Path-Based Pendant Constructions
- The paper introduces path-based pendant constructions by systematically attaching pendant vertices to base graphs, with implications across graph theory, combinatorics, and applied physics.
- Key findings include explicit EKR thresholds and domination regimes, established through combinatorial, enumerative, and algorithmic methods.
- Methodologies extend into physical and network contexts, offering design rules for programmable droplet guidance and fault-tolerant pendant Steiner tree constructions.
Path-based pendant constructions encompass a spectrum of mathematical, combinatorial, and physical models in which additional structure—typically in the form of pendant (leaf) vertices, edges, or path-embedded motifs—is attached to base objects such as paths, trees, or surfaces. These constructions have broad applications, ranging from extremal set theory and domination in graphs, to the engineering of pinning landscapes for pendant droplets, to structural connectivity measures in network theory. The term integrates foundational ideas in graph theory, combinatorics, and applied physics, and distinct subfields focus on their combinatorial, enumerative, or physical dynamics across discrete or continuous settings.
1. Graph-Theoretic Definitions and Core Path-Based Pendant Models
In combinatorics and graph theory, a pendant construction refers to the systematic attachment of pendant (degree-one) vertices to every vertex of a given base graph, often a path or tree. For the -vertex path with base vertex set , the prototypical pendant path is constructed by adjoining a pendant to each , yielding
This is the uniform pendant path (with one pendant per base), but various generalized pendant models allow the attachment of multiple leaves per base vertex or pendants following prescribed patterns (e.g., only at even or interior positions) (Carrion et al., 25 Oct 2025, Allagan et al., 7 Jan 2026).
In more advanced network-theoretic settings, pendant trees refer to Steiner trees connecting given terminal sets where each terminal is forced to be a leaf in the tree. In product networks, path-based pendant constructions underpin lower bounds for pedant tree-connectivity and the construction, by cross-fiber "gluing," of internally disjoint pendant Steiner trees spanning multiple factors (Mao, 2015).
2. EKR-Type Results and Independent Set Thresholds for Pendant Paths
A central direction in the combinatorics of path-based pendant constructions concerns Erdős–Ko–Rado (EKR)-type theorems. Given a graph , EKR-type questions seek to characterize for which all largest intersecting families of independent -vertex sets are "stars" (families containing all independent -sets passing through a fixed vertex). For the pendant path , the independence number satisfies , since all pendants form a maximum independent set.
The threshold for -EKR behavior in aligns with the half-independence principle of Holroyd–Talbot: is -EKR for , and not -EKR for larger . Explicit counterexamples for the non-EKR regime are constructed by augmenting the unique largest star (at or ) with an extra independent set intersecting all sets in the star but lying outside it, thus producing a strictly larger intersecting family (Carrion et al., 25 Oct 2025). The failure of the EKR property for is algorithmically transparent via direct construction and persists in extensions to generalized pendant graphs.
The table below summarizes EKR thresholds for the pendant path :
| Regime | EKR Property | |
|---|---|---|
| "Safe" | -EKR holds | |
| "Critical" | -EKR fails |
The sharpness and universality of the threshold suggest further inquiries for cycles, path powers, and other pendant constructions.
3. Domination, Minimum Dominating Sets, and Enumeration Regimes
In domination theory, path-based pendant constructions are instrumental in controlling the number and structure of minimum dominating sets. Let denote the path with pendants per base vertex; its domination number for any (one vertex per cluster enforces coverage). The dominion —the count of all minimum dominating sets—exhibits a sharp dichotomy (Allagan et al., 7 Jan 2026):
- For , each cluster allows a free choice (host or pendant ), yielding .
- For , minimality constraints force the inclusion of all hosts, so .
This sharp forcing threshold demarcates maximal flexibility and rigidity. Intermediate patterns, such as removal of endpoint pendants or alternating pendant placement, interpolate between these extremes, leading to dominion enumerations governed by cluster decompositions or Fibonacci recurrences. For example, an even-pendant path with pendants at even-indexed vertices satisfies , where and is the -th Fibonacci number.
The following summarizes key enumeration results for path-based pendant trees:
| Pendant Pattern | Asymptotics | ||
|---|---|---|---|
| Uniform | Exponential | ||
| Uniform | $1$ | Rigid | |
| Endpoints excluded | Exponential, slightly reduced | ||
| Alternating even | , Fibonacci |
Algorithmic evaluation of and remains efficient (), and extension to trees or bounded-treewidth graphs is tractable.
4. Path-Based Pendant Constructions in Physical and Engineering Contexts
Beyond combinatorics, pendant constructions appear in physical experiments on pendant drops sliding along wet, tilted substrates. Here, path-based topographic defects—"tracks" or "ridges"—can steer the motion of pendant drops via gravito-capillary pinning (Jambon-Puillet, 2024). In a typical setup, a substrate is engineered with prescribed topography , spin-coated, and inverted; a drop is placed underneath and guided by defect-induced forces.
The key physical model combines gravity and capillarity with the pinning energy given by
where is drop amplitude, is defect height, is the capillary length, and " * " denotes 2D convolution. The pinning force is the negative gradient of this energy, and the depinning criterion is matched when the driving force from tilt equates the maximum pinning force. By adjusting track height, width, and sharpness, complex path-following and droplet routing are programmably realized.
This framework yields closed-form design rules for programmable droplet logic and microfluidics, generalizing to arbitrary planar paths.
5. Pendant Steiner Trees and Path-Based Connectivity in Networks
In network science and reliability, the path-based methodology extends to the construction and packing of pendant Steiner trees—trees connecting a fixed terminal set where each terminal is a leaf. For two connected graphs and , their Cartesian product supports the pairing of pendant Steiner tree packings in each factor ("leaf-path forests"), where three internally disjoint pendant -Steiner trees can be constructed for any in via a cross-product of leaf-paths (Mao, 2015).
The pendant tree-3-connectivity is the minimum number over all of size 3 of internally disjoint pendant -Steiner trees in . The main result establishes the tight lower bound
The path-based construction proceeds by factorizing both and into appropriate pendant forests, pairing, and then "gluing" along product fibers to realize the maximal number of internally disjoint configurations, providing guarantees for fault-tolerant broadcast/multicast in network topologies.
6. Threshold Phenomena, Regimes, and Open Directions
Path-based pendant constructions exhibit sharp thresholds in combinatorial, enumerative, and physical behaviors:
- EKR threshold: For independence, EKR-type properties hold up to and fail above (Carrion et al., 25 Oct 2025).
- Domination threshold: One pendant per host yields exponential dominion, two or more force rigidity (Allagan et al., 7 Jan 2026).
- Physical pinning threshold: Track heights must be chosen to exceed the scaled tilt parameter for robust droplet guidance (Jambon-Puillet, 2024).
Open directions include characterizing periodic or sparse pendant patterns yielding subexponential (e.g., Pisano-type) dominion growth, locating analogs of EKR/dominion thresholds in other pendant hosts (cycles, powers), and extending path-based pendant design to arbitrary networks and programmable physical media.
A plausible implication is that half-independence and local forcing principles underlie many of these thresholds, providing a unifying perspective for further study of constraint propagation and flexibility in both discrete and continuous pendant-augmented systems.