Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann, Paweł Gawrychowski, Shay Mozes, Oren Weimann
|
|
- Cordelia Ray
- 5 years ago
- Views:
Transcription
1 Karl Bringmann, Paweł Gawrychowsi, Shay Mozes, Oren Weimann
2
3 Minimum edits to transform one tree into the other
4 Minimum edits to transform one tree into the other rooted, ordered trees with node labels x y
5 Minimum edits to transform one tree into the other relabel node x to y x y A B C D relabel node y to x A B C D
6 Minimum edits to transform one tree into the other x delete node xy A B C D insert node xy A B C D
7 Minimum edits to transform one string into the other a b c d e f a b b d e e g e e
8 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f
9 Minimum edits to transform one string into the other a b c d e e a b b d e e g e e
10 Minimum edits to transform one string into the other a b c d e e a b b d e e g e e
11 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f
12 Minimum edits to transform one string into the other a b c d e a b b d e e g e e
13 Minimum edits to transform one string into the other a b c d e a b b d e e g e e
14 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f
15 Minimum edits to transform one string into the other a b c d e a b b d e e g e f
16 Minimum edits to transform one string into the other a b c d e a b b d e e g e f
17 Minimum edits to transform one string into the other O(n 2 ) time a b c d e a b b d e e g e e f
18 Minimum edits to transform one string into the other O(n 2 ) time a b c d e f a b b d e e g e e
19 Minimum edits to transform one string into the other O(n 2 ) time O(n 4 ) time a b c d e f a b b d e e g e e
20 String Edit Distance Cannot be Computed in Strongly Subquadratic Time (unless SETH is false) [Bacurs,Indy, STOC 5] a b c d e f a b b d e e g e e
21 x y
22 x y
23 x y
24 y
25 y
26 y prefix in postorder traversal prefix in postorder traversal
27 x y
28 x
29 x
30 x prefix in postorder traversal prefix in postorder traversal
31 x y
32 y y
33 y y
34 y y
35 y y not prefix in postorder traversal not prefix in postorder traversal
36 O(n 4 ) time [Shasha Zhang 989] y y not prefix in postorder traversal not prefix in postorder traversal
37 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] y y not prefix in postorder traversal not prefix in postorder traversal
38 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] O(n 3 ) time [Demaine, Mozes, Rossman, W. 2007] y y not prefix in postorder traversal not prefix in postorder traversal
39 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] O(n 3 ) time [Demaine, Mozes, Rossman, W. 2007] y y
40 Conjecture (APSP): For any ε > 0 there exists c > 0, such that All Pairs Shortest Paths on n node graphs with edge weights in {,..., n c } cannot be solved in O(n3-ε) time.
41 Conjecture (APSP): For any ε > 0 there exists c > 0, such that All Pairs Shortest Paths on n node graphs with edge weights in {,..., n c } cannot be solved in O(n3-ε) time. Equivalent to negative triangle detection [Vassilevsa-Williams,Williams 200] j i w(i,j)+w(j,)+w(,i) < 0
42 The Hard Instance of TED
43 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) a b b 0 a 0 c e 0 e d d 0 c 0
44 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a b b 0 a 0 c e 0 e d d 0 c 0
45 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a subsequence of spine nodes b b 0 a 0 subsequence of spine nodes subsequence of leaves c e 0 one middle leaf node one final spine node e d d 0 reversed subsequence of leaves c 0
46 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a subsequence of spine nodes one middle leaf node subsequence of leaves b b 0 c e 0 a 0 subsequence of spine nodes one middle leaf node one final spine node e d d 0 reversed subsequence of leaves c 0 one final spine node
47 APSP TED
48 APSP TED i j w(i,j)+w(j,)+w(,i) < 0 n n n n
49 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i n n n n
50 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) n n C(j,) C(j,) C(,i) n n
51 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n n
52 APSP TED Large alphabet: Σ = Θ(n) i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n n
53 APSP TED Large alphabet: Σ = Θ(n) i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n Solvable in: O( Σ 2 n 2 logn) time n
54 APSP TED j Small alphabet: Σ = O() i w(i,j)+w(j,)+w(,i) < 0
55 Max-weight APSP -Clique TED Small alphabet: Σ = O() Conjecture (Max-weight -Clique): For any ε > 0 there exists c > 0, such that for any 3 finding a maximum weight -Clique in graphs with edge weights in {,..., n c } cannot be solved in O(n(-ε)) time.
56 Max-weight APSP -Clique TED Small alphabet: Σ = O() Conjecture (Max-weight -Clique): For any ε > 0 there exists c > 0, such that for any 3 finding a maximum weight -Clique in graphs with edge weights in {,..., n c } cannot be solved in O(n(-ε)) time.
57 Max-weight APSP -Clique TED Small alphabet: Σ = O() 2 3 4
58 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 n/3+2
59 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 n/3+2
60 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 Subcubic TED O(n (-ε) ) Max-weight -Clique (for some =(ε)) n/3+2
61 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j i n/3+2 n/3+2 n/3+2 n/3+2
62 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2
63 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2
64 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. Challenging: - Ti needs to prepare for any possible Tj - we need to control which Ti can be matched to which (in APSP by height) - constant O() size alphabet n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2
65 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. Challenging: - Ti needs to prepare for any possible Tj - we need to control which Ti can be matched to which (in APSP by height) - constant O() size alphabet n/3+2 i Ti T i T j Tj T j n/3+2 n/3+2 n/3+2
66 We assume without loss of generality that z z. Then, an optimal solution must match dz 0 to b0xz0, d0z 0 2 to b0xz0 2,..., and d0 to b0x, for some z x >... > xz 0 P, as otherwise its D( w(uwe uy )) x, obtain cost is larger than M 2 M (2N z z ) M 2(z ). Rewriting thex,ycost M 2 M (2N 2 z + z ), so recalling our assumption z z we see that in fact z = z 0 as otherwise its cost is larger than M 8 2 M 7 2(N ). u } z { z, M 2 ). { n { of Cj is the right tree nof C 0 (, j v } z M2 rig We are now ready to state properties of the remaining micro structures. Let cmatch (T, T2 ) denote ht topmost node matched to a node from I. Looing again at the same expression, we see that 4. the right-right subtree /3werequire the cost of matching two trees T and T2. Then, that: t f l e b0 /3 and N there.are (A0, D2 such nodes, namely the nodes z. zn0 < Nz 0 =,/3 z0 6 3 (N 0 ) for.n N z 0 with 0) = cmatch /3 M M i) W (i, z every i =, 2,.., and 2,.., N, z i n See Figure 7. For the construction of C(i, j, M (/3) ) and C(i, j, M ) to be co divisible by n/ Continuing in the same fashion, we obtain that there are i nodes matched to 2. cmatch (Bz, Cj ) = M 6 M 3 (N j) W (z, j) for every z =, 2,..., N and j =, 2,..., N. need that M (/3)2 W n(/3 + )3 and M 2 M n2 n(/3 + )3, respectively, whi nodes from Ii, maing the total cost M 7 (N z) as claimed. n 2 large. We z 0. Then, match d0z 0 M n 3. cassume (Ai, Cwithout Wof (j, generality i) + W (j,that i )zfor every i = 2, 3,an...optimal, N and j solution = for 2, 3,.sufficiently..,must N. j ) = M loss match to b0x4.z0 c, d(a x >,... > xz 0 Now, asweotherwise calculateitscmatch (Ai, Cj ). C(i, j, M 2 ) contributes M 2 minus the total cost 0 2 to bx 0 5,...,3 and d to bx, for some z, N z, C ) = M M (i ) W (, i) for every i =, 2,... z 2 i match connecting cost is larger than M M 7 (2N z z 0 ) M 7 2(z 0 ). Rewriting the costtwo we subsets obtain of /3 nodes in the new graph. As the weights in the new graph are 5. cmatch (A7, Cj ) = M M (j0 ) W (j, ) for every j =, 2,..., N. rig0ht t 8 f 0 2 M 2 M (2N 2 z + z ), so recalling our assumption z z we see as v), this is exactly right as that w (u,inv)fact =lezm= z 0w(u, M 2Decrease (Mgadget (/3),xj= n2 )). j, ME Figure 5: Left: built for d =W 3, n(i = 6 and 2 + n C(i, Right: 8 7 The labelsits of cost the nodes in thethan micro structures be partitioned into disjoint subsets corregadget for u = 3, v = otherwise is larger M 2 should M 2(N ). contributes M (/3) W (i, j), so c (Ai, Cj ) = M (/3) W (i, j) M (M { n u } } z 2 n 2 n n v } 2 { z 2 le ft sponding to the following micro structures: match W,(T j, T)) = W (i, j) + the Wfirst (i segment, jof the) required. left as tree can be matched with nodes from the first segment of the rig We are now state properties Let 0,A 0,.. ready E(u D( y w(7, v(i ))match 2 ) denote 2,N7, yc. {A., A0N, Dto },M ) of the remaining micro structures., D2,..., D 2 with cost c, and similarly for the second Then,subtree if u = v we of can A match(c all n = It remains to bound the cost of matching nodes. Nodes insegments. the left i j the cost of matching two trees T0 and T2. Then, we require that: both trees, so the total cost is c= n. Otherwise, we can match at most n nodes, {B, B2,..., BN, C, C2,..., CN }, P M2 3 n >5 (right). the total cost atat least c= n + M c=, see Figure that the matched0 only to nodes of C (A ) with cost least M 4Furthermore,, exceptnote that thetotalr i) for every i =, 2,..., N and z =, 2,..., N, matching the left tree of E(u, v, c= ) with any tree is at least c= n and the cost of match 5 be matched M=. 8. The cost matching node of of E(u, v, c= ) is c=. a node of Ai to a node of Cj, for i, j Figure 6: Schematic illustration of a connection gadget for /3with = 2cost and n cmatch ) = be M M only (N if their j) labels W (z,belong j) for toevery z =, 2,...,The N and jof =least, 2,...M, N. (/3) (for the nodes of C(i, j, M (/3)2 ) or at least M 2 (for the either so2.that two(b nodes matched the same subset. cost at z, Cj can Connection gadget C(i, j, M ). For any i, j 2 {,..., N } and sufficiently large M 2 {0,.. 2. and right tree of C(i, j, M ) is M W (i, j). The left tree d matching any node of A0i, Dz 0, Bz, Cj0 should be at least M 6. The cost of matching any node of 2 )), so for sufficiently large M }, the distance ofm the left C(i, j, M ateditleast 22. cmatch (A0i, Dz 0 ) = M 6 M 3 (N 3. {A, A2,..., AN, C, C2,..., CN }, W (i, z 0 ) (Aibe, Catj )least = M W (j, that i) + the W (j )j )for i = 2,to 3, the...,root N and A3. should M, except root, of iai (C canevery be matched of Cj = 2, 3,..., N. depend on j and the right tree does not depend on i. i, Ccjmatch 5 5 Let {u,..., u/3 } and {v,..., v/3 } be the /3-cliques corresponding to i and j, respe (A ) with cost larger than M M but at most M, and, for any non-root node of Ai (Cj ) and 5 (, ) 5 3 where u < u2 M <..., uw 4 /3 and v < v2 <... < v/3. Recall 4. any cmatch (Ai, Cnode (icost ) matching W (, i) fortotal every =, 2,.M..,N,/3 Aj) (because C that W (i, j) denotes the total w for non-root of CM thea of is larger than icost M. Finally, every A and ) = (A ),M i We can clearly construct solution with M n /3 W (i, 2 all edges connecting two nodes in the i-th clique or a node in the i-th clique with a node in t Cj should consist of O(n2 ) nodes. Now we can show that, assuming these properties, any optimal clique, where we assume that w(u, u) = 0. We construct the gadget C(i, j, M ) as follows. T 5 3 have enumerated the to i jso that 5. cmatch, Cj ) =structure. M clique M (j corresponding ) W (j, ) for every =, 2,...u,N.< u2 <... < u/3 ). the left tree has degree + /3 and the root of the right tree has P degree + n. Their rig solution has(a a specific P We claim ofthat, we correspond to the root of the left and the right trees of D( w(u, u )), respe or The appropriately chosen MMmicro and M better isinto possible. Let W = u,v w(u, v).children 2,ofno Lemma sufficiently large, the total cost an should optimal matching is EveryWe other child of the left root can be matched with every other child of the right root wi labels5.offorthe nodes in the structures be solution partitioned disjoint subsets correm (we fix M and M later). Intuitively, we would lie the x-th child left xm =8 W the (/3 enough to2 guarantee that the cost contributed by nodes in with5 the u -th child of the right root, and then contribute P ofw(uthe, the 7 following 5 sponding micro M be matched v ) to th 2to M 2(N +)). M 6This 2 structures: Mis M 3 2N + M max{w (i, z) + W (z, j) + W (j,total i)}. i,j,z M x5 =, 2,..., /3 we obtain the desired sum. To this end, we cost, so that summing up over M ll decrease at least M. The total cost contributed by nodes in all equality gadgets is 0,..., A0,is the left tree of E(u,, M ) and the right tree of D( ) to the. {A0, Agadgets D, D,..., D }, 2 2 Px-th child of the left root. Simila Proof. Consider i, j, z N maximizing W (i, z)n+ W (z, j) + W (j, i). We may assume that i j. Then, attach the right tree of E(, t, M ) and the left tree of D( w(t, v )) to the t-th child of th t least M to nchoose /3. Consequently, setting M2 = M n /3 + M guarantees that any optimal it is possible the following matching: root. Here we use to emphasise that a particular tree does not depend on the particular v {B, B2,..., BN, C, C2,..., CN }, parameter. All decrease gadgets are of the same type. See Figure 6. olution. bmust all x3 (j= ),+2,W.(j,. ))., /3 we themust 0 match M 8, children of the left root, so in fact, for every D(M 3 (i ) + W (, i)) D(M to cj with cost l ef t left {Ax-th, A2,..child., AN, C C2,..left., CNroot }, to some child of the right root. Because matching the, the match3.2.the of left tree 0 some nodes from the copy of I being the left child of cj to some spine nodes below bz with 5 total M 7 (N z),contributes so that twocost nodes can be matched only at if their to the same subset. The choice cost of of MA f any decrease gadget leastlabelswbelong to the total cost, by the an optimal i Cj 0,8D 0, B, C 0 should be at least 6. The cost of matching any node of 0 matching any node of A M 3. a to d with cost M, z z i j i olution in fact must match2 the x-th2child of the left root with the ux -th child of the right root, as Ai, C4.j some should be from at least Mof,I except that the root of Ai (Cspine be matched to the root of C j ) can nodes the copy M being the right child of a0i 5to some nodes below gadget dz with therwise we lose at least due to the corresponding equality that cannot be compensated 5 (A ) with M but at most M, and, for any non-root node of Ai (Cj ) and totalcost cost larger M 7 (Nthan z), M yp matching its node accompanying gadget. Finally, decrease gadget adds for any 0non-root of C (A ), thedecrease cost of matching is larger than the M 4. corresponding Finally, every Ai and 5. b to d0z, b02 to d0z 2,2..., b0z to d0 with cost M 7 2 each, Cj should consist of O(n ) nodes. Now we can show that, assuming as MtheseMproperties, Moptimal n /3 the total cost is 2 /3 +any y w(ux, vy ) to the total cost. Therefore,3 as long 2 6. ai has aspecific M 2 + M each, solution i to cj structure.,..., ai j+ to c with cost ndeed Mto cja,w (i, j) after choosing the cost of matching the roots to be M +M2 /3+M n / Ai 5. to DFor cost M large M (N W (i, z), z with sufficiently M, i) the the total cost of optimal matching is For Lemma any7. node in a decrease gadget, cost ofanmatching is at least W, for any node in an equality Bz tocost Cj with M M (N j) M W (z,and j),3 7 ofcost adget, finally the of the roots is M 8the 2 M 2(Nmatching ) M 6 is 2 M 5, M 2N + M 2 the maxcost {W (i,of z) matching + W (z, j) + W (j, children i)}. i,j,z t le 9. Athe to matching Cj,..., Ai j+2 costsc(i, M 2j, W W (j, W (j least, i ),M. For the correctness i to Ccost j, Ai of 2 with of M2, so anyto Cnode ) i)is+ at of the ht gh ft i r l 2 2 eft M W (j, i ) + W (j 2, i 2),..., M + 2) + W (, i j + ). rig Proof. Consider j, z maximizing +W (z, j)w +(2, Wi (j,ji). We may assume that i j. Then, onstruction it isi, enough that W M(i,isz) at least C 0 (i, j, M 4 ) C(i, j, M 3 (/3)2 ) x x<y 2 2 j + ). x y right right x it is0. possible to Cchoose the following Ai j+ to M 5 M 3 (imatching: j) W (, i with cost y y y x y
67 Open Problems
68 Open Problems TED to APSP reduction?
69 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = )
70 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = ) Levenshtein distance: every elementary edit operation costs
71 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = ) Levenshtein distance: every elementary edit operation costs log shaves?
72 Than You!
Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can)
Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann Paweł Gawrychowski Shay Mozes Oren Weimann Abstract The edit distance between two rooted ordered trees with
More informationarxiv: v1 [cs.ds] 27 Mar 2017
Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann Paweł Gawrychowski Shay Mozes Oren Weimann arxiv:1703.08940v1 [cs.ds] 27 Mar 2017 Abstract The edit distance
More informationAnalysis of tree edit distance algorithms
Analysis of tree edit distance algorithms Serge Dulucq 1 and Hélène Touzet 1 LaBRI - Universit Bordeaux I 33 0 Talence cedex, France Serge.Dulucq@labri.fr LIFL - Universit Lille 1 9 6 Villeneuve d Ascq
More informationAn Optimal Decomposition Algorithm for Tree Edit Distance
An Optimal Decomposition Algorithm for Tree Edit Distance ERIK D. DEMAINE Massachusetts Institute of Technology and SHAY MOZES Brown University and BENJAMIN ROSSMAN Massachusetts Institute of Technology
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 5: Subcubic Equivalences Karl Bringmann Reminder: Relations = Reductions transfer hardness of one problem to another one by reductions problem P instance
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 8: (Boolean) Matrix Multiplication Karl Bringmann Recall: Boolean Matrix Multiplication given n n matrices A, B with entries in {0,1} compute matrix
More informationk-distinct In- and Out-Branchings in Digraphs
k-distinct In- and Out-Branchings in Digraphs Gregory Gutin 1, Felix Reidl 2, and Magnus Wahlström 1 arxiv:1612.03607v2 [cs.ds] 21 Apr 2017 1 Royal Holloway, University of London, UK 2 North Carolina State
More informationTASM: Top-k Approximate Subtree Matching
TASM: Top-k Approximate Subtree Matching Nikolaus Augsten 1 Denilson Barbosa 2 Michael Böhlen 3 Themis Palpanas 4 1 Free University of Bozen-Bolzano, Italy augsten@inf.unibz.it 2 University of Alberta,
More informationMinmax Tree Cover in the Euclidean Space
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More informationPattern Popularity in 132-Avoiding Permutations
Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,
More informationMinmax Tree Cover in the Euclidean Space
Minmax Tree Cover in the Euclidean Space Seigo Karakawa, Ehab Morsy, Hiroshi Nagamochi Department of Applied Mathematics and Physics Graduate School of Informatics Kyoto University Yoshida Honmachi, Sakyo,
More informationTree Decompositions and Tree-Width
Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition
More informationCOL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:
Name: Entry number: There are 5 questions for a total of 75 points. 1. (5 points) You are given n items and a sack that can hold at most W units of weight. The weight of the i th item is denoted by w(i)
More informationTheoretical Computer Science. Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees
Theoretical Computer Science 470 (2013) 10 22 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Approximation and parameterized
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationDecomposition algorithms for the tree edit distance problem
Decomposition algorithms for the tree edit distance problem Serge Dulucq LaBRI - UMR CNRS 5800 - Université Bordeaux I 05 Talence cedex, France Serge.Dulucq@labri.fr Hélène Touzet LIFL - UMR CNRS 80 -
More informationExtremal Graphs Having No Stable Cutsets
Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University
More informationarxiv: v2 [cs.ds] 3 Oct 2017
Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract
More informationMatching Triangles and Basing Hardness on an Extremely Popular Conjecture
Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Amir Abboud 1, Virginia Vassilevska Williams 1, and Huacheng Yu 1 1 Computer Science Department, Stanford University Abstract Due
More informationAn 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem
An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem Zeev Nutov, László A. Végh January 12, 2016 We study the tree augmentation problem: Tree Augmentation Problem (TAP) Instance:
More informationPartition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard
I. Minimizing Cmax (Nonpreemptive) a. P2 C max is NP-hard. Partition is reducible to P2 C max b. P Pj = 1, intree Cmax P Pj = 1, outtree Cmax are both solvable in polynomial time. c. P2 Pj = 1, prec Cmax
More informationOdd independent transversals are odd
Odd independent transversals are odd Penny Haxell Tibor Szabó Dedicated to Béla Bollobás on the occasion of his 60th birthday Abstract We put the final piece into a puzzle first introduced by Bollobás,
More informationPartial cubes: structures, characterizations, and constructions
Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes
More informationOn the Average Path Length of Complete m-ary Trees
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University
More informationClasses of Problems. CS 461, Lecture 23. NP-Hard. Today s Outline. We can characterize many problems into three classes:
Classes of Problems We can characterize many problems into three classes: CS 461, Lecture 23 Jared Saia University of New Mexico P is the set of yes/no problems that can be solved in polynomial time. Intuitively
More informationMore Dynamic Programming
CS 374: Algorithms & Models of Computation, Spring 2017 More Dynamic Programming Lecture 14 March 9, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 What is the running time of the following? Consider
More informationExtreme Point Solutions for Infinite Network Flow Problems
Extreme Point Solutions for Infinite Network Flow Problems H. Edwin Romeijn Dushyant Sharma Robert L. Smith January 3, 004 Abstract We study capacitated network flow problems with supplies and demands
More informationThe complexity of independent set reconfiguration on bipartite graphs
The complexity of independent set reconfiguration on bipartite graphs Daniel Lokshtanov Amer E. Mouawad Abstract We settle the complexity of the Independent Set Reconfiguration problem on bipartite graphs
More informationMore Dynamic Programming
Algorithms & Models of Computation CS/ECE 374, Fall 2017 More Dynamic Programming Lecture 14 Tuesday, October 17, 2017 Sariel Har-Peled (UIUC) CS374 1 Fall 2017 1 / 48 What is the running time of the following?
More informationSubcubic Equivalence of Triangle Detection and Matrix Multiplication
Subcubic Equivalence of Triangle Detection and Matrix Multiplication Bahar Qarabaqi and Maziar Gomrokchi April 29, 2011 1 Introduction An algorithm on n n matrix with the entries in [ M, M] has a truly
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 13: Recap, Further Directions, Open Problems Karl Bringmann I. Recap II. Further Directions III. Open Problems I. Recap Hard problems SAT: OV: APSP:
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationCSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1
CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines Problem 1 (a) Consider the situation in the figure, every edge has the same weight and V = n = 2k + 2. Easy to check, every simple
More informationA Graph Polynomial Approach to Primitivity
A Graph Polynomial Approach to Primitivity F. Blanchet-Sadri 1, Michelle Bodnar 2, Nathan Fox 3, and Joe Hidakatsu 2 1 Department of Computer Science, University of North Carolina, P.O. Box 26170, Greensboro,
More informationThe Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth
The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth Gregory Gutin, Mark Jones, and Magnus Wahlström Royal Holloway, University of London Egham, Surrey TW20 0EX, UK Abstract In the
More informationA PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS
A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS CRYSTAL L. KAHN and BENJAMIN J. RAPHAEL Box 1910, Brown University Department of Computer Science & Center for Computational Molecular Biology
More informationarxiv: v1 [math.co] 10 Sep 2010
Ranking and unranking trees with a given number or a given set of leaves arxiv:1009.2060v1 [math.co] 10 Sep 2010 Jeffery B. Remmel Department of Mathematics U.C.S.D., La Jolla, CA, 92093-0112 jremmel@ucsd.edu
More informationk-degenerate Graphs Allan Bickle Date Western Michigan University
k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value
More informationA Cubic-Vertex Kernel for Flip Consensus Tree
To appear in Algorithmica A Cubic-Vertex Kernel for Flip Consensus Tree Christian Komusiewicz Johannes Uhlmann Received: date / Accepted: date Abstract Given a bipartite graph G = (V c, V t, E) and a nonnegative
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationBichain graphs: geometric model and universal graphs
Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United
More informationIrredundant Families of Subcubes
Irredundant Families of Subcubes David Ellis January 2010 Abstract We consider the problem of finding the maximum possible size of a family of -dimensional subcubes of the n-cube {0, 1} n, none of which
More informationOn improving matchings in trees, via bounded-length augmentations 1
On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical
More informationInduced Graph Ramsey Theory
Induced Graph Ramsey Theory Marcus Schaefer School of CTI DePaul University 243 South Wabash Avenue Chicago, Illinois 60604, USA schaefer@csdepauledu June 28, 2000 Pradyut Shah Department of Computer Science
More informationMINORS OF GRAPHS OF LARGE PATH-WIDTH. A Dissertation Presented to The Academic Faculty. Thanh N. Dang
MINORS OF GRAPHS OF LARGE PATH-WIDTH A Dissertation Presented to The Academic Faculty By Thanh N. Dang In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Algorithms, Combinatorics
More informationCLIQUES IN THE UNION OF GRAPHS
CLIQUES IN THE UNION OF GRAPHS RON AHARONI, ELI BERGER, MARIA CHUDNOVSKY, AND JUBA ZIANI Abstract. Let B and R be two simple graphs with vertex set V, and let G(B, R) be the simple graph with vertex set
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationNew Bounds and Extended Relations Between Prefix Arrays, Border Arrays, Undirected Graphs, and Indeterminate Strings
New Bounds and Extended Relations Between Prefix Arrays, Border Arrays, Undirected Graphs, and Indeterminate Strings F. Blanchet-Sadri Michelle Bodnar Benjamin De Winkle 3 November 6, 4 Abstract We extend
More informationApproximating Longest Directed Path
Electronic Colloquium on Computational Complexity, Report No. 3 (003) Approximating Longest Directed Path Andreas Björklund Thore Husfeldt Sanjeev Khanna April 6, 003 Abstract We investigate the hardness
More informationAugmenting Outerplanar Graphs to Meet Diameter Requirements
Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information
More informationMaximising the number of induced cycles in a graph
Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,
More informationCS 470/570 Dynamic Programming. Format of Dynamic Programming algorithms:
CS 470/570 Dynamic Programming Format of Dynamic Programming algorithms: Use a recursive formula But recursion can be inefficient because it might repeat the same computations multiple times So use an
More informationHAMILTONICITY AND FORBIDDEN SUBGRAPHS IN 4-CONNECTED GRAPHS
HAMILTONICITY AND FORBIDDEN SUBGRAPHS IN 4-CONNECTED GRAPHS FLORIAN PFENDER Abstract. Let T be the line graph of the unique tree F on 8 vertices with degree sequence (3, 3, 3,,,,, ), i.e. T is a chain
More information1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices.
1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. Proof: Every vertex, except the root, is the child of an internal vertex. Since there are i internal vertices, each of
More informationInformation Theory and Statistics Lecture 2: Source coding
Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection
More informationCharacterizing binary matroids with no P 9 -minor
1 2 Characterizing binary matroids with no P 9 -minor Guoli Ding 1 and Haidong Wu 2 1. Department of Mathematics, Louisiana State University, Baton Rouge, Louisiana, USA Email: ding@math.lsu.edu 2. Department
More informationAsurvey on tree edit distance and related problems
Theoretical Computer Science 337 (2005) 217 239 www.elsevier.com/locate/tcs Asurvey on tree edit distance and related problems Philip Bille The IT University of Copenhagen, Rued Langgardsvej 7, DK-2300
More informationDigital search trees JASS
Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationDistributed Systems Byzantine Agreement
Distributed Systems Byzantine Agreement He Sun School of Informatics University of Edinburgh Outline Finish EIG algorithm for Byzantine agreement. Number-of-processors lower bound for Byzantine agreement.
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationContext-Free Languages
CS:4330 Theory of Computation Spring 2018 Context-Free Languages Non-Context-Free Languages Haniel Barbosa Readings for this lecture Chapter 2 of [Sipser 1996], 3rd edition. Section 2.3. Proving context-freeness
More information6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1
6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1 Not a requirement, but fun: OPEN PROBLEM Sessions!!! (more about this in a week) 6.S078 REQUIREMENTS 1. Class participation: worth
More informationarxiv: v2 [math.pr] 23 Feb 2017
TWIN PEAKS KRZYSZTOF BURDZY AND SOUMIK PAL arxiv:606.08025v2 [math.pr] 23 Feb 207 Abstract. We study random labelings of graphs conditioned on a small number (typically one or two) peaks, i.e., local maxima.
More informationCleaning Interval Graphs
Cleaning Interval Graphs Dániel Marx and Ildikó Schlotter Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. {dmarx,ildi}@cs.bme.hu
More informationNATIONAL UNIVERSITY OF SINGAPORE CS3230 DESIGN AND ANALYSIS OF ALGORITHMS SEMESTER II: Time Allowed 2 Hours
NATIONAL UNIVERSITY OF SINGAPORE CS3230 DESIGN AND ANALYSIS OF ALGORITHMS SEMESTER II: 2017 2018 Time Allowed 2 Hours INSTRUCTIONS TO STUDENTS 1. This assessment consists of Eight (8) questions and comprises
More informationNP-Completeness. Algorithmique Fall semester 2011/12
NP-Completeness Algorithmique Fall semester 2011/12 1 What is an Algorithm? We haven t really answered this question in this course. Informally, an algorithm is a step-by-step procedure for computing a
More informationOn the Turán number of forests
On the Turán number of forests Bernard Lidický Hong Liu Cory Palmer April 13, 01 Abstract The Turán number of a graph H, ex(n, H, is the maximum number of edges in a graph on n vertices which does not
More informationComputational Models - Lecture 4
Computational Models - Lecture 4 Regular languages: The Myhill-Nerode Theorem Context-free Grammars Chomsky Normal Form Pumping Lemma for context free languages Non context-free languages: Examples Push
More informationPostorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 19:1, 2017, #3 Postorder Preimages arxiv:1604.01723v3 [math.co] 2 Feb 2017 1 University of Florida Colin Defant 1 received 7 th Apr. 2016,
More informationBELIEF-PROPAGATION FOR WEIGHTED b-matchings ON ARBITRARY GRAPHS AND ITS RELATION TO LINEAR PROGRAMS WITH INTEGER SOLUTIONS
BELIEF-PROPAGATION FOR WEIGHTED b-matchings ON ARBITRARY GRAPHS AND ITS RELATION TO LINEAR PROGRAMS WITH INTEGER SOLUTIONS MOHSEN BAYATI, CHRISTIAN BORGS, JENNIFER CHAYES, AND RICCARDO ZECCHINA Abstract.
More informationProof of the (n/2 n/2 n/2) Conjecture for large n
Proof of the (n/2 n/2 n/2) Conjecture for large n Yi Zhao Department of Mathematics and Statistics Georgia State University Atlanta, GA 30303 September 9, 2009 Abstract A conjecture of Loebl, also known
More informationSmall Cycle Cover of 2-Connected Cubic Graphs
. Small Cycle Cover of 2-Connected Cubic Graphs Hong-Jian Lai and Xiangwen Li 1 Department of Mathematics West Virginia University, Morgantown WV 26505 Abstract Every 2-connected simple cubic graph of
More informationP, NP, NP-Complete, and NPhard
P, NP, NP-Complete, and NPhard Problems Zhenjiang Li 21/09/2011 Outline Algorithm time complicity P and NP problems NP-Complete and NP-Hard problems Algorithm time complicity Outline What is this course
More informationThis observation leads to the following algorithm.
126 Andreas Jakoby A Bounding-Function for the Knapsack Problem Finding a useful bounding-function is for most problems a difficult task. Let us consider the Knapsack Problem: Let us consider the version
More informationDynamic programming. Curs 2017
Dynamic programming. Curs 2017 Fibonacci Recurrence. n-th Fibonacci Term INPUT: n nat QUESTION: Compute F n = F n 1 + F n 2 Recursive Fibonacci (n) if n = 0 then return 0 else if n = 1 then return 1 else
More informationBaltic Way 2003 Riga, November 2, 2003
altic Way 2003 Riga, November 2, 2003 Problems and solutions. Let Q + be the set of positive rational numbers. Find all functions f : Q + Q + which for all x Q + fulfil () f ( x ) = f (x) (2) ( + x ) f
More informationMidterm 2 for CS 170
UC Berkeley CS 170 Midterm 2 Lecturer: Gene Myers November 9 Midterm 2 for CS 170 Print your name:, (last) (first) Sign your name: Write your section number (e.g. 101): Write your sid: One page of notes
More informationOn shredders and vertex connectivity augmentation
On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationDe Bruijn sequences on primitive words and squares
De Bruijn sequences on primitive words and squares arxiv:0904.3997v2 [math.co] 24 Nov 2009 Yu-Hin Au Department of Combinatorics & Optimization yau@uwaterloo.ca November 24, 2009 Abstract We present a
More informationLocal Alignment of RNA Sequences with Arbitrary Scoring Schemes
Local Alignment of RNA Sequences with Arbitrary Scoring Schemes Rolf Backofen 1, Danny Hermelin 2, ad M. Landau 2,3, and Oren Weimann 4 1 Institute of omputer Science, Albert-Ludwigs niversität Freiburg,
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationOn the maximum number of isosceles right triangles in a finite point set
On the maximum number of isosceles right triangles in a finite point set Bernardo M. Ábrego, Silvia Fernández-Merchant, and David B. Roberts Department of Mathematics California State University, Northridge,
More informationInduced Graph Ramsey Theory
Induced Graph Ramsey Theory Marcus Schaefer School of CTI DePaul University 243 South Wabash Avenue Chicago, Illinois 60604, USA schaefer@cs.depaul.edu February 27, 2001 Pradyut Shah Department of Computer
More informationComputational Models - Lecture 5 1
Computational Models - Lecture 5 1 Handout Mode Iftach Haitner. Tel Aviv University. November 28, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice Herlihy, Brown University.
More informationNotes on Gaussian processes and majorizing measures
Notes on Gaussian processes and majorizing measures James R. Lee 1 Gaussian processes Consider a Gaussian process {X t } for some index set T. This is a collection of jointly Gaussian random variables,
More informationarxiv: v1 [math.co] 22 Jan 2018
arxiv:1801.07025v1 [math.co] 22 Jan 2018 Spanning trees without adjacent vertices of degree 2 Kasper Szabo Lyngsie, Martin Merker Abstract Albertson, Berman, Hutchinson, and Thomassen showed in 1990 that
More informationarxiv: v1 [math.co] 2 Dec 2013
What is Ramsey-equivalent to a clique? Jacob Fox Andrey Grinshpun Anita Liebenau Yury Person Tibor Szabó arxiv:1312.0299v1 [math.co] 2 Dec 2013 November 4, 2018 Abstract A graph G is Ramsey for H if every
More informationRandomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th
CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,
More informationGraph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University
Graph Theorizing Peg Solitaire D. Paul Hoilman East Tennessee State University December 7, 00 Contents INTRODUCTION SIMPLE SOLVING CONCEPTS 5 IMPROVED SOLVING 7 4 RELATED GAMES 5 5 PROGENATION OF SOLVABLE
More informationEXACT DOUBLE DOMINATION IN GRAPHS
Discussiones Mathematicae Graph Theory 25 (2005 ) 291 302 EXACT DOUBLE DOMINATION IN GRAPHS Mustapha Chellali Department of Mathematics, University of Blida B.P. 270, Blida, Algeria e-mail: mchellali@hotmail.com
More informationCopyright 2013 Springer Science+Business Media New York
Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media
More informationApplied Computer Science II Chapter 7: Time Complexity. Prof. Dr. Luc De Raedt. Institut für Informatik Albert-Ludwigs Universität Freiburg Germany
Applied Computer Science II Chapter 7: Time Complexity Prof. Dr. Luc De Raedt Institut für Informati Albert-Ludwigs Universität Freiburg Germany Overview Measuring complexity The class P The class NP NP-completeness
More informationA BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS
Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive
More informationBayesian & Markov Networks: A unified view
School of omputer Science ayesian & Markov Networks: unified view Probabilistic Graphical Models (10-708) Lecture 3, Sep 19, 2007 Receptor Kinase Gene G Receptor X 1 X 2 Kinase Kinase E X 3 X 4 X 5 TF
More informationA Dichotomy for Regular Expression Membership Testing
58th Annual IEEE Symposium on Foundations of Computer Science A Dichotomy for Regular Expression Membership Testing Karl Bringmann Max Planck Institute for Informatics Saarbrücken Informatics Campus Saarbrücken,
More informationDominating Set Counting in Graph Classes
Dominating Set Counting in Graph Classes Shuji Kijima 1, Yoshio Okamoto 2, and Takeaki Uno 3 1 Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan kijima@inf.kyushu-u.ac.jp
More informationLecture 18: More NP-Complete Problems
6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with
More information