Lecture 6 January 15, 2014
|
|
- Andrew Knight
- 5 years ago
- Views:
Transcription
1 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for given graph G if (T, f) is simple tree decomposition then V (T ) V (G). In this lecture, we will prove the aove result and introduce the concept of nice tree decomposition and how to convert simple tree decomposition to nice tree decomposition without increasing its tree width. We conclude this module with application of dynamic programming, using tree decomposition, to find the independent set of graph. 2 Simple Tree Decomposition Definition 1. For given graph G and its tree decomposition (T, f); T is said to e simple tree decomposition if for any two distinct nodes t 1 and t 2 in V (T ), neither f(t 1 ) f(t 2 ) nor f(t 2 ) f(t 1 ). Lemma 2. For given graph G and its simple tree decomposition (T, f), V (T ) V (G). Proof. Pick an aritrary node r V (T ) and consider T as a rooted tree with r as the root. By the connectivity property of tree decomposition, for every vertex v V (G) the set { v f()} induces a connected sutree of T. Thus there is a unique node v V (T ) which is the node of T closest to r out of all nodes in { v f()}. We say that v peaks at v. Each vertex v V (G) peaks at exactly one node v in V (T ). We argue that for every node V (T ) there is a vertex v V (G) that peaks at. Suppose not. If is the root r this implies that f() = φ, contradicting that (T, f) is simple as f() will e contained in all f( 1 ) where 1 V (G) and 1. If is not the root r then has a parent which is closer to the root r. Since no vertex v V (G) peaks at it follows that f() f( ) contradicting that (T, f) is simple. We now have that every node of V (T ) has some vertex G that peaks at it, and every vertex v of G peaks in exactly one node of T. Thus V (T ) V (G). 1
2 3 Nice Tree Decomposition Definition 3. A tree decomposition (T, f) of G is called nice if it has the following properties P1 T is root at node r P2 f(r) = 0 and for every leaf l, f(l) = φ P3 every node in in T has at most 2 children P4 If has 2 children, say, 1 and 2 then f() = f( 1 ) = f( 2 ). P5 If has only one child, say, 1 then one of the following two conditions is true. (i) f( 1 ) f() and f() = f( 1 ) + 1 (ii) f() f( 1 ) and f( 1 ) = f() + 1 Consider the graph given in Fig 1 and its tree decomposition in Fig 2. a c d e f g Figure 1: Graph G a c cd de df dg a ac cd cde d dfg g Figure 2: Nice Tree Decomposition of graph G For node, if the first case of property P5 holds, then it is known as introduce node. If later case holds, we call it forget node. Lemma 4. If graph G has tree-decomposition of tree-width k then it also has a nice tree decomposition of the same tree width. Furthermore, given any tree decomposition, we can construct nice tree decomposition in polynomial time. 2
3 Proof. We start with considering T as an unrooted tree and setting (T, f ) = (T, f). We then proceed to modify (T, f ) in order for it to have the desired properties. Throughout the process we will maintain that (T, f ) is a tree decomposition of G of width k. First we add to every leaf l of T another leaf l and set f (l ) = φ. Then we select an aritrary leaf of T, call it r and root the tree T at r. At this point (T, f ) is a tree decomposition of G satisfying properties P1 and P2. As long as T has a node V (T ) with more than two children, we proceed as follows. Let 1, 2... p e the children of. We make a new node and add it to T in the following manner. The parent of is set to, and for each child i of with i 2 we make the parent of i instead. Finally we set f ( ) = f (). This operation maintains that (T, f ) is a tree decomposition of G. Furthermore now only have two children namely 1 and. The prolem has shifted from to ut has degree one less than what had efore this step. Hence each step adds one node to the tree T and for one vertex with more than two children, decreases the numer of children y 1. We will continue this process till all the nodes in T has at most two children. At this point (T, f ) is a tree decomposition of G satisfying properties P1,P2 and P3. Following is the simple illustration of the process when has three children with more than two children 2 3 Introducing so that now has two children We now run a new process, aimed to make (T, f ) satisfy property P4. As long as there exists a vertex V (T ) with 1, 2 its children and f () f ( 1 ) f ( 2 ), we proceed as follows. We add two new nodes 1 and 2 to T. Make the parent of 1, 2 and change the parent of 1, 2 to e 1, 2 respectively. We set f ( 1 ) = f ( 2 ) = f (). At the completion of step the numer of vertices in V (T ) which contradicts to property P4 is reduced y one. Hence, after finite iterations (T, f ) is a tree decomposition of G satisfying properties P1,P2,P3 and P4. Following diagram illustrate this step f () ( 1 ) ( 2 ) 1 2 f () = f ( 1 ) = f ( 2 ) Finally we run a process aimed at making (T, f ) satisfy property P5. Consider there exist vertex in V (T ) with child 1 such that f() f( ) and f() + k = f( ) for some constant integer k > 1. We will introduce new vertex as child of and make parent of 1. Let u f( 1 )\f(). Assign f ( ) = f () u. After this step, satisfies the property P5 ut violate it. But, now 3
4 the difference etween f( ) and its child f( 1 ) is k 1. Hence after k iterations, all the newly introduced vertices in the path to 1 will satisfy the property P5. For vertex c in V (T ) with child c 1 such that f(c) f(c 1 ) and f(c) = f(c 1 ) + k. We introduce new vertex c in similar way ut we assign f (c ) = f (c)\{u} where u f (c)\f(c 1 ). The total numer of steps in all of the processes descried aove is O(kn) since each step adds a new node to T. With appropriate data structures, each step of each process can e completed in time O(k O(1) ) and hence we can construct nice tree decomposition in polynomial time. 4 Dynamic Programming Many algorithms on trees are ased on dynamic programming and are polynomial time solvale. We defined tree width to measure how accurately a given graph can e approximated to tree. Lower the tree width of graph, more closely it can e associated with tree. Thus it is natural to think that some of the dynamic programming algorithms that work for trees could e lifted to also work on graphs of ounded treewidth. This turns out to e the case with a few notale exceptions most prolems that are polynomial time solvale on trees are also polynomial time solvale on graphs of ounded treewidth. We will use the independent set prolem as an example to illustrate this concept. Before jumping into the dynamic programming, we will first define some useful concepts. T is tree rooted at and defined as T = {w w is an descendant of in T } {}. Definition 5. For given graph G and its tree decomposition (T, f), for V (T ) define set V = w T f(w) V (G) is divided (note that it is not a partition) into V for all V (T ). Define V 1, V 2 V (G) as V 1 = V and V 2 = x V (T )\T f(x). Since G is t- decomposile, removing t+1 points will disconnect the graph and hence V 1 V 2 t + 1. Definition 6. For given graph G and V V (G), oundary of V is defined as Z V V, (v, w) E(G) and w V (G)\V } = {v v Since graph is t decomposile, Z V i t + 1 for any V i V (G). Let us consider the following example. We define function β : V (G) 2 V (T )\φ and function f : V (T ) 2 V (G) as written in the tale. 4
5 v β(v) 1 {e} 2 {c, e} 3 {a} 4 {a, } 5 {, d, f} 6 {, d, f, g} 7 {h} 8 {f, h, i, j} 9 {d, g, k, l} 10 {i} 11 {j} 12 {k} 13 {l} x f(x) a {4, 3} {4, 5, 6} c {4, 2} d {5, 6, 9} e {2, 1} f {5, 6, 8} g {6, 9} h {7, 8} i {8, 10} j {8, 11} k {9, 12} l {9, 13} a c f d g e h l i k In the aove example, following are some of the susets and their oundaries V h = {7, 8, 10, 11}; Z Vh = {8} V f = {5, 6, 7, 8, 9, 10, 11}; Z Vf = {5, 6} V d = {5, 6, 7, 8, 10, 11, 9, 12, 13}; Z Vd = {5, 6} The idea is to store sufficient information in the oundary of the suset which will help us to determine Independent set of entire graph y looking only at oundary. For V V (G) Let us define the following collection of sets F = {A V i A is independent set of G and V i V } j 5
6 Definition 7. For given graph G its independent set A we define A 1 = A V and A 2 = A\A 1. We say F is good family if there exist B F such that 1. B Z V = A 1 Z V 2. B A 2 is an independent set. 3. B A 2 > A. But the size of family can e as large as 2 V (G). We can reduce the upper ound on the size of set y defining following collection of sets. ˆF V (Z ) = {X X F V and X Z = Z } where Z Z. This definition allow us select the etter candidate among the V i and leave out the candidate which forms the su-optimal solution. We can reduce our focus to the aove set. Since the size of oundary is ounded we now have 2 t+1 possile susets. Now instead of working on graph G, we will work on its tree decomposition. As proved earlier, every graph has nice tree decomposition. We only need to see procedure at different type of nodes of nice tree viz leafs, nodes which has two children and introduce node or forget node. We now descrie the procedure and prove that the i th family computed is good, y induction on i. First we compute the family F for every leaf, and sets F = {φ}. Since (T, f) is a nice tree decomposition of G it follows that f() = φ and therefore V = φ. Thus, for any optimal solution OP T of G, there is a set B F, namely B = φ, such that B f() = OP T f() = φ and (OP T \V ) B = OP T is an optimal solution to G. Assume now that families of the i first nodes processed y the procedure are all good, and consider the i + 1 st node V (T ) to e processed. If is a leaf we have already shown that F is good, so assume now that is not a leaf. All the children of have een processed. The node has one or two children in T, since (T, f) is a nice tree decomposition. If has one child 1 then F 1 is good y the induction hypothesis. Similarly if has two children 1 and 2 then F 1 and F 2 are oth good y the induction hypothesis. It suffices to show that, in either case, the family F is good. If has two children 1 and 2 then F = {X 1 X 2 X 1 F 1, X 2 F 2 and X 1 f() = X 2 f()}. We wish to prove that F is good. To that end, consider any optimal solution OP T V (G). Since F 1 is good there is a set X 1 F 1 such that OP T 1 = (OP T \V 1 ) X 1 is an optimal solution as well, and X 1 f() = OP T f(). Here we used that (T, f) is a nice tree decomposition, and that therefore f( 1 ) = f( 2 ) = f(). Similarly, since F 2 is good there is a set X 2 F 2 such that OP T 2 = (OP T 1 \V 1 ) X 2 is an optimal solution, and X 2 f() = OP T 1 f(). Consider the set X = X 1 X 2. The definition of F implies that X F, and OP T 2 = (OP T \V ()) X is an optimal solution as well. Finally X f() = OP T f(). We conclude that in this case F is good. If has one child 1 then F = {X 1 S X 1 F 1 and S f()\f( 1 )} 6
7 We wish to prove that F is good. To that end, consider any optimal solution OP T V (G). Since F 1 is good there is a set X 1 F 1 such that OP T 1 = (OP T \V 1 ) X 1 is an optimal solution as well, and X 1 f( 1 ) = OP T f( 1 ). Let S = OP T (f()\f( 1 )), and oserve that S satisfies S = OP T 1 (f()\f( 1 )) as well. Let X = X 1 S, we have that X F 1, OP T 1 = (OP T \V ) X is an optimal solution, and OP T f() = S (X 1 f(1) f()) = X f(). Thus F is good family, concluding the proof of correctness of the procedure. 7
THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY
THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY SHINYA FUJITA AND HENRY LIU Astract The alanced decomposition numer f(g) of a graph G was introduced y Fujita and Nakamigawa [Discr Appl Math,
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More information1 Caveats of Parallel Algorithms
CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas
More informationChaos and Dynamical Systems
Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,
More informationAugmenting Outerplanar Graphs to Meet Diameter Requirements
Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information
More informationdirected weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time
Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationCMPSCI 611: Advanced Algorithms
CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and
More informationTree-width and algorithms
Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding
More informationRED. Name: Math 290 Fall 2016 Sample Exam 3
RED Name: Math 290 Fall 2016 Sample Exam 3 Note that the first 10 questions are true false. Mark A for true, B for false. Questions 11 through 20 are multiple choice. Mark the correct answer on your ule
More informationPROBLEM SET 1 SOLUTIONS 1287 = , 403 = , 78 = 13 6.
Math 7 Spring 06 PROBLEM SET SOLUTIONS. (a) ( pts) Use the Euclidean algorithm to find gcd(87, 0). Solution. The Euclidean algorithm is performed as follows: 87 = 0 + 78, 0 = 78 +, 78 = 6. Hence we have
More informationMATH 225: Foundations of Higher Matheamatics. Dr. Morton. 3.4: Proof by Cases
MATH 225: Foundations of Higher Matheamatics Dr. Morton 3.4: Proof y Cases Chapter 3 handout page 12 prolem 21: Prove that for all real values of y, the following inequality holds: 7 2y + 2 2y 5 7. You
More informationGenetic Algorithms applied to Problems of Forbidden Configurations
Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com
More informationAssignment 5: Solutions
Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position
More information1 Systems of Differential Equations
March, 20 7- Systems of Differential Equations Let U e an open suset of R n, I e an open interval in R and : I R n R n e a function from I R n to R n The equation ẋ = ft, x is called a first order ordinary
More informationCS4311 Design and Analysis of Algorithms. Analysis of Union-By-Rank with Path Compression
CS4311 Design and Analysis of Algorithms Tutorial: Analysis of Union-By-Rank with Path Compression 1 About this lecture Introduce an Ackermann-like function which grows even faster than Ackermann Use it
More informationERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA)
ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) General information Availale time: 2.5 hours (150 minutes).
More informationTWO TO ONE IMAGES AND PFA
TWO TO ONE IMAGES AND PFA ALAN DOW Astract. We prove that all maps on N that are exactly two to one are trivial if PFA is assumed. 1. Introduction A map f : X K is precisely two to one if for each k K,
More informationUpper Bounds for Stern s Diatomic Sequence and Related Sequences
Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:
More informationK-center Hardness and Max-Coverage (Greedy)
IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk
More informationα-acyclic Joins Jef Wijsen May 4, 2017
α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,
More informationarxiv: v1 [math.co] 24 Oct 2017
The Erdős-Hajnal conjecture for caterpillars and their complements Anita Lieenau Marcin Pilipczu arxiv:1710.08701v1 [math.co] 24 Oct 2017 Astract The celerated Erdős-Hajnal conjecture states that for every
More informationZeroing the baseball indicator and the chirality of triples
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.1.7 Zeroing the aseall indicator and the chirality of triples Christopher S. Simons and Marcus Wright Department of Mathematics
More informationLong non-crossing configurations in the plane
Long non-crossing configurations in the plane Adrian Dumitrescu Csaa D. Tóth July 4, 00 Astract We revisit some maximization prolems for geometric networks design under the non-crossing constraint, first
More informationSVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)
JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated
More informationDivide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai
Divide-and-Conquer Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, 33.4. CSE 6331 Algorithms Steve Lai Divide and Conquer Given an instance x of a prolem, the method works as follows: divide-and-conquer
More informationSOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS
#A42 INTEGERS 14 (2014) SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS Benjamin V. Holt Department of Mathematics, Humoldt State University, Arcata, California vh6@humoldt.edu Received:
More informationOn improving matchings in trees, via bounded-length augmentations 1
On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical
More informationDurham Research Online
Durham Research Online Deposited in DRO: 28 Octoer 2009 Version of attached le: Accepted Version Peer-review status of attached le: Peer-reviewed Citation for pulished item: Cereceda, Luis and van den
More informationEXACT DOUBLE DOMINATION IN GRAPHS
Discussiones Mathematicae Graph Theory 25 (2005 ) 291 302 EXACT DOUBLE DOMINATION IN GRAPHS Mustapha Chellali Department of Mathematics, University of Blida B.P. 270, Blida, Algeria e-mail: mchellali@hotmail.com
More informationTree-width and planar minors
Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.
More informationFinite Automata and Regular Languages (part II)
Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More information19 Tree Construction using Singular Value Decomposition
19 Tree Construction using Singular Value Decomposition Nicholas Eriksson We present a new, statistically consistent algorithm for phylogenetic tree construction that uses the algeraic theory of statistical
More informationProof of Theorem 1. Tao Lei CSAIL,MIT. Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries.
Proof of Theorem 1 Tao Lei CSAIL,MIT Here we give the proofs of Theorem 1 and other necessary lemmas or corollaries. Lemma 1 (Reachability) Any two trees y, y are reachable to each other. Specifically,
More informationAnswers to the Exercises -- Chapter 1
Answers to the Exercises -- Chapter 1 SECTION 1 1. a Sentence, official notation ~~~P ~~P ~P P Sentence, informal notation ~Q ~R /\ ~Q ~R Q R c d e Not a sentence; it is impossile to construct "~ " Not
More informationIN this paper we study a discrete optimization problem. Constrained Shortest Link-Disjoint Paths Selection: A Network Programming Based Approach
Constrained Shortest Link-Disjoint Paths Selection: A Network Programming Based Approach Ying Xiao, Student Memer, IEEE, Krishnaiyan Thulasiraman, Fellow, IEEE, and Guoliang Xue, Senior Memer, IEEE Astract
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationLuis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model
Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes
More informationAn Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute
More informationPolynomial Degree and Finite Differences
CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial
More informationROUNDOFF ERRORS; BACKWARD STABILITY
SECTION.5 ROUNDOFF ERRORS; BACKWARD STABILITY ROUNDOFF ERROR -- error due to the finite representation (usually in floatingpoint form) of real (and complex) numers in digital computers. FLOATING-POINT
More informationScheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Problems
Scheduling Two Agents on a Single Machine: A Parameterized Analysis of NP-hard Prolems Danny Hermelin 1, Judith-Madeleine Kuitza 2, Dvir Shatay 1, Nimrod Talmon 3, and Gerhard Woeginger 4 arxiv:1709.04161v1
More informationTree Decompositions and Tree-Width
Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition
More informationA Fixed-Parameter Algorithm for Max Edge Domination
A Fixed-Parameter Algorithm for Max Edge Domination Tesshu Hanaka and Hirotaka Ono Department of Economic Engineering, Kyushu University, Fukuoka 812-8581, Japan ono@cscekyushu-uacjp Abstract In a graph,
More informationCOL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:
Name: Entry number: There are 5 questions for a total of 75 points. 1. (5 points) You are given n items and a sack that can hold at most W units of weight. The weight of the i th item is denoted by w(i)
More informationScheduling and Optimization Course (MPRI)
MPRI Scheduling and optimization: lecture p. /6 Scheduling and Optimization Course (MPRI) Leo Liberti LIX, École Polytechnique, France MPRI Scheduling and optimization: lecture p. /6 Teachers Christoph
More informationCMPUT 675: Approximation Algorithms Fall 2014
CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph
More informationOptimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs
Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Krishnendu Chatterjee Rasmus Ibsen-Jensen Andreas Pavlogiannis IST Austria Abstract. We consider graphs with n nodes together
More informationExploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two
Delia Ierugan Exploring Lucas s Theorem Astract: Lucas s Theorem is used to express the remainder of the inomial coefficient of any two integers m and n when divided y any prime integer p. The remainder
More informationPacking and Covering Dense Graphs
Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere
More informationRandomized Algorithms III Min Cut
Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.
More information1 Matroid intersection
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and
More informationMath 3450 Homework Solutions
Math 3450 Homework Solutions I have decided to write up all the solutions to prolems NOT assigned from the textook first. There are three more sets to write up and I am doing those now. Once I get the
More informationRealization Plans for Extensive Form Games without Perfect Recall
Realization Plans for Extensive Form Games without Perfect Recall Richard E. Stearns Department of Computer Science University at Albany - SUNY Albany, NY 12222 April 13, 2015 Abstract Given a game in
More informationAppendix lecture 9: Extra terms.
Appendi lecture 9: Etra terms The Hyperolic method has een used to prove that d n = log + 2γ + O /2 n This can e used within the Convolution Method to prove Theorem There eists a constant C such that n
More informationCSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1
CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines Problem 1 (a) Consider the situation in the figure, every edge has the same weight and V = n = 2k + 2. Easy to check, every simple
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationA matroid associated with a phylogenetic tree
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:, 014, 41 56 A matroid associated with a phylogenetic tree Andreas W.M. Dress 1 Katharina T. Huer Mike Steel 3 1 CAS-MPG Partner Institute
More informationMathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots
Kepler s Law Level Upper secondary Mathematical Ideas Modelling data, power variation, straightening data with logarithms, residual plots Description and Rationale Many traditional mathematics prolems
More informationERASMUS UNIVERSITY ROTTERDAM
Information concerning Colloquium doctum Mathematics level 2 for International Business Administration (IBA) and International Bachelor Economics & Business Economics (IBEB) General information ERASMUS
More informationMarkov Decision Processes
Markov Decision Processes Lecture notes for the course Games on Graphs B. Srivathsan Chennai Mathematical Institute, India 1 Markov Chains We will define Markov chains in a manner that will be useful to
More information2-bondage in graphs. Marcin Krzywkowski*
International Journal of Computer Mathematics Vol. 00, No. 00, January 2012, 1 8 2-bondage in graphs Marcin Krzywkowski* e-mail: marcin.krzywkowski@gmail.com Department of Algorithms and System Modelling
More informationSmall distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao
Small distortion and volume preserving embedding for Planar and Euclidian metrics Satish Rao presented by Fjóla Rún Björnsdóttir CSE 254 - Metric Embeddings Winter 2007 CSE 254 - Metric Embeddings - Winter
More informationGraphical models and causality: Directed acyclic graphs (DAGs) and conditional (in)dependence
Graphical models and causality: Directed acyclic graphs (DAGs) and conditional (in)dependence General overview Introduction Directed acyclic graphs (DAGs) and conditional independence DAGs and causal effects
More informationTree-chromatic number
Tree-chromatic number Paul Seymour 1 Princeton University, Princeton, NJ 08544 November 2, 2014; revised June 25, 2015 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-1265563. Abstract Let
More informationFinding Complex Solutions of Quadratic Equations
y - y - - - x x Locker LESSON.3 Finding Complex Solutions of Quadratic Equations Texas Math Standards The student is expected to: A..F Solve quadratic and square root equations. Mathematical Processes
More informationMath 581 Problem Set 9
Math 581 Prolem Set 9 1. Let m and n e relatively prime positive integers. (a) Prove that Z/mnZ = Z/mZ Z/nZ as RINGS. (Hint: First Isomorphism Theorem) Proof: Define ϕz Z/mZ Z/nZ y ϕ(x) = ([x] m, [x] n
More informationSUFFIX TREE. SYNONYMS Compact suffix trie
SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix
More informationThe Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line
Chapter 27: Inferences for Regression And so, there is one more thing which might vary one more thing aout which we might want to make some inference: the slope of the least squares regression line. The
More informationStructuring Unreliable Radio Networks
Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set
More informationA Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion
A Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion Eduard Eiben a, Robert Ganian a, O-joung Kwon b a Algorithms and Complexity Group, TU Wien, Vienna, Austria b Logic
More informationIdentifying an m-ary Partition Identity through an m-ary Tree
Bridgewater State University Virtual Commons - Bridgewater State University Mathematics Faculty Publications Mathematics Department 06 Identifying an m-ary Partition Identity through an m-ary Tree Timothy
More informationLecture 2: Network Flows 1
Comp 260: Advanced Algorithms Tufts University, Spring 2011 Lecture by: Prof. Cowen Scribe: Saeed Majidi Lecture 2: Network Flows 1 A wide variety of problems, including the matching problems discussed
More informationParameterized Algorithms for the H-Packing with t-overlap Problem
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 515 538 (2014) DOI: 10.7155/jgaa.00335 Parameterized Algorithms for the H-Packing with t-overlap Problem Alejandro López-Ortiz
More informationThe min cost flow problem Course notes for Search and Optimization Spring 2004
The min cost flow problem Course notes for Search and Optimization Spring 2004 Peter Bro Miltersen February 20, 2004 Version 1.3 1 Definition of the min cost flow problem We shall consider a generalization
More informationSolving Systems of Linear Equations Symbolically
" Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with
More informationSMT Power Round Solutions : Poles and Polars
SMT Power Round Solutions : Poles and Polars February 18, 011 1 Definition and Basic Properties 1 Note that the unit circles are not necessary in the solutions. They just make the graphs look nicer. (1).0
More informationExpansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2
Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,
More informationON THE COMPARISON OF BOUNDARY AND INTERIOR SUPPORT POINTS OF A RESPONSE SURFACE UNDER OPTIMALITY CRITERIA. Cross River State, Nigeria
ON THE COMPARISON OF BOUNDARY AND INTERIOR SUPPORT POINTS OF A RESPONSE SURFACE UNDER OPTIMALITY CRITERIA Thomas Adidaume Uge and Stephen Seastian Akpan, Department Of Mathematics/Statistics And Computer
More information2 COLORING. Given G, nd the minimum number of colors to color G. Given graph G and positive integer k, is X(G) k?
2 COLORING OPTIMIZATION PROBLEM Given G, nd the minimum number of colors to color G. (X(G)?) DECISION PROBLEM Given graph G and positive integer k, is X(G) k? EQUIVALENCE OF OPTIMAIZTION AND DE- CISION
More informationReview for Exam 2/Solutions
MTH 310-3 Astract Algera I and Numer Theory S18 Review for Eam 2/Solutions 1. Let n e an integer. (a) For 0 n 10, verify that n 2 n + 11 is a prime. () If n 0, 1 and n 0, 1 (mod 11), show that n 2 n +
More informationarxiv: v1 [cs.ds] 1 Nov 2018
An O(nlogn) time Algorithm for computing the Path-length Distance between Trees arxiv:1811.00619v1 [cs.ds] 1 Nov 2018 David Bryant Celine Scornavacca November 5, 2018 Abstract Tree comparison metrics have
More informationk-blocks: a connectivity invariant for graphs
1 k-blocks: a connectivity invariant for graphs J. Carmesin R. Diestel M. Hamann F. Hundertmark June 17, 2014 Abstract A k-block in a graph G is a maximal set of at least k vertices no two of which can
More informationLecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman
Lecture Notes Math 371: Algebra (Fall 2006) by Nathanael Leedom Ackerman October 17, 2006 TALK SLOWLY AND WRITE NEATLY!! 1 0.1 Factorization 0.1.1 Factorization of Integers and Polynomials Now we are going
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationTheory of Computation
Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what
More informationHW Graph Theory SOLUTIONS (hbovik) - Q
1, Diestel 3.5: Deduce the k = 2 case of Menger s theorem (3.3.1) from Proposition 3.1.1. Let G be 2-connected, and let A and B be 2-sets. We handle some special cases (thus later in the induction if these
More informationThe Incomplete Perfect Phylogeny Haplotype Problem
The Incomplete Perfect Phylogeny Haplotype Prolem Gad Kimmel 1 and Ron Shamir 1 School of Computer Science, Tel-Aviv University, Tel-Aviv 69978, Israel. Email: kgad@tau.ac.il, rshamir@tau.ac.il. Astract.
More informationObservation 4.1 G has a proper separation of order 0 if and only if G is disconnected.
4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)
More informationPrecoloring extension on chordal graphs
Precoloring extension on chordal graphs Dániel Marx 17th August 2004 Abstract In the precoloring extension problem (PrExt) we are given a graph with some of the vertices having a preassigned color and
More informationLecture 1 & 2: Integer and Modular Arithmetic
CS681: Computational Numer Theory and Algera (Fall 009) Lecture 1 & : Integer and Modular Arithmetic July 30, 009 Lecturer: Manindra Agrawal Scrie: Purushottam Kar 1 Integer Arithmetic Efficient recipes
More information15. Polynomial rings Definition-Lemma Let R be a ring and let x be an indeterminate.
15. Polynomial rings Definition-Lemma 15.1. Let R be a ring and let x be an indeterminate. The polynomial ring R[x] is defined to be the set of all formal sums a n x n + a n 1 x n +... a 1 x + a 0 = a
More informationDepth versus Breadth in Convolutional Polar Codes
Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK
More informationLecture 4 October 18th
Directed and undirected graphical models Fall 2017 Lecture 4 October 18th Lecturer: Guillaume Obozinski Scribe: In this lecture, we will assume that all random variables are discrete, to keep notations
More informationObservation 4.1 G has a proper separation of order 0 if and only if G is disconnected.
4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H
More informationModifying Shor s algorithm to compute short discrete logarithms
Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify
More informationPolynomials Characterizing Hyper b-ary Representations
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.4.3 Polynomials Characterizing Hyper -ary Representations Karl Dilcher 1 Department of Mathematics and Statistics Dalhousie University
More informationBeyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles
Beyond Loose LP-relaxations: Optimizing MRFs y Repairing Cycles Nikos Komodakis 1 and Nikos Paragios 2 1 University of Crete, komod@csd.uoc.gr 2 Ecole Centrale de Paris, nikos.paragios@ecp.fr Astract.
More information