A class of heuristics for the constrained forest problem
|
|
- Sheila Webster
- 6 years ago
- Views:
Transcription
1 Discrete Applied Mathematics 154 (2006) Communication A class of heuristics for the constrained forest problem Michael Laszlo, Sumitra Mukherjee Nova Southeastern University, Graduate School of Computer and Information Sciences 3301 College Avenue, Ft. Lauderdale, FL 33314, USA Received 6 June 2005; accepted 29 June 2005 Available online 31 August 2005 Communicated by F. Maffioli Abstract The constrained forest problem seeks a minimum-weight spanning forest in an undirected edgeweighted graph such that each tree spans at least a specified number of vertices. We present a structured class of greedy heuristics for this NP-hard problem, and identify the best heuristic Elsevier B.V. All rights reserved. Keywords: Constrained forest problem; Tree partitioning; Minimum spanning forests; Greedy heuristics 1. Introduction Given a graph with positive edge weights, the constrained forest problem (CFP) seeks a minimum-weight spanning subgraph each of whose components contains at least m vertices. Such as subgraph is known as an m-forest. In their survey of graph partitioning problems, Cordone and Maffioli [1] take note of the work of Imelieńska et al. [3] which shows that CFP is NP-hard for m 4, and presents a greedy heuristic for CFP with an approximation ratio of two [3]. Recently, Laszlo and Mukherjee [4] present a second greedy heuristic that produces solutions at least as good as, and often better than, those produced by [3]. The current paper characterizes a class of heuristics to which those presented in [3,4] belong as particular cases. Corresponding author. address: mjl@nova.edu (M. Laszlo) X/$ - see front matter 2005 Elsevier B.V. All rights reserved. doi: /j.dam
2 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) Section 2 presents a class of algorithms for constructing m-forests, and Section 3 characterizes these algorithms with respect to the size of solutions they produce. Section 4 employs these algorithms as heuristics for CFP, and evaluates them in light of the results of Section A class of greedy algorithms for constructing m-forests A forest is called an m-forest if each of its trees contains at least m>0 vertices. This section presents a class of algorithms each of which takes a tree T = (V, E) and constructs a spanning m-forest of T. The input to each algorithm is an ordered set E of the n edges of tree T and a positive integer m n + 1, and the output is a subset of E representing a spanning m-forest. The algorithms are greedy insofar as they attempt to include only edges deemed essential. Given two edges e and f of an ordered edge set in which e precedes f, we say that e is lighter than f and that f is heavier than e. We also refer to the first and last edges of the ordered set as its lightest and heaviest elements, respectively. A tree is said to be large if it contains at least m vertices, and small otherwise. Each algorithm iteratively selects and removes a lightest or heaviest edge from edge set E and either includes the edge in the graph F under construction or rejects the edge. We can describe each algorithm as an edge-coloring process where an edge s color indicates its status: An edge is blue if it belongs to edge set E. An edge is green if it has been added to F. An edge is red if it belongs to neither E nor F. In short, green edges have been included, red edges have been excluded, and blue edges have not yet been considered. At any given time, we refer to the set of green edges as the green forest, which represents a subgraph of the solution that the algorithm eventually produces. A green tree is a (maximal) component of the green forest. Similarly, we refer to the set of edges that are either blue or green as the blue-green forest, which represents a supergraph of the solution that will eventually be produced, and to each component of this forest as a blue-green tree. An edge is said to connect the two green (or blue-green) trees to which it is incident. The edge-coloring process is as follows, where the procedure m-forest is called with an ordered edge set E of tree T: m-forest(e) { for every edge e E, paint e blue; while (E = ) { e the lightest or heaviest edge in E; E E e; if (e is the lightest edge) { if (e connects two large trees in the green forest) then paint e red;
3 8 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) 6 14 else paint e green; else { // e is the heaviest edge if (e connects two large trees in the blue-green forest) then paint e red; else paint e green; return the green forest; The m-forest algorithm is nondeterministic since edge selection in each iteration is underspecified. Note that the green forest is initially empty and grows over the course of the process, that the blue-green forest is initially the input edge set E and shrinks over the course of the process, and that the green forest is a subgraph of the blue-green forest. When the process terminates, every edge is green or red, and the green forest is the algorithm s solution. Theorem 1. Where E is an ordered set of edges of a tree with at least m vertices, the m-forest algorithm returns an m-forest. Proof. We show that the following loop-invariant is maintained: The blue-green forest is an m-forest. The initial blue-green forest is an m-forest since it is isomorphic to E, a tree of size at least m. For the inductive step, assume that the blue-green forest is an m-forest, and consider the two cases that can arise when an edge e is selected in an iteration of the while loop: Case 1: e is the lightest edge. The blue-green forest remains unchanged unless e is painted red, in which case its removal from the blue-green forest splits the blue-green tree to which e belonged into two blue-green trees T 1 and T 2. Because e was painted red, it is incident to two large green trees, one of which must be a subgraph of T 1 and the other a subgraph of T 2, implying that T 1 and T 2 are both large blue-green trees. Since no other tree in the blue-green forest is affected by removal of edge e, the blue-green forest remains an m-forest. Case 2: e is the heaviest edge. The blue-green forest remains unchanged unless e is painted red, in which case the blue-green tree to which e belonged is replaced by two large blue-green trees. Since no other tree in the blue-green forest is affected by removal of edge e, the blue-green forest remains an m-forest. Hence we have shown the loop invariant that the blue-green forest remains an m-forest. When the algorithm terminates, every edge is green or red, and the green edges, which comprise the final blue-green forest, form an m-forest. 3. Structure of the class of algorithms We can identify a specific heuristic from the class of heuristics represented by m-forest using a string w = w 1 w 2...w n of length n = E over the alphabet {0, 1. The value of bit w i indicates which edge to choose in iteration i of the while loop: the lightest edge if w i = 0, or the heaviest edge if w i = 1. Under this scheme, we obtain a deterministic version
4 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) of m-forest that gets called with an ordered edge set E and a string w that dictates the edge selection process: deterministic-m-forest(e, w) { for every edge e E, paint e blue; for i = 1, 2,..., E do { if (w i = 0) { e the lightest edge in E; E E e; if (e connects two large trees in the green forest) then paint e red; else paint e green; else { // w i = 1 e the heaviest edge in E; E E e; if (e connects two large trees in the blue-green forest) then paint e red; else paint e green; return the green forest; As shorthand, we sometimes refer to the algorithm picked out by string w as the w heuristic. Moreover, we let G(w) and B(w) denote the green and blue forest, respectively, produced by running deterministic-m-forest on string w, where the ordered edge set E is assumed and w n. The heuristic 1 n, which selects the heaviest edge in every iteration, is called the heaviest edge first (HEF) heuristic. Similarly, the heuristic 0 n, which selects the lightest edge in every iteration, is called the lightest edge first (LEF) heuristic. It is shown in [4] that, on any given input, the green forest produced by HEF is a subgraph of that produced by LEF. Our key theorem generalizes this result by characterizing the solutions produced by the class of all m-forest algorithms. Specifically, given two strings w = α1β and ŵ = α0β that differ in only one bit, the solution produced by the w heuristic is a subgraph of that produced by the ŵ heuristic: Flipped bit theorem. Let w=α1β and ŵ=α0β where w = ŵ = E. Then G(w) G(ŵ). We prove this theorem in the appendix. Intuitively, when we delay processing a light edge, we increase the likelihood of excluding it and other edges from the m-forest under construction. In the precondition of the flipped bit theorem, the light edge processed by the ŵ heuristic through prefix α0 is not processed by the w heuristic until later, increasing the likelihood that this and other edges are omitted from the green forest G(w). The lattice structure. The 2 n binary strings of length n label the vertices of an n- dimensional hypercube in which two vertices are joined by an edge if and only if their
5 10 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) 6 14 labels differ in exactly one bit. This hypercube forms a complete lattice under the bitwise Boolean operations and ( ) and or ( ): the greatest lower bound, or meet, of two strings w and ŵ is given by w ŵ, and least upper bound, or join, byw ŵ. The lattice s least element is the string 0 n and its greatest element the string 1 n. When considered under this lattice interpretation, the flipped bit theorem and transitivity of the subset relation imply the following corollary: Corollary 1. Let G and Ĝ be the green forests produced by any two heuristics w and ŵ, respectively, when applied to some edge set. The green forest produced by the w ŵ heuristic contains both G and Ĝ as subgraphs. The green forest produced by the w ŵ heuristic is contained in both G and Ĝ as a subgraph. Since 0 n and 1 n are the lattice s least and greatest elements, respectively, the green forest produced by the LEF heuristic 0 n contains both G and Ĝ as subgraphs, and the green forest produced by the HEF heuristic 1 n is contained in both G and Ĝ as a subgraph. The following result holds: Corollary 2. The solution produced by HEF is a subgraph of the solution produced by the w heuristic for every w. The solution produced by LEF is a supergraph of the solution produced by the w heuristic for every w. 4. Heuristics for the constrained forest problem The constrained forest problem is defined as follows: Let G = (V, E) be an undirected connected graph with positive edge weights. Given a natural number m V, we seek a minimum-weight subgraph spanning the vertex set V such that each of its components spans at least m vertices. Each w heuristic can be used as a heuristic for CFP: Construct the minimum spanning tree (MST) of G and then apply the w heuristic to the MST s edge set ordered by increasing weight. Corollary 2 implies that, of the class of heuristics considered in this paper, the heaviest edge first 1 n heuristic produces the best solutions for CFP. Given an MST with n edges, one can trace a path from 0 n to 1 n through the lattice of heuristics and generate the sequence of green forests G 0, G 1,...,G n produced by the heuristics along this path. (The forest G 0 results from the 0 n heuristic. The heuristic used to produce G i+1 is obtained by setting one of the 0 bits to 1 in the string used to produce G i.) To examine this sequence of forests, we take the input edge set from a tree with positive edge weights and represent each forest G i by its total weight. Since G i+1 G i for each i, the total weight is monotonically nonincreasing. Fig. 1 graphs total weight for three different paths through the lattice from 0 n to 1 n : where 1 s replace 0 s from left to right ( , , ,...), labeled Advancing in the figure; where 1 s replace 0 s from right to left ( , , ,...), labeled Receding; and for a random path from 0 n to 1 n. The edge set used to create these graphs forms the minimum spanning tree of the Creta data set [2] and contains 1080 edges. In Fig. 1, the graphs resulting from the Advancing and Receding paths bound the graph resulting from the random path. This illustrates a more general result that follows from
6 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) Advancing Total Weight Receding Random Number of 1s Fig. 1. Total weight produced by three different paths in the heuristic lattice (m = 4). Lemma 3 (see the appendix). For any 0 k n, let G A and G R be the graphs produced by the 1 k 0 n k heuristic and 0 n k 1 k heuristic, respectively, and let G be the green graph produced by any string containing exactly k 1 s. Then G A G G R. 5. Conclusion Our work has presented a class of greedy methods for constructing m-forests, and characterized the structure of this class. These methods are applied to the constrained forest problem, and the 1 n heuristic (HEF) is identified as the best of this class of heuristics with approximation ratio two. Appendix: Proof of the flipped bit theorem In this appendix we prove the main theorem cited in this paper: Flipped bit theorem. Let w=α1β and ŵ=α0β where w = ŵ = E. Then G(w) G(ŵ). In what follows, we assume that all strings are over the alphabet {0,1 and have length no greater than E. Given nonempty string w, the last edge processed by running deterministicm-forest on string w is denoted e = edge(w). Where w = w b, edge e is processed as a light edge if bit b = 0, or as a heavy edge if b = 1.
7 12 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) 6 14 Assume G(w), B(w), and R(w) are the green, blue, and red forests, respectively, produced by (running m-forest on) string w. We define the blue-green forest as BG(w) = B(w) G(w). We refer to graph components as trees, and sometimes refer to a green tree to emphasize that it belongs to G(w) for some w, and to blue and blue-green trees similarly. A tree is said to be large if it contains at least m vertices, and small otherwise. Lemma 1. Let w = α01 k and ŵ = α1 k for any k 0. Let e denote the edge processed by the zero that follows the prefix α in w; that is, e=edge(α0). If w paints e red, then G(w)=G(ŵ). Proof of Lemma 1. The proof is by induction on k. [Basis] Assume k = 0. Then G(w) = G(α0) = G(α) = G(ŵ), where the second equality follows from the fact that e is not added to the green forest G(α). [Inductive step] Assume as the inductive hypothesis that the lemma holds for all i<k. Let f denote the heavy edge that is processed last; that is, f = edge(w) = edge(ŵ).bythe inductive hypothesis (IH), assume that the corresponding green forests are identical when f is about to be processed; in other words, G(α01 k 1 ) = G(α1 k 1 ). There are two cases to consider: [case 1] ŵ paints f green: By the IH and the fact that w processes the same edges as ŵ, except for edge e which w paints red, we have BG(α1 k 1 ) = BG(α01 k 1 ) e. Hence the two blue-green trees that f touches in BG(α01 k 1 ) are no larger than their counterparts in BG(α1 k 1 ), implying that w paints f green. [case 2] ŵ paints f red: Since the light edge e is painted red by w, edge e touches two large green trees G 1 and G 2 in G(α). Both trees are subgraphs of the green forest G(α01 k 1 ) and hence of the blue-green forest BG(α01 k 1 ). Because BG(α1 k 1 ) = BG(α01 k 1 ) e, edge e separates two blue-green trees in BG(w), but the two blue-green forests BG(w) and BG(ŵ) are otherwise identical. Let T 1 and T 2 be the two blue-green trees that f touches in BG(α01 k 1 ) when w is about to process edge f, and consider T 1.IfT 1 contains one of the green trees G 1 or G 2 as a subgraph, then T 1 is large since both G 1 and G 2 are large. Alternatively, if T 1 contains neither G 1 nor G 2 as a subgraph, then T 1 is one of the two large blue-green trees due to which ŵ paints f red. In both cases T 1 is large. The argument for T 2 is the same, implying that f touches two large trees in the blue-green forest BG(α01 k 1 ), implying that w paints f red. Lemma 2. Let w = ασ and ŵ = βσ where σ = β. Suppose that G(β) = G(α) e and R(β) = R(α) e for some light edge e painted red by w. Then G(ŵ) = G(w) e. Proof of Lemma 2. The proof is induction on σ. [Basis] Assume σ = 0. Then G(ŵ) = G(β) = G(α) e = G(w) e. [Inductive step] Assume as the inductive hypothesis (IH) that the lemma holds for all proper prefixes of σ, in particular that G(βσ ) = G(ασ ) e where σ = σ b for bit b. Since w paints edge e red, e touches two large green trees in the green forest G(ασ ). Let f =edge(w). There are two cases to show that f G(w) implies f G(ŵ): [case 1] f is a light edge (b = 0).Ifw paints f green, f touches at least one small green tree T in G(ασ ). Since T cannot be one of the green trees that e touches (for otherwise T would be large), IH implies that f touches the same tree T in G(βσ ). Hence ŵ paints f green.
8 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) [case 2] f is a heavy edge (b=1).ifwpaints f green, f touches at least one small blue-green tree T in BG(ασ ). Since T cannot contain either green tree that e touches, IH implies that f touches the same tree T in BG(βσ ), hence ŵ paints f green. It follows from both cases that f G(w) implies f G(ŵ). The other direction, that f G(ŵ) implies f G(w), follows from the fact that G(ασ ) G(βσ ), which obtains from IH. Hence f G(w) if and only if f G(ŵ), and the lemma follows. Lemma 3. Let w = α1 j 0β and let ŵ = α01 j β. Let the edges processed by these two strings be labeled as follows: e f 1 f 2 f 3... f k 1 f k ŵ : α β w : α β f 1 f 2 f 3 f 4... f k e Then the following conditions hold: (a) if e G(w), then e G(ŵ); and (b) each f i is painted the same color by w and ŵ; and (c) either G(ŵ) = G(w) or G(ŵ) = G(w) e. Lemma 3 expresses the idea that by postponing the processing of a light edge e, we obtain a green graph G(w) that is either the same as the green graph G(ŵ) we would otherwise obtain, or that excludes edge e which G(ŵ) includes. Proof of Lemma 3. (a) We show that if e is painted red by ŵ, then e is painted red by w. Assume e is painted red by ŵ. Then e touches two large green trees in graph G(α). Processing of the heavy edges f 1 through f k can only add more green edges to G(α), hence G(α) G(α1 k ). It follows that e touches two large green trees in G(α1 k ) and is painted red by w. (b) There are two cases. First, assume ŵ paints edge e green. Then e remains in the blue-green forest implying that w and ŵ paint each edge f i the same color. Second, assume ŵ paints edge e red. By Lemma 1, w and ŵ paint each edge f i the same color. (c) Part (a) of this lemma implies that one of three cases hold: e belongs to both G(w) and G(ŵ); e belongs to neither G(w) and G(ŵ);ore belongs to G(ŵ) G(w). In the first two cases, part (b) of this lemma implies that G(w) = G(ŵ). In the last case, Lemma 2 implies that G(w) = G(ŵ) or G(ŵ) = G(w) e. Lemma 4. Let w = α11 k and ŵ = α01 k where w = ŵ = E, and let e = edge(α0). Then either G(ŵ) = G(w) or G(ŵ) = G(w) e. Proof of Lemma 4. We can rewrite w as w = α11 k 1 1 = α11 k 1 0 since the last bit corresponds to the last remaining blue edge in G, which can be regarded as light or heavy. We can also rewrite ŵ as ŵ = α01 k 1 1. The lemma follows from Lemma 3. Flipped bit theorem. Let w=α1β and ŵ=α0β where w = ŵ = E. Then G(w) G(ŵ).
9 14 M. Laszlo, S. Mukherjee / Discrete Applied Mathematics 154 (2006) 6 14 Proof of the flipped bit theorem. Proof by induction on the number of zeros in string β. [Basis] Where β = 1 k for some k, the basis is established by Lemma 4. [Inductive step] Suppose β = 1 k 0σ, sow = α11 k 0σ = α1 k+1 0σ and ŵ = α01 k 0σ. Let string w = α01 k 1σ. By Lemma 3 we have G(w ) = G(w) or G(w ) = G(w) e, hence G(w) G(w ). By the induction hypothesis we have G(w ) G(ŵ). It follows that G(w) G(ŵ) by transitivity of the subset relation. References [1] R. Cordone, F. Maffioli, On the complexity of graph tree partition problems, Discrete Appl. Math. 134 (2004) [2] R.A. Dandekar, J. Domingo-Ferrer, F. Sebe, LHS-based hybrid microdata vs rank swapping and microaggregation for numeric microdata protection, in: J. Domingo-Ferrer (Ed.), Inference Control in Statistical Databases, Lecture Notes in Computer Science, vol. 2316, Springer, Berlin, [3] C. Imelieńska, B. Kalantari, L. Khachiyan, A greedy heuristic for a minimum weight forest problem, Oper. Res. Lett. 14 (1993) [4] M. Laszlo, S. Mukherjee, Another greedy heuristic for the constrained forest problem, Oper. Res. Lett. 33(6) (2005), in press, /j.orl
Discrete Mathematics. The average degree of a multigraph critical with respect to edge or total choosability
Discrete Mathematics 310 (010 1167 1171 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: www.elsevier.com/locate/disc The average degree of a multigraph critical with respect
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationCompetitive Weighted Matching in Transversal Matroids
Competitive Weighted Matching in Transversal Matroids Nedialko B. Dimitrov and C. Greg Plaxton University of Texas at Austin 1 University Station C0500 Austin, Texas 78712 0233 {ned,plaxton}@cs.utexas.edu
More informationEnumeration and symmetry of edit metric spaces. Jessie Katherine Campbell. A dissertation submitted to the graduate faculty
Enumeration and symmetry of edit metric spaces by Jessie Katherine Campbell A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY
More informationTORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS
TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS YUSUKE SUYAMA Abstract. We give a necessary and sufficient condition for the nonsingular projective toric variety associated to a building set to be
More informationGeneralized Pigeonhole Properties of Graphs and Oriented Graphs
Europ. J. Combinatorics (2002) 23, 257 274 doi:10.1006/eujc.2002.0574 Available online at http://www.idealibrary.com on Generalized Pigeonhole Properties of Graphs and Oriented Graphs ANTHONY BONATO, PETER
More information1 Non-deterministic Turing Machine
1 Non-deterministic Turing Machine A nondeterministic Turing machine is a generalization of the standard TM for which every configuration may yield none, or one or more than one next configurations. In
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 159 (2011) 1345 1351 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam On disconnected cuts and separators
More information1 Computational Problems
Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More information1 Some loose ends from last time
Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Kruskal s and Borůvka s MST algorithms September 20, 2010 1 Some loose ends from last time 1.1 A lemma concerning greedy algorithms and
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationLinear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs
Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationCombinatorial Optimization
Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all
More informationCompetitive Weighted Matching in Transversal Matroids
Competitive Weighted Matching in Transversal Matroids Nedialko B. Dimitrov C. Greg Plaxton Abstract Consider a bipartite graph with a set of left-vertices and a set of right-vertices. All the edges adjacent
More informationEquitable list colorings of planar graphs without short cycles
Theoretical Computer Science 407 (008) 1 8 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Equitable list colorings of planar graphs
More informationTrees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic).
Trees A tree is a graph which is (a) Connected and (b) has no cycles (acyclic). 1 Lemma 1 Let the components of G be C 1, C 2,..., C r, Suppose e = (u, v) / E, u C i, v C j. (a) i = j ω(g + e) = ω(g).
More informationTHE CAPTURE TIME OF THE HYPERCUBE
THE CAPTURE TIME OF THE HYPERCUBE ANTHONY BONATO, PRZEMYS LAW GORDINOWICZ, WILLIAM B. KINNERSLEY, AND PAWE L PRA LAT Abstract. In the game of Cops and Robbers, the capture time of a graph is the minimum
More informationEvery line graph of a 4-edge-connected graph is Z 3 -connected
European Journal of Combinatorics 0 (2009) 595 601 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Every line graph of a 4-edge-connected
More informationMore on NP and Reductions
Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data
More informationZero forcing propagation time on oriented graphs
Zero forcing propagation time on oriented graphs Adam Berliner a, Chassidy Bozeman b, Steve Butler b,, Minerva Catral c, Leslie Hogben b,d, Brenda Kroschel e, Jephian Chin-Hung Lin b, Nathan Warnberg f,
More informationExtremal Graphs Having No Stable Cutsets
Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University
More informationD-bounded Distance-Regular Graphs
D-bounded Distance-Regular Graphs CHIH-WEN WENG 53706 Abstract Let Γ = (X, R) denote a distance-regular graph with diameter D 3 and distance function δ. A (vertex) subgraph X is said to be weak-geodetically
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Matroids and Greedy Algorithms Date: 10/31/16
60.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Matroids and Greedy Algorithms Date: 0/3/6 6. Introduction We talked a lot the last lecture about greedy algorithms. While both Prim
More informationDesign of Distributed Systems Melinda Tóth, Zoltán Horváth
Design of Distributed Systems Melinda Tóth, Zoltán Horváth Design of Distributed Systems Melinda Tóth, Zoltán Horváth Publication date 2014 Copyright 2014 Melinda Tóth, Zoltán Horváth Supported by TÁMOP-412A/1-11/1-2011-0052
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More information1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).
1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting
More informationTheory of Computation
Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what
More information(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2
Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the
More informationMINIMALLY NON-PFAFFIAN GRAPHS
MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect
More informationMonochromatic and Rainbow Colorings
Chapter 11 Monochromatic and Rainbow Colorings There are instances in which we will be interested in edge colorings of graphs that do not require adjacent edges to be assigned distinct colors Of course,
More informationOn decomposing graphs of large minimum degree into locally irregular subgraphs
On decomposing graphs of large minimum degree into locally irregular subgraphs Jakub Przyby lo AGH University of Science and Technology al. A. Mickiewicza 0 0-059 Krakow, Poland jakubprz@agh.edu.pl Submitted:
More informationHardness of Approximation of Graph Partitioning into Balanced Complete Bipartite Subgraphs
Hardness of Approximation of Graph Partitioning into Balanced Complete Bipartite Subgraphs Hideaki OTSUKI Abstract For a graph G, a biclique edge partition S BP (G) is a collection of complete bipartite
More informationON GLOBAL DOMINATING-χ-COLORING OF GRAPHS
- TAMKANG JOURNAL OF MATHEMATICS Volume 48, Number 2, 149-157, June 2017 doi:10.5556/j.tkjm.48.2017.2295 This paper is available online at http://journals.math.tku.edu.tw/index.php/tkjm/pages/view/onlinefirst
More informationARTICLE IN PRESS Discrete Mathematics ( )
Discrete Mathematics ( ) Contents lists available at ScienceDirect Discrete Mathematics journal homepage: www.elsevier.com/locate/disc On the interlace polynomials of forests C. Anderson a, J. Cutler b,,
More informationTheoretical Computer Science
Theoretical Computer Science 532 (2014) 64 72 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Bandwidth consecutive multicolorings
More informationDecomposing planar cubic graphs
Decomposing planar cubic graphs Arthur Hoffmann-Ostenhof Tomáš Kaiser Kenta Ozeki Abstract The 3-Decomposition Conjecture states that every connected cubic graph can be decomposed into a spanning tree,
More informationARTICLE IN PRESS Theoretical Computer Science ( )
Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like
More informationShow that the following problems are NP-complete
Show that the following problems are NP-complete April 7, 2018 Below is a list of 30 exercises in which you are asked to prove that some problem is NP-complete. The goal is to better understand the theory
More informationApproximating MAX-E3LIN is NP-Hard
Approximating MAX-E3LIN is NP-Hard Evan Chen May 4, 2016 This lecture focuses on the MAX-E3LIN problem. We prove that approximating it is NP-hard by a reduction from LABEL-COVER. 1 Introducing MAX-E3LIN
More informationALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER. Włodzimierz Ulatowski
Opuscula Math. 33, no. 4 (2013), 763 783 http://dx.doi.org/10.7494/opmath.2013.33.4.763 Opuscula Mathematica ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER Włodzimierz Ulatowski Communicated
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationAn algorithm to increase the node-connectivity of a digraph by one
Discrete Optimization 5 (2008) 677 684 Contents lists available at ScienceDirect Discrete Optimization journal homepage: www.elsevier.com/locate/disopt An algorithm to increase the node-connectivity of
More informationDiscrete Optimization 2010 Lecture 2 Matroids & Shortest Paths
Matroids Shortest Paths Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Marc Uetz University of Twente m.uetz@utwente.nl Lecture 2: sheet 1 / 25 Marc Uetz Discrete Optimization Matroids
More informationFINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016)
FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) The final exam will be on Thursday, May 12, from 8:00 10:00 am, at our regular class location (CSI 2117). It will be closed-book and closed-notes, except
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More information10.4 The Kruskal Katona theorem
104 The Krusal Katona theorem 141 Example 1013 (Maximum weight traveling salesman problem We are given a complete directed graph with non-negative weights on edges, and we must find a maximum weight Hamiltonian
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More information4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**
4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published
More informationDiscrete Wiskunde II. Lecture 5: Shortest Paths & Spanning Trees
, 2009 Lecture 5: Shortest Paths & Spanning Trees University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Shortest Path Problem "#$%&'%()*%"()$#+,&- Given directed "#$%&'()*+,%+('-*.#/'01234564'.*,'7+"-%/8',&'5"4'84%#3
More informationLecture 1 : Probabilistic Method
IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing
More informationLifting theorems and facet characterization for a class of clique partitioning inequalities
Operations Research Letters 24 (1999) 235 243 www.elsevier.com/locate/orms Lifting theorems and facet characterization for a class of clique partitioning inequalities Hans-Jurgen Bandelt a, Maarten Oosten
More informationOn the minimum neighborhood of independent sets in the n-cube
Matemática Contemporânea, Vol. 44, 1 10 c 2015, Sociedade Brasileira de Matemática On the minimum neighborhood of independent sets in the n-cube Moysés da S. Sampaio Júnior Fabiano de S. Oliveira Luérbio
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationBounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia
Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationPRIMARY DECOMPOSITION FOR THE INTERSECTION AXIOM
PRIMARY DECOMPOSITION FOR THE INTERSECTION AXIOM ALEX FINK 1. Introduction and background Consider the discrete conditional independence model M given by {X 1 X 2 X 3, X 1 X 3 X 2 }. The intersection axiom
More informationParity Versions of 2-Connectedness
Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida
More informationEven Cycles in Hypergraphs.
Even Cycles in Hypergraphs. Alexandr Kostochka Jacques Verstraëte Abstract A cycle in a hypergraph A is an alternating cyclic sequence A 0, v 0, A 1, v 1,..., A k 1, v k 1, A 0 of distinct edges A i and
More informationNotes on MapReduce Algorithms
Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our
More informationOn shredders and vertex connectivity augmentation
On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the
More informationLecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.
Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of
More informationEfficient Reassembling of Graphs, Part 1: The Linear Case
Efficient Reassembling of Graphs, Part 1: The Linear Case Assaf Kfoury Boston University Saber Mirzaei Boston University Abstract The reassembling of a simple connected graph G = (V, E) is an abstraction
More informationA MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ
A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ NICOLAS FORD Abstract. The goal of this paper is to present a proof of the Nullstellensatz using tools from a branch of logic called model theory. In
More informationHamilton cycles and closed trails in iterated line graphs
Hamilton cycles and closed trails in iterated line graphs Paul A. Catlin, Department of Mathematics Wayne State University, Detroit MI 48202 USA Iqbalunnisa, Ramanujan Institute University of Madras, Madras
More informationChapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013
Chapter 2 Reductions and NP CS 573: Algorithms, Fall 2013 August 29, 2013 2.1 Reductions Continued 2.1.1 The Satisfiability Problem SAT 2.1.1.1 Propositional Formulas Definition 2.1.1. Consider a set of
More informationCS 350 Algorithms and Complexity
1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationEdge-pancyclicity of Möbius cubes
Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems
More informationGeneral Methods for Algorithm Design
General Methods for Algorithm Design 1. Dynamic Programming Multiplication of matrices Elements of the dynamic programming Optimal triangulation of polygons Longest common subsequence 2. Greedy Methods
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationLecture 14 - P v.s. NP 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation
More informationCopyright 2013 Springer Science+Business Media New York
Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media
More informationTheoretical Computer Science
Theoretical Computer Science 410 (2009) 2759 2766 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Note Computing the longest topological
More informationCS 350 Algorithms and Complexity
CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationThe minimum G c cut problem
The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationON THE CORE OF A GRAPHf
ON THE CORE OF A GRAPHf By FRANK HARARY and MICHAEL D. PLUMMER [Received 8 October 1965] 1. Introduction Let G be a graph. A set of points M is said to cover all the lines of G if every line of G has at
More informationBranchwidth of graphic matroids.
Branchwidth of graphic matroids. Frédéric Mazoit and Stéphan Thomassé Abstract Answering a question of Geelen, Gerards, Robertson and Whittle [2], we prove that the branchwidth of a bridgeless graph is
More informationInduced Subgraph Isomorphism on proper interval and bipartite permutation graphs
Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph
More informationRegular matroids without disjoint circuits
Regular matroids without disjoint circuits Suohai Fan, Hong-Jian Lai, Yehong Shao, Hehui Wu and Ju Zhou June 29, 2006 Abstract A cosimple regular matroid M does not have disjoint circuits if and only if
More informationHamiltonian problem on claw-free and almost distance-hereditary graphs
Discrete Mathematics 308 (2008) 6558 6563 www.elsevier.com/locate/disc Note Hamiltonian problem on claw-free and almost distance-hereditary graphs Jinfeng Feng, Yubao Guo Lehrstuhl C für Mathematik, RWTH
More informationTopics in Graph Theory
Topics in Graph Theory September 4, 2018 1 Preliminaries A graph is a system G = (V, E) consisting of a set V of vertices and a set E (disjoint from V ) of edges, together with an incidence function End
More information(Refer Slide Time: 0:21)
Theory of Computation Prof. Somenath Biswas Department of Computer Science and Engineering Indian Institute of Technology Kanpur Lecture 7 A generalisation of pumping lemma, Non-deterministic finite automata
More informationAcyclic Colorings of Products of Cycles
Acyclic Colorings of Products of Cycles Robert E. Jamison Gretchen L. Matthews December 1, 005 Abstract An acyclic coloring of a graph G is a proper coloring of the vertex set of G such that G contains
More informationMINIMALLY NON-PFAFFIAN GRAPHS
MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect
More informationSelf-complementary circulant graphs
Self-complementary circulant graphs Brian Alspach Joy Morris Department of Mathematics and Statistics Burnaby, British Columbia Canada V5A 1S6 V. Vilfred Department of Mathematics St. Jude s College Thoothoor
More informationCMPSCI611: The Matroid Theorem Lecture 5
CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that
More informationClasses of Boolean Functions
Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationCS60007 Algorithm Design and Analysis 2018 Assignment 1
CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in
More informationk-degenerate Graphs Allan Bickle Date Western Michigan University
k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value
More informationGreedy Trees, Caterpillars, and Wiener-Type Graph Invariants
Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationTree-width and planar minors
Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.
More informationNP, polynomial-time mapping reductions, and NP-completeness
NP, polynomial-time mapping reductions, and NP-completeness In the previous lecture we discussed deterministic time complexity, along with the time-hierarchy theorem, and introduced two complexity classes:
More informationHierarchy among Automata on Linear Orderings
Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational
More informationPRGs for space-bounded computation: INW, Nisan
0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,
More informationPropositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications
What is discrete math? Propositional Logic The real numbers are continuous in the senses that: between any two real numbers there is a real number The integers do not share this property. In this sense
More informationIdentifying Graph Automorphisms Using Determining Sets
Identifying Graph Automorphisms Using Determining Sets Debra L. Boutin Department of Mathematics Hamilton College, Clinton, NY 13323 dboutin@hamilton.edu Submitted: May 31, 2006; Accepted: Aug 22, 2006;
More informationBBM402-Lecture 11: The Class NP
BBM402-Lecture 11: The Class NP Lecturer: Lale Özkahya Resources for the presentation: http://ocw.mit.edu/courses/electrical-engineering-andcomputer-science/6-045j-automata-computability-andcomplexity-spring-2011/syllabus/
More information