An Extension of Menger s Theorem

Size: px
Start display at page:

Download "An Extension of Menger s Theorem"

Transcription

1 An Extension of Menger s Theorem April 2015

2 Merging

3 Merging

4 Merging merging

5 Merging

6 Merging merging

7 Merging merging merging

8 A Theorem Mergings Congestions a.s.!

9 A Proof

10 Motivation in Transportation Networks

11 Motivation in Transportation Networks

12 Motivation in Transportation Networks Minimizing Mergings Maximizing Throughput!

13 Motivation in Computer Networks a S b R 1 R 2

14 Motivation in Computer Networks a S b b a b b R 1 R 2

15 Motivation in Computer Networks a S b a a b a R 1 R 2

16 Motivation in Computer Networks a a S b b a b? a? b?? R 1 R 2

17 Motivation in Computer Networks a a S b b a a+b b a+b a+b R 1 R 2

18 Motivation in Computer Networks a a S b b a a+b network coding b a+b a+b R 1 R 2

19 Motivation in Computer Networks a a S b b a a+b network coding b a+b a+b R 1 R 2 Minimizing Mergings Minimizing Encoding Complexity!

20 Karl Menger

21 Menger s Theorem Theorem (Menger, 1927) Consider a directed graph G(V, E). For any two vertices A, B, the maximum number of pairwise edge-disjoint directed paths from A to B in G equals the min-cut between A and B, namely the minimum number of edges in E whose deletion destroys all directed paths from A to B.

22 Menger s Theorem Theorem (Menger, 1927) Consider a directed graph G(V, E). For any two vertices A, B, the maximum number of pairwise edge-disjoint directed paths from A to B in G equals the min-cut between A and B, namely the minimum number of edges in E whose deletion destroys all directed paths from A to B. Menger s paths

23 A Quick Example E C A F B D G H

24 A Quick Example E C A F B D G H

25 A Quick Example E C A F B D G H

26 We are interested in... Mergings among different groups of Menger s paths in networks with multiple sources and sinks.

27 Rerouting S 1 R 1 S 2 R 2

28 Rerouting S 1 R 1 S 2 R 2

29 Rerouting S 1 R 1 S 2 reroutable R 2

30 Rerouting S 1 R 1 S 2 R 2

31 Rerouting S 1 R 1 S 2 R 2

32 Rerouting (cont d)

33 Rerouting (cont d)

34 Rerouting (cont d)

35 Rerouting (cont d)

36 Rerouting (cont d)

37 Rerouting (cont d)

38 Network Model and Notations G: an acyclic directed graph.

39 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources.

40 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks.

41 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks. c i : the min-cut between S i and R i.

42 Network Model and Notations G: an acyclic directed graph. S 1, S 2,, S n : sources. R 1, R 2,, R n : distinct sinks. c i : the min-cut between S i and R i. α i = {α i,1, α i,2,, α i,ci }: a set of Menger s paths from S i to R i.

43 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G.

44 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

45 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

46 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

47 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

48 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

49 M (c 1, c 2,, c n ) Assume that all sources are identical. M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

50 M (c 1, c 2,, c n ) Assume that all sources are identical. best decision M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

51 M (c 1, c 2,, c n ) Assume that all sources are identical. best decision worst performance M (G):the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M (c 1, c 2,, c n ): the supremum of M (G) over all possible choices of such G. R 1 S R 2

52 M(c 1, c 2,, c n ) Assume that all sources are distinct. M(G): the minimum number of mergings over all possible Menger s path sets α i s, i = 1, 2,, n. M(c 1, c 2,, c n ): the supremum of M(G) over all possible choices of such G. R 1 S 1 S 2 R 2

53 Previous Work It was first conjectured by Tavory, Feder and Ron that M(c 1, c 2,, c n ) is finite. More specifically the authors proved that if M(c 1, c 2 ) is finite for all c 1, c 2, then M(c 1, c 2,, c n ) is finite as well. As for M, Fragouli and Soljanin use the idea of subtree decomposition to first prove that M (2, 2,, 2) = n 1. }{{} n It was first shown Langberg, Sprintson and Bruck that M (c 1, c 2 ) is finite for all c 1, c 2, and subsequently M (c 1, c 2,, c n ) is finite all c 1, c 2,, c n.

54 Main Results Main Results For fixed c 1, c 2,, c n, M(c 1, c 2,, c n ) and M (c 1, c 2,, c n ) are always finite. And as functions of c 1, c 2,, c n, they have interesting properties. We give exact values of and tighter bounds on M and M with certain parameters.

55 Some Remarks When n = 1, Ford-Fulkerson algorithm can find the min-cut and a set of Menger s path between S 1 and R 1 in polynomial time.

56 Some Remarks When n = 1, Ford-Fulkerson algorithm can find the min-cut and a set of Menger s path between S 1 and R 1 in polynomial time. The LDP (Link Disjoint Problem) asks if there are two edge-disjoint paths from S 1, S 2 to R 1, R 2, respectively. The fact that the LDP problem is NP-complete suggests the intricacy of the problem when n 2.

57 Outline of the Proof Lemma For any c 1, c 2, M(c 1, c 2 ) c 1 c 2 (c 1 + c 2 )/2. Theorem For any c 1, c 2,, c n, we have M(c 1, c 2,, c n ) i<j M(c i, c j ). Observation Note that for any c 1, c 2,, c n, we always have M (c 1, c 2,, c n ) M(c 1, c 2,, c n )

58 A Key Idea If too many mergings:

59 A Key Idea If too many mergings:

60 A Key Idea If too many mergings:

61 A Key Idea If too many mergings:

62 A Key Idea If too many mergings:

63 A Key Idea If too many mergings:

64 A Key Idea If too many mergings:

65 A Key Idea If too many mergings:

66 A Key Idea If too many mergings:

67 Properties of M Proposition For c 1 c 2 c n, if c 1 + c c n 1 c n, then M (c 1, c 2,, c n ) = M (c 1, c 2,, c n 1, c 1 + c c n 1 ). Proposition For c 1 = 1 c 2 c n, we have M (c 1, c 2,, c n ) = M (c 2,, c n 1, c n ). Proposition For n 1 n 2 n k, k 1 M (n 1, n 2,..., n k ) M (n i, n i ). i=1

68 Properties of M Proposition For any c 1,0, c 1,1, c 2, we have M(c 1,0 + c 1,1, c 2 ) M(c 1,0, c 2 ) + M(c 1,1, c 2 ). Proposition For any c 1, c 2,, c n and any fixed k with 1 k n, we have M(c 1, c 2,, c n ) M(c i, c j ). i k,j k+1

69 Properties of M Proposition For any c 1,0, c 1,1, c 2, we have M(c 1,0 + c 1,1, c 2 ) M(c 1,0, c 2 ) + M(c 1,1, c 2 ). Proposition For any c 1, c 2,, c n and any fixed k with 1 k n, we have M(c i, c j ) M(c 1, c 2,, c n ) M(c i, c j ). i<j i k,j k+1

70 Properties of M (cont d) Proposition For any m n, we have where U(m, n) = and m 1 j=1 M(m, n) U(m, n) + V (m, n) + m 2, (M(j, m 1) M(m j, n))+m(m, m 1)+1, m 1 V (m, n) = M(m, n 1)+ (M(j, n) M(m j, n)) M(1, n). j=1

71 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof.

72 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings

73 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings C k mergings

74 Properties of M (cont d) Proposition For any fixed k, there exists a positive constant C k such that for all n, M(k, n) C k n. Proof. C k mergings C k mergings C k mergings

75 Tighter Bounds It has been established [Langberg et al.] that n(n 1)/2 M (n, n) n 3. Next, we give tighter bounds on M (n, n) and M(m, n).

76 Bounds on M Proposition (n 1) 2 M (n, n) n 2 (n 2 4n + 5). Proof. S A graph showing M (3, 3) 4. R 1 R 2

77 Bounds on M Proposition m + n 2 2mn m n+1 M(m, n) (m+n 1)+(mn 2). 2 Proof. S 1 S 2 A graph showing M(2, 2) 5. R 1 R 2

78 Exact Values M (1, 1) = 0. M (2, 2) = 1. M (3, 3) = 4. M (4, 4) = 9. M (5, 5) = 16.

79 Exact Values M (1, 1) = 0. M (m, m) = (m 1) 2? M (2, 2) = 1. M (3, 3) = 4. M (4, 4) = 9. M (5, 5) = 16.

80 Exact Values M (1, 1) = 0. M (m, m) = (m 1) 2? M (2, 2) = 1. M (3, 3) = 4. M (6, 6) = 27! M (4, 4) = 9. M (5, 5) = 16.

81 Exact Values M(1, n) = n. M(2, n) = 3n 1. M(3, 3) = 13. M(3, 4) = 18. M(3, 5) = 23. M(3, 6) = 28. M(4, 4) = 27.

82 Exact Values M (1, 1,, 1) = 0. }{{} n M (2, 2,, 2) = n 1. }{{} n M (2, m, m) = 1 + (m 1) 2, m = 2, 3, 4, 5. M (m, m, m) = 2(m 1) 2, m = 1, 2, 3, 4. M (3, 4, 4) = 13. For m n p and (m, n) (3, 4) or (2, 5) M (m, n, p) = M (m, n, n).

83 Exact Values M(1,..., 1, 2) = }{{} k M(1, 2, n) = k 2 M(1, 1,, 1) =. }{{} 4 k { 3k 1 if k 6, k2 4 + k + 2 if k > 6. M(1, 1, n) = 2n + 1. { 4n if n = 2, 3, 4n + 1 if n = 1 or n 4. M(2, 2, 2) = 11, M(1, 3, 3) = 17, M(2, 2, 3) = 18.

84 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

85 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

86 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

87 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

88 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

89 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

90 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

91 The Finiteness Result Does Not Hold for Cyclic Graphs S R 1 R 2

92 Open Problems Tighter Upper Bounds There exists C > 0 such that for all m, n, M(m, n) Cmn.

93 Open Problems Tighter Upper Bounds There exists C > 0 such that for all m, n, M(m, n) Cmn. Mergings On Other Classes of Graphs undirected graphs, planar graphs, and so on.

94 References L. R. Ford and D. R. Fulkerson Maximal flow through a network. Canadian Journal of Mathematics 8: , C. Fragouli and E. Soljanin. Information Flow Decomposition for Network Coding. IEEE Transactions on Information Theory, Volume 52, Issue 3, March 2006, Page(s): M. Langberg, A. Sprintson, A. and J. Bruck. The encoding complexity of network coding IEEE Transactions on Information Theory, Volume 52, Issue 6, June 2006, Page(s): K. Menger. Zur allgemeinen Kurventhoerie. Fund. Math., 10: A. Tavory, M. Feder and D. Ron. Bounds on Linear Codes for Network Multicast. Electronic Colloquium on Computational Complexity (ECCC), 10(033), Li Xu, Weiping2003. Shang, Guangyue Han

95 Thank You!

On Mergings in Acyclic Directed Graphs

On Mergings in Acyclic Directed Graphs On Mergings in Acyclic Directed Graphs Guangyue Han The University of Hong Kong e-mail: ghan@hku.hk November 24, 2018 Abstract Consider an acyclic directed graph G with sources s 1, s 2,..., s n and sinks

More information

Graph independent field size bounds on failure protecting network codes

Graph independent field size bounds on failure protecting network codes Egerváry Research Group on Combinatorial Optimization Technical reports TR-25-. Published by the Egerváry Research Group, Pázmány P. sétány /C, H 7, Budapest, Hungary. Web site: www.cs.elte.hu/egres. ISSN

More information

Two Applications of Maximum Flow

Two Applications of Maximum Flow Two Applications of Maximum Flow The Bipartite Matching Problem a bipartite graph as a flow network maximum flow and maximum matching alternating paths perfect matchings 2 Circulation with Demands flows

More information

Standard Diraphs the (unique) digraph with no vertices or edges. (modulo n) for every 1 i n A digraph whose underlying graph is a complete graph.

Standard Diraphs the (unique) digraph with no vertices or edges. (modulo n) for every 1 i n A digraph whose underlying graph is a complete graph. 5 Directed Graphs What is a directed graph? Directed Graph: A directed graph, or digraph, D, consists of a set of vertices V (D), a set of edges E(D), and a function which assigns each edge e an ordered

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

New algorithms for Disjoint Paths and Routing Problems

New algorithms for Disjoint Paths and Routing Problems New algorithms for Disjoint Paths and Routing Problems Chandra Chekuri Dept. of Computer Science Univ. of Illinois (UIUC) Menger s Theorem Theorem: The maximum number of s-t edgedisjoint paths in a graph

More information

Testing Equality in Communication Graphs

Testing Equality in Communication Graphs Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected

More information

The partial inverse minimum cut problem with L 1 -norm is strongly NP-hard. Elisabeth Gassner

The partial inverse minimum cut problem with L 1 -norm is strongly NP-hard. Elisabeth Gassner FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung The partial inverse minimum cut problem with L 1 -norm is strongly NP-hard Elisabeth

More information

Maximum flow problem

Maximum flow problem Maximum flow problem 7000 Network flows Network Directed graph G = (V, E) Source node s V, sink node t V Edge capacities: cap : E R 0 Flow: f : E R 0 satisfying 1. Flow conservation constraints e:target(e)=v

More information

arxiv: v1 [math.co] 11 Sep 2018

arxiv: v1 [math.co] 11 Sep 2018 The Undirected Two Disjoint Shortest Paths Problem Marinus Gottschau 1, Marcus Kaiser 1, Clara Waldmann 1 Abstract arxiv:1809.03820v1 [math.co] 11 Sep 2018 The k disjoint shortest paths problem (k-dspp)

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 351 George Voutsadakis (LSSU) Introduction to Graph Theory August 2018 1 /

More information

Acyclic and Oriented Chromatic Numbers of Graphs

Acyclic and Oriented Chromatic Numbers of Graphs Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded

More information

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

Broadcasting With Side Information

Broadcasting With Side Information Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

Balanced bipartitions of graphs

Balanced bipartitions of graphs 2010.7 - Dedicated to Professor Feng Tian on the occasion of his 70th birthday Balanced bipartitions of graphs Baogang Xu School of Mathematical Science, Nanjing Normal University baogxu@njnu.edu.cn or

More information

Algorithms and Theory of Computation. Lecture 11: Network Flow

Algorithms and Theory of Computation. Lecture 11: Network Flow Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a

More information

CSC Design and Analysis of Algorithms. LP Shader Electronics Example

CSC Design and Analysis of Algorithms. LP Shader Electronics Example CSC 80- Design and Analysis of Algorithms Lecture (LP) LP Shader Electronics Example The Shader Electronics Company produces two products:.eclipse, a portable touchscreen digital player; it takes hours

More information

Disconnecting Networks via Node Deletions

Disconnecting Networks via Node Deletions 1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS

More information

Length-Bounded Cuts and Flows

Length-Bounded Cuts and Flows Length-Bounded Cuts and Flows Georg Baier 1,, Thomas Erlebach 2, Alexander Hall 3, Ekkehard Köhler 1, Heiko Schilling 1, and Martin Skutella 4 1 Institute of Mathematics, TU Berlin, Germany 2 Department

More information

Linear codes cannot approximate the network capacity within any constant factor

Linear codes cannot approximate the network capacity within any constant factor Electronic Colloquium on Computational Complexity, Report No. 141 (2014) Linear codes cannot approximate the network capacity within any constant factor Shachar Lovett Computer Science and Engineering

More information

The Capacity of a Network

The Capacity of a Network The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

A note on balanced bipartitions

A note on balanced bipartitions A note on balanced bipartitions Baogang Xu a,, Juan Yan a,b a School of Mathematics and Computer Science Nanjing Normal University, 1 Ninghai Road, Nanjing, 10097, China b College of Mathematics and System

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P

Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Lagrangian

More information

The inefficiency of equilibria

The inefficiency of equilibria The inefficiency of equilibria Chapters 17,18,19 of AGT 3 May 2010 University of Bergen Outline 1 Reminder 2 Potential games 3 Complexity Formalization Like usual, we consider a game with k players {1,...,

More information

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Proc. 4th TAMC, 27 Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Michael Dom, Jiong Guo, and Rolf Niedermeier Institut für Informatik, Friedrich-Schiller-Universität

More information

CSC 373: Algorithm Design and Analysis Lecture 12

CSC 373: Algorithm Design and Analysis Lecture 12 CSC 373: Algorithm Design and Analysis Lecture 12 Allan Borodin February 4, 2013 1 / 16 Lecture 12: Announcements and Outline Announcements Term test 1 in tutorials. Need to use only two rooms due to sickness

More information

Elisabeth Gassner Introduction THE PARTIAL INVERSE MINIMUM CUT PROBLEM WITH L 1 -NORM IS STRONGLY NP-HARD

Elisabeth Gassner Introduction THE PARTIAL INVERSE MINIMUM CUT PROBLEM WITH L 1 -NORM IS STRONGLY NP-HARD RAIRO-Oper. Res. 44 (010) 41 49 DOI: 10.1051/ro/010017 RAIRO Operations Research www.rairo-ro.org THE PARTIAL INVERSE MINIMUM CUT PROBLEM WITH L 1 -NORM IS STRONGLY NP-HARD Elisabeth Gassner 1 Abstract.

More information

Low Complexity Encoding for Network Codes

Low Complexity Encoding for Network Codes Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Selected partial inverse combinatorial optimization problems with forbidden elements. Elisabeth Gassner

Selected partial inverse combinatorial optimization problems with forbidden elements. Elisabeth Gassner FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Selected partial inverse combinatorial optimization problems with forbidden elements

More information

On Acyclicity of Games with Cycles

On Acyclicity of Games with Cycles On Acyclicity of Games with Cycles Daniel Andersson, Vladimir Gurvich, and Thomas Dueholm Hansen Dept. of Computer Science, Aarhus University, {koda,tdh}@cs.au.dk RUTCOR, Rutgers University, gurvich@rutcor.rutgers.edu

More information

Graph Theory and Optimization Computational Complexity (in brief)

Graph Theory and Optimization Computational Complexity (in brief) Graph Theory and Optimization Computational Complexity (in brief) Nicolas Nisse Inria, France Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, Sophia Antipolis, France September 2015 N. Nisse Graph Theory

More information

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Computing the Hull Number of Chordal and Distance-Hereditary Graphs. LIMOS - Université Blaise Pascal SOFSEM 2013

Computing the Hull Number of Chordal and Distance-Hereditary Graphs. LIMOS - Université Blaise Pascal SOFSEM 2013 Computing the Hull Number of Chordal and Distance-Hereditary Graphs Mamadou M. Kanté Lhouari Nourine LIMOS - Université Blaise Pascal SOFSEM 20 Betweenness Relations A betweenness on a ground set V is

More information

Spanning Paths in Infinite Planar Graphs

Spanning Paths in Infinite Planar Graphs Spanning Paths in Infinite Planar Graphs Nathaniel Dean AT&T, ROOM 2C-415 600 MOUNTAIN AVENUE MURRAY HILL, NEW JERSEY 07974-0636, USA Robin Thomas* Xingxing Yu SCHOOL OF MATHEMATICS GEORGIA INSTITUTE OF

More information

IE418 Integer Programming

IE418 Integer Programming IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 23rd February 2005 The Ingredients Some Easy Problems The Hard Problems Computational Complexity The ingredients

More information

Constructing c-ary Perfect Factors

Constructing c-ary Perfect Factors Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:

More information

Lecture 8 Network Optimization Algorithms

Lecture 8 Network Optimization Algorithms Advanced Algorithms Floriano Zini Free University of Bozen-Bolzano Faculty of Computer Science Academic Year 2013-2014 Lecture 8 Network Optimization Algorithms 1 21/01/14 Introduction Network models have

More information

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology. 1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations

More information

Nowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E.

Nowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E. Nowhere zero flow Definition: A flow on a graph G = (V, E) is a pair (D, f) such that 1. D is an orientation of G. 2. f is a function on E. 3. u N + D (v) f(uv) = w ND f(vw) for every (v) v V. Example:

More information

Maximum Integer Flows in Directed Planar Graphs with Multiple Sources and Sinks and Vertex Capacities

Maximum Integer Flows in Directed Planar Graphs with Multiple Sources and Sinks and Vertex Capacities Maximum Integer Flows in Directed Planar Graphs with Multiple Sources and Sinks and Vertex Capacities Yipu Wang University of Illinois at Urbana-Champaign ywang298@illinois.edu July 12, 2018 Abstract We

More information

Chih-Hung Yen and Hung-Lin Fu 1. INTRODUCTION

Chih-Hung Yen and Hung-Lin Fu 1. INTRODUCTION TAIWANESE JOURNAL OF MATHEMATICS Vol. 14, No. 1, pp. 273-286, February 2010 This paper is available online at http://www.tjm.nsysu.edu.tw/ LINEAR 2-ARBORICITY OF THE COMPLETE GRAPH Chih-Hung Yen and Hung-Lin

More information

Energy minimization via graph-cuts

Energy minimization via graph-cuts Energy minimization via graph-cuts Nikos Komodakis Ecole des Ponts ParisTech, LIGM Traitement de l information et vision artificielle Binary energy minimization We will first consider binary MRFs: Graph

More information

CMPSCI 611: Advanced Algorithms

CMPSCI 611: Advanced Algorithms CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and

More information

Existence of Nash Networks in One-Way Flow Models

Existence of Nash Networks in One-Way Flow Models Existence of Nash Networks in One-Way Flow Models pascal billand a, christophe bravard a, sudipta sarangi b a CREUSET, Jean Monnet University, Saint-Etienne, France. email: pascal.billand@univ-st-etienne.fr

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

Connectivity and Menger s theorems

Connectivity and Menger s theorems Connectiity and Menger s theorems We hae seen a measre of connectiity that is based on inlnerability to deletions (be it tcs or edges). There is another reasonable measre of connectiity based on the mltiplicity

More information

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A. E. Brouwer & W. H. Haemers 2008-02-28 Abstract We show that if µ j is the j-th largest Laplacian eigenvalue, and d

More information

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1 CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve

More information

COMPUTING GRAPH ROOTS WITHOUT SHORT CYCLES

COMPUTING GRAPH ROOTS WITHOUT SHORT CYCLES Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp. 397 408 www.stacs-conf.org COMPUTING GRAPH ROOTS WITHOUT SHORT CYCLES BABAK FARZAD 1 AND LAP CHI LAU 2 AND VAN BANG LE 3 AND NGUYEN

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

Lecture 13 Spectral Graph Algorithms

Lecture 13 Spectral Graph Algorithms COMS 995-3: Advanced Algorithms March 6, 7 Lecture 3 Spectral Graph Algorithms Instructor: Alex Andoni Scribe: Srikar Varadaraj Introduction Today s topics: Finish proof from last lecture Example of random

More information

Introduction 1.1 PROBLEM FORMULATION

Introduction 1.1 PROBLEM FORMULATION Introduction. PROBLEM FORMULATION This book deals with a single type of network optimization problem with linear cost, known as the transshipment or minimum cost flow problem. In this section, we formulate

More information

Martin Milanič

Martin Milanič 1 / 75 Algorithmic Graph Theory Part I - Review of Basic Notions in Graph Theory, Algorithms and Complexity Martin Milanič martin.milanic@upr.si University of Primorska, Koper, Slovenia Dipartimento di

More information

Tree-width and planar minors

Tree-width and planar minors Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.

More information

Reachability of recurrent positions in the chip-firing game

Reachability of recurrent positions in the chip-firing game Egerváry Research Group on Combinatorial Optimization Technical reports TR-2015-10. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

Edge-Disjoint Paths in Planar Graphs with Constant Congestion

Edge-Disjoint Paths in Planar Graphs with Constant Congestion Edge-Disjoint Paths in Planar Graphs with Constant Congestion Chandra Chekuri Sanjeev Khanna F. Bruce Shepherd November 8, 2006 Abstract We study the maximum edge-disjoint paths problem in undirected planar

More information

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory 1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas

More information

Linear Index Codes are Optimal Up To Five Nodes

Linear Index Codes are Optimal Up To Five Nodes Linear Index Codes are Optimal Up To Five Nodes Lawrence Ong The University of Newcastle, Australia March 05 BIRS Workshop: Between Shannon and Hamming: Network Information Theory and Combinatorics Unicast

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Robin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA

Robin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA Odd K 3,3 subdivisions in bipartite graphs 1 Robin Thomas and Peter Whalen School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA Abstract We prove that every internally

More information

Reverse Edge Cut-Set Bounds for Secure Network Coding

Reverse Edge Cut-Set Bounds for Secure Network Coding Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology

More information

Fall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017

Fall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017 Fall 2017 Qualifier Exam: OPTIMIZATION September 18, 2017 GENERAL INSTRUCTIONS: 1 Answer each question in a separate book 2 Indicate on the cover of each book the area of the exam, your code number, and

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH. P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA. and

GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH. P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA. and GRAPH SEARCHING, AND A MIN-MAX THEOREM FOR TREE-WIDTH P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA and Robin Thomas* School of Mathematics Georgia Institute of Technology Atlanta,

More information

Acyclic subgraphs with high chromatic number

Acyclic subgraphs with high chromatic number Acyclic subgraphs with high chromatic number Safwat Nassar Raphael Yuster Abstract For an oriented graph G, let f(g) denote the maximum chromatic number of an acyclic subgraph of G. Let f(n) be the smallest

More information

Randomized Coordinate Descent Methods on Optimization Problems with Linearly Coupled Constraints

Randomized Coordinate Descent Methods on Optimization Problems with Linearly Coupled Constraints Randomized Coordinate Descent Methods on Optimization Problems with Linearly Coupled Constraints By I. Necoara, Y. Nesterov, and F. Glineur Lijun Xu Optimization Group Meeting November 27, 2012 Outline

More information

A Cubic-Vertex Kernel for Flip Consensus Tree

A Cubic-Vertex Kernel for Flip Consensus Tree To appear in Algorithmica A Cubic-Vertex Kernel for Flip Consensus Tree Christian Komusiewicz Johannes Uhlmann Received: date / Accepted: date Abstract Given a bipartite graph G = (V c, V t, E) and a nonnegative

More information

4. How to prove a problem is NPC

4. How to prove a problem is NPC The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation

More information

Acyclic Digraphs arising from Complete Intersections

Acyclic Digraphs arising from Complete Intersections Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine

More information

Note on group distance magic complete bipartite graphs

Note on group distance magic complete bipartite graphs Cent. Eur. J. Math. 12(3) 2014 529-533 DOI: 10.2478/s11533-013-0356-z Central European Journal of Mathematics Note on group distance magic complete bipartite graphs Research Article Sylwia Cichacz 1 1

More information

P versus NP. Math 40210, Spring April 8, Math (Spring 2012) P versus NP April 8, / 9

P versus NP. Math 40210, Spring April 8, Math (Spring 2012) P versus NP April 8, / 9 P versus NP Math 40210, Spring 2014 April 8, 2014 Math 40210 (Spring 2012) P versus NP April 8, 2014 1 / 9 Properties of graphs A property of a graph is anything that can be described without referring

More information

k-distinct In- and Out-Branchings in Digraphs

k-distinct In- and Out-Branchings in Digraphs k-distinct In- and Out-Branchings in Digraphs Gregory Gutin 1, Felix Reidl 2, and Magnus Wahlström 1 arxiv:1612.03607v2 [cs.ds] 21 Apr 2017 1 Royal Holloway, University of London, UK 2 North Carolina State

More information

Cleaning Interval Graphs

Cleaning Interval Graphs Cleaning Interval Graphs Dániel Marx and Ildikó Schlotter Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. {dmarx,ildi}@cs.bme.hu

More information

Markovian Combination of Decomposable Model Structures: MCMoSt

Markovian Combination of Decomposable Model Structures: MCMoSt Markovian Combination 1/45 London Math Society Durham Symposium on Mathematical Aspects of Graphical Models. June 30 - July, 2008 Markovian Combination of Decomposable Model Structures: MCMoSt Sung-Ho

More information

A Brooks-Type Theorem for the Bandwidth of Interval Graphs

A Brooks-Type Theorem for the Bandwidth of Interval Graphs A Brooks-Type Theorem for the Bandwidth of Interval Graphs Mitchel T. Keller a, Stephen J. Young b a School of Mathematics, Georgia Institute of Technology, Atlanta, Georgia 3033-0160 U.S.A. b School of

More information

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Opuscula Mathematica Vol. 6 No. 006 Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Abstract. A graph is equitably k-colorable if its vertices can be partitioned into k independent sets in such a

More information

Group connectivity of certain graphs

Group connectivity of certain graphs Group connectivity of certain graphs Jingjing Chen, Elaine Eschen, Hong-Jian Lai May 16, 2005 Abstract Let G be an undirected graph, A be an (additive) Abelian group and A = A {0}. A graph G is A-connected

More information

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles

More information

arxiv: v1 [cs.ds] 11 Oct 2018

arxiv: v1 [cs.ds] 11 Oct 2018 Path matrix and path energy of graphs arxiv:1810.04870v1 [cs.ds] 11 Oct 018 Aleksandar Ilić Facebook Inc, Menlo Park, California, USA e-mail: aleksandari@gmail.com Milan Bašić Faculty of Sciences and Mathematics,

More information

On designs and Steiner systems over finite fields

On designs and Steiner systems over finite fields On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013 Outline

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

Ringing the Changes II

Ringing the Changes II Ringing the Changes II Cayley Color Graphs Let G be a group and H a subset of G. We define a Cayley digraph (directed graph) by: Each element of G is a vertex of the digraph Γ and an arc is drawn from

More information

Mathematics for Decision Making: An Introduction. Lecture 13

Mathematics for Decision Making: An Introduction. Lecture 13 Mathematics for Decision Making: An Introduction Lecture 13 Matthias Köppe UC Davis, Mathematics February 17, 2009 13 1 Reminder: Flows in networks General structure: Flows in networks In general, consider

More information

Notions of Connectivity in Overlay Networks

Notions of Connectivity in Overlay Networks Notions of Connectivity in Overlay Networks Yuval Emek 1, Pierre Fraigniaud 2, Amos Korman 2, Shay Kutten 3, and avid Peleg 4 1 ETH Zurich, Zurich, Switzerland. yuval.emek@tik.ee.ethz.ch 2 CNRS and University

More information

Packing triangles in regular tournaments

Packing triangles in regular tournaments Packing triangles in regular tournaments Raphael Yuster Abstract We prove that a regular tournament with n vertices has more than n2 11.5 (1 o(1)) pairwise arc-disjoint directed triangles. On the other

More information

RECAP: Extremal problems Examples

RECAP: Extremal problems Examples RECAP: Extremal problems Examples Proposition 1. If G is an n-vertex graph with at most n edges then G is disconnected. A Question you always have to ask: Can we improve on this proposition? Answer. NO!

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H

More information

ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS

ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS WALTER D. MORRIS, JR. ABSTRACT. We call a directed acyclic graph a CIdigraph if a certain affine semigroup ring defined by it is a complete intersection.

More information

Paths, cycles, trees and sub(di)graphs in directed graphs

Paths, cycles, trees and sub(di)graphs in directed graphs Paths, cycles, trees and sub(di)graphs in directed graphs Jørgen Bang-Jensen University of Southern Denmark Odense, Denmark Paths, cycles, trees and sub(di)graphs in directed graphs p. 1/53 Longest paths

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

A Tiling and (0, 1)-Matrix Existence Problem

A Tiling and (0, 1)-Matrix Existence Problem A Tiling and (0, )-Matrix Existence Problem Curtis G Nelson University of Wyoming Advisor: Dr. Bryan Shader July 24, 205 A (0, )-Matrix and Tiling Problem Let R = (r, r 2,..., r m, r m+ = 0) and S = (s,

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &

More information