Proof Assistants for Graph Non-isomorphism
|
|
- Amos Hawkins
- 6 years ago
- Views:
Transcription
1 Proof Assistants for Graph Non-isomorphism Arjeh M. Cohen 8 January 2007 second lecture of Three aspects of exact computation a tutorial at Mathematics: Algorithms and Proofs (MAP) Leiden, January 8 12, /75
2 Outline 1. Introduction 2. Permutation groups 3. Complexity 4. Graph isomorphism algorithms 5. Proof assistant demo Based on work with Scott Murray and Jan Willem Knopper 2/75
3 1. Introduction Usually algorithms give answers without proofs. To what extent can we expect answers with proofs? Such answers could certify correctness serve as a first step towards formal proofs 3/75
4 Focus on graph non-isomorphism Motivated by universality of graph isomorphism use of group theory 4/75
5 Graph A graph G consists of a finite set of vertices V = V (G) and a set of edges E = E(G) whose elements are subsets of V of size two. Here V = {1, 2, 3, 4} and E = {{1, 2}, {1, 4}, {2, 3}, {3, 4}}. 5/75
6 Isomorphism Let G 0 and G 1 be graphs. An isomorphism σ : G 0 G 1 is a bijective map V (G 0 ) V (G 1 ) preserving edges. 6/75
7 Automorphism An automorphism is an isomorphism from a graph to itself. 7/75
8 Isomorphism automorphism Let G and G be two connected graphs. Take v V (G) and v V (G ). There is an isomorphism G G mapping v to v iff there is an automorphism of order 2 on G v v G interchanging v and v. G G v v 8/75
9 Graph isomorphism G 0 and G 1 are graphs. If G 0 = G1 then the specification of an isomorphism G 0 G 1 suffices for the isomorphism proof. If G 0 = G1 then often a simple invariant will work, but not always. 9/75
10 Two graphs that are not isomorphic The first graph has 4 edges, while the second graph has 5 edges. 10/75
11 Invariants Invariants can tell why two graphs are non-isomorphic. Examples: number of vertices (of given degree) number of edges (and distance multiplicities) eigenvalues and Smith normal form of the adjacency matrix Do not separate all isomorphism classes. 11/75
12 Invariants that always work Lexicographically least adjacency matrix McKay s canonical labelling Hard to compute in general. Non-isomorphism proof strategy: build up from cheaper invariants towards McKay s canonical labelling 12/75
13 2. Permutation groups G is a permutation group. G = A, where A = {a 1, a 2,..., a k } consists of permutations of the points {1, 2,..., n}. A word in A is an expression of the form a e 1 i 1 a e 2 i 2 a e m im where the indices i j are in the range 1,..., k and the exponents e j are integers. 13/75
14 Example The Mathieu group on 11 points, M 11, has generating set A = {a 1, a 2 }, where a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). 14/75
15 Group membership proving by use of GAP Query input A permutation g. A list A of permutations The fact g A. GAP input G := Group(A); IsIn_Proof(g,G); GAP output A word in A that is equal to g. Query output As G = A, the group G consists of those elements that can be expressed as a word in A. In particular g = IsIn_Proof(g, G), and so belongs to G. 15/75
16 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,3,8,2,11,10)(4,9)(5,7,6) Query: prove that g is in G. Answer: The element g can be written as follows as a word in the generators of G: g = a1*a2^3*a1*a2, and so belongs to G. QED 16/75
17 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,2)(3,4)(5,6,7,8) Query: prove that g is in G. Answer: Oops, the element does not belong to the group 17/75
18 Example a1 = (1,10)(2,8)(3,11)(5,7); a2 = (1,4,7,6)(2,11,10,9) G = Group([a1,a2]) g = (1,2)(3,4)(5,6,7,8) Query: prove that g is in G. Answer: Oops, the element does not belong to the group How is that proved? 18/75
19 Subgroup Suppose that H = B. How to prove that H is a subgroup of G? H is a subgroup of G iff each element of B is contained in G. 19/75
20 Orbit The orbit of x under G is xg = {xg : g G}. If G = a 1, a 2,..., a k and X is an orbit of G, then on vertex set X has labeled edges y the orbit graph i z where ya i = z. 20/75
21 # 12 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). Interrupted lines are labeled by 1 and solid lines by /75
22 Orbit proving by use of GAP Query Input A list A of permutations generating G. A point x. GAP input G := Group(A); Orbit_Proof(G,x); GAP output A set of points X and a list B of words in A indexed by X. The set X is just the orbit xg. The word in B corresponding to y X maps x to y. 22/75
23 Stabilizers The stabilizer subgroup in G of x is G x = {g G : xg = x}. 23/75
24 Stabilizers The stabilizer subgroup in G of x is G x = {g G : xg = x}. A generating set for G x? 24/75
25 Orbit Lemma If y xg, then {g G : xg = y} is a coset of G x. In particular, xg = G / G x. A one-to-one correspondence between the orbit and the cosets. 25/75
26 Schreier tree For every y xg, choose t(y) G with the property that xt(y) = y. By the Orbit Lemma the t(y) form coset reps for G x in G. Efficient construction: the Schreier tree rooted at x: a subgraph T of the orbit graph that is a tree with root x (when we view the edges as being undirected). For every y X, there is a unique minimal path in T from x to y. Then t(y) is the product of the labels of this path. 26/75
27 12 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9). A Schreier tree T rooted at 1 is shown /75
28 12 Example For M 11, the values of t written as words in a 1, a 2 are as follows. y t(y) 1 a 1 a 2 2 a 1 a 3 2a 1 a 2 a 2 2a 1 a 3 2 a 2 2 a 1 a 2 2a 1 a 1 a 2 a 1 a 1 a /75
29 The Schreier tree leads to coset reps U for G x in G and a transversal t : G U sending an element g of G to the representative of G x g and satisfying xt(g) = xg and t(g) = t(hg) whenever h G x. 29/75
30 Implementation We store this tree in a linearized form, using Backpointer ω : X X {0} ω(z) = { y if y is adjacent to z and on the minimal path from z to x 0 if z = x Schreier vector v : X { m,..., 1, 0, 1,..., m} i i if y = ω(z) and y z is in T v(z) = i i if y = ω(z) and y z is in T 0 if z = x 30/75
31 Construction of the transversal t For g G, there is a minimal path x = x 0, x 1,..., x m = xg in the Schreier tree T from x to xg. Write b j = a v(xj ) if v(x j ) > 0 and b j = a 1 v(x j ) if v(x j ) < 0. Then t(g) = b 1 b m. 31/75
32 12 Example a 1 = (1, 10)(2, 8)(3, 11)(5, 7) and a 2 = (1, 4, 7, 6)(2, 11, 10, 9). The linearized version of the Schreier tree rooted at 1, is v ω /75
33 12 a 1 = (1, 10)(2, 8)(3, 11)(5, 7) and a 2 = (1, 4, 7, 6)(2, 11, 10, 9) Choosing the root to be 5, we find v ω /75
34 Schreier data proving Query Input A list A = [a 1,..., a k ] of permutations generating G. A point x. GAP input G := Group(A); SchreierData(G,x); GAP output A triple [X, v, ω] of integer sequences consisting of the orbit, the Schreier vector, and the backpointer. 34/75
35 Stabilizer generators Use the coset reps to compute a generating set of G x. Schreier s lemma Suppose G = A, and H G. If U is a set of coset representatives for H in G, and the function t : G U maps an element g of G to the representative of Hg, then a generating set for H is given by { ua t(ua) 1 : u U, a A }. Interpretation: loops in the graph created by the edges left out to create T from G 35/75
36 Stabilizer subgroup identification by use of GAP Query Input G = A and a point x. GAP input G := Group(A); H := Stabilizer(G,x); IsStabiliser_Proof(G,x,H); GAP output A proof that H is a subgroup of G. Schreier data for G wrt x A sequence of quadruples (y, i, g, h) consisting of y X, an index i, the Schreier generator t(y)a i t(t(y)a i ) 1 written as a word g in A, and as a word h in the generators of H. 36/75
37 Base A base for G is a finite sequence B = [x 1,..., x k ] of distinct points in {1, 2,..., n} such that G x1,x 2,...,x k = 1. Hence, the only element of G which fixes all of the points x 1, x 2,..., x k is the identity. Write G (i) = G x1,x 2,...,x i. Then we have a chain of stabilizers G = G (0) G (1) G (k 1) G (k) = 1. We often require the additional property G (i) G (i+1). A base is easy to construct. 37/75
38 Example M 11 = a 1 = (1, 10)(2, 8)(3, 11)(5, 7), a 2 = (1, 4, 7, 6)(2, 11, 10, 9) has a base [1, 2, 3, 4]. The Schreier trees and backpointers for the stabilizer chain are given in the following table v ω v ω v ω v ω /75
39 Base proving by use of GAP Query Input G = A. GAP input G := Group(A); B := BaseOfGroup(G); IsBase_Proof(G,B); GAP output A base B = [x 1,..., x k ] and sets A i with A i 1 xi = A i Query output From IsBase_Proof(G,B) we read off, for each i, a sequence A i of permutations; a proof that A i is the stabilizer of x i in A i 1 ; the determination of the A i 1 -orbit of x i. Check A k = 1. Now B is a base with stabilizer chain { A i }. 39/75
40 Nonmembership Given a base B = [x 1,..., x k ] of G, take G (i) = G x1,...,x i 1 and t(g (i) ) Schreier elements for G (i) rooted at x i 1. Sifting: if g G, then g = u k u k 1 u 1 u 0 where each u i t(g (i) ) is uniquely determined by g. If g G, then sifting fails because at some stage x i h i 1 x i G (i 1), and so h i 1 G (i 1). This gives a proof of nonmembership. 40/75
41 Base proving by use of GAP Query Input g G = A. GAP input G := Group(A); IsNotIn_Proof(g,G) GAP output A base [x 1,..., x k ] and generators for G (i) = G x1,...,x i, the Schreier trees for G (i 1) rooted at x i, and sets A i with G (i) = A i. A sequence of permutations [h 0, h 1,..., h j 1 ] (where j k) such that h i G (i) and x i h i 1 h 1 h 0 = x i g for i = 1,..., j 1 and x j h j 1 h 1 h 0 x j G (j 1). 41/75
42 Order lemma If B = [x 1,..., x k ] is a base for G, then G = k i=1 x ig (i 1). 42/75
43 Example The Mathieu group M 11 on 11 points has order 1 M 11 2 M (1) 11 3 M (2) 11 4 M (3) 11 = = /75
44 Order proving by use of GAP Query Input A list A of permutations generating G. GAP input G := Group(A); Order_Proof(G); GAP output A base [x 1,..., x k ], the corresponding stabilizer chain G (i), and the orbit sizes x i G (i 1). Query output The base and stabilizer chain proof are as before. By the Order Lemma, G is the product of the orbit sizes x i G (i 1). 44/75
45 Permutation groups, conclusion All basic permutation group operations membership orbit Schreier transversal stabilizer base non-membership order are in NP and can be supplied with efficient proofs. 45/75
46 3. Complexity graph non-isomorphism is neither known nor believed to be in NP quantum complexity of graph isomorphism is unknown 46/75
47 Complexity, positive graph isomorphism has time complexity O(exp(n 1/2+o(1) )) Babai and Luks, 1983, compare with n! = O(exp(n log n)) graph non-isomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses Klivans and Van Melkebeek, 2002 subexponential: O(exp(n ɛ )) for every ɛ > 0 there is a zero-knowledge proof of graph non-isomorphism 47/75
48 Arthur-Merlin proof A simplication of the zero-knowledge proof. Arthur is verifier, Merlin is prover. Given two graphs G 0 and G 1 on n vertices. Iterate the following procedure Arthur chooses a random bit α Arthur chooses a random permutation σ of {1,..., n} Arthur constructs H = σ(g α ) Arthur sends H to Merlin Merlin provides β such that H = G β Merlin sends β to Arthur Arthur checks α = β and keeps score 48/75
49 Complexity theorem IP = Interactive Proof using a probabilistic interactive protocol, with unbounded Merlin and polynomial time Arthur Theorem (Shamir 1992) IP = PSPACE. 49/75
50 Graph isomorphism algorithms Merlin s methods 1. Integer programming 2. Weisfeiler-Leman methods 3. bounded degree: polynomial time [Babai, Luks] 4. fast implementation: nauty [McKay] 50/75
51 3.1. Integer programming (Derksen) A G adjacency matrix of G G 0 = G1 iff there exists X O n ({0, 1}) with XA G0 = A G1 X Gives relations on entries of X of degree at most 2 Use Gröbner bases methods to solve for X Efficiency? 51/75
52 3.2. Weisfeiler-Leman methods Label vertices with their degrees Iterate: label vertices with multiset of the labels of their neighbors Between iterations: replace the labels by their order numbers in the lex order of all occurring labels (will be called a partition) Terminate when no new distinctions occur This labels at least 1 c n log(n)/ log log(n) of all graphs on n vertices. Fails on regular graphs. 52/75
53 Higher-dimensional Weisfeiler-Leman method dimension 2: Replace vertices by pairs First label pair by presence of an edge (or equality) between its vertices (isomorphism type) Iterate by computing for pair p the n element multiset of pairs of colors p {v} \ {u} for u p and v arbitrary. Terminate when no new distinctions occur Similarly for higher dimensions. 53/75
54 Higher-dimensional Weisfeiler-Leman method implemented in STABCOL by Babel, Baumann, Lüdecke, Tinhofer at TU München implemented in STABIL by Babel, Chuvaeva, Klin, Pasechnik (1997) 1-dimensional version used in nauty [McKay] 54/75
55 3.3. Luks algorithm Fix G and G. For v, v Luks checks for an isomorphism σ with v = σ(v ). If for all v no such σ exists, then there are no isomorphisms. G G v v 55/75
56 Luks algorithm, cont d The algorithm constructs the automorphism group inductively. In the induction step, families are used: A family of type (2, 0) (left) and one of type (2, 3) (right). 56/75
57 Luks algorithm, cont d The algorithm by Luks inductively constructs the automorphisms. Initialization: A 0 = {(v, v )} Induction step: consider the vertices at distance i and i + 1 of {v, v }. restrict A i to the interior and the vertices at distance i look at the connections to the vertices at distance i + 1 group the edges in families and by their family s type calculate the automorphisms on the boundary that stabilize the sets of families extend automorphisms on the boundary to the graph so far add interior and boundary automorphisms 57/75
58 Luks example A 0 = (1, 5) A 1 = (1, 5)(2, 6)(4, 8), (2, 4), (6, 8) The reduction of A 1 to the boundary is (2, 6)(4, 8), (2, 4), (6, 8). The families are ({2, 4}, {3}), ({6, 8}, {7}) and ({6, 8}, ). A 2 = (2, 4), (6, 8) 58/75
59 Luks algorithm, conclusion The algorithm by Luks is implemented in PAGN with proof production. The permutation group routines discussed above are used. 59/75
60 3.4. Nauty by McKay fast canonical label or automorphism works with building a tree of labelings restricts the computation by Weisfeiler-Leman kind of labeling backtracks using automorphisms 60/75
61 Nauty: partitions A partition is an ordered vertex labeling The partition is here [ ], with WHITE<BLACK. 61/75
62 Nauty: partitions A partition every vertex of which has its own label is called complete. A pair of two complete partitions gives a map on the vertices (smallest label to smallest label, etc.) Check for each complete partition in the tree whether the map to the first complete partition gives an automorphism. Refine partition by Weisfeiler-Leman. 62/75
63 McKay example The graph with starting partition [ ]. 63/75
64 McKay example, The partition [ ] is refined to [ ]. 64/75
65 McKay example, The partition [ ] is refined to [ ]. 65/75
66 McKay example, The partition [ ] is refined to [ ]. 66/75
67 McKay example, The partition [ ] is refined to [ ]. Separation of 1 and 5 suffices for non-isomorphism part /75
68 McKay example, Now case distinction is used: from [ ] we get both [ ] and [ ]. 68/75
69 McKay example, 7a Continuing with the case [ ] gives: Now case distinction is used: from [ ] we get both [ ] and [ ]. Comparing with the first complete partition [ ] gives the maps () and (6, 8) (an automorphism). 69/75
70 McKay example, 7b Continuing with the case [ ] gives: Since we know the automorphism (6, 8) we can choose here: a choice from [ ] is [ ]. Comparing with the first complete partition [ ] gives the map (2, 4) (automorphism). 70/75
71 McKay example, 8 [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] [ ] 71/75
72 3.5. Nauty by McKay conclusion Automated proofs: Spot where automorphisms interchanging G 0 and G 1 fail to exist. 72/75
73 4. Proof Assistant for Graph Non-isomorphism 73/75
74 5. Conclusion Merlin s proof construction more or less understood Merlin s automated presentation needs work Gröbner bases methods to be investigated 74/75
75 Coming Friday Rewriting rules for algebras related to Knot theory 75/75
An automated proof theory approach to computation with permutation groups
An automated proof theory approach to computation with permutation groups Arjeh M. Cohen Department of Mathematics Eindhoven University of Technology Netherlands Scott H. Murray School of Mathematics and
More informationComplexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 2 Lecture 15 Public Coins and Graph (Non)Isomorphism 3 Intro Goal and Plan Goal understand
More informationSherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis
Sherali-Adams Relaxations of Graph Isomorphism Polytopes Peter N. Malkin* and Mohammed Omar + UC Davis University of Washington May 18th 2010 *Partly funded by an IBM OCR grant and the NSF. + Partly funded
More informationPermutation groups and the graph isomorphism problem
Permutation groups and the graph isomorphism problem Sumanta Ghosh and Piyush P Kurur Department of Computer Science and Engineering, Indian Institute of Technology Kanpur, Kanpur, Uttar Pradesh, India
More information2 Permutation Groups
2 Permutation Groups Last Time Orbit/Stabilizer algorithm: Orbit of a point. Transversal of transporter elements. Generators for stabilizer. Today: Use in a ``divide-and-conquer approach for permutation
More informationGraph Isomorphism is in SPP
Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur Institute of Mathematical Sciences, C.I.T Campus Chennai 600113, India email: {arvind,ppk}@imsc.ernet.in Abstract We show that Graph Isomorphism
More informationBasic Algorithms for Permutation Groups
Basic Algorithms for Permutation Groups Alexander Hulpke Department of Mathematics Colorado State University Fort Collins, CO, 80523-1874 Arizona Summer Program 2008 JAH, Arizona Summer Program 2008 Basic
More informationLecture 22: Oct 29, Interactive proof for graph non-isomorphism
E0 4 Computational Complexity Theory Indian Institute of Science, Bangalore Fall 04 Department of Computer Science and Automation Lecture : Oct 9, 04 Lecturer: Chandan Saha
More informationSolving an arbitrary permutation puzzle
T.C. Brouwer Solving an arbitrary permutation puzzle Bachelor thesis, June 18, 2016 Supervisor: Dr. R.M. van Luijk Mathematisch Instituut, Universiteit Leiden Contents 1 Introduction 2 Mathematical formulation
More informationTractable Approximations of Graph Isomorphism.
Tractable Approximations of Graph Isomorphism. Anuj Dawar University of Cambridge Computer Laboratory visiting RWTH Aachen joint work with Bjarki Holm Darmstadt, 5 February 2014 Graph Isomorphism Graph
More informationCertifying Solutions to Permutation Group Problems
Certifying Solutions to Permutation Group Problems Arjeh Cohen 1, Scott H. Murray 1,, Martin Pollet 2,, and Volker Sorge 3, 1 RIACA, Technische Universiteit Eindhoven, The Netherlands {amc,smurray}@win.tue.nl
More informationComputing Isomorphism [Ch.7, Kreher & Stinson] [Ch.3, Kaski & Östergård]
Computing Isomorphism [Ch.7, Kreher & Stinson] [Ch.3, Kaski & Östergård] Winter 2009 Introduction Isomorphism of Combinatorial Objects In general, isomorphism is an equivalence relation on a set of objects.
More informationAUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS
AUTOMORPHISM GROUPS AND SPECTRA OF CIRCULANT GRAPHS MAX GOLDBERG Abstract. We explore ways to concisely describe circulant graphs, highly symmetric graphs with properties that are easier to generalize
More informationReductions to Graph Isomorphism
Reductions to raph Isomorphism Jacobo Torán Institut für Theoretische Informatik Universität Ulm D-89069 Ulm, ermany jacobo.toran@uni-ulm.de June 13, 2008 Keywords: Computational complexity, reducibilities,
More informationPermutation Group Algorithms
Permutation Group Algorithms 2016 1 / 32 Permutation Group Algorithms Zoltán Halasi Eötvös Loránd University 2016 More group theory Permutation Group Algorithms 2016 2 / 32 Going into deeper to the structure
More informationLimits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam
Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph
More informationCreating Groups Caveat:
Method Selection GAP tries to select the best method (of several) for a particular operation (say NormalSubgroups) based on: What kind of object (Category group of permutations) How is it stored (Representation
More informationNotes on Complexity Theory Last updated: November, Lecture 10
Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationAsymptotically optimal induced universal graphs
Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1 + o(1))2 (
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationif G permutes the set of its subgroups by conjugation then Stab G (H) = N G (H),
1 0.1 G-sets We introduce a part of the theory of G-sets, suitable for understanding the approach GAP uses to compute with permutation groups, using stabilizer chains. Rotman s book describes other results
More information2 Natural Proofs: a barrier for proving circuit lower bounds
Topics in Theoretical Computer Science April 4, 2016 Lecturer: Ola Svensson Lecture 6 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationConnectivity of Cayley Graphs: A Special Family
Connectivity of Cayley Graphs: A Special Family Joy Morris Department of Mathematics and Statistics Trent University Peterborough, Ont. K9J 7B8 January 12, 2004 1 Introduction Taking any finite group G,
More informationPermutation Group Algorithms, Part 2
Permutation Group Algorithms, Part 2 Jason B. Hill University of Colorado October 5, 2010 Two recent opening sentences for presentations on polynomial-time permutation group algorithms have each had five
More informationGröbner Bases for Noncommutative Polynomials
Gröbner Bases for Noncommutative Polynomials Arjeh M. Cohen 8 January 2007 first lecture of Three aspects of exact computation a tutorial at Mathematics: Algorithms and Proofs (MAP) Leiden, January 8 12,
More informationLecture 24: Approximate Counting
CS 710: Complexity Theory 12/1/2011 Lecture 24: Approximate Counting Instructor: Dieter van Melkebeek Scribe: David Guild and Gautam Prakriya Last time we introduced counting problems and defined the class
More informationCS151 Complexity Theory. Lecture 13 May 15, 2017
CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P
More informationMcKay s Canonical Graph Labeling Algorithm
Contemporary Mathematics McKay s Canonical Graph Labeling Algorithm Stephen G. Hartke and A. J. Radcliffe Abstract. The problem of deciding whether two graphs are isomorphic is fundamental in graph theory.
More informationGroups and Symmetries
Groups and Symmetries Definition: Symmetry A symmetry of a shape is a rigid motion that takes vertices to vertices, edges to edges. Note: A rigid motion preserves angles and distances. Definition: Group
More informationElementary Equivalence in Finite Structures
Elementary Equivalence in Finite Structures Anuj Dawar University of Cambridge Computer Laboratory YuriFest, Berlin, 11 September 2015 When I First Met Yuri When I was a graduate student, I sent Yuri a
More informationGreat Theoretical Ideas in Computer Science
15-251 Great Theoretical Ideas in Computer Science Lecture 28: A Computational Lens on Proofs December 6th, 2016 Evolution of proof First there was GORM GORM = Good Old Regular Mathematics Pythagoras s
More informationLecture 18: Zero-Knowledge Proofs
COM S 6810 Theory of Computing March 26, 2009 Lecture 18: Zero-Knowledge Proofs Instructor: Rafael Pass Scribe: Igor Gorodezky 1 The formal definition We intuitively defined an interactive proof to be
More informationFinite Model Theory and Graph Isomorphism. II.
Finite Model Theory and Graph Isomorphism. II. Anuj Dawar University of Cambridge Computer Laboratory visiting RWTH Aachen Beroun, 13 December 2013 Recapitulation Finite Model Theory aims to study the
More informationTotal Ordering on Subgroups and Cosets
Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationEvery Linear Order Isomorphic to Its Cube is Isomorphic to Its Square
Every Linear Order Isomorphic to Its Cube is Isomorphic to Its Square Garrett Ervin University of California, Irvine May 21, 2016 We do not know so far any type α such that α = α 3 = α 2. W. Sierpiński,
More informationLecture 26: Arthur-Merlin Games
CS 710: Complexity Theory 12/09/2011 Lecture 26: Arthur-Merlin Games Instructor: Dieter van Melkebeek Scribe: Chetan Rao and Aaron Gorenstein Last time we compared counting versus alternation and showed
More informationSelected Topics in AGT Lecture 4 Introduction to Schur Rings
Selected Topics in AGT Lecture 4 Introduction to Schur Rings Mikhail Klin (BGU and UMB) September 14 18, 2015 M. Klin Selected topics in AGT September 2015 1 / 75 1 Schur rings as a particular case of
More informationORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS
ORBITAL DIGRAPHS OF INFINITE PRIMITIVE PERMUTATION GROUPS SIMON M. SMITH Abstract. If G is a group acting on a set Ω and α, β Ω, the digraph whose vertex set is Ω and whose arc set is the orbit (α, β)
More informationAsymptotically optimal induced universal graphs
Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1+o(1))2 ( 1)/2.
More informationEnumerative Combinatorics 7: Group actions
Enumerative Combinatorics 7: Group actions Peter J. Cameron Autumn 2013 How many ways can you colour the faces of a cube with three colours? Clearly the answer is 3 6 = 729. But what if we regard two colourings
More informationIntroduction to Association Schemes
Introduction to Association Schemes Akihiro Munemasa Tohoku University June 5 6, 24 Algebraic Combinatorics Summer School, Sendai Assumed results (i) Vandermonde determinant: a a m =. a m a m m i
More informationSome Applications of pq-groups in Graph Theory
Some Applications of pq-groups in Graph Theory Geoffrey Exoo Department of Mathematics and Computer Science Indiana State University Terre Haute, IN 47809 g-exoo@indstate.edu January 25, 2002 Abstract
More informationComputational Group Theory
Computational Group Theory Soria Summer School 2009 Session 3: Coset enumeration July 2009, Hans Sterk (sterk@win.tue.nl) Where innovation starts Coset enumeration: contents 2/25 What is coset enumeration
More informationImplementations of 3 Types of the Schreier-Sims Algorithm
Implementations of 3 Types of the Schreier-Sims Algorithm Martin Jaggi m.jaggi@gmx.net MAS334 - Mathematics Computing Project Under supervison of Dr L.H.Soicher Queen Mary University of London March 2005
More informationLast Time. Decompose group: Subgroup and Cosets. Use for permutation groups with subgroup being point stabilizer.
Last Time Orbit / Stabilizer algorithm Decompose group: Subgroup and Cosets Use for permutation groups with subgroup being point stabilizer. Can iterate again for subgroups: Logarithmize problem. Stabilizer
More informationThe Lovász Local Lemma: constructive aspects, stronger variants and the hard core model
The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model Jan Vondrák 1 1 Dept. of Mathematics Stanford University joint work with Nick Harvey (UBC) The Lovász Local Lemma
More informationThe cycle polynomial of a permutation group
The cycle polynomial of a permutation group Peter J. Cameron School of Mathematics and Statistics University of St Andrews North Haugh St Andrews, Fife, U.K. pjc0@st-andrews.ac.uk Jason Semeraro Department
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationHW Graph Theory SOLUTIONS (hbovik) - Q
1, Diestel 3.5: Deduce the k = 2 case of Menger s theorem (3.3.1) from Proposition 3.1.1. Let G be 2-connected, and let A and B be 2-sets. We handle some special cases (thus later in the induction if these
More informationCombinatorial Optimization
Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all
More information-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.
CMPSCI 601: Recall From Last Time Lecture 26 Theorem: All CFL s are in sac. Facts: ITADD, MULT, ITMULT and DIVISION on -bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE
More information10.4 The Kruskal Katona theorem
104 The Krusal Katona theorem 141 Example 1013 (Maximum weight traveling salesman problem We are given a complete directed graph with non-negative weights on edges, and we must find a maximum weight Hamiltonian
More information4. How to prove a problem is NPC
The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation
More informationBounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia
Bounded Treewidth Graphs A Survey German Russian Winter School St. Petersburg, Russia Andreas Krause krausea@cs.tum.edu Technical University of Munich February 12, 2003 This survey gives an introduction
More informationInteractive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D;
Interactive Proofs n x: read-only input finite σ: random bits control Π: Proof work tape Merlin-Arthur games (MA) [Babai] Decision problem: D; input string: x Merlin Prover chooses the polynomial-length
More information2 Evidence that Graph Isomorphism is not NP-complete
Topics in Theoretical Computer Science April 11, 2016 Lecturer: Ola Svensson Lecture 7 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationMa/CS 6b Class 12: Graphs and Matrices
Ma/CS 6b Class 2: Graphs and Matrices 3 3 v 5 v 4 v By Adam Sheffer Non-simple Graphs In this class we allow graphs to be nonsimple. We allow parallel edges, but not loops. Incidence Matrix Consider a
More informationRegular actions of groups and inverse semigroups on combinatorial structures
Regular actions of groups and inverse semigroups on combinatorial structures Tatiana Jajcayová Comenius University, Bratislava CSA 2016, Lisbon August 1, 2016 (joint work with Robert Jajcay) Group of Automorphisms
More information1 Review of Vertex Cover
CS266: Parameterized Algorithms and Complexity Stanford University Lecture 3 Tuesday, April 9 Scribe: Huacheng Yu Spring 2013 1 Review of Vertex Cover In the last lecture, we discussed FPT algorithms for
More informationdirected weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time
Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals
More informationLinear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs
Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized
More informationQuantum walk algorithms
Quantum walk algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 28 September 2011 Randomized algorithms Randomness is an important tool in computer science Black-box problems
More informationRewriting Polynomials
Rewriting Polynomials 1 Roots and Eigenvalues the companion matrix of a polynomial the ideal membership problem 2 Automatic Geometric Theorem Proving the circle theorem of Appolonius 3 The Division Algorithm
More informationarxiv: v1 [math.co] 19 Aug 2016
THE EXCHANGE GRAPHS OF WEAKLY SEPARATED COLLECTIONS MEENA JAGADEESAN arxiv:1608.05723v1 [math.co] 19 Aug 2016 Abstract. Weakly separated collections arise in the cluster algebra derived from the Plücker
More informationKernelization by matroids: Odd Cycle Transversal
Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the
More informationChordal Coxeter Groups
arxiv:math/0607301v1 [math.gr] 12 Jul 2006 Chordal Coxeter Groups John Ratcliffe and Steven Tschantz Mathematics Department, Vanderbilt University, Nashville TN 37240, USA Abstract: A solution of the isomorphism
More informationA note on the Isomorphism Problem for Monomial Digraphs
A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University
More informationZero sum partition of Abelian groups into sets of the same order and its applications
Zero sum partition of Abelian groups into sets of the same order and its applications Sylwia Cichacz Faculty of Applied Mathematics AGH University of Science and Technology Al. Mickiewicza 30, 30-059 Kraków,
More informationDefinitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations
Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of
More information120A LECTURE OUTLINES
120A LECTURE OUTLINES RUI WANG CONTENTS 1. Lecture 1. Introduction 1 2 1.1. An algebraic object to study 2 1.2. Group 2 1.3. Isomorphic binary operations 2 2. Lecture 2. Introduction 2 3 2.1. The multiplication
More informationNotes on cycle generating functions
Notes on cycle generating functions. The cycle generating function of a species A combinatorial species is a rule attaching to each finite set X a set of structures on X, in such a way that the allowed
More informationStrongly regular graphs and Borsuk s conjecture
Optimal Point Configurations and Orthogonal Polynomials 2017 Strongly regular graphs and Borsuk s conjecture Andriy Bondarenko Norwegian University of Science and Technology 19 April 2017 Andriy Bondarenko
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationOn the query complexity of counterfeiting quantum money
On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum
More informationTree-width and algorithms
Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding
More informationPermutation groups/1. 1 Automorphism groups, permutation groups, abstract
Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.
More informationPermutation Groups. John Bamberg, Michael Giudici and Cheryl Praeger. Centre for the Mathematics of Symmetry and Computation
Notation Basics of permutation group theory Arc-transitive graphs Primitivity Normal subgroups of primitive groups Permutation Groups John Bamberg, Michael Giudici and Cheryl Praeger Centre for the Mathematics
More informationLecture 15: The Hidden Subgroup Problem
CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry
More informationOut-colourings of Digraphs
Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.
More informationKernelization Lower Bounds: A Brief History
Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi
More informationAutomorphism groups of wreath product digraphs
Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy
More information(c) Give a proof of or a counterexample to the following statement: (3n 2)= n(3n 1) 2
Question 1 (a) Suppose A is the set of distinct letters in the word elephant, B is the set of distinct letters in the word sycophant, C is the set of distinct letters in the word fantastic, and D is the
More informationOutline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational
More informationLecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]
Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j
More informationBASIC GROUP THEORY : G G G,
BASIC GROUP THEORY 18.904 1. Definitions Definition 1.1. A group (G, ) is a set G with a binary operation : G G G, and a unit e G, possessing the following properties. (1) Unital: for g G, we have g e
More informationStrongly chordal and chordal bipartite graphs are sandwich monotone
Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationThe Graph Isomorphism Problem and the Module Isomorphism Problem. Harm Derksen
The Graph Isomorphism Problem and the Module Isomorphism Problem Harm Derksen Department of Mathematics Michigan Center for Integrative Research in Critical Care University of Michigan Partially supported
More informationInduced Subgraph Isomorphism on proper interval and bipartite permutation graphs
Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph
More informationLöwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007)
Löwenheim-Skolem Theorems, Countable Approximations, and L ω 0. Introduction David W. Kueker (Lecture Notes, Fall 2007) In its simplest form the Löwenheim-Skolem Theorem for L ω1 ω states that if σ L ω1
More informationGraph Isomorphism is in SPP
Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur 1 Institute of Mathematical Sciences, Chennai 600113, India Abstract We show that Graph Isomorphism is in the complexity class SPP, and hence it
More informationMassachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.
Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations
More informationElliptic Curve Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem Vanessa VITSE Université de Versailles Saint-Quentin, Laboratoire PRISM October 19, 2009 Vanessa VITSE (UVSQ) Elliptic Curve Discrete Logarithm Problem October
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir
More informationChapter One. Affine Coxeter Diagrams
Chapter One Affine Coxeter Diagrams By the results summarized in Chapter VI, Section 43, of [3], affine Coxeter groups can be characterized as groups generated by reflections of an affine space (by which
More informationarxiv: v2 [math.co] 30 Jun 2013
A polynomial representation and a unique code of a simple undirected graph arxiv:1304.5847v2 [math.co] 30 Jun 2013 Shamik Ghosh, Raibatak Sen Gupta, M. K. Sen Abstract In this note we introduce a representation
More information