arxiv: v3 [cs.ds] 27 Nov 2014

Size: px
Start display at page:

Download "arxiv: v3 [cs.ds] 27 Nov 2014"

Transcription

1 Representative sets for multisets Ariel Gabizon Daniel Lokshtanov Michal Pilipczuk December 1, 2014 arxiv: v3 [cs.ds] 27 Nov 2014 Abstract The notion of a q-representative set for a family of subsets has recently proven to be very useful in the design of parameterized and exact algorithms. We generalize this notion to families of multisets. We also give an efficient way to find a representative set for a family of multisets. As an application we give a deterministic algorithm for minimal weight r-simple k-path running in time O (r O(k/r) ) for 1 < r k. This extends a result of Abasi et. al [1] that gave a randomized algorithm of similar running time for the non-weighted case. We derive other algorithms for problems that can be viewed as augmenting a parameterized problem with a relaxation parameter. A corollary of our construction is an improved explicit construction of lopsided universal sets (cf. [8]) for a certain range of parameters. 1 Introduction Let P be a family of subsets of [n] of size p. A q-representative set for P is a subfamily ˆP P such that for every set Q [n] of size q the following holds: If there exists a set P P that is disjoint from Q, there also existsaset P ˆP that isdisjoint fromq. TheTwo-FamiliesTheoremofBollobás[5] implies that therealways exists aq-representativesubfamily ofsizeat most ( ) p+q p. An interestingfeature is that the size doesnot depend on the universe [n] or the size of P. In particular, for any p,q with p+q = k, we always have a q-representative subfamily of size at most 2 k. It turns out that efficiently finding a small q-representativesubfamily is a central component in efficient algorithms for various problems. Roughly speaking, this is because it allows us to store only a small subset of the partial solutions constructed at an intermediate stage, before proceeding to attempt to augment them to a complete solution. A notable example is the recent work of Fomin, Lokshtanov and Saurabh [8] where an efficient method for finding representative sets is used to get faster deterministic algorithms for various problems such as LONG DIRECTED CYCLE, MINIMUM EQUIVALENT GRAPH, and k-path. Subsequently, their method was improved independently by Fomin et. al [7] and Shachnai and Zehavi [13]. 1.1 Our contribution Efficiently computing representative sets of multisets In this work we generalize the concept of a representative set to multisets. We also show how to efficiently compute representative sets for families of multisets As a corollary we obtain fast algorithms for versions of parameterized problems containing a second relaxation parameter. Parameterized problems with an auxillary relaxation parameter Let us illustrate what we mean by this relaxation parameter: In the well-known directed k-path problem, we are given a directed graph G and are asked to determine whether there exists a directed simple walk of length k in G. The current best-known algorithms for this problem on directed graphs are Williams [14] for unweighted case, and the works [7, 13] mentioned above for the weighted case, having running times O (c k ) for c = 2 and c = respectively. (Björklund et. al [4] obtain c = 1.66 when G is undirected.) Now suppose we added a parameter r that bounds the number of times a vertex is allowed to be visited in the walk. That is, we now want to determine if there exists a walk of length k where any vertex appears at most r times in the walk. Let us call such The research leading to these results has received funding from the European Community s Seventh Framework Programme (FP7/ ) under grant agreement number and

2 a walk an r-simple k-path. Note that in the original problem r = 1. On the other hand, note that when r = k this problem can be solved in polynomial time, e.g. by BFS. This setting was considered first by Abasi et. al [1] who showed that such a relaxation can indeed significantly improve the running time. Specifically, they obtain a randomized algorithm of running time O (r 2k/r ) for finding an r-simple k-path in G (assuming r > 1). As an application of our generalization, we obtain a deterministic algorithm with similar running time O (r O(k/r) ) that can also find a minimal weight r-simple k-path in G. We obtain similar results for a version of the packing problem (see, e.g., Zehavi [15]) with a relaxation parameter - where instead of requiring for the packed sets to be disjoint we allow a given element to belong to at most r sets. Koutis [9] studied the problem of detecting whether a multivariate polynomial given as an arithmetic circuit contains a multilinear term, and showed that certain parameterized problems are reducible to this one. He gave a randomized algorithm running in time O (2 k ) for this problem. 1 We study a similar problem of detecting an r-monomial - a monomial whose individual degree are all at most r, and show that this problem can be solved in deterministic time O (r O(k/r ) when the circuit is non-canceling (See Theorem 5.4). Smaller lopsided universal sets Informally speaking, an n-p-q-lopsided universal set is a set of strings such that, when focusing on any k p + q locations, we see all patterns of weight p (see Definition 4.6). A probabilistic argument shows the existence of n-p-q-lopsided universal sets of size p q k (k p) logn (cf. Lemma 52 in [6]). Fomin, Lokshtanov and Saurabh [8] used the technique of[12] to construct an n-p-q-lopsided universal set of size ( k k p ) 2 O( log log(k)) logn. Consider the case p = o(q): For simplicity of discussion, let us focus on the ( k p) (e k/p) p term in the probablistic construction and omit logn terms. In this case the 2 O( k log log(k)) ) term of [8] is much larger than. Bshouty [6] gives a better construction for such p achieving size roughly k p+2 (see Lemma 53 in [6]). We ( k p give the first explicit construction of size (k/p) O(p). Below, and throughout the paper, we use the notation O k to hide k O(1) terms. Theorem 1.1. Fix integers p,q and n such that k = p + q n. An n-p-q-lopsided universal set of size O k ((k/p) 2 p 2 O(p) logn) can be constructed in time O k ((k/p) 2 p 2 O(p) n logn). 2 Preliminaries This section introduces known constructions of various combinatorial objects that will be needed in our construction. Notation: All functions will have domain [n] unless noted otherwise. Thus, the parameter n will be sometimes implicit in descriptions of families of functions. Alon, Yuster and Zwick [3] used a construction of Moni Naor (based on ideas from Naor et. al [12]) to hash a subset of size t into a world of size t 2 using a very small set of functions Lemma 2.1. [[3] based on Naor] A t-perfect family of hash functions H {f : [n] [t 2 ]} of size t O(1) logn can be constructed in time O(t O(1) n logn) We introduce the notion of a hitting set for combinatorial rectangles. Definition 2.2. Let R [m 1 ] [m 2 ]... [m t ] be a set of the form R 1... R t, where R i [m i ]. We say R is a combinatorialrectanglewithsidewisedensityγ, if for every i [t], R i γ m i. A set H [m 1 ] [m 2 ]... [m t ] is a hitting set for rectangles with sidewise density γ if for every set R [m 1 ] [m 2 ]... [m t ] that is a combinatorial rectangle of sidewise density γ, R H. Linial et. al [10] gave the following construction of a hitting set for combinatorial rectangles. Theorem 2.3 ([10]). A hitting set for rectangles H [m] t with sidewise density 1/3 of size H = (m 2 t ) O(1) can be constructed in time (m 2 t ) O(1). We will need a hitting set for combinatorial rectangles in a universe where the coordinates are from domains of different sizes. We show that the theorem of [10] can be adapted to this setting. 1 A technicality is that his algorithm detects only multilinear terms with odd coefficients 2

3 Corollary 2.4. Suppose m 1,...,m d m. A hitting set for rectangles H [m 1 ] [m 2 ]... [m t ] with density 1/2 of size H = (m 2 t ) O(1) can be constructed in time (m 2 t ) O(1). Proof. For the purpose of the proof it will be convenient to think of [a] as {0,...,a 1} rather than {1,...,a}. Let m = m 3 t. Let H [m ] t be the hitting set for rectangles with density 1/3 of size n O(1) (m 2 t ) = n O(1) (m 2 t ) guaranteed in Theorem 2.3 Define H [m 1 ] [m 2 ]... [m t ] as follows. For each element (a 1,...,a t) H add the element (a 1 mod m 1,...,a t mod m t ) to H. Let us show that H is a hitting set for rectangles with density 1/2. Fix R = R 1... R t [m 1 ] [m 2 ]... [m t ] with R i 1/2 m i. Define R [m ] t as follows. For a point (a 1,...,a t) [m ] t, (a 1,...,a t) R if and only if (a 1 mod m 1,...,a t mod m t ) R. We have R /m t R / t i=1 m i (1 1/3t) t 1/2 e 1/3 1/3. It follows there is a point (a 1,...,a t ) R H. Therefore the point (a 1 mod m 1,...,a t mod m t ) is in R H. It follows that H is a hitting set as required. For integer t 1, we say a family of functions H = {f : [n] [m]} is a t-perfect hash family, if for every C [n] of size C = t, there is f H that is injective on T. We will use the following family of perfect hash functions of Naor, Schulman and Srinivasan [12]. Theorem 2.5 ([12]). For integer t, a t-perfect hash family H of functions f : [k 2 ] [t] can be computed of size e t+o(log2 t) logk can be constructed in time O(e t+o(log2 t) k logk). We will be interested in constructing families of perfect hash functions that, in addition to being injective on a set C, have the property of sending another large set D to an output disjoint from the image of C. We call such a family of functions a separating family Definition 2.6 (Separating family). Fix integers t,k,s. For disjoint subsets C,D [n] We say a function h : [n] [s] separates C from D if h is injective on C. There are no collisions between C and D. That is, h(c) h(d) =. A family of functions H {h : [n] [s]} is (t,k)-separating if for every disjoint subsets C,D [n] with C = t and D k t, there is a function h H that separates C from D. We say H is (t,k,s)-separating with probability γ if for any fixed C, D with sizes as above, a uniformly chosen h H separates C from D with probability at least γ. A central case of separating families will be when the range size is C +1. In this case we use the term minimal-separating family. It will be convenient to assume in the definition that C is mapped to the first C elements in the range. Definition 2.7 (Minimal separating family). A family of functions H {h : [n] [t+1]} is (t,k)-minimal separating if for every disjoint subsets C,D [n] with C = t and D k t there is a function h H such that separates C from D if h(c) = [t]. h(d) = t+1. 3 Multiset separators and representative sets The purpose of this section is to formally define and construct representative sets for multisets. The primary tool for this is what we call a multiset separator (Definition 3.1). Informally, a multiset separator is a not too large set of witnesses for the fact that two multisets of bounded size do not jointly contain too many repetitions per element. 3

4 Notation for multisets Fix integers r,k n. We use the notation [r] 0 {0,...,r}. An r-set is a multiset A where each element of [n] appears at most r times. It will be convenient to think of A as a vector in [r] n 0 where A i denotes the number of times i appears in A. We denote by A the number of elements in A counting repetitions. That is, A = n i=1 A i. We refer to A as the size of A. An (r,k)-set is an r-set A [r] n 0, where the number of elements with repetitions is at most k. That is, A k. Fix r-sets A,B [r] n 0. we say that A B when A i B i for all i [n]. Another convenient notation will be to denote by A [r] n 0 the complement r-set. That is, A i = r A i for all i [n]. Suppose now that A and B are (r,k)-sets. We say that A and B are (r,k)-compatible if A+B is also an (r,k)-set, and A+B = k. That is, the total number of elements with repetitions in A and B together is k and any specific element i [n] appears in A and B together at most r times. With the notation above at hand, we can define the central object needed for our algorithms. Definition 3.1 (Multiset separator). Let F be a family of r-sets. We say that F is an (r,k)-separator if for any (r,k)-sets A,B [r] n 0 that are (r,k)-compatible, there exists F F such that A F B. The following theorem shows how an (r, k)-separator can be constructed from a minimal separating family. Theorem 3.2. Fix integers 1 < r k, and let t 2k/r. Suppose a (t,k)-minimal separating family H can be constructed in time O( H n). Then an (r,k)-separator F of size H (r +1) t can be constructed in time O( H n) Proof. For simplicity in the proof we assume r is even - otherwise we simply need to replace appearances of r/2 with r/2. For each h : [n] [t+1] in H, for each w = (w 1,...,w t ) [r] t 0, construct the following r-set F h,w [r] n 0. Think of h as dividing [n] into t+1 buckets. For 1 i t, we give all indices in the i th bucket weight w i. Formally, for all j h 1 (i), we let f h,w j = w i. All indices in the (t+1) th bucket get weight r/2. Formally, for all j h 1 (t+1), we let f h,w j = r/2. F will consist of all the r-sets F h,w. We have F = H (r +1) t. The efficiency of F s construction follows from the efficiency of H. Let us prove that F is indeed an (r,k)- separator. Fix (r,k)-compatible (r,k)-sets A,B [r] n 0. Denote by C [n] the sets of elements in A and B that appear more than r/2 times in one of the sets. That is, C = {i [n] A i > r/2 or B i > r/2}. Denote by D the set of all other elements in A or B. That is, D = {i [n] 0 < A i r/2 or 0 < B i r/2}. Note that, as A and B are (r,k)-sets, C 2k/r = t. As A and B are (r,k)-compatible, k/r C D k. Assume for simplicity that C = t. 2 Now, fix h H that separates C from D. For 1 j t, let i j be the unique element of C mapped to j. Choose w j [r] 0 such that A ij w j r B ij. Such w j exists as A and B are (r,k)-compatible. Let w = (w 1,...,w t ). We claim that A F h,w B. For i C, the choice of w guarantees A i F h,w i B i. For i D, we have F h,w = r/2; and from the definition of D we have for such i, A i r/2 B i. For i / C D, we have that A i = 0 and B i = r, so surely A i F h,w i B i. Using the construction of a minimal separating family to be presented in Theorem 4.1, we get Corollary 3.3. Fix integers 1 < r k. An (r,k)-separator F of size O k (r 6k/r 2 O(k/r) logn) can be constructed in time O k (r 6k/r 2 O(k/r) n logn) Proof. Let H be the (t,k)-minimal separating family of size O k ((k/t) 2t 2 O(t) logn) that can be constructed in time O k ((k/t) 2t 2 O(t) n logn) from Theorem 4.1. Using Theorem 4.1 we have F = H (r +1) t = O k (r 6k/r 2 O(k/r) logn). Before proceeding we discuss the issue of weighted sets. From now on, we always assume the elements {1,...,n} are assigned integer weights. We define the weight of a multiset as the sum of the weights of its elements counting repetitions. Formally, for A [r] n 0, wt(a) = n A i wt(i). i=1 2 Otherwise move elements from D to C so that C = t. The property we will need is that A i,b i r/2 for i D, and D k t. These properties are not affected by moving elements from D to C. 4

5 We are ready to define the notion of a representative set for a family of multisets. Definition 3.4 (Representative sets for multisets). Let P be a weighted family of (r, k)-sets. We say a subset ˆP P represents P if for every (r,k)-set Q the following holds. If there is P P of weight w that is (r,k)-compatible with Q, then there is P ˆP of weight w w that is (r,k)-compatible with Q. The following definition and lemma show that an(r, k)-separator is sufficient for constructing representative sets. Definition 3.5. Let P be a weighted family of r-sets. Let F be a family of (r,k)-sets. The weighted family Trim F (P) P is defined as follows. For each F F, and for each 1 i k, check if there exists P P with P = i and P F. If so, insert into Trim F (P) some P P that is of minimal weight among those with P = i and P F. Lemma 3.6. Let F be an (r,k)-separator. Let P be a weighted family of (r,k)-sets. Then Trim F (P) represents P. Proof. Fix an (r,k)-set Q and suppose there is an (r,k)-set P P that is (r,k)-compatible with P. In particular, we have P = k Q. Fix F F with P F Q. As P F, when computing Trim F (P) we musthaveinserteditan(r,k)-setp P ofsizek Q andweightw w suchthatp F. ThereforeP Q, which implies that P +Q is an (r,k)-set. As P +Q = k, we have that P and Q are (r,k)-compatible. Plugging in our construction of an (r, k)-separator into Lemma 3.6, we get the following. Corollary 3.7. Let P be a weighted family or (r, k)-sets. There exists a deterministic algorithm running in time O k ( P r 6k/r 2O(k/r) n logn) returning a family ˆP P representing P of size O k (r6k/r 2O(k/r) logn). Proof. Let F be the (r,k)-separator of size O k (r 6k/r 2 O(k/r) logn) from Corollary 3.3. F can be computed in time O k (r 6k/r 2 O(k/r) n logn). We compute Trim F (P) which represents P by Lemma 3.6. Computing Trim F (P) consists of going over all pairs of r-sets P P and F F and checking if P F. Thus, the computation takes time at most O k ( P F n logr) = O k ( P r 6k/r 2 O(k/r) n logn). 3.1 The operation. Definition 3.8. We say that (r,k)-sets A and B are (r,k)-consistent, if A+B k, and A i +B i r for all i [n]. (This is a weaker definition than (r,k)-compatible which required A+B = k). Let A and B be families of (r,k)-sets. We denote by A B the set A B {A + B A A,B B A and B are (r,k) consistent}. In particular, for an element i [n], we denote A {i} {A + i A A, A < k,a i < r}. Claim 3.9. If  represents A and ˆB represents B, then  ˆB represents A B. Proof. Fix an (r,k)-set D such that there exists C A B that is (r,k)-compatible with D. We have that C = A+B for some A A and B B that are (r,k)-consistent. In particular, A is (r,k)-compatible with B +D. Thus, there must be A  that is (r,k)-compatible with B +D. In other words, A +B +D is an (r,k)-set of size A +B +D = k. It follows that B is (r,k)-compatible with A +D. Thus, there is B ˆB that is (r,k)-compatible with A + D. Again, for this B we have that A + B + D is an (r,k)-set of size k. Therefore A + B is an (r,k)-set of size at most k. In other words, A and B are (r,k)-consistent, and therefore A +B A B. As A +B is (r,k)-compatible with D, we are done. 4 A construction of a separating family The purpose of this section is to construct the separating family of functions in the following theorem. Theorem 4.1. Fix positive integers t k n. A (t,k)-minimal separating family of size O k ((k/t) 2t 2 O(t) logn) can be constructed in time O k ((k/t) 2t 2 O(t) n logn) 5

6 We begin with some preliminary lemmas. One component in our construction is a family of ǫ-pairwise independent functions. Definition 4.2. A family of functions H {f : [n] [m]} is ǫ-pairwise independent if for all for all x,y [n] and a,b [m] Pr f H (f(x) = a f(y) = b) 1/m 2 ǫ The constructions of [11] and [2] imply the following construction of an ǫ-pairwise independent family of functions (cf. Section 4 of [3]). Theorem 4.3. Fix any m n. A family of 1/m 2 -pairwise independent functions H {f : [n] [m]} of size m O(1) logn can be constructed in time O(m O(1) n logn). Lemma 4.4. For integers k n. A family H k,4k {f : [n] [4 k]} that is (1,k,4 k)-separating with probability 1/2 of size k O(1) logn can be constructed in time k O(1) n logn. Proof. Let H : {f : [n] [4k]} be the family of 1/(4k) 2 -pairwise independent functions from Theorem 4.3. Fix the sets C = {a} and D = {b 1,...,b k 1 } we want to separate. For j [k 1], let X j be a random variable that is one if f(a) = f(b j ) and zero otherwise, where f H is chosen uniformly. From the 1/4k-pairwise independence of H, we have E(X j ) = Pr(X j = 1) 4k (1/(4k) 2 +1/(4k) 2 ) 1/(2k). Defining X = k 1 j=1 X j we have E(X) < 1/2. Note that X is precisely the number of collisions between C and D. From Markov, Pr(X 1) 1/2. So with probability at least half over the choice of f, C and D are separated. The next claim follows from the well-known theorem that the geometric mean of non-negative numbers is always smaller than their arithmetic mean. Claim 4.5. Let k 1,...,k t be positive real numbers such that k k t k. Then t i=1 k i (k/t) t. We are ready to proceed to the main construction. 4.1 The main construction - proof of Theorem 4.1 Proof. Fix disjoint subsets C,D [n] with C = t and D k t. Recall that we want to construct a family of functions H = {h : [n] [t+1]}, such that for any C and D as above, there exists h H that separates C from D. It will be convenient to present the family by constructing h adapatively given C and D. We will bound the number of choices we make when constructing h, and this will give a bound on the size of H. We assume without loss of generality that D = k t. 1. Let H 0 {f : [n] [k 2 ]} be the k-perfect hash family from Lemma 2.1. Choose f 0 H 0 that is injective on C D - k O(1) logn choices. From now on, identify C and D with their images in [k 2 ] under f Let H 1 {f : [k 2 ] [t]} be the t-perfect hash family from Theorem 2.5. Choose a function f 1 H 1 that is injective on C - e t+o(log2 t) logk choices. For i [t], we denote from now on by c i the (unique) element of C with f 1 (c i ) = i. 3. Choose non-negative integers k 1,...,k t such that k i is the number of elements a D with f 1 (a) = i. Note that k k t = k t, so the number of choices is ( k 1 t 1) ( k t) (ek/t) t. 4. For i [t], let H ki,4k i {f : [k 2 ] [4 k i ]} be the (1,k i,4 k i )-separating with probability 1/2 family of size m i = k O(1) i logk. Let R be the set of all vectors (h 1,...,h t ) where for all i [t], h i is an element of H ki,4k i that separates c i from D i. Identify [m i ] with H ki,4k i. Note that R is a combinatorial rectangle of sidewise density 1/2 in [m 1 ]... [m t ]. Note that for all i [t], m i m for some m = k O(1). Let H be the hitting set for combinatorial rectangles with sidewise density 1/2 from Corollary 2.4. Choose an element (h 1,...,h t ) H t R - (k 2 t ) O(1) choices. For i [t], apply h i to partition B i into buckets B i,1,...,b i,4ki such that c i is mapped to a separate bucket from all elements of D i. 6

7 5. For each i [t], choose the j [4k i ] such that c i was mapped to bucket B i,j. Map the elements of B i,j to i. Map the elements of B i,j for j j to t+1; the number of choices is 4 t t i=1 k i (4k/t) t, where the inequality uses Claim 4.5. To sum up, the number of different functions enumerated in all the above stages is at most k O(1) logn e t+o(log2 t) logk (ek/t) t (k 2 t ) O(1) (4k/t) t = (k/t) 2t 2 O(t) k O(1) logn = O k ((k/t) 2t 2 O(t) logn). Similarly, going over the construction times of the different components used in the above stages, we get that the family can be constructed in time O(k O(1) n logn e t+o(log2 t) k logk (ek/t) t (k 2 t ) O(1) (4k/t) t ) = O((k/t) 2t 2 O(t) k O(1) n logn) = O k ((k/t) 2t 2 O(t) n logn)). 4.2 Lopsided universal sets A corollary of the last section is a construction of smaller lopsided universal sets[8]. Bshouty [6] referred to this object as a cover free family. Definition 4.6. An n-p-q-lopsided universal set is a family of subsets F [n] such that for every disjoint subsets A,B [n] with A = p and B = q there exists F F with A F and F B =. Let k = p + q. An n-p-q-lopsided universal set is equivalent to a set of strings F B n such that when restricting the strings in F to any k indices we see all strings of weight p. We restate and prove Theorem 1.1. Theorem 4.7. Fix integers p,q and n such that k = p + q n. An n-p-q-lopsided universal set of size O k ((k/p) 2 p 2 O(p) logn) can be constructed in time O k ((k/p) 2 p 2 O(p) n logn). Proof. The theorem follows easily from our construction of a minimal separating family. Let H be the (p, k)- minimal separating family of size O k ((k/p) 2p 2 O(p) logn) from Theorem 4.1. For each h H, construct the set F h = h 1 ({1,...,p}). Let F {F h h H}. The definition of a minimal separating family implies F is an n-p-q-lopsided universal set. 5 Algorithmic applications Throughout this section r denotes an integer always in the range 1 < r < k. The following simple observation will be used in all of our algorithmic applications. Claim 5.1. Let P be a family of (r,k)-sets containing a multiset P of size k and weight w. Then any ˆP P representing P contains a multiset P of size k and weight w w. Proof. Take B =. Then P and B are (r,k)-compatible. So there must be P ˆP that is (r,k)-compatible with B of weight at most w. As P +B = k we have P = k. 5.1 r-simple k-path We introduce some notation for defining the r-simple k-path problem Let G be a directed graph on n vertices. A k-path in G is a simple walk P = v 1 v 2... v k in G. An r-simple k-path is a walk P = v 1 v 2... v k in G such that no vertex is repeated more than r times. 7

8 r-simple k-path Input: Directed graph G = (V,E), weight function w : E R. Parameter: k N. Problem: Determine if there exists an r-simple k-path in G and if so return one of minimal weight. Theorem 5.2. r-simple k-path can be solved in deterministic time O k (r 12k/r 2 O(k/r) n 3 logn). Proof. For u [n] and i [k], let P i,u denote the set of r-simple paths of length i in G ending in u. Note that an element P of such a set P i,u can be viewed as an (r,k)-set when we ignore the order of vertices in the path. WecanthusviewthesetsP i,u asfamiliesof(r,k)-sets. Wewillcomputebyadynamicprogrammingalgorithm, for each u [n] and i [k], a set ˆP i,u P i,u representing P i,u of size at most O k (r 6k/r 2 O(k/r) logn). Note that G contains an r-simple k-path if and only if one of the sets ˆP k,u is non-empty; thus, such an algorithm can be used to solve r-simple k-path. We proceed with the algorithm description. For i = 1, ˆP 1,u will simply contain the length one path u. Assume we have computed ˆP i,u for every u [n]. We describe the computation of ˆP i+1,v for a fixed v [n] together with its running time. 1. We compute P (u,v) E ˆP i,u v. We have P n O k (r 6k/r 2 O(k/r) logn). We claim that P represents P i+1,v : Note first that P i+1,v = (u,v) E P i,u v. By Claim 3.9, for any u [n], ˆPi,u v represents P i,u v. Therefore, P = (u,v) E ˆP i,u v represents (u,v) E P i,u v = P i+1,v. Computing P requires time O( u [n] ˆP i,u ) = O k (n r 6k/r 2 O(k/r) logn). 2. Now compute a set ˆP i+1,v of size ˆP i+1,v = O k (r 6k/r 2 O(k/r) logn) representing P using Corollary 3.7. This takes time O( P r 6k/r 2 O(k/r) n logn) = O(n 2 r 12k/r 2 O(k/r) logn) 5.2 r (p,q)-packing We say P [n] is a q-set if P = q. We say a set of q-sets A = {P 1,...,P t } is an r-packing if any element j [n] appears in at most r of the q-sets in A. The r (p,q)-packing problem asks whether a given family of q-sets contains an r-packing. 3 r (p,q)-packing Input: Weighted family F of q-sets with F = n O(1). Parameter: k = p q N. Problem: Determine whether there exists a subset A F with A = p that is an r-packing, and if so return such A of minimal weight. Theorem 5.3. Let k = p q. r (p,q)-packing can be solved in deterministic time O k (r 12k/r 2 O(k/r) n O(1) ). Proof. Fix a family F of q-sets. For i [p], denote by P i the set of r-packings of size i in F. Note that an element A = {P 1,...,P i } of P i can be viewed as an (r,k)-set: We think of A as the multiset A = P 1... P i. We know that this multiset has size at most p q = k and any element j [n] appears in A at most r times. We will compute for each 1 i p, a set ˆP i P i representing P i of size at most O k (r6k/r 2O(k/r) logn). Note that F contains a subset A F of size p that is an r-packing if and only if ˆP p is non-empty, thus such an algorithm will answer correctly. We proceed with the algorithm description. For i = 1, we have P 1 = F. Assume we have computed ˆP i. We describe the computation of ˆP i+1. 3 The assumption F = n O(1) below is only for convenience. Without it, the running time in Theorem 5.3 would have an extra F O(1) factor. 8

9 1. We compute P ˆP i F. We have P n O(1) O k (r 6k/r 2 O(k/r) logn). We claim that P represents P i+1 : Note first that P i+1 = P i F. Thus, by claim 3.9 P = ˆP i F represents P i F = P i+1. Computing P requires time O k ( F P i,u n O(1) ) = O k (r 6k/r 2 O(k/r) logn n O(1) ). 2. Now compute a set ˆP i+1 of size ˆP i+1 = O k (r 6k/r 2 O(k/r) logn) representing P using Corollary 3.7. This takes time O k ( P r 6k/r 2 O(k/r) n logn) = O k (n O(1) r 12k/r 2 O(k/r) ). 5.3 (r, k)-monomial DETECTION We say a monomial X d1 1 Xdn n is an r-monomial if for all i [n], d i r. We say the monomial is an (r,k)-monomial if the above holds and the total degree of the monomial is k. Let C be an arithmetic circuit computing a polynomial f(x 1,...,X n ) Z[X 1,...,X n ]. We say C is non-canceling if it contains only variables at its leafs (i.e., no constants), and only addition and multiplication gates (i.e., no substractions). For a non-canceling circuit C, we define C to be the number of multiplication and addition gates plus the number of leafs (each containing a variable). We assume the fan-in of a non-canceling circuit is two, i.e., each multiplication and addition gate has at most two wires coming in. (This will simply be convenient for bounding the run-time as a function of C ). (r, k)-monomial DETECTION Input: A non-cancelling circuit C computing a polynomial f(x 1,...,X n ) Z[X 1,...,X n ]. Parameter: k N. Problem: Determine if there exists an (r, k)-monomial in f with non-zero coefficient and if so, return such a monomial. Theorem 5.4. Given a non-canceling circuit C computing a polynomial f(x 1,...,X n ) Z[X 1,...,X n ], (r,k)-monomial DETECTION can be solved in deterministic time O k ( C r 12k/r 2 O(k/r) n logn). Proof. For each gate s of C, let f s be the polynomial computed at s. Define P s to be the set of r-monomials of total degree at most k that appear in f s with nonzero coefficient. We can view P s as a family of (r,k)- sets: An r-monomial M = X d1 1 Xdn n of total degree at most k corresponds to the (r,k)-set where j [n] appears d j times. We present an algorithm that computes for every gate s of C a set ˆP s P s of size O k (r 6k/r 2 O(k/r) logn) representing P s. Let s out be the output gate of C. If f contains an r-monomial of total degree k then ˆP sout will contain such a monomial. We compute the sets ˆP s from bottom to top. Suppose we have computed ˆP 1 P ˆ s1 and P 2 P ˆ s2 for the gates s 1 and s 2 having wires into s. If s is an addition gate we define P ˆP 1 ˆP 2. We claim that P represents P s : As C is non-canceling the monomials, appearing in f s with nonzero coefficient are simply the union of the monomials of s 1 and s 2. In particular, P s = P s1 P s2. Therefore P = ˆP s1 ˆP s2 represents P s. If s is a multiplication gate define P P ˆ s1 P ˆ s2. As C is non-canceling, the monomials of f s are exactly the set of all products of a monomial of f s1 and a monomial of f s2. P s is exactly the set of these products that are also (r,k)-monomials. When viewed as a multiset, the product of the monomials M 1 and M 2 is the multiset M 1 +M 2. Thus, P s = P s1 P s2 and therefore, using Claim 3.9, P = ˆP s1 ˆP s2 represents P s. Now compute a set ˆP s of size at most O k (r 6k/r 2 O(k/r) logn) representing P using Corollary 3.7. This takes time O( P r 6k/r 2 O(k/r) n logn) = O(n O(1) r 12k/r 2 O(k/r) n logn) Acknowledgements The first author thanks Fedor V. Fomin for hosting him at a visit in the University of Bergen where this research was initiated. 9

10 References [1] H. Abasi, N. H. Bshouty, A. Gabizon, and E. Haramaty. On r-simple k-path. In Mathematical Foundations of Computer Science th International Symposium, MFCS 2014, Budapest, Hungary, August 25-29, Proceedings, Part II, pages 1 12, [2] N. Alon, O. Goldreich, J. Hastad, and R. Peralta. Simple construction of almost k-wise independent random variables. Random Struct. Algorithms, 3(3): , [3] N. Alon, R. Yuster, and U. Zwick. Color coding. In Encyclopedia of Algorithms [4] A. Björklund, T. Husfeldt, P. Kaski, and M. Koivisto. Narrow sieves for parameterized paths and packings. CoRR, abs/ , [5] B. Bollobás. On generalized graphs. Acta Math. Acad Sci. Hungar, 16: , [6] N. H. Bshouty. Testers and their applications. In ITCS, pages , [7] F. V. Fomin, D. Lokshtanov, F. Panolan, and S. Saurabh. Representative sets of product families. In Algorithms - ESA th Annual European Symposium, Wroclaw, Poland, September 8-10, Proceedings, pages , [8] F. V. Fomin, D. Lokshtanov, and S. Saurabh. Efficient computation of representative sets with applications in parameterized and exact algorithms. In SODA, pages , [9] I. Koutis. Faster algebraic algorithms for path and packing problems. In Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, pages , [10] N. Linial, M. Luby, M. E. Saks, and D. Zuckerman. Efficient construction of a small hitting set for combinatorial rectangles in high dimension. Combinatorica, 17(2): , [11] J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput., 22(4): , [12] Moni Naor, Leonard J. Schulman, and Aravind Srinivasan. Splitters and near-optimal derandomization. In FOCS, pages , [13] H. Shachnai and M. Zehavi. Representative families: A unified tradeoff-based approach. In Algorithms - ESA th Annual European Symposium, Wroclaw, Poland, September 8-10, Proceedings, pages , [14] R. Williams. Finding paths of length k in o * (2 k ) time. Inf. Process. Lett., 109(6): , [15] M. Zehavi. Deterministic parameterized algorithms for matching and packing problems. CoRR, abs/ ,

arxiv: v2 [cs.ds] 22 Jan 2014

arxiv: v2 [cs.ds] 22 Jan 2014 On r-simple k-path arxiv:1312.4863v2 [cs.ds] 22 Jan 2014 Hasan Abasi Nader H. Bshouty Ariel Gabizon Elad Haramaty Department of Computer Science Technion, Haifa June 15, 2018 Abstract An r-simple k-path

More information

Representative Sets of Product Families

Representative Sets of Product Families Representative Sets of Product Families Fedor V. Fomin Daniel Lokshtanov Fahad Panolan Saket Saurabh Abstract A subfamily F of a set family F is said to q-represent F if for every A F and B of size q such

More information

The Budgeted Unique Coverage Problem and Color-Coding (Extended Abstract)

The Budgeted Unique Coverage Problem and Color-Coding (Extended Abstract) The Budgeted Unique Coverage Problem and Color-Coding (Extended Abstract) Neeldhara Misra 1, Venkatesh Raman 1, Saket Saurabh 2, and Somnath Sikdar 1 1 The Institute of Mathematical Sciences, Chennai,

More information

Improved Algorithms for Path, Matching, and Packing Problems

Improved Algorithms for Path, Matching, and Packing Problems Improved Algorithms for Path, Matching, and Packing Problems Jianer Chen Songjian Lu Sing-Hoi Sze Fenghui Zhang Abstract Improved randomized and deterministic algorithms are presented for path, matching,

More information

Limits and Applications of Group Algebras for Parameterized Problems

Limits and Applications of Group Algebras for Parameterized Problems Limits and Applications of Group Algebras for Parameterized Problems Ioannis Koutis Computer Science Department Carnegie Mellon University ioannis.koutis@cs.cmu.edu Ryan Williams School of Mathematics

More information

Monomial Testing and Applications

Monomial Testing and Applications Monomial Testing and Applications Shenshi Chen Department of Computer Science, University of Texas-Pan American, Edinburg, TX 78539, USA. schen@broncs.utpa.edu arxiv:1303.0478v2 [cs.cc] 12 Apr 2013 Abstract.

More information

Induced subgraphs with many repeated degrees

Induced subgraphs with many repeated degrees Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with

More information

Algebraic approach to exact algorithms, Part III: Polynomials over nite elds of characteristic two

Algebraic approach to exact algorithms, Part III: Polynomials over nite elds of characteristic two Algebraic approach to exact algorithms, Part III: Polynomials over nite elds of characteristic two Šukasz Kowalik University of Warsaw ADFOCS, Saarbrücken, August 2013 Šukasz Kowalik (UW) Algebraic approach...

More information

On the hardness of losing width

On the hardness of losing width On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl

More information

Deterministic Truncation of Linear Matroids

Deterministic Truncation of Linear Matroids Deterministic Truncation of Linear Matroids Daniel Lokshtanov Pranabendu Misra Fahad Panolan Saket Saurabh Abstract Let M = (E, I) be a matroid. A k-truncation of M is a matroid M = (E, I ) such that for

More information

Efficient Computation of Representative Sets with Applications in Parameterized and Exact Algorithms

Efficient Computation of Representative Sets with Applications in Parameterized and Exact Algorithms Efficient Computation of Representative Sets with Applications in Parameterized and Exact Algorithms Fedor V. Fomin Daniel Lokshtanov Saket Saurabh Abstract Let M = (E, I) be a matroid and let S = {S 1,...,

More information

Chain Minors are FPT. B Marcin Kamiński. 1 Introduction. Jarosław Błasiok 1 Marcin Kamiński 1

Chain Minors are FPT. B Marcin Kamiński. 1 Introduction. Jarosław Błasiok 1 Marcin Kamiński 1 Algorithmica (2017) 79:698 707 DOI 10.1007/s00453-016-0220-1 Chain Minors are FPT Jarosław Błasiok 1 Marcin Kamiński 1 Received: 21 March 2014 / Accepted: 21 September 2016 / Published online: 20 October

More information

arxiv: v1 [cs.ds] 22 Apr 2013

arxiv: v1 [cs.ds] 22 Apr 2013 Chain minors are FPT Jaros law B lasiok 1 and Marcin Kamiński 2 1 Instytut Informatyki Uniwersytet Warszawski jb291202@students.mimuw.edu.pl arxiv:1304.5849v1 [cs.ds] 22 Apr 2013 2 Département d Informatique

More information

Low-discrepancy sets for high-dimensional rectangles: a survey

Low-discrepancy sets for high-dimensional rectangles: a survey The Computational Complexity Column Eric Allender Rutgers University, Department of Computer Science Piscataway, NJ 08855 USA allender@cs.rutgers.edu With this issue of the Bulletin, my tenure as editor

More information

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0. Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound

More information

Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem

Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem Algorithmica (2011 59: 510 520 DOI 10.1007/s00453-009-9316-1 Tight Approximation Ratio of a General Greedy Splitting Algorithm for the Minimum k-way Cut Problem Mingyu Xiao Leizhen Cai Andrew Chi-Chih

More information

CSE 190, Great ideas in algorithms: Pairwise independent hash functions

CSE 190, Great ideas in algorithms: Pairwise independent hash functions CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required

More information

Almost k-wise independence versus k-wise independence

Almost k-wise independence versus k-wise independence Almost k-wise independence versus k-wise independence Noga Alon Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Israel. nogaa@post.tau.ac.il Yishay Mansour School of Computer Science

More information

Lecture 6: Random Walks versus Independent Sampling

Lecture 6: Random Walks versus Independent Sampling Spectral Graph Theory and Applications WS 011/01 Lecture 6: Random Walks versus Independent Sampling Lecturer: Thomas Sauerwald & He Sun For many problems it is necessary to draw samples from some distribution

More information

On the hardness of losing width

On the hardness of losing width On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl

More information

Lower Bounds for Testing Bipartiteness in Dense Graphs

Lower Bounds for Testing Bipartiteness in Dense Graphs Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due

More information

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,

More information

Parameterized single-exponential time polynomial space algorithm for Steiner Tree

Parameterized single-exponential time polynomial space algorithm for Steiner Tree Parameterized single-exponential time polynomial space algorithm for Steiner Tree Fedor V. Fomin 1, Petteri Kaski 2, Daniel Lokshtanov 1, Fahad Panolan 1,3, and Saket Saurabh 1,3 1 University of Bergen,

More information

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS PAVEL HRUBEŠ, SIVARAMAKRISHNAN NATARAJAN RAMAMOORTHY, ANUP RAO, AND AMIR YEHUDAYOFF Abstract. There are various notions of balancing set families

More information

Linear Algebra March 16, 2019

Linear Algebra March 16, 2019 Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented

More information

PRGs for space-bounded computation: INW, Nisan

PRGs for space-bounded computation: INW, Nisan 0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,

More information

Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing

Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Philipp Woelfel Dept. of Computer Science University Dortmund D-44221 Dortmund Germany phone: +49 231 755-2120 fax: +49 231 755-2047

More information

Communication is bounded by root of rank

Communication is bounded by root of rank Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r

More information

Lecture 23: Alternation vs. Counting

Lecture 23: Alternation vs. Counting CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

On a hypergraph matching problem

On a hypergraph matching problem On a hypergraph matching problem Noga Alon Raphael Yuster Abstract Let H = (V, E) be an r-uniform hypergraph and let F 2 V. A matching M of H is (α, F)- perfect if for each F F, at least α F vertices of

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

2 Completing the Hardness of approximation of Set Cover

2 Completing the Hardness of approximation of Set Cover CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 15: Set Cover hardness and testing Long Codes Nov. 21, 2005 Lecturer: Venkat Guruswami Scribe: Atri Rudra 1 Recap We will first

More information

Testing the Expansion of a Graph

Testing the Expansion of a Graph Testing the Expansion of a Graph Asaf Nachmias Asaf Shapira Abstract We study the problem of testing the expansion of graphs with bounded degree d in sublinear time. A graph is said to be an α- expander

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

A robust APTAS for the classical bin packing problem

A robust APTAS for the classical bin packing problem A robust APTAS for the classical bin packing problem Leah Epstein Asaf Levin Abstract Bin packing is a well studied problem which has many applications. In this paper we design a robust APTAS for the problem.

More information

Katarzyna Mieczkowska

Katarzyna Mieczkowska Katarzyna Mieczkowska Uniwersytet A. Mickiewicza w Poznaniu Erdős conjecture on matchings in hypergraphs Praca semestralna nr 1 (semestr letni 010/11 Opiekun pracy: Tomasz Łuczak ERDŐS CONJECTURE ON MATCHINGS

More information

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we

More information

Minimal Paths and Cycles in Set Systems

Minimal Paths and Cycles in Set Systems Minimal Paths and Cycles in Set Systems Dhruv Mubayi Jacques Verstraëte July 9, 006 Abstract A minimal k-cycle is a family of sets A 0,..., A k 1 for which A i A j if and only if i = j or i and j are consecutive

More information

Oblivious and Adaptive Strategies for the Majority and Plurality Problems

Oblivious and Adaptive Strategies for the Majority and Plurality Problems Oblivious and Adaptive Strategies for the Majority and Plurality Problems Fan Chung 1, Ron Graham 1, Jia Mao 1, and Andrew Yao 2 1 Department of Computer Science and Engineering, University of California,

More information

Lecture 24 Nov. 20, 2014

Lecture 24 Nov. 20, 2014 CS 224: Advanced Algorithms Fall 2014 Prof. Jelani Nelson Lecture 24 Nov. 20, 2014 Scribe: Xiaoyu He Overview Today we will move to a new topic: another way to deal with NP-hard problems. We have already

More information

Some notes on streaming algorithms continued

Some notes on streaming algorithms continued U.C. Berkeley CS170: Algorithms Handout LN-11-9 Christos Papadimitriou & Luca Trevisan November 9, 016 Some notes on streaming algorithms continued Today we complete our quick review of streaming algorithms.

More information

Optimal Hitting Sets for Combinatorial Shapes

Optimal Hitting Sets for Combinatorial Shapes Optimal Hitting Sets for Combinatorial Shapes Aditya Bhaskara Devendra Desai Srikanth Srinivasan November 5, 2012 Abstract We consider the problem of constructing explicit Hitting sets for Combinatorial

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

Finding and Counting Given Length Cycles 1. multiplication. Even cycles in undirected graphs can be found even faster. A C 4k 2 in an undirected

Finding and Counting Given Length Cycles 1. multiplication. Even cycles in undirected graphs can be found even faster. A C 4k 2 in an undirected Algorithmica (1997 17: 09 3 Algorithmica 1997 Springer-Verlag New York Inc. Finding and Counting Given Length Cycles 1 N. Alon, R. Yuster, and U. Zwick Abstract. We present an assortment of methods for

More information

Finding a Heaviest Triangle is not Harder than Matrix Multiplication

Finding a Heaviest Triangle is not Harder than Matrix Multiplication Finding a Heaviest Triangle is not Harder than Matrix Multiplication Artur Czumaj Department of Computer Science New Jersey Institute of Technology aczumaj@acm.org Andrzej Lingas Department of Computer

More information

Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs

Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs Neeldhara Misra 1, Fahad Panolan 2, Ashutosh Rai 2, Venkatesh Raman 2, and Saket Saurabh 2 1 Indian Institute of Science,

More information

Balanced Families of Perfect Hash Functions and Their Applications

Balanced Families of Perfect Hash Functions and Their Applications Balanced Families of Perfect Hash Functions and Their Applications Noga Alon 1, and Shai Gutner 2, 1 Schools of Mathematics and Computer Science, Tel-Aviv University, Tel-Aviv, 69978, Israel noga@math.tau.ac.il

More information

Enumerating the edge-colourings and total colourings of a regular graph

Enumerating the edge-colourings and total colourings of a regular graph Enumerating the edge-colourings and total colourings of a regular graph S. Bessy and F. Havet November 5, 2011 Abstract In this paper, we are interested in computing the number of edge colourings and total

More information

Edge-disjoint induced subgraphs with given minimum degree

Edge-disjoint induced subgraphs with given minimum degree Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster Department of Mathematics University of Haifa Haifa 31905, Israel raphy@math.haifa.ac.il Submitted: Nov 9, 01; Accepted: Feb 5,

More information

Poly-logarithmic independence fools AC 0 circuits

Poly-logarithmic independence fools AC 0 circuits Poly-logarithmic independence fools AC 0 circuits Mark Braverman Microsoft Research New England January 30, 2009 Abstract We prove that poly-sized AC 0 circuits cannot distinguish a poly-logarithmically

More information

A Robust APTAS for the Classical Bin Packing Problem

A Robust APTAS for the Classical Bin Packing Problem A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours

More information

Lecture 3: Randomness in Computation

Lecture 3: Randomness in Computation Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,

More information

Containment restrictions

Containment restrictions Containment restrictions Tibor Szabó Extremal Combinatorics, FU Berlin, WiSe 207 8 In this chapter we switch from studying constraints on the set operation intersection, to constraints on the set relation

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Acyclic and Oriented Chromatic Numbers of Graphs

Acyclic and Oriented Chromatic Numbers of Graphs Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,

More information

Vertex colorings of graphs without short odd cycles

Vertex colorings of graphs without short odd cycles Vertex colorings of graphs without short odd cycles Andrzej Dudek and Reshma Ramadurai Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 1513, USA {adudek,rramadur}@andrew.cmu.edu

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory Part V 7 Introduction: What are measures and why measurable sets Lebesgue Integration Theory Definition 7. (Preliminary). A measure on a set is a function :2 [ ] such that. () = 2. If { } = is a finite

More information

Algebraic Fingerprints for faster algorithms

Algebraic Fingerprints for faster algorithms Algebraic Fingerprints for faster algorithms Ioannis Koutis Computer Science Dept. U of Puerto Rico-Rio Piedras ioannis.koutis@upr.edu Ryan Williams Computer Science Dept. Stanford University rrw@cs.stanford.edu

More information

Certifying polynomials for AC 0 [ ] circuits, with applications

Certifying polynomials for AC 0 [ ] circuits, with applications Certifying polynomials for AC 0 [ ] circuits, with applications Swastik Kopparty Srikanth Srinivasan Abstract In this paper, we introduce and develop the method of certifying polynomials for proving AC

More information

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions. CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the

More information

The sum of d small-bias generators fools polynomials of degree d

The sum of d small-bias generators fools polynomials of degree d The sum of d small-bias generators fools polynomials of degree d Emanuele Viola April 9, 2008 Abstract We prove that the sum of d small-bias generators L : F s F n fools degree-d polynomials in n variables

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RAN RAZ AND IDDO TZAMERET Abstract. We develop and study the complexity of propositional proof systems of varying strength extending resolution by

More information

The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs

The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs The Chromatic Number of Ordered Graphs With Constrained Conflict Graphs Maria Axenovich and Jonathan Rollin and Torsten Ueckerdt September 3, 016 Abstract An ordered graph G is a graph whose vertex set

More information

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University Finite fields, randomness and complexity Swastik Kopparty Rutgers University This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials

More information

Balanced bipartitions of graphs

Balanced bipartitions of graphs 2010.7 - Dedicated to Professor Feng Tian on the occasion of his 70th birthday Balanced bipartitions of graphs Baogang Xu School of Mathematical Science, Nanjing Normal University baogxu@njnu.edu.cn or

More information

arxiv: v3 [math.co] 10 Mar 2018

arxiv: v3 [math.co] 10 Mar 2018 New Bounds for the Acyclic Chromatic Index Anton Bernshteyn University of Illinois at Urbana-Champaign arxiv:1412.6237v3 [math.co] 10 Mar 2018 Abstract An edge coloring of a graph G is called an acyclic

More information

PSRGs via Random Walks on Graphs

PSRGs via Random Walks on Graphs Spectral Graph Theory Lecture 11 PSRGs via Random Walks on Graphs Daniel A. Spielman October 3, 2012 11.1 Overview There has been a lot of work on the design of Pseudo-Random Number Generators (PSRGs)

More information

Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions

Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions arxiv:1303.705v1 [math.co] 8 Mar 013 Winkler s Hat Guessing Game: Better Results for Imbalanced Hat Distributions Benjamin Doerr Max-Planck-Institute for Informatics 6613 Saarbrücken Germany April 5, 018

More information

On the number of cycles in a graph with restricted cycle lengths

On the number of cycles in a graph with restricted cycle lengths On the number of cycles in a graph with restricted cycle lengths Dániel Gerbner, Balázs Keszegh, Cory Palmer, Balázs Patkós arxiv:1610.03476v1 [math.co] 11 Oct 2016 October 12, 2016 Abstract Let L be a

More information

The Lefthanded Local Lemma characterizes chordal dependency graphs

The Lefthanded Local Lemma characterizes chordal dependency graphs The Lefthanded Local Lemma characterizes chordal dependency graphs Wesley Pegden March 30, 2012 Abstract Shearer gave a general theorem characterizing the family L of dependency graphs labeled with probabilities

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Exponential-Time Approximation of Weighted Set Cover

Exponential-Time Approximation of Weighted Set Cover Exponential-Time Approximation of Weighted Set Cover Marek Cygan, Lukasz Kowalik and Mateusz Wykurz Institute of Informatics, University of Warsaw, Poland. cygan@mimuw.edu.pl, kowalik@mimuw.edu.pl, wykurz@gmail.com.

More information

Analysis of Algorithms I: Perfect Hashing

Analysis of Algorithms I: Perfect Hashing Analysis of Algorithms I: Perfect Hashing Xi Chen Columbia University Goal: Let U = {0, 1,..., p 1} be a huge universe set. Given a static subset V U of n keys (here static means we will never change the

More information

Independent Transversals in r-partite Graphs

Independent Transversals in r-partite Graphs Independent Transversals in r-partite Graphs Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract Let G(r, n) denote

More information

MATH 115, SUMMER 2012 LECTURE 4 THURSDAY, JUNE 21ST

MATH 115, SUMMER 2012 LECTURE 4 THURSDAY, JUNE 21ST MATH 115, SUMMER 2012 LECTURE 4 THURSDAY, JUNE 21ST JAMES MCIVOR Today we enter Chapter 2, which is the heart of this subject. Before starting, recall that last time we saw the integers have unique factorization

More information

Almost Cross-Intersecting and Almost Cross-Sperner Pairs offamilies of Sets

Almost Cross-Intersecting and Almost Cross-Sperner Pairs offamilies of Sets Almost Cross-Intersecting and Almost Cross-Sperner Pairs offamilies of Sets Dániel Gerbner a Nathan Lemons b Cory Palmer a Balázs Patkós a, Vajk Szécsi b a Hungarian Academy of Sciences, Alfréd Rényi Institute

More information

ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS

ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS PATRICK BENNETT, ANDRZEJ DUDEK, ELLIOT LAFORGE December 1, 016 Abstract. Let C [r] m be a code such that any two words of C have Hamming

More information

The Complexity of the Matroid-Greedoid Partition Problem

The Complexity of the Matroid-Greedoid Partition Problem The Complexity of the Matroid-Greedoid Partition Problem Vera Asodi and Christopher Umans Abstract We show that the maximum matroid-greedoid partition problem is NP-hard to approximate to within 1/2 +

More information

Zero-sum square matrices

Zero-sum square matrices Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the

More information

Bounds on the generalised acyclic chromatic numbers of bounded degree graphs

Bounds on the generalised acyclic chromatic numbers of bounded degree graphs Bounds on the generalised acyclic chromatic numbers of bounded degree graphs Catherine Greenhill 1, Oleg Pikhurko 2 1 School of Mathematics, The University of New South Wales, Sydney NSW Australia 2052,

More information

Parity Dominating Sets in Grid Graphs

Parity Dominating Sets in Grid Graphs Parity Dominating Sets in Grid Graphs John L. Goldwasser and William F. Klostermeyer Dept. of Mathematics West Virginia University Morgantown, WV 26506 Dept. of Computer and Information Sciences University

More information

Higher-Dimensional Analogues of the Combinatorial Nullstellensatz

Higher-Dimensional Analogues of the Combinatorial Nullstellensatz Higher-Dimensional Analogues of the Combinatorial Nullstellensatz Jake Mundo July 21, 2016 Abstract The celebrated Combinatorial Nullstellensatz of Alon describes the form of a polynomial which vanishes

More information

THE METHOD OF CONDITIONAL PROBABILITIES: DERANDOMIZING THE PROBABILISTIC METHOD

THE METHOD OF CONDITIONAL PROBABILITIES: DERANDOMIZING THE PROBABILISTIC METHOD THE METHOD OF CONDITIONAL PROBABILITIES: DERANDOMIZING THE PROBABILISTIC METHOD JAMES ZHOU Abstract. We describe the probabilistic method as a nonconstructive way of proving the existence of combinatorial

More information

Packing triangles in regular tournaments

Packing triangles in regular tournaments Packing triangles in regular tournaments Raphael Yuster Abstract We prove that a regular tournament with n vertices has more than n2 11.5 (1 o(1)) pairwise arc-disjoint directed triangles. On the other

More information

Tolerant Versus Intolerant Testing for Boolean Properties

Tolerant Versus Intolerant Testing for Boolean Properties Tolerant Versus Intolerant Testing for Boolean Properties Eldar Fischer Faculty of Computer Science Technion Israel Institute of Technology Technion City, Haifa 32000, Israel. eldar@cs.technion.ac.il Lance

More information

The 2-valued case of makespan minimization with assignment constraints

The 2-valued case of makespan minimization with assignment constraints The 2-valued case of maespan minimization with assignment constraints Stavros G. Kolliopoulos Yannis Moysoglou Abstract We consider the following special case of minimizing maespan. A set of jobs J and

More information

Hardness of the Covering Radius Problem on Lattices

Hardness of the Covering Radius Problem on Lattices Hardness of the Covering Radius Problem on Lattices Ishay Haviv Oded Regev June 6, 2006 Abstract We provide the first hardness result for the Covering Radius Problem on lattices (CRP). Namely, we show

More information

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static

More information

Conflict-Free Colorings of Rectangles Ranges

Conflict-Free Colorings of Rectangles Ranges Conflict-Free Colorings of Rectangles Ranges Khaled Elbassioni Nabil H. Mustafa Max-Planck-Institut für Informatik, Saarbrücken, Germany felbassio, nmustafag@mpi-sb.mpg.de Abstract. Given the range space

More information