The Random Edge Rule on Three-Dimensional Linear Programs 1 (extended abstract)
|
|
- Tabitha Harvey
- 5 years ago
- Views:
Transcription
1 arxi:math/ [math.co] 9 Jan 2003 The Random Edge Rule on Three-Dimensional Linear Programs 1 (extended abstract) Volker Kaibel 2 Rafael Mechtel 2 Micha Sharir 3 Günter M. Ziegler 2 October 10, 2017 Abstract The worst-case expected length of the path taken by the simplex algorithm with the Random Edge piot rule on a 3-dimensional linear program with n constraints is shown to be bounded by for large enough n. 1 Introduction n f(n) n The Random Edge piot rule is undoubtedly the most natural, and simplest (randomized) piot rule for the simplex algorithm: At each iteration, proceed from the current ertex of the polyhedron P of feasible solutions to an improing neighbor, chosen uniformly at random in the one-dimensional skeleton (i.e., the graph) of P. 1 Work on this paper by Micha Sharir was supported by NSF Grants CCR and CCR , by a grant from the U.S.-Israeli Binational Science Foundation, by a grant from the Israel Science Fund (for a Center of Excellence in Geometric Computing), and by the Hermann Minkowski MINERVA Center for Geometry at Tel Ai Uniersity. Volker Kaibel and Günter M. Ziegler were supported by the DFG-Forschergruppe Algorithmen, Struktur, Zufall (FOR 413/1-1, Zi 475/3-1). Günter M. Ziegler was supported by a DFG Leibniz grant. Part of the work was done during the workshop Towards the Peak at La Claustra, Switzerland, August MA6 2,TUBerlin, 10623Berlin, Germany, {kaibel,mechtel,ziegler}@math.tu-berlin.de 3 SchoolofComputerScience,TelAiUniersity,Tel-Ai69978,IsraelandCourantInstituteof Mathematical Sciences, New York Uniersity, New York, NY 10012, USA, michas@post.tau.ac.il 1
2 Despite its simplicity, this algorithm until now has resisted almost all attempts to analyze its worst-case behaior, with a few exceptions for special cases, among them the linear assignment problem(toey [6]), certain linear programs on cubes, including the Klee-Minty cubes (Kelly [4], Gärtner, Henk & Ziegler [2]), and d-dimensional linear programs (i.e., dim(p) = d) with at most d+2 constraints (Gärtner et al. [3]). All known results leae open the possibility that the Random Edge piot rule yields a strongly polynomial time algorithm it might be een quadratic. In particular, it is not fooled by the deformed products (defined by Amenta and Ziegler [1]), which yield the well-known exponential examples for all the classical deterministic piot rules. Here, we only treat the case of 3-dimensional linear programs, which, of course, is soled in linear time by eery (een deterministic) finite ariant of the simplex algorithm. Neertheless, due to the remarks made aboe, it seems interesting to analyze the Random Edge piot rule for this case and here too, it seems that accurate analysis of Random Edge is quite hard. With the usual reductions (see, e.g., Ziegler [7, Lect. 3]), we may assume that our linear program is min{x 3 : x P}, where P is a 3-dimensional simple polytope (its graph is 3-regular) with exactly n facets, and hence 2n 4 ertices and 3n 6 edges, and no two ertices hae the same objectie function alue x 3. Thus we hae an ordering of the ertices 2n 5, 2n 6,..., 1, 0 by decreasing objectie function (i.e., by height). Here 0 = min is the unique minimal (lowest) ertex of the linear program, while 2n 5 = max is the unique maximal (highest) ertex. The expected length of the path (i.e., the number of piot steps) taken by the simplex algorithm on the linear program, starting at ertex of P and using the Random Edge rule, is then gien by E( 0 ) = 0 and E() = 1+ 1 d E(w j ) ( 0 ), d j=1 where w 1,...,w d are the lower neighbors of. It is easy to see that (in addition to the unique maximal ertex and the unique minimal ertex) there are n 3 ertices with d = 1 (1-ertices) and n 3 ertices with d = 2 (2-ertices); this is the 3-dimensional case of the Dehn-Sommerille equations [7, Thm. 8.21]. Define f(n) to be the maximum expected number of piot steps taken by the Random Edge algorithm on any 3-dimensional linear program with n constraints. While it is quite straightforward to construct a sequence of examples with E() 4 3 n const, our results in Section 2 (Theorem 2.2) show f(n) n for infinitely many n in arithmetic progression ( 1721 = ). In Section 3 we proe f(n) n
3 (Theorem 3.2). Both results taken together, this yields that n f(n) n holds for all large enough n. In particular, asymptotically f(n) lies between ( 4+ε) n 3 and ( 3 ε) n for some ε > 0. Determining the right coefficient seems, howeer, 2 to be ery hard. 2 Lower Bounds The expected number of piot steps required by the simplex algorithm using Random Edge only depends on the graph of the polytope, directed ia the objectie function. Therefore, we will describe our examples yielding lower bounds on f(n) by the corresponding directed graphs. The following result proides a nice certificate for a directed graph to come from a 3-dimensional linear program. Theorem 2.1 (Mihalisin and Klee [5]). A directed graph D (without loops and parallel arcs) is induced by a 3-dimensional linear program if and only if it is planar and 3-connected (as an undirected graph), it is acyclic with a unique source and a unique sink, it has a unique local sink in eery face cycle (these are the non-separating induced cycles), and it admits three directed paths from its source to its sink that hae disjoint sets of interior nodes. 2.1 Duals of Cyclic Polytopes Example 1. Our first sequence of examples are wedges, i.e., they are combinatorially equialent to duals of cyclic polytopes. Figure 1 depicts the orientations of the edges. Here, as well as in the sequel, our conention is that the ordering of the ertices from left to right in the figure defines the (decreasing) ordering of the ertices according to the objectie function. It is easy to see that the conditions of the Mihalisin Klee theorem are satisfied. 2n 5 2n 6 2n 8 2j+1 2j 2 2n j 2j = min Figure 1: The example on the dual cyclic polytope. 3
4 For the expected number of piot steps E( i ), we then hae the starting alues E( 0 ) = 0 and E( 1 ) = 1, and the recurrences E( 2j ) = E( 2j 1 )+1, E( 2j+1 ) = 1 2( E(2j )+E( 2j 2 ) ) +1 for 0 < j n 4. Thus, using induction, we obtain E( 2j )+2E( 2j+1 ) = 4j +2 for 0 j n 4. In particular, for j = n 4 this yields { } max E( 2n 8 ),E( 2n 7 ) 2.2 Improed Lower Bounds 4n The next examples are based on the construction of a backbone polytope : This will be a simple 3-polytope P k with k +2 facets and 2k ertices, of which k ertices k 1,..., 0 form a decreasing chain, such that 0 is the minimal ertex, and i 1 is the only lower neighbor of i, for i > 0. Constructing the backbone. We start with the simplex, obtained for k = 2 with ertices w 0,w 1, 1, 0, as shown on the left. We then inductiely cut off the ertex k 1 by a plane, replacing it by a small triangle, as shown on the right w 0 w = min w 0 w 1 w 2 w k 1 k 1 k = min Starting with the simplex for k = 2 Example 2. Our second sequence of examples is obtained from the backbone polytopes P k by performing three specific ertex cuts at each ertex i, for i = 0,...,k 1. Before cutting (in P k ), each ertex i (i > 0) has indegree 2, while 0 has indegree 3. The two ertex cuts are supposed to create at each ertex i the following configuration (where again all edges are directed to the right ): i,4 i,3 i,2 i,6 i,5 i,1 i,0 This creates a simple polytope P k with n = k +2+3k = 4k +2 facets. 4
5 Our starting ertex for Random Edge on this example will be k 1,6 ; the expected number of steps taken by Random Edge is the sum of the probabilities p e that the edge e is traersed. We think of these probabilities as a flow from k 1,6 to 0,0. Our figure indicates the flow alues on the edges, for a flow of total alue 8; equialently, these are the transersal probabilities in units of i,4 i,2 i, i,6 i,5 i,1 i,0 We get the same alues for each of the triple-ertex-cut-off configurations, except for the last one, which has no edge leaing the global sink 0,0. Thus the expected number of Random Edge steps, starting from k 1,6, is E( k 1,6 ) = k = n 32 16, with k = 1 43 (n 2). Asymptotically, this yields a better lower bound, due to > The graph of P k looks like this: 1,3 0, w 0 w 1 w 3 k 1,6 k 1,0 1,6 1,0 0,6 0,0 k 1,3 = min Example 3. The last examples produced k = 1 (n 2) ertices which are not 4 used. We will further improe the lower bound by using more facets in each local configuration and thus reducing the number of unused ertices (though our final example will still hae linearly many unused ertices). We use the same backbone polytope as before, but we replace each ertex i, for i = 0,...,k 1, with the following graph. (We do not gie an explicit polytopal construction for this example, but it can be constructed by cutting off ertices and edges of the backbone polytope. Alternatiely, such a construction is proided by the Mihalisin-Klee Theorem.) To analyze the random path length through this graph we send from i, units of flow through the network. 5
6 90 i, i, The total flow through all edges is For each configuration 9 facets are required. Together with the facets from the backbone construction, this yields n = 10k + 2. Hence we get E( k 1,18 ) = k = n , where = = > In contrast to the preceeding examples, this example does not contain a directed Hamiltonian path. Summarizing, we hae proed the following bound. Theorem 2.2. For n = 10k +2 12, holds. f(n) n Starting from the source. By splitting the maximal ertex, one can also construct examples where the expected number of steps starting at the maximal ertex is at least ( 1721 ε)n. This obseration is due to Günter Rote Upper Bounds Consider any linear program on a simple 3-polytope with the notations as described in the introduction. For a ertex, let N 1 () (resp., N 2 ()) denote the number of 1-ertices (resp., 2-ertices) that are not higher than (including itself). Put N() = N 1 ()+N 2 (). This is the number of ertices lower than. The core of our upper bound on f(n) is the following result. Theorem 3.1. For each ertex, other than the maximal ertex 2n 5, we hae Theorem 3.1 implies E() N 1() N(). E() 130(n 3) = n
7 for all. Here, the 15 comes from the fact that Theorem 3.1 is proed only for 29 2n 5 ; therefore, we bound E( 2n 5 ) by i=1 E(w i), where w 1,w 2,w 3 are the neighbors of 2n 5, and we exploit N(w 1 )+N(w 2 )+N(w 3 ) 6n 21. Theorem 3.2. For eery 3-dimensional linear program with n constraints, the expected number of piot steps taken by Random Edge is not more than n In the remaining part of this section, we briefly sketch the proof of Theorem 3.1. It proceeds by deriing the generic inequality E() αn 1 ()+βn(), (1) where, for most of the proof, α and β are treated as indeterminates. Each step of the proof yields a linear inequality on α and β that needs to be satisfied in order to imply (1). The proof is then completed once it is shown that (α,β) = ( 46, 42) satisfies all inequalities; in fact, it is optimal with respect to the objectie function α + 2β (see below for more details). Inequality (1) is proed by induction on N(). The base case N() = 0 is obious, since is the optimum in this case, and E() = 0. Suppose the theorem holds for all ertices lower than some ertex. We express E() in terms of the expected costs E(w) of certain ertices w that are reachable from ia a few downward edges. The general form of such a recursie expression will be k E() = c+ λ i E(w i ), i=1 where λ i > 0 for each i = 1,...,k, and i λ i = 1. Since we assume by induction that E(w i ) αn 1 (w i ) + βn(w i ), for each i, it suffices to show that k k αλ i (N 1 () N 1 (w i ))+ βλ i (N() N(w i )) c. Write i=1 i=1 1 (w i ) = N 1 () N 1 (w i ), (w i ) = N() N(w i ), for i = 1,...,k. (Of course, these terms are defined with respect to the currently considered ertex.) Note that (w i ) is the distance between and w i, that is, one plus the number of ertices between and w i. We thus need to show that k αλ i 1 (w i )+ i=1 k βλ i (w i ) c. (2) i=1 7
8 This requires a quite extensie case analysis, of which we present only the beginning in this extended abstract in order to indicate the kinds of arguments used. The complete case analysis is gien in the appendix. Case 1: is a 1-ertex. Let w 1 denote the target of the unique downward edge emanating from as in the following figure, where (here and in all subsequent figures) each edge is labelled by the probability of reaching it from. 1 w 1 In this case, E() = 1+E(w 1 ) holds. In the setup presented aboe, we hae c = 1, 1 (w 1 ) 1, and (w 1 ) 1, thus (2) is implied by α+β 1. (3) Case 2: is a 2-ertex. Let w 1 andw 2 denote thetargets ofthe two downward edges emanating from, where w 2 is lower than w 1. w 1 w 2 We hae E() = E(w 1)+ 1 2 E(w 2), hence we need to require that Note that (w 1 ) 1. α 2 1(w 1 )+ α 2 1(w 2 )+ β 2 (w 1)+ β 2 (w 2) 1. Case 2.a: (w 2 ) 4. Ignoring the effect of the 1 (w j ) s, it suffices to require that which will follow if β 2 (w 1)+ β 2 (w 2) 1, β 2 5. (4) 8
9 Case 2.b.i: (w 2 ) = 3 and one of the two ertices aboe w 2 and below is a 1- ertex. In this case 1 (w 2 ) 1 and (w 1 )+ (w 2 ) 4, so (2) is implied by 1 α+2β 1. (5) 2 We skip the remaining cases 2.b.ii and 2.c ( (w 2 ) = 2) in this extended abstract; the latter one splits into quite a large number of subcases, which become slightly more inoled. One ends up with roughly 24 linear inequalities in addition to (3), (4), (5). Assuming we hae α and β that satisfy all these inequalities, each of the induction steps is justified, and the inequality (1) follows. Since we always hae N 1 (),N 2 () n 3, we obtain E() αn 1 ()+β(n 1 ()+N 2 ()) = (α+β)n 1 ()+βn 2 () (α+2β)(n 3). Hence we choose (α,β) to minimize α + 2β, subject to all the deried inequalities. This is indeed the choice appearing in the statement of Theorem Discussion The improed lower bounds of Section 2.2 arose from complete enumerations for small n. In particular, the lower bounds proided by examples 2 and 3 are tight for n = 10,12, respectiely. Thus, we hae f(10) = = 9.75 and f(12) = Weareconinced thattheboundintheorem3.2isnottight. Infact, precisely two of the inequalities of the proof of Theorem 3.1 are tight for (α,β) = ( 46, 42 ). The two corresponding subcases thus constitute the bottleneck for the current upper bound. In order to improe the bound, one should expand these two subcases further, aiming at replacing those two inequalities by weaker ones (at the cost of a longer proof). As a matter of fact, in an earlier (unpublished) ersion of this manuscript we had obtained an upper bound of 1.5 n, using a somewhat more compact enumeration scheme. The current scheme is a refinement, based on further expansion of the preceding one. At this point, we hae no real sense of what the exact bound should be. The refinement of the approach in this section, as just outlined, is not likely to yield substantial improements in the upper bound, so a radically different approach is probably called for. Such an improement might be based on the obseration that certain local structures inole 1-ertices with one of its upward neighbors lying aboe. In fact, if the portion below contains k such ertices, there must exist at least k ertices higher than, so the upper bound αn 1 ()+βn() is much smaller than (α+2β)(n 3). As a matter of fact, the lower bounds deried in Section 2 do take this constraint into consideration. Another obseration is that the proof of Theorem 3.1 (as detailed in the appendix) uses (twice) the 3-connectiity of the edge graph of P, but it does not use its planarity at all, although it does occassionally run into nonplanar configurations. It 9
10 is conceiable that further refinement stages might reach nonplanar configurations, whose exclusion would allow us to further improe the bound. What if we also drop the 3-connectiity assumption? Then we need to consider additional cases, which cause our upper bound to increase. The best upper bound we hae at the moment for this relaxed situation is 13n/8 = n, but we are coninced that it too can be further improed. Acknowledgements. We are grateful to Emo Welzl and Günter Rote for inspiring discussions and helpful comments. References [1] N. Amenta and G. M. Ziegler, Deformed products and maximal shadows, in Adances in Discrete and Computational Geometry, B. Chazelle, J. E. Goodman, and R. Pollack, eds., ol. 223 of Contemporary Mathematics, Amer. Math. Soc., Proidence RI, 1998, pp [2] B. Gärtner, M. Henk, and G. M. Ziegler, Randomized simplex algorithms on Klee-Minty cubes, Combinatorica, 18 (1998), pp [3] B. Gärtner, J. Solymosi, F. Tschirschnitz, P. Valtr, and E. Welzl, One line and n points, STOC, (2001), pp [4] D. G. Kelly, Some results on random linear programs., Methods Oper. Res., 40 (1981), pp [5] J. Mihalisin and V. L. Klee, Conex and linear orientations of polytopal graphs, Discrete Comput. Geometry, 24 (2000), pp [6] C. A. Toey, Low order polynomial bounds on the expected performance of local improement algorithms, Math. Programming, 35 (1986), pp [7] G. M. Ziegler, Lectures on Polytopes, ol. 152 of Graduate Texts in Mathematics, Springer-Verlag, New York, Reised edition, 1998; Updates, corrections, and more at 10
11 Appendix This appendix contains the complete case analysis of the proof of Theorem 3.1 in the extended abstract (including the cases presented there). Case 1: is a 1-ertex. Let w 1 denote the target of the unique downward edge emanating from as in the following figure, where each edge is labelled by the probability of reaching it from. 1 w 1 In this case, E() = 1+E(w 1 ) holds. In the setup presented aboe, we hae c = 1, 1 (w 1 ) 1, and (w 1 ) 1, thus (2) is implied by α+β 1. (3) Case 2: is a 2-ertex. Let w 1 andw 2 denote thetargets ofthe two downward edges emanating from, where w 2 is lower than w 1. w 1 w 2 We hae E() = E(w 1)+ 1 2 E(w 2), hence we need to require that Note that (w 1 ) 1. α 2 1(w 1 )+ α 2 1(w 2 )+ β 2 (w 1)+ β 2 (w 2) 1. Case 2.a: (w 2 ) 4. Ignoring the effect of the 1 (w j ) s, it suffices to require that which will follow if β 2 (w 1)+ β 2 (w 2) 1, β 2 5. (4) 11
12 Case 2.b.i: (w 2 ) = 3 and one of the two ertices aboe w 2 and below is a 1- ertex. In this case 1 (w 2 ) 1 and (w 1 )+ (w 2 ) 4, so (2) is implied by 1 α+2β 1. (5) 2 Case 2.b.ii: (w 2 ) = 3 and the two ertices between and w 2 are 2-ertices. Denote the second intermediate ertex as. We may assume that is reachable from, otherwise we can ignore it and reduce the situation to Case 2.c treated below (be choosing another ordering of the ertices producing the same oriented graph). Three subcases can arise. First, assume that none of the three edges that emanate from w 1 and further down reaches w 2. Denote by x,y the two downward neighbors of and by z the downward neighbor of w 1 other than. The ertices x,y,z need not be distinct but none of them coinicdes with w 2. w 1 1/8 w 2 1/8 x y c = 7/4 z We hae here c = 7/4. To make the analysis simpler to follow isually, we present it in a table. Each row denotes oneofthetarget ertices w 2,x,y,z, multiplied by theprobability ofreaching it from. The left (resp., right) column denotes a lower bound on the corresponding quantities 1 ( ) (resp., ( )). To obtain an inequality that implies (2), one has to multiply each entry in the left (resp., right) column by the row probability times α (resp., times β), and require that the sum of all these terms be c. w /8x 0 4 1/8y 0 5 z 0 4 Note the following: (a) We do not assume that the rows represent distinct ertices (in fact, x = z is implicit in the table); this does not cause any problem in applying the rule for deriing an inequality from the table. (b) We hae to squeeze the ertices so as to make the resulting inequality as sharp (and difficult to satisfy) as possible; thus we made one of x,y the farthest ertex, because making z the farthest ertex would hae made the inequality easier to satisfy. 12
13 or We thus obtain ( ) β 7 4 4, β (6) Next, assume that w 2 is connected to. In this case w 2 is a 1-ertex, and we extend the configuration to include its unique downward neighbor w 3. w 1 w 2 w 1/8 5/8 3 c = 19/8 1/8 x y Let x denote the other downward neighbor of and let y denote the other downward neighbor of w 1. In the following table, the worst case is to make w 3 and y coincide, and make x the farthest ertex. We then obtain or α+ 5/8w /8x 1 5 y 1 4 ( ) β , α β (7) Finally, assume that w 2 is connected to w 1. Here too w 2 is a 1-ertex, and we extend the configuration to include its unique downward neighbor w 3. c = 5/2 w 1 w 2 1/8 3/4 w 3 Denoting by x,y the two downward neighbors of, our table and resulting inequality become 3/4w α+ 33 1/8x β 5 2, (8) 1/8y /8 x y
14 which, by the way, is stronger than (7). Case 2.c: (w 2 ) = 2. Hence, the only remaining case is that w 1 and w 2 are the two ertices immediately following. Case 2.c.i: w 1 is a 1-ertex (whose other upward neighbor lies aboe ). Its unique downward edge ends at some ertex which is either w 2 or lies below w 2. Assume first that this ertex coincides with w 2, which makes w 2 a 1-ertex, whose unique downward neighbor is denoted as. The local structure, table, and inequality are w 1 w 2 1 c = 5/ α+3β 5 2. (9) Suppose next that the downward neighbor w 3 of w 1 lies below w 2. We get w 1 w 2 w3 c = 3/2 w w α+ 5 2 β 3 2. (10) Case 2.c.ii: w 1 is a 2-ertex, both of whose downward neighbors lie strictly below w 2. Denote these neighbors as w 3,w 4, with w 3 lying aboe w 4. w 1 w 2 w3 w 4 c = 3/2 We may assume (w 3 ) = 3 (i.e., there is no ertex between w 2 and w 3 ), since (w 3 ) 4 requires β 6 as the sharpest inequalitity, which is already implied 13 by (6). Case 2.c.ii.1: w 2 is a 1-ertex. Then the table and inequality become w w w α β 3 2. (11) 14
15 Case 2.c.ii.2: w 2 is a 2-ertex but w 3 is a 1-ertex. Then w 3 (which satisfies (w 3 ) = 3) is connected either to w 2 or to a ertex aboe. In the former case, let x denote the other downward neighbor of w 2, and let y denote the unique downward neighbor of w 3. The local structure looks like this (with x,y,w 4 not necessarily distinct): x y w 1 w2 w 3 w4 c = 5/2 The table depends on whether x precedes or succeeds w 3. In the former case the (worst) table and inequality are x 0 3 y 1 5 w α+ 9 2 β 5 2. (12) In the latter case the (worst) table and inequality are x 1 4 y 1 4 w α β 5 2. (13) The next case is where the other upward neighbor of w 3 lies aboe. Let x,y denote the two downward neighbors of w 2, and let z denote the unique downward neighbor of w 3. The local structure is: x y w 1 z w 2 w 3 w4 c = 9/4 The table depends on how many of x,y precede w 3. If both precede w 3, the table and inequality become x 0 3 y 0 4 z 1 6 w α β 9 4. (14) 15
16 If only one of x,y precedes w 3, say x, the table and inequality become which is weaker than (14). x 0 3 y 1 5 z 1 5 w α β 9 4, (15) Finally, if none of x,y precedes w 3, the table and inequality become x 1 4 y 1 4 z 1 5 w α+ 9 2 β 9 4. (16) Case 2.c.ii.3: Both w 2 and w 3 are 2-ertices. We hae to consider the following type of configuration (where x,y,z,t,w 4 need not all be distinct, but x y and z t, and we may assume x t, y z; also, because (w 3 ) = 3, both x and y are lower than w 3 ): c = 9/4 1/8 w 1 1/8 w 2 w w 4 3 Intuitiely, a worst table is obtained by squeezing x,y,z,t, and w 4 as much to the left as possible, placing two of them at distance 4 from, two at distance 5, and one at distance 6. Howeer, squeezing them this way will make some pairs of them coincide and form 1-ertices, which will affect the resulting tables and inequalities. Suppose first that among the three heaier targets x,y,w 4, at most one lies at distance 4 from. The worst table and the associated inequality are (recall that x y): x 0 4 y 0 5 1/8z 0 4 1/8t 0 6 w x y z t 19 4 β 9 4. (17) Suppose then that among {w 4,x,y}, two are at distance 4 from, say w 4 and y. Then w 4 = y is a 1-ertex, and we denote by w its unique downward neighbor. The local structure is: 16
17 x z 1/8 t w 1 1/8 w 2 w3 w4 c = 1 w Two equally worst tables, and the resulting common inequality are x 1 5 1/8z 1 6 1/8t 1 7 w 1 5 x 1 6 1/8z 1 6 1/8t 1 5 w 1 5 α β (18) Case 2.c.iii: w 1 is a 2-ertex that reaches w 2. Then w 2 is a 1-ertex, and we denote by x its unique downward neighbor. 3/4 x w 1 w 2 = w 3 w 4 c = 9/4 A crucial obseration is that x cannot be equal to w 4. Indeed, if they were equal, then w 4 would be a 1-ertex. w 1 w 2 w 4 In this case, cutting the edge graph G of P at the downward edge emanating from x and at the edge entering would hae disconnected G, contradicting the fact that G is 3-connected. We first dispose of the case where x lies lower than w 4. The table and inequality are 3/4x 1 4 α β 9 4. (19) w In what follows we thus assume that x lies aboe w 4. 17
18 Case 2.c.iii.1: x is a 1-ertex that precedes w 4. Suppose first that w 4 is the unique downward neighbor of x. Then w 4 is a 1-ertex, and we denote its unique downward neighbor by z. The local structure, table and inequality are: w 1 w 2 x w 4 3/4 3/4 1 z c = 4 z 3 5 3α+5β 4. (20) Suppose next that the unique downward neighbor y of x is not w 4. The local structure, table and inequality look like this (y is drawn aboe w 4 because this yields a sharper inequality): w 1 w 2 x y w 4 3/4 3/4 c = 3 3/4y 2 4 w α+ 17 β 3. (21) 4 Case 2.c.iii.2: x is a 2-ertex that precedes w 4. This subcase splits into seeral subcases, where we assume, respectiely, that (w 4 ) 6, (w 4 ) = 4, and (w 4 ) = 5. Case 2.c.iii.2(a). Suppose first that (w 4 ) 6. The configuration looks like this: w 1 w 2 x w4 3/4 c = 9/4 The table and inequality are 3/4x 1 3 w α β 9 4. (22) Case 2.c.iii.2(b). Suppose next that (w 4 ) = 4, and that one of the downward neighbors of x is w 4. Let z denote the other downward neighbor. w 4 is a 1-ertex, and we denote by w its unique downward neighbor. 18
19 3/8 w 1 w 2 x 5/8 3/4 3/8 w 4 z w c = 29/8 The 3-connectiity of the edge graph of P implies, as aboe, that w z. Since we assume that (w 4 ) = 4, z also lies below w 4, and the table and inequality are 5/8w 2 5 3/8z 2 6 2α β (23) Suppose next that (w 4 ) = 4 and w 4 is not a downward neighbor of x. Denote those two neighbors as w and z, both of which lie lower than w 4, by assumption, and are clearly distinct. The configuration, table and inequality look like this: 3/4 x 3/8 3/8 w z c = 3 w 1 w 2 w 4 α 1 β w /8w 1 5 3/8z 1 6 α+ 41 β 3. (24) 8 Case 2.c.iii.2(c). It remains to consider the case (w 4 ) = 5. Let z denote the unique ertex lying between x and w 4. We may assume that z is connected to x, for otherwise z is not reachable from, and we might as well reduce this case to the case (w 4 ) = 4 just treated. Consider first the subcase where the other downward neighbor of x is w 4 itself. Then w 4 is a 1-ertex, and we denote by w its unique downward neighbor. This subcase splits further into two subcases: First, assume that z is a 1-ertex, and let y denote its unique downward neighbor. Clearly, y must lie below w 4 (it may coincide with or precede w). The configuration looks like this: 3/8 3/8 w 1 w 2 x 5/8 3/4 3/8 z w4 y w c = 4 The table and inequality are 3/8y 3 6 5/8w 3 6 3α+6β 4. (25) 19
20 In the other subcase, z is a 2-ertex; we denote its two downward neighbors as y and t. The ertices w,y,t all lie below w 4 and may appear there in any order. The configuration looks like this: w 1 w 2 3/16 3/8 3/16 x 5/8 3/4 3/8 z w4 t y w c = 4 The table and inequality are 3/16y 2 6 3/16t 2 7 5/8w 2 6 2α+ 99 β 4. (26) 16 Consider next the subcase where w 4 is not a downward neighbor of x. Denote the other downward neighbor of x as y, which lies strictly below w 4. This subcase splits into three subcases. First, assume that z is a 1-ertex, and denote its unique downward neighbor as w. The configuration looks like this: 3/8 y 3/8 w w 1 w 2 x 3/4 3/8 z w4 c = 27/8 The table and inequality are w /8y 2 6 3/8w 2 5 2α β (27) Second, assume that z is a 2-ertex, so that none of its two downward neighbors is w 4. Denote these neighbors as w and t. All three ertices y,t,w lie strictly below w 4. The configuration looks like this: 3/8 3/16 3/16 w 1 w 2 x 3/4 3/8 z w4 y t w c = 27/8 20
21 The table and inequality are w /8y 1 6 3/16w 1 6 3/16t 1 7 α β (28) Finally, assume that z is a 2-ertex, so that one of its two downward neighbors is w 4. Denote the other neighbor as w. In this case w 4 is a 1-ertex, and we denote its unique downward neighbor as t. All three ertices y,t,w lie strictly below w 4. The configuration looks like this: 3/8 3/16 w 1 w 2 x 3/16 7/16 3/4 3/8 z w4 y w t c = 61/16 The table and inequality are 3/8y 2 6 3/16w 2 7 7/16t 2 6 2α β 61 16, (29) which, by the way, is weaker than (26). 21
The Simplex Algorithm in Dimension Three 1
The Simplex Algorithm in Dimension Three 1 Volker Kaibel 2 Rafael Mechtel 3 Micha Sharir 4 Günter M. Ziegler 3 Abstract We inestigate the worst-case behaior of the simplex algorithm on linear programs
More informationarxiv: v1 [math.co] 25 Apr 2016
On the zone complexity of a ertex Shira Zerbib arxi:604.07268 [math.co] 25 Apr 206 April 26, 206 Abstract Let L be a set of n lines in the real projectie plane in general position. We show that there exists
More informationDECOMPOSING 4-REGULAR GRAPHS INTO TRIANGLE-FREE 2-FACTORS
SIAMJ.DISCRETE MATH. c 1997 Society for Industrial and Applied Mathematics Vol. 10, No. 2, pp. 309 317, May 1997 011 DECOMPOSING 4-REGULAR GRAPHS INTO TRIANGLE-FREE 2-FACTORS EDWARD BERTRAM AND PETER HORÁK
More informationNetwork Flow Problems Luis Goddyn, Math 408
Network Flow Problems Luis Goddyn, Math 48 Let D = (V, A) be a directed graph, and let s, t V (D). For S V we write δ + (S) = {u A : u S, S} and δ (S) = {u A : u S, S} for the in-arcs and out-arcs of S
More informationLecture J. 10 Counting subgraphs Kirchhoff s Matrix-Tree Theorem.
Lecture J jacques@ucsd.edu Notation: Let [n] [n] := [n] 2. A weighted digraph is a function W : [n] 2 R. An arborescence is, loosely speaking, a digraph which consists in orienting eery edge of a rooted
More informationThe Random-Facet Simplex Algorithm on Combinatorial Cubes
The Random-Facet Simplex lgorithm on Combinatorial Cubes Bernd Gärtner, ETH Zürich, Switzerland January, 2002 bstract The Random-Facet algorithm is a randomized variant of the simplex method which is known
More informationOptimization Problems in Multiple Subtree Graphs
Optimization Problems in Multiple Subtree Graphs Danny Hermelin Dror Rawitz February 28, 2010 Abstract We study arious optimization problems in t-subtree graphs, the intersection graphs of t- subtrees,
More informationLecture 1. 1 Overview. 2 Maximum Flow. COMPSCI 532: Design and Analysis of Algorithms August 26, 2015
COMPSCI 532: Design and Analysis of Algorithms August 26, 205 Lecture Lecturer: Debmalya Panigrahi Scribe: Allen Xiao Oeriew In this lecture, we will define the maximum flow problem and discuss two algorithms
More informationarxiv: v1 [math.gt] 2 Nov 2010
CONSTRUCTING UNIVERSAL ABELIAN COVERS OF GRAPH MANIFOLDS HELGE MØLLER PEDERSEN arxi:101105551 [mathgt] 2 No 2010 Abstract To a rational homology sphere graph manifold one can associate a weighted tree
More informationBalanced Partitions of Vector Sequences
Balanced Partitions of Vector Sequences Imre Bárány Benjamin Doerr December 20, 2004 Abstract Let d,r N and be any norm on R d. Let B denote the unit ball with respect to this norm. We show that any sequence
More informationLECTURE 2: CROSS PRODUCTS, MULTILINEARITY, AND AREAS OF PARALLELOGRAMS
LECTURE : CROSS PRODUCTS, MULTILINEARITY, AND AREAS OF PARALLELOGRAMS MA1111: LINEAR ALGEBRA I, MICHAELMAS 016 1. Finishing up dot products Last time we stated the following theorem, for which I owe you
More informationLecture 8: Construction of Expanders
Spectral Graph Theory and Applications WS 0/0 Lecture 8: Construction of Expanders Lecturer: Thomas Sauerwald & He Sun In this lecture we study the explicit constructions of expander graphs. Although we
More informationScalar multiplication and algebraic direction of a vector
Roberto s Notes on Linear Algebra Chapter 1: Geometric ectors Section 5 Scalar multiplication and algebraic direction of a ector What you need to know already: of a geometric ectors. Length and geometric
More informationTwo New Bounds on the Random-Edge Simplex Algorithm
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany BERND GÄRTNER AND VOLKER KAIBEL Two New Bounds on the Random-Edge Simplex Algorithm ZIB-Report 05-14 (February
More informationOn Lines and Joints. August 17, Abstract
On Lines and Joints Haim Kaplan Micha Sharir Eugenii Shustin August 17, 2009 Abstract Let L be a set of n lines in R d, for d 3. A joint of L is a point incident to at least d lines of L, not all in a
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Recitation 13 10/31/2008. Markov Chains
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/5.085J Fall 008 Recitation 3 0/3/008 Marko Chains Problem 9 from Poisson process exercises in [BT] Fact: If there is a single recurrent class, the frequency
More informationVISUAL PHYSICS ONLINE RECTLINEAR MOTION: UNIFORM ACCELERATION
VISUAL PHYSICS ONLINE RECTLINEAR MOTION: UNIFORM ACCELERATION Predict Obsere Explain Exercise 1 Take an A4 sheet of paper and a heay object (cricket ball, basketball, brick, book, etc). Predict what will
More informationSection 6: PRISMATIC BEAMS. Beam Theory
Beam Theory There are two types of beam theory aailable to craft beam element formulations from. They are Bernoulli-Euler beam theory Timoshenko beam theory One learns the details of Bernoulli-Euler beam
More informationOn Regular Vertices of the Union of Planar Convex Objects
On Regular Vertices of the Union of Planar Convex Objects Esther Ezra János Pach Micha Sharir Abstract Let C be a collection of n compact convex sets in the plane, such that the boundaries of any pair
More informationPolynomial-Solvability of N P-class Problems
Polynomial-Solability of N P-class Problems Anatoly Panyuko paniukoa@susu.ru arxi:1409.03755 [cs.cc] 24 Aug 2018 Abstract LetHamiltoniancomplement ofthegraphg = (V(G), E(G))betheminimal cardinality set
More informationTHE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH
ROCKY MOUNTAIN JOURNAL OF MATHEMATICS Volume 46, Number 4, 2016 THE MINIMUM MATCHING ENERGY OF BICYCLIC GRAPHS WITH GIVEN GIRTH HONG-HAI LI AND LI ZOU ABSTRACT. The matching energy of a graph was introduced
More informationNew Upper Bounds for the Heights of Some Light Subgraphs in 1-Planar Graphs with High Minimum Degree
New Upper Bounds for the Heights of Some Light Subgraphs in 1-Planar Graphs with High Minimum Degree Xin Zhang, Jian-Liang Wu, Guizhen Liu To cite this ersion: Xin Zhang, Jian-Liang Wu, Guizhen Liu. New
More informationChapter 4: Techniques of Circuit Analysis
Chapter 4: Techniques of Circuit Analysis This chapter gies us many useful tools for soling and simplifying circuits. We saw a few simple tools in the last chapter (reduction of circuits ia series and
More informationDistinct Distances in Three and Higher Dimensions
Distinct Distances in Three and Higher Dimensions Boris Aronov János Pach Micha Sharir Gábor Tardos Abstract Improving an old result of Clarkson et al., we show that the number of distinct distances determined
More informationTheory of Network Communication
Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network
More informationAn Explicit Lower Bound of 5n o(n) for Boolean Circuits
An Eplicit Lower Bound of 5n o(n) for Boolean Circuits Kazuo Iwama, Oded Lachish, Hiroki Morizumi, and Ran Raz Graduate School of Informatics, Kyoto Uniersity, Kyoto, JAPAN {iwama, morizumi}@kuis.kyoto-u.ac.jp
More informationAlgorithms and Data Structures 2014 Exercises and Solutions Week 14
lgorithms and ata tructures 0 xercises and s Week Linear programming. onsider the following linear program. maximize x y 0 x + y 7 x x 0 y 0 x + 3y Plot the feasible region and identify the optimal solution.
More informationA spectral Turán theorem
A spectral Turán theorem Fan Chung Abstract If all nonzero eigenalues of the (normalized) Laplacian of a graph G are close to, then G is t-turán in the sense that any subgraph of G containing no K t+ contains
More informationMeasure and Conquer: A Simple O( n ) Independent Set Algorithm
Measure and Conquer: A Simple O(2 0.288n ) Independent Set Algorithm Fedor V. Fomin 1, Fabrizio Grandoni 2, and Dieter Kratsch 3 1 Department of Informatics, Uniersity of Bergen, N-5020 Bergen, Norway,
More informationIsoperimetric problems
CHAPTER 2 Isoperimetric problems 2.1. History One of the earliest problems in geometry was the isoperimetric problem, which was considered by the ancient Greeks. The problem is to find, among all closed
More informationLaplacian Energy of Graphs
Laplacian Energy of Graphs Sigma Xi Research Exhibition Claire T. Carney Library Uniersity of Massachusetts Dartmouth April 28 th & 29 th, 2009 Leanne R. Silia & Gary E. Dais Department of Mathematics
More informationFinding Nash Equilibria of Bimatrix Games
Finding Nash Equilibria of Bimatrix Games Rahul S. J. Saani London School of Economics and Political Science PhD 1 2 Abstract This thesis concerns the computational problem of finding one Nash equilibrium
More informationDistinct Distances in Three and Higher Dimensions
Distinct Distances in Three and Higher Dimensions Boris Aronov János Pach Micha Sharir Gábor Tardos ABSTRACT Improving an old result of Clarkson et al., we show that the number of distinct distances determined
More information3 The Simplex Method. 3.1 Basic Solutions
3 The Simplex Method 3.1 Basic Solutions In the LP of Example 2.3, the optimal solution happened to lie at an extreme point of the feasible set. This was not a coincidence. Consider an LP in general form,
More informationThe Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost
The Budgeted Minimum Cost Flow Problem with Unit Upgrading Cost Christina Büsing Sarah Kirchner Arie Koster Annika Thome October 6, 2015 Abstract The budgeted minimum cost flow problem (BMCF(K)) with unit
More informationNP and NP-Completeness
0/2/206 Algorithms NP-Completeness 7- Algorithms NP-Completeness 7-2 Efficient Certification NP and NP-Completeness By a solution of a decision problem X we understand a certificate witnessing that an
More informationACYCLIC WEAK CONVEX DOMINATION IN GRAPHS
International Journal of Mathematics & Engineering with Computers Vol 2, No -2, pp 65-72, January-December 20 ACYCLIC WEAK CONVEX DOMINATION IN GRAPHS TN Janakiraman, and PJA Alphonse ABSTRACT: In a graph
More informationPolynomiality of Linear Programming
Chapter 10 Polynomiality of Linear Programming In the previous section, we presented the Simplex Method. This method turns out to be very efficient for solving linear programmes in practice. While it is
More informationA Redundant Klee-Minty Construction with All the Redundant Constraints Touching the Feasible Region
A Redundant Klee-Minty Construction with All the Redundant Constraints Touching the Feasible Region Eissa Nematollahi Tamás Terlaky January 5, 2008 Abstract By introducing some redundant Klee-Minty constructions,
More informationSUB-EXPONENTIALLY MANY 3-COLORINGS OF TRIANGLE-FREE PLANAR GRAPHS
SUB-EXPONENTIALLY MANY 3-COLORINGS OF TRIANGLE-FREE PLANAR GRAPHS Arash Asadi Luke Postle 1 Robin Thomas 2 School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT
More informationOn the Linear Threshold Model for Diffusion of Innovations in Multiplex Social Networks
On the Linear Threshold Model for Diffusion of Innoations in Multiplex Social Networks Yaofeng Desmond Zhong 1, Vaibha Sriastaa 2 and Naomi Ehrich Leonard 1 Abstract Diffusion of innoations in social networks
More informationIndependence numbers of locally sparse graphs and a Ramsey type problem
Independence numbers of locally sparse graphs and a Ramsey type problem Noga Alon Abstract Let G = (V, E) be a graph on n vertices with average degree t 1 in which for every vertex v V the induced subgraph
More informationComputing Laboratory A GAME-BASED ABSTRACTION-REFINEMENT FRAMEWORK FOR MARKOV DECISION PROCESSES
Computing Laboratory A GAME-BASED ABSTRACTION-REFINEMENT FRAMEWORK FOR MARKOV DECISION PROCESSES Mark Kattenbelt Marta Kwiatkowska Gethin Norman Daid Parker CL-RR-08-06 Oxford Uniersity Computing Laboratory
More informationInteger Parameter Synthesis for Real-time Systems
1 Integer Parameter Synthesis for Real-time Systems Aleksandra Joanoić, Didier Lime and Oliier H. Roux École Centrale de Nantes - IRCCyN UMR CNRS 6597 Nantes, France Abstract We proide a subclass of parametric
More informationA Geometric Review of Linear Algebra
A Geometric Reiew of Linear Algebra The following is a compact reiew of the primary concepts of linear algebra. The order of presentation is unconentional, with emphasis on geometric intuition rather than
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationLecture 1: Entropy, convexity, and matrix scaling CSE 599S: Entropy optimality, Winter 2016 Instructor: James R. Lee Last updated: January 24, 2016
Lecture 1: Entropy, convexity, and matrix scaling CSE 599S: Entropy optimality, Winter 2016 Instructor: James R. Lee Last updated: January 24, 2016 1 Entropy Since this course is about entropy maximization,
More informationCSC373: Algorithm Design, Analysis and Complexity Fall 2017 DENIS PANKRATOV NOVEMBER 1, 2017
CSC373: Algorithm Design, Analysis and Complexity Fall 2017 DENIS PANKRATOV NOVEMBER 1, 2017 Linear Function f: R n R is linear if it can be written as f x = a T x for some a R n Example: f x 1, x 2 =
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationLecture 10 February 4, 2013
UBC CPSC 536N: Sparse Approximations Winter 2013 Prof Nick Harvey Lecture 10 February 4, 2013 Scribe: Alexandre Fréchette This lecture is about spanning trees and their polyhedral representation Throughout
More informationTesting Equality in Communication Graphs
Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected
More informationConnectivity and Menger s theorems
Connectiity and Menger s theorems We hae seen a measre of connectiity that is based on inlnerability to deletions (be it tcs or edges). There is another reasonable measre of connectiity based on the mltiplicity
More informationReverse mathematics of some topics from algorithmic graph theory
F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.
More informationChapter 0 Introduction Suppose this was the abstract of a journal paper rather than the introduction to a dissertation. Then it would probably end wit
Chapter 0 Introduction Suppose this was the abstract of a journal paper rather than the introduction to a dissertation. Then it would probably end with some cryptic AMS subject classications and a few
More informationGeneral Lorentz Boost Transformations, Acting on Some Important Physical Quantities
General Lorentz Boost Transformations, Acting on Some Important Physical Quantities We are interested in transforming measurements made in a reference frame O into measurements of the same quantities as
More informationAstrometric Errors Correlated Strongly Across Multiple SIRTF Images
Astrometric Errors Correlated Strongly Across Multiple SIRTF Images John Fowler 28 March 23 The possibility exists that after pointing transfer has been performed for each BCD (i.e. a calibrated image
More informationChords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu
AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department
More informationMSP Problem:Its NP-Completeness and its Algorithm. Xinwen Jiang etc. **
MSP Problem:Its NP-Completeness and its Algorithm Xinwen Jiang etc. ** Abstract: We suggested a problem, proed that the problem is a NP-complete one and designed an algorithm to sole the problem in this
More informationChapter 1. The Postulates of the Special Theory of Relativity
Chapter 1 The Postulates of the Special Theory of Relatiity Imagine a railroad station with six tracks (Fig. 1.1): On track 1a a train has stopped, the train on track 1b is going to the east at a elocity
More informationAcyclic Digraphs arising from Complete Intersections
Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine
More informationImproved Bounds on the L(2, 1)-Number of Direct and Strong Products of Graphs
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR AERS VOL. ***, NO. ***, *** 2007 Improed Bounds on the L(2, )-Number of Direct and Strong roducts of Graphs Zhendong Shao, Sandi Klažar, Daid Zhang,
More informationOn Empty Convex Polygons in a Planar Point Set
On Empty Convex Polygons in a Planar Point Set Rom Pinchasi Radoš Radoičić Micha Sharir March 21, 2005 Abstract Let P be a set of n points in general position in the plane. Let X k (P) denote the number
More informationTopic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality.
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Primal-Dual Algorithms Date: 10-17-07 14.1 Last Time We finished our discussion of randomized rounding and
More informationChapter 1. Preliminaries
Introduction This dissertation is a reading of chapter 4 in part I of the book : Integer and Combinatorial Optimization by George L. Nemhauser & Laurence A. Wolsey. The chapter elaborates links between
More informationConflict-Free Colorings of Rectangles Ranges
Conflict-Free Colorings of Rectangles Ranges Khaled Elbassioni Nabil H. Mustafa Max-Planck-Institut für Informatik, Saarbrücken, Germany felbassio, nmustafag@mpi-sb.mpg.de Abstract. Given the range space
More informationA Geometric Review of Linear Algebra
A Geometric Reiew of Linear Algebra The following is a compact reiew of the primary concepts of linear algebra. I assume the reader is familiar with basic (i.e., high school) algebra and trigonometry.
More informationarxiv: v2 [math.co] 12 Jul 2009
A Proof of the Molecular Conjecture Naoki Katoh and Shin-ichi Tanigawa arxi:0902.02362 [math.co] 12 Jul 2009 Department of Architecture and Architectural Engineering, Kyoto Uniersity, Kyoto Daigaku Katsura,
More informationSampling Binary Contingency Tables with a Greedy Start
Sampling Binary Contingency Tables with a Greedy Start Iona Bezákoá Nayantara Bhatnagar Eric Vigoda Abstract We study the problem of counting and randomly sampling binary contingency tables. For gien row
More informationarxiv: v3 [math.co] 20 Sep 2016
PLANAR GRAPHS ARE 9/-COLORABLE DANIEL W. CRANSTON AND LANDON RABERN arxi:0.7 [math.co] 0 Sep 06 Abstract. We show that eery planar graph G has a -fold 9-coloring. In particular, this implies that G has
More information1 :: Mathematical notation
1 :: Mathematical notation x A means x is a member of the set A. A B means the set A is contained in the set B. {a 1,..., a n } means the set hose elements are a 1,..., a n. {x A : P } means the set of
More informationOne square and an odd number of triangles. Chapter 22
One square and an odd number of triangles Chapter 22 Suppose we want to dissect a square into n triangles of equal area. When n is even, this is easily accomplished. For example, you could divide the horizontal
More informationTransmission lines using a distributed equivalent circuit
Cambridge Uniersity Press 978-1-107-02600-1 - Transmission Lines Equialent Circuits, Electromagnetic Theory, and Photons Part 1 Transmission lines using a distributed equialent circuit in this web serice
More informationWeek 3: Faces of convex sets
Week 3: Faces of convex sets Conic Optimisation MATH515 Semester 018 Vera Roshchina School of Mathematics and Statistics, UNSW August 9, 018 Contents 1. Faces of convex sets 1. Minkowski theorem 3 3. Minimal
More informationHölder-type inequalities and their applications to concentration and correlation bounds
Hölder-type inequalities and their applications to concentration and correlation bounds Christos Pelekis * Jan Ramon Yuyi Wang Noember 29, 2016 Abstract Let Y, V, be real-alued random ariables haing a
More informationThe adjacent vertex-distinguishing total chromatic number of 1-tree
The adjacent ertex-distinguishing total chromatic number of 1-tree Haiying Wang The School of Information Engineering China Uniersity of Geosciences(Beijing) Beijing 100083, P.R.China Abstract Let G =
More informationA unique representation of polyhedral types. Centering via Möbius transformations
Mathematische Zeitschrift manuscript No. (will be inserted by the editor) A unique representation of polyhedral types. Centering via Möbius transformations Boris A. Springborn Boris Springborn Technische
More information5. Biconnected Components of A Graph
5. Biconnected Components of A Graph If one city s airport is closed by bad eather, can you still fly beteen any other pair of cities? If one computer in a netork goes don, can a message be sent beteen
More informationMonochromatic simplices of any volume
Monochromatic simplices of any volume Adrian Dumitrescu Department of Computer Science University of Wisconsin Milwaukee WI 53201-0784, USA Email: ad@cs.uwm.edu Minghui Jiang Department of Computer Science
More informationThe optimal pebbling number of the complete m-ary tree
Discrete Mathematics 222 (2000) 89 00 www.elseier.com/locate/disc The optimal pebbling number of the complete m-ary tree Hung-Lin Fu, Chin-Lin Shiue Department of Applied Mathematics, National Chiao Tung
More informationOn empty convex polygons in a planar point set
Journal of Combinatorial Theory, Series A 113 (006 385 419 www.elsevier.com/locate/jcta On empty convex polygons in a planar point set Rom Pinchasi a,1, Radoš Radoičić a, Micha Sharir b,c a Department
More informationarxiv:math/ v1 [math.co] 6 Dec 2005
arxiv:math/05111v1 [math.co] Dec 005 Unimodality and convexity of f-vectors of polytopes Axel Werner December, 005 Abstract We consider unimodality and related properties of f-vectors of polytopes in various
More informationOnline Companion to Pricing Services Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions?
Online Companion to Pricing Serices Subject to Congestion: Charge Per-Use Fees or Sell Subscriptions? Gérard P. Cachon Pnina Feldman Operations and Information Management, The Wharton School, Uniersity
More informationAn 0.5-Approximation Algorithm for MAX DICUT with Given Sizes of Parts
An 0.5-Approximation Algorithm for MAX DICUT with Given Sizes of Parts Alexander Ageev Refael Hassin Maxim Sviridenko Abstract Given a directed graph G and an edge weight function w : E(G) R +, themaximumdirectedcutproblem(max
More information1 The linear algebra of linear programs (March 15 and 22, 2015)
1 The linear algebra of linear programs (March 15 and 22, 2015) Many optimization problems can be formulated as linear programs. The main features of a linear program are the following: Variables are real
More informationarxiv: v1 [cs.dm] 21 Oct 2017
Eliminating Odd Cycles by Remoing a Matching Carlos V.G.C. Lima 1,, Dieter Rautenbach 2,, Uéerton S. Souza 3,, and Jayme L. Szwarcfiter 4 1 Departament of Coputer Science, Federal Uniersity of Minas Gerais,
More informationSection 3.1 Quadratic Functions and Models
Math 130 www.timetodare.com Section 3.1 Quadratic Functions and Models Quadratic Function: ( ) f x = ax + bx+ c ( a 0) The graph of a quadratic function is called a parabola. Graphing Parabolas: Special
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More informationMAT-INF4110/MAT-INF9110 Mathematical optimization
MAT-INF4110/MAT-INF9110 Mathematical optimization Geir Dahl August 20, 2013 Convexity Part IV Chapter 4 Representation of convex sets different representations of convex sets, boundary polyhedra and polytopes:
More informationG 2(X) X SOLVABILITY OF GRAPH INEQUALITIES. 1. A simple graph inequality. Consider the diagram in Figure 1.
SOLVABILITY OF GRAPH INEQUALITIES MARCUS SCHAEFER AND DANIEL ŠTEFANKOVIČ Abstract. We inestigate a new type of graph inequality (in the tradition of Cetkoić and Simić [Contributions to Graph Theory and
More informationarxiv:math/ v1 [math.co] 3 Sep 2000
arxiv:math/0009026v1 [math.co] 3 Sep 2000 Max Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department San Francisco State University San Francisco, CA 94132 sergei@sfsu.edu
More informationTowards Universal Cover Decoding
International Symposium on Information Theory and its Applications, ISITA2008 Auckland, New Zealand, 7-10, December, 2008 Towards Uniersal Coer Decoding Nathan Axig, Deanna Dreher, Katherine Morrison,
More informationUniformly discrete forests with poor visibility
Uniformly discrete forests with poor visibility Noga Alon August 19, 2017 Abstract We prove that there is a set F in the plane so that the distance between any two points of F is at least 1, and for any
More informationThe Evolution of Grötzsch s Theorem
The Eolution of Grötzsch s Theorem Lauren DeDieu September 26, 2011 A thesis submitted in partial fulfillment of the requirements for MATH 490, in the department of Mathematics, Physics and Geology, Cape
More informationP(c y) = W n (y c)p(c)
ENEE 739C: Adanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 9 (draft; /7/3). Codes defined on graphs. The problem of attaining capacity. Iteratie decoding. http://www.enee.umd.edu/
More information4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**
4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published
More informationChromatic characterization of biclique cover. Denis Cornaz. Jean Fonlupt. Equipe Combinatoire, UFR 921, Universite Pierre et Marie Curie, 4 place
Chromatic characterization of biclique coer Denis Cornaz France Telecom R&D, 38-40 rue du General Leclerc, Issy-les-Moulineaux 92794 Jean Fonlupt Equipe Combinatoire, UFR 921, Uniersite Pierre et Marie
More informationDecomposing oriented graphs into transitive tournaments
Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote
More informationDual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes. Satoru FUJISHIGE and Jens MASSBERG.
RIMS-1734 Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes By Satoru FUJISHIGE and Jens MASSBERG December 2011 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES KYOTO UNIVERSITY,
More informationThe Geometry and Topology of Groups
The Geometry and Topology of Groups Brent Eeritt ersion March 3, 2005 Contents 1. Clockwork topology. 2. From 2-complexes to groups. 3. From 2-complexes to groups: more adanced features. 4. Presentations.
More informationA compositional approach to the max-flow problem
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 2014-06-09 A compositional approach to the max-flow problem Kfoury, Assaf Computer Science Department,
More information