.
Szwarcfiter JL, Chaty G (1994) Enumerating the kernels of a directed graph with no odd circuits. Inf Process Lett 51(3):149–153
 54.
Szwarcfiter JL, Lauer PE (1976) A search strategy for the elementary cycles of a directed graph. BIT Numer Math 16(2):192–204
 55.
Szwarcfiter JL, Markenson L (1994) Estruturas de dados e seus algoritmos. Livros Técnicos e Científicos, Rio de Janeiro. In Portuguese
 56.
Szwarcfiter JL, Wilson LB (1978) Some properties of ternary trees. Comput J 21(1):66–72
 57.
Szwarcfiter JL, Persiano RCM, Oliveira AAF (1985) Orientations with single source and sink. Discrete Appl Math 10(3):313–321
 58.
Szwarcfiter JL, Mello CP, de Figueiredo CMH (1993) On transitive orientations with prescribed sources and sinks. In: Proceedings of the twentyfourth southeastern international conference on combinatorics, graph theory, and computing, Boca Raton, FL, 1993, vol 98, pp 191–198
 59.
Szwarcfiter JL, Navarro G, BaezaYates R, de Oliveira JS, Cunto W, Ziviani N (2003) Optimal binary search trees with costs depending on the access paths. Theor Comput Sci A 290:1799–1814
 60.
Villanueva M, Szwarcfiter JL (1992) Triangulated graphs: a survey. Investig Oper 2:245–271
Acknowledgements
I would like to thank Celina M.H. de Figueiredo and Valmir C. Barbosa for having invited me to write this article. Their kind invitation gave me the opportunity to really grasp the extent of Jayme’s work over the years. I hope that this article will help others to appreciate the breadth of Jayme’s work.
I would also like to thank Valmir C. Barbosa, Márcia Cerioli, Celina M.H. de Figueiredo, Sulamita Klein, and U.S.R. Murty for reading an earlier draft and giving me many helpful suggestions.
Supported by a grant from CNPq.
Author information
Affiliations
Corresponding author
Additional information
The author is currently at FacomUFMS, MS, Brazil, with email address lucchesi@facom.ufms.br.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Lucchesi, C.L. Contributions of Jayme Luiz Szwarcfiter to graph theory and computer science. J Braz Comput Soc 18, 153–165 (2012). https://doi.org/10.1007/s1317301100542
Received:
Accepted:
Published:
Issue Date:
Keywords
 Graph theory
 Computer science
 Computer science in Latin America