The isomorphism problem for Cayley digraphs on groups of prime square order Given any prime p, there are two non-isomorphic groups of order p2. We determine precisely when a Cayley digraph on one of these groups is isomorphic to a ... A Joseph - 《Discrete Mathematics》 被引量: 29发表:...
A finite group G is exceptional if it has a quotient Q whose minimal faithful permutation degree is greater than that of G. We say that Q is a distinguished quotient. The smallest examples of exceptional p-groups have order p5. For an odd prime p, we classify all pairs (G,Q) where ...
A user has one effective policy for each policy type. A user's effective policy is determined according to rules of precedence, as the following order. User: If a user is directly assigned a policy (either individually or through a batch assignment), that ...
Gamble, Greg; Praeger, Cheryl E.: Vertex-primitive groups and graphs of order twice the product of two distinct odd primes. - J. Group Theory 3 (2000), no... For a positive integer n, does there exist a vertex-transitive graph on n vertices which is not a Cayley graph, or, equival...
All-Male Groups in Asian Elephants: A Novel, Adaptive Social Strategy in Increasingly Anthropogenic Landscapes of Southern India Abstract Male Asian elephants are known to adopt a high-risk high-gain foraging strategy by venturing into agricultural areas and feeding on nutritious crops in order to ...
Gets a value that specifies the Id of the role definition. Name String RW Yes Gets or sets a value that specifies the role definition name. Order Int32 RW Yes Gets or sets a value that specifies the order position of the object in the site collection Permission Levels page. RoleTypeKind...
However, in order to be useful for clinical applications, several requirements and constraints need to be considered. In clinical gait analysis, usually the number of variables obtained is high, whereas the number of subjects is relatively low. This may result in an excessively complicated machine ...
configuring inbound or outbound rules at the same time. One CVM may be bound to one or more security groups. When a CVM is bound to multiple security groups, these security groups are matched and executed in descending order of priorities. You can adjust the priorities of these security grou...
we are including definitions of various terms as they occur in the text. However. in order not to disrupt the continuity of the discussion. we have placed them at the end of the Introduction. We denote these definitions by (DI). (D2), (D3). etc. ...
Applies to:Media Server Adobe recommends Peer-to-peer chat with NetGroup in Flash Player 10.1 Tom Krcha Was this page helpful? Yes No Experience Cloud What is Experience Cloud? Analytics Experience Manager Commerce Marketo Engage Workfront