Lecture 6 January 15, 2014

Size: px
Start display at page:

Download "Lecture 6 January 15, 2014"

Transcription

1 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for given graph G if (T, f) is simple tree decomposition then V (T ) V (G). In this lecture, we will prove the aove result and introduce the concept of nice tree decomposition and how to convert simple tree decomposition to nice tree decomposition without increasing its tree width. We conclude this module with application of dynamic programming, using tree decomposition, to find the independent set of graph. 2 Simple Tree Decomposition Definition 1. For given graph G and its tree decomposition (T, f); T is said to e simple tree decomposition if for any two distinct nodes t 1 and t 2 in V (T ), neither f(t 1 ) f(t 2 ) nor f(t 2 ) f(t 1 ). Lemma 2. For given graph G and its simple tree decomposition (T, f), V (T ) V (G). Proof. Pick an aritrary node r V (T ) and consider T as a rooted tree with r as the root. By the connectivity property of tree decomposition, for every vertex v V (G) the set { v f()} induces a connected sutree of T. Thus there is a unique node v V (T ) which is the node of T closest to r out of all nodes in { v f()}. We say that v peaks at v. Each vertex v V (G) peaks at exactly one node v in V (T ). We argue that for every node V (T ) there is a vertex v V (G) that peaks at. Suppose not. If is the root r this implies that f() = φ, contradicting that (T, f) is simple as f() will e contained in all f( 1 ) where 1 V (G) and 1. If is not the root r then has a parent which is closer to the root r. Since no vertex v V (G) peaks at it follows that f() f( ) contradicting that (T, f) is simple. We now have that every node of V (T ) has some vertex G that peaks at it, and every vertex v of G peaks in exactly one node of T. Thus V (T ) V (G). 1

2 3 Nice Tree Decomposition Definition 3. A tree decomposition (T, f) of G is called nice if it has the following properties P1 T is root at node r P2 f(r) = 0 and for every leaf l, f(l) = φ P3 every node in in T has at most 2 children P4 If has 2 children, say, 1 and 2 then f() = f( 1 ) = f( 2 ). P5 If has only one child, say, 1 then one of the following two conditions is true. (i) f( 1 ) f() and f() = f( 1 ) + 1 (ii) f() f( 1 ) and f( 1 ) = f() + 1 Consider the graph given in Fig 1 and its tree decomposition in Fig 2. a c d e f g Figure 1: Graph G a c cd de df dg a ac cd cde d dfg g Figure 2: Nice Tree Decomposition of graph G For node, if the first case of property P5 holds, then it is known as introduce node. If later case holds, we call it forget node. Lemma 4. If graph G has tree-decomposition of tree-width k then it also has a nice tree decomposition of the same tree width. Furthermore, given any tree decomposition, we can construct nice tree decomposition in polynomial time. 2

3 Proof. We start with considering T as an unrooted tree and setting (T, f ) = (T, f). We then proceed to modify (T, f ) in order for it to have the desired properties. Throughout the process we will maintain that (T, f ) is a tree decomposition of G of width k. First we add to every leaf l of T another leaf l and set f (l ) = φ. Then we select an aritrary leaf of T, call it r and root the tree T at r. At this point (T, f ) is a tree decomposition of G satisfying properties P1 and P2. As long as T has a node V (T ) with more than two children, we proceed as follows. Let 1, 2... p e the children of. We make a new node and add it to T in the following manner. The parent of is set to, and for each child i of with i 2 we make the parent of i instead. Finally we set f ( ) = f (). This operation maintains that (T, f ) is a tree decomposition of G. Furthermore now only have two children namely 1 and. The prolem has shifted from to ut has degree one less than what had efore this step. Hence each step adds one node to the tree T and for one vertex with more than two children, decreases the numer of children y 1. We will continue this process till all the nodes in T has at most two children. At this point (T, f ) is a tree decomposition of G satisfying properties P1,P2 and P3. Following is the simple illustration of the process when has three children with more than two children 2 3 Introducing so that now has two children We now run a new process, aimed to make (T, f ) satisfy property P4. As long as there exists a vertex V (T ) with 1, 2 its children and f () f ( 1 ) f ( 2 ), we proceed as follows. We add two new nodes 1 and 2 to T. Make the parent of 1, 2 and change the parent of 1, 2 to e 1, 2 respectively. We set f ( 1 ) = f ( 2 ) = f (). At the completion of step the numer of vertices in V (T ) which contradicts to property P4 is reduced y one. Hence, after finite iterations (T, f ) is a tree decomposition of G satisfying properties P1,P2,P3 and P4. Following diagram illustrate this step f () ( 1 ) ( 2 ) 1 2 f () = f ( 1 ) = f ( 2 ) Finally we run a process aimed at making (T, f ) satisfy property P5. Consider there exist vertex in V (T ) with child 1 such that f() f( ) and f() + k = f( ) for some constant integer k > 1. We will introduce new vertex as child of and make parent of 1. Let u f( 1 )\f(). Assign f ( ) = f () u. After this step, satisfies the property P5 ut violate it. But, now 3

4 the difference etween f( ) and its child f( 1 ) is k 1. Hence after k iterations, all the newly introduced vertices in the path to 1 will satisfy the property P5. For vertex c in V (T ) with child c 1 such that f(c) f(c 1 ) and f(c) = f(c 1 ) + k. We introduce new vertex c in similar way ut we assign f (c ) = f (c)\{u} where u f (c)\f(c 1 ). The total numer of steps in all of the processes descried aove is O(kn) since each step adds a new node to T. With appropriate data structures, each step of each process can e completed in time O(k O(1) ) and hence we can construct nice tree decomposition in polynomial time. 4 Dynamic Programming Many algorithms on trees are ased on dynamic programming and are polynomial time solvale. We defined tree width to measure how accurately a given graph can e approximated to tree. Lower the tree width of graph, more closely it can e associated with tree. Thus it is natural to think that some of the dynamic programming algorithms that work for trees could e lifted to also work on graphs of ounded treewidth. This turns out to e the case with a few notale exceptions most prolems that are polynomial time solvale on trees are also polynomial time solvale on graphs of ounded treewidth. We will use the independent set prolem as an example to illustrate this concept. Before jumping into the dynamic programming, we will first define some useful concepts. T is tree rooted at and defined as T = {w w is an descendant of in T } {}. Definition 5. For given graph G and its tree decomposition (T, f), for V (T ) define set V = w T f(w) V (G) is divided (note that it is not a partition) into V for all V (T ). Define V 1, V 2 V (G) as V 1 = V and V 2 = x V (T )\T f(x). Since G is t- decomposile, removing t+1 points will disconnect the graph and hence V 1 V 2 t + 1. Definition 6. For given graph G and V V (G), oundary of V is defined as Z V V, (v, w) E(G) and w V (G)\V } = {v v Since graph is t decomposile, Z V i t + 1 for any V i V (G). Let us consider the following example. We define function β : V (G) 2 V (T )\φ and function f : V (T ) 2 V (G) as written in the tale. 4

5 v β(v) 1 {e} 2 {c, e} 3 {a} 4 {a, } 5 {, d, f} 6 {, d, f, g} 7 {h} 8 {f, h, i, j} 9 {d, g, k, l} 10 {i} 11 {j} 12 {k} 13 {l} x f(x) a {4, 3} {4, 5, 6} c {4, 2} d {5, 6, 9} e {2, 1} f {5, 6, 8} g {6, 9} h {7, 8} i {8, 10} j {8, 11} k {9, 12} l {9, 13} a c f d g e h l i k In the aove example, following are some of the susets and their oundaries V h = {7, 8, 10, 11}; Z Vh = {8} V f = {5, 6, 7, 8, 9, 10, 11}; Z Vf = {5, 6} V d = {5, 6, 7, 8, 10, 11, 9, 12, 13}; Z Vd = {5, 6} The idea is to store sufficient information in the oundary of the suset which will help us to determine Independent set of entire graph y looking only at oundary. For V V (G) Let us define the following collection of sets F = {A V i A is independent set of G and V i V } j 5

6 Definition 7. For given graph G its independent set A we define A 1 = A V and A 2 = A\A 1. We say F is good family if there exist B F such that 1. B Z V = A 1 Z V 2. B A 2 is an independent set. 3. B A 2 > A. But the size of family can e as large as 2 V (G). We can reduce the upper ound on the size of set y defining following collection of sets. ˆF V (Z ) = {X X F V and X Z = Z } where Z Z. This definition allow us select the etter candidate among the V i and leave out the candidate which forms the su-optimal solution. We can reduce our focus to the aove set. Since the size of oundary is ounded we now have 2 t+1 possile susets. Now instead of working on graph G, we will work on its tree decomposition. As proved earlier, every graph has nice tree decomposition. We only need to see procedure at different type of nodes of nice tree viz leafs, nodes which has two children and introduce node or forget node. We now descrie the procedure and prove that the i th family computed is good, y induction on i. First we compute the family F for every leaf, and sets F = {φ}. Since (T, f) is a nice tree decomposition of G it follows that f() = φ and therefore V = φ. Thus, for any optimal solution OP T of G, there is a set B F, namely B = φ, such that B f() = OP T f() = φ and (OP T \V ) B = OP T is an optimal solution to G. Assume now that families of the i first nodes processed y the procedure are all good, and consider the i + 1 st node V (T ) to e processed. If is a leaf we have already shown that F is good, so assume now that is not a leaf. All the children of have een processed. The node has one or two children in T, since (T, f) is a nice tree decomposition. If has one child 1 then F 1 is good y the induction hypothesis. Similarly if has two children 1 and 2 then F 1 and F 2 are oth good y the induction hypothesis. It suffices to show that, in either case, the family F is good. If has two children 1 and 2 then F = {X 1 X 2 X 1 F 1, X 2 F 2 and X 1 f() = X 2 f()}. We wish to prove that F is good. To that end, consider any optimal solution OP T V (G). Since F 1 is good there is a set X 1 F 1 such that OP T 1 = (OP T \V 1 ) X 1 is an optimal solution as well, and X 1 f() = OP T f(). Here we used that (T, f) is a nice tree decomposition, and that therefore f( 1 ) = f( 2 ) = f(). Similarly, since F 2 is good there is a set X 2 F 2 such that OP T 2 = (OP T 1 \V 1 ) X 2 is an optimal solution, and X 2 f() = OP T 1 f(). Consider the set X = X 1 X 2. The definition of F implies that X F, and OP T 2 = (OP T \V ()) X is an optimal solution as well. Finally X f() = OP T f(). We conclude that in this case F is good. If has one child 1 then F = {X 1 S X 1 F 1 and S f()\f( 1 )} 6

7 We wish to prove that F is good. To that end, consider any optimal solution OP T V (G). Since F 1 is good there is a set X 1 F 1 such that OP T 1 = (OP T \V 1 ) X 1 is an optimal solution as well, and X 1 f( 1 ) = OP T f( 1 ). Let S = OP T (f()\f( 1 )), and oserve that S satisfies S = OP T 1 (f()\f( 1 )) as well. Let X = X 1 S, we have that X F 1, OP T 1 = (OP T \V ) X is an optimal solution, and OP T f() = S (X 1 f(1) f()) = X f(). Thus F is good family, concluding the proof of correctness of the procedure. 7

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY SHINYA FUJITA AND HENRY LIU Astract The alanced decomposition numer f(g) of a graph G was introduced y Fujita and Nakamigawa [Discr Appl Math,

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

1 Caveats of Parallel Algorithms

1 Caveats of Parallel Algorithms CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas

More information

Chaos and Dynamical Systems

Chaos and Dynamical Systems Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,

More information

Augmenting Outerplanar Graphs to Meet Diameter Requirements

Augmenting Outerplanar Graphs to Meet Diameter Requirements Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

CMPSCI 611: Advanced Algorithms

CMPSCI 611: Advanced Algorithms CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and

More information

Tree-width and algorithms

Tree-width and algorithms Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding

More information

RED. Name: Math 290 Fall 2016 Sample Exam 3

RED. Name: Math 290 Fall 2016 Sample Exam 3 RED Name: Math 290 Fall 2016 Sample Exam 3 Note that the first 10 questions are true false. Mark A for true, B for false. Questions 11 through 20 are multiple choice. Mark the correct answer on your ule

More information

PROBLEM SET 1 SOLUTIONS 1287 = , 403 = , 78 = 13 6.

PROBLEM SET 1 SOLUTIONS 1287 = , 403 = , 78 = 13 6. Math 7 Spring 06 PROBLEM SET SOLUTIONS. (a) ( pts) Use the Euclidean algorithm to find gcd(87, 0). Solution. The Euclidean algorithm is performed as follows: 87 = 0 + 78, 0 = 78 +, 78 = 6. Hence we have

More information

MATH 225: Foundations of Higher Matheamatics. Dr. Morton. 3.4: Proof by Cases

MATH 225: Foundations of Higher Matheamatics. Dr. Morton. 3.4: Proof by Cases MATH 225: Foundations of Higher Matheamatics Dr. Morton 3.4: Proof y Cases Chapter 3 handout page 12 prolem 21: Prove that for all real values of y, the following inequality holds: 7 2y + 2 2y 5 7. You

More information

Genetic Algorithms applied to Problems of Forbidden Configurations

Genetic Algorithms applied to Problems of Forbidden Configurations Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com

More information

Assignment 5: Solutions

Assignment 5: Solutions Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position

More information

1 Systems of Differential Equations

1 Systems of Differential Equations March, 20 7- Systems of Differential Equations Let U e an open suset of R n, I e an open interval in R and : I R n R n e a function from I R n to R n The equation ẋ = ft, x is called a first order ordinary

More information

CS4311 Design and Analysis of Algorithms. Analysis of Union-By-Rank with Path Compression

CS4311 Design and Analysis of Algorithms. Analysis of Union-By-Rank with Path Compression CS4311 Design and Analysis of Algorithms Tutorial: Analysis of Union-By-Rank with Path Compression 1 About this lecture Introduce an Ackermann-like function which grows even faster than Ackermann Use it

More information

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA)

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) General information Availale time: 2.5 hours (150 minutes).

More information

TWO TO ONE IMAGES AND PFA

TWO TO ONE IMAGES AND PFA TWO TO ONE IMAGES AND PFA ALAN DOW Astract. We prove that all maps on N that are exactly two to one are trivial if PFA is assumed. 1. Introduction A map f : X K is precisely two to one if for each k K,

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

K-center Hardness and Max-Coverage (Greedy)

K-center Hardness and Max-Coverage (Greedy) IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk

More information

α-acyclic Joins Jef Wijsen May 4, 2017

α-acyclic Joins Jef Wijsen May 4, 2017 α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,

More information

arxiv: v1 [math.co] 24 Oct 2017

arxiv: v1 [math.co] 24 Oct 2017 The Erdős-Hajnal conjecture for caterpillars and their complements Anita Lieenau Marcin Pilipczu arxiv:1710.08701v1 [math.co] 24 Oct 2017 Astract The celerated Erdős-Hajnal conjecture states that for every

More information

Zeroing the baseball indicator and the chirality of triples

Zeroing the baseball indicator and the chirality of triples 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.1.7 Zeroing the aseall indicator and the chirality of triples Christopher S. Simons and Marcus Wright Department of Mathematics

More information

Long non-crossing configurations in the plane

Long non-crossing configurations in the plane Long non-crossing configurations in the plane Adrian Dumitrescu Csaa D. Tóth July 4, 00 Astract We revisit some maximization prolems for geometric networks design under the non-crossing constraint, first

More information

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof) JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated

More information

Divide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai

Divide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai Divide-and-Conquer Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, 33.4. CSE 6331 Algorithms Steve Lai Divide and Conquer Given an instance x of a prolem, the method works as follows: divide-and-conquer

More information

SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS

SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS #A42 INTEGERS 14 (2014) SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS Benjamin V. Holt Department of Mathematics, Humoldt State University, Arcata, California vh6@humoldt.edu Received:

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 28 Octoer 2009 Version of attached le: Accepted Version Peer-review status of attached le: Peer-reviewed Citation for pulished item: Cereceda, Luis and van den

More information

EXACT DOUBLE DOMINATION IN GRAPHS

EXACT DOUBLE DOMINATION IN GRAPHS Discussiones Mathematicae Graph Theory 25 (2005 ) 291 302 EXACT DOUBLE DOMINATION IN GRAPHS Mustapha Chellali Department of Mathematics, University of Blida B.P. 270, Blida, Algeria e-mail: mchellali@hotmail.com

More information

Tree-width and planar minors

Tree-width and planar minors Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.

More information

Finite Automata and Regular Languages (part II)

Finite Automata and Regular Languages (part II) Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information

19 Tree Construction using Singular Value Decomposition

19 Tree Construction using Singular Value Decomposition 19 Tree Construction using Singular Value Decomposition Nicholas Eriksson We present a new, statistically consistent algorithm for phylogenetic tree construction that uses the algeraic theory of statistical

More information

Proof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries.

Proof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Proof of Theorem 1 Tao Lei CSAIL,MIT Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Lemma 1 (Reachability) Any two trees y, y are reachable to each other. Specifically,

More information

Answers to the Exercises -- Chapter 1

Answers to the Exercises -- Chapter 1 Answers to the Exercises -- Chapter 1 SECTION 1 1. a Sentence, official notation ~~~P ~~P ~P P Sentence, informal notation ~Q ~R /\ ~Q ~R Q R c d e Not a sentence; it is impossile to construct "~ " Not

More information

IN this paper we study a discrete optimization problem. Constrained Shortest Link-Disjoint Paths Selection: A Network Programming Based Approach

IN this paper we study a discrete optimization problem. Constrained Shortest Link-Disjoint Paths Selection: A Network Programming Based Approach Constrained Shortest Link-Disjoint Paths Selection: A Network Programming Based Approach Ying Xiao, Student Memer, IEEE, Krishnaiyan Thulasiraman, Fellow, IEEE, and Guoliang Xue, Senior Memer, IEEE Astract

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial

More information

ROUNDOFF ERRORS; BACKWARD STABILITY

ROUNDOFF ERRORS; BACKWARD STABILITY SECTION.5 ROUNDOFF ERRORS; BACKWARD STABILITY ROUNDOFF ERROR -- error due to the finite representation (usually in floatingpoint form) of real (and complex) numers in digital computers. FLOATING-POINT

More information

Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Problems

Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Problems Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Prolems Danny Hermelin 1, Judith-Madeleine Kuitza 2, Dvir Shatay 1, Nimrod Talmon 3, and Gerhard Woeginger 4 arxiv:1709.04161v1

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

A Fixed-Parameter Algorithm for Max Edge Domination

A Fixed-Parameter Algorithm for Max Edge Domination A Fixed-Parameter Algorithm for Max Edge Domination Tesshu Hanaka and Hirotaka Ono Department of Economic Engineering, Kyushu University, Fukuoka 812-8581, Japan ono@cscekyushu-uacjp Abstract In a graph,

More information

COL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:

COL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number: Name: Entry number: There are 5 questions for a total of 75 points. 1. (5 points) You are given n items and a sack that can hold at most W units of weight. The weight of the i th item is denoted by w(i)

More information

Scheduling and Optimization Course (MPRI)

Scheduling and Optimization Course (MPRI) MPRI Scheduling and optimization: lecture p. /6 Scheduling and Optimization Course (MPRI) Leo Liberti LIX, École Polytechnique, France MPRI Scheduling and optimization: lecture p. /6 Teachers Christoph

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs

Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Krishnendu Chatterjee Rasmus Ibsen-Jensen Andreas Pavlogiannis IST Austria Abstract. We consider graphs with n nodes together

More information

Exploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two

Exploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two Delia Ierugan Exploring Lucas s Theorem Astract: Lucas s Theorem is used to express the remainder of the inomial coefficient of any two integers m and n when divided y any prime integer p. The remainder

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

Randomized Algorithms III Min Cut

Randomized Algorithms III Min Cut Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.

More information

1 Matroid intersection

1 Matroid intersection CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and

More information

Math 3450 Homework Solutions

Math 3450 Homework Solutions Math 3450 Homework Solutions I have decided to write up all the solutions to prolems NOT assigned from the textook first. There are three more sets to write up and I am doing those now. Once I get the

More information

Realization Plans for Extensive Form Games without Perfect Recall

Realization Plans for Extensive Form Games without Perfect Recall Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in

More information

Appendix lecture 9: Extra terms.

Appendix lecture 9: Extra terms. Appendi lecture 9: Etra terms The Hyperolic method has een used to prove that d n = log + 2γ + O /2 n This can e used within the Convolution Method to prove Theorem There eists a constant C such that n

More information

CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1

CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1 CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines Problem 1 (a) Consider the situation in the figure, every edge has the same weight and V = n = 2k + 2. Easy to check, every simple

More information

Ring Sums, Bridges and Fundamental Sets

Ring Sums, Bridges and Fundamental Sets 1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G

More information

A matroid associated with a phylogenetic tree

A matroid associated with a phylogenetic tree Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:, 014, 41 56 A matroid associated with a phylogenetic tree Andreas W.M. Dress 1 Katharina T. Huer Mike Steel 3 1 CAS-MPG Partner Institute

More information

Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots

Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Kepler s Law Level Upper secondary Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Description and Rationale Many traditional mathematics prolems

More information

ERASMUS UNIVERSITY ROTTERDAM

ERASMUS UNIVERSITY ROTTERDAM Information concerning Colloquium doctum Mathematics level 2 for International Business Administration (IBA) and International Bachelor Economics & Business Economics (IBEB) General information ERASMUS

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Lecture notes for the course Games on Graphs B. Srivathsan Chennai Mathematical Institute, India 1 Markov Chains We will define Markov chains in a manner that will be useful to

More information

2-bondage in graphs. Marcin Krzywkowski*

2-bondage in graphs. Marcin Krzywkowski* International Journal of Computer Mathematics Vol. 00, No. 00, January 2012, 1 8 2-bondage in graphs Marcin Krzywkowski* e-mail: marcin.krzywkowski@gmail.com Department of Algorithms and System Modelling

More information

Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao

Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao presented by Fjóla Rún Björnsdóttir CSE 254 - Metric Embeddings Winter 2007 CSE 254 - Metric Embeddings - Winter

More information

Graphical models and causality: Directed acyclic graphs (DAGs) and conditional (in)dependence

Graphical models and causality: Directed acyclic graphs (DAGs) and conditional (in)dependence Graphical models and causality: Directed acyclic graphs (DAGs) and conditional (in)dependence General overview Introduction Directed acyclic graphs (DAGs) and conditional independence DAGs and causal effects

More information

Tree-chromatic number

Tree-chromatic number Tree-chromatic number Paul Seymour 1 Princeton University, Princeton, NJ 08544 November 2, 2014; revised June 25, 2015 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-1265563. Abstract Let

More information

Finding Complex Solutions of Quadratic Equations

Finding Complex Solutions of Quadratic Equations y - y - - - x x Locker LESSON.3 Finding Complex Solutions of Quadratic Equations Texas Math Standards The student is expected to: A..F Solve quadratic and square root equations. Mathematical Processes

More information

Math 581 Problem Set 9

Math 581 Problem Set 9 Math 581 Prolem Set 9 1. Let m and n e relatively prime positive integers. (a) Prove that Z/mnZ = Z/mZ Z/nZ as RINGS. (Hint: First Isomorphism Theorem) Proof: Define ϕz Z/mZ Z/nZ y ϕ(x) = ([x] m, [x] n

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

The Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line

The Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line Chapter 27: Inferences for Regression And so, there is one more thing which might vary one more thing aout which we might want to make some inference: the slope of the least squares regression line. The

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set

More information

A Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion

A Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion A Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion Eduard Eiben a, Robert Ganian a, O-joung Kwon b a Algorithms and Complexity Group, TU Wien, Vienna, Austria b Logic

More information

Identifying an m-ary Partition Identity through an m-ary Tree

Identifying an m-ary Partition Identity through an m-ary Tree Bridgewater State University Virtual Commons - Bridgewater State University Mathematics Faculty Publications Mathematics Department 06 Identifying an m-ary Partition Identity through an m-ary Tree Timothy

More information

Lecture 2: Network Flows 1

Lecture 2: Network Flows 1 Comp 260: Advanced Algorithms Tufts University, Spring 2011 Lecture by: Prof. Cowen Scribe: Saeed Majidi Lecture 2: Network Flows 1 A wide variety of problems, including the matching problems discussed

More information

Parameterized Algorithms for the H-Packing with t-overlap Problem

Parameterized Algorithms for the H-Packing with t-overlap Problem Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 515 538 (2014) DOI: 10.7155/jgaa.00335 Parameterized Algorithms for the H-Packing with t-overlap Problem Alejandro López-Ortiz

More information

The min cost flow problem Course notes for Search and Optimization Spring 2004

The min cost flow problem Course notes for Search and Optimization Spring 2004 The min cost flow problem Course notes for Search and Optimization Spring 2004 Peter Bro Miltersen February 20, 2004 Version 1.3 1 Definition of the min cost flow problem We shall consider a generalization

More information

Solving Systems of Linear Equations Symbolically

Solving Systems of Linear Equations Symbolically " Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with

More information

SMT Power Round Solutions : Poles and Polars

SMT Power Round Solutions : Poles and Polars SMT Power Round Solutions : Poles and Polars February 18, 011 1 Definition and Basic Properties 1 Note that the unit circles are not necessary in the solutions. They just make the graphs look nicer. (1).0

More information

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2 Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,

More information

ON THE COMPARISON OF BOUNDARY AND INTERIOR SUPPORT POINTS OF A RESPONSE SURFACE UNDER OPTIMALITY CRITERIA. Cross River State, Nigeria

ON THE COMPARISON OF BOUNDARY AND INTERIOR SUPPORT POINTS OF A RESPONSE SURFACE UNDER OPTIMALITY CRITERIA. Cross River State, Nigeria ON THE COMPARISON OF BOUNDARY AND INTERIOR SUPPORT POINTS OF A RESPONSE SURFACE UNDER OPTIMALITY CRITERIA Thomas Adidaume Uge and Stephen Seastian Akpan, Department Of Mathematics/Statistics And Computer

More information

2 COLORING. Given G, nd the minimum number of colors to color G. Given graph G and positive integer k, is X(G) k?

2 COLORING. Given G, nd the minimum number of colors to color G. Given graph G and positive integer k, is X(G) k? 2 COLORING OPTIMIZATION PROBLEM Given G, nd the minimum number of colors to color G. (X(G)?) DECISION PROBLEM Given graph G and positive integer k, is X(G) k? EQUIVALENCE OF OPTIMAIZTION AND DE- CISION

More information

Review for Exam 2/Solutions

Review for Exam 2/Solutions MTH 310-3 Astract Algera I and Numer Theory S18 Review for Eam 2/Solutions 1. Let n e an integer. (a) For 0 n 10, verify that n 2 n + 11 is a prime. () If n 0, 1 and n 0, 1 (mod 11), show that n 2 n +

More information

arxiv: v1 [cs.ds] 1 Nov 2018

arxiv: v1 [cs.ds] 1 Nov 2018 An O(nlogn) time Algorithm for computing the Path-length Distance between Trees arxiv:1811.00619v1 [cs.ds] 1 Nov 2018 David Bryant Celine Scornavacca November 5, 2018 Abstract Tree comparison metrics have

More information

k-blocks: a connectivity invariant for graphs

k-blocks: a connectivity invariant for graphs 1 k-blocks: a connectivity invariant for graphs J. Carmesin R. Diestel M. Hamann F. Hundertmark June 17, 2014 Abstract A k-block in a graph G is a maximal set of at least k vertices no two of which can

More information

Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman

Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman October 17, 2006 TALK SLOWLY AND WRITE NEATLY!! 1 0.1 Factorization 0.1.1 Factorization of Integers and Polynomials Now we are going

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Theory of Computation

Theory of Computation Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what

More information

HW Graph Theory SOLUTIONS (hbovik) - Q

HW Graph Theory SOLUTIONS (hbovik) - Q 1, Diestel 3.5: Deduce the k = 2 case of Menger s theorem (3.3.1) from Proposition 3.1.1. Let G be 2-connected, and let A and B be 2-sets. We handle some special cases (thus later in the induction if these

More information

The Incomplete Perfect Phylogeny Haplotype Problem

The Incomplete Perfect Phylogeny Haplotype Problem The Incomplete Perfect Phylogeny Haplotype Prolem Gad Kimmel 1 and Ron Shamir 1 School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel. Email: kgad@tau.ac.il, rshamir@tau.ac.il. Astract.

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)

More information

Precoloring extension on chordal graphs

Precoloring extension on chordal graphs Precoloring extension on chordal graphs Dániel Marx 17th August 2004 Abstract In the precoloring extension problem (PrExt) we are given a graph with some of the vertices having a preassigned color and

More information

Lecture 1 & 2: Integer and Modular Arithmetic

Lecture 1 & 2: Integer and Modular Arithmetic CS681: Computational Numer Theory and Algera (Fall 009) Lecture 1 & : Integer and Modular Arithmetic July 30, 009 Lecturer: Manindra Agrawal Scrie: Purushottam Kar 1 Integer Arithmetic Efficient recipes

More information

15. Polynomial rings Definition-Lemma Let R be a ring and let x be an indeterminate.

15. Polynomial rings Definition-Lemma Let R be a ring and let x be an indeterminate. 15. Polynomial rings Definition-Lemma 15.1. Let R be a ring and let x be an indeterminate. The polynomial ring R[x] is defined to be the set of all formal sums a n x n + a n 1 x n +... a 1 x + a 0 = a

More information

Depth versus Breadth in Convolutional Polar Codes

Depth versus Breadth in Convolutional Polar Codes Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK

More information

Lecture 4 October 18th

Lecture 4 October 18th Directed and undirected graphical models Fall 2017 Lecture 4 October 18th Lecturer: Guillaume Obozinski Scribe: In this lecture, we will assume that all random variables are discrete, to keep notations

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H

More information

Modifying Shor s algorithm to compute short discrete logarithms

Modifying Shor s algorithm to compute short discrete logarithms Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify

More information

Polynomials Characterizing Hyper b-ary Representations

Polynomials Characterizing Hyper b-ary Representations 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.4.3 Polynomials Characterizing Hyper -ary Representations Karl Dilcher 1 Department of Mathematics and Statistics Dalhousie University

More information

Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles

Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles Beyond Loose LP-relaxations: Optimizing MRFs y Repairing Cycles Nikos Komodakis 1 and Nikos Paragios 2 1 University of Crete, komod@csd.uoc.gr 2 Ecole Centrale de Paris, nikos.paragios@ecp.fr Astract.

More information