On the Embedding of a Class of Regular Graphs. Yu-Chee Tseng and Ten-Hwang Lai. Department of Computer and Information Science

Size: px
Start display at page:

Download "On the Embedding of a Class of Regular Graphs. Yu-Chee Tseng and Ten-Hwang Lai. Department of Computer and Information Science"

Transcription

1 On the Embedding of a lass of Regular Graphs in a Faulty Hypercube Yu-hee Tseng and Ten-Hwang Lai Department of omputer and Information Science The Ohio State University olumbus, Ohio 432 Tel: (64) , Fax: (64) ftseng, laigcis.ohio-state.edu bstract wide range of graphs with regular structures are shown to be embeddable in an injured hypercube with faulty links. These include rings, linear paths, binomial trees, binary trees, meshes, tori, and many others. Unlike many existing algorithms which are capable of embedding only one type of graphs, our algorithm embeds the above graphs in a unied way, all centered around a notion called edge matrix. In many cases, the degree of fault tolerance oered by the algorithm is optimal or near-optimal. Key Words: graph embedding, processor allocation, hypercube, binary-reected trees, fault tolerance. Introduction Embedding a guest graph into a host graph, or the graph embedding problem, has long been recognized as being suitable for modeling the problem of processor allocation in a parallel or distributed system [, 2]. ecause of the importance and popularity of the hypercube as a network architecture for concurrent computers, the problem of embedding in a hypercube has received much attention from researchers and has been intensively studied for various guest graphs, such as rings [2], trees [2, 2], pyramid [9], and shue networks [6]. In general, this problem is computationally dicult. Determining whether an arbitrary graph is embeddable in a hypercube is NP-hard [5], and it remains so even if dilation is allowed [8] or if the guest graph is a tree [9]. In a hypercube of high dimension, the probability of there existing a node/link fault may not be negligible. Should this happen, it is desirable that the faulty components be This research was supported by National Science Foundation under Grant R-9589.

2 isolated from the rest of the hypercube so that guest graphs still can be embedded in the cube. This leads to the problem of embedding a graph is an injured hypercube. Several results on this topic are available in the literature of parallel computing. lgorithms for constructing a ring as large as possible in an injured n-cube have been proposed in [3], [7], and [4]. These algorithms are able to tolerate up to n=2, 2n, and (2 n=2 ) faulty nodes, respectively. level-(n? ) complete binary tree can be embedded in an n-cube with O(n) faulty nodes [4]; a better result is available that allows up to (n 2 ) faulty nodes [8]. Fault-tolerant embedding of meshes in injured hypercubes was studied in [22]. ll these results are concerned with graph embedding in a hypercube with faulty nodes, where whenever a node is faulty, it is commonly assumed that not only the node itself but all the links incident upon it are not available. In this paper, we consider the case where a hypercube has faulty links rather than faulty nodes. It has been suggested (e.g., in [4, 7, 8]) that faulty links be treated as faulty nodes: if link hu; vi is faulty then regard either node u or node v as faulty. With this treatment, faulty links are converted to faulty nodes and the above mentioned results are immediately applicable. While convenient, this approach may be inecient in some cases. For instance, if in some application a user wishes to use as many processors as possible, it is certainly undesirable to give up a processor (node) just because a link connected to it is faulty. ssuming faulty links do not jeopardize their end nodes, it is shown in [, 3] that a ring of length 2 n can be embedded in an n-cube with up to n? 2 faulty links. (Such an embedding would be impossible if faulty links are treated as faulty nodes.) In this paper, we considerably extend this result and show that a wide range of graphs can be embedded in an injured n-cube with faulty links: rings, linear paths, binary trees, binomial trees, meshes, tori, products of these graphs, and many others. In particular, we have the following results (among others):. ny level-n binary-reected tree can be embedded in an n-cube with up to n? faulty links. (inary-reected trees will be dened in Section 2. Linear paths and binomial trees are two of the most important binary-reected trees.) 2. level-n complete binary tree (with 2 n? nodes) can be embedded, with congestion 2 and dilation 2, in an n-cube with up to n? faulty links. 3. ny k-dimensional, 2 d 2 d, mesh or torus can be embedded in an n-cube with up to r faulty links, where kd = n and r = minf(2 d ); n? (k log d)g. The same is true even if the guest graph is not a mesh or torus but the product of any k of the 2

3 above mentioned graphs. The purpose of this paper is twofold: ) to report the above new results, and 2) to demonstrate the advantage of representing a subgraph of a hypercube as an edge matrix. In a previous work [5], we introduced the notion of edge matrix as a possible data structure for representing a subgraph of a hypercube (or the embedding of a guest graph in a hypercube). ny of the above mentioned graphs can be conveniently represented as an edge matrix, and so can the set of faulty links. s such, our embedding problem becomes one of transforming an edge matrix from one form to another such that the reformed matrix is disjoint (dened in Section 2) from the one representing the faulty links and represents the same guest graph. ll our results are obtained in this way. Thus, unlike many existing embedding algorithms that were designed for only one type of graphs, our algorithms are applicable to a broad range of graphs. We will dene edge matrices and binary-reected trees in the next section; show how to embed rings, binary-reected trees, and complete binary trees in Section 3; and extend these results to the embedding of a product graph in Section 4. 2 Preliminaries 2. asic Denitions n n-cube is an undirected graph consisting of 2 n nodes each labeled by a distinct binary number b : : :b n. Two nodes b : : : b i? b i b i+ : : : b n and b : : :b i? b i b i+ : : :b n are joined by an edge along dimension i, where b i is the 's complement of b i. d-dimensional subcube, or d-subcube, is denoted by a ternary string x : : : x n, where x i 2 f; ; g, with exactly d bits of 's (called \don't care" bits) in the string. For any two d-subcubes, Q = x : : : x i? x i x i+ : : : x n and Q = x : : : x i? x i x i+ : : : x n, whose bits in the ith position complement each other, there are exactly 2 d edges between Q and Q. We call these edges, as a whole, the edge set between Q and Q and denote it by the string x : : : x i? x i+ : : :x n. The position of in the string indicates the dimension in the hypercube along which these edges are. For instance, the edge set between subcubes and, denoted by, contains four (2 2 ) edges all along dimension 3. We do not distinguish between a string x x 2 : : :x n and a vector (x ; x 2 ; : : :; x n ), and will use the two terms alternatively. 3

4 X = (a) (b) Figure : 4 4 edge matrix dening a spanning tree in the 4-cube. 2.2 Edge Matrices If each edge set is represented by a length-n vector, then a collection of m edge sets can be represented by an m n matrix, each row representing an edge set. Such a matrix is called an edge matrix. For instance, the matrix in Fig. (a) is an edge matrix. For any edge matrix X, let E(X) denote the set of edges that equals the union of the edge sets represented by the rows of X; and dene G(X) = (V; E) to be the graph with vertex set V equaling the set of all nodes of the n-cube and with edge set E = E(X). G(X) is a subgraph of the n-cube or can be regarded as a guest graph after embedded into the cube. The subgraph dened by the example edge matrix of Fig. (a) is depicted in Fig. (b). If X is a matrix, we denote by X[i::j][k::l] the submatrix of X that locates at the intersection of rows i::j and columns k::l. The notation [?] is the abbreviation of [::n], and [i] is that of [i::i]. Denition n edge matrix X is said to be well-formed if all 's in the same column are in adjacent rows. Such an X can be written as X = or, to save space, as (X ; X 2 ; : : :; X r ) T, where each X i is a submatrix of X containing all X X 2. X r 4

5 rows in X whose 's are in a same column. If, for all i = ::r, the edges in E(X i ) are all along dimension n? r + i (i.e., the 's in X i are all in column n? r + ), then X is called dimension-sorted. Denition 2 If a 2 f; ; ; g and b 2 f; g are two bits, dene ab to be the \exclusiveor" of a and b with the extension that b = and b =. Given an edge set x = (x ; : : :; x n ) and a binary vector = (c ; : : :; c n ), dene x = (x c ; : : :; x n c n ). If X is an m n edge matrix, dene X to be the m n edge matrix whose ith row is X[i][?]. Denition 3 Two edge matrices X and Y are said to be disjoint, denoted as X $ Y, if E(X) \ E(Y ) = ;. Two edge matrices X and Y are said to be isomorphic, denoted as X Y, if X = (Y ) for some and, where is any permutation on the columns of Y and is any length-n binary vector. The notion of isomorphism between edge matrices corresponds to the regular notion of isomorphism in graph theory. Indeed, we have the following lemma that directly follows from denitions. Lemma If two edge matrices X and Y are isomorphic, then the graphs they dene, G(X) and G(Y ), are isomorphic. The following lemma is also straightforward and can be easily veried. Lemma 2 For two edge matrices X and Y, if X $ Y, then (X) $ (Y ), for any column-permutation and any binary vector. 2.3 inary-reected Trees The next lemma, proved in [5], describes the edge matrices of a wide range of trees in the n-cube. Lemma 3 [5] Let X br = : : : b 2; : : : b 3; b 3;2 : : : : : : b n?; b n?;2 b n?;3 : : : b n; b n;2 b n;3 : : : b n;n? () where each b i;j is or. Then 5

6 (a) G(X br ) denes a spanning tree in the n-cube; (b) if for each i = ::n? 2, b i+;i = b i+2;i = b i+3;i = = b n;i, then G(X br ) is a binomial tree; and (c) if for each i = ::n?2, b i+;i = b i+2;i = b i+3;i = = b n;i, then G(X br ) is a Hamiltonian path. Denition 4 graph is said to be a level-n binary-reected tree or R-tree if it is isomorphic to G(X) for some X conforming to Eq. (). The term \binary-reected" somehow reects the structure of a R-tree: a level- Rtree consists of a single node, while a level-n R-tree can be constructed recursively by taking two identical (isomorphic) level-(n? ) R-trees and joining them with a single edge at any two corresponding nodes (so that the endpoints of the new edge correspond to each other under the isomorphism between the two trees). (One may see such a recursive structure in the tree of Figure (b).) We saw some similarity between the above construction and the binary-reected Gray code and therefore borrowed the term binary-reected. There are a large number of R-trees of dierent shapes, as joining the two level- (n? ) R-trees at dierent places may yield dierent level-n R-trees. Two of the most important level-n R-trees are the length-2 n linear path and the level-n binomial trees y. inomial trees are useful for implementing broadcasting [7] and parallel divide-and-conquer [] in a hypercube. Note that each level-n R-tree is an abstract tree isomorphic to a spanning tree in the n-cube. Thus, a ring is not a R-tree, and a Hamiltonian cycle of an n-cube cannot be described as an edge matrix conforming to Eq. (). Nevertheless, there is a way to depict a Hamiltonian cycle with an edge matrix. Lemma 4 Let X hc = : : : b : : : b b 2 : : : b b 2 b 3 : : : : : : b b 2 b 3 : : : b b 2 b 3 : : : b n?2 b b 2 b 3 : : : b n?2 (2) y Denote by i the level-i binomial tree. consists of a single node, which is also regarded as its root. i; i, is constructed out of two i?'s with their roots joined by an edge and one of the two roots of i?'s becoming the root of i. Such a construction conforms to the one for R-trees. 6

7 where each b i is or, i = ::n? 2. Then G(X hc ) denes a Hamiltonian cycle in the n-cube. Proof. Let X be the matrix obtained from X hc by substituting any binary bit b for the bit in the bottom row. E(X hc ) = E(X) [ feg, where e is the edge b b 2 b 3 : : :b n?2 b. y Lemma 3, G(X) is a Hamiltonian path in the n-cube. s path G(X)'s endpoints are at the nodes incident by e (i.e., node b b 2 b 3 : : :b n?2 b and node b b 2 b 3 : : : b n?2 b), adding e to G(X) results in a Hamiltonian cycle. 2 We conclude this section with a lemma that will be used frequently in the rest of the paper. Note that throughout this paper, the logarithmic base is 2. Lemma 5 Let s + s s k = s, where s i ; i = ::k, are positive integers. Then P k i= dlog( + s i)e s. 3 Embedding R-trees, omplete inary Trees, and Rings In the previous section, we have shown how to use an edge matrix to represent a set of edges and, in particular, the embedding of a wide range of guest graphs. In this section, we show how such representations may facilitate fault-tolerant embedding of these graphs in an n-cube with faulty links. onsider the problem of embedding a level-n R-tree in an n-cube in which there are exactly f faulty links and no faulty nodes. Let the faulty links be represented as an f n edge matrix F, each fault corresponding to a row. Let X be an edge matrix (conforming to Eq. ()) that represents the R-tree in question. If we can nd an edge matrix X such that X X and X $ F, then because G(X ) is isomorphic to G(X) (by Lemma ) and E(X ) is disjoint from E(F ) (by Denition 3), G(X ) is a fault-free embedding of the R-tree. Our embedding problem thereby reduces to one of nding such an X, given X and F. We rst establish a sucient condition for such an X to exist. Theorem Let X be an edge matrix conforming to Eq. (), and let F = (F ; : : :; F r ) T be a well-formed edge matrix. If P r i=dlog( + je(f i )j)e n?, then there exists an edge matrix X such that X X and X $ F. Proof. We construct a column permutation function and a binary vector such that X =? (X ) has the desired properties. The overall construction and the relationship among F, X and the yet-to-be-constructed,, and X are depicted in Fig. 2. 7

8 Figure 2: onstructing X =? (X ) such that X X and X $ F. Step : Let be a column permutation of F (i.e., the columns of F are permuted according to the permutation function ) such that (F ) is dimension-sorted (it is not hard to nd such a ): (F ) = (F ) (F 2 ). (F r ) = Step 2: In this step, we construct a length-n binary vector such that (F ) $ X. Specically, we compute a binary vector i for each F i ; i = ::r, and then concatenate ; 2 ; : : :; r (with minor modication) to yield. The purpose of i is to guarantee the relationship Fi $ X[n? r + i][?]. Since F i is the only submatrix of (F ) that contains edges along dimension n? r + i, we will have (F ) $ X. The following procedure constructs : Procedure inary Vector() a) for i := to r do i) Let u i := + P i? j= dlog( + je(f j )j)e and v i := P i j=dlog( + je(f j )j)e; ii) Let Z i = (z ui ; : : :; z vi ) be a length-(v i?u i +) binary vector that is distinct from each row of F i [?][u i::v i ]; iii) i := X[n? r + i][u i ::v i ] Z i ; b) Let := ( ; 2 ; : : :; r ; ), where is any sequence of /'s that makes to be of length n. F F 2. F r : π ( F) In the ith iteration of step a), Z disjoint i and i are computed. Since Z i is a binary vector of X X π F disjoint π π ( ) X 8

9 length v i? u i +, there are 2 v i?u i + = 2 dlog(+je(f i )j)e 2 log(+je(f i )j) + je(f i)j possible choices for Z i. On the other hand, F i contains je(fi )j rows, each having a in position n? r + i. If we assume that v i < n? r + i (proved later), then matrix F i [?][u i::v i ] contains only binary bits. s there are fewer rows in F i [?][u i::v i ] than the possible settings of Z i, a Z i as specied in the above procedure must exist. With the same assumption v i < n? r + i, one readily sees from Eq. () that vector X[n? r + i][u i ::v i ] contains only binary bits. Hence, step a.iii) implies X[n? r + i][u i ::v i ] i = Z i ; which is distinct from each row of F i [?][u i::v i ]. This in turn implies that X[n? r + i][?] ( ; : : :; i ; : : :; r ; ) $ F i [?][?] = F i ; independent of how the other j ; j 6= i, and are set. Thus, (F ) $ X. Step 3: Let X =? (X ), where? is the reverse permutation of. y Lemma, X X. ecause of Lemma 2, it follows from (F ) $ X that F $? (X ). Thus, X has the desired properties. It remains to prove the above assumed inequality: v i < n? r + i. simple induction on i, from r down to, will do the job. When i = r, by denition, v r = P r i=dlog( + je(f i )j)e n? < n. To prove the induction step, simply observe that as i reduces by, the right-hand side of the inequality also decreases by, while the left-hand side decreases by dlog( + je(f i )j)e. 2 Example : Figure 3 demonstrates the procedure described in the above proof. Given are an X and an F with 6 faults in a 6-cube. Within F, submatrices F ; F 2, and F 3 contain rows 2, row 3, and rows 46, respectively. Step sorts F into (F ), where the notation \i! j" means \permute column i to column j". From (F ), step 2 computes the values of u i ; v i, and Z i ; i = ::3. Then, using Z i 's and the elements highlighted in X, i 's are computed. Finally, X is constructed. 2 The following corollary shows the degree of fault tolerance guaranteed by the above theorem in embedding a level-n R-tree. orollary ny level-n R-tree can be embedded in an injured n-cube that contains no more than n? faulty links. 9

10 step : F = ==) (F ) =, where = 8 >< >: 2! 4 3! 6 4! ! 5 step 2: (F ) ==) u = ; v = 2; Z = (; ) u 2 = 3; v 2 = 3; Z 2 = () u 3 = 4; v 3 = 5; Z 3 = (; ) X = ==) = (; ) Z = (; ) 2 = () Z 2 = () 3 = (; ) Z 3 = (; ) = () ==) = (; ; ; ; ; ) step 3: X =? (X ) =? ( ) = Figure 3: n example for the proof of Theorem.

11 Proof. Without loss of generality, assume F to be well-formed, F = (F ; : : :; F r ) T. y Lemma 5, P r i=dlog( + je(f i )j)e je(f )j. Hence, Theorem is applicable if je(f )j n?. 2 In the above proof, observe that P r i=dlog( + je(f i )j)e = je(f )j only if je(f i )j = or 2 for each i. Thus, if faulty links occur in only a very small number of dimensions, the embedding algorithm has potential to tolerate more than n? faults. s was commented earlier, complete binary trees and rings are not R-trees. Nevertheless, Theorem can be applied to the embedding of such graphs, as shown in the following two corollaries. orollary 2 If there are no more than n? faulty links in the n-cube, a level-n complete binary tree (with 2 n? nodes) can be embedded in the cube with dilation 2 and congestion 2. Proof. level-n complete binary tree can be embedded into a level-n binomial tree with congestion 2 and dilation 2 (see [5]). Since binomial trees are R-trees (by Lemma 3) and there exists an (n? )-resilient embedding of a level-n binomial tree in an n-cube (by orollary ), this corollary is proved. 2 The following result has been established in [] in a relatively complicated way. Here we oer a much simpler proof. orollary 3 If there are no more than n? 2 faulty links in the n-cube, then there exists a Hamiltonian cycle in the cube. Proof. y Lemma 4, G(X hc ) is a Hamiltonian cycle. Rewrite X hc as! X hc = X U X U 2 X D X D2 such that X U = X hc [::n? ][::n? ] and X D2 = X hc [n][n] = (). s there are at most n? 2 faults in F, one can easily nd a column-permutation function on F such that in (F ) = F no edge is along dimension n. onsider both F [?][::n? ] and X U as edge matrices in an (n? )-cube. pplying Theorem to these two edge matrices, we can nd a permutation 2 and a length-(n? ) binary vector such

12 that F [?][::n? ] $? 2 (X U ). From this we obtain the following: F [?][::n? ] $? 2 (X U ) =) / add F [?][n] and X U 2 into the above equation / F = (F [?][::n? ]; F [?][n]) $ (? 2 (X U ); X U 2 ) =) / no edge in F is along dimension n and (X D ; X D2 ) is along dimension n /! F $? 2 (X U ) X U 2? 2 (X Z D ) X D2 =) / from Lemma 2 / F $? (Z) =) / from X hc Z? (Z) and Lemma / G(? (Z)) is a fault-free Hamiltonian cycle. 2 omments. We have shown that a level-n R-tree and a level-n complete binary tree (resp., a Hamiltonian cycle) can always be embedded in an n-cube with no more than n? (resp., n?2) faulty links. It is not hard to see that when there are n (resp., n?) faulty links all incident to a same node, it is impossible to nd a level-n R-tree (resp., a Hamiltonian cycle) in the n-cube. Thus, the result has reached the worst-case bounds for these graphs. However, as commented earlier, if faulty links occur in only a small number of dimensions, the embedding algorithm has potential to tolerate more faults. The time needed to compute the X in Theorem, given any f faulty links, can be analyzed as follows. To sort f links (step ) takes O(f log f) time. To compute the vectors i ; i = ::r; (step 2) needs f comparisons. To compute the nal edge matrix (step 3) needs n 2 steps. So the overall time complexity is O(f log f + n 2 ). 4 Embedding Product Graphs The product of two graphs G = (V ; E ) and G 2 = (V 2 ; E 2 ), denoted as G G 2, is a graph G = (V; E) such that V = f(v ; v 2 ) : v 2 V ^ v 2 2 V 2 g and E = fh(v ; v 2 ); (v ; v )i : 2 (v = v ^ hv 2 ; v2i 2 E 2 ) _ (v 2 = v 2 ^ hv ; vi 2 E )g. The product of more than two graphs is similarly dened. For instance, an n-cube is the product of n graphs each of which consists of two nodes connected by an edge, and a torus is the product of a number of rings. Let H = H H 2 H k be the product of k graphs, where each H i is a level-d i R-tree and d + d d k = n. We study the problem of embedding H in an injured 2

13 X = Figure 4: n edge matrix representing the product of a length-8 linear path and a level-4 binomial tree. n-cube with faulty links. Without loss of generality, assume d d 2 d k. lso, let d = and d i = P i j= d j for i = ::k. Since H i is a level-d i R-tree, by denition it is isomorphic to a subgraph of the d i -cube which can be represented as a d i d i edge matrix, say, X i conforming to Eq. (). Using these X i ; i = ::k, the graph H = H H 2 H k can be embedded in an n-cube as G(X), where X is an n n edge matrix such that X = X ;2 : : : ;k 2; X 2 : : : 2;k ; (3) k; k;2 : : : X k where i;j is a d i d j matrix of 's. Figure 4 illustrates a 7 7 edge matrix X (with d = 3 and d 2 = 4), in which X[::3][::3] represents a length-8 linear path and X[4::7][4::7] does a level-4 binomial tree (see also Lemma 3). Let F be the edge matrix representing the set of faulty links. In the following, we describe a heuristic procedure that tries to nd a column-permutation function and a binary vector such that X $ (F ). If the procedure succeeds, then G(? (X )) is a fault-free embedding of graph H. Without loss of generality, let F = (F ; F 2 ; : : :; F r ) T be well-formed. Procedure Product Graph() Step : Partition the F ; F 2 ; : : :; F r into k groups, say ^F ; ^F2 ; : : :; ^Fk, such that for each i = ::k (i) ^F i contains a collection of F j 's in F and is represented as an edge matrix and (ii) if ^F i = (F i ; : : :; F is ) T, where each F it is an F j in the original F, then the inequality 3

14 P s t= dlog( + je(f i t )j)e d i? holds. We write such partition as a new matrix ^F = See Fig. 5 for an example of such partition. (Note that adjacent F j 's in F are not necessarily assigned to a same group. lso note that in some cases, for example, when r < k, some ^F i might be null.) The above condition (ii) will enable us to use the proof technique in Theorem. ^F ^F 2. ^F k : Step 2: Then, nd a column-permutation on ^F, i.e., ( ^F) = ( ^F ) ( ^F2 ). ( ^F k ) such that (i) each ( ^F i ) contains only edges along dimensions from d + to i? d i and (ii) ( ^F i )[?][d + i? ::d i ] is dimension-sorted. Step 3: For each i = ::k, applying procedure inary Vector() on X i and ( ^Fi )[?][d + i? ::d i ], we can obtain a length-d i binary vector i such that ; X i i $ ( ^F i )[?][d i? + ::d i ]: The above equation implies a disjoint relation in an n-cube: ( i; ; : : :; i;i? ; X i ; i;i+ ; : : :; i;k ) ( ; i ; ) $ ( ^Fi )[?][?] = ( ^Fi ) (4) where is any length-d binary vector, and i? any length-(n? d i ) binary vector. Note that the left-most matrix of the above equation is a submatrix of X, from row d + to i? row d i. s the binary vector ( ; 2 ; : : :; k ) is a candidate for ( ; i ; ) in Eq. (4), by substituting ( ; 2 ; : : :; k ) for ( ; i ; ) and putting together Eq. (4) for i = ::k, we obtain: (X ; ;2 ; : : :; ;k ) ( ; 2 ; : : :; k ) ( 2; ; X 2 ; : : :; 2;k ) ( ; 2 ; : : :; k ). ( k; ; k;2 ; : : :; X k ) ( ; 2 ; : : :; k ) = X ( ; 2 ; : : :; k ) $ ( ^F ) ( ^F 2 ). ( ^F k ) = ( ^F ): Since ^F is only a row-permutation of F, the aforementioned goal is achieved and we are done. 4

15 Example 2: Figure 5 shows how Product Graph() works for the edge matrix X of Fig. 4 and an F with 6 faulty links. In step, F is row-permuted into an ^F = ( ^F ; ^F 2 ) T satises conditions (i) and (ii) of step. In step 2, permutes ^F into ( ^F ) that satises conditions (i) and (ii) of step 2. In step 3, and 2 are computed using procedure inary Vector() with the elements highlighted in X and ( ^F ). Note that now the relation X ( ; 2 ) $ ( ^F) holds. 2 In the above approach, steps 2 and 3 are fairly easy to achieve (and always achievable). Unfortunately, step is not always doable, and to determine whether the F matrix can be so partitioned is an NP-hard problem (when k = 2 and d = d 2, the problem becomes the well-known, NP-complete PRTITION Problem [6]). One may readily observe that n? k is a worst-case upper bound on the number of faulty links that any algorithm can tolerate, since G(X) is a graph of degree greater than or equal to k. One may also observe that when there are no more than d k? faulty links in the n-cube, step can be easily done by letting ^F k = F (so all other ^F i ; i = ::k?, are null). In the following, we present a heuristic algorithm for step that provides a degree of fault tolerance much higher than d k?, in some cases near n? k. Procedure k-partition() / heuristic for step of Product Graph() / a) Sort F = (F ; : : :; F r ) T into F = (F ; : : :; F r) T, where each Fi je(fi )j je(f j )j i i j. b) r := r; c) for i := k downto do that is some F j, such that i) Let ^Fi := (F r ; F r + ; : : :; F r )T, where r is the minimum possible value such that P r j=r dlog( + je(f j )j)e d i?. ii) r := r? ; d) if r then \ontinue Steps 2 and 3"; / The algorithm works. / else \bort the algorithm"; / The algorithm fails. / The above heuristic sorts the F i 's of F in ascending order according to the number of faulty links in F i (step a) and computes ^F i from i = k down to in a greedy manner (step c). It is not hard to see that if all F ; : : :; F r are successfully assigned to ^F ; : : :; ^Fk, then k-partition() (and thus Product Graph()) succeeds. The following theorem derives the degree of fault tolerance guaranteed by the above algorithm. 5

16 step : F = ==) ^F = ^F 9 >= >; ^F 2 step 2: ^F ==) ( ^F ) =, where = 8 >< >: 2! 7 3! 4 4! 5 5! ! 6 step 3: X = ==) = (; ; ) 2 = (; ; ; ) Note: the underlined bits are randomly chosen. Figure 5: The application of procedure Product Graph() to the X in Fig. 4, assuming an F with 6 faulty links. 6

17 Theorem 2 Let H = H H k be a product graph, with each H i being a R-tree of level d i, where d + + d k = n and d d k. If an n-cube has no more than f k faulty links, then Product Graph() can embed H into the cube without using any faulty link, where f k is recursively dened as f i = ( d? if i = maxfd i? ; minf2 d i?? ; f i? + d i? dlog d i egg if i = 2::k. Proof. It suces to show that procedure k-partition() will successfully assign F ; : : :; F r to ^F ; : : :; ^Fk, provided that je(f )j f k. The proof is by induction on k. INDUTION SE: When k =, f = n? and d = n. y Lemma 5, procedure k-partition() will assign all F ; : : :; F r to ^F. So the induction base is established. INDUTION STEP: When k >, assuming that the above claim is true for k?, we prove it for k. This is done by considering E( ^F k ) and E(F )? E( ^F k ) in two dierent cases: ase : If d k? minf2 d k??; f k? +d k?dlog d k eg, then by denition f k = d k?. s je(f )j f k = d k?, by Lemma 5 again, procedure k-partition() will assign all F ; : : :; F r to ^Fk. So we are done. ase 2: Otherwise, f k = minf2 d k??; f k? +d k?dlog d k eg. onsider three possibilities regarding F r (which is the largest matrix among F ; : : :; F r ): a) If je(f r)j 2 d k?, then je(f )j 2 d k?, which contradicts with je(f )j f k 2 d k?? (the last inequality follows from the denition of f k ). So this case is impossible. b) If 2 d k?? je(f r)j d k?, then F r will be assigned to ^Fk. Since d k 6= (otherwise je(f r)j = ), je(f )? E( ^Fk )j f k? (d k? ) f k? (d k? dlog d k e) f k? ; (6) where the last inequality is obtained from the denition of f k. y the induction hypothesis, procedure k-partition() will successfully assign E(F )?E( ^Fk ) to ^F ; : : :; ^Fk? because je(f )? E( ^F k )j f k?. c) If d k? > je(f r)j, then let ^F k = (F r ; F r + ; : : :; F r) T with r being as small as possible. There are two cases for the value of r : i) If r =, then all F ; : : :; F r are consumed and we are done. ii) If r >, we will show that E( ^F k ) contains at least d k? dlog d k e elements. If so, a reasoning similar to Eq. (6) will show je(f )? E( ^F k )j f k?, and the proof 7 (5)

18 will follow directly from the induction hypothesis. That je( ^F k )j d k? dlog d k e can be established as follows: / as r is set to the minimum possible / rx i=r? rx dlog( + je(f i)j)e d k =) dlog( + je(fi)j)e d k? dlog( + je(f r? )j)e i=r =) / by assumption, d k? > je(fr )j je(f r )j, which implies? rx dlog d k e dlog( + je(f r?)j)e / i=r dlog( + je(f i )j)e d k? dlog d k e =) / as je(f i je( ^Fk )j = )j dlog( + je(fi )j)e for any i / rx i=r je(f i)j d k? dlog d k e Embedding equilateral product graphs such as square meshes is of particular importance in applications. When all H i 's in H = H H 2 H k are R-trees of the same level, the f k in Theorem 2 can be expressed in a simpler form, and its value gets closer to the worst-case bound n? k, as shown in the following corollary. orollary 4 Let H = H H k be a product graph, with each H i being a R-tree of level d and kd = n. If there are no more than f k faulty links in the n-cube, then H can be embedded in the cube without using any faulty link, where f k = minf2 d?? ; n? (k? )dlog de? g = minf(2 d ); n? (k log d)g: Proof. This can be proved by rst substituting each d i in Eq. (5) with d and then showing inductively that f i = minf2 d?? ; (i? )(d? dlog de) + d? g for i = ::k. 2 torus is a product of a number of rings. If H = H H k, where each H i is a ring of length 2 d i, then H can be embedded in a fault-free n-cube using the edge matrix X in Eq. (3) by substituting each X i in Eq. (3) with one conforming to Eq. (2) (i.e., G(X i ) is a Hamiltonian cycle in a d i -cube). Due to the resemblance between the matrix representing a R-tree and that representing a ring, the above results concerning the numbers of tolerable faults for embedding a product of R-trees can be easily modied 8 2

19 to ones for tori. In particular, we have the following theorem, which is rephrased from Theorem 2 by substituting each d i with d i?. Theorem 3 onsider a 2 d 2 d 2 2 d k torus such that P k i= d i = n and d d 2 d k. There exists an fault-free embedding of such a torus in an n-cube as long as there are no more than f k faulty links in the cube, where f k f i = ( is recursively dened as d? 2 if i =. maxfd i? 2; minf2 d i?2? ; f + i? d i?? dlog(d i? )egg if i = 2::k. Proof. (sketched) This theorem can be obtained by re-deriving Theorem 2 with the following minor modications: () substitute each occurrence of d i with d i? and (2) whenever the derivation uses Lemma 5, prove it using the technique applied in orollary 3. 2 (7) 5 onclusion We have reported new results on the embedding a wide range of graphs rings, Rtrees, complete binary trees, and products of these graphs in injured hypercubes that contain faulty links. Through these results, we also have demonstrated how the new data structure, edge matrix, can facilitate the otherwise dicult embedding job, especially when the hypercube contains only faulty links. We are currently investigating the possibility of applying our matrix technique to the case where nodes may also fail. References [] F. erman and L. Snyder. On mapping parallel algorithms into parallel architectures. J. of Parallel and Distrib. omput., 4:439{458, 987. [2] S. okhari. On the mapping problem. IEEE Trans. on omput., -3:27{24, 98. [3] M. Y. han and S.-J. Lee. Distributed fault-tolerant embeddings of rings in hypercubes. J. of Parallel and Distrib. omput., :63{7, 99. [4] M. Y. han and S.-J. Lee. Fault-tolerant embeddings of complete binary trees in hypercubes. IEEE Trans. on omput., 4(3):277{288, March 993. [5] G. ybenko, D. W. Krumme, and K. N. Venkataraman. Fixed hypercube embedding. Info. Process. Letts., 25:35{39, pril

20 [6] M. R. Garey and D. S. Johnson. omputers and Intractability: Guide to the Theory of NP-ompleteness. Freeman, 979. [7] S. L. Johnsson and. T. Ho. Optimal broadcasting and personalized communication in hypercubes. IEEE Trans. on omput., 38(9):249{68, Sep [8] Y. M. Kim and T.-H. Lai. The complexity of congestion- embedding in a hypercube. J. of lgorithm 2, pages 246{28, 99. [9] T.-H. Lai and W. White. Mapping pyramid algorithms into hypercubes. J. of Parallel and Distrib. omput., 9():42{54, 99. [] S. Lati, S. Zheng, and N. agherzadeh. Optimal ring embedding in hypercubes with faulty links. In Fault-Tolerant omputing Symp., pages 78{84, 992. [] V. M. Lo et al. Mapping divide-and-conquer algorithm to parallel architectures. In Int'l onf. on Parallel Processing, pages III.28{35, 99. [2] Y. Saad and M. H. Schultz. Topological properties of hypercubes. IEEE Trans. on omput., 37(7):867{872, July 988. [3]. Sen,. Sengupta, and S. andyopadhyay. On some topological properties of hypercube, incomplete hypercube and supercube. In Int'l Parallel Processing Symp., pages 636{642, 993. [4] Y.-. Tseng and T.-H. Lai. Ring embedding in an injured hypercube. In Int'l onf. on Parallel Processing, pages III{49{52, 993. [5] Y.-. Tseng, T.-H. Lai, and L.-F. Wu. Matrix representation of graph embedding in a hypercube. J. of Parallel and Distrib. omput., To appear. [6] R. Varadarajan. Embedding shue networks in hypercubes. J. of Parallel and Distrib. omput., :252{256, 99. [7]. Wang and R. ypher. Fault-tolerant embeddings of rings, meshes, and tori in hypercubes. In IEEE Symp. on Parallel and Distributed Processing, pages 2{29, 992. [8]. Wang, R. ypher, and E. Mayr. Embedding complete binary trees in faulty hypercubes. In IEEE Symp. on Parallel and Distributed Processing, pages 2{9, 99. 2

21 [9]. Wanger and D. orneil. Embedding trees in the hypercube is NP-complete. SIM J. of omput., 9(4):57{59, 99. [2]. S. Wanger. Embedding arbitrary binary trees in a hypercube. J. of Parallel and Distrib. omput., 7:53{52, 989. [2]. Y. Wu. Embedding of tree networks in hypercubes. J. of Parallel and Distrib. omput., 2:238{249, 985. [22] P.-J. Yang, S.-. Tien, and. S. Raghavendra. Embedding of multidimensional meshes on to faulty hypercubes. In Int'l onf. on Parallel Processing, pages I{57{574, 99. 2

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes

On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes American Journal of Applied Sciences 5(11): 1605-1610, 2008 ISSN 1546-9239 2008 Science Publications On Embeddings of Hamiltonian Paths and Cycles in Extended Fibonacci Cubes 1 Ioana Zelina, 2 Grigor Moldovan

More information

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis

More information

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes

PARALLEL computing is important for speeding up. Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Embedding Two Edge-Disjoint Hamiltonian Cycles and Two Equal Node-Disjoint Cycles into Twisted Cubes Ruo-Wei Hung, Shang-Ju Chan, and Chien-Chih Liao Abstract The presence of edge-disjoint Hamiltonian

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Chapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9],

Chapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9], Chapter 1 Comparison-Sorting and Selecting in Totally Monotone Matrices Noga Alon Yossi Azar y Abstract An mn matrix A is called totally monotone if for all i 1 < i 2 and j 1 < j 2, A[i 1; j 1] > A[i 1;

More information

k-degenerate Graphs Allan Bickle Date Western Michigan University

k-degenerate Graphs Allan Bickle Date Western Michigan University k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value

More information

Lecture 14 - P v.s. NP 1

Lecture 14 - P v.s. NP 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation

More information

Algebraic Properties and Panconnectivity of Folded Hypercubes

Algebraic Properties and Panconnectivity of Folded Hypercubes Algebraic Properties and Panconnectivity of Folded Hypercubes Meijie Ma a Jun-Ming Xu b a School of Mathematics and System Science, Shandong University Jinan, 50100, China b Department of Mathematics,

More information

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES SANTOSH N. KABADI AND ABRAHAM P. PUNNEN Abstract. Polynomially testable characterization of cost matrices associated

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recurrence Definitions Recursive Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D). 1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

PARALLEL computing is important for speeding up

PARALLEL computing is important for speeding up Two Edge-Disjoint Hamiltonian Cycles and Two-Equal Path Partition in Augmented Cubes Ruo-Wei Hung and Chien-Chih Liao Abstract The n-dimensional hypercube networ Q n is one of the most popular interconnection

More information

Lecture 15 - NP Completeness 1

Lecture 15 - NP Completeness 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 29, 2018 Lecture 15 - NP Completeness 1 In the last lecture we discussed how to provide

More information

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES

EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES EMBEDDED PATHS AND CYCLES IN FAULTY HYPERCUBES NELSON CASTAÑEDA AND IVAN S. GOTCHEV Abstract. An important task in the theory of hypercubes is to establish the maximum integer f n such that for every set

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

IBM Almaden Research Center, 650 Harry Road, School of Mathematical Sciences, Tel Aviv University, TelAviv, Israel

IBM Almaden Research Center, 650 Harry Road, School of Mathematical Sciences, Tel Aviv University, TelAviv, Israel On the Complexity of Some Geometric Problems in Unbounded Dimension NIMROD MEGIDDO IBM Almaden Research Center, 650 Harry Road, San Jose, California 95120-6099, and School of Mathematical Sciences, Tel

More information

Embed Longest Rings onto Star Graphs with Vertex Faults

Embed Longest Rings onto Star Graphs with Vertex Faults Embed Longest Rings onto Star Graphs with Vertex Faults Sun-Yuan Hsieh, Gen-Huey Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan, ROC and Chin-Wen

More information

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS

DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS DISTINGUISHING PARTITIONS AND ASYMMETRIC UNIFORM HYPERGRAPHS M. N. ELLINGHAM AND JUSTIN Z. SCHROEDER In memory of Mike Albertson. Abstract. A distinguishing partition for an action of a group Γ on a set

More information

Abstract. We show that a proper coloring of the diagram of an interval order I may require 1 +

Abstract. We show that a proper coloring of the diagram of an interval order I may require 1 + Colorings of Diagrams of Interval Orders and -Sequences of Sets STEFAN FELSNER 1 and WILLIAM T. TROTTER 1 Fachbereich Mathemati, TU-Berlin, Strae des 17. Juni 135, 1000 Berlin 1, Germany, partially supported

More information

Hyper-Panconnectedness of the Locally Twisted Cube

Hyper-Panconnectedness of the Locally Twisted Cube Hyper-Panconnectedness of the Locally Twisted Cube Tzu-Liang Kung Department of Computer Science and Information Engineering Asia University, Wufeng, Taichung tlkung@asia.edu.tw Lih-Hsing Hsu and Jia-Jhe

More information

On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph

On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph 1 On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph Bei Liu, Wei Wang, Donghyun Kim, Senior Member, IEEE, Deying Li, Jingyi Wang, Alade O. Tokuta, Member, IEEE, Yaolin Jiang

More information

1. Introduction In this paper, we study the concept of graph spanners that arises in several recent works on theoretical analysis of computer networks

1. Introduction In this paper, we study the concept of graph spanners that arises in several recent works on theoretical analysis of computer networks GRAPH SPANNERS x (Revised version, July 88) David Peleg Alejandro A. Schaer Computer Science Department Stanford University, Stanford, CA 94305 Abstract Given a graph G = (V; E), a subgraph G 0 = (V; E

More information

arxiv: v1 [math.co] 27 Apr 2016

arxiv: v1 [math.co] 27 Apr 2016 arxiv:1604.07895v1 [math.co] 27 Apr 2016 Fault-tolerance of balanced hypercubes with faulty vertices and faulty edges Mei-Mei Gu Department of Mathematics, Beijing Jiaotong University, Beijing 100044,

More information

Laplacian Integral Graphs with Maximum Degree 3

Laplacian Integral Graphs with Maximum Degree 3 Laplacian Integral Graphs with Maximum Degree Steve Kirkland Department of Mathematics and Statistics University of Regina Regina, Saskatchewan, Canada S4S 0A kirkland@math.uregina.ca Submitted: Nov 5,

More information

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

MINIMUM DIAMETER COVERING PROBLEMS. May 20, 1997

MINIMUM DIAMETER COVERING PROBLEMS. May 20, 1997 MINIMUM DIAMETER COVERING PROBLEMS Esther M. Arkin y and Refael Hassin z May 20, 1997 Abstract A set V and a collection of (possibly non-disjoint) subsets are given. Also given is a real matrix describing

More information

On Detecting Multiple Faults in Baseline Interconnection Networks

On Detecting Multiple Faults in Baseline Interconnection Networks On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,

More information

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space

Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) 1.1 The Formal Denition of a Vector Space Linear Algebra (part 1) : Vector Spaces (by Evan Dummit, 2017, v. 1.07) Contents 1 Vector Spaces 1 1.1 The Formal Denition of a Vector Space.................................. 1 1.2 Subspaces...................................................

More information

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ

Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Gray Codes for Torus and Edge Disjoint Hamiltonian Cycles Λ Myung M. Bae Scalable POWERparallel Systems, MS/P963, IBM Corp. Poughkeepsie, NY 6 myungbae@us.ibm.com Bella Bose Dept. of Computer Science Oregon

More information

Edge-pancyclicity of Möbius cubes

Edge-pancyclicity of Möbius cubes Information Processing Letters 96 (25) 136 14 www.elsevier.com/locate/ipl Edge-pancyclicity of Möbius cubes Min Xu a,b, Jun-Ming Xu b, a Institute of Applied Mathematics, Academy of Mathematics and Systems

More information

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko Approximation Algorithms for Maximum Coverage and Max Cut with Given Sizes of Parts? A. A. Ageev and M. I. Sviridenko Sobolev Institute of Mathematics pr. Koptyuga 4, 630090, Novosibirsk, Russia fageev,svirg@math.nsc.ru

More information

real and symmetric positive denite. The examples will only display the upper triangular part of matrices, with the understanding that the lower triang

real and symmetric positive denite. The examples will only display the upper triangular part of matrices, with the understanding that the lower triang NEESSRY ND SUFFIIENT SYMOLI ONDITION FOR THE EXISTENE OF INOMPLETE HOLESKY FTORIZTION XIOGE WNG ND RNDLL RMLEY DEPRTMENT OF OMPUTER SIENE INDIN UNIVERSITY - LOOMINGTON KYLE. GLLIVN DEPRTMENT OF ELETRIL

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

Disjoint Path Covers in Cubes of Connected Graphs

Disjoint Path Covers in Cubes of Connected Graphs Disjoint Path Covers in Cubes of Connected Graphs Jung-Heum Park a, Insung Ihm b, a School of Computer Science and Information Engineering The Catholic University of Korea, Bucheon, Korea b Department

More information

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

Abstract. This paper discusses polynomial-time reductions from Hamiltonian Circuit (HC),

Abstract. This paper discusses polynomial-time reductions from Hamiltonian Circuit (HC), SAT-Variable Complexity of Hard Combinatorial Problems Kazuo Iwama and Shuichi Miyazaki Department of Computer Science and Communication Engineering Kyushu University, Hakozaki, Higashi-ku, Fukuoka 812,

More information

ARTICLE IN PRESS Theoretical Computer Science ( )

ARTICLE IN PRESS Theoretical Computer Science ( ) Theoretical Computer Science ( ) Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Conditional matching preclusion for hypercube-like

More information

Bipanconnectivity of Cartesian product networks

Bipanconnectivity of Cartesian product networks AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 46 (2010), Pages 297 306 Bipanconnectivity of Cartesian product networks You Lu Jun-Ming Xu Department of Mathematics University of Science and Technology of

More information

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information

More information

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS

THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS THE MAXIMAL SUBGROUPS AND THE COMPLEXITY OF THE FLOW SEMIGROUP OF FINITE (DI)GRAPHS GÁBOR HORVÁTH, CHRYSTOPHER L. NEHANIV, AND KÁROLY PODOSKI Dedicated to John Rhodes on the occasion of his 80th birthday.

More information

Minimal enumerations of subsets of a nite set and the middle level problem

Minimal enumerations of subsets of a nite set and the middle level problem Discrete Applied Mathematics 114 (2001) 109 114 Minimal enumerations of subsets of a nite set and the middle level problem A.A. Evdokimov, A.L. Perezhogin 1 Sobolev Institute of Mathematics, Novosibirsk

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Nordhaus-Gaddum Theorems for k-decompositions

Nordhaus-Gaddum Theorems for k-decompositions Nordhaus-Gaddum Theorems for k-decompositions Western Michigan University October 12, 2011 A Motivating Problem Consider the following problem. An international round-robin sports tournament is held between

More information

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs

An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.075 An Embedding of Multiple Edge-Disjoint Hamiltonian Cycles on Enhanced Pyramid Graphs Jung-Hwan Chang*

More information

Erdös-Ko-Rado theorems for chordal and bipartite graphs

Erdös-Ko-Rado theorems for chordal and bipartite graphs Erdös-Ko-Rado theorems for chordal and bipartite graphs arxiv:0903.4203v2 [math.co] 15 Jul 2009 Glenn Hurlbert and Vikram Kamat School of Mathematical and Statistical Sciences Arizona State University,

More information

ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY. Nimrod Megiddoy

ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY. Nimrod Megiddoy ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY Nimrod Megiddoy Abstract. The generalized set packing problem (GSP ) is as follows. Given a family F of subsets of M = f mg

More information

Ringing the Changes II

Ringing the Changes II Ringing the Changes II Cayley Color Graphs Let G be a group and H a subset of G. We define a Cayley digraph (directed graph) by: Each element of G is a vertex of the digraph Γ and an arc is drawn from

More information

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars

Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Improving the Height of Independent Spanning Trees on Folded Hyper-Stars Sih-Syuan Luo 1 Jinn-Shyong Yang 2 Jou-Ming Chang 1, An-Hang Chen 1 1 Institute of Information and Decision Sciences, National Taipei

More information

2 Notation and Preliminaries

2 Notation and Preliminaries On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that

More information

Conquering Edge Faults in a Butterfly with Automorphisms

Conquering Edge Faults in a Butterfly with Automorphisms International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department

More information

Small Label Classes in 2-Distinguishing Labelings

Small Label Classes in 2-Distinguishing Labelings Also available at http://amc.imfm.si ISSN 1855-3966 (printed ed.), ISSN 1855-3974 (electronic ed.) ARS MATHEMATICA CONTEMPORANEA 1 (2008) 154 164 Small Label Classes in 2-Distinguishing Labelings Debra

More information

Packing and decomposition of graphs with trees

Packing and decomposition of graphs with trees Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

All Good (Bad) Words Consisting of 5 Blocks

All Good (Bad) Words Consisting of 5 Blocks Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series

More information

NP-Completeness. Andreas Klappenecker. [based on slides by Prof. Welch]

NP-Completeness. Andreas Klappenecker. [based on slides by Prof. Welch] NP-Completeness Andreas Klappenecker [based on slides by Prof. Welch] 1 Prelude: Informal Discussion (Incidentally, we will never get very formal in this course) 2 Polynomial Time Algorithms Most of the

More information

Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel

Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel Constructing Independent Spanning Trees on Locally Twisted Cubes in Parallel Yu-Huei Chang Jinn-Shyong Yang, Jou-Ming Chang Department of Information Management, National Taipei College of Business, Taipei,

More information

Tight Bounds on the Diameter of Gaussian Cubes

Tight Bounds on the Diameter of Gaussian Cubes Tight Bounds on the Diameter of Gaussian Cubes DING-MING KWAI AND BEHROOZ PARHAMI Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA 93106 9560, USA Email: parhami@ece.ucsb.edu

More information

1 I A Q E B A I E Q 1 A ; E Q A I A (2) A : (3) A : (4)

1 I A Q E B A I E Q 1 A ; E Q A I A (2) A : (3) A : (4) Latin Squares Denition and examples Denition. (Latin Square) An n n Latin square, or a latin square of order n, is a square array with n symbols arranged so that each symbol appears just once in each row

More information

1 Introduction Greedy approximation algorithms for various N P -hard problems were proposed in [Joh74, Lov75, Chv79]. A more general framework for usi

1 Introduction Greedy approximation algorithms for various N P -hard problems were proposed in [Joh74, Lov75, Chv79]. A more general framework for usi Generalized Submodular Cover Problems and Applications Judit Bar-Ilan Guy Kortsarz y David Peleg z October 28, 1998 Abstract The greedy approach has been successfully applied in the past to produce logarithmic

More information

arxiv: v1 [cs.gr] 25 Nov 2015

arxiv: v1 [cs.gr] 25 Nov 2015 EMBEDDING OF HYPERCUBE INTO CYLINDER WEIXING JI, QINGHUI LIU, GUIZHEN WANG, AND ZHUOJIA SHEN arxiv:1511.07932v1 [cs.gr] 25 Nov 2015 Abstract. Task mapping in modern high performance parallel computers

More information

An Improved Algorithm for Parameterized Edge Dominating Set Problem

An Improved Algorithm for Parameterized Edge Dominating Set Problem An Improved Algorithm for Parameterized Edge Dominating Set Problem Ken Iwaide and Hiroshi Nagamochi Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan,

More information

1 Basic Combinatorics

1 Basic Combinatorics 1 Basic Combinatorics 1.1 Sets and sequences Sets. A set is an unordered collection of distinct objects. The objects are called elements of the set. We use braces to denote a set, for example, the set

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Lecture 8 - Algebraic Methods for Matching 1

Lecture 8 - Algebraic Methods for Matching 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 1, 2018 Lecture 8 - Algebraic Methods for Matching 1 In the last lecture we showed that

More information

Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle

Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle Publ. Math. Debrecen Manuscript (November 16, 2005) Edge-counting vectors, Fibonacci cubes, and Fibonacci triangle By Sandi Klavžar and Iztok Peterin Abstract. Edge-counting vectors of subgraphs of Cartesian

More information

Laboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation,

Laboratoire Bordelais de Recherche en Informatique. Universite Bordeaux I, 351, cours de la Liberation, Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux I, 351, cours de la Liberation, 33405 Talence Cedex, France Research Report RR-1145-96 On Dilation of Interval Routing by Cyril Gavoille

More information

The Algorithmic Aspects of the Regularity Lemma

The Algorithmic Aspects of the Regularity Lemma The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

Rao s degree sequence conjecture

Rao s degree sequence conjecture Rao s degree sequence conjecture Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 July 31, 2009; revised December 10, 2013 1 Supported

More information

Math 443/543 Graph Theory Notes 5: Graphs as matrices, spectral graph theory, and PageRank

Math 443/543 Graph Theory Notes 5: Graphs as matrices, spectral graph theory, and PageRank Math 443/543 Graph Theory Notes 5: Graphs as matrices, spectral graph theory, and PageRank David Glickenstein November 3, 4 Representing graphs as matrices It will sometimes be useful to represent graphs

More information

arxiv: v2 [math.co] 7 Jan 2016

arxiv: v2 [math.co] 7 Jan 2016 Global Cycle Properties in Locally Isometric Graphs arxiv:1506.03310v2 [math.co] 7 Jan 2016 Adam Borchert, Skylar Nicol, Ortrud R. Oellermann Department of Mathematics and Statistics University of Winnipeg,

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph MATHEMATICAL ENGINEERING TECHNICAL REPORTS Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph Hisayuki HARA and Akimichi TAKEMURA METR 2006 41 July 2006 DEPARTMENT

More information

LEBESGUE INTEGRATION. Introduction

LEBESGUE INTEGRATION. Introduction LEBESGUE INTEGATION EYE SJAMAA Supplementary notes Math 414, Spring 25 Introduction The following heuristic argument is at the basis of the denition of the Lebesgue integral. This argument will be imprecise,

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Multi-coloring and Mycielski s construction

Multi-coloring and Mycielski s construction Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles

More information

PATH BUNDLES ON n-cubes

PATH BUNDLES ON n-cubes PATH BUNDLES ON n-cubes MATTHEW ELDER Abstract. A path bundle is a set of 2 a paths in an n-cube, denoted Q n, such that every path has the same length, the paths partition the vertices of Q n, the endpoints

More information

Matchings in hypergraphs of large minimum degree

Matchings in hypergraphs of large minimum degree Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains

More information

1 Matrix notation and preliminaries from spectral graph theory

1 Matrix notation and preliminaries from spectral graph theory Graph clustering (or community detection or graph partitioning) is one of the most studied problems in network analysis. One reason for this is that there are a variety of ways to define a cluster or community.

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

On Some Polytopes Contained in the 0,1 Hypercube that Have a Small Chvátal Rank

On Some Polytopes Contained in the 0,1 Hypercube that Have a Small Chvátal Rank On ome Polytopes Contained in the 0,1 Hypercube that Have a mall Chvátal Rank Gérard Cornuéjols Dabeen Lee April 2016, revised July 2017 Abstract In this paper, we consider polytopes P that are contained

More information

Optimal Fractal Coding is NP-Hard 1

Optimal Fractal Coding is NP-Hard 1 Optimal Fractal Coding is NP-Hard 1 (Extended Abstract) Matthias Ruhl, Hannes Hartenstein Institut für Informatik, Universität Freiburg Am Flughafen 17, 79110 Freiburg, Germany ruhl,hartenst@informatik.uni-freiburg.de

More information

Hamiltonicity of hypercubes with a constraint of required and faulty edges

Hamiltonicity of hypercubes with a constraint of required and faulty edges J Comb Optim (2007) 14: 197 204 DOI 10.1007/s10878-007-9059-3 Hamiltonicity of hypercubes with a constraint of required and faulty edges Lih-Hsing Hsu Shu-Chung Liu Yeong-Nan Yeh Published online: 31 March

More information

Paths and cycles in extended and decomposable digraphs

Paths and cycles in extended and decomposable digraphs Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended

More information

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces

Contents. 2.1 Vectors in R n. Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v. 2.50) 2 Vector Spaces Linear Algebra (part 2) : Vector Spaces (by Evan Dummit, 2017, v 250) Contents 2 Vector Spaces 1 21 Vectors in R n 1 22 The Formal Denition of a Vector Space 4 23 Subspaces 6 24 Linear Combinations and

More information

Acyclic Digraphs arising from Complete Intersections

Acyclic Digraphs arising from Complete Intersections Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine

More information

Approximation algorithms and hardness results for the clique packing problem. October, 2007

Approximation algorithms and hardness results for the clique packing problem. October, 2007 Approximation algorithms and hardness results for the clique packing problem F. Chataigner 1 G. Manić 2 Y.Wakabayashi 1 R. Yuster 3 1 Instituto de Matemática e Estatística Universidade de São Paulo, SP,

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Restricted b-matchings in degree-bounded graphs

Restricted b-matchings in degree-bounded graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

2 Introduction to Network Theory

2 Introduction to Network Theory Introduction to Network Theory In this section we will introduce some popular families of networks and will investigate how well they allow to support routing.. Basic network topologies The most basic

More information

Chapter 3: Proving NP-completeness Results

Chapter 3: Proving NP-completeness Results Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises 1.1 Six Basic NP-Complete Problems 3-SATISFIABILITY (3SAT)

More information

Data Mining and Matrices

Data Mining and Matrices Data Mining and Matrices 08 Boolean Matrix Factorization Rainer Gemulla, Pauli Miettinen June 13, 2013 Outline 1 Warm-Up 2 What is BMF 3 BMF vs. other three-letter abbreviations 4 Binary matrices, tiles,

More information

Constructing c-ary Perfect Factors

Constructing c-ary Perfect Factors Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:

More information