An Extension of Menger s Theorem
|
|
- Elinor Alexander
- 5 years ago
- Views:
Transcription
1 An Extension of Menger s Theorem April 2015
2 Merging
3 Merging
4 Merging merging
5 Merging
6 Merging merging
7 Merging merging merging
8 A Theorem Mergings Congestions a.s.!
9 A Proof
10 Motivation in Transportation Networks
11 Motivation in Transportation Networks
12 Motivation in Transportation Networks Minimizing Mergings Maximizing Throughput!
13 Motivation in Computer Networks a S b R 1 R 2
14 Motivation in Computer Networks a S b b a b b R 1 R 2
15 Motivation in Computer Networks a S b a a b a R 1 R 2
16 Motivation in Computer Networks a a S b b a b? a? b?? R 1 R 2
17 Motivation in Computer Networks a a S b b a a+b b a+b a+b R 1 R 2
18 Motivation in Computer Networks a a S b b a a+b network coding b a+b a+b R 1 R 2
19 Motivation in Computer Networks a a S b b a a+b network coding b a+b a+b R 1 R 2 Minimizing Mergings Minimizing Encoding Complexity!
20 Karl Menger
21 Menger s Theorem Theorem (Menger, 1927) Consider a directed graph G(V, E). For any two vertices A, B, the maximum number of pairwise edge-disjoint directed paths from A to B in G equals the min-cut between A and B, namely the minimum number of edges in E whose deletion destroys all directed paths from A to B.
22 Menger s Theorem Theorem (Menger, 1927) Consider a directed graph G(V, E). For any two vertices A, B, the maximum number of pairwise edge-disjoint directed paths from A to B in G equals the min-cut between A and B, namely the minimum number of edges in E whose deletion destroys all directed paths from A to B. Menger s paths
23 A Quick Example E C A F B D G H
24 A Quick Example E C A F B D G H
25 A Quick Example E C A F B D G H
26 We are interested in... Mergings among different groups of Menger s paths in networks with multiple sources and sinks.
27 Rerouting S 1 R 1 S 2 R 2
28 Rerouting S 1 R 1 S 2 R 2
29 Rerouting S 1 R 1 S 2 reroutable R 2
30 Rerouting S 1 R 1 S 2 R 2
31 Rerouting S 1 R 1 S 2 R 2
32 Rerouting (cont d)
33 Rerouting (cont d)
34 Rerouting (cont d)
35 Rerouting (cont d)
36 Rerouting (cont d)
37 Rerouting (cont d)
38 Network Model and Notations G: an acyclic directed graph.
39 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources.
40 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks.
41 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks. c i : the min-cut between S i and R i.
42 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks. c i : the min-cut between S i and R i. α i = {α i,1, α i,2,, α i,ci }: a set of Menger s paths from S i to R i.
43 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G.
44 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
45 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
46 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
47 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
48 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
49 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
50 M (c 1, c 2,, c n ) Assume that all sources are identical. best decision M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
51 M (c 1, c 2,, c n ) Assume that all sources are identical. best decision worst performance M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2
52 M(c 1, c 2,, c n ) Assume that all sources are distinct. M(G): the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M(c 1, c 2,, c n ): the supremum of M(G) over all possible choices of such G. R 1 S 1 S 2 R 2
53 Previous Work It was first conjectured by Tavory, Feder and Ron that M(c 1, c 2,, c n ) is finite. More specifically the authors proved that if M(c 1, c 2 ) is finite for all c 1, c 2, then M(c 1, c 2,, c n ) is finite as well. As for M, Fragouli and Soljanin use the idea of subtree decomposition to first prove that M (2, 2,, 2) = n 1. }{{} n It was first shown Langberg, Sprintson and Bruck that M (c 1, c 2 ) is finite for all c 1, c 2, and subsequently M (c 1, c 2,, c n ) is finite all c 1, c 2,, c n.
54 Main Results Main Results For fixed c 1, c 2,, c n, M(c 1, c 2,, c n ) and M (c 1, c 2,, c n ) are always finite. And as functions of c 1, c 2,, c n, they have interesting properties. We give exact values of and tighter bounds on M and M with certain parameters.
55 Some Remarks When n = 1, Ford-Fulkerson algorithm can find the min-cut and a set of Menger s path between S 1 and R 1 in polynomial time.
56 Some Remarks When n = 1, Ford-Fulkerson algorithm can find the min-cut and a set of Menger s path between S 1 and R 1 in polynomial time. The LDP (Link Disjoint Problem) asks if there are two edge-disjoint paths from S 1, S 2 to R 1, R 2, respectively. The fact that the LDP problem is NP-complete suggests the intricacy of the problem when n 2.
57 Outline of the Proof Lemma For any c 1, c 2, M(c 1, c 2 ) c 1 c 2 (c 1 + c 2 )/2. Theorem For any c 1, c 2,, c n, we have M(c 1, c 2,, c n ) i<j M(c i, c j ). Observation Note that for any c 1, c 2,, c n, we always have M (c 1, c 2,, c n ) M(c 1, c 2,, c n )
58 A Key Idea If too many mergings:
59 A Key Idea If too many mergings:
60 A Key Idea If too many mergings:
61 A Key Idea If too many mergings:
62 A Key Idea If too many mergings:
63 A Key Idea If too many mergings:
64 A Key Idea If too many mergings:
65 A Key Idea If too many mergings:
66 A Key Idea If too many mergings:
67 Properties of M Proposition For c 1 c 2 c n, if c 1 + c c n 1 c n, then M (c 1, c 2,, c n ) = M (c 1, c 2,, c n 1, c 1 + c c n 1 ). Proposition For c 1 = 1 c 2 c n, we have M (c 1, c 2,, c n ) = M (c 2,, c n 1, c n ). Proposition For n 1 n 2 n k, k 1 M (n 1, n 2,..., n k ) M (n i, n i ). i=1
68 Properties of M Proposition For any c 1,0, c 1,1, c 2, we have M(c 1,0 + c 1,1, c 2 ) M(c 1,0, c 2 ) + M(c 1,1, c 2 ). Proposition For any c 1, c 2,, c n and any fixed k with 1 k n, we have M(c 1, c 2,, c n ) M(c i, c j ). i k,j k+1
69 Properties of M Proposition For any c 1,0, c 1,1, c 2, we have M(c 1,0 + c 1,1, c 2 ) M(c 1,0, c 2 ) + M(c 1,1, c 2 ). Proposition For any c 1, c 2,, c n and any fixed k with 1 k n, we have M(c i, c j ) M(c 1, c 2,, c n ) M(c i, c j ). i<j i k,j k+1
70 Properties of M (cont d) Proposition For any m n, we have where U(m, n) = and m 1 j=1 M(m, n) U(m, n) + V (m, n) + m 2, (M(j, m 1) M(m j, n))+m(m, m 1)+1, m 1 V (m, n) = M(m, n 1)+ (M(j, n) M(m j, n)) M(1, n). j=1
71 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof.
72 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings
73 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings C k mergings
74 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings C k mergings C k mergings
75 Tighter Bounds It has been established [Langberg et al.] that n(n 1)/2 M (n, n) n 3. Next, we give tighter bounds on M (n, n) and M(m, n).
76 Bounds on M Proposition (n 1) 2 M (n, n) n 2 (n 2 4n + 5). Proof. S A graph showing M (3, 3) 4. R 1 R 2
77 Bounds on M Proposition m + n 2 2mn m n+1 M(m, n) (m+n 1)+(mn 2). 2 Proof. S 1 S 2 A graph showing M(2, 2) 5. R 1 R 2
78 Exact Values M (1, 1) = 0. M (2, 2) = 1. M (3, 3) = 4. M (4, 4) = 9. M (5, 5) = 16.
79 Exact Values M (1, 1) = 0. M (m, m) = (m 1) 2? M (2, 2) = 1. M (3, 3) = 4. M (4, 4) = 9. M (5, 5) = 16.
80 Exact Values M (1, 1) = 0. M (m, m) = (m 1) 2? M (2, 2) = 1. M (3, 3) = 4. M (6, 6) = 27! M (4, 4) = 9. M (5, 5) = 16.
81 Exact Values M(1, n) = n. M(2, n) = 3n 1. M(3, 3) = 13. M(3, 4) = 18. M(3, 5) = 23. M(3, 6) = 28. M(4, 4) = 27.
82 Exact Values M (1, 1,, 1) = 0. }{{} n M (2, 2,, 2) = n 1. }{{} n M (2, m, m) = 1 + (m 1) 2, m = 2, 3, 4, 5. M (m, m, m) = 2(m 1) 2, m = 1, 2, 3, 4. M (3, 4, 4) = 13. For m n p and (m, n) (3, 4) or (2, 5) M (m, n, p) = M (m, n, n).
83 Exact Values M(1,..., 1, 2) = }{{} k M(1, 2, n) = k 2 M(1, 1,, 1) =. }{{} 4 k { 3k 1 if k 6, k2 4 + k + 2 if k > 6. M(1, 1, n) = 2n + 1. { 4n if n = 2, 3, 4n + 1 if n = 1 or n 4. M(2, 2, 2) = 11, M(1, 3, 3) = 17, M(2, 2, 3) = 18.
84 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
85 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
86 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
87 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
88 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
89 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
90 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
91 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2
92 Open Problems Tighter Upper Bounds There exists C > 0 such that for all m, n, M(m, n) Cmn.
93 Open Problems Tighter Upper Bounds There exists C > 0 such that for all m, n, M(m, n) Cmn. Mergings On Other Classes of Graphs undirected graphs, planar graphs, and so on.
94 References L. R. Ford and D. R. Fulkerson Maximal flow through a network. Canadian Journal of Mathematics 8: , C. Fragouli and E. Soljanin. Information Flow Decomposition for Network Coding. IEEE Transactions on Information Theory, Volume 52, Issue 3, March 2006, Page(s): M. Langberg, A. Sprintson, A. and J. Bruck. The encoding complexity of network coding IEEE Transactions on Information Theory, Volume 52, Issue 6, June 2006, Page(s): K. Menger. Zur allgemeinen Kurventhoerie. Fund. Math., 10: A. Tavory, M. Feder and D. Ron. Bounds on Linear Codes for Network Multicast. Electronic Colloquium on Computational Complexity (ECCC), 10(033), Li Xu, Weiping2003. Shang, Guangyue Han
95 Thank You!
On Mergings in Acyclic Directed Graphs
On Mergings in Acyclic Directed Graphs Guangyue Han The University of Hong Kong e-mail: ghan@hku.hk November 24, 2018 Abstract Consider an acyclic directed graph G with sources s 1, s 2,..., s n and sinks
More informationGraph independent field size bounds on failure protecting network codes
Egerváry Research Group on Combinatorial Optimization Technical reports TR-25-. Published by the Egerváry Research Group, Pázmány P. sétány /C, H 7, Budapest, Hungary. Web site: www.cs.elte.hu/egres. ISSN
More informationTwo Applications of Maximum Flow
Two Applications of Maximum Flow The Bipartite Matching Problem a bipartite graph as a flow network maximum flow and maximum matching alternating paths perfect matchings 2 Circulation with Demands flows
More informationStandard Diraphs the (unique) digraph with no vertices or edges. (modulo n) for every 1 i n A digraph whose underlying graph is a complete graph.
5 Directed Graphs What is a directed graph? Directed Graph: A directed graph, or digraph, D, consists of a set of vertices V (D), a set of edges E(D), and a function which assigns each edge e an ordered
More informationClassical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems
Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive
More informationNew algorithms for Disjoint Paths and Routing Problems
New algorithms for Disjoint Paths and Routing Problems Chandra Chekuri Dept. of Computer Science Univ. of Illinois (UIUC) Menger s Theorem Theorem: The maximum number of s-t edgedisjoint paths in a graph
More informationTesting Equality in Communication Graphs
Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected
More informationThe partial inverse minimum cut problem with L 1 -norm is strongly NP-hard. Elisabeth Gassner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung The partial inverse minimum cut problem with L 1 -norm is strongly NP-hard Elisabeth
More informationMaximum flow problem
Maximum flow problem 7000 Network flows Network Directed graph G = (V, E) Source node s V, sink node t V Edge capacities: cap : E R 0 Flow: f : E R 0 satisfying 1. Flow conservation constraints e:target(e)=v
More informationarxiv: v1 [math.co] 11 Sep 2018
The Undirected Two Disjoint Shortest Paths Problem Marinus Gottschau 1, Marcus Kaiser 1, Clara Waldmann 1 Abstract arxiv:1809.03820v1 [math.co] 11 Sep 2018 The k disjoint shortest paths problem (k-dspp)
More informationIntroduction to Graph Theory
Introduction to Graph Theory George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 351 George Voutsadakis (LSSU) Introduction to Graph Theory August 2018 1 /
More informationAcyclic and Oriented Chromatic Numbers of Graphs
Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded
More informationBeyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationBroadcasting With Side Information
Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more
More informationOn shredders and vertex connectivity augmentation
On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the
More informationBalanced bipartitions of graphs
2010.7 - Dedicated to Professor Feng Tian on the occasion of his 70th birthday Balanced bipartitions of graphs Baogang Xu School of Mathematical Science, Nanjing Normal University baogxu@njnu.edu.cn or
More informationAlgorithms and Theory of Computation. Lecture 11: Network Flow
Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a
More informationCSC Design and Analysis of Algorithms. LP Shader Electronics Example
CSC 80- Design and Analysis of Algorithms Lecture (LP) LP Shader Electronics Example The Shader Electronics Company produces two products:.eclipse, a portable touchscreen digital player; it takes hours
More informationDisconnecting Networks via Node Deletions
1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS
More informationLength-Bounded Cuts and Flows
Length-Bounded Cuts and Flows Georg Baier 1,, Thomas Erlebach 2, Alexander Hall 3, Ekkehard Köhler 1, Heiko Schilling 1, and Martin Skutella 4 1 Institute of Mathematics, TU Berlin, Germany 2 Department
More informationLinear codes cannot approximate the network capacity within any constant factor
Electronic Colloquium on Computational Complexity, Report No. 141 (2014) Linear codes cannot approximate the network capacity within any constant factor Shachar Lovett Computer Science and Engineering
More informationThe Capacity of a Network
The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?
More informationCS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source
More informationA note on balanced bipartitions
A note on balanced bipartitions Baogang Xu a,, Juan Yan a,b a School of Mathematics and Computer Science Nanjing Normal University, 1 Ninghai Road, Nanjing, 10097, China b College of Mathematics and System
More informationDecomposing oriented graphs into transitive tournaments
Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote
More informationDiscrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P
Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Lagrangian
More informationThe inefficiency of equilibria
The inefficiency of equilibria Chapters 17,18,19 of AGT 3 May 2010 University of Bergen Outline 1 Reminder 2 Potential games 3 Complexity Formalization Like usual, we consider a game with k players {1,...,
More informationApproximability and Parameterized Complexity of Consecutive Ones Submatrix Problems
Proc. 4th TAMC, 27 Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Michael Dom, Jiong Guo, and Rolf Niedermeier Institut für Informatik, Friedrich-Schiller-Universität
More informationCSC 373: Algorithm Design and Analysis Lecture 12
CSC 373: Algorithm Design and Analysis Lecture 12 Allan Borodin February 4, 2013 1 / 16 Lecture 12: Announcements and Outline Announcements Term test 1 in tutorials. Need to use only two rooms due to sickness
More informationElisabeth Gassner Introduction THE PARTIAL INVERSE MINIMUM CUT PROBLEM WITH L 1 -NORM IS STRONGLY NP-HARD
RAIRO-Oper. Res. 44 (010) 41 49 DOI: 10.1051/ro/010017 RAIRO Operations Research www.rairo-ro.org THE PARTIAL INVERSE MINIMUM CUT PROBLEM WITH L 1 -NORM IS STRONGLY NP-HARD Elisabeth Gassner 1 Abstract.
More informationLow Complexity Encoding for Network Codes
Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto
More informationRepresentations of All Solutions of Boolean Programming Problems
Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland
More informationSelected partial inverse combinatorial optimization problems with forbidden elements. Elisabeth Gassner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Selected partial inverse combinatorial optimization problems with forbidden elements
More informationOn Acyclicity of Games with Cycles
On Acyclicity of Games with Cycles Daniel Andersson, Vladimir Gurvich, and Thomas Dueholm Hansen Dept. of Computer Science, Aarhus University, {koda,tdh}@cs.au.dk RUTCOR, Rutgers University, gurvich@rutcor.rutgers.edu
More informationGraph Theory and Optimization Computational Complexity (in brief)
Graph Theory and Optimization Computational Complexity (in brief) Nicolas Nisse Inria, France Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, Sophia Antipolis, France September 2015 N. Nisse Graph Theory
More informationIndex Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan
Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationComputing the Hull Number of Chordal and Distance-Hereditary Graphs. LIMOS - Université Blaise Pascal SOFSEM 2013
Computing the Hull Number of Chordal and Distance-Hereditary Graphs Mamadou M. Kanté Lhouari Nourine LIMOS - Université Blaise Pascal SOFSEM 20 Betweenness Relations A betweenness on a ground set V is
More informationSpanning Paths in Infinite Planar Graphs
Spanning Paths in Infinite Planar Graphs Nathaniel Dean AT&T, ROOM 2C-415 600 MOUNTAIN AVENUE MURRAY HILL, NEW JERSEY 07974-0636, USA Robin Thomas* Xingxing Yu SCHOOL OF MATHEMATICS GEORGIA INSTITUTE OF
More informationIE418 Integer Programming
IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 23rd February 2005 The Ingredients Some Easy Problems The Hard Problems Computational Complexity The ingredients
More informationConstructing c-ary Perfect Factors
Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:
More informationLecture 8 Network Optimization Algorithms
Advanced Algorithms Floriano Zini Free University of Bozen-Bolzano Faculty of Computer Science Academic Year 2013-2014 Lecture 8 Network Optimization Algorithms 1 21/01/14 Introduction Network models have
More informationconp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.
1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations
More informationNowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E.
Nowhere zero flow Definition: A flow on a graph G = (V, E) is a pair (D, f) such that 1. D is an orientation of G. 2. f is a function on E. 3. u N + D (v) f(uv) = w ND f(vw) for every (v) v V. Example:
More informationMaximum Integer Flows in Directed Planar Graphs with Multiple Sources and Sinks and Vertex Capacities
Maximum Integer Flows in Directed Planar Graphs with Multiple Sources and Sinks and Vertex Capacities Yipu Wang University of Illinois at Urbana-Champaign ywang298@illinois.edu July 12, 2018 Abstract We
More informationChih-Hung Yen and Hung-Lin Fu 1. INTRODUCTION
TAIWANESE JOURNAL OF MATHEMATICS Vol. 14, No. 1, pp. 273-286, February 2010 This paper is available online at http://www.tjm.nsysu.edu.tw/ LINEAR 2-ARBORICITY OF THE COMPLETE GRAPH Chih-Hung Yen and Hung-Lin
More informationEnergy minimization via graph-cuts
Energy minimization via graph-cuts Nikos Komodakis Ecole des Ponts ParisTech, LIGM Traitement de l information et vision artificielle Binary energy minimization We will first consider binary MRFs: Graph
More informationCMPSCI 611: Advanced Algorithms
CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and
More informationExistence of Nash Networks in One-Way Flow Models
Existence of Nash Networks in One-Way Flow Models pascal billand a, christophe bravard a, sudipta sarangi b a CREUSET, Jean Monnet University, Saint-Etienne, France. email: pascal.billand@univ-st-etienne.fr
More informationCommunicating the sum of sources in a 3-sources/3-terminals network
Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy
More informationConnectivity and Menger s theorems
Connectiity and Menger s theorems We hae seen a measre of connectiity that is based on inlnerability to deletions (be it tcs or edges). There is another reasonable measre of connectiity based on the mltiplicity
More informationA lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo
A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A. E. Brouwer & W. H. Haemers 2008-02-28 Abstract We show that if µ j is the j-th largest Laplacian eigenvalue, and d
More informationCHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1
CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve
More informationCOMPUTING GRAPH ROOTS WITHOUT SHORT CYCLES
Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp. 397 408 www.stacs-conf.org COMPUTING GRAPH ROOTS WITHOUT SHORT CYCLES BABAK FARZAD 1 AND LAP CHI LAU 2 AND VAN BANG LE 3 AND NGUYEN
More informationdirected weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time
Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals
More informationLecture 13 Spectral Graph Algorithms
COMS 995-3: Advanced Algorithms March 6, 7 Lecture 3 Spectral Graph Algorithms Instructor: Alex Andoni Scribe: Srikar Varadaraj Introduction Today s topics: Finish proof from last lecture Example of random
More informationIntroduction 1.1 PROBLEM FORMULATION
Introduction. PROBLEM FORMULATION This book deals with a single type of network optimization problem with linear cost, known as the transshipment or minimum cost flow problem. In this section, we formulate
More informationMartin Milanič
1 / 75 Algorithmic Graph Theory Part I - Review of Basic Notions in Graph Theory, Algorithms and Complexity Martin Milanič martin.milanic@upr.si University of Primorska, Koper, Slovenia Dipartimento di
More informationTree-width and planar minors
Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.
More informationReachability of recurrent positions in the chip-firing game
Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-10. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.
More informationEdge-Disjoint Paths in Planar Graphs with Constant Congestion
Edge-Disjoint Paths in Planar Graphs with Constant Congestion Chandra Chekuri Sanjeev Khanna F. Bruce Shepherd November 8, 2006 Abstract We study the maximum edge-disjoint paths problem in undirected planar
More informationOn the Index Coding Problem and its Relation to Network Coding and Matroid Theory
1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas
More informationLinear Index Codes are Optimal Up To Five Nodes
Linear Index Codes are Optimal Up To Five Nodes Lawrence Ong The University of Newcastle, Australia March 05 BIRS Workshop: Between Shannon and Hamming: Network Information Theory and Combinatorics Unicast
More informationACO Comprehensive Exam October 14 and 15, 2013
1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for
More informationRobin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA
Odd K 3,3 subdivisions in bipartite graphs 1 Robin Thomas and Peter Whalen School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA Abstract We prove that every internally
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationFall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017
Fall 2017 Qualifier Exam: OPTIMIZATION September 18, 2017 GENERAL INSTRUCTIONS: 1 Answer each question in a separate book 2 Indicate on the cover of each book the area of the exam, your code number, and
More informationCS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest
More informationGRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH. P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA. and
GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA and Robin Thomas* School of Mathematics Georgia Institute of Technology Atlanta,
More informationAcyclic subgraphs with high chromatic number
Acyclic subgraphs with high chromatic number Safwat Nassar Raphael Yuster Abstract For an oriented graph G, let f(g) denote the maximum chromatic number of an acyclic subgraph of G. Let f(n) be the smallest
More informationRandomized Coordinate Descent Methods on Optimization Problems with Linearly Coupled Constraints
Randomized Coordinate Descent Methods on Optimization Problems with Linearly Coupled Constraints By I. Necoara, Y. Nesterov, and F. Glineur Lijun Xu Optimization Group Meeting November 27, 2012 Outline
More informationA Cubic-Vertex Kernel for Flip Consensus Tree
To appear in Algorithmica A Cubic-Vertex Kernel for Flip Consensus Tree Christian Komusiewicz Johannes Uhlmann Received: date / Accepted: date Abstract Given a bipartite graph G = (V c, V t, E) and a nonnegative
More information4. How to prove a problem is NPC
The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation
More informationAcyclic Digraphs arising from Complete Intersections
Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine
More informationNote on group distance magic complete bipartite graphs
Cent. Eur. J. Math. 12(3) 2014 529-533 DOI: 10.2478/s11533-013-0356-z Central European Journal of Mathematics Note on group distance magic complete bipartite graphs Research Article Sylwia Cichacz 1 1
More informationP versus NP. Math 40210, Spring April 8, Math (Spring 2012) P versus NP April 8, / 9
P versus NP Math 40210, Spring 2014 April 8, 2014 Math 40210 (Spring 2012) P versus NP April 8, 2014 1 / 9 Properties of graphs A property of a graph is anything that can be described without referring
More informationk-distinct In- and Out-Branchings in Digraphs
k-distinct In- and Out-Branchings in Digraphs Gregory Gutin 1, Felix Reidl 2, and Magnus Wahlström 1 arxiv:1612.03607v2 [cs.ds] 21 Apr 2017 1 Royal Holloway, University of London, UK 2 North Carolina State
More informationCleaning Interval Graphs
Cleaning Interval Graphs Dániel Marx and Ildikó Schlotter Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. {dmarx,ildi}@cs.bme.hu
More informationMarkovian Combination of Decomposable Model Structures: MCMoSt
Markovian Combination 1/45 London Math Society Durham Symposium on Mathematical Aspects of Graphical Models. June 30 - July, 2008 Markovian Combination of Decomposable Model Structures: MCMoSt Sung-Ho
More informationA Brooks-Type Theorem for the Bandwidth of Interval Graphs
A Brooks-Type Theorem for the Bandwidth of Interval Graphs Mitchel T. Keller a, Stephen J. Young b a School of Mathematics, Georgia Institute of Technology, Atlanta, Georgia 3033-0160 U.S.A. b School of
More informationHanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS
Opuscula Mathematica Vol. 6 No. 006 Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Abstract. A graph is equitably k-colorable if its vertices can be partitioned into k independent sets in such a
More informationGroup connectivity of certain graphs
Group connectivity of certain graphs Jingjing Chen, Elaine Eschen, Hong-Jian Lai May 16, 2005 Abstract Let G be an undirected graph, A be an (additive) Abelian group and A = A {0}. A graph G is A-connected
More informationSolving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:
Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles
More informationarxiv: v1 [cs.ds] 11 Oct 2018
Path matrix and path energy of graphs arxiv:1810.04870v1 [cs.ds] 11 Oct 018 Aleksandar Ilić Facebook Inc, Menlo Park, California, USA e-mail: aleksandari@gmail.com Milan Bašić Faculty of Sciences and Mathematics,
More informationOn designs and Steiner systems over finite fields
On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013 Outline
More informationObservation 4.1 G has a proper separation of order 0 if and only if G is disconnected.
4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationRinging the Changes II
Ringing the Changes II Cayley Color Graphs Let G be a group and H a subset of G. We define a Cayley digraph (directed graph) by: Each element of G is a vertex of the digraph Γ and an arc is drawn from
More informationMathematics for Decision Making: An Introduction. Lecture 13
Mathematics for Decision Making: An Introduction Lecture 13 Matthias Köppe UC Davis, Mathematics February 17, 2009 13 1 Reminder: Flows in networks General structure: Flows in networks In general, consider
More informationNotions of Connectivity in Overlay Networks
Notions of Connectivity in Overlay Networks Yuval Emek 1, Pierre Fraigniaud 2, Amos Korman 2, Shay Kutten 3, and avid Peleg 4 1 ETH Zurich, Zurich, Switzerland. yuval.emek@tik.ee.ethz.ch 2 CNRS and University
More informationPacking triangles in regular tournaments
Packing triangles in regular tournaments Raphael Yuster Abstract We prove that a regular tournament with n vertices has more than n2 11.5 (1 o(1)) pairwise arc-disjoint directed triangles. On the other
More informationRECAP: Extremal problems Examples
RECAP: Extremal problems Examples Proposition 1. If G is an n-vertex graph with at most n edges then G is disconnected. A Question you always have to ask: Can we improve on this proposition? Answer. NO!
More informationObservation 4.1 G has a proper separation of order 0 if and only if G is disconnected.
4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H
More informationACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS
ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS WALTER D. MORRIS, JR. ABSTRACT. We call a directed acyclic graph a CIdigraph if a certain affine semigroup ring defined by it is a complete intersection.
More informationPaths, cycles, trees and sub(di)graphs in directed graphs
Paths, cycles, trees and sub(di)graphs in directed graphs Jørgen Bang-Jensen University of Southern Denmark Odense, Denmark Paths, cycles, trees and sub(di)graphs in directed graphs p. 1/53 Longest paths
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationA Tiling and (0, 1)-Matrix Existence Problem
A Tiling and (0, )-Matrix Existence Problem Curtis G Nelson University of Wyoming Advisor: Dr. Bryan Shader July 24, 205 A (0, )-Matrix and Tiling Problem Let R = (r, r 2,..., r m, r m+ = 0) and S = (s,
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More information