Network Flow Interdiction on Planar Graphs

Size: px
Start display at page:

Download "Network Flow Interdiction on Planar Graphs"

Transcription

1 Network Flow Interdiction on Planar Graphs Rico Zenklusen Institute for Operations Research, D MATH, ETH Zurich rico.zenklusen@ifor.math.ethz.ch Optimization and Applications Seminar, Zurich, March 10, 2008

2 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions Outline 2 / 29

3 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

4 Robustness of flow networks How sensitive is the value of a maximum flow in a network with respect to failures of arcs? Nature of arc failures 1 Random failure network flow reliability Generalization of the s-t reliability problem #P-complete problems Typically, Monte-Carlo methods are used to get estimates of interesting probabilities 2 Worst-case failure network flow interdiction Introduction Definition and Motivation 3 / 29

5 Robustness of flow networks How sensitive is the value of a maximum flow in a network with respect to failures of arcs? Nature of arc failures 1 Random failure network flow reliability Generalization of the s-t reliability problem #P-complete problems Typically, Monte-Carlo methods are used to get estimates of interesting probabilities 2 Worst-case failure network flow interdiction Introduction Definition and Motivation 3 / 29

6 Network flow interdiction Input: Directed network G = (V, E, u, c) with capacities u : E N and interdiction costs c : V E N Fixed budget B N Output: ν max B (G) := min{νmax (G \ R) R V E, c(r) B} ν max (G) :=value of max flow in G Introduction Definition and Motivation 4 / 29

7 Network flow interdiction Input: Directed network G = (V, E, u, c) with capacities u : E N and interdiction costs c : V E N Fixed budget B N Output: ν max B (G) := min{νmax (G \ R) R V E, c(r) B} ν max (G) :=value of max flow in G Introduction Definition and Motivation 4 / 29

8 Network flow interdiction Input: Directed network G = (V, E, u, c) with capacities u : E N and interdiction costs c : V E N Fixed budget B N Output: ν max B (G) := min{νmax (G \ R) R V E, c(r) B} ν max (G) :=value of max flow in G ν max (G) = ν max 0 (G) = 10 Introduction Definition and Motivation 4 / 29

9 Network flow interdiction Input: Directed network G = (V, E, u, c) with capacities u : E N and interdiction costs c : V E N Fixed budget B N Output: ν max B (G) := min{νmax (G \ R) R V E, c(r) B} ν max (G) :=value of max flow in G ν max (G) = ν max 0 (G) = 10 B = 5 ν max B (G) = 4 Introduction Definition and Motivation 4 / 29

10 Network flow interdiction Network interdiction models in scientific literature Drug interdiction [Wood, 1993] Military planning [Ghare, Montgomery, and Turner, 1971] Protecting electric power grids against terrorist attacks [Salmeron, Wood, and Baldick, 2004] Hospital infection control [Assimakopoulos, 1987] Introduction Definition and Motivation 5 / 29

11 Network flow interdiction Network interdiction models in scientific literature Drug interdiction [Wood, 1993] Military planning [Ghare, Montgomery, and Turner, 1971] Protecting electric power grids against terrorist attacks [Salmeron, Wood, and Baldick, 2004] Hospital infection control [Assimakopoulos, 1987] Introduction Definition and Motivation 5 / 29

12 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

13 Simple NP-completeness proof Reduction from Knapsack Problem. Input: n items with volumes {w 1,..., w n } and utilities {α 1,..., α n } Output: max{ i I α i I {1,..., n}, i I w i W } Introduction Complexity results 6 / 29

14 Simple NP-completeness proof Reduction from Knapsack Problem. Input: n items with volumes {w 1,..., w n } and utilities {α 1,..., α n } Output: max{ i I α i I {1,..., n}, i I w i W } max{ i I α i I {1,..., n}, i I w i W } = ν max (G) νw max(g) Introduction Complexity results 6 / 29

15 Simple NP-completeness proof Reduction from Knapsack Problem. Input: n items with volumes {w 1,..., w n } and utilities {α 1,..., α n } Output: max{ i I α i I {1,..., n}, i I w i W } max{ i I α i I {1,..., n}, i I w i W } = ν max (G) νw max(g) Is network interdiction even strongly NP-complete? Introduction Complexity results 6 / 29

16 Strong NP-completeness ([Wood, 1993] simplified) Reduction from Max Clique. clique C in G with size k ν max (G ) ν max k (G ) = ( ) k 2 Introduction Complexity results 7 / 29

17 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

18 Some progress on planar graphs On planar networks, progresses were achieved by transforming the network interdiction problem to the planar dual. Pseudo-polynomial algorithm when the following conditions are satisfied simultaneously ([Phillips, 1993]): planar (undirected) network single source and sink no vertex removals Introduction Current state of the art 8 / 29

19 s-t planar graphs Correspondence Elementary s-t cuts in G paths from s D to t D in G Value of cut equals dual length (λ ) of corresponding dual path. Introduction Current state of the art 9 / 29

20 Pseudo-polyn. algorithm for s-t planar graphs (Translation of the network interdiction problem onto the dual) Definition (Reduced length with respect to B) Let U E. λ B (U ) = min (U \ X ) c (X ) B} X E {λ Theorem ν max B (G) = min{λ B (P ) P path from s D to t D } Introduction Current state of the art 10 / 29

21 Reduction to multi-objective shortest path problem (MOSP) ν max B (G) = min{λ (P ) P path from s D to t D in G, c (P ) B} Introduction Current state of the art 11 / 29

22 General planar case (with a single source & sink) Correspondence s-t cuts in G counterclockwise s-t separating circuits Introduction Current state of the art 12 / 29

23 Characterizing countercl.w. s-t sep. circuits P: path from s to t in G P D = {e D e P} PR D = {ed R e P} Definition (Parity w.r.t. P) pp(u ) = U P D U PR D Theorem Let C be a circuit in G. C is counterclockwise s-t sep. p P (C ) = 1 Introduction Current state of the art 13 / 29

24 Characterizing countercl.w. s-t sep. circuits P: path from s to t in G P D = {e D e P} PR D = {ed R e P} Definition (Parity w.r.t. P) pp(u ) = U P D U PR D Theorem Let C be a circuit in G. C is counterclockwise s-t sep. p P (C ) = 1 Introduction Current state of the art 13 / 29

25 Characterizing countercl.w. s-t sep. circuits P: path from s to t in G P D = {e D e P} PR D = {ed R e P} Definition (Parity w.r.t. P) pp(u ) = U P D U PR D Theorem Let C be a circuit in G. C is counterclockwise s-t sep. p P (C ) = 1 Introduction Current state of the art 13 / 29

26 Transformation to MOSP problem ν max B (G) = min{λ B (C ) C circuit in G, p P (C ) = 1} Transformation is done as in the s-t planar case with an additional objective: parity. Again, the corresponding MOSP problem can be solved in pseudo-polynomial time by dynamic programming. Introduction Current state of the art 14 / 29

27 Restrictions of current pseudo-poly. algorithms (apart from planarity of the underlying graph) Vertex capacities cannot be modeled Vertex interdiction is not allowed Bound to a single source and single sink Vertex interdiction and vertex capacities are typically modeled by doubling the vertices. Multiple sources and sinks can be reduced to a single source & sink by introduction of a supersource and supersink. However, these constructions destroy planarity. Introduction Current state of the art 15 / 29

28 Restrictions of current pseudo-poly. algorithms (apart from planarity of the underlying graph) Vertex capacities cannot be modeled Vertex interdiction is not allowed Bound to a single source and single sink Vertex interdiction and vertex capacities are typically modeled by doubling the vertices. Multiple sources and sinks can be reduced to a single source & sink by introduction of a supersource and supersink. However, these constructions destroy planarity. Introduction Current state of the art 15 / 29

29 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

30 Generalizing s-t cuts Extensions to planar network interdiction Vertex interdiction and vertex capacities 16 / 29

31 Generalizing s-t cuts Extensions to planar network interdiction Vertex interdiction and vertex capacities 16 / 29

32 Generalizing s-t cuts Definition (s-t separating set) Q V E is an s-t separating set (in G) if there is no path from s to t in G \ Q. Furthermore, the reduced value of Q is defined by u B (Q) := min{u(q \ X ) X Q, c(x ) B} (convention: u(v) = v V ). Extensions to planar network interdiction Vertex interdiction and vertex capacities 16 / 29

33 Generalizing s-t cuts Definition (s-t separating set) Q V E is an s-t separating set (in G) if there is no path from s to t in G \ Q. Furthermore, the reduced value of Q is defined by u B (Q) := min{u(q \ X ) X Q, c(x ) B} (convention: u(v) = v V ). ν max B (G) = min{u B (Q) Q s-t separating set in G} Extensions to planar network interdiction Vertex interdiction and vertex capacities 16 / 29

34 Adapting the dual network Extensions to planar network interdiction Vertex interdiction and vertex capacities 17 / 29

35 Adapting the dual network Extensions to planar network interdiction Vertex interdiction and vertex capacities 17 / 29

36 Adapting the dual network Correspondence (between s-t sep. sets in G and countercl.w. s-t sep. circuits in G) Q C (Q) Q( C ) C Extensions to planar network interdiction Vertex interdiction and vertex capacities 17 / 29

37 Adapting the dual network Correspondence (between s-t sep. sets in G and countercl.w. s-t sep. circuits in G) Q C (Q) Q( C ) C Extensions to planar network interdiction Vertex interdiction and vertex capacities 17 / 29

38 Adapting the dual network Correspondence (between s-t sep. sets in G and countercl.w. s-t sep. circuits in G) Q C (Q) Q( C ) C Extensions to planar network interdiction Vertex interdiction and vertex capacities 17 / 29

39 Correspondence between reduced values G = (Ṽ = V V, Ẽ = E Ê, λ, c, p P ) where λ, c and p P are extensions of λ, c and p P. Extensions to planar network interdiction Vertex interdiction and vertex capacities 18 / 29

40 Correspondence between reduced values (2) Relations between G and G i) Q s-t separating sets in G u max B (Q) λ B ( C (Q)). ii) C counterclockwise s-t separating circuit in G u max (G \ Q( C )) λ B ( C ) The problem can be solved as in the case without vertex interdiction by transformation to a MOSP. Extensions to planar network interdiction Vertex interdiction and vertex capacities 19 / 29

41 Vertex capacities Vertex capacities can easily be included into the model by a slight modification of the extended dual graph. Extensions to planar network interdiction Vertex interdiction and vertex capacities 20 / 29

42 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

43 The network flow security problem (To simplify explanations we consider the case without vertex removal.) Input: Interdiction network G = (V, E, u, c) Sources S V, sinks T V \ S Demand d : V Z with d(s) = d(t ) (d(s) < 0 s S, d(t) > 0 t T ) Output: min{b νb max(g) < νmax (G)} When dealing with unit interdiction cost, the network flow security problem corresponds to determining if a network is n k secure. Extensions to planar network interdiction Multiple sources and sinks 21 / 29

44 The network flow security problem (To simplify explanations we consider the case without vertex removal.) Input: Interdiction network G = (V, E, u, c) Sources S V, sinks T V \ S Demand d : V Z with d(s) = d(t ) (d(s) < 0 s S, d(t) > 0 t T ) Output: min{b νb max(g) < νmax (G)} When dealing with unit interdiction cost, the network flow security problem corresponds to determining if a network is n k secure. Extensions to planar network interdiction Multiple sources and sinks 21 / 29

45 Relation with network interdiction The network flow security problem (NFSP) and single source & sink network flow interdiction problem (SSSNFIP) can easily be reduced to each other on general (not necessarily planar) graphs. NFSP SSSNFIP: SSSNFIP NFSP: Binary search over budget. Binary search over capacity of the sink. However on planar graphs no poly. reduction NFSP SSSNFIP is known. On planar networks NFSP can be seen as a generalization of SSSNFIP. Extensions to planar network interdiction Multiple sources and sinks 22 / 29

46 Relation with network interdiction The network flow security problem (NFSP) and single source & sink network flow interdiction problem (SSSNFIP) can easily be reduced to each other on general (not necessarily planar) graphs. NFSP SSSNFIP: SSSNFIP NFSP: Binary search over budget. Binary search over capacity of the sink. However on planar graphs no poly. reduction NFSP SSSNFIP is known. On planar networks NFSP can be seen as a generalization of SSSNFIP. Extensions to planar network interdiction Multiple sources and sinks 22 / 29

47 Pseudo-polynomial algorithm for planar NFSP 1 Transform the problem into a interdiction problem on flow circulations by sending flow from the sources to the sinks on artificial arcs. 2 Reformulate the problem on a dual network that allows to incorporate lower bounds on capacities and transform it to a MOSP. Extensions to planar network interdiction Multiple sources and sinks 23 / 29

48 1. Passage to interd. problem on circulations Extensions to planar network interdiction Multiple sources and sinks 24 / 29

49 1. Passage to interd. problem on circulations Extensions to planar network interdiction Multiple sources and sinks 24 / 29

50 1. Passage to interd. problem on circulations û and ĉ are extensions of u and c with ĉ(ê) = ê T. Extensions to planar network interdiction Multiple sources and sinks 24 / 29

51 1. Passage to interd. problem on circulations û and ĉ are extensions of u and c with ĉ(ê) = ê T. For every interdiction set R E we have: There is a saturating flow in G \ R There is a circulation in Ĝ \ R. Extensions to planar network interdiction Multiple sources and sinks 24 / 29

52 2a. Incorporating lower bounds into the dual Theorem ([Miller and Naor, 1995]) Ĝ admits a valid circulation. Ĝ contains no negative circuit. Extensions to planar network interdiction Multiple sources and sinks 25 / 29

53 2a. Incorporating lower bounds into the dual Theorem ([Miller and Naor, 1995]) Ĝ admits a valid circulation. Ĝ contains no negative circuit. Extensions to planar network interdiction Multiple sources and sinks 25 / 29

54 2b. Transformation to MOSP The theorem of Miller & Naor can easily be extended to include the possibility of interdiction. Theorem ν max B (G) < 0 circuit Ĉ in Ĝ such that λ B(Ĉ ) < 0 Finding a circuit with negative reduced length in Ĝ can be transformed into a MOSP similar to the previous problems. Extensions to planar network interdiction Multiple sources and sinks 26 / 29

55 Outline 1 Introduction Definition and Motivation Complexity results Current state of the art 2 Extensions to planar network interdiction Vertex interdiction and vertex capacities Network flow security with multiple sources and sinks Final thoughts on complexity of planar network interdiction 3 Conclusions

56 Complexity for NFIP with mult. sources/sinks Is network interdiction on planar graphs with multiple sources and sinks strongly NP-complete? Extensions to planar network interdiction Complexity revisited 27 / 29

57 Complexity for NFIP with mult. sources/sinks Is network interdiction on planar graphs with multiple sources and sinks strongly NP-complete? We do not know. Extensions to planar network interdiction Complexity revisited 27 / 29

58 Complexity for NFIP with mult. sources/sinks Is network interdiction on planar graphs with multiple sources and sinks strongly NP-complete? We do not know. But it is at least as difficult as finding dense subgraphs of planar graphs (whose complexity is also a long standing open problem). Extensions to planar network interdiction Complexity revisited 27 / 29

59 Reducing k-densest subgraph problem to NFIP k-densest subgraph problem on planar graphs: Input: Undirected planar graph G = (V, E), k N Output: max{#edges in G[V ] V V, V = k} max{#edges in G[V ] V V, V = k} = ν max (G ) ν max k (G ) Extensions to planar network interdiction Complexity revisited 28 / 29

60 Reducing k-densest subgraph problem to NFIP k-densest subgraph problem on planar graphs: Input: Undirected planar graph G = (V, E), k N Output: max{#edges in G[V ] V V, V = k} max{#edges in G[V ] V V, V = k} = ν max (G ) ν max k (G ) Extensions to planar network interdiction Complexity revisited 28 / 29

61 Conclusions Network interdiction is strongly NP-complete. Pseudo-polynomial algorithms were only available for (undirected) planar graphs with a single source & sink and without vertex interdiction. Pseudo-polynomial algorithms on directed planar graphs for the following extensions were presented: Vertex interdiction & vertex capacities Multiple sources and sinks in the context of network security. Hardness-result/algorithm is missing for network interdiction on planar graphs with multiple sources and sinks. The problem is at least as hard as the k-densest subgraph problem on planar graphs. Conclusions 29 / 29

62 References I N. Assimakopoulos. A network interdiction model for hospital infection control. Computers in biology and medicine, 17(6): , P. M. Ghare, D. C. Montgomery, and W. C. Turner. Optimal interdiction policy for a flow network. Naval Research Logistics Quarterly, 18:37 45, G. L. Miller and J. Naor. Flow in planar graphs with multiple sources and sinks. SIAM J. Comput., 24(5): , ISSN doi: Conclusions 30 / 29

63 References II C. A. Phillips. The network inhibition problem. In STOC 93: Proceedings of the twenty-fifth annual ACM symposium on Theory of computing, pages , New York, NY, USA, ACM Press. ISBN doi: J. Salmeron, K. Wood, and R. Baldick. Analysis of electric grid security under terrorist thread. IEEE Transaction on Power Systems, 19(2): , R. K. Wood. Deterministic network interdiction. Mathematical and Computer Modeling, 17(2):1 18, Conclusions 31 / 29

Algorithmic complexity of two defence budget problems

Algorithmic complexity of two defence budget problems 21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence

More information

Mathematics for Decision Making: An Introduction. Lecture 18

Mathematics for Decision Making: An Introduction. Lecture 18 Mathematics for Decision Making: An Introduction Lecture 18 Matthias Köppe UC Davis, Mathematics March 5, 2009 18 1 Augmenting Circuit Algorithm for Min Cost Flow Augmenting Circuit Algorithm, Kantoróvich

More information

arxiv: v2 [cs.dm] 28 Dec 2010

arxiv: v2 [cs.dm] 28 Dec 2010 Multiple-source multiple-sink maximum flow in planar graphs Yahav Nussbaum arxiv:1012.4767v2 [cs.dm] 28 Dec 2010 Abstract In this paper we show an O(n 3/2 log 2 n) time algorithm for finding a maximum

More information

arxiv: v2 [cs.cc] 29 Mar 2010

arxiv: v2 [cs.cc] 29 Mar 2010 On a variant of Monotone NAE-3SAT and the Triangle-Free Cut problem. arxiv:1003.3704v2 [cs.cc] 29 Mar 2010 Peiyush Jain, Microsoft Corporation. June 28, 2018 Abstract In this paper we define a restricted

More information

arxiv: v2 [cs.ds] 14 Sep 2010

arxiv: v2 [cs.ds] 14 Sep 2010 Multiple-source single-sink maximum flow in directed planar graphs in O(n 1.5 log n) time arxiv:1008.5332v2 [cs.ds] 14 Sep 2010 Philip N. Klein and Shay Mozes Brown University October 28, 2018 Abstract

More information

Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

More information

Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems

Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Local Search Approximation Algorithms for the Complement of the Min-k-Cut Problems Wenxing Zhu, Chuanyin Guo Center for Discrete Mathematics and Theoretical Computer Science, Fuzhou University, Fuzhou

More information

An FPTAS for minimizing the product of two non-negative linear cost functions

An FPTAS for minimizing the product of two non-negative linear cost functions Math. Program., Ser. A DOI 10.1007/s10107-009-0287-4 SHORT COMMUNICATION An FPTAS for minimizing the product of two non-negative linear cost functions Vineet Goyal Latife Genc-Kaya R. Ravi Received: 2

More information

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec. Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming

More information

Algorithms for finding the minimum cycle mean in the weighted directed graph

Algorithms for finding the minimum cycle mean in the weighted directed graph Computer Science Journal of Moldova, vol.6, no.1(16), 1998 Algorithms for finding the minimum cycle mean in the weighted directed graph D. Lozovanu C. Petic Abstract In this paper we study the problem

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

1 Introduction and Results

1 Introduction and Results On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br

More information

Testing Isomorphism of Strongly Regular Graphs

Testing Isomorphism of Strongly Regular Graphs Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which

More information

Partha Sarathi Mandal

Partha Sarathi Mandal MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.

More information

Network flows and Menger s theorem

Network flows and Menger s theorem Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality

More information

On the logspace shortest path problem

On the logspace shortest path problem Electronic Colloquium on Computational Complexity, Report No. 3 (2016) On the logspace shortest path problem Boris Brimkov and Illya V. Hicks Computational & Applied Mathematics, Rice University, Houston,

More information

A TIGHT BOUND ON THE LENGTH OF ODD CYCLES IN THE INCOMPATIBILITY GRAPH OF A NON-C1P MATRIX

A TIGHT BOUND ON THE LENGTH OF ODD CYCLES IN THE INCOMPATIBILITY GRAPH OF A NON-C1P MATRIX A TIGHT BOUND ON THE LENGTH OF ODD CYCLES IN THE INCOMPATIBILITY GRAPH OF A NON-C1P MATRIX MEHRNOUSH MALEKESMAEILI, CEDRIC CHAUVE, AND TAMON STEPHEN Abstract. A binary matrix has the consecutive ones property

More information

Fractal Graph Optimization Algorithms

Fractal Graph Optimization Algorithms Fractal Graph Optimization Algorithms James R. Riehl and João P. Hespanha Abstract We introduce methods of hierarchically decomposing three types of graph optimization problems: all-pairs shortest path,

More information

CSCI 5454 Ramdomized Min Cut

CSCI 5454 Ramdomized Min Cut CSCI 5454 Ramdomized Min Cut Sean Wiese, Ramya Nair April 8, 013 1 Randomized Minimum Cut A classic problem in computer science is finding the minimum cut of an undirected graph. If we are presented with

More information

Expected Approximation Guarantees for the Demand Matching Problem

Expected Approximation Guarantees for the Demand Matching Problem Expected Approximation Guarantees for the Demand Matching Problem C. Boucher D. Loker September 2006 Abstract The objective of the demand matching problem is to obtain the subset M of edges which is feasible

More information

CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri

CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture

More information

The Prospects for Sub-Exponential Time

The Prospects for Sub-Exponential Time The Prospects for Sub-Exponential Time Thomas E. O'Neil Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract This paper provides a survey of some

More information

How Hard Is Inference for Structured Prediction?

How Hard Is Inference for Structured Prediction? How Hard Is Inference for Structured Prediction? Tim Roughgarden (Stanford University) joint work with Amir Globerson (Tel Aviv), David Sontag (NYU), and Cafer Yildirum (NYU) 1 Structured Prediction structured

More information

Eulerian disjoint paths problem in grid graphs is NP-complete

Eulerian disjoint paths problem in grid graphs is NP-complete Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information

More information

Comparing the strength of query types in property testing: The case of testing k-colorability

Comparing the strength of query types in property testing: The case of testing k-colorability Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron Abstract We study the power of four query models

More information

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks

Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Jianping Li Email: jianping@ynu.edu.cn Department of Mathematics Yunnan University, P.R. China 11 / 31 8 ¹ 1 3

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees

Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees Alan Kuhnle 1,, Victoria G. Crawford 1, My T. Thai 1 1 Computer and Information Science and

More information

Computability Theory

Computability Theory CS:4330 Theory of Computation Spring 2018 Computability Theory Other NP-Complete Problems Haniel Barbosa Readings for this lecture Chapter 7 of [Sipser 1996], 3rd edition. Sections 7.4 and 7.5. The 3SAT

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information

The complement of PATH is in NL

The complement of PATH is in NL 340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:

More information

Maximum flows & Maximum Matchings

Maximum flows & Maximum Matchings Chapter 9 Maximum flows & Maximum Matchings This chapter analyzes flows and matchings. We will define flows and maximum flows and present an algorithm that solves the maximum flow problem. Then matchings

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs

Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha

More information

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017

W[1]-hardness. Dániel Marx. Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 1 W[1]-hardness Dániel Marx Recent Advances in Parameterized Complexity Tel Aviv, Israel, December 3, 2017 2 Lower bounds So far we have seen positive results: basic algorithmic techniques for fixed-parameter

More information

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748 COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu http://www.cs.fiu.edu/~giri/teach/cot6936_s12.html https://moodle.cis.fiu.edu/v2.1/course/view.php?id=174

More information

Introduction to Algorithms. Lecture 24. Prof. Patrick Jaillet

Introduction to Algorithms. Lecture 24. Prof. Patrick Jaillet 6.006- Introduction to Algorithms Lecture 24 Prof. Patrick Jaillet Outline Decision vs optimization problems P, NP, co-np Reductions between problems NP-complete problems Beyond NP-completeness Readings

More information

Flows on surface embedded graphs. Erin Chambers

Flows on surface embedded graphs. Erin Chambers Erin Wolf Chambers Why do computational geometers care about topology? Many areas, such as graphics, biology, robotics, and networking, use algorithms which compute information about point sets. Why do

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

Lecture outline. Graph coloring Examples Applications Algorithms

Lecture outline. Graph coloring Examples Applications Algorithms Lecture outline Graph coloring Examples Applications Algorithms Graph coloring Adjacent nodes must have different colors. How many colors do we need? Graph coloring Neighbors must have different colors

More information

arxiv: v1 [math.co] 7 Dec 2018

arxiv: v1 [math.co] 7 Dec 2018 SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential

More information

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time

More information

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME PLANAR GRAPH BIPARTIZATION IN LINEAR TIME SAMUEL FIORINI, NADIA HARDY, BRUCE REED, AND ADRIAN VETTA Abstract. For each constant k, we present a linear time algorithm that, given a planar graph G, either

More information

Minimum Spanning Trees My T. UF

Minimum Spanning Trees My T. UF Introduction to Algorithms Minimum Spanning Trees @ UF Problem Find a low cost network connecting a set of locations Any pair of locations are connected There is no cycle Some applications: Communication

More information

A simple algorithm for 4-coloring 3-colorable planar graphs

A simple algorithm for 4-coloring 3-colorable planar graphs A simple algorithm for 4-coloring 3-colorable planar graphs Ken-ichi Kawarabayashi 1 National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan Kenta Ozeki 2 Department of

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Lecture 14 01/25/11 1 - Again Problem: Steiner Tree. Given an undirected graph G=(V,E) with non-negative edge costs c : E Q + whose vertex set is partitioned into required vertices

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Packing Edge-Disjoint Triangles in Given Graphs

Packing Edge-Disjoint Triangles in Given Graphs Electronic Colloquium on Computational Complexity, Report No. 13 (01) Packing Edge-Disjoint Triangles in Given Graphs Tomás Feder Carlos Subi Abstract Given a graph G, we consider the problem of finding

More information

Algorithmic Aspects of Acyclic Edge Colorings

Algorithmic Aspects of Acyclic Edge Colorings Algorithmic Aspects of Acyclic Edge Colorings Noga Alon Ayal Zaks Abstract A proper coloring of the edges of a graph G is called acyclic if there is no -colored cycle in G. The acyclic edge chromatic number

More information

Exploiting Social Network Structure for Person-to-Person Sentiment Analysis (Supplementary Material to [WPLP14])

Exploiting Social Network Structure for Person-to-Person Sentiment Analysis (Supplementary Material to [WPLP14]) Exploiting Social Network Structure for Person-to-Person Sentiment Analysis (Supplementary Material to [WPLP14]) Robert West, Hristo S. Paskov, Jure Leskovec, Christopher Potts Stanford University west@cs.stanford.edu,

More information

Graph Theory and Applications

Graph Theory and Applications Graph Theory and Applications with Exercises and Problems Jean-Claude Fournier WILEY Table of Contents Introduction 17 Chapter 1. Basic Concepts 21 1.1 The origin of the graph concept 21 1.2 Definition

More information

PCPs and Succinct Arguments

PCPs and Succinct Arguments COSC 544 Probabilistic Proof Systems 10/19/17 Lecturer: Justin Thaler PCPs and Succinct Arguments 1 PCPs: Definitions and Relationship to MIPs In an MIP, if a prover is asked multiple questions by the

More information

2 The Mixed Postman Problem with Restrictions on the Arcs

2 The Mixed Postman Problem with Restrictions on the Arcs Approximation Algorithms for the Mixed Postman Problem with Restrictions on the Arcs Francisco Javier Zaragoza Martínez Departamento de Sistemas, Universidad Autónoma Metropolitana Unidad Azcapotzalco

More information

Stochastic Network Interdiction / June 2001

Stochastic Network Interdiction / June 2001 Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2001-06 Stochastic Network Interdiction / June 2001 Wood, Kevin Monterey, California. Naval

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Chordal Graphs: Theory and Algorithms

Chordal Graphs: Theory and Algorithms Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also

More information

An Edge-Swap Heuristic for Finding Dense Spanning Trees

An Edge-Swap Heuristic for Finding Dense Spanning Trees Theory and Applications of Graphs Volume 3 Issue 1 Article 1 2016 An Edge-Swap Heuristic for Finding Dense Spanning Trees Mustafa Ozen Bogazici University, mustafa.ozen@boun.edu.tr Hua Wang Georgia Southern

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Introduction to. Graph Theory. Second Edition. Douglas B. West. University of Illinois Urbana. ftentice iiilil PRENTICE HALL

Introduction to. Graph Theory. Second Edition. Douglas B. West. University of Illinois Urbana. ftentice iiilil PRENTICE HALL Introduction to Graph Theory Second Edition Douglas B. West University of Illinois Urbana ftentice iiilil PRENTICE HALL Upper Saddle River, NJ 07458 Contents Preface xi Chapter 1 Fundamental Concepts 1

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

On Finding Dense Subgraphs

On Finding Dense Subgraphs On Finding Dense Subgraphs Barna Saha (Joint work with Samir Khuller) Department of Computer Science University of Maryland, College Park, MD 20742 36th ICALP, 2009 Density for Undirected Graphs Given

More information

Irregular Bipolar Fuzzy Graphs

Irregular Bipolar Fuzzy Graphs Inernational Journal of pplications of Fuzzy Sets (ISSN 4-40) Vol ( 0), 9-0 Irregular ipolar Fuzzy Graphs Sovan Samanta ssamantavu@gmailcom Madhumangal Pal mmpalvu@gmailcom Department of pplied Mathematics

More information

Directed acyclic graphs with the unique dipath property

Directed acyclic graphs with the unique dipath property Author manuscript, published in "Theoretical Computer Science 504 (2013) 5-11" DOI : 10.1016/j.tcs.2012.06.015 Directed acyclic graphs with the unique dipath property Jean Claude Bermond, Michel Cosnard,

More information

Lecture 1: Examples, connectedness, paths and cycles

Lecture 1: Examples, connectedness, paths and cycles Lecture 1: Examples, connectedness, paths and cycles Anders Johansson 2011-10-22 lör Outline The course plan Examples and applications of graphs Relations The definition of graphs as relations Connectedness,

More information

Towards more efficient infection and fire fighting

Towards more efficient infection and fire fighting Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department

More information

Combinatorial optimization - Structures and Algorithms, GeorgiaTech, Fall 2011 Lectures 1 4: Aug 23 Sep 1

Combinatorial optimization - Structures and Algorithms, GeorgiaTech, Fall 2011 Lectures 1 4: Aug 23 Sep 1 Combinatorial optimization - Structures and Algorithms, GeorgiaTech, Fall 011 Lectures 1 4: Aug 3 Sep 1 László Végh References are from the book Connections in Combinatorial Optimization by András Frank

More information

Connectivity check in 3-connected planar graphs with obstacles

Connectivity check in 3-connected planar graphs with obstacles Electronic Notes in Discrete Mathematics 31 (2008) 151 155 www.elsevier.com/locate/endm Connectivity check in 3-connected planar graphs with obstacles Bruno Courcelle a,1,2,3, Cyril Gavoille a,1,3, Mamadou

More information

On the Computational Behavior of a Dual Network Exterior Point Simplex Algorithm for the Minimum Cost Network Flow Problem

On the Computational Behavior of a Dual Network Exterior Point Simplex Algorithm for the Minimum Cost Network Flow Problem On the Computational Behavior of a Dual Network Exterior Point Simplex Algorithm for the Minimum Cost Network Flow Problem George Geranis, Konstantinos Paparrizos, Angelo Sifaleras Department of Applied

More information

Exact Algorithms for NP-hard problems

Exact Algorithms for NP-hard problems 24 mai 2012 1 Why do we need exponential algorithms? 2 3 Why the P-border? 1 Practical reasons (Jack Edmonds, 1965) For practical purposes the difference between algebraic and exponential order is more

More information

6.896 Topics in Algorithmic Game Theory March 1, Lecture 8

6.896 Topics in Algorithmic Game Theory March 1, Lecture 8 6.896 Topics in Algorithmic Game Theory March 1, 2010 Lecture 8 Lecturer: Constantinos Daskalakis Scribe: Alan Deckelbaum, Anthony Kim NOTE: The content of these notes has not been formally reviewed by

More information

arxiv: v1 [cs.dm] 21 Dec 2015

arxiv: v1 [cs.dm] 21 Dec 2015 The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey

More information

Graphs and Algorithms 2016

Graphs and Algorithms 2016 Graphs and Algorithms 2016 Teachers: Nikhil Bansal and Jesper Nederlof TA: Shashwat Garg (Office Hours: Thursday: Pick??) Webpage: www.win.tue.nl/~nikhil/courses/2wo08 (for up to date information, links

More information

APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS

APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 70010, India. Organization Introduction

More information

Preimages of Small Geometric Cycles

Preimages of Small Geometric Cycles Preimages of Small Geometric Cycles Sally Cockburn Department of Mathematics Hamilton College, Clinton, NY scockbur@hamilton.edu Abstract A graph G is a homomorphic preimage of another graph H, or equivalently

More information

Minimum Cost Edge Disjoint Paths

Minimum Cost Edge Disjoint Paths Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during

More information

arxiv: v2 [cs.dm] 3 Dec 2014

arxiv: v2 [cs.dm] 3 Dec 2014 The Student/Project Allocation problem with group projects Aswhin Arulselvan, Ágnes Cseh, and Jannik Matuschke arxiv:4.035v [cs.dm] 3 Dec 04 Department of Management Science, University of Strathclyde,

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

An O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem

An O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem An O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem and more recent developments CATS @ UMD April 22, 2016 The Asymmetric Traveling Salesman Problem (ATSP) Problem

More information

Approximating max-min linear programs with local algorithms

Approximating max-min linear programs with local algorithms Approximating max-min linear programs with local algorithms Patrik Floréen, Marja Hassinen, Petteri Kaski, Topi Musto, Jukka Suomela HIIT seminar 29 February 2008 Max-min linear programs: Example 2 / 24

More information

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it.

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it. 1 Introduction There are hundreds of NP-complete problems. For a recent selection see http://www. csc.liv.ac.uk/ ped/teachadmin/comp202/annotated_np.html Also, see the book M. R. Garey and D. S. Johnson.

More information

arxiv: v1 [math.co] 5 Nov 2010

arxiv: v1 [math.co] 5 Nov 2010 Segment representation of a subclass of co-planar graphs Mathew C. Francis, Jan Kratochvíl, and Tomáš Vyskočil arxiv:1011.1332v1 [math.co] 5 Nov 2010 Department of Applied Mathematics, Charles University,

More information

Multicasting in the Hypercube, Chord and Binomial Graphs

Multicasting in the Hypercube, Chord and Binomial Graphs Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu

More information

Minimum Cycle Bases of Halin Graphs

Minimum Cycle Bases of Halin Graphs Minimum Cycle Bases of Halin Graphs Peter F. Stadler INSTITUTE FOR THEORETICAL CHEMISTRY AND MOLECULAR STRUCTURAL BIOLOGY, UNIVERSITY OF VIENNA WÄHRINGERSTRASSE 17, A-1090 VIENNA, AUSTRIA, & THE SANTA

More information

Disjoint cycles intersecting a set of vertices

Disjoint cycles intersecting a set of vertices Disjoint cycles intersecting a set of vertices M. Pontecorvi, P. Wollan May 28, 2012 Abstract A classic theorem of Erdős and Pósa states that there exists a constant c such that for all positive integers

More information

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

More information

NP-Completeness. Algorithms

NP-Completeness. Algorithms NP-Completeness Algorithms The NP-Completeness Theory Objective: Identify a class of problems that are hard to solve. Exponential time is hard. Polynomial time is easy. Why: Do not try to find efficient

More information

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost

Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R

More information

Workshop In Advanced Data Structures Push-Relabel Heuristics. Maya Orshizer Sagi Hed

Workshop In Advanced Data Structures Push-Relabel Heuristics. Maya Orshizer Sagi Hed Workshop In Advanced Data Structures Push-Relabel Heuristics Maya Orshizer Sagi Hed 1 Contents 1 Overview And Goals 3 2 Our Implementation Of Push Relabel 3 2.1 Definitions...............................

More information

Graphs and Algorithms 2015

Graphs and Algorithms 2015 Graphs and Algorithms 2015 Teachers: Nikhil Bansal and Jorn van der Pol Webpage: www.win.tue.nl/~nikhil/courses/2wo08 (for up to date information, links to reading material) Goal: Have fun with discrete

More information

Proper connection number of graphs

Proper connection number of graphs Proper connection number of graphs Ruxandra MARINESCU-GHEMECI University of Bucharest verman@fmi.unibuc.ro Mihai Patrascu Seminar in Theoretical Computer Science Ruxandra MARINESCU-GHEMECI (UB) Proper

More information

Assignment 1 Introduction to Graph Theory CO342

Assignment 1 Introduction to Graph Theory CO342 Assignment 1 Introduction to Graph Theory CO342 This assignment will be marked out of a total of thirty points, and is due on Thursday 18th May at 10am in class. Throughout the assignment, the graphs are

More information

arxiv: v1 [cs.ds] 8 Jan 2019

arxiv: v1 [cs.ds] 8 Jan 2019 Subset Feedback Vertex Set in Chordal and Split Graphs Geevarghese Philip 1, Varun Rajan 2, Saket Saurabh 3,4, and Prafullkumar Tale 5 arxiv:1901.02209v1 [cs.ds] 8 Jan 2019 1 Chennai Mathematical Institute,

More information

ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED NETWORK

ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED NETWORK ON THE IMPLEMENTATION OF GOLDBERG'S MAXIMUM FLOW ALGORITHM IN EXTENDED MIXED NETWORK Nguyen Dinh Lau 1, Tran Quoc Chien 1, Phan Phu Cuong 2 and Le Hong Dung 3 1 University of Danang, Danang, Vietnam 2

More information

Approximating Buy-at-Bulk and Shallow-light k-steiner trees

Approximating Buy-at-Bulk and Shallow-light k-steiner trees Approximating Buy-at-Bulk and Shallow-light k-steiner trees MohammadTaghi Hajiaghayi Guy Kortsarz Mohammad R. Salavatipour Abstract We study two related network design problems with two cost functions.

More information

The Maximum Clique Problem

The Maximum Clique Problem November, 2012 Motivation How to put as much left-over stuff as possible in a tasty meal before everything will go off? Motivation Find the largest collection of food where everything goes together! Here,

More information

The Complexity of the Network Design Problem

The Complexity of the Network Design Problem The Complexity of the Network Design Problem D. S. Johnson Bell Laboratories Murray Hill, New Jersey J. K. Lenstra Mathematisch Centrurn Amsterdam, The Netherlands A. H. G. Rinnooy Kan Erasmus University

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information