Randomized Algorithms III Min Cut

Size: px
Start display at page:

Download "Randomized Algorithms III Min Cut"

Transcription

1 Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, Min Cut Problem Definition 11. Min cut Min cut G = V, E): undirected graph, n vertices, m edges. Interested in cuts in G. S V \ S Definition cut in G: a partition of V : S and V \ S. Edges of the cut: S, V \ S) is size of the cut S, V \ S) = { uv u S, v V \ S, and uv E }, minimum cut / mincut: cut in graph with min size Some definitions A) conditional probability of X given Y is Pr [ X = x Y = y ] [ = Pr Pr [ X = x) Y = y) ] = Pr [ X = x Y = y ] Pr[Y = y]. 1 ] X=x) Y =y) [ ]. Pr Y =y

2 B) X, Y events are independent, if Pr [ X = x Y = y ] = Pr [ X = x ] Pr [ Y = y ]. = Pr [ X = x ] [ ] Y = y = Pr X = x Some more probability Lemma E 1,..., E n : n events not necessarily independent). Then, Pr [ ] [ ] [ ] [ ] n i=1 E i = Pr E1 Pr E E 1 Pr E E1 E... Pr [ ] E n E1... E n The Algorithm Edge contraction... y x G: A) edge contraction: e = xy in G. B)... merge x, y into a single vertex. C)...remove self loops. D)... parallel edges multi-graph. E)... weights/ multiplicities on the edges Min cut in weighted graph G/xy: {x, y} Edge contraction implemented in On) time: A) Graph represented using adjacency lists. B) Merging the adjacency lists of the two vertices being contracted. C) Using hashing to do fix-ups. i.e., fix adjacency list of vertices connected to x, y.) D) Include edge weight in computing cut weight Cuts under contractions Observation A) A cut in G/xy is a valid cut in G. B) There cuts in G are not in G/xy. C) The cut S = {x} is not in G/xy. D) = size mincut in G/xy mincut in G. A) Idea: Repeatedly perform edge contractions benefits: shrink graph)... B) Every vertex in contracted graph is a connected component in the original graph.)

3 Contraction x y {x, y} ) ) ) 5) 7) 5 5 8) 9) 10) 11) 1) 9 1) 1) Contraction - all together now x y a) b) c) d) 5 5 e) f) g) h) But... i) j) A) Not min cut!

4 B) Contracted wrong edge somewhere... C) If never contract an edge in the cut... D)...get min cut in the end! E) We might still get min cut even if we contract edge min cut. Why??? The resulting algorithm The algorithm... Algorithm MinCutG) G 0 G i = 0 while G i has more than two vertices do e i random edge from EG i ) G i+1 G i /e i i i + 1 Let S, V \ S) be the cut in the original graph corresponding to the single edge in G i return S, V \ S) How to pick a random edge? Lemma X = {x 1,..., x n }: elements, ωx i ): integer positive weight. Pick randomly, in On) time, an element X, with prob picking x i being ωx i ) /W, where W = ni=1 ωx i ). Proof : Randomly choose r [0, W ]. Precompute β i = i k=1 ωx k ) = β i 1 + ωx i ). Find first index i, β i 1 < r β i. Return x i. A) Edges have weight... B)...compute total weight of each vertex adjacent edges). C) Pick randomly a vertex by weight. D) Pick random edge adjacent to this vertex Analysis The probability of success Lemma... Lemma G: mincut of size k and n vertices, then EG) kn. Proof : Each vertex degree is at least k, otherwise the vertex itself would form a minimum cut of size smaller than k. As such, there are at least v V degreev)/ nk/ edges in the graph Lemma... Lemma If we pick in random an edge e from a graph G, then with probability at most n belong to the minimum cut. it Proof : There are at least nk/ edges in the graph and exactly k edges in the minimum cut. Thus, the probability of picking an edge from the minimum cut is smaller then k/nk/) = /n.

5 11... Lemma Lemma MinCut outputs the mincut with prob. nn 1). Proof A) E i : event that e i is not in the minimum cut of G i. B) MinCut outputs mincut if all the events E 0,..., E n happen. C) Pr [ ] E i E0 E 1... E i 1 1 V G i ) = 1 n i. = = Pr[E 0... E n ] = Pr[E 0 ] Pr [ [ [ ] E 1 E0 ] Pr E E0 E 1 ]... Pr En E0... E n Proof continued... As such, we have n i=0 = n n = 1 ) n n i = n i i=0 n i n n 1 n n... 1 n n 1) Running time analysis Running time analysis... Observation MinCut runs in On ) time. Observation The algorithm always outputs a cut, and the cut is not smaller than the minimum cut. Definition Amplification: running an experiment again and again till the things we want to happen, with good probability, do happen Getting a good probability MinCutRep: algorithm runs MinCut nn 1) times and return the minimum cut computed. Lemma probability MinCutRep fails to return the minimum cut is < 0.1. Proof : MinCut fails to output the mincut in each execution is at most 1. nn 1) MinCutRep fails, only if all nn 1) executions of MinCut fail. 1 nn 1) Result ) nn 1) exp nn 1) nn 1)) = exp ) < 0.1, since 1 x e x for 0 x 1. Theorem One can compute mincut in On ) time with constant probability to get a correct result. In On log n) time the minimum cut is returned with high probability. 5

6 11. A faster algorithm Faster algorithm Why MinCutRep needs so many executions? Probability of failure in first ν iterations is Pr [ ] ν 1 E 0... E ν 1 1 ) ν 1 n i = i=0 n i i=0 n i = n n n n 1 n n... n ν)n ν 1) =. n n 1) = ν = n/: Prob of success 1/. = ν = n n: Prob of success 1/n Faster algorithm... Insight A) As the graph get smaller probability for bad choice increases. B) Currently do the amplification from the outside of the algorithm. C) Put amplification directly into the algorithm Contract ContractG, t) shrinks G till it has only t vertices. FastCut computes the minimum cut using Contract. Contract G, t ) while G) > t do Pick a random edge e in G. G G/e return G FastCutG = V, E)) G -- multi-graph begin n V G) if n 6 then Compute minimum cut of G and return cut. t 1 + n/ H 1 ContractG, t) H ContractG, t) /* Contract is randomized!!! */ X 1 FastCutH 1 ), X FastCutH ) return mincut of X 1 and X. end Lemma... Lemma The running time of FastCutG) is On log n), where n = V G). Proof : Well, we perform two calls to ContractG, t) which takes On ) time. And then we perform two recursive calls on the resulting graphs. We have: T n) = On ) + T n ) The solution to this recurrence is On log n) as one can easily and should) verify. 6

7 Success at each step Lemma Probability that mincut in contracted graph is original mincut is at least 1/. Proof : Plug in ν = n t = n 1 + n/ into success probability: ] Pr [E 0... E n t = tt 1) n n 1) ) 1 + n/ 1 + n/ 1 nn 1) Probability of success... Lemma FastCut finds the minimum cut with probability larger than Ω 1/ log n). See class notes for a formal proof. We provide a more elegant direct argument shortly Amplification Lemma Running FastCut repeatedly c log n times, guarantee that the algorithm outputs mincut with probability 1 1/n. c is a constant large enough. Proof : A) FastCut succeeds with prob c / log n, c is a constant. B)...fails with prob. 1 c / log n. C)...fails in m reps with prob. 1 c / log n) m. But then 1 c / log n) m e c / log n ) m e mc / log n 1 n, for m = log n) /c Theorem Theorem One can compute the minimum cut in a graph G with n vertices in On log n) time. The algorithm succeeds with probability 1 1/n. Proof : We do amplification on FastCut by running it Olog n) times. The running time bound follows from lemma On coloring trees and min-cut Trees and coloring edges... A) T h be a complete binary tree of height h. B) Randomly color its edges by black and white. C) E h : there exists a black path from root T h to one of its leafs. D) ρ h = Pr[E h ]. E) ρ 0 = 1 and ρ 1 = / see below). 7

8 Bounding ρ h A) u root of T h : children u l and u r. B) ρ h 1 : Probability for black path u l children C) Prob of black path from u through u 1 is: Pr [ uu l is black ] ρ h 1 = ρ h 1 / D) Prob. no black path through u l is 1 ρ h 1 /. E) Prob no black path is: 1 ρ h 1 /) F) We have ρ h = 1 1 ρ h 1 ) ρ h 1 = ρ h 1 ) = ρ h 1 ρ h Lemma... Lemma We have that ρ h 1/h + 1). Proof : A) By induction. For h = 1: ρ 1 = / 1/1 + 1). B) ρ h = ρ h 1 ρ h 1 = fρ h 1 ), for fx) = x x /. C) f x) = 1 x/. = f x) > 0 for x [0, 1]. D) fx) is increasing in the range [0, 1] ) 1 E) By induction: ρ h = f ρ h 1 ) f = 1 h 1) + 1 h 1 h. F) hh + 1) h + 1) h h + h h 1 h h 1, h h h Back to FastCut... A) Recursion tree for FastCut corresponds to such a coloring. B) Every call performs two recursive calls. C) Contraction in recursion succeeds with prob 1/. Draw recursion edge in black if successful. D) algorithm succeeds there black path from root of recursion tree to leaf. E) Since depth of tree H + log n. F) by above... probability of success is 1/h + 1) 1/ + log n) Galton-Watson processes A) Start with a single node. B) Each node has two children. C) Each child survives with probability half independently). D) If a child survives then it is going to have two children, and so on. E) A single node give a rise to a random tree. F) Q: Probability that the original node has descendants h generations in the future. G) Prove this probability is at least 1/h + 1). 8

9 Galton-Watson process A) Victorians worried: aristocratic surnames were disappearing. B) Family names passed on only through the male children. C) Family with no male children had its family name disappear. D) # male children of a person is an independent random variable X {0, 1,,...}. E) Starting with a single person, its family as far as male children are concerned) is a random tree with the degree of a node being distributed according to X. F).. A family disappears if E[X] 1, and it has a constant probability of surviving if E[X] > Galton-Watson process A)... Infant mortality is dramatically down. No longer a problem. B) Countries with family names that were introduced long time ago... C)...have very few surnames. Koreans have 50 surnames, and three surnames form 5% of the population). D) Countries introduced surnames recently have more surnames. Dutch have surnames only for the last 00 years, and there are 68, 000 different family names). 9

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.

Chapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1. Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from

More information

12.1. Branching processes Galton-Watson Process

12.1. Branching processes Galton-Watson Process Chapter 1 Min Cut To acknowledge the corn - This purely American expression means to admit the losing of an argument, especially in regard to a detail; to retract; to admit defeat. It is over a hundred

More information

Minimum Cut in a Graph Randomized Algorithms

Minimum Cut in a Graph Randomized Algorithms Minimum Cut in a Graph 497 - Randomized Algorithms Sariel Har-Peled September 3, 00 Paul Erdős 1913-1996) - a famous mathematician, believed that God has a book, called The Book in which god maintains

More information

Class notes for Randomized Algorithms

Class notes for Randomized Algorithms Class notes for Randomized Algorithms Sariel Har-Peled 1 May 9, 013 1 Department of Computer Science; University of Illinois; 01 N. Goodwin Avenue; Urbana, IL, 61801, USA; sariel@uiuc.edu; http://www.uiuc.edu/~sariel/.

More information

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify)

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) CS5314 Randomized Algorithms Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) 1 Introduce two topics: De-randomize by conditional expectation provides a deterministic way to construct

More information

Algortithms for the Min-Cut problem

Algortithms for the Min-Cut problem Algortithms for the Min-Cut problem Hongwei Jin Department of Applied Mathematics Illinois Insititute of Technology April 30, 2013 Outline 1 Introduction Problem Definition Previous Works 2 Karger s Algorithm

More information

Notes on MapReduce Algorithms

Notes on MapReduce Algorithms Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our

More information

Assignment 5: Solutions

Assignment 5: Solutions Comp 21: Algorithms and Data Structures Assignment : Solutions 1. Heaps. (a) First we remove the minimum key 1 (which we know is located at the root of the heap). We then replace it by the key in the position

More information

Proving languages to be nonregular

Proving languages to be nonregular Proving languages to be nonregular We already know that there exist languages A Σ that are nonregular, for any choice of an alphabet Σ. This is because there are uncountably many languages in total and

More information

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the

More information

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( )

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( ) Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr Pr = Pr Pr Pr() Pr Pr. We are given three coins and are told that two of the coins are fair and the

More information

Graph-theoretic Problems

Graph-theoretic Problems Graph-theoretic Problems Parallel algorithms for fundamental graph-theoretic problems: We already used a parallelization of dynamic programming to solve the all-pairs-shortest-path problem. Here we are

More information

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma Lecture 11: Generalized Recall We design an experiment with independent random variables X 1,..., X m We define bad events A 1,..., A n where) the bad event A i depends on the variables (X k1,..., X kni

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

Lecture 1: Contraction Algorithm

Lecture 1: Contraction Algorithm CSE 5: Design and Analysis of Algorithms I Spring 06 Lecture : Contraction Algorithm Lecturer: Shayan Oveis Gharan March 8th Scribe: Mohammad Javad Hosseini Disclaimer: These notes have not been subjected

More information

F 99 Final Quiz Solutions

F 99 Final Quiz Solutions Massachusetts Institute of Technology Handout 53 6.04J/18.06J: Mathematics for Computer Science May 11, 000 Professors David Karger and Nancy Lynch F 99 Final Quiz Solutions Problem 1 [18 points] Injections

More information

Algorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee

Algorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee Algorithm Analysis Recurrence Relation Chung-Ang University, Jaesung Lee Recursion 2 Recursion 3 Recursion in Real-world Fibonacci sequence = + Initial conditions: = 0 and = 1. = + = + = + 0, 1, 1, 2,

More information

Algorithms and Data Structures 2016 Week 5 solutions (Tues 9th - Fri 12th February)

Algorithms and Data Structures 2016 Week 5 solutions (Tues 9th - Fri 12th February) Algorithms and Data Structures 016 Week 5 solutions (Tues 9th - Fri 1th February) 1. Draw the decision tree (under the assumption of all-distinct inputs) Quicksort for n = 3. answer: (of course you should

More information

PRGs for space-bounded computation: INW, Nisan

PRGs for space-bounded computation: INW, Nisan 0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,

More information

1 Some loose ends from last time

1 Some loose ends from last time Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Kruskal s and Borůvka s MST algorithms September 20, 2010 1 Some loose ends from last time 1.1 A lemma concerning greedy algorithms and

More information

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS

HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS HAMILTON CYCLES IN RANDOM REGULAR DIGRAPHS Colin Cooper School of Mathematical Sciences, Polytechnic of North London, London, U.K. and Alan Frieze and Michael Molloy Department of Mathematics, Carnegie-Mellon

More information

McGill University Faculty of Science. Solutions to Practice Final Examination Math 240 Discrete Structures 1. Time: 3 hours Marked out of 60

McGill University Faculty of Science. Solutions to Practice Final Examination Math 240 Discrete Structures 1. Time: 3 hours Marked out of 60 McGill University Faculty of Science Solutions to Practice Final Examination Math 40 Discrete Structures Time: hours Marked out of 60 Question. [6] Prove that the statement (p q) (q r) (p r) is a contradiction

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours

More information

Advanced Analysis of Algorithms - Midterm (Solutions)

Advanced Analysis of Algorithms - Midterm (Solutions) Advanced Analysis of Algorithms - Midterm (Solutions) K. Subramani LCSEE, West Virginia University, Morgantown, WV {ksmani@csee.wvu.edu} 1 Problems 1. Solve the following recurrence using substitution:

More information

CS1800: Mathematical Induction. Professor Kevin Gold

CS1800: Mathematical Induction. Professor Kevin Gold CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size

More information

MA015: Graph Algorithms

MA015: Graph Algorithms MA015 3. Minimum cuts 1 MA015: Graph Algorithms 3. Minimum cuts (in undirected graphs) Jan Obdržálek obdrzalek@fi.muni.cz Faculty of Informatics, Masaryk University, Brno All pairs flows/cuts MA015 3.

More information

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM XIANG LI Abstract. This paper centers on the analysis of a specific randomized algorithm, a basic random process that involves marking

More information

Probability & Computing

Probability & Computing Probability & Computing Stochastic Process time t {X t t 2 T } state space Ω X t 2 state x 2 discrete time: T is countable T = {0,, 2,...} discrete space: Ω is finite or countably infinite X 0,X,X 2,...

More information

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2

(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2 Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE

LIMITING PROBABILITY TRANSITION MATRIX OF A CONDENSED FIBONACCI TREE International Journal of Applied Mathematics Volume 31 No. 18, 41-49 ISSN: 1311-178 (printed version); ISSN: 1314-86 (on-line version) doi: http://dx.doi.org/1.173/ijam.v31i.6 LIMITING PROBABILITY TRANSITION

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Analysis of Algorithms CMPSC 565

Analysis of Algorithms CMPSC 565 Analysis of Algorithms CMPSC 565 LECTURES 38-39 Randomized Algorithms II Quickselect Quicksort Running time Adam Smith L1.1 Types of randomized analysis Average-case analysis : Assume data is distributed

More information

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge

More information

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof

More information

CS361 Homework #3 Solutions

CS361 Homework #3 Solutions CS6 Homework # Solutions. Suppose I have a hash table with 5 locations. I would like to know how many items I can store in it before it becomes fairly likely that I have a collision, i.e., that two items

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

Topic 4 Randomized algorithms

Topic 4 Randomized algorithms CSE 103: Probability and statistics Winter 010 Topic 4 Randomized algorithms 4.1 Finding percentiles 4.1.1 The mean as a summary statistic Suppose UCSD tracks this year s graduating class in computer science

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Z.-Q. Ye 1, Y.-M. Li 2, H.-Q. Lu 3 and X. Zhou 4 1 Zhejiang University, Hanzhou, Zhejiang, China 2 Wenzhou University, Wenzhou,

More information

Module 1: Analyzing the Efficiency of Algorithms

Module 1: Analyzing the Efficiency of Algorithms Module 1: Analyzing the Efficiency of Algorithms Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu What is an Algorithm?

More information

CS4311 Design and Analysis of Algorithms. Analysis of Union-By-Rank with Path Compression

CS4311 Design and Analysis of Algorithms. Analysis of Union-By-Rank with Path Compression CS4311 Design and Analysis of Algorithms Tutorial: Analysis of Union-By-Rank with Path Compression 1 About this lecture Introduce an Ackermann-like function which grows even faster than Ackermann Use it

More information

The Lovász Local Lemma : A constructive proof

The Lovász Local Lemma : A constructive proof The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.

More information

Random Variable. Pr(X = a) = Pr(s)

Random Variable. Pr(X = a) = Pr(s) Random Variable Definition A random variable X on a sample space Ω is a real-valued function on Ω; that is, X : Ω R. A discrete random variable is a random variable that takes on only a finite or countably

More information

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing

More information

Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort

Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

Lecture 59 : Instance Compression and Succinct PCP s for NP

Lecture 59 : Instance Compression and Succinct PCP s for NP IITM-CS6840: Advanced Complexity Theory March 31, 2012 Lecture 59 : Instance Compression and Succinct PCP s for NP Lecturer: Sivaramakrishnan N.R. Scribe: Prashant Vasudevan 1 Introduction Classical Complexity

More information

CS151 Complexity Theory. Lecture 6 April 19, 2017

CS151 Complexity Theory. Lecture 6 April 19, 2017 CS151 Complexity Theory Lecture 6 Shannon s counting argument frustrating fact: almost all functions require huge circuits Theorem (Shannon): With probability at least 1 o(1), a random function f:{0,1}

More information

Partitioning Metric Spaces

Partitioning Metric Spaces Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals

More information

CS 161 Summer 2009 Homework #2 Sample Solutions

CS 161 Summer 2009 Homework #2 Sample Solutions CS 161 Summer 2009 Homework #2 Sample Solutions Regrade Policy: If you believe an error has been made in the grading of your homework, you may resubmit it for a regrade. If the error consists of more than

More information

Lecture 24: April 12

Lecture 24: April 12 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 24: April 12 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Lecture 13: 04/23/2014

Lecture 13: 04/23/2014 COMS 6998-3: Sub-Linear Algorithms in Learning and Testing Lecturer: Rocco Servedio Lecture 13: 04/23/2014 Spring 2014 Scribe: Psallidas Fotios Administrative: Submit HW problem solutions by Wednesday,

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

25.1 Markov Chain Monte Carlo (MCMC)

25.1 Markov Chain Monte Carlo (MCMC) CS880: Approximations Algorithms Scribe: Dave Andrzejewski Lecturer: Shuchi Chawla Topic: Approx counting/sampling, MCMC methods Date: 4/4/07 The previous lecture showed that, for self-reducible problems,

More information

USA Mathematical Talent Search Round 2 Solutions Year 27 Academic Year

USA Mathematical Talent Search Round 2 Solutions Year 27 Academic Year 1/2/27. In the grid to the right, the shortest path through unit squares between the pair of 2 s has length 2. Fill in some of the unit squares in the grid so that (i) exactly half of the squares in each

More information

Discrete Mathematics for CS Spring 2008 David Wagner Note 4

Discrete Mathematics for CS Spring 2008 David Wagner Note 4 CS 70 Discrete Mathematics for CS Spring 008 David Wagner Note 4 Induction Induction is an extremely powerful tool in mathematics. It is a way of proving propositions that hold for all natural numbers,

More information

Tree Decomposition of Graphs

Tree Decomposition of Graphs Tree Decomposition of Graphs Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices. It is shown

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

Dominating Set Counting in Graph Classes

Dominating Set Counting in Graph Classes Dominating Set Counting in Graph Classes Shuji Kijima 1, Yoshio Okamoto 2, and Takeaki Uno 3 1 Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan kijima@inf.kyushu-u.ac.jp

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Breadth-First Search of Graphs

Breadth-First Search of Graphs Breadth-First Search of Graphs Analysis of Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Applications of Breadth-First Search of Graphs a) Single Source

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

Solution Set for Homework #1

Solution Set for Homework #1 CS 683 Spring 07 Learning, Games, and Electronic Markets Solution Set for Homework #1 1. Suppose x and y are real numbers and x > y. Prove that e x > ex e y x y > e y. Solution: Let f(s = e s. By the mean

More information

Lecture 5: February 21, 2017

Lecture 5: February 21, 2017 COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication

More information

1 Sequences and Summation

1 Sequences and Summation 1 Sequences and Summation A sequence is a function whose domain is either all the integers between two given integers or all the integers greater than or equal to a given integer. For example, a m, a m+1,...,

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 1

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 1 CS 70 Discrete Mathematics and Probability Theory Fall 013 Vazirani Note 1 Induction Induction is a basic, powerful and widely used proof technique. It is one of the most common techniques for analyzing

More information

arxiv: v1 [math.co] 13 Dec 2014

arxiv: v1 [math.co] 13 Dec 2014 SEARCHING FOR KNIGHTS AND SPIES: A MAJORITY/MINORITY GAME MARK WILDON arxiv:1412.4247v1 [math.co] 13 Dec 2014 Abstract. There are n people, each of whom is either a knight or a spy. It is known that at

More information

Notes on Graph Theory

Notes on Graph Theory Notes on Graph Theory Maris Ozols June 8, 2010 Contents 0.1 Berge s Lemma............................................ 2 0.2 König s Theorem........................................... 3 0.3 Hall s Theorem............................................

More information

Hard-Core Model on Random Graphs

Hard-Core Model on Random Graphs Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,

More information

Cuts & Metrics: Multiway Cut

Cuts & Metrics: Multiway Cut Cuts & Metrics: Multiway Cut Barna Saha April 21, 2015 Cuts and Metrics Multiway Cut Probabilistic Approximation of Metrics by Tree Metric Cuts & Metrics Metric Space: A metric (V, d) on a set of vertices

More information

Parameterized Algorithms for the H-Packing with t-overlap Problem

Parameterized Algorithms for the H-Packing with t-overlap Problem Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 515 538 (2014) DOI: 10.7155/jgaa.00335 Parameterized Algorithms for the H-Packing with t-overlap Problem Alejandro López-Ortiz

More information

Phylogenetic Reconstruction with Insertions and Deletions

Phylogenetic Reconstruction with Insertions and Deletions Phylogenetic Reconstruction with Insertions and Deletions Alexandr Andoni, Mark Braverman, Avinatan Hassidim April 7, 2010 Abstract We study phylogenetic reconstruction of evolutionary trees, with three

More information

2. This exam consists of 15 questions. The rst nine questions are multiple choice Q10 requires two

2. This exam consists of 15 questions. The rst nine questions are multiple choice Q10 requires two CS{74 Combinatorics & Discrete Probability, Fall 96 Final Examination 2:30{3:30pm, 7 December Read these instructions carefully. This is a closed book exam. Calculators are permitted. 2. This exam consists

More information

CS 151. Red Black Trees & Structural Induction. Thursday, November 1, 12

CS 151. Red Black Trees & Structural Induction. Thursday, November 1, 12 CS 151 Red Black Trees & Structural Induction 1 Announcements Majors fair tonight 4:30-6:30pm in the Root Room in Carnegie. Come and find out about the CS major, or some other major. Winter Term in CS

More information

Tight Bounds on Vertex Connectivity Under Vertex Sampling

Tight Bounds on Vertex Connectivity Under Vertex Sampling Tight Bounds on Vertex Connectivity Under Vertex Sampling Keren Censor-Hillel Mohsen Ghaffari George Giakkoupis Bernhard Haeupler Fabian Kuhn Abstract A fundamental result by Karger [10] states that for

More information

Announcements. CSE332: Data Abstractions Lecture 2: Math Review; Algorithm Analysis. Today. Mathematical induction. Dan Grossman Spring 2010

Announcements. CSE332: Data Abstractions Lecture 2: Math Review; Algorithm Analysis. Today. Mathematical induction. Dan Grossman Spring 2010 Announcements CSE332: Data Abstractions Lecture 2: Math Review; Algorithm Analysis Dan Grossman Spring 2010 Project 1 posted Section materials on using Eclipse will be very useful if you have never used

More information

GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] 1. Preliminaries

GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] 1. Preliminaries GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] notes by Petar MAYMOUNKOV Theme The algorithmic problem of finding a sparsest cut is related to the combinatorial problem of building expander graphs

More information

AMTH140 Trimester Question 1. [8 marks] Answer

AMTH140 Trimester Question 1. [8 marks] Answer Question 1 Let A B = {(1, 1), (2, 2), (3, 1), (3, 2), (1, 2), (1, 4), (2, 1), (2, 4), (3, 4)}. Find the power set of B, P(B). The set B = {1, 2, 4}. Then P(B) = {, {1}, {2}, {4}, {1, 2}, {1, 4}, {2, 4},

More information

α-acyclic Joins Jef Wijsen May 4, 2017

α-acyclic Joins Jef Wijsen May 4, 2017 α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,

More information

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Central Algorithmic Techniques. Iterative Algorithms

Central Algorithmic Techniques. Iterative Algorithms Central Algorithmic Techniques Iterative Algorithms Code Representation of an Algorithm class InsertionSortAlgorithm extends SortAlgorithm { void sort(int a[]) throws Exception { for (int i = 1; i < a.length;

More information

Lecture 6: September 22

Lecture 6: September 22 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 6: September 22 Lecturer: Prof. Alistair Sinclair Scribes: Alistair Sinclair Disclaimer: These notes have not been subjected

More information

Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions

Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions arxiv:1303.705v1 [math.co] 8 Mar 013 Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions Benjamin Doerr Max-Planck-Institute for Informatics 6613 Saarbrücken Germany April 5, 018

More information

Lecture 6 January 15, 2014

Lecture 6 January 15, 2014 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for

More information

Methods for solving recurrences

Methods for solving recurrences Methods for solving recurrences Analyzing the complexity of mergesort The merge function Consider the following implementation: 1 int merge ( int v1, int n1, int v, int n ) { 3 int r = malloc ( ( n1+n

More information

CS60007 Algorithm Design and Analysis 2018 Assignment 1

CS60007 Algorithm Design and Analysis 2018 Assignment 1 CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in

More information

CMPT 307 : Divide-and-Conqer (Study Guide) Should be read in conjunction with the text June 2, 2015

CMPT 307 : Divide-and-Conqer (Study Guide) Should be read in conjunction with the text June 2, 2015 CMPT 307 : Divide-and-Conqer (Study Guide) Should be read in conjunction with the text June 2, 2015 1 Introduction The divide-and-conquer strategy is a general paradigm for algorithm design. This strategy

More information

Solutions to homework Assignment #6 Math 119B UC Davis, Spring 2012

Solutions to homework Assignment #6 Math 119B UC Davis, Spring 2012 Problems 1. For each of the following maps acting on the interval [0, 1], sketch their graphs, find their fixed points and determine for each fixed point whether it is asymptotically stable (a.k.a. attracting),

More information

Coloring Uniform Hypergraphs with Few Colors*

Coloring Uniform Hypergraphs with Few Colors* Coloring Uniform Hypergraphs with Few Colors* Alexandr Kostochka 1,2 1 University of Illinois at Urbana-Champaign, Urbana, Illinois 61801; e-mail: kostochk@mathuiucedu 2 Institute of Mathematics, Novosibirsk

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

CSE 548: Analysis of Algorithms. Lectures 18, 19, 20 & 21 ( Randomized Algorithms & High Probability Bounds )

CSE 548: Analysis of Algorithms. Lectures 18, 19, 20 & 21 ( Randomized Algorithms & High Probability Bounds ) CSE 548: Analysis of Algorithms Lectures 18, 19, 20 & 21 ( Randomized Algorithms & High Probability Bounds ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Fall 2012 Markov s Inequality

More information