Counting with Bounded Treewidth
|
|
- Nancy Alexander
- 5 years ago
- Views:
Transcription
1 Counting with Bounded Treewidth Yitong Yin Nanjing University Joint work with Chihao Zhang (SJTU?)
2 Spin Systems graph G=(V,E) A (u,v) vertices are variables (domain [q]) edge are constraints: e=(u,v) E configuration partition function: 2 [q] V X Y Z = A e ( u, v) 2[q] V e=(u,v)2e A e :[q] [q]! C
3 Holant Problem graph G=(V,E) f v edges are variables (domain [q]) vertices are constraints (signatures) 8v 2 V, f v :[q] deg(v)! C configuration [q] E holant = X 2[q] E Y v2v f v E(v) E(v) = (e1,..., ed) incident edges of v q m configurations where m= E
4 graph G=(V,E) 1 a b 2 c 3 d f e [q] V Y w( )= A e ( u, v) e=(u,v)2e incidence graph B(V,E,F) EQ V where F EQ(x 1,...,x d )= a b c d e f E A e ( 1 x 1 = = x d 0 otherwise Z = X 2[q] V w( ) holant = X 2[q] F Y v2v [E f v F (v)
5 graph G=(V,E) q=2 Boolean symmetric f : {0, 1} d! C f = [f0, f1,..., fd] fv where fi = f(x) for Σjxj = i counting matchings: at every vertex v V, fv = [1, 1, 0, 0..., 0] the at-most-one function holant = X Y [1, 1, 0,...,0] E(v) 2{0,1} E v2v
6 graph G=(V,E) q=2 Boolean symmetric f : {0, 1} d! C f = [f0, f1,..., fd] fv where fi = f(x) for Σjxj = i counting perfect matchings: holant = at every vertex v V, fv = [0, 1, 0, 0..., 0] the exact-one function X Y [0, 1, 0, 0,...,0] E(v) 2{0,1} E v2v
7 graph G=(V,E) q=2 Boolean symmetric f : {0, 1} d! C f = [f0, f1,..., fd] fv where fi = f(x) for Σjxj = i counting edge covers: at every vertex v V, fv = [0, 1, 1, 1..., 1] the at-least-one function holant = X Y [0, 1, 1, 1,...,1] E(v) 2{0,1} E v2v
8 graph G=(V,E) q=2 Boolean symmetric f : {0, 1} d! C f = [f0, f1,..., fd] fv where fi = f(x) for Σjxj = i fv = [1, μ, 1, μ, 1, μ,...] subgraphs world ( Jerrum-Sinclair 90 ): Z = X X E µ odd(x) holant = X odd(x) = #odd-degree vertices in X Y 2{0,1} E v2v [1,µ,1,µ,...] E(v)
9 graph G=(V,E) incidence graph B(V,E,F) n [0,...,0,1,0,...,0] dv/2 n dv/2 [0, 1, 0] V F E counting Eulerian orientations: holant = X 2{0,1} F Y v2v Y [0,...,0, 1, 0,...,0] {z } {z } F (v) deg(v)/2 deg(v)/2 e=(e 1,e 2 )2E [ (e 1 ) 6= (e 2 )]
10 Treewidth tw(g): treewidth of graph G measures how much a graph is like a tree: tw(tree) = 1 tw(k k grid) = k tw(k n) = n-1 q-state spin system on G with n vertices: Courcelle s Theorem: f(q, tw)poly(n) time [Courcelle 90] Junction-tree belief propagation: qo(tw) poly(n) time Holant (tensor networks) on G with O(1) max-degree: qo(tw) poly(n) [Markov, Shi 08] [Arad, Landau 10]
11 Treewidth graph G=(V,E) a tree of bags of vertices: 1. Every vertex is in some bag. 2. Every edge is in some bag. 3. If two bags have a same vertex, then all bags in the path between them have that vertex. width: max bag size-1 tree-decomposition treewidth: width of optimal tree decomposition
12 Separator Decomposition V j V = V V i V j V k S i V k V i given a graph G=(V,E) a binary tree T G of n nodes: 1. Every node is a vertex set Vi V. The root is V. Every leaf is. 2. Every node Vi has a separator Si in G[Vi] separating Vi into Vj and Vk. 3. Vj and Vk are children of Vi. width of T G = max i { S i, V i } V i : vertex boundary of V i in G sw(g): width of optimal T G 1. sw(g) = θ(tw(g)) 2. TG can be constructed in 2 O(tw) poly(n) time
13 FPT Algorithm for Spin System V j V i V j V k S i V k V i max { S i, V i } = O(tw(G) ) for q-state spin systems Z = X Y A e ( u, v) 2[q] V e=(u,v)2e dynamic programming: 2 i for : Z(V i, ) = X feasible 2[q] S i table size: q O(tw(G)) n running time: q O(tw(G)) n Z(V j, )Z(V k, )Z(S i i, [ ) also works for bounded-degree Holant
14 Fine-grained Classification classify the computational complexity of Holant(G, F) in terms of graph family G and function family F Holant(G, F) Classify : G = all graphs: 2O(n) time G = graphs with treewidth k: 2O(k) poly(n) time G = planar graphs: PTAS for log-holant (log-partition function) FPTAS for Holant assuming strong spatial mixing
15 Pinning & Peering symmetric f :[q] d C fix any τ [q] d-k Pin (f) :[q] k! C Pinning: σ [q] k Pinτ( f ) = f(τ1, τ2,..., τd-k,,,..., ) (σ) σ1 σ2 σk ( Peering: equivalent relation between τ,τ [q] d-k τ τ if Pinτ( f )= Pinτ ( f ) k f is r-regular if r = max 0applekappled Pin (f) 2 [q] d k not violating f
16 Boolean symmetric f : {0, 1} d! C τ {0,1} i+j τ has i 1 s and j 0 s f = [ ] [f0, f1,..., fi-1, fi,..., fd-j-1, fd-j,..., fd] = Pinτ( f ) where f i = f(x) for Σ j x j = i f is r-regular if r = max 0applekappled Pin (f) 2 [q] d k not violating f 2-state spin systems: EQ=[1,0,...,0,1] is 2-regular, A e is 3-regular matchings & PMs: [1,1,0,...,0] and [0,1,0,...,0] are 2-regular edge covers: [0,1,1,...,1] is 2-regular subgraphs world: [1, μ, 1, μ,...] is 2-regular Eulerian orientations: [0,...,0, 1, 0,..., 0] is (d/2+1)-regular
17 symmetric f : {0, 1, 2} d! C f60 f50 f51 fij = f(x) f40 f41 f42 where x has i 0 s and j 1 s Pinτ( f ) f30 f31 f32 f33 τ =0112 f20 f21 f22 f23 f24 f10 f11 f12 f13 f14 f15 f00 f01 f02 f03 f04 f05 f06 all d-ary symmetric function is at most bounded-degree Holant is O(1)-regular d + q 1 q 1 -regular
18 Theorem For any constant domain size q 2, Holant of any graph G=(V, E) with r-regular symmetric signatures can be computed in time: r O(n) where n= V r O(tw(G)) n + 2 O(tw(G)) Poly(n) extendable to asymmetric signatures (under proper assumption for evaluating asymmetric functions with unbounded arity); implications in approximate counting on planar graphs: PTAS for log-holant FPTAS for holant assuming strong spatial mixing
19 A Simple r O(n) -time Algorithm given a Holant instance: G=(V,E) V = {v 1, v 2,..., v n } f v1 f vi f v2 f vn all f vi :[q] deg(vi)! C are r-regular f is r-regular if r = max 0applekappled Pin (f) 2 [q] d k f v1 f v2 f vi σ Pin 1 (f vi ) f vn dynamic programming: table size: r n n running time: r n q n = r O(n) holant(g, {f v1,...,f vn }) = X feasible 2[q] deg(v n) f vn ( ) holant G \{v n }, {new f v1,...,f vi } where f vi = ( f vi Pin j (f vi ) v i 6 v n v i is j s nbr. of v n
20 Oracles given a Holant instance: G=(V,E) V = {v 1, v 2,..., v n } fix f vi f v1 f vi f v2 f vn all denoted as fi,1,f k i,2,...,f k i,r k Evaluation oracle: Given (i, j, k) and σ [q] k, returns fi,j( k ) f vi :[q] deg(vi)! C are r-regular and arity k: there are r distinct Pin (f vi ):[q] k! C Pinning oracle: Given (i, j, k) and τ [q] k-l, returns j that f l i,j 0 =Pin (f k i,j) For symmetric function f :[q] d! C with constant q, these oracles can be implemented using: Poly(d) preprocessing time Poly(d) space O(1) query time for Holant with finitely many signatures: this can be hard-wired into the algorithm
21 An FPT Algorithm V i V j V k S i V i for Holant problems: holant = X 2[q] E Y f v E(v) f v max { S i, V i } = O(tw(G) ) V j V k v2v each v S i has unbounded degree but only has 3 classes of edges Peering: τ τ if Pin τ ( f )= Pin τ ( f ) Observation: f(ρστ) is determined by the equivalent classes for ρ,σ,τ enumerate equivalent classes of local configurations!
22 An FPT Algorithm V j f v V i V j V k S i V k V i each v S i has unbounded degree but only has 3 classes of edges τ τ if Pin τ ( f )= Pin τ ( f ) f(ρστ) is determined by the equivalent classes for ρ,σ,τ (f)( )= f is r-regular 1 (f) = (f) 0 Peerτ( f ) is r-regular f f( ) Peer (f) Peer (f) Peer (f) locally enumerate equivalent classes ρ,σ,τ
23 An FPT Algorithm fv Vi Vj Vj V Si k Vk each v Si has unbounded degree but only has 3 classes of edges Vi τ τ if Pinτ( f )= Pinτ ( f ) f(ρστ) is determined by the equivalent classes for ρ,σ,τ (f )( ) = 1 0 (f ) = Holant (Vi, boundary signatures Peer (fv ) at v ) X old boundary signatures of Vj (f ) Holant Vj, and Peer v (fv ) at v 2 Si equiv. classes v, v, v old boundary signatures of Vk at every v2si Holant Vk, and Peer v (fv ) at v 2 Si Y old boundary signatures of Vi Holant Si fv ( v, v, v ) and Peer v (fv ) at v 2 Si = v2si
24 An FPT Algorithm V j f v V i V j V k S i V k V i each v S i has unbounded degree but only has 3 classes of edges τ τ if Pin τ ( f )= Pin τ ( f ) f(ρστ) is determined by the equivalent classes for ρ,σ,τ (f)( )= 1 (f) = (f) 0 fix f v1,f v2,...,f vn Peering oracle: Given i, (equivalent class) τ, returns Peer (f ) vi Pinning oracle & Evaluation oracle: for Peer (f vi ) Evaluation oracle: Given i, (equivalent classes) ρ,σ,τ, returns f vi ( ) For symmetric functions, can be implemented using Poly(n) preprocessing time, Poly(n) space, and O(1) query time
25 Theorem For any constant domain size q 2, Holant of any graph G=(V, E) with r-regular signatures can be computed in time: r O(n) where n= V r O(tw(G)) V + 2 O(tw(G)) Poly( V ) assuming Peering, Pinning, & Evaluation oracles. asymmetric f :[q] d C fix any τ [q] d-k and S 2 [d] d k PinS,τ( f ) = f(τ1,..., τ2,..., τ3,...,τd-k,...) ( at positions in S f is r-regular if r = max 0applekappled max S2( [d] d k) Pin S, (f) 2 [q] d k
26 Planar Decomposition Baker s Decomposition (Baker 93): For all k, a planar graph G can be decomposed into subgraphs G 1,..., G k each of treewidth O(k). Jerrum-Goldberg-McQuillan 12: For spin systems on planar graphs, if always holant exp(ω(n)) then PTAS for log-holant.
27 Correlation Decay strong spatial mixing (SSM): B [q] B ( (e) =c A) ( (e) =c A, B) ( V ) ( (t)) B t G SSM: sufficiency of local information for approx. of? ( (e) =c A) efficiency of local computation e A Theorem (Demaine-Hajiaghayi 04) For apex-minor-free graphs, treewidth of t-ball is O(t).
28 Correlation Decay strong spatial mixing (SSM): B [q] B ( (e) =c A) ( (e) =c A, B) ( V ) ( (t)) B t G SSM: sufficiency of local information for approx. of for planar graphs ( (e) =c A) efficiency of local computation e A for self-reducible problems FPTAS for Holant
29 Conclusion A class of Holant problems behave like boundeddegree #CSP: 2 O(n) - and 2 O(tw) Poly(n)-time algorithms. Regularity implies efficient DP algorithms, but: is not robust to holographic transformation; does not cover inversion-based algorithms. Open question: a Holant problem with Booleandomain symmetric signatures (and is easy for decision) with n Ω(tw) lower bound: must have unbounded degree, must be irregular.
30 Thank you!
The Complexity of Approximating Small Degree Boolean #CSP
The Complexity of Approximating Small Degree Boolean #CSP Pinyan Lu, ITCS@SUFE Institute for Theoretical Computer Science Shanghai University of Finance and Economics Counting CSP F (Γ) is a family of
More informationDecay of Correlation in Spin Systems
(An algorithmic perspective to the) Decay of Correlation in Spin Systems Yitong Yin Nanjing University Decay of Correlation hardcore model: random independent set I v Pr[v 2 I ] (d+)-regular tree `! σ:
More informationParameterised Subgraph Counting Problems
Parameterised Subgraph Counting Problems Kitty Meeks University of Glasgow University of Strathclyde, 27th May 2015 Joint work with Mark Jerrum (QMUL) What is a counting problem? Decision problems Given
More informationSiegel s Theorem, Edge Coloring, and a Holant Dichotomy
Siegel s Theorem, Edge Coloring, and a Holant Dichotomy Jin-Yi Cai (University of Wisconsin-Madison) Joint with: Heng Guo and Tyson Williams (University of Wisconsin-Madison) 1 / 117 2 / 117 Theorem (Siegel
More informationThe Classification Program II: Tractable Classes and Hardness Proof
The Classification Program II: Tractable Classes and Hardness Proof Jin-Yi Cai (University of Wisconsin-Madison) January 27, 2016 1 / 104 Kasteleyn s Algorithm and Matchgates Previously... By a Pfaffian
More informationTree-width. September 14, 2015
Tree-width Zdeněk Dvořák September 14, 2015 A tree decomposition of a graph G is a pair (T, β), where β : V (T ) 2 V (G) assigns a bag β(n) to each vertex of T, such that for every v V (G), there exists
More informationA Fixed-Parameter Algorithm for Max Edge Domination
A Fixed-Parameter Algorithm for Max Edge Domination Tesshu Hanaka and Hirotaka Ono Department of Economic Engineering, Kyushu University, Fukuoka 812-8581, Japan ono@cscekyushu-uacjp Abstract In a graph,
More informationWhat can be sampled locally?
What can be sampled locally? Yitong Yin Nanjing University Joint work with: Weiming Feng, Yuxin Sun Local Computation Locality in distributed graph algorithms. [Linial, FOCS 87, SICOMP 92] the LOCAL model:
More informationTree Decompositions and Tree-Width
Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationImproved FPTAS for Multi-Spin Systems
Improved FPTAS for Multi-Spin Systems Pinyan Lu and Yitong Yin 2 Microsoft Research Asia, China. pinyanl@microsoft.com 2 State Key Laboratory for Novel Software Technology, Nanjing University, China. yinyt@nju.edu.cn
More informationComplexity of Inference in Graphical Models
Complexity of Inference in Graphical Models Venkat Chandrasekaran 1, Nathan Srebro 2, and Prahladh Harsha 3 1 Laboratory for Information and Decision Systems Department of Electrical Engineering and Computer
More informationTractable structures for constraint satisfaction with truth tables
Tractable structures for constraint satisfaction with truth tables Dániel Marx September 22, 2009 Abstract The way the graph structure of the constraints influences the complexity of constraint satisfaction
More informationDichotomy for Holant Problems of Boolean Domain
Dichotomy for Holant Problems of Boolean Domain Jin-Yi Cai Pinyan Lu Mingji Xia Abstract Holant problems are a general framework to study counting problems. Both counting Constraint Satisfaction Problems
More informationComplexity Dichotomies for Counting Problems
Complexity Dichotomies for Counting Problems Jin-Yi Cai Computer Sciences Department University of Wisconsin Madison, WI 53706 Email: jyc@cs.wisc.edu Xi Chen Department of Computer Science Columbia University
More informationSiegel s theorem, edge coloring, and a holant dichotomy
Siegel s theorem, edge coloring, and a holant dichotomy Tyson Williams (University of Wisconsin-Madison) Joint with: Jin-Yi Cai and Heng Guo (University of Wisconsin-Madison) Appeared at FOCS 2014 1 /
More informationA Complexity Classification of the Six Vertex Model as Holant Problems
A Complexity Classification of the Six Vertex Model as Holant Problems Jin-Yi Cai (University of Wisconsin-Madison) Joint work with: Zhiguo Fu, Shuai Shao and Mingji Xia 1 / 84 Three Frameworks for Counting
More informationDichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia
Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and
More informationPrize-collecting Survivable Network Design in Node-weighted Graphs. Chandra Chekuri Alina Ene Ali Vakilian
Prize-collecting Survivable Network Design in Node-weighted Graphs Chandra Chekuri Alina Ene Ali Vakilian Survivable Network Design (SNDP) Collection of l pairs: s 1, t 1,, (s l, t l ) r(s i, t i ): requirement
More informationA tree-decomposed transfer matrix for computing exact partition functions for arbitrary graphs
A tree-decomposed transfer matrix for computing exact partition functions for arbitrary graphs Andrea Bedini 1 Jesper L. Jacobsen 2 1 MASCOS, The University of Melbourne, Melbourne 2 LPTENS, École Normale
More informationThe Ising Partition Function: Zeros and Deterministic Approximation
The Ising Partition Function: Zeros and Deterministic Approximation Jingcheng Liu Alistair Sinclair Piyush Srivastava University of California, Berkeley Summer 2017 Jingcheng Liu (UC Berkeley) The Ising
More informationAcyclic and Oriented Chromatic Numbers of Graphs
Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,
More informationThe Complexity of Planar Boolean #CSP with Complex Weights
The Complexity of Planar Boolean #CSP with Complex Weights Heng Guo University of Wisconsin-Madison hguo@cs.wisc.edu Tyson Williams University of Wisconsin-Madison tdw@cs.wisc.edu Abstract We prove a complexity
More informationFundamentals of optimization problems
Fundamentals of optimization problems Dmitriy Serdyuk Ferienakademie in Sarntal 2012 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2012 Overview 1 Introduction Optimization problems PO and
More informationStructural Tractability of Counting of Solutions to Conjunctive Queries
Structural Tractability of Counting of Solutions to Conjunctive Queries Arnaud Durand 1 1 University Paris Diderot Journées DAG, june 2013 Joint work with Stefan Mengel (JCSS (to appear) + ICDT 2013) 1
More informationDichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF
Dichotomy Theorems in Counting Complexity and Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison September 7th, 204 Supported by NSF CCF-27549. The P vs. NP Question It is generally conjectured
More information4 Packing T-joins and T-cuts
4 Packing T-joins and T-cuts Introduction Graft: A graft consists of a connected graph G = (V, E) with a distinguished subset T V where T is even. T-cut: A T -cut of G is an edge-cut C which separates
More informationChordal structure in computer algebra: Permanents
Chordal structure in computer algebra: Permanents Diego Cifuentes Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology Joint
More informationFine Grained Counting Complexity I
Fine Grained Counting Complexity I Holger Dell Saarland University and Cluster of Excellence (MMCI) & Simons Institute for the Theory of Computing 1 50 Shades of Fine-Grained #W[1] W[1] fixed-parameter
More informationScheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17
Scheduling on Unrelated Parallel Machines Approximation Algorithms, V. V. Vazirani Book Chapter 17 Nicolas Karakatsanis, 2008 Description of the problem Problem 17.1 (Scheduling on unrelated parallel machines)
More informationGraph structure in polynomial systems: chordal networks
Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology
More informationThe Tutte polynomial: sign and approximability
: sign and approximability Mark Jerrum School of Mathematical Sciences Queen Mary, University of London Joint work with Leslie Goldberg, Department of Computer Science, University of Oxford Durham 23rd
More informationFinding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth
Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Z.-Q. Ye 1, Y.-M. Li 2, H.-Q. Lu 3 and X. Zhou 4 1 Zhejiang University, Hanzhou, Zhejiang, China 2 Wenzhou University, Wenzhou,
More informationFPT is Characterized by Useful Obstruction Sets
FPT is Characterized by Useful Obstruction Sets Bart M. P. Jansen Joint work with Michael R. Fellows, Charles Darwin Univ. June 21st 2013, WG 2013, Lübeck A NEW CHARACTERIZATION OF FPT 2 Well-Quasi-Orders
More informationSome hard families of parameterised counting problems
Some hard families of parameterised counting problems Mark Jerrum and Kitty Meeks School of Mathematical Sciences, Queen Mary University of London {m.jerrum,k.meeks}@qmul.ac.uk September 2014 Abstract
More informationHardness of Approximation
Hardness of Approximation We have seen several methods to find approximation algorithms for NP-hard problems We have also seen a couple of examples where we could show lower bounds on the achievable approxmation
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationFinite and Algorithmic Model Theory II: Automata-Based Methods
Finite and Algorithmic Model Theory II: Automata-Based Methods Anuj Dawar University of Cambridge Computer Laboratory Simons Institute, 30 August 2016 Review We aim to develop tools for studying the expressive
More informationBasic graph theory 18.S995 - L26.
Basic graph theory 18.S995 - L26 dunkel@math.mit.edu http://java.dzone.com/articles/algorithm-week-graphs-and no cycles Isomorphic graphs f(a) = 1 f(b) = 6 f(c) = 8 f(d) = 3 f(g) = 5 f(h) = 2 f(i) = 4
More informationLecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.
Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of
More informationGraph structure in polynomial systems: chordal networks
Graph structure in polynomial systems: chordal networks Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology
More informationFixed-parameter tractable reductions to SAT. Vienna University of Technology
Fixed-parameter tractable reductions to SAT Ronald de Haan Stefan Szeider Vienna University of Technology Reductions to SAT Problems in NP can be encoded into SAT in poly-time. Problems at the second level
More informationOn Symmetric Signatures in Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Pinyan Lu Tsinghua University, Beijing
On Symmetric Signatures in Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison Pinyan Lu Tsinghua University, Beijing NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many
More informationFinding Small Weight Isomorphisms with Additional Constraints is Fixed-Parameter Tractable
Finding Small Weight Isomorphisms with Additional Constraints is Fixed-Parameter Tractable V. Arvind 1, Johannes Köbler 2, Sebastian Kuhnert 2, and Jacobo Torán 3 arxiv:1709.10063v1 [cs.cc] 28 Sep 2017
More informationThe complexity of enumeration and counting for acyclic conjunctive queries
The complexity of enumeration and counting for acyclic conjunctive queries Cambridge, march 2012 Counting and enumeration Counting Output the number of solutions Example : sat, Perfect Matching, Permanent,
More informationThe complexity of approximate counting Part 1
The complexity of approximate counting Part 1 Leslie Ann Goldberg, University of Oxford Counting Complexity and Phase Transitions Boot Camp Simons Institute for the Theory of Computing January 2016 The
More informationBounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia
Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction
More informationChordal networks of polynomial ideals
Chordal networks of polynomial ideals Diego Cifuentes Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology Joint work with Pablo
More informationThe Necessity of Bounded Treewidth for Efficient Inference in Bayesian Networks
The Necessity of Bounded Treewidth for Efficient Inference in Bayesian Networks Johan H.P. Kwisthout and Hans L. Bodlaender and L.C. van der Gaag 1 Abstract. Algorithms for probabilistic inference in Bayesian
More informationA Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion
A Single-Exponential Fixed-Parameter Algorithm for Distance-Hereditary Vertex Deletion Eduard Eiben a, Robert Ganian a, O-joung Kwon b a Algorithms and Complexity Group, TU Wien, Vienna, Austria b Logic
More informationSome Results on Matchgates and Holographic Algorithms. Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison. NSF CCR and CCR
Some Results on Matchgates and Holographic Algorithms Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many satisfying assignments
More informationSPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS
SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS Andreas Galanis Joint work with: Jin-Yi Cai Leslie Ann Goldberg Heng Guo Mark Jerrum Daniel Štefankovič Eric Vigoda The Power of Randomness
More informationThe Complexity of Computing the Sign of the Tutte Polynomial
The Complexity of Computing the Sign of the Tutte Polynomial Leslie Ann Goldberg (based on joint work with Mark Jerrum) Oxford Algorithms Workshop, October 2012 The Tutte polynomial of a graph G = (V,
More informationCompendium of Parameterized Problems at Higher Levels of the Polynomial Hierarchy
Electronic Colloquium on Computational Complexity, Report No. 143 (2014) Compendium of Parameterized Problems at Higher Levels of the Polynomial Hierarchy Ronald de Haan, Stefan Szeider Institute of Information
More informationThe Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth
The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth Gregory Gutin, Mark Jones, and Magnus Wahlström Royal Holloway, University of London Egham, Surrey TW20 0EX, UK Abstract In the
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationThe Steiner Network Problem
The Steiner Network Problem Pekka Orponen T-79.7001 Postgraduate Course on Theoretical Computer Science 7.4.2008 Outline 1. The Steiner Network Problem Linear programming formulation LP relaxation 2. The
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationExact Inference I. Mark Peot. In this lecture we will look at issues associated with exact inference. = =
Exact Inference I Mark Peot In this lecture we will look at issues associated with exact inference 10 Queries The objective of probabilistic inference is to compute a joint distribution of a set of query
More informationLecture 6 January 15, 2014
Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for
More informationEnumerating Homomorphisms
Enumerating Homomorphisms Andrei A. Bulatov School of Computing Science, Simon Fraser University, Burnaby, Canada Víctor Dalmau 1, Department of Information and Communication Technologies, Universitat
More informationDensest/Heaviest k-subgraph on Interval Graphs, Chordal Graphs and Planar Graphs
1 / 25 Densest/Heaviest k-subgraph on Interval Graphs, Chordal Graphs and Planar Graphs Presented by Jian Li, Fudan University Mar 2007, HKUST May 8, 2006 2 / 25 Problem Definition: Densest k-subgraph
More informationAugmenting Outerplanar Graphs to Meet Diameter Requirements
Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information
More informationFaster quantum algorithm for evaluating game trees
Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x
More informationGraph. Supply Vertices and Demand Vertices. Supply Vertices. Demand Vertices
Partitioning Graphs of Supply and Demand Generalization of Knapsack Problem Takao Nishizeki Tohoku University Graph Supply Vertices and Demand Vertices Supply Vertices Demand Vertices Graph Each Supply
More informationTree-width and algorithms
Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationarxiv: v2 [math.co] 7 Jan 2019
Clique-Width for Hereditary Graph Classes Konrad K. Dabrowski, Matthew Johnson and Daniël Paulusma arxiv:1901.00335v2 [math.co] 7 Jan 2019 Abstract Clique-width is a well-studied graph parameter owing
More informationSubexponential Time Complexity of CSP with Global Constraints
I N F S Y S Research R e p o r t Institut für Informationssysteme Abteilung Wissensbasierte Systeme Subexponential Time Complexity of CSP with Global Constraints Ronald de Haan Iyad Kanj Stefan Szeider
More informationOn the hardness of losing width
On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl
More informationComplexity of conditional colorability of graphs
Complexity of conditional colorability of graphs Xueliang Li 1, Xiangmei Yao 1, Wenli Zhou 1 and Hajo Broersma 2 1 Center for Combinatorics and LPMC-TJKLC, Nankai University Tianjin 300071, P.R. China.
More informationGraph Sparsity. Patrice Ossona de Mendez. Shanghai Jiao Tong University November 6th, 2012
Graph Sparsity Patrice Ossona de Mendez Centre d'analyse et de Mathématique Sociales CNRS/EHESS Paris, France Shanghai Jiao Tong University November 6th, 2012 Graph Sparsity (joint work with Jaroslav Ne²et
More informationBasis Collapse in Holographic Algorithms Over All Domain Sizes
Basis Collapse in Holographic Algorithms Over All Domain Sizes Sitan Chen Harvard College March 29, 2016 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse
More informationCOMPLEXITY CLASSIFICATION OF EXACT AND APPROXIMATE COUNTING PROBLEMS. Heng Guo
COMPLEXITY CLASSIFICATION OF EXACT AND APPROXIMATE COUNTING PROBLEMS by Heng Guo A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Sciences)
More informationDominating Broadcasts in Graphs. Sarada Rachelle Anne Herke
Dominating Broadcasts in Graphs by Sarada Rachelle Anne Herke Bachelor of Science, University of Victoria, 2007 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTER OF
More informationThe parameterized complexity of counting problems
The parameterized complexity of counting problems Jörg Flum Martin Grohe January 22, 2004 Abstract We develop a parameterized complexity theory for counting problems. As the basis of this theory, we introduce
More informationGraph Minor Theory. Sergey Norin. March 13, Abstract Lecture notes for the topics course on Graph Minor theory. Winter 2017.
Graph Minor Theory Sergey Norin March 13, 2017 Abstract Lecture notes for the topics course on Graph Minor theory. Winter 2017. Contents 1 Background 2 1.1 Minors.......................................
More informationAlgorithmic Graph Theory (SS2016)
Algorithmic Graph Theory (SS2016) Chapter 4 Treewidth and more Walter Unger Lehrstuhl für Informatik 1 19:00, June 15, 2016 4 Inhaltsverzeichnis Walter Unger 15.6.2016 19:00 SS2016 Z Contents I 1 Bandwidth
More informationConjectures and Questions in Graph Reconfiguration
Conjectures and Questions in Graph Reconfiguration Ruth Haas, Smith College Joint Mathematics Meetings January 2014 The Reconfiguration Problem Can one feasible solution to a problem can be transformed
More informationFrom Holant To #CSP And Back: Dichotomy For Holant c Problems
From Holant To #CSP And Back: Dichotomy For Holant c Problems Jin-Yi Cai Sangxia Huang Pinyan Lu Abstract We explore the intricate interdependent relationship among counting problems considered from three
More informationEECS 219C: Computer-Aided Verification Boolean Satisfiability Solving III & Binary Decision Diagrams. Sanjit A. Seshia EECS, UC Berkeley
EECS 219C: Computer-Aided Verification Boolean Satisfiability Solving III & Binary Decision Diagrams Sanjit A. Seshia EECS, UC Berkeley Acknowledgments: Lintao Zhang Announcement Project proposals due
More informationLecture 17: D-Stable Polynomials and Lee-Yang Theorems
Counting and Sampling Fall 2017 Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Lecturer: Shayan Oveis Gharan November 29th Disclaimer: These notes have not been subjected to the usual scrutiny
More informationDestroying non-complete regular components in graph partitions
Destroying non-complete regular components in graph partitions Landon Rabern landon.rabern@gmail.com June 27, 2011 Abstract We prove that if G is a graph and r 1,..., r k Z 0 such that k i=1 r i (G) +
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationarxiv: v1 [math.co] 12 Dec 2014
The Parameterized Complexity of Graph Cyclability Petr A. Golovach Marcin Kamiński Spyridon Maniatis arxiv:1412.3955v1 [math.co] 12 Dec 2014 Dimitrios M. Thilikos, Abstract The cyclability of a graph is
More informationLecture 4: NP and computational intractability
Chapter 4 Lecture 4: NP and computational intractability Listen to: Find the longest path, Daniel Barret What do we do today: polynomial time reduction NP, co-np and NP complete problems some examples
More informationCounting Colorings on Cubic Graphs
Counting Colorings on Cubic Graphs Chihao Zhang The Chinese University of Hong Kong Joint work with Pinyan Lu (Shanghai U of Finance and Economics) Kuan Yang (Oxford University) Minshen Zhu (Purdue University)
More informationJeffrey D. Ullman Stanford University
Jeffrey D. Ullman Stanford University 3 We are given a set of training examples, consisting of input-output pairs (x,y), where: 1. x is an item of the type we want to evaluate. 2. y is the value of some
More informationOn the Isomorphism Problem for Decision Trees and Decision Lists
On the Isomorphism Problem for Decision Trees and Decision Lists V. Arvind 1, Johannes Köbler 2, Sebastian Kuhnert 2, Gaurav Rattan 1, and Yadu Vasudev 1 1 The Institute of Mathematical Sciences, Chennai,
More informationGUOLI DING AND STAN DZIOBIAK. 1. Introduction
-CONNECTED GRAPHS OF PATH-WIDTH AT MOST THREE GUOLI DING AND STAN DZIOBIAK Abstract. It is known that the list of excluded minors for the minor-closed class of graphs of path-width numbers in the millions.
More informationarxiv: v3 [math.co] 19 Sep 2018
Decycling Number of Linear Graphs of Trees arxiv:170101953v3 [mathco] 19 Sep 2018 Jian Wang a, Xirong Xu b, a Department of Mathematics Taiyuan University of Technology, Taiyuan, 030024, PRChina b School
More informationAsymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms
Approximation Algorithms Asymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms Jens Egeblad November 29th, 2006 Agenda First lesson (Asymptotic Approximation): Bin-Packing
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
Approximation Algorithms Seminar 1 Set Cover, Steiner Tree and TSP Siert Wieringa siert.wieringa@tkk.fi Approximation Algorithms Seminar 1 1/27 Contents Approximation algorithms for: Set Cover Steiner
More informationTREE-DECOMPOSITIONS OF GRAPHS. Robin Thomas. School of Mathematics Georgia Institute of Technology thomas
1 TREE-DECOMPOSITIONS OF GRAPHS Robin Thomas School of Mathematics Georgia Institute of Technology www.math.gatech.edu/ thomas MOTIVATION 2 δx = edges with one end in X, one in V (G) X MOTIVATION 3 δx
More informationPolynomial kernels for constant-factor approximable problems
1 Polynomial kernels for constant-factor approximable problems Stefan Kratsch November 11, 2010 2 What do these problems have in common? Cluster Edge Deletion, Cluster Edge Editing, Edge Dominating Set,
More informationPolynomial-time classical simulation of quantum ferromagnets
Polynomial-time classical simulation of quantum ferromagnets Sergey Bravyi David Gosset IBM PRL 119, 100503 (2017) arxiv:1612.05602 Quantum Monte Carlo: a powerful suite of probabilistic classical simulation
More informationInstitute of Operating Systems and Computer Networks Algorithms Group. Network Algorithms. Tutorial 3: Shortest paths and other stuff
Institute of Operating Systems and Computer Networks Algorithms Group Network Algorithms Tutorial 3: Shortest paths and other stuff Christian Rieck Shortest paths: Dijkstra s algorithm 2 Dijkstra s algorithm
More informationProf. Dr. Lars Schmidt-Thieme, L. B. Marinho, K. Buza Information Systems and Machine Learning Lab (ISMLL), University of Hildesheim, Germany, Course
Course on Bayesian Networks, winter term 2007 0/31 Bayesian Networks Bayesian Networks I. Bayesian Networks / 1. Probabilistic Independence and Separation in Graphs Prof. Dr. Lars Schmidt-Thieme, L. B.
More informationLocating the eigenvalues for graphs of small clique-width
Locating the eigenvalues for graphs of small clique-width Martin Fürer Institut für Theoretische Informatik, ETHZ Visiting from Pennsylvania State University Joint work with David P Jacobs an Vilmar Trevisan
More informationMinimum Bisection is Fixed Parameter Tractable
Minimum Bisection is Fixed Parameter Tractable Marek Cygan Daniel Lokshtanov Marcin Pilipczuk Micha l Pilipczuk Saket Saurabh Abstract In the classic Minimum Bisection problem we are given as input a graph
More information