Distributed Weighted Vertex Cover via Maximal Matchings

Size: px
Start display at page:

Download "Distributed Weighted Vertex Cover via Maximal Matchings"

Transcription

1 839 Distributed Weighted Vertex Coer ia Maximal Matchings Fabrizio Grandoni 1, Jochen Könemann 2, and Alessandro Panconesi 1 1 Dipartimento di Informatica, Uniersità di Roma La Sapienza Via Salaria 113, Roma, Italy {grandoni,ale}@di.uniroma1.it 2 Department of Combinatorics and Optimization, Uniersity of Waterloo 200 Uniersity Aenue West, Waterloo, ONN2L 3G1, Canada jochen@math.uwaterloo.ca Abstract. In this paper we consider the problem of computing a minimumweight ertex-coer in an n-node, weighted, undirected graph G =V, E). We present a fully distributed algorithm for computing ertex coers of weight at most twice the optimum, in the case of integer weights. Our algorithm runs in an expected number of Ologn + logŵ ) communication rounds, where Ŵ is the aerage ertex-weight. The preious best algorithm for this problem requires Olognlogn + logŵ )) rounds and it is not fully distributed. For a maximal matching M in G it is a well-known fact that any ertex-coer in G needs to hae at least M ertices. Our algorithm is based on a generalization of this combinatorial lower-bound to the weighted setting. 1 Introduction We are gien an undirected graph G =V,E) and non-negatie ertex weights w W for all ertices V. Aertex coer is a subset C V such that each edge e E has at least one end-point in C. Intheminimum-weight ertex-coer problem we want to compute a ertex-coer of smallest total weight. Computing minimum-weight ertex-coers is NP-hard [4]. Papadimitriou and Yannakakis [14] show that the problem is APX-hard. More recently, Håstad [8] proes that there is no 7/6 ε)-approximation algorithm for the ertex-coer problem for any ε > 0 unless P = NP. On the positie side, the best known algorithms for the ertex coer problem are due to Bar-Yehuda and Een [1], and to Monien and Speckenmeyer [12]. These algorithms achiee an approximation ratio of 2 loglogn 2logn ). In graphs with maximum degree, Hochbaum [9] gies a 2 1/ )-approximation algorithm for the problem. This was subsequently improed by Halldórsson and Radhakrishnan [5] who present a 2 log )+O1) )-approximation algorithm. Finally, Halperin [6] presents the currently best algorithm for the problem with a performance ratio of 2 1 o1)) 2lnln ln ). In the distributed setting, it is known how to compute a 2-approximate ertex coer in the unweighted case. This can be achieed by computing a maximal matching in The first and third authors were supported with funding from EC Projects DELIS and EYES, and project WebMinds of the Italian Ministry of Uniersity and Research MIUR) L. Wang Ed.): COCOON 2005, LNCS 3595, pp , c Springer-Verlag Berlin Heidelberg 2005

2 840 Fabrizio Grandoni, Jochen Könemann, and Alessandro Panconesi the graph and by including the matched nodes in the coer. A maximal matching can be computed in Olog 4 n) rounds ia the algorithm of Hanckowiack et al. [7], and in O + log n) rounds ia the algorithm of Panconesi and Rizzi [13]. Both algorithms are deterministic. Maximal matchings can also be computed in an expected number of Ologn) rounds ia the randomized algorithm of Israeli and Itai [10]. For the weighted case a 2 + ε)-approximation can be computed deterministically in Olognlog 1 ε ) many rounds by using the algorithm of Khuller et al. [11]. Their algorithm is stated as a PRAM algorithm, but it is readily seen to be a bona fide distributed algorithm. Let Ŵ be the aerage weight. Then, by setting ε = 1/nŴ + 1), the latter algorithm computes a 2-approximate ertex coer in Olognlogn + logŵ )) communication rounds. Note that the aboe choice of ε requires global knowledge of the quantity nŵ. This assumption may not be realistic in all scenarios. In this paper we present an improed fully-distributed algorithm to compute a 2- approximate weighted ertex coer, in the case of integer weights. Our main result can be stated as follows: Theorem 1. There is a fully distributed algorithm which computes a 2-approximate weighted ertex coer in an expected number of Ologn + logŵ) communication rounds. The message size is OlogW) and the local computation done in each round is O log W)) in expectation. Our algorithm can be iewed as a generalization of the reduction from unweighted ertex coer to maximal matching. The basic idea is to expand each node of weight w into w micro-nodes 1),2)...,w ), and connect each i) to eery u j) wheneer u is an edge of the network. Then a maximal matching in the auxiliary graph is computed. The ertex coer is gien by the nodes such that all the corresponding micronodes are matched. If the maximal matching is computed ia the fully-distributed algorithm of Israeli and Itai, the algorithm halts in an expected number of Ologn + logŵ) rounds. A naie implementation of the matching algorithm by Israeli and Itai leads to pseudo-polynomial message and time complexity in each round. The main insight leading to the bounds on message-size and local computation time in Theorem 1 is to keep an implicit representation of the auxiliary graph and a maximal matching in it. The rest of this paper is organized as follows. In Section 2 we introduce some preliminaries. Our algorithm relies on a careful adaptation of the matching algorithm by Israeli and Itai. We present this adaptation in Section 3. Finally, Sections 4 and 5 deal with the naie and refined ersions of our weighted ertex coer algorithm, respectiely. 2 Preliminaries The minimum-weight ertex coer problem can be formulated as an integer linear program ILP): min V w x s.t. x + x u 1, u E; x {0,1}, V.

3 Distributed Weighted Vertex Coer ia Maximal Matchings 841 Each assignment of the ariables which satisfies the constraints feasible solution) corresponds to a ertex coer containing exactly the nodes with x = 1. By LP) we denote the natural linear programming relaxation of ILP). Let N) be the set of neighbors of.thelinear programming dual D)ofLP)is: max u E y u s.t. u N) y u w, V ; y u 0, u E. By weak duality e.g., see [2]), the alue of each feasible solution of D) is a lower bound for the alue of eery feasible solution of LP) and hence IPL). In this paper we consider a synchronous message-passing model of computation. The computation proceeds in rounds. In each round, a node can send/receie a message of unbounded size) to/from each one of its neighbors, and execute an unbounded amount of computation. No global knowledge is aailable including the number n of nodes in the graph). The algorithms presented can be easily modified so as to work in a non-faulty) asynchronous system also. By Bp), p [0,1], we denote a 0-1 Bernoulli random ariable, which takes alue one with probability p. Arandom bit is a Bernoulli ariable B0.5). 3 Distributed Maximal Matching A matching of a graph G =V,E) is a subset M E such that no two edges of M are incident to the same node. The results of the next sections are based on the following simplified ersion M of the distributed maximal-matching algorithm of Israeli and Itai [10]. Algorithm M works in phases, each one consisting of a constant number of rounds. In each phase, a matching is computed and the edges incident on matched nodes are remoed. The algorithm halts when no edge is left. The maximal matching is gien by the union of the matchings found in the different phases. In a gien phase a matching is computed in the following way. Let G =V,E ) be the current graph. By N ) and δ we denote the set of neighbors of and the degree of in G, respectiely. Each node randomly decides to be a sender or a receier with probability one half. Note that the same node may play a different role in different phases. Each sender u selects one neighbor N u) uniformly at random and makes a proposal to. Each receier which receies at least one proposal, selects one of the proponents arbitrarily) and accepts its proposal. The matching is gien by the edges corresponding to accepted proposals. Let a node be good if at least one third of its neighbors u hae degree δ u δ.to proe the bound on the number of rounds, we use the following simple combinatorial result [10]: Lemma 1. At least one half of the edges of a graph are incident to good nodes. Theorem 2. Algorithm M computes a maximal matching in Ologn) expected rounds. Proof. The correctness of the algorithm is triial.

4 842 Fabrizio Grandoni, Jochen Könemann, and Alessandro Panconesi We show that in each phase at least a constant fraction of the edges is remoed in expectation. This implies that the expected number of rounds is Ologn 2 )) = Ologn). Consider a good node of G in a gien phase. The probability P that accepts a proposal is lower bounded by: P ) ) u N 2δ ). u From the definition of good nodes: 1 1 ) u N 2δ ) u u N ):δ u δ 1 1 ) 2δ 1 1 ) δ /3 2δ e 1/6. Thus P 1 e 1/6 )/2 and the expected number of edges remoed is at least a fraction 1 e 1/6 )/4 of the total. 4 Distributed Vertex Coer ia Maximal Matchings In this section we present a simple pseudo-polynomial reduction from the problem of computing a 2-approximate ertex coer to the problem of computing a maximal matching in an auxiliary graph. Thanks to this reduction, a 2-approximate ertex coer can be computed in Ologn + logŵ) expected rounds ia algorithm M of section 3. Consider the following auxiliary graph G. For each node of G, G contains w micro-nodes 1),2)...w ). Two micro-nodes i) and u j) are adjacent if and only if u is an edge of G. In Figure 1 an example of the reduction is gien Fig. 1. A weighted graph G on the left) with the corresponding auxiliary graph G. A maximal matching M of G is indicated ia dashed lines. The dashed nodes of G form a ertex coer Let M be a maximal matching in G. ByVM) we denote the set of nodes of G such that all the corresponding micro-nodes i) are matched by M. Lemma 2. Set VM) is a 2-approximate ertex coer of G. Proof. Assume by contradiction that V M) is not a ertex coer. Thus there are two adjacent nodes and u in G which do not belong to V M). This implies that there are two adjacent micro-nodes i) and u j) in G which are not matched by M. Then the set M = M {i)u j)} is a matching, which contradicts the maximality of M.

5 Distributed Weighted Vertex Coer ia Maximal Matchings 843 Let apx and opt denote the weight of the ertex coer found and that of a minimum weight ertex coer, respectiely. Moreoer, let z be the number of micro-nodes in {1),2)...w )} that are matched by M. A feasible solution of D) is obtained by assigning to each dual ariable y u the number of edges of the kind i)u j) M. This solution is feasible since, for eery V: u N) y u = z w. By weak duality we obtain apx V z 2 u E y u 2opt and hence V M) is 2-approximate. Lemma 2 suggests a strategy to compute a 2-approximate ertex coer distributiely. The idea is to simulate the behaior of algorithm M on a irtual auxiliary graph G, and then to select the nodes in the ertex coer as suggested by Lemma 2. Specifically, each node simulates the execution of the algorithm on the corresponding micro-nodes i) in G. Wheneer two micro-nodes i) and u j) of G need to communicate, nodes and u are responsible for allowing such communication. The ertex coer is gien by the nodes such that all the corresponding micro-nodes i) are matched by the maximal matching computed. Since the irtual auxiliary graph contains OnŴ) nodes, the total number of rounds is OlognŴ)) = Ologn + logŵ). This naie application of Lemma 2 has two major drawbacks. The first problem is the large message size. In fact, in each phase all the micro-nodes of maysenda proposal to some micro-node of u. Thus the message size is ΩW). A second problem is the time complexity of the algorithm: consider a node in a gien phase. Each micro-node i) of, with probability one half, needs to select one neighbor out of Θ W) uniformly at random. This random selection can be performed in Θlog W)) expected time, assuming that the cost of generating a random bit is O1) e.g., see [3]). Thus the expected time complexity of each phase is ΩW log W)). In next section we show how to sole both problems by creating the matchings implicitly. 5 An Improed Algorithm In this section we present an improed fully distributed algorithm A for computing a 2- approximate ertex coer. Algorithm A still requires Ologn+logŴ) expected rounds, but it reduces the size of the messages to OlogW) and the expected time complexity of each phase to O log W )). The basic structure of algorithm A is analogous to the structure of the naie algorithm described in preious section: in each phase, a matching in the current auxiliary graph G is computed, and the matched nodes are remoed from G together with all the edges incident to them). The algorithm halts when no edge is left. The ertex coer is gien by the nodes such that all the corresponding micro-nodes i) are matched by one of the matchings computed. The main noelty in Algorithm A is that matchings are created implicitly: in each phase each node only knows the number of the corresponding matched micro-nodes. Intuitiely, this simplification is allowed by the symmetry properties of G: all the micro-nodes corresponding to a node hae the same degree and share the same neighborhood. This inariant is kept by all the induced subgraphs of G. Algorithm A, which is described in Figure 2, works in phases. Each phase consists of a constant number of communication rounds. Each node has an associated state

6 844 Fabrizio Grandoni, Jochen Könemann, and Alessandro Panconesi w = w ; N )=N), s = actie; while s = actie) { send w and receie w u to/ from all u N ); N )={u N) : w u > 0}; if N ) = 0) s = outside; else { compute the proposals p u); send p u) and receie p u ) to/ from all u N ); compute the counter-proposals c u); send c u) and receie c u ) to/ from all u N ); for all u N )) w = w c u) c u ); if w = 0) { send w to all u N ); s = inside; } } } Fig. 2. Protocol for node for 2-approximate ertex coer s, which is initially actie. In each phase, part of the actie nodes switch to the state inside or outside, and the algorithm terminates when no actie node is left. When a node leaes the actie state, it halts. At the end of the algorithm, the inside nodes form a ertex coer. In more details, each node has an associated residual weight w, which is initially w. The residual weight w can be interpreted as the number of micro-nodes i) of in the current auxiliary graph G. Note that all the micro-nodes i) haethesamedegree W = u N) w u. In each phase, the expected residual weight of actie nodes decreases. The decrease of w in a gien phase reflects the number of micro-nodes of that hae been matched in that phase. At the beginning of each phase, each actie node sends w to all its currently actie neighbors N ). The neighbors with w u = 0 are remoed from N ).IfN ) becomes empty, node switches to the outside state. In fact, in this case the degree W of the micro-nodes i) is zero, and thus they will neer be matched. Otherwise, sends a proposal p u) to each actie neighbor u N ). Thealue of p u) can be interpreted as the number of proposals directed from the micro-nodes of to the micro-nodes of u.letp be the sum of the proposals p u): p = u N ) p u). This quantity can be iewed as the number of micro-senders among 1),2)...w ). We postpone a detailed description of how proposals are fixed until later. For each proposal p u ) receied, node replies with a counter-proposal c u).the counter-proposal c u) can be interpreted as the number of micro-nodes of which accept proposals of micro-nodes of u.letc = w p be the number of micro-receiers

7 Distributed Weighted Vertex Coer ia Maximal Matchings 845 of. The sum of the counter-proposals for node then needs to be at most c.at the same time each counter-proposal c u) must not exceed the corresponding proposal p u ). Gien these restrictions we choose a feasible set of counter-proposals {c u)} u N ) arbitrarily such that their sum is maximum, i.e. { u N ) c u)=min c, u N ) } p u ). Eentually, node decrements w by the sum of all the counter-proposals c u) and c u ) which hae been sent and receied by, respectiely: w = w u N ) c u)+c u )). This decrement reflects the number of micro-nodes of which are matched in the considered phase. If w becomes zero, node sends w to all its neighbors for the last time) and switches to the inside state since all the corresponding micro-nodes are matched). We now show how proposals are fixed by each node. If the number w of micronodes i) is sufficiently small, the proposals p u) are fixed according to algorithm M. Otherwise, they are fixed in a more efficient way, while keeping the same expected alue. In more details, there are two different strategies, depending on whether w < 2δ or not, where δ = N ) is the number of currently actie neighbors of.ifw < 2δ, the proposals p u) are initially set to zero. Then, for w times, an actie neighbor u N ) is selected at random with probability proportional to w u, and the corresponding proposal p u) is incremented by one with probability one half. Note that each p u), considered separately, is the sum of w i.i.d. Bernoulli ariables Bw u/2w )): p u)= w i=1 w ) B u 2W. 1) Otherwise w 2δ ), the alue of each p u) is independently set to: p u)= w w u w 2W + B w u 2W w w ) u 2W. 2) Note that, in both cases, the sum p of the proposals is upper bounded by w.in the first case this is triially true. In the second case, this is a consequence of the small alue of δ : w p u) w ) u u N ) u N 2W ) + 1 = w 2 + δ w. Moreoer, in both cases E[p ]=w /2. The following technical property of proposals will be useful in later parts of the analysis. Lemma 3. For any two gien nodes and u N ) we hae E u, = E [ 1 1 w ) ] pu ) 1 1 ) w u /4 W u.

8 846 Fabrizio Grandoni, Jochen Könemann, and Alessandro Panconesi Proof. If w u < 2δ u, by Equation 1): E u, = E 1 1 ) w ) u i=1 B w ) w = E 1 1 ) w w u B w = = 1 w + w 1 1 )) w u w 1 1 ) w u /2 W u. Consider now the case w u 2δ u. By Equation 2), if w u w / ) 1: [ E u, E 1 1 ) ] w u w /2W u) w 1 1 ) w u w /4W u) w 1 1 ) w u /4 W u. Otherwise w uw /) < 1): ) E u, = E 1 1 ) w B uw w = 1 w u 1 1 ) w u /2 W u. Lemma 4. Algorithm A computes a 2-approximate ertex coer. Proof. The algorithm halts. In fact, the residual weight of each actie node decreases by at least one in each round with positie probability. It follows that the nodes which do not switch to the outside state, switch to the inside state in a finite expected number of rounds. Assume by contradiction that, at the end of the algorithm, the inside nodes do not form a ertex coer. This implies that there is an outside node which has at least one outside neighbor. Let switch to the state outside in phase p. At the beginning of phase p 1), all the neighbors of are either inside or actie nodes. Consider the actie neighbors of in phase p 1). These nodes are not actie any more when phase p starts. But they cannot switch to the state outside in phase p 1), since their actie degree is greater than zero in that phase. Thus they all switch to the state inside,whichis a contradiction. Let z be the difference between w and the final residual weight w.a feasible solution of D) is obtained by assigning to each dual ariable y u the sum of all the counter-proposals of the kind c u) and c u ).Letapx and opt be the weight of the ertex coer found and that of a minimum ertex coer, respectiely. By weak duality: apx V z 2 u E y u 2opt. Thus the ertex coer found is 2-approximate. Lemma 5. Algorithm A sends messages of size OlogW). Each phase of algorithm A has time complexity O log W)) in expectation. Proof. Both proposals and counter-proposals can be packed in messages of size OlogW). The time complexity of each phase is upper bounded by the cost of computing the proposals. Computing the proposals is as expensie as selecting O ) times an element out of O W) ones uniformly at random. Each random selection can be

9 Distributed Weighted Vertex Coer ia Maximal Matchings 847 performed by generating Olog W)) random bits in expectation. By assuming a O1) cost for generating a random bit, the total expected cost of each phase is O log W)). Recall that a node is good if at least one third of its neighbors hae degree smaller or equal than its own degree. Consider a node in G. The degree of all the micro-nodes corresponding to in G is W = u N) w u. Thus a micro-node i) is good if and only if: w u W 3. u N):W u W Note that, if a micro-node i) is good, all the micro-nodes j), j {1,2...w },are good and ice-ersa. We call a node of G heay if all its micro-nodes in G are good. The next obseration can be seen as the weighted analogue of Lemma 1. Lemma 6. Let E H E be the subset of edges incident to heay nodes. Then u EH w w u 1 2 u E w w u. Proof. Consider the auxiliary graph G. The number of edges of G that are incident to good nodes is {,u} EH w w u. Since the number of edges of G is {,u} E w w u,the claim follows from Lemma 1. We use the properties of heay nodes to proe the following bound on the number of rounds. Lemma 7. Algorithm A halts in Ologn + logŵ ) expected rounds. Proof. We show that the residual weight of heay nodes decreases by at least a positie constant factor in expectation in each phase. It follows from Lemma 6 that the same holds for the potential function: 0 u E w w u < nŵ) 2, thus implying the claim. Consider a heay node in a gien phase. Let w be the alues of w at the end of the phase. The residual weight of decreases by at least the sum of the counter-proposals c u) sent by : ) w w c u) =p + c 1 1 c min{c, p u )} u N ) Note that: 1 1 c min{c, p u )} u N ) u N ) ) = p +w p ) 1 1 c min{c, p u )}. u N ) ) 1 1 ) u N ) p u ) c u N ) 1 1 ) pu ) w. Thus: [ E[w ] w 2 + w 2 E 1 1 ) ] pu ) u N w ),

10 848 Fabrizio Grandoni, Jochen Könemann, and Alessandro Panconesi whereweusede[p ]=w /2. By Lemma 3 and the definition of heay nodes: [ E 1 1 ) ] pu ) u N w ) 1 1 ) w u 4 u N W ) u u N ) W u W 1 1 ) w u 4 W 1 1 ) W 12. W The right-hand side is at most e 1/12 and it follows that E[w ] w 1 + e 1/12 )/2. Lemmas 4, 5, and 7 together imply Theorem 1. References 1. R. Bar-Yehuda and S. Een. A linear-time approximation algorithm for the weighted ertex coer problem. Journal of Algorithms, 2: , V. Chátal. Linear programming. Freeman, T.H.Cormen,C.E.Leiserson,andR.L.Riest.Introduction to algorithms. MITPressand McGraw-Hill Book Company, 6th edition, M. R. Garey and D. S. Johnson. Computers and Intractability. A Guide to the Theory of NP-Completeness. Freemann, M. M. Halldórsson and J. Radhakrishnan. Greed is good: Approximating independent sets in sparse and bounded-degree graphs. In ACM Symposium on the Theory of Computing, pages , E. Halperin. Improed approximation algorithms for the ertex coer problem in graphs and hypergraphs. SIAM Journal on Computing, 315): , Oct M. Hańćkowiak, M. Karoński, and A. Panconesi. On the distributed complexity of computing maximal matchings. SIAM Journal on Discrete Mathematics, 151):41 57, J. Håstad. Some optimal inapproximability results. Journal of the ACM, 484): , July D. S. Hochbaum. Efficient bounds for the stable set, ertex coer, and set packing problems. Discrete Applied Mathematics, 6: , A. Israeli and A. Itai. A fast and simple randomized parallel algorithm for maximal matching. Information Processing Letters, 22:77 80, S. Khuller, U. Vishkin, and N. Young. A primal-dual parallel approximation technique applied to weighted set and ertex coer. Journal of Algorithms, 172): , B. Monien and E. Speckenmeyer. Ramsey numbers and an approximation algorithm for the ertex coer problem. Acta Informatica, 22: , A. Panconesi and R. Rizzi. Some simple distributed algorithms for sparse networks. DIST- COMP: Distributed Computing, 14, C. Papadimitriou and M. Yannakakis. Optimization, approximization and complexity classes. Journal of Computer and System Sciences, 43: , 1991.

Distributed Weighted Vertex Cover via Maximal Matchings

Distributed Weighted Vertex Cover via Maximal Matchings Distribted Weighted Vertex Coer ia Maximal Matchings FABRIZIO GRANDONI Uniersità di Roma Tor Vergata JOCHEN KÖNEMANN Uniersity of Waterloo and ALESSANDRO PANCONESI Sapienza Uniersità di Roma In this paper

More information

Optimization Problems in Multiple Subtree Graphs

Optimization Problems in Multiple Subtree Graphs Optimization Problems in Multiple Subtree Graphs Danny Hermelin Dror Rawitz February 28, 2010 Abstract We study arious optimization problems in t-subtree graphs, the intersection graphs of t- subtrees,

More information

Measure and Conquer: A Simple O( n ) Independent Set Algorithm

Measure and Conquer: A Simple O( n ) Independent Set Algorithm Measure and Conquer: A Simple O(2 0.288n ) Independent Set Algorithm Fedor V. Fomin 1, Fabrizio Grandoni 2, and Dieter Kratsch 3 1 Department of Informatics, Uniersity of Bergen, N-5020 Bergen, Norway,

More information

arxiv: v1 [math.co] 25 Apr 2016

arxiv: v1 [math.co] 25 Apr 2016 On the zone complexity of a ertex Shira Zerbib arxi:604.07268 [math.co] 25 Apr 206 April 26, 206 Abstract Let L be a set of n lines in the real projectie plane in general position. We show that there exists

More information

Polynomial-Solvability of N P-class Problems

Polynomial-Solvability of N P-class Problems Polynomial-Solability of N P-class Problems Anatoly Panyuko paniukoa@susu.ru arxi:1409.03755 [cs.cc] 24 Aug 2018 Abstract LetHamiltoniancomplement ofthegraphg = (V(G), E(G))betheminimal cardinality set

More information

A better approximation ratio for the Vertex Cover problem

A better approximation ratio for the Vertex Cover problem A better approximation ratio for the Vertex Cover problem George Karakostas Dept. of Computing and Software McMaster University October 5, 004 Abstract We reduce the approximation factor for Vertex Cover

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network

More information

Sampling Binary Contingency Tables with a Greedy Start

Sampling Binary Contingency Tables with a Greedy Start Sampling Binary Contingency Tables with a Greedy Start Iona Bezákoá Nayantara Bhatnagar Eric Vigoda Abstract We study the problem of counting and randomly sampling binary contingency tables. For gien row

More information

Network Flow Problems Luis Goddyn, Math 408

Network Flow Problems Luis Goddyn, Math 408 Network Flow Problems Luis Goddyn, Math 48 Let D = (V, A) be a directed graph, and let s, t V (D). For S V we write δ + (S) = {u A : u S, S} and δ (S) = {u A : u S, S} for the in-arcs and out-arcs of S

More information

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015

Lecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015 COMPSCI 532: Design and Analysis of Algorithms August 26, 205 Lecture Lecturer: Debmalya Panigrahi Scribe: Allen Xiao Oeriew In this lecture, we will define the maximum flow problem and discuss two algorithms

More information

arxiv: v1 [cs.dm] 21 Oct 2017

arxiv: v1 [cs.dm] 21 Oct 2017 Eliminating Odd Cycles by Remoing a Matching Carlos V.G.C. Lima 1,, Dieter Rautenbach 2,, Uéerton S. Souza 3,, and Jayme L. Szwarcfiter 4 1 Departament of Coputer Science, Federal Uniersity of Minas Gerais,

More information

Approximation Basics

Approximation Basics Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for

More information

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem

From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem From Primal-Dual to Cost Shares and Back: A Stronger LP Relaxation for the Steiner Forest Problem Jochen Könemann 1, Stefano Leonardi 2, Guido Schäfer 2, and Stefan van Zwam 3 1 Department of Combinatorics

More information

Towards Universal Cover Decoding

Towards Universal Cover Decoding International Symposium on Information Theory and its Applications, ISITA2008 Auckland, New Zealand, 7-10, December, 2008 Towards Uniersal Coer Decoding Nathan Axig, Deanna Dreher, Katherine Morrison,

More information

THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH

THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH ROCKY MOUNTAIN JOURNAL OF MATHEMATICS Volume 46, Number 4, 2016 THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH HONG-HAI LI AND LI ZOU ABSTRACT. The matching energy of a graph was introduced

More information

Increasing the Span of Stars

Increasing the Span of Stars Increasing the Span of Stars Ning Chen Roee Engelberg C. Thach Nguyen Prasad Raghavendra Atri Rudra Gynanit Singh Department of Computer Science and Engineering, University of Washington, Seattle, WA.

More information

NP and NP-Completeness

NP and NP-Completeness 0/2/206 Algorithms NP-Completeness 7- Algorithms NP-Completeness 7-2 Efficient Certification NP and NP-Completeness By a solution of a decision problem X we understand a certificate witnessing that an

More information

An Explicit Lower Bound of 5n o(n) for Boolean Circuits

An Explicit Lower Bound of 5n o(n) for Boolean Circuits An Eplicit Lower Bound of 5n o(n) for Boolean Circuits Kazuo Iwama, Oded Lachish, Hiroki Morizumi, and Ran Raz Graduate School of Informatics, Kyoto Uniersity, Kyoto, JAPAN {iwama, morizumi}@kuis.kyoto-u.ac.jp

More information

DECOMPOSING 4-REGULAR GRAPHS INTO TRIANGLE-FREE 2-FACTORS

DECOMPOSING 4-REGULAR GRAPHS INTO TRIANGLE-FREE 2-FACTORS SIAMJ.DISCRETE MATH. c 1997 Society for Industrial and Applied Mathematics Vol. 10, No. 2, pp. 309 317, May 1997 011 DECOMPOSING 4-REGULAR GRAPHS INTO TRIANGLE-FREE 2-FACTORS EDWARD BERTRAM AND PETER HORÁK

More information

Integer Parameter Synthesis for Real-time Systems

Integer Parameter Synthesis for Real-time Systems 1 Integer Parameter Synthesis for Real-time Systems Aleksandra Joanoić, Didier Lime and Oliier H. Roux École Centrale de Nantes - IRCCyN UMR CNRS 6597 Nantes, France Abstract We proide a subclass of parametric

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

The optimal pebbling number of the complete m-ary tree

The optimal pebbling number of the complete m-ary tree Discrete Mathematics 222 (2000) 89 00 www.elseier.com/locate/disc The optimal pebbling number of the complete m-ary tree Hung-Lin Fu, Chin-Lin Shiue Department of Applied Mathematics, National Chiao Tung

More information

arxiv: v1 [cs.dc] 9 Sep 2008

arxiv: v1 [cs.dc] 9 Sep 2008 AN OPTIMAL LOCAL APPROXIMATION ALGORITHM FOR MAX-MIN LINEAR PROGRAMS PATRIK FLORÉEN AND JOEL KAASINEN AND PETTERI KASKI AND JUKKA SUOMELA arxi:0809.14891 [cs.dc] 9 Sep 2008 Helsinki Institute for Information

More information

Improved Bounds on the L(2, 1)-Number of Direct and Strong Products of Graphs

Improved Bounds on the L(2, 1)-Number of Direct and Strong Products of Graphs IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR AERS VOL. ***, NO. ***, *** 2007 Improed Bounds on the L(2, )-Number of Direct and Strong roducts of Graphs Zhendong Shao, Sandi Klažar, Daid Zhang,

More information

Multicommodity Flows and Column Generation

Multicommodity Flows and Column Generation Lecture Notes Multicommodity Flows and Column Generation Marc Pfetsch Zuse Institute Berlin pfetsch@zib.de last change: 2/8/2006 Technische Universität Berlin Fakultät II, Institut für Mathematik WS 2006/07

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Discrepancy Theory in Approximation Algorithms

Discrepancy Theory in Approximation Algorithms Discrepancy Theory in Approximation Algorithms Rajat Sen, Soumya Basu May 8, 2015 1 Introduction In this report we would like to motivate the use of discrepancy theory in algorithms. Discrepancy theory

More information

Balanced Partitions of Vector Sequences

Balanced Partitions of Vector Sequences Balanced Partitions of Vector Sequences Imre Bárány Benjamin Doerr December 20, 2004 Abstract Let d,r N and be any norm on R d. Let B denote the unit ball with respect to this norm. We show that any sequence

More information

Lecture J. 10 Counting subgraphs Kirchhoff s Matrix-Tree Theorem.

Lecture J. 10 Counting subgraphs Kirchhoff s Matrix-Tree Theorem. Lecture J jacques@ucsd.edu Notation: Let [n] [n] := [n] 2. A weighted digraph is a function W : [n] 2 R. An arborescence is, loosely speaking, a digraph which consists in orienting eery edge of a rooted

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

The adjacent vertex-distinguishing total chromatic number of 1-tree

The adjacent vertex-distinguishing total chromatic number of 1-tree The adjacent ertex-distinguishing total chromatic number of 1-tree Haiying Wang The School of Information Engineering China Uniersity of Geosciences(Beijing) Beijing 100083, P.R.China Abstract Let G =

More information

Math Mathematical Notation

Math Mathematical Notation Math 160 - Mathematical Notation Purpose One goal in any course is to properly use the language of that subject. Finite Mathematics is no different and may often seem like a foreign language. These notations

More information

arxiv: v1 [math.gt] 2 Nov 2010

arxiv: v1 [math.gt] 2 Nov 2010 CONSTRUCTING UNIVERSAL ABELIAN COVERS OF GRAPH MANIFOLDS HELGE MØLLER PEDERSEN arxi:101105551 [mathgt] 2 No 2010 Abstract To a rational homology sphere graph manifold one can associate a weighted tree

More information

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks

On the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks On the Linear Threshold Model for Diffusion of Innoations in Multiplex Social Networks Yaofeng Desmond Zhong 1, Vaibha Sriastaa 2 and Naomi Ehrich Leonard 1 Abstract Diffusion of innoations in social networks

More information

On diamond-free subposets of the Boolean lattice

On diamond-free subposets of the Boolean lattice On diamond-free subposets of the Boolean lattice Lucas Kramer, Ryan R Martin, Michael Young 2 Department of Mathematics, Iowa State Uniersity, Ames, Iowa 500 Abstract The Boolean lattice of dimension two,

More information

The Simplex Algorithm in Dimension Three 1

The Simplex Algorithm in Dimension Three 1 The Simplex Algorithm in Dimension Three 1 Volker Kaibel 2 Rafael Mechtel 3 Micha Sharir 4 Günter M. Ziegler 3 Abstract We inestigate the worst-case behaior of the simplex algorithm on linear programs

More information

Solving Connected Dominating Set Faster than 2 n

Solving Connected Dominating Set Faster than 2 n Solving Connected Dominating Set Faster than 2 n Fedor V. Fomin 1, Fabrizio Grandoni 2, and Dieter Kratsch 3 1 Department of Informatics, University of Bergen, N-5020 Bergen, Norway, fomin@ii.uib.no 2

More information

arxiv: v1 [cs.dm] 9 Sep 2016

arxiv: v1 [cs.dm] 9 Sep 2016 O(f) Bi-Approximation for Capacitated Covering with Hard Capacities Mong-Jen Kao 1, Hai-Lun Tu 2, and D.T. Lee 1,2 1 Institute of Information Science, Academia Sinica, Taipei, Taiwan. 2 Department of Computer

More information

Algorithms and Data Structures 2014 Exercises and Solutions Week 14

Algorithms and Data Structures 2014 Exercises and Solutions Week 14 lgorithms and ata tructures 0 xercises and s Week Linear programming. onsider the following linear program. maximize x y 0 x + y 7 x x 0 y 0 x + 3y Plot the feasible region and identify the optimal solution.

More information

P(c y) = W n (y c)p(c)

P(c y) = W n (y c)p(c) ENEE 739C: Adanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 9 (draft; /7/3). Codes defined on graphs. The problem of attaining capacity. Iteratie decoding. http://www.enee.umd.edu/

More information

An Improved Approximation Algorithm for Maximum Edge 2-Coloring in Simple Graphs

An Improved Approximation Algorithm for Maximum Edge 2-Coloring in Simple Graphs An Improved Approximation Algorithm for Maximum Edge 2-Coloring in Simple Graphs Zhi-Zhong Chen Ruka Tanahashi Lusheng Wang Abstract We present a polynomial-time approximation algorithm for legally coloring

More information

G 2(X) X SOLVABILITY OF GRAPH INEQUALITIES. 1. A simple graph inequality. Consider the diagram in Figure 1.

G 2(X) X SOLVABILITY OF GRAPH INEQUALITIES. 1. A simple graph inequality. Consider the diagram in Figure 1. SOLVABILITY OF GRAPH INEQUALITIES MARCUS SCHAEFER AND DANIEL ŠTEFANKOVIČ Abstract. We inestigate a new type of graph inequality (in the tradition of Cetkoić and Simić [Contributions to Graph Theory and

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.edu 6.85J / 8.5J Advanced Algorithms Fall 008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 8.5/6.85 Advanced Algorithms

More information

Tight Bounds for Clock Synchronization

Tight Bounds for Clock Synchronization Tight Bounds for Clock Synchronization [Extended Abstract] Christoph Lenzen Computer Engineering and Networks Laboratory (TIK) ETH Zurich, 8092 Zurich, Switzerland lenzen@tik.ee.ethz.ch Thomas Locher Computer

More information

P,NP, NP-Hard and NP-Complete

P,NP, NP-Hard and NP-Complete P,NP, NP-Hard and NP-Complete We can categorize the problem space into two parts Solvable Problems Unsolvable problems 7/11/2011 1 Halting Problem Given a description of a program and a finite input, decide

More information

The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost

The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost Christina Büsing Sarah Kirchner Arie Koster Annika Thome October 6, 2015 Abstract The budgeted minimum cost flow problem (BMCF(K)) with unit

More information

Hölder-type inequalities and their applications to concentration and correlation bounds

Hölder-type inequalities and their applications to concentration and correlation bounds Hölder-type inequalities and their applications to concentration and correlation bounds Christos Pelekis * Jan Ramon Yuyi Wang Noember 29, 2016 Abstract Let Y, V, be real-alued random ariables haing a

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

PRAMs. M 1 M 2 M p. globaler Speicher

PRAMs. M 1 M 2 M p. globaler Speicher PRAMs A PRAM (parallel random access machine) consists of p many identical processors M,..., M p (RAMs). Processors can read from/write to a shared (global) memory. Processors work synchronously. M M 2

More information

Chromatic characterization of biclique cover. Denis Cornaz. Jean Fonlupt. Equipe Combinatoire, UFR 921, Universite Pierre et Marie Curie, 4 place

Chromatic characterization of biclique cover. Denis Cornaz. Jean Fonlupt. Equipe Combinatoire, UFR 921, Universite Pierre et Marie Curie, 4 place Chromatic characterization of biclique coer Denis Cornaz France Telecom R&D, 38-40 rue du General Leclerc, Issy-les-Moulineaux 92794 Jean Fonlupt Equipe Combinatoire, UFR 921, Uniersite Pierre et Marie

More information

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an

More information

Bounding the Number of Minimal Dominating Sets: a Measure and Conquer Approach

Bounding the Number of Minimal Dominating Sets: a Measure and Conquer Approach Bounding the Number of Minimal Dominating Sets: a Measure and Conquer Approach Fedor V Fomin 1, Fabrizio Grandoni 2, Artem V Pyatkin 1, and Alexey A Stepanov 1 1 Department of Informatics, University of

More information

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction U.C. Berkeley Handout N2 CS294: PCP and Hardness of Approximation January 23, 2006 Professor Luca Trevisan Scribe: Luca Trevisan Notes for Lecture 2 These notes are based on my survey paper [5]. L.T. Statement

More information

5. Biconnected Components of A Graph

5. Biconnected Components of A Graph 5. Biconnected Components of A Graph If one city s airport is closed by bad eather, can you still fly beteen any other pair of cities? If one computer in a netork goes don, can a message be sent beteen

More information

Lecture 15 (Oct 6): LP Duality

Lecture 15 (Oct 6): LP Duality CMPUT 675: Approximation Algorithms Fall 2014 Lecturer: Zachary Friggstad Lecture 15 (Oct 6): LP Duality Scribe: Zachary Friggstad 15.1 Introduction by Example Given a linear program and a feasible solution

More information

Locality Lower Bounds

Locality Lower Bounds Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1

More information

Variants of MAX WEIGHTED SAT and MIN WEIGHTED SAT have been considered in the literature, dened by making restrictions on the size of the clauses in t

Variants of MAX WEIGHTED SAT and MIN WEIGHTED SAT have been considered in the literature, dened by making restrictions on the size of the clauses in t On the Complexity of Approximating Weighted Satisability Problems (Extended Abstract) Paola Alimonti yzx Giorgio Ausiello y Loredana Giovaniello z Marco Protasi z Abstract The maximum weighted satisability

More information

Topics in Theoretical Computer Science April 08, Lecture 8

Topics in Theoretical Computer Science April 08, Lecture 8 Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

The complexity of acyclic subhypergraph problems

The complexity of acyclic subhypergraph problems The complexity of acyclic subhypergraph problems David Duris and Yann Strozecki Équipe de Logique Mathématique (FRE 3233) - Université Paris Diderot-Paris 7 {duris,strozecki}@logique.jussieu.fr Abstract.

More information

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Proc. 4th TAMC, 27 Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Michael Dom, Jiong Guo, and Rolf Niedermeier Institut für Informatik, Friedrich-Schiller-Universität

More information

Sharing the cost more efficiently: Improved Approximation for Multicommodity Rent-or-Buy

Sharing the cost more efficiently: Improved Approximation for Multicommodity Rent-or-Buy Sharing the cost more efficiently: Improved Approximation for Multicommodity Rent-or-Buy L. Becchetti J. Könemann S. Leonardi M. Pál September 1, 2005 Abstract In the multicommodity rent-or-buy (MROB)

More information

arxiv: v1 [math.co] 10 Jun 2018

arxiv: v1 [math.co] 10 Jun 2018 Some Mixed Graphs Determined by arxi:1806.036341 [math.co] 10 Jun 2018 Their Spectrum S. Akbari a, A. Ghafari a, M. Nahi b and M.A. Nematollahi a a Department of Mathematical Sciences, Sharif Uniersity

More information

Improved Approximation for Single-Sink Buy-at-Bulk

Improved Approximation for Single-Sink Buy-at-Bulk Improved Approximation for Single-Sin Buy-at-Bul Fabrizio Grandoni and Giuseppe F. Italiano 2 Dipartimento di Informatica, Università di Roma La Sapienza, Via Salaria 3, 0098 Roma, Italy. grandoni@di.uniroma.it

More information

New Upper Bounds for the Heights of Some Light Subgraphs in 1-Planar Graphs with High Minimum Degree

New Upper Bounds for the Heights of Some Light Subgraphs in 1-Planar Graphs with High Minimum Degree New Upper Bounds for the Heights of Some Light Subgraphs in 1-Planar Graphs with High Minimum Degree Xin Zhang, Jian-Liang Wu, Guizhen Liu To cite this ersion: Xin Zhang, Jian-Liang Wu, Guizhen Liu. New

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November-2016 ISSN Nullity of Expanded Smith graphs

International Journal of Scientific & Engineering Research, Volume 7, Issue 11, November-2016 ISSN Nullity of Expanded Smith graphs 85 Nullity of Expanded Smith graphs Usha Sharma and Renu Naresh Department of Mathematics and Statistics, Banasthali Uniersity, Banasthali Rajasthan : usha.sharma94@yahoo.com, : renunaresh@gmail.com Abstract

More information

Spanning Trees with many Leaves in Regular Bipartite Graphs.

Spanning Trees with many Leaves in Regular Bipartite Graphs. Spanning Trees with many Leaves in Regular Bipartite Graphs. Emanuele G. Fusco and Angelo Monti Dipartimento di Informatica Sapienza, Università di Roma, via Salaria, 113-00198 Rome, Italy {fusco, monti}@di.uniroma1.it

More information

Enumerating minimal connected dominating sets in graphs of bounded chordality,

Enumerating minimal connected dominating sets in graphs of bounded chordality, Enumerating minimal connected dominating sets in graphs of bounded chordality, Petr A. Golovach a,, Pinar Heggernes a, Dieter Kratsch b a Department of Informatics, University of Bergen, N-5020 Bergen,

More information

Rapidly mixing Markov chains

Rapidly mixing Markov chains Randomized and Approximation Algorithms Leonard Schulman Scribe: Rajneesh Hegde Georgia Tech, Fall 997 Dec., 997 Rapidly mixing Marko chains Goal: To sample from interesting probability distributions.

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

A spectral Turán theorem

A spectral Turán theorem A spectral Turán theorem Fan Chung Abstract If all nonzero eigenalues of the (normalized) Laplacian of a graph G are close to, then G is t-turán in the sense that any subgraph of G containing no K t+ contains

More information

1 Introduction and Results

1 Introduction and Results Discussiones Mathematicae Graph Theory 20 (2000 ) 7 79 SOME NEWS ABOUT THE INDEPENDENCE NUMBER OF A GRAPH Jochen Harant Department of Mathematics, Technical University of Ilmenau D-98684 Ilmenau, Germany

More information

The Evolution of Grötzsch s Theorem

The Evolution of Grötzsch s Theorem The Eolution of Grötzsch s Theorem Lauren DeDieu September 26, 2011 A thesis submitted in partial fulfillment of the requirements for MATH 490, in the department of Mathematics, Physics and Geology, Cape

More information

Multi-criteria approximation schemes for the resource constrained shortest path problem

Multi-criteria approximation schemes for the resource constrained shortest path problem Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract

More information

Solving Connected Dominating Set Faster than 2 n

Solving Connected Dominating Set Faster than 2 n Solving Connected Dominating Set Faster than 2 n Fedor V. Fomin. Fabrizio Grandoni Dieter Kratsch Abstract In the connected dominating set problem we are given an n-node undirected graph, and we are asked

More information

arxiv: v2 [math.co] 12 Jul 2009

arxiv: v2 [math.co] 12 Jul 2009 A Proof of the Molecular Conjecture Naoki Katoh and Shin-ichi Tanigawa arxi:0902.02362 [math.co] 12 Jul 2009 Department of Architecture and Architectural Engineering, Kyoto Uniersity, Kyoto Daigaku Katsura,

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

Lecture 6: Graphical Models

Lecture 6: Graphical Models Lecture 6: Graphical Models Kai-Wei Chang CS @ Uniersity of Virginia kw@kwchang.net Some slides are adapted from Viek Skirmar s course on Structured Prediction 1 So far We discussed sequence labeling tasks:

More information

Online Companion to Pricing Services Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions?

Online Companion to Pricing Services Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions? Online Companion to Pricing Serices Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions? Gérard P. Cachon Pnina Feldman Operations and Information Management, The Wharton School, Uniersity

More information

Randomized Protocols for Asynchronous Consensus

Randomized Protocols for Asynchronous Consensus Randomized Protocols for Asynchronous Consensus Alessandro Panconesi DSI - La Sapienza via Salaria 113, piano III 00198 Roma, Italy One of the central problems in the Theory of (feasible) Computation is

More information

Approximation algorithms for cycle packing problems

Approximation algorithms for cycle packing problems Approximation algorithms for cycle packing problems Michael Krivelevich Zeev Nutov Raphael Yuster Abstract The cycle packing number ν c (G) of a graph G is the maximum number of pairwise edgedisjoint cycles

More information

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical

More information

A Robust APTAS for the Classical Bin Packing Problem

A Robust APTAS for the Classical Bin Packing Problem A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,

More information

The Maximum Flow Problem with Disjunctive Constraints

The Maximum Flow Problem with Disjunctive Constraints The Maximum Flow Problem with Disjunctive Constraints Ulrich Pferschy Joachim Schauer Abstract We study the maximum flow problem subject to binary disjunctive constraints in a directed graph: A negative

More information

Separating Hierarchical and General Hub Labelings

Separating Hierarchical and General Hub Labelings Separating Hierarchical and General Hub Labelings Andrew V. Goldberg 1 Ilya Razenshteyn 2 Ruslan Savchenko 3 1 Microsoft Research Silicon Valley 2 CSAIL, MIT 3 Moscow State University June 23, 2013 Overview

More information

On (a, d)-vertex-antimagic total labeling of Harary graphs

On (a, d)-vertex-antimagic total labeling of Harary graphs On (a, d)-ertex-antimagic total labeling of Harary graphs M. Hussain 1, Kashif Ali 1, M. T. Rahim, Edy Tri Baskoro 3 1 COMSATS Institute of Information Technology, Lahore Campus, Pakistan {muhammad.hussain,kashif.ali}@ciitlahore.edu.pk

More information

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms

CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better

More information

The Steiner k-cut Problem

The Steiner k-cut Problem The Steiner k-cut Problem Chandra Chekuri Sudipto Guha Joseph (Seffi) Naor September 23, 2005 Abstract We consider the Steiner k-cut problem which generalizes both the k-cut problem and the multiway cut

More information

The cover pebbling theorem

The cover pebbling theorem The coer pebbling theorem Jonas Sjöstrand Department of Mathematics KTH, SE-100 44 Stockholm, Sweden jonass@kth.se Submitted: Oct 21, 2004; Accepted: No 4, 2005; Published: No 15, 2005 Mathematics Subject

More information

2 Notation and Preliminaries

2 Notation and Preliminaries On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that

More information

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover duality 1 Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover Guy Kortsarz duality 2 The set cover problem with uniform costs Input: A universe U and a collection of subsets

More information

The Consecutive Ones Submatrix Problem for Sparse Matrices. Jinsong Tan 1 and Louxin Zhang 2

The Consecutive Ones Submatrix Problem for Sparse Matrices. Jinsong Tan 1 and Louxin Zhang 2 Algorithmica (2007) 48: 287 299 DOI: 10.1007/s00453-007-0118-z Algorithmica 2007 Springer Science+Business Media, Inc. The Consecutive Ones Submatrix Problem for Sparse Matrices Jinsong Tan 1 and Louxin

More information

arxiv: v1 [math.pr] 25 Jun 2015

arxiv: v1 [math.pr] 25 Jun 2015 Random walks colliding before getting trapped Louigi Addario-Berry Roberto I. Olieira Yual Peres Perla Sousi ari:156.78451 math.pr 25 Jun 215 Abstract Let P be the transition matrix of a finite, irreducible

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

Distributed Distance-Bounded Network Design Through Distributed Convex Programming

Distributed Distance-Bounded Network Design Through Distributed Convex Programming Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design

More information

Unit 11: Vectors in the Plane

Unit 11: Vectors in the Plane 135 Unit 11: Vectors in the Plane Vectors in the Plane The term ector is used to indicate a quantity (such as force or elocity) that has both length and direction. For instance, suppose a particle moes

More information

Approximability of Packing Disjoint Cycles

Approximability of Packing Disjoint Cycles Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca

More information

Generating Maximal Independent Sets for Hypergraphs with Bounded Edge-Intersections

Generating Maximal Independent Sets for Hypergraphs with Bounded Edge-Intersections Generating Maximal Independent Sets for Hypergraphs with Bounded Edge-Intersections Endre Boros 1, Khaled Elbassioni 1, Vladimir Gurvich 1, and Leonid Khachiyan 2 1 RUTCOR, Rutgers University, 640 Bartholomew

More information

Complexity of determining the most vital elements for the 1-median and 1-center location problems

Complexity of determining the most vital elements for the 1-median and 1-center location problems Complexity of determining the most vital elements for the -median and -center location problems Cristina Bazgan, Sonia Toubaline, and Daniel Vanderpooten Université Paris-Dauphine, LAMSADE, Place du Maréchal

More information

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point Gérard Cornuéjols 1 and Yanjun Li 2 1 Tepper School of Business, Carnegie Mellon

More information