Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann, Paweł Gawrychowski, Shay Mozes, Oren Weimann

Size: px
Start display at page:

Download "Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann, Paweł Gawrychowski, Shay Mozes, Oren Weimann"

Transcription

1 Karl Bringmann, Paweł Gawrychowsi, Shay Mozes, Oren Weimann

2

3 Minimum edits to transform one tree into the other

4 Minimum edits to transform one tree into the other rooted, ordered trees with node labels x y

5 Minimum edits to transform one tree into the other relabel node x to y x y A B C D relabel node y to x A B C D

6 Minimum edits to transform one tree into the other x delete node xy A B C D insert node xy A B C D

7 Minimum edits to transform one string into the other a b c d e f a b b d e e g e e

8 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f

9 Minimum edits to transform one string into the other a b c d e e a b b d e e g e e

10 Minimum edits to transform one string into the other a b c d e e a b b d e e g e e

11 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f

12 Minimum edits to transform one string into the other a b c d e a b b d e e g e e

13 Minimum edits to transform one string into the other a b c d e a b b d e e g e e

14 Minimum edits to transform one string into the other a b c d e a b b d e e g e e f

15 Minimum edits to transform one string into the other a b c d e a b b d e e g e f

16 Minimum edits to transform one string into the other a b c d e a b b d e e g e f

17 Minimum edits to transform one string into the other O(n 2 ) time a b c d e a b b d e e g e e f

18 Minimum edits to transform one string into the other O(n 2 ) time a b c d e f a b b d e e g e e

19 Minimum edits to transform one string into the other O(n 2 ) time O(n 4 ) time a b c d e f a b b d e e g e e

20 String Edit Distance Cannot be Computed in Strongly Subquadratic Time (unless SETH is false) [Bacurs,Indy, STOC 5] a b c d e f a b b d e e g e e

21 x y

22 x y

23 x y

24 y

25 y

26 y prefix in postorder traversal prefix in postorder traversal

27 x y

28 x

29 x

30 x prefix in postorder traversal prefix in postorder traversal

31 x y

32 y y

33 y y

34 y y

35 y y not prefix in postorder traversal not prefix in postorder traversal

36 O(n 4 ) time [Shasha Zhang 989] y y not prefix in postorder traversal not prefix in postorder traversal

37 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] y y not prefix in postorder traversal not prefix in postorder traversal

38 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] O(n 3 ) time [Demaine, Mozes, Rossman, W. 2007] y y not prefix in postorder traversal not prefix in postorder traversal

39 O(n 4 ) time [Shasha Zhang 989] O(n 3 log n) time [Klein 998] O(n 3 ) time [Demaine, Mozes, Rossman, W. 2007] y y

40 Conjecture (APSP): For any ε > 0 there exists c > 0, such that All Pairs Shortest Paths on n node graphs with edge weights in {,..., n c } cannot be solved in O(n3-ε) time.

41 Conjecture (APSP): For any ε > 0 there exists c > 0, such that All Pairs Shortest Paths on n node graphs with edge weights in {,..., n c } cannot be solved in O(n3-ε) time. Equivalent to negative triangle detection [Vassilevsa-Williams,Williams 200] j i w(i,j)+w(j,)+w(,i) < 0

42 The Hard Instance of TED

43 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) a b b 0 a 0 c e 0 e d d 0 c 0

44 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a b b 0 a 0 c e 0 e d d 0 c 0

45 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a subsequence of spine nodes b b 0 a 0 subsequence of spine nodes subsequence of leaves c e 0 one middle leaf node one final spine node e d d 0 reversed subsequence of leaves c 0

46 The Hard Instance of TED To specify a solution to TED it is enough to say which nodes are matched to which (the rest are deleted) The matched pairs must have the same left-right and ancestor-descendant relations a subsequence of spine nodes one middle leaf node subsequence of leaves b b 0 c e 0 a 0 subsequence of spine nodes one middle leaf node one final spine node e d d 0 reversed subsequence of leaves c 0 one final spine node

47 APSP TED

48 APSP TED i j w(i,j)+w(j,)+w(,i) < 0 n n n n

49 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i n n n n

50 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) n n C(j,) C(j,) C(,i) n n

51 APSP TED i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n n

52 APSP TED Large alphabet: Σ = Θ(n) i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n n

53 APSP TED Large alphabet: Σ = Θ(n) i j j w(i,j)+w(j,)+w(,i) < 0 i C(i,j) +w(i,j) n C(j,) +w(j,) C(j,) C(,i) +w(,i) n n Solvable in: O( Σ 2 n 2 logn) time n

54 APSP TED j Small alphabet: Σ = O() i w(i,j)+w(j,)+w(,i) < 0

55 Max-weight APSP -Clique TED Small alphabet: Σ = O() Conjecture (Max-weight -Clique): For any ε > 0 there exists c > 0, such that for any 3 finding a maximum weight -Clique in graphs with edge weights in {,..., n c } cannot be solved in O(n(-ε)) time.

56 Max-weight APSP -Clique TED Small alphabet: Σ = O() Conjecture (Max-weight -Clique): For any ε > 0 there exists c > 0, such that for any 3 finding a maximum weight -Clique in graphs with edge weights in {,..., n c } cannot be solved in O(n(-ε)) time.

57 Max-weight APSP -Clique TED Small alphabet: Σ = O() 2 3 4

58 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 n/3+2

59 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 n/3+2

60 Max-weight APSP -Clique TED Small alphabet: Σ = O() n/3+2 n/3+2 n/3+2 Subcubic TED O(n (-ε) ) Max-weight -Clique (for some =(ε)) n/3+2

61 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j i n/3+2 n/3+2 n/3+2 n/3+2

62 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2

63 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2

64 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. Challenging: - Ti needs to prepare for any possible Tj - we need to control which Ti can be matched to which (in APSP by height) - constant O() size alphabet n/3+2 i Ti Tj n/3+2 n/3+2 n/3+2

65 Max-weight APSP -Clique TED Small alphabet: Σ = O() Each /3 clique is a spine node j Simulate matching costs with small (n 2 size) gadgets Ti. Challenging: - Ti needs to prepare for any possible Tj - we need to control which Ti can be matched to which (in APSP by height) - constant O() size alphabet n/3+2 i Ti T i T j Tj T j n/3+2 n/3+2 n/3+2

66 We assume without loss of generality that z z. Then, an optimal solution must match dz 0 to b0xz0, d0z 0 2 to b0xz0 2,..., and d0 to b0x, for some z x >... > xz 0 P, as otherwise its D( w(uwe uy )) x, obtain cost is larger than M 2 M (2N z z ) M 2(z ). Rewriting thex,ycost M 2 M (2N 2 z + z ), so recalling our assumption z z we see that in fact z = z 0 as otherwise its cost is larger than M 8 2 M 7 2(N ). u } z { z, M 2 ). { n { of Cj is the right tree nof C 0 (, j v } z M2 rig We are now ready to state properties of the remaining micro structures. Let cmatch (T, T2 ) denote ht topmost node matched to a node from I. Looing again at the same expression, we see that 4. the right-right subtree /3werequire the cost of matching two trees T and T2. Then, that: t f l e b0 /3 and N there.are (A0, D2 such nodes, namely the nodes z. zn0 < Nz 0 =,/3 z0 6 3 (N 0 ) for.n N z 0 with 0) = cmatch /3 M M i) W (i, z every i =, 2,.., and 2,.., N, z i n See Figure 7. For the construction of C(i, j, M (/3) ) and C(i, j, M ) to be co divisible by n/ Continuing in the same fashion, we obtain that there are i nodes matched to 2. cmatch (Bz, Cj ) = M 6 M 3 (N j) W (z, j) for every z =, 2,..., N and j =, 2,..., N. need that M (/3)2 W n(/3 + )3 and M 2 M n2 n(/3 + )3, respectively, whi nodes from Ii, maing the total cost M 7 (N z) as claimed. n 2 large. We z 0. Then, match d0z 0 M n 3. cassume (Ai, Cwithout Wof (j, generality i) + W (j,that i )zfor every i = 2, 3,an...optimal, N and j solution = for 2, 3,.sufficiently..,must N. j ) = M loss match to b0x4.z0 c, d(a x >,... > xz 0 Now, asweotherwise calculateitscmatch (Ai, Cj ). C(i, j, M 2 ) contributes M 2 minus the total cost 0 2 to bx 0 5,...,3 and d to bx, for some z, N z, C ) = M M (i ) W (, i) for every i =, 2,... z 2 i match connecting cost is larger than M M 7 (2N z z 0 ) M 7 2(z 0 ). Rewriting the costtwo we subsets obtain of /3 nodes in the new graph. As the weights in the new graph are 5. cmatch (A7, Cj ) = M M (j0 ) W (j, ) for every j =, 2,..., N. rig0ht t 8 f 0 2 M 2 M (2N 2 z + z ), so recalling our assumption z z we see as v), this is exactly right as that w (u,inv)fact =lezm= z 0w(u, M 2Decrease (Mgadget (/3),xj= n2 )). j, ME Figure 5: Left: built for d =W 3, n(i = 6 and 2 + n C(i, Right: 8 7 The labelsits of cost the nodes in thethan micro structures be partitioned into disjoint subsets corregadget for u = 3, v = otherwise is larger M 2 should M 2(N ). contributes M (/3) W (i, j), so c (Ai, Cj ) = M (/3) W (i, j) M (M { n u } } z 2 n 2 n n v } 2 { z 2 le ft sponding to the following micro structures: match W,(T j, T)) = W (i, j) + the Wfirst (i segment, jof the) required. left as tree can be matched with nodes from the first segment of the rig We are now state properties Let 0,A 0,.. ready E(u D( y w(7, v(i ))match 2 ) denote 2,N7, yc. {A., A0N, Dto },M ) of the remaining micro structures., D2,..., D 2 with cost c, and similarly for the second Then,subtree if u = v we of can A match(c all n = It remains to bound the cost of matching nodes. Nodes insegments. the left i j the cost of matching two trees T0 and T2. Then, we require that: both trees, so the total cost is c= n. Otherwise, we can match at most n nodes, {B, B2,..., BN, C, C2,..., CN }, P M2 3 n >5 (right). the total cost atat least c= n + M c=, see Figure that the matched0 only to nodes of C (A ) with cost least M 4Furthermore,, exceptnote that thetotalr i) for every i =, 2,..., N and z =, 2,..., N, matching the left tree of E(u, v, c= ) with any tree is at least c= n and the cost of match 5 be matched M=. 8. The cost matching node of of E(u, v, c= ) is c=. a node of Ai to a node of Cj, for i, j Figure 6: Schematic illustration of a connection gadget for /3with = 2cost and n cmatch ) = be M M only (N if their j) labels W (z,belong j) for toevery z =, 2,...,The N and jof =least, 2,...M, N. (/3) (for the nodes of C(i, j, M (/3)2 ) or at least M 2 (for the either so2.that two(b nodes matched the same subset. cost at z, Cj can Connection gadget C(i, j, M ). For any i, j 2 {,..., N } and sufficiently large M 2 {0,.. 2. and right tree of C(i, j, M ) is M W (i, j). The left tree d matching any node of A0i, Dz 0, Bz, Cj0 should be at least M 6. The cost of matching any node of 2 )), so for sufficiently large M }, the distance ofm the left C(i, j, M ateditleast 22. cmatch (A0i, Dz 0 ) = M 6 M 3 (N 3. {A, A2,..., AN, C, C2,..., CN }, W (i, z 0 ) (Aibe, Catj )least = M W (j, that i) + the W (j )j )for i = 2,to 3, the...,root N and A3. should M, except root, of iai (C canevery be matched of Cj = 2, 3,..., N. depend on j and the right tree does not depend on i. i, Ccjmatch 5 5 Let {u,..., u/3 } and {v,..., v/3 } be the /3-cliques corresponding to i and j, respe (A ) with cost larger than M M but at most M, and, for any non-root node of Ai (Cj ) and 5 (, ) 5 3 where u < u2 M <..., uw 4 /3 and v < v2 <... < v/3. Recall 4. any cmatch (Ai, Cnode (icost ) matching W (, i) fortotal every =, 2,.M..,N,/3 Aj) (because C that W (i, j) denotes the total w for non-root of CM thea of is larger than icost M. Finally, every A and ) = (A ),M i We can clearly construct solution with M n /3 W (i, 2 all edges connecting two nodes in the i-th clique or a node in the i-th clique with a node in t Cj should consist of O(n2 ) nodes. Now we can show that, assuming these properties, any optimal clique, where we assume that w(u, u) = 0. We construct the gadget C(i, j, M ) as follows. T 5 3 have enumerated the to i jso that 5. cmatch, Cj ) =structure. M clique M (j corresponding ) W (j, ) for every =, 2,...u,N.< u2 <... < u/3 ). the left tree has degree + /3 and the root of the right tree has P degree + n. Their rig solution has(a a specific P We claim ofthat, we correspond to the root of the left and the right trees of D( w(u, u )), respe or The appropriately chosen MMmicro and M better isinto possible. Let W = u,v w(u, v).children 2,ofno Lemma sufficiently large, the total cost an should optimal matching is EveryWe other child of the left root can be matched with every other child of the right root wi labels5.offorthe nodes in the structures be solution partitioned disjoint subsets correm (we fix M and M later). Intuitively, we would lie the x-th child left xm =8 W the (/3 enough to2 guarantee that the cost contributed by nodes in with5 the u -th child of the right root, and then contribute P ofw(uthe, the 7 following 5 sponding micro M be matched v ) to th 2to M 2(N +)). M 6This 2 structures: Mis M 3 2N + M max{w (i, z) + W (z, j) + W (j,total i)}. i,j,z M x5 =, 2,..., /3 we obtain the desired sum. To this end, we cost, so that summing up over M ll decrease at least M. The total cost contributed by nodes in all equality gadgets is 0,..., A0,is the left tree of E(u,, M ) and the right tree of D( ) to the. {A0, Agadgets D, D,..., D }, 2 2 Px-th child of the left root. Simila Proof. Consider i, j, z N maximizing W (i, z)n+ W (z, j) + W (j, i). We may assume that i j. Then, attach the right tree of E(, t, M ) and the left tree of D( w(t, v )) to the t-th child of th t least M to nchoose /3. Consequently, setting M2 = M n /3 + M guarantees that any optimal it is possible the following matching: root. Here we use to emphasise that a particular tree does not depend on the particular v {B, B2,..., BN, C, C2,..., CN }, parameter. All decrease gadgets are of the same type. See Figure 6. olution. bmust all x3 (j= ),+2,W.(j,. ))., /3 we themust 0 match M 8, children of the left root, so in fact, for every D(M 3 (i ) + W (, i)) D(M to cj with cost l ef t left {Ax-th, A2,..child., AN, C C2,..left., CNroot }, to some child of the right root. Because matching the, the match3.2.the of left tree 0 some nodes from the copy of I being the left child of cj to some spine nodes below bz with 5 total M 7 (N z),contributes so that twocost nodes can be matched only at if their to the same subset. The choice cost of of MA f any decrease gadget leastlabelswbelong to the total cost, by the an optimal i Cj 0,8D 0, B, C 0 should be at least 6. The cost of matching any node of 0 matching any node of A M 3. a to d with cost M, z z i j i olution in fact must match2 the x-th2child of the left root with the ux -th child of the right root, as Ai, C4.j some should be from at least Mof,I except that the root of Ai (Cspine be matched to the root of C j ) can nodes the copy M being the right child of a0i 5to some nodes below gadget dz with therwise we lose at least due to the corresponding equality that cannot be compensated 5 (A ) with M but at most M, and, for any non-root node of Ai (Cj ) and totalcost cost larger M 7 (Nthan z), M yp matching its node accompanying gadget. Finally, decrease gadget adds for any 0non-root of C (A ), thedecrease cost of matching is larger than the M 4. corresponding Finally, every Ai and 5. b to d0z, b02 to d0z 2,2..., b0z to d0 with cost M 7 2 each, Cj should consist of O(n ) nodes. Now we can show that, assuming as MtheseMproperties, Moptimal n /3 the total cost is 2 /3 +any y w(ux, vy ) to the total cost. Therefore,3 as long 2 6. ai has aspecific M 2 + M each, solution i to cj structure.,..., ai j+ to c with cost ndeed Mto cja,w (i, j) after choosing the cost of matching the roots to be M +M2 /3+M n / Ai 5. to DFor cost M large M (N W (i, z), z with sufficiently M, i) the the total cost of optimal matching is For Lemma any7. node in a decrease gadget, cost ofanmatching is at least W, for any node in an equality Bz tocost Cj with M M (N j) M W (z,and j),3 7 ofcost adget, finally the of the roots is M 8the 2 M 2(Nmatching ) M 6 is 2 M 5, M 2N + M 2 the maxcost {W (i,of z) matching + W (z, j) + W (j, children i)}. i,j,z t le 9. Athe to matching Cj,..., Ai j+2 costsc(i, M 2j, W W (j, W (j least, i ),M. For the correctness i to Ccost j, Ai of 2 with of M2, so anyto Cnode ) i)is+ at of the ht gh ft i r l 2 2 eft M W (j, i ) + W (j 2, i 2),..., M + 2) + W (, i j + ). rig Proof. Consider j, z maximizing +W (z, j)w +(2, Wi (j,ji). We may assume that i j. Then, onstruction it isi, enough that W M(i,isz) at least C 0 (i, j, M 4 ) C(i, j, M 3 (/3)2 ) x x<y 2 2 j + ). x y right right x it is0. possible to Cchoose the following Ai j+ to M 5 M 3 (imatching: j) W (, i with cost y y y x y

67 Open Problems

68 Open Problems TED to APSP reduction?

69 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = )

70 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = ) Levenshtein distance: every elementary edit operation costs

71 Open Problems TED to APSP reduction? Largest common subforest: unlabeled trees ( Σ = ) Levenshtein distance: every elementary edit operation costs log shaves?

72 Than You!

Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can)

Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann Paweł Gawrychowski Shay Mozes Oren Weimann Abstract The edit distance between two rooted ordered trees with

More information

arxiv: v1 [cs.ds] 27 Mar 2017

arxiv: v1 [cs.ds] 27 Mar 2017 Tree Edit Distance Cannot be Computed in Strongly Subcubic Time (unless APSP can) Karl Bringmann Paweł Gawrychowski Shay Mozes Oren Weimann arxiv:1703.08940v1 [cs.ds] 27 Mar 2017 Abstract The edit distance

More information

Analysis of tree edit distance algorithms

Analysis of tree edit distance algorithms Analysis of tree edit distance algorithms Serge Dulucq 1 and Hélène Touzet 1 LaBRI - Universit Bordeaux I 33 0 Talence cedex, France Serge.Dulucq@labri.fr LIFL - Universit Lille 1 9 6 Villeneuve d Ascq

More information

An Optimal Decomposition Algorithm for Tree Edit Distance

An Optimal Decomposition Algorithm for Tree Edit Distance An Optimal Decomposition Algorithm for Tree Edit Distance ERIK D. DEMAINE Massachusetts Institute of Technology and SHAY MOZES Brown University and BENJAMIN ROSSMAN Massachusetts Institute of Technology

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 5: Subcubic Equivalences Karl Bringmann Reminder: Relations = Reductions transfer hardness of one problem to another one by reductions problem P instance

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 8: (Boolean) Matrix Multiplication Karl Bringmann Recall: Boolean Matrix Multiplication given n n matrices A, B with entries in {0,1} compute matrix

More information

k-distinct In- and Out-Branchings in Digraphs

k-distinct In- and Out-Branchings in Digraphs k-distinct In- and Out-Branchings in Digraphs Gregory Gutin 1, Felix Reidl 2, and Magnus Wahlström 1 arxiv:1612.03607v2 [cs.ds] 21 Apr 2017 1 Royal Holloway, University of London, UK 2 North Carolina State

More information

TASM: Top-k Approximate Subtree Matching

TASM: Top-k Approximate Subtree Matching TASM: Top-k Approximate Subtree Matching Nikolaus Augsten 1 Denilson Barbosa 2 Michael Böhlen 3 Themis Palpanas 4 1 Free University of Bozen-Bolzano, Italy augsten@inf.unibz.it 2 University of Alberta,

More information

Minmax Tree Cover in the Euclidean Space

Minmax Tree Cover in the Euclidean Space Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 15, no. 3, pp. 345 371 (2011) Minmax Tree Cover in the Euclidean Space Seigo Karakawa 1 Ehab Morsy 1 Hiroshi Nagamochi 1 1 Department

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &

More information

Pattern Popularity in 132-Avoiding Permutations

Pattern Popularity in 132-Avoiding Permutations Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,

More information

Minmax Tree Cover in the Euclidean Space

Minmax Tree Cover in the Euclidean Space Minmax Tree Cover in the Euclidean Space Seigo Karakawa, Ehab Morsy, Hiroshi Nagamochi Department of Applied Mathematics and Physics Graduate School of Informatics Kyoto University Yoshida Honmachi, Sakyo,

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

COL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:

COL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number: Name: Entry number: There are 5 questions for a total of 75 points. 1. (5 points) You are given n items and a sack that can hold at most W units of weight. The weight of the i th item is denoted by w(i)

More information

Theoretical Computer Science. Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees

Theoretical Computer Science. Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees Theoretical Computer Science 470 (2013) 10 22 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Approximation and parameterized

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Decomposition algorithms for the tree edit distance problem

Decomposition algorithms for the tree edit distance problem Decomposition algorithms for the tree edit distance problem Serge Dulucq LaBRI - UMR CNRS 5800 - Université Bordeaux I 05 Talence cedex, France Serge.Dulucq@labri.fr Hélène Touzet LIFL - UMR CNRS 80 -

More information

Extremal Graphs Having No Stable Cutsets

Extremal Graphs Having No Stable Cutsets Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University

More information

arxiv: v2 [cs.ds] 3 Oct 2017

arxiv: v2 [cs.ds] 3 Oct 2017 Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract

More information

Matching Triangles and Basing Hardness on an Extremely Popular Conjecture

Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Amir Abboud 1, Virginia Vassilevska Williams 1, and Huacheng Yu 1 1 Computer Science Department, Stanford University Abstract Due

More information

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem Zeev Nutov, László A. Végh January 12, 2016 We study the tree augmentation problem: Tree Augmentation Problem (TAP) Instance:

More information

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard

Partition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard I. Minimizing Cmax (Nonpreemptive) a. P2 C max is NP-hard. Partition is reducible to P2 C max b. P Pj = 1, intree Cmax P Pj = 1, outtree Cmax are both solvable in polynomial time. c. P2 Pj = 1, prec Cmax

More information

Odd independent transversals are odd

Odd independent transversals are odd Odd independent transversals are odd Penny Haxell Tibor Szabó Dedicated to Béla Bollobás on the occasion of his 60th birthday Abstract We put the final piece into a puzzle first introduced by Bollobás,

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

On the Average Path Length of Complete m-ary Trees

On the Average Path Length of Complete m-ary Trees 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University

More information

Classes of Problems. CS 461, Lecture 23. NP-Hard. Today s Outline. We can characterize many problems into three classes:

Classes of Problems. CS 461, Lecture 23. NP-Hard. Today s Outline. We can characterize many problems into three classes: Classes of Problems We can characterize many problems into three classes: CS 461, Lecture 23 Jared Saia University of New Mexico P is the set of yes/no problems that can be solved in polynomial time. Intuitively

More information

More Dynamic Programming

More Dynamic Programming CS 374: Algorithms & Models of Computation, Spring 2017 More Dynamic Programming Lecture 14 March 9, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 What is the running time of the following? Consider

More information

Extreme Point Solutions for Infinite Network Flow Problems

Extreme Point Solutions for Infinite Network Flow Problems Extreme Point Solutions for Infinite Network Flow Problems H. Edwin Romeijn Dushyant Sharma Robert L. Smith January 3, 004 Abstract We study capacitated network flow problems with supplies and demands

More information

The complexity of independent set reconfiguration on bipartite graphs

The complexity of independent set reconfiguration on bipartite graphs The complexity of independent set reconfiguration on bipartite graphs Daniel Lokshtanov Amer E. Mouawad Abstract We settle the complexity of the Independent Set Reconfiguration problem on bipartite graphs

More information

More Dynamic Programming

More Dynamic Programming Algorithms & Models of Computation CS/ECE 374, Fall 2017 More Dynamic Programming Lecture 14 Tuesday, October 17, 2017 Sariel Har-Peled (UIUC) CS374 1 Fall 2017 1 / 48 What is the running time of the following?

More information

Subcubic Equivalence of Triangle Detection and Matrix Multiplication

Subcubic Equivalence of Triangle Detection and Matrix Multiplication Subcubic Equivalence of Triangle Detection and Matrix Multiplication Bahar Qarabaqi and Maziar Gomrokchi April 29, 2011 1 Introduction An algorithm on n n matrix with the entries in [ M, M] has a truly

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 13: Recap, Further Directions, Open Problems Karl Bringmann I. Recap II. Further Directions III. Open Problems I. Recap Hard problems SAT: OV: APSP:

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1

CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines. Problem 1 CSE 591 Foundations of Algorithms Homework 4 Sample Solution Outlines Problem 1 (a) Consider the situation in the figure, every edge has the same weight and V = n = 2k + 2. Easy to check, every simple

More information

A Graph Polynomial Approach to Primitivity

A Graph Polynomial Approach to Primitivity A Graph Polynomial Approach to Primitivity F. Blanchet-Sadri 1, Michelle Bodnar 2, Nathan Fox 3, and Joe Hidakatsu 2 1 Department of Computer Science, University of North Carolina, P.O. Box 26170, Greensboro,

More information

The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth

The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth Gregory Gutin, Mark Jones, and Magnus Wahlström Royal Holloway, University of London Egham, Surrey TW20 0EX, UK Abstract In the

More information

A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS

A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS A PARSIMONY APPROACH TO ANALYSIS OF HUMAN SEGMENTAL DUPLICATIONS CRYSTAL L. KAHN and BENJAMIN J. RAPHAEL Box 1910, Brown University Department of Computer Science & Center for Computational Molecular Biology

More information

arxiv: v1 [math.co] 10 Sep 2010

arxiv: v1 [math.co] 10 Sep 2010 Ranking and unranking trees with a given number or a given set of leaves arxiv:1009.2060v1 [math.co] 10 Sep 2010 Jeffery B. Remmel Department of Mathematics U.C.S.D., La Jolla, CA, 92093-0112 jremmel@ucsd.edu

More information

k-degenerate Graphs Allan Bickle Date Western Michigan University

k-degenerate Graphs Allan Bickle Date Western Michigan University k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value

More information

A Cubic-Vertex Kernel for Flip Consensus Tree

A Cubic-Vertex Kernel for Flip Consensus Tree To appear in Algorithmica A Cubic-Vertex Kernel for Flip Consensus Tree Christian Komusiewicz Johannes Uhlmann Received: date / Accepted: date Abstract Given a bipartite graph G = (V c, V t, E) and a nonnegative

More information

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

Irredundant Families of Subcubes

Irredundant Families of Subcubes Irredundant Families of Subcubes David Ellis January 2010 Abstract We consider the problem of finding the maximum possible size of a family of -dimensional subcubes of the n-cube {0, 1} n, none of which

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Induced Graph Ramsey Theory

Induced Graph Ramsey Theory Induced Graph Ramsey Theory Marcus Schaefer School of CTI DePaul University 243 South Wabash Avenue Chicago, Illinois 60604, USA schaefer@csdepauledu June 28, 2000 Pradyut Shah Department of Computer Science

More information

MINORS OF GRAPHS OF LARGE PATH-WIDTH. A Dissertation Presented to The Academic Faculty. Thanh N. Dang

MINORS OF GRAPHS OF LARGE PATH-WIDTH. A Dissertation Presented to The Academic Faculty. Thanh N. Dang MINORS OF GRAPHS OF LARGE PATH-WIDTH A Dissertation Presented to The Academic Faculty By Thanh N. Dang In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Algorithms, Combinatorics

More information

CLIQUES IN THE UNION OF GRAPHS

CLIQUES IN THE UNION OF GRAPHS CLIQUES IN THE UNION OF GRAPHS RON AHARONI, ELI BERGER, MARIA CHUDNOVSKY, AND JUBA ZIANI Abstract. Let B and R be two simple graphs with vertex set V, and let G(B, R) be the simple graph with vertex set

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

New Bounds and Extended Relations Between Prefix Arrays, Border Arrays, Undirected Graphs, and Indeterminate Strings

New Bounds and Extended Relations Between Prefix Arrays, Border Arrays, Undirected Graphs, and Indeterminate Strings New Bounds and Extended Relations Between Prefix Arrays, Border Arrays, Undirected Graphs, and Indeterminate Strings F. Blanchet-Sadri Michelle Bodnar Benjamin De Winkle 3 November 6, 4 Abstract We extend

More information

Approximating Longest Directed Path

Approximating Longest Directed Path Electronic Colloquium on Computational Complexity, Report No. 3 (003) Approximating Longest Directed Path Andreas Björklund Thore Husfeldt Sanjeev Khanna April 6, 003 Abstract We investigate the hardness

More information

Augmenting Outerplanar Graphs to Meet Diameter Requirements

Augmenting Outerplanar Graphs to Meet Diameter Requirements Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information

More information

Maximising the number of induced cycles in a graph

Maximising the number of induced cycles in a graph Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,

More information

CS 470/570 Dynamic Programming. Format of Dynamic Programming algorithms:

CS 470/570 Dynamic Programming. Format of Dynamic Programming algorithms: CS 470/570 Dynamic Programming Format of Dynamic Programming algorithms: Use a recursive formula But recursion can be inefficient because it might repeat the same computations multiple times So use an

More information

HAMILTONICITY AND FORBIDDEN SUBGRAPHS IN 4-CONNECTED GRAPHS

HAMILTONICITY AND FORBIDDEN SUBGRAPHS IN 4-CONNECTED GRAPHS HAMILTONICITY AND FORBIDDEN SUBGRAPHS IN 4-CONNECTED GRAPHS FLORIAN PFENDER Abstract. Let T be the line graph of the unique tree F on 8 vertices with degree sequence (3, 3, 3,,,,, ), i.e. T is a chain

More information

1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices.

1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. 1. Prove: A full m- ary tree with i internal vertices contains n = mi + 1 vertices. Proof: Every vertex, except the root, is the child of an internal vertex. Since there are i internal vertices, each of

More information

Information Theory and Statistics Lecture 2: Source coding

Information Theory and Statistics Lecture 2: Source coding Information Theory and Statistics Lecture 2: Source coding Łukasz Dębowski ldebowsk@ipipan.waw.pl Ph. D. Programme 2013/2014 Injections and codes Definition (injection) Function f is called an injection

More information

Characterizing binary matroids with no P 9 -minor

Characterizing binary matroids with no P 9 -minor 1 2 Characterizing binary matroids with no P 9 -minor Guoli Ding 1 and Haidong Wu 2 1. Department of Mathematics, Louisiana State University, Baton Rouge, Louisiana, USA Email: ding@math.lsu.edu 2. Department

More information

Asurvey on tree edit distance and related problems

Asurvey on tree edit distance and related problems Theoretical Computer Science 337 (2005) 217 239 www.elsevier.com/locate/tcs Asurvey on tree edit distance and related problems Philip Bille The IT University of Copenhagen, Rued Langgardsvej 7, DK-2300

More information

Digital search trees JASS

Digital search trees JASS Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Distributed Systems Byzantine Agreement

Distributed Systems Byzantine Agreement Distributed Systems Byzantine Agreement He Sun School of Informatics University of Edinburgh Outline Finish EIG algorithm for Byzantine agreement. Number-of-processors lower bound for Byzantine agreement.

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Context-Free Languages

Context-Free Languages CS:4330 Theory of Computation Spring 2018 Context-Free Languages Non-Context-Free Languages Haniel Barbosa Readings for this lecture Chapter 2 of [Sipser 1996], 3rd edition. Section 2.3. Proving context-freeness

More information

6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1

6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1 6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1 Not a requirement, but fun: OPEN PROBLEM Sessions!!! (more about this in a week) 6.S078 REQUIREMENTS 1. Class participation: worth

More information

arxiv: v2 [math.pr] 23 Feb 2017

arxiv: v2 [math.pr] 23 Feb 2017 TWIN PEAKS KRZYSZTOF BURDZY AND SOUMIK PAL arxiv:606.08025v2 [math.pr] 23 Feb 207 Abstract. We study random labelings of graphs conditioned on a small number (typically one or two) peaks, i.e., local maxima.

More information

Cleaning Interval Graphs

Cleaning Interval Graphs Cleaning Interval Graphs Dániel Marx and Ildikó Schlotter Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. {dmarx,ildi}@cs.bme.hu

More information

NATIONAL UNIVERSITY OF SINGAPORE CS3230 DESIGN AND ANALYSIS OF ALGORITHMS SEMESTER II: Time Allowed 2 Hours

NATIONAL UNIVERSITY OF SINGAPORE CS3230 DESIGN AND ANALYSIS OF ALGORITHMS SEMESTER II: Time Allowed 2 Hours NATIONAL UNIVERSITY OF SINGAPORE CS3230 DESIGN AND ANALYSIS OF ALGORITHMS SEMESTER II: 2017 2018 Time Allowed 2 Hours INSTRUCTIONS TO STUDENTS 1. This assessment consists of Eight (8) questions and comprises

More information

NP-Completeness. Algorithmique Fall semester 2011/12

NP-Completeness. Algorithmique Fall semester 2011/12 NP-Completeness Algorithmique Fall semester 2011/12 1 What is an Algorithm? We haven t really answered this question in this course. Informally, an algorithm is a step-by-step procedure for computing a

More information

On the Turán number of forests

On the Turán number of forests On the Turán number of forests Bernard Lidický Hong Liu Cory Palmer April 13, 01 Abstract The Turán number of a graph H, ex(n, H, is the maximum number of edges in a graph on n vertices which does not

More information

Computational Models - Lecture 4

Computational Models - Lecture 4 Computational Models - Lecture 4 Regular languages: The Myhill-Nerode Theorem Context-free Grammars Chomsky Normal Form Pumping Lemma for context free languages Non context-free languages: Examples Push

More information

Postorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction

Postorder Preimages. arxiv: v3 [math.co] 2 Feb Colin Defant 1. 1 Introduction Discrete Mathematics and Theoretical Computer Science DMTCS vol. 19:1, 2017, #3 Postorder Preimages arxiv:1604.01723v3 [math.co] 2 Feb 2017 1 University of Florida Colin Defant 1 received 7 th Apr. 2016,

More information

BELIEF-PROPAGATION FOR WEIGHTED b-matchings ON ARBITRARY GRAPHS AND ITS RELATION TO LINEAR PROGRAMS WITH INTEGER SOLUTIONS

BELIEF-PROPAGATION FOR WEIGHTED b-matchings ON ARBITRARY GRAPHS AND ITS RELATION TO LINEAR PROGRAMS WITH INTEGER SOLUTIONS BELIEF-PROPAGATION FOR WEIGHTED b-matchings ON ARBITRARY GRAPHS AND ITS RELATION TO LINEAR PROGRAMS WITH INTEGER SOLUTIONS MOHSEN BAYATI, CHRISTIAN BORGS, JENNIFER CHAYES, AND RICCARDO ZECCHINA Abstract.

More information

Proof of the (n/2 n/2 n/2) Conjecture for large n

Proof of the (n/2 n/2 n/2) Conjecture for large n Proof of the (n/2 n/2 n/2) Conjecture for large n Yi Zhao Department of Mathematics and Statistics Georgia State University Atlanta, GA 30303 September 9, 2009 Abstract A conjecture of Loebl, also known

More information

Small Cycle Cover of 2-Connected Cubic Graphs

Small Cycle Cover of 2-Connected Cubic Graphs . Small Cycle Cover of 2-Connected Cubic Graphs Hong-Jian Lai and Xiangwen Li 1 Department of Mathematics West Virginia University, Morgantown WV 26505 Abstract Every 2-connected simple cubic graph of

More information

P, NP, NP-Complete, and NPhard

P, NP, NP-Complete, and NPhard P, NP, NP-Complete, and NPhard Problems Zhenjiang Li 21/09/2011 Outline Algorithm time complicity P and NP problems NP-Complete and NP-Hard problems Algorithm time complicity Outline What is this course

More information

This observation leads to the following algorithm.

This observation leads to the following algorithm. 126 Andreas Jakoby A Bounding-Function for the Knapsack Problem Finding a useful bounding-function is for most problems a difficult task. Let us consider the Knapsack Problem: Let us consider the version

More information

Dynamic programming. Curs 2017

Dynamic programming. Curs 2017 Dynamic programming. Curs 2017 Fibonacci Recurrence. n-th Fibonacci Term INPUT: n nat QUESTION: Compute F n = F n 1 + F n 2 Recursive Fibonacci (n) if n = 0 then return 0 else if n = 1 then return 1 else

More information

Baltic Way 2003 Riga, November 2, 2003

Baltic Way 2003 Riga, November 2, 2003 altic Way 2003 Riga, November 2, 2003 Problems and solutions. Let Q + be the set of positive rational numbers. Find all functions f : Q + Q + which for all x Q + fulfil () f ( x ) = f (x) (2) ( + x ) f

More information

Midterm 2 for CS 170

Midterm 2 for CS 170 UC Berkeley CS 170 Midterm 2 Lecturer: Gene Myers November 9 Midterm 2 for CS 170 Print your name:, (last) (first) Sign your name: Write your section number (e.g. 101): Write your sid: One page of notes

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015

More information

De Bruijn sequences on primitive words and squares

De Bruijn sequences on primitive words and squares De Bruijn sequences on primitive words and squares arxiv:0904.3997v2 [math.co] 24 Nov 2009 Yu-Hin Au Department of Combinatorics & Optimization yau@uwaterloo.ca November 24, 2009 Abstract We present a

More information

Local Alignment of RNA Sequences with Arbitrary Scoring Schemes

Local Alignment of RNA Sequences with Arbitrary Scoring Schemes Local Alignment of RNA Sequences with Arbitrary Scoring Schemes Rolf Backofen 1, Danny Hermelin 2, ad M. Landau 2,3, and Oren Weimann 4 1 Institute of omputer Science, Albert-Ludwigs niversität Freiburg,

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

On the maximum number of isosceles right triangles in a finite point set

On the maximum number of isosceles right triangles in a finite point set On the maximum number of isosceles right triangles in a finite point set Bernardo M. Ábrego, Silvia Fernández-Merchant, and David B. Roberts Department of Mathematics California State University, Northridge,

More information

Induced Graph Ramsey Theory

Induced Graph Ramsey Theory Induced Graph Ramsey Theory Marcus Schaefer School of CTI DePaul University 243 South Wabash Avenue Chicago, Illinois 60604, USA schaefer@cs.depaul.edu February 27, 2001 Pradyut Shah Department of Computer

More information

Computational Models - Lecture 5 1

Computational Models - Lecture 5 1 Computational Models - Lecture 5 1 Handout Mode Iftach Haitner. Tel Aviv University. November 28, 2016 1 Based on frames by Benny Chor, Tel Aviv University, modifying frames by Maurice Herlihy, Brown University.

More information

Notes on Gaussian processes and majorizing measures

Notes on Gaussian processes and majorizing measures Notes on Gaussian processes and majorizing measures James R. Lee 1 Gaussian processes Consider a Gaussian process {X t } for some index set T. This is a collection of jointly Gaussian random variables,

More information

arxiv: v1 [math.co] 22 Jan 2018

arxiv: v1 [math.co] 22 Jan 2018 arxiv:1801.07025v1 [math.co] 22 Jan 2018 Spanning trees without adjacent vertices of degree 2 Kasper Szabo Lyngsie, Martin Merker Abstract Albertson, Berman, Hutchinson, and Thomassen showed in 1990 that

More information

arxiv: v1 [math.co] 2 Dec 2013

arxiv: v1 [math.co] 2 Dec 2013 What is Ramsey-equivalent to a clique? Jacob Fox Andrey Grinshpun Anita Liebenau Yury Person Tibor Szabó arxiv:1312.0299v1 [math.co] 2 Dec 2013 November 4, 2018 Abstract A graph G is Ramsey for H if every

More information

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,

More information

Graph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University

Graph Theorizing Peg Solitaire. D. Paul Hoilman East Tennessee State University Graph Theorizing Peg Solitaire D. Paul Hoilman East Tennessee State University December 7, 00 Contents INTRODUCTION SIMPLE SOLVING CONCEPTS 5 IMPROVED SOLVING 7 4 RELATED GAMES 5 5 PROGENATION OF SOLVABLE

More information

EXACT DOUBLE DOMINATION IN GRAPHS

EXACT DOUBLE DOMINATION IN GRAPHS Discussiones Mathematicae Graph Theory 25 (2005 ) 291 302 EXACT DOUBLE DOMINATION IN GRAPHS Mustapha Chellali Department of Mathematics, University of Blida B.P. 270, Blida, Algeria e-mail: mchellali@hotmail.com

More information

Copyright 2013 Springer Science+Business Media New York

Copyright 2013 Springer Science+Business Media New York Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media

More information

Applied Computer Science II Chapter 7: Time Complexity. Prof. Dr. Luc De Raedt. Institut für Informatik Albert-Ludwigs Universität Freiburg Germany

Applied Computer Science II Chapter 7: Time Complexity. Prof. Dr. Luc De Raedt. Institut für Informatik Albert-Ludwigs Universität Freiburg Germany Applied Computer Science II Chapter 7: Time Complexity Prof. Dr. Luc De Raedt Institut für Informati Albert-Ludwigs Universität Freiburg Germany Overview Measuring complexity The class P The class NP NP-completeness

More information

A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS

A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive

More information

Bayesian & Markov Networks: A unified view

Bayesian & Markov Networks: A unified view School of omputer Science ayesian & Markov Networks: unified view Probabilistic Graphical Models (10-708) Lecture 3, Sep 19, 2007 Receptor Kinase Gene G Receptor X 1 X 2 Kinase Kinase E X 3 X 4 X 5 TF

More information

A Dichotomy for Regular Expression Membership Testing

A Dichotomy for Regular Expression Membership Testing 58th Annual IEEE Symposium on Foundations of Computer Science A Dichotomy for Regular Expression Membership Testing Karl Bringmann Max Planck Institute for Informatics Saarbrücken Informatics Campus Saarbrücken,

More information

Dominating Set Counting in Graph Classes

Dominating Set Counting in Graph Classes Dominating Set Counting in Graph Classes Shuji Kijima 1, Yoshio Okamoto 2, and Takeaki Uno 3 1 Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan kijima@inf.kyushu-u.ac.jp

More information

Lecture 18: More NP-Complete Problems

Lecture 18: More NP-Complete Problems 6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with

More information