{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T05:58:07Z","timestamp":1733983087113,"version":"3.30.2"},"reference-count":14,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2003,2,28]],"date-time":"2003-02-28T00:00:00Z","timestamp":1046390400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Random Struct Algorithms"],"published-print":{"date-parts":[[2003,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Let \ud835\udca5<jats:sub>0<\/jats:sub>be any fixed 3\u2010uniform hypergraph. For a 3\u2010uniform hypergraph \u210b\ufe01 we define \u03bd<jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-inf-2.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-inf-2\"\/>(\u210b\ufe01) to be the maximum size of a set of pairwise triple\u2010disjoint copies of \ud835\udca5<jats:sub>0<\/jats:sub>in \u210b\ufe01. We say a function \u03c8 from the set of copies of \ud835\udca5<jats:sub>0<\/jats:sub>in \u210b\ufe01 to [0, 1] is a<jats:italic>fractional<\/jats:italic>\ud835\udca5<jats:sub>0<\/jats:sub>\u2010<jats:italic>packing<\/jats:italic>of \u210b\ufe01 if \u2211<jats:sub>\ud835\udca5\u220b<jats:italic>e<\/jats:italic><\/jats:sub>\u03c8(\ud835\udca5) \u2264 1 for every triple<jats:italic>e<\/jats:italic>of \u210b\ufe01. Then \u03bd<jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-stack-1.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-stack-1\"\/>(\u210b\ufe01) is defined to be the maximum value of \u2211<jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-inf-10.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-inf-10\"\/>\u03c8(\ud835\udca5) over all fractional \ud835\udca5<jats:sub>0<\/jats:sub>\u2010packings \u03c8 of \u210b\ufe01. We show that \u03bd<jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-stack-3.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-stack-3\"\/>(\u210b\ufe01) \u2212 \u03bd<jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-inf-16.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-inf-16\"\/>(\u210b\ufe01) =<jats:italic>o<\/jats:italic>(|<jats:italic>V<\/jats:italic>(\u210b\ufe01)|<jats:sup>3<\/jats:sup>) for all 3\u2010uniform hypergraphs \u210b\ufe01. This extends the analogous result for graphs, proved by Haxell and R\u00f6dl (2001), and requires a significant amount of new theory about regularity of 3\u2010uniform hypergraphs. In particular, we prove a result that we call the Extension Theorem. This states that if a<jats:italic>k<\/jats:italic>\u2010partite 3\u2010uniform hypergraph is regular [in the sense of the hypergraph regularity lemma of Frankl and R\u00f6dl (2002)], then almost every triple is in about the same number of copies of<jats:italic>K<\/jats:italic><jats:inline-graphic xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xlink:href=\"graphic\/tex2gif-stack-4.gif\" xlink:title=\"urn:x-wiley:10429832:media:RSA10075:tex2gif-stack-4\"\/>(the complete 3\u2010uniform hypergraph with<jats:italic>k<\/jats:italic>vertices). \u00a9 2003 Wiley Periodicals, Inc. Random Struct. Alg., 22: 248\u2013310, 2003<\/jats:p>","DOI":"10.1002\/rsa.10075","type":"journal-article","created":{"date-parts":[[2003,3,21]],"date-time":"2003-03-21T18:58:53Z","timestamp":1048273133000},"page":"248-310","source":"Crossref","is-referenced-by-count":12,"title":["Integer and fractional packings in dense 3\u2010uniform hypergraphs"],"prefix":"10.1002","volume":"22","author":[{"given":"Penny","family":"Haxell","sequence":"first","affiliation":[]},{"given":"Brendan","family":"Nagle","sequence":"additional","affiliation":[]},{"given":"Vojt\u011bch","family":"R\u00f6dl","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2003,2,28]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"crossref","unstructured":"S.Arora D.Karger andM.Karpinski Polynomial time approximation schemes for dense instances of NP\u2010hard problems Proc ACM Symp Theory of Computing Las Vegas NV 1995 pp.284\u2013293.","DOI":"10.1145\/225058.225140"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480197318301"},{"key":"e_1_2_1_4_2","doi-asserted-by":"crossref","unstructured":"D.DorandM.Tarsi Graph decomposition is NPC\u2014a complete proof of Holyer's conjecture Proc ACM Symp Theory of Computing Victoria BC 1992 pp.252\u2013263.","DOI":"10.1145\/129712.129737"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793247634"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0195-6698(85)80045-7"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.10017"},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","unstructured":"A.FriezeandR.Kannan The Regularity Lemma and approximation schemes for dense problems Proc IEEE Symp Foundations of Computer Science Burlington VT 1996 pp.12\u201320.","DOI":"10.1109\/SFCS.1996.548459"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s004930050052"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s004930170003"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032718"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199603)8:2<149::AID-RSA5>3.0.CO;2-Y"},{"key":"e_1_2_1_13_2","unstructured":"B.Nagle Regularity properties for triple systems Ph.D. Thesis Emory University Atlanta GA 1999."},{"journal-title":"Random Struct Alg","article-title":"Regularity properties for triple systems","author":"Nagle B.","key":"e_1_2_1_14_2"},{"key":"e_1_2_1_15_2","unstructured":"E.Szemer\u00e9di \u201cRegular partitions of graphs \u201d Probl\u00e8mes en combinatoire et th\u00e9orie des Graphes Proc Coll Int CNRS J.\u2010C.Bermond J.\u2010C.Fournier M.Las Vergnas andD.Sotteau 1978 pp.399\u2013401."}],"container-title":["Random Structures &amp; Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Frsa.10075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/rsa.10075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:07:10Z","timestamp":1733969230000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/rsa.10075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,2,28]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["10.1002\/rsa.10075"],"URL":"https:\/\/doi.org\/10.1002\/rsa.10075","archive":["Portico"],"relation":{},"ISSN":["1042-9832","1098-2418"],"issn-type":[{"type":"print","value":"1042-9832"},{"type":"electronic","value":"1098-2418"}],"subject":[],"published":{"date-parts":[[2003,2,28]]}}}