Core Membership Computation for Succinct Representations of Coalitional Games

Size: px
Start display at page:

Download "Core Membership Computation for Succinct Representations of Coalitional Games"

Transcription

1 Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity of core membership determination in two compact representations of coalitional games. Conitzer and Sandholm [1] proposed the multi-issue representations of coalitional games. This representation attempts to decompose a coalitional games into a set of sub-games. Later, Ieong and Shoham [3] proposed the marginal contribution nets (MC-nets) representation of coalitional games. The MC-nets representation attempts to use boolean logic to reduce the size of the coalitional game representation. In this paper, I compare the core membership results for these two coalitional game representations, discuss their implications, and suggest possible future research directions. In particular, these two papers seem to suggest two seemingly contradictory research directions for the core-membership problem. Conitzer and Sandholm [1] argued that stability concepts like the core for coalitional games should take into account of the computational complexity of finding a beneficial deviation for a particular agent. However, Ieong and Shoham [3] argued that it is important to search for more succinct representations of coalitional games which could overcome the computational hardness of the general core membership problem. 1 Introduction In coalitional game theory, the basic modeling unit is a group of agents, known as a coalition, rather than the individual agents. In coalitional games, agents can benefit by cooperating with each other and receiving higher payoff by working in a group rather than working individually. Coalitional games assign a payoff to each group of agents in the game. A naive representation of a coalitional game is to enumerate the payoff to every possible set of agents. This requires space exponential in the number of agents in the game, and is clearly not practical for a game with a large number of agents. Notice that the problem regarding the representation of games is analogous to the problem raised by the normal form representation of games in non-cooperative game theory. Even though the normal form representation is completely expressive, it fails to provide compact representations for many games with practical purposes. We can not perform efficient computations for a game which cannot be represented concisely in the first place. This problem leads to the development of many succinct representations of non-cooperative games. Therefore, developing succinct representations of coalitional games is critical for being able to reason about these games efficiently. For coalitional games, several solution concepts have been proposed. The two most important ones are the Shapley value and the core. In this paper, I focus on results concerning the core. The core is a solution concept for stability. If a payoff vector for the agents is in the core of a coalitional game, then no group of 1

2 players has an incentive to break away from the grand coalition and form their own coalition. Two related questions have been raised regarding the concept of the core. The first one asks whether the core for a given coalition game is empty. A nonempty core signifies that there exist some outcome of the game that is stable against possible deviations by a group of agents. Another related question regarding the core asks whether a given payoff vector is inside the core of a coalitional game. In the following sections, I first introduce the two compact representations proposed. Next, I describe the results in both papers regarding the computational complexity of determining core membership for these succinct representations. Finally, I discuss the implications of these results and suggest future work in this area. 2 Succinct representations of coalitional games 2.1 Technical background A coalitional game can be represented by the pair (N, v) where N is a set of agents, and v : 2 N R is a function that maps each group of agents S N to a real-valued payoff This is known as the characteristic form. This definition makes two important assumptions. First, utilities are transferable among agents in a coalition. Second, the payoff for for a coalition is not affected by agents outside of the coalition. Ieong and Shoham [3] proposed four criteria for evaluating the quality of coalitional game representations. First, expressivity is concerned with the breadth of the class of coalitional games covered by the representation. Next, conciseness asks for the space requirement of the representation. Moreover, efficiency refers to whether there exist efficient algorithms for these representations, and simplicity requires the representations to be easy to understand for the users. Based on these criteria, the ideal representation should be able to express any coalitional games, use very little space, admit efficient computations, and be easy to use. I use these criteria as guidelines for evaluating the two succinct representations of coalitional games. 2.2 The multi-issue representation The multi-issue representation decomposes the coalitional game into a number of distinct issues. More formally, the multi-issue representation defines a set of characteristic functions (v 1, v 2,..., v T ) where each v i : 2 N R is a decomposition of the characteristic function v over T issues, and all the v i s satisfy the property that for any S N, v(s) = T i=1 v i(s). A useful way to think about multi-issue representation is to use the following example [1]. Consider a scenario in which certain tasks must be performed by a set of agents. Each agent are capable of performing a number of tasks. Alternatively, we could understand this setting as that each task could only be completed by any member of a group of agents in the game. Accomplishing a certain task generates some value. Therefore, each different coalition of agents could have a different collective skill set and are therefore capable of performing a subset of tasks available. 2

3 Also, to explain why this representation is more concise over the naive representation, we need to recognize the following property of this representation: The characteristic function v i for issue i only concerns a subset of agents C i A if v i (S 1 ) = v i (S 2 ) whenever C i S 1 and C i S 2. Intuitively, under this representation, the characteristic function v i for each issue i need only be defined for a subset of agents who are concerned with this particular issue. Therefore, the multi-issue representation only needs to define T i=1 2 Ci values instead of the 2 N values using the naive representation. This property makes the multi-issue representation exponentially more concise than the naive representation assuming that the C i are small. Also, notice that the multi-issue representation is fully expressive, meaning that it can represent any arbitrary coalitional game. Intuitively, if there is no easy to decompose a given coalitional game into multiple issues, we could always treat the entire coalition game as a single big issue. 2.3 The marginal contribution nets representation The MC-nets representation scheme attempts to use the power of boolean logic to represent features of coalitional games. The basic idea is to use set of rules. These rules define mapping from pattern to value as shown below: Rule: Pattern value The pattern is simply a boolean expression which specifies a logical statement over a subset of agents. For instance, a simple pattern could be a conjunction of agents which specifies that all of agents in the conjunction must be present for the rule to apply. A rule applies to a group of agents S if S meets the satisfies the pattern specified. Then the payoff of a group of agents is defined to be sum over the values of all rules that apply to the group. The flexibility of MC-nets is inherently due to the flexibility of boolean logical expressions. Therefore, MCnets could be easily extended by allowing more and more complicated boolean expressions in the pattern. Ieong and Shoham [3] only concerned themselves with conjunctions of boolean expressions specifying the presence and absence of certain agents. The expressions specifying presence of agents are called positive literals and the ones for absence of agents are called negative literals. A typical pattern is in the following form: {p 1 p 2... p m n 1 n 2... n n } A rule containing such a pattern will only apply to a group if the group contains all the agents p i s and does not contain all the agents n i s. Given the definition of MC-nets, Ieong and Shoham [3] discussed several propositions regarding the representation power of MC-nets. First, MC-nets was proven to be fully expressive. For any arbitrary coalitional game, Ieong and Shoham [3] showed that the set of rules for MC-nets could be constructed by using a similar idea as the inclusion-exclusion principle. Moreover, Ieong and Shoham [3] discussed two propositions regarding a comparison of representation power of the multi-issue and the MC-nets representations. First, they showed that marginal contribution networks use at most a linear factor (in the number of agents) more space than multi-issue representation for any game. 3

4 This proposition implies that, on average, for arbitrary coalitional games, the space requirement for using MC-nets is comparable to the space requirement of the multi-issue representation. Second, they showed that, for certain coalitional games, MC-nets can be exponentially more concise than multi-issue representation. The proof for this proposition used the unit game in which the value of any nonempty coalition is one. The unit game can be represented in O( N ) space using MC-nets with negative literals. However, the multi-issue representation will require space O(2 n ) to represent the unit game since there is no decomposition of this game into distinct issues. Thus, MC-nets has a relative advantage over the multi-issue scheme in terms of representation power alone. 3 The core membership results In this paper, I focus on results in the two papers regarding the problem of checking whether a payoff vector is in the core. Formally, given a coalitional game and a payoff vector x, the core-membership question asks whether x is in the core. By definition of the core, a payoff vector is in the core if no subcoalition has an incentive to break away from the grand coalition. 3.1 Core membership in multi-issue domains In their paper, Conitzer and Sandholm [1] proved that given an arbitrary coalitional game, it is NP-complete to determine whether there exists a subcoalition having an incentive to break away from the grand coalition. Such a subcoalition is referred to as a blocking coalition. This problem can be formally defined as follows: Given a characteristic function with a decomposition v = T i=1 v i. Each v i is only defined over members of a subset of agents C i N, and each v i over the 2 Ci is defined naively by enumerating the payoff value for each possible S i C i. Additionally, we are given a payoff vector x : N R specifying the payoff for each agent in the grand coalition. The question that we asks is whether there is some blocking coalition S such that v(s) > n N x(n). Conitzer and Sandholm [1] showed that this problem is NP-complete by a reduction from the VERTEX- COVER problem. For their proof, they only worked on a special case of the general CORE-MEMBERSHIP problem. This special case specifies that C i = 3, i and v i for each issue i only takes binary values, and all the v i s are increasing and superadditive. The definitions for increasing and superadditive are omitted here since they are not critical for understanding the proof. Notice that proving that this special case is NP-hard is sufficiently to guarantee that the general problem is also NP-hard. A sketch of the proof is as follows: Proof Sketch First, this problem is in NP since for any given coalition S, we could compute v(s) and n N x(n) in polynomial time and check if the former is larger. To show that this problem is NP-hard, a reduction from the VERTEX-COVER problem is used. The VERTEX-COVER problem is defined as follows: Given a graph G = (V, E), and an integer r > 0, determine whether there exists a vertex cover for G of size at most r. A vertex cover is a set of vertices such that each edge of the graph is incident to at least one vertex of the set. (1) Given an instance of the vertex cover problem, an instance of the core-membership problem can be 4

5 constructed as follows: For each vertex v V, defines an agent n v. Also define one additional agent n 0. Every edge e E represents an issue i e and T = E. For each issue i e, the function v ie is only defined for members of the set C ie = {n 0 } {n v : v is endpoint of some edge e}. The function v ie is defined to be 1 for any subset of C ie containing the agent n 0 and at least one other agent n v. Otherwise, v ie is defined to be 0. Finally, the payoff vector x is defined as: x(n 0 ) = T 1 2, and for any v V, x(n v) = 1 2(r+1/2). (2) Given a solution to the VERTEX-COVER instance, we have that there exists a set W V of vertices such that W is a valid vertex cover and W r. Then consider the set S = {n 0 } {n v : v W }. By definition of the representation, we could easily check that v ie (S) = 1 for all issues since all edges in the graph has at least one endpoint in W. Thus we have v(s) = T. On the other hand, n S x(n) = T 1/2 + W 1 2(r+1/2) T 1/2 + r 1 2(r+1/2) < T 1/2 + r 1 2r = T = v(s) Thus, S is a blocking coalition and we have found a solution to the CORE-MEMBERSHIP problem instance. (3) Given a solution to the CORE-MEMBERSHIP problem instance, we have a subset S N such that v(s) > n S x(n). By definition, S must contain a 0. Otherwise, we will have v(s) = 0 and S could not possibly be a blocking coalition. Now consider the set W = {v : a v S}. We can derive as follows: 1 x(n) = T 1/2 + W 2(r + 1/2) n S T v(s) > n S x(n) and W is an integer W r Additionally, since v(s) x(n 0 ) = T 1/2, v ir = 1 for every issue i e. Thus, W covers all edges and is a valid solution the corresponding VERTEX-COVER problem instance. End of Proof Sketch 3.2 Core membership in MC-nets In [3], Ieong and Shoham presented two results regarding core membership in MC-nets. For the first result, they proved that the general core-membership problem for MC-nets is conp-complete since it follows from the hardness results of a previously proposed graphical form of coalitional games. The MC-nets representation can be seen as a generalization of the graphical form proposed in [2]. Nevertheless, Ieong and Shoham [3] developed an algorithm in an effort to overcome the computational hardness of the core-membership problem. In summary, their core-membership algorithm utilized tree decomposition techniques and runs in time exponential only in the treewidth of the agent graph. Therefore, for graphs of small treewidth, this algorithm presents a tractable solution to determine whether a payoff vector is in the core. 5

6 To explain the core-membership algorithm in detail, we first review some necessary concepts in tree decomposition and treewidth. A tree decomposition converts an arbitrary graph G to a tree T. Each node in T represents a subset of vertices in G. Also, the tree T needs to satisfy several properties to be a valid tree decomposition: All the vertices in G must be present in T For any edge in G, there exists a node in tree T containing both endpoints of this edge. (Running intersection property) If a node X j is on the path from node X i to node X k in T, then X i X k X j (X j must contain at least the intersection of X i and X k. The treewidth of a tree decomposition is defined to be the maximum cardinality over all sets in the nodes of tree T minus one. Then the treewidth of a graph is defined as the minimum treewidth over all tree decompositions of the graph. A tree decomposition T can be converted into a nice tree decomposition of the same treewidth and of size linear in that of T. A nice tree decomposition specifies a rooted tree and has several properties: The leaf nodes i have one element in its set X i. The introduce nodes have one child j and has one less element in their set than their child node. The forget nodes have one child j and has one more element in their set than their child node. The join nodes have two children j and k and have exactly same set of elements as each of its children. To introduce the core membership algorithm, Ieong and Shoham [3] further defined two key concepts as follows: The excess of a coalition S is defined as x(s) v(s), where x is a given payoff vector and v is the characteristic form. Intuitively, the excess measures how close the group S is to violating the core condition. The naive approach for checking whether a payoff vector belongs to the core is to check that the excesses of all groups are non-negative. This algorithm, however, takes advantage of the tree decomposition to make such inferences in a structured manner. The reserve of a coalition S relative to a coalition U is the minimum excess over all coalitions T sch that S T U. This reserve is denoted by r(s, U). The group T with minimum excess is denoted as arg r(s, U). U is called the limiting set of the reserve and S is the base set of the reserve. Given a nice tree decomposition of the graph, the algorithm keeps track of the reserves of all non-empty subsets at each node in the tree. For each node, these reserve values are referred to as the r-values of a node. Ieong and Shoham [3] proved that the payoff vector x is in the core if and only if the r-values for all nodes in the tree are non-negative. Proof Sketch If the reserve at some node i for some group S is negative, then there exists a coalition T with negative excess. hence the payoff vector is not in the core. This is the easy direction of the proof. For the more involved direction, assume that some payoff vector x is not in the core, then there exists a coalition R with negative excess. We need to find a node in the tree composition with negative reserve value. First of all, if R and the root node are not disjoint sets, then the reserve value for some group in the root is negative. Otherwise, if R and the root node X root are disjoint, we remove all agents in X root from all the nodes in the tree. By the running intersection property, the sets of nodes in the remaining tree 6

7 are disjoint. We can consider that these remaining nodes constitute a forest of trees. To find a node with negative reserve value, we just need to compute the reserve values for each individual tree in this forest. For each tree in the forest, we use the same technique we just described to further decompose the tree. Therefore, by induction, if the excess for R is negative, then the reserve at some node must be negative. End of Proof Sketch The authors gave an algorithm for computing the reserve value for the four types of nodes in the a nice tree decomposition. They also proved that the reserve value computation for each type of node is correct. To summarize, each step in the reserve value computation at each node takes time at most exponential in the number of agents in the node. Therefore, the core-membership algorithm runs in time exponential only int he treewidth of the graph. 4 Discussion and future work These two results offer us some insights into the computational complexity of the core membership problem for two different succinct representations of coalitional games. First of all, we have to admit that the general core-membership problem is hard (NP-complete or conpcomplete) even with these succinct representations. One reason for this fact that is both representations are fully expressive. So in a sense, we are essentially considering the general core-membership problem for general coalitional games with a different way to write down the game rules. This idea raises the issue of the trade-off between expressiveness and computational efficiency. Even though these compact representations make it possible to represent a subset of coalitional games using a reasonable amount of space, their expressive power might have caused them to be not helpful in alleviating the computational hardness of the core-membership problem. Thus, a natural future direction is to consider coalitional game representations that are not necessarily fully expressive. In practice, we often encounter particular types of games that can be represented as coalitional games with special structure. Therefore, some compact representations and corresponding algorithms that are tailored to these special games might be helpful in solving these practical scenarios of coalitional games. From a practical standpoint, solving games that are useful in practice using a not fully expressive representation is perhaps more important than developing a fully expressive representation that does not make the computational problem easier to solve. An interesting argument that I thought about while reading these results are related to the goal for considering the core membership problem. Conitzer and Sandholm [1] argued in their paper that the computational complexity of the core membership problem serves to increase the stability of the grand coalition. This argument is in sharp contrast to the effort by Ieong and Shoham [3] in developing an algorithm in order to overcome the computational hardness of the core membership problem. Perhaps before we dive into the investigation of the core-membership problem, we should carefully consider our goal in considering this computational problem in the first place. For instance, from a mechanism design perspective, it is potentially beneficial to ensure that the core membership determination is a hard computational problem. This computational difficulty not only illustrates that the core may be an unnecessarily strong solution concept, it also suggests that agents will face a difficult problem if they want to determine whether they should break away from the grand coalition. Thus, the computational hardness here serves to ensure the stability of the payoff vector for a practical scenario. This type of stability is particularly important if we take into account of possible manipulations by the agents. Obviously, we need to recognize that NP-completeness is a worst-case measure of hardness and this hardness result might not be a significant barrier if the problem instance is small enough. The paper by Conitzer and Sandholm [1] suggested future research directions alone these lines. They posed the question of whether 7

8 it is possible to design new payoff distribution schemes that are hard to manipulate. Also, they raised the question of whether it is possible to construct stability concepts that take into account of the complexity of finding a beneficial deviation. On the other hand, from an algorithmic analysis perspective, it is natural to keep searching for efficient algorithms for solving the core membership problem. Given a particular coalitional game, it would be nice to be able to find the payoff vectors in the core efficiently. This is useful information to determine the stability property of the given game. Hence, searching for tractable algorithms for the core membership problem in coalitional games is still a meaningful and important research direction to pursue. In their paper, Ieong and Shoham [3] suggested a few ideas for extending the MC-nets representation to make it more concise. These ideas are relevant for this particular paper. However, I would propose a different research direction concerning the big picture of solving the core membership problem in coalitional games. I don t think making the representation more and more concise is meaningful after a certain point. Rather, we should try to reason about the underlying reasons for the computational hardness of the core membership problem. From these results, I think that it might be more meaningful to search for representations which are not fully expressive, but nonetheless allow efficient algorithms for the core membership problems. It would be ideal if these representations are specially tailored to certain practical examples of coalitional games. References [1] Conitzer, V., and Sandholm, T. Computing shapley values, manipulating value division schemes, and checking core membership in multi-issue domains. In AAAI (2004), pp [2] Deng, X., and Papadimitriou, C. H. On the complexity of cooperative solution concepts. Math. Oper. Res. 19, 2 (1994), [3] Ieong, S., and Shoham, Y. Marginal contribution nets: a compact representation scheme for coalitional games. In EC 05: Proceedings of the 6th ACM conference on Electronic commerce (New York, NY, USA, 2005), ACM, pp

CHAPTER 13: FORMING COALITIONS. Multiagent Systems. mjw/pubs/imas/

CHAPTER 13: FORMING COALITIONS. Multiagent Systems.   mjw/pubs/imas/ CHAPTER 13: FORMING COALITIONS Multiagent Systems http://www.csc.liv.ac.uk/ mjw/pubs/imas/ Coalitional Games Coalitional games model scenarios where agents can benefit by cooperating. Issues in coalitional

More information

(67686) Mathematical Foundations of AI July 30, Lecture 11

(67686) Mathematical Foundations of AI July 30, Lecture 11 (67686) Mathematical Foundations of AI July 30, 2008 Lecturer: Ariel D. Procaccia Lecture 11 Scribe: Michael Zuckerman and Na ama Zohary 1 Cooperative Games N = {1,...,n} is the set of players (agents).

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

NP-Complete Problems

NP-Complete Problems 1 / 34 NP-Complete Problems CS 584: Algorithm Design and Analysis Daniel Leblanc 1 1 Senior Adjunct Instructor Portland State University Maseeh College of Engineering and Computer Science Winter 2018 2

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation-6: Hardness of Inference Contents 1 NP-Hardness Part-II

More information

Steven Skiena. skiena

Steven Skiena.   skiena Lecture 22: Introduction to NP-completeness (1997) Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Among n people,

More information

Computing Pure Nash Equilibria in Symmetric Action Graph Games

Computing Pure Nash Equilibria in Symmetric Action Graph Games Computing Pure Nash Equilibria in Symmetric Action Graph Games Albert Xin Jiang Kevin Leyton-Brown Department of Computer Science University of British Columbia {jiang;kevinlb}@cs.ubc.ca July 26, 2007

More information

Representation of Finite Games as Network Congestion Games

Representation of Finite Games as Network Congestion Games Representation of Finite Games as Network Congestion Games Igal Milchtaich To cite this version: Igal Milchtaich. Representation of Finite Games as Network Congestion Games. Roberto Cominetti and Sylvain

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

Computing cooperative solution concepts in coalitional skill games

Computing cooperative solution concepts in coalitional skill games Computing cooperative solution concepts in coalitional skill games The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation

More information

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial.

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial. 2301-670 Graph theory 1.1 What is a graph? 1 st semester 2550 1 1.1. What is a graph? 1.1.2. Definition. A graph G is a triple (V(G), E(G), ψ G ) consisting of V(G) of vertices, a set E(G), disjoint from

More information

Network Topology and Equilibrium Existence in Weighted Network Congestion Games

Network Topology and Equilibrium Existence in Weighted Network Congestion Games Network Topology and Equilibrium Existence in Weighted Network Congestion Games Igal Milchtaich, Bar-Ilan University August 2010 Abstract. Every finite noncooperative game can be presented as a weighted

More information

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME PLANAR GRAPH BIPARTIZATION IN LINEAR TIME SAMUEL FIORINI, NADIA HARDY, BRUCE REED, AND ADRIAN VETTA Abstract. For each constant k, we present a linear time algorithm that, given a planar graph G, either

More information

Lecture 8: The Traveling Salesman Problem

Lecture 8: The Traveling Salesman Problem Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

Binary Decision Diagrams

Binary Decision Diagrams Logic and roof Hilary 2016 James Worrell Binary Decision Diagrams A propositional formula is determined up to logical equivalence by its truth table. If the formula has n variables then its truth table

More information

CPSC 532L Project Development and Axiomatization of a Ranking System

CPSC 532L Project Development and Axiomatization of a Ranking System CPSC 532L Project Development and Axiomatization of a Ranking System Catherine Gamroth cgamroth@cs.ubc.ca Hammad Ali hammada@cs.ubc.ca April 22, 2009 Abstract Ranking systems are central to many internet

More information

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}.

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}. Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Optimization I : Brute force and Greedy strategy

Optimization I : Brute force and Greedy strategy Chapter 3 Optimization I : Brute force and Greedy strategy A generic definition of an optimization problem involves a set of constraints that defines a subset in some underlying space (like the Euclidean

More information

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models. Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected

More information

Bargaining and Coalition Formation

Bargaining and Coalition Formation 1 These slides are based largely on Chapter 18, Appendix A of Microeconomic Theory by Mas-Colell, Whinston, and Green. Bargaining and Coalition Formation Dr James Tremewan (james.tremewan@univie.ac.at)

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

On Agent Types in Coalition Formation Problems

On Agent Types in Coalition Formation Problems On Agent Types in Coalition Formation Problems Tammar Shrot 1, Yonatan Aumann 1, and Sarit Kraus 1, 1 Department of Computer Science Institute for Advanced Computer Studies Bar Ilan University University

More information

Consistency and Set Intersection

Consistency and Set Intersection Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study

More information

Fixed-Parameter Algorithm for 2-CNF Deletion Problem

Fixed-Parameter Algorithm for 2-CNF Deletion Problem Fixed-Parameter Algorithm for 2-CNF Deletion Problem Igor Razgon Igor Razgon Computer Science Department University College Cork Ireland A brief introduction to the area of fixed-parameter algorithms 2

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

Lecture 20 : Trees DRAFT

Lecture 20 : Trees DRAFT CS/Math 240: Introduction to Discrete Mathematics 4/12/2011 Lecture 20 : Trees Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we discussed graphs. Today we continue this discussion,

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Logic Synthesis & Optimization Lectures 4, 5 Boolean Algebra - Basics

Logic Synthesis & Optimization Lectures 4, 5 Boolean Algebra - Basics Logic Synthesis & Optimization Lectures 4, 5 Boolean Algebra - Basics 1 Instructor: Priyank Kalla Department of Electrical and Computer Engineering University of Utah, Salt Lake City, UT 84112 Email: kalla@ece.utah.edu

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

NP and computational intractability. Kleinberg and Tardos, chapter 8

NP and computational intractability. Kleinberg and Tardos, chapter 8 NP and computational intractability Kleinberg and Tardos, chapter 8 1 Major Transition So far we have studied certain algorithmic patterns Greedy, Divide and conquer, Dynamic programming to develop efficient

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time

More information

Lecture 4: September 11, 2003

Lecture 4: September 11, 2003 Algorithmic Modeling and Complexity Fall 2003 Lecturer: J. van Leeuwen Lecture 4: September 11, 2003 Scribe: B. de Boer 4.1 Overview This lecture introduced Fixed Parameter Tractable (FPT) problems. An

More information

Lecture 21: Other Reductions Steven Skiena

Lecture 21: Other Reductions Steven Skiena Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.stonybrook.edu/ skiena Problem of the Day Show that the dense

More information

1. Suppose you are given a magic black box that somehow answers the following decision problem in polynomial time:

1. Suppose you are given a magic black box that somehow answers the following decision problem in polynomial time: 1. Suppose you are given a magic black box that somehow answers the following decision problem in polynomial time: Input: A CNF formula ϕ with n variables x 1, x 2,..., x n. Output: True if there is an

More information

Lecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY

Lecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day Show that the Dense

More information

Cooperative Games. Lecture 1: Introduction. Stéphane Airiau. ILLC - University of Amsterdam

Cooperative Games. Lecture 1: Introduction. Stéphane Airiau. ILLC - University of Amsterdam Cooperative Games Lecture 1: Introduction Stéphane Airiau ILLC - University of Amsterdam Stéphane Airiau (ILLC) - Cooperative Games Lecture 1: Introduction 1 Why study coalitional games? Cooperative games

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Sources for this lecture. 3. Matching in bipartite and general graphs. Symmetric difference

Sources for this lecture. 3. Matching in bipartite and general graphs. Symmetric difference S-72.2420 / T-79.5203 Matching in bipartite and general graphs 1 3. Matching in bipartite and general graphs Let G be a graph. A matching M in G is a set of nonloop edges with no shared endpoints. Let

More information

Solving NP-hard Problems on Special Instances

Solving NP-hard Problems on Special Instances Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances

More information

Figure 4.1: The evolution of a rooted tree.

Figure 4.1: The evolution of a rooted tree. 106 CHAPTER 4. INDUCTION, RECURSION AND RECURRENCES 4.6 Rooted Trees 4.6.1 The idea of a rooted tree We talked about how a tree diagram helps us visualize merge sort or other divide and conquer algorithms.

More information

Lecture Notes on Binary Decision Diagrams

Lecture Notes on Binary Decision Diagrams Lecture Notes on Binary Decision Diagrams 15-122: Principles of Imperative Computation William Lovas Notes by Frank Pfenning Lecture 25 April 21, 2011 1 Introduction In this lecture we revisit the important

More information

Lecture 13. Reading: Weiss, Ch. 9, Ch 8 CSE 100, UCSD: LEC 13. Page 1 of 29

Lecture 13. Reading: Weiss, Ch. 9, Ch 8 CSE 100, UCSD: LEC 13. Page 1 of 29 Lecture 13 Connectedness in graphs Spanning trees in graphs Finding a minimal spanning tree Time costs of graph problems and NP-completeness Finding a minimal spanning tree: Prim s and Kruskal s algorithms

More information

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Exact Algorithms Lecture 7: FPT Hardness and the ETH Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

CSC Discrete Math I, Spring Sets

CSC Discrete Math I, Spring Sets CSC 125 - Discrete Math I, Spring 2017 Sets Sets A set is well-defined, unordered collection of objects The objects in a set are called the elements, or members, of the set A set is said to contain its

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Notes on Binary Dumbbell Trees

Notes on Binary Dumbbell Trees Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

On Structural Parameterizations of the Matching Cut Problem

On Structural Parameterizations of the Matching Cut Problem On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,

More information

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried

CAP 5993/CAP 4993 Game Theory. Instructor: Sam Ganzfried CAP 5993/CAP 4993 Game Theory Instructor: Sam Ganzfried sganzfri@cis.fiu.edu 1 Announcements HW 1 due today HW 2 out this week (2/2), due 2/14 2 Definition: A two-player game is a zero-sum game if for

More information

CS 6783 (Applied Algorithms) Lecture 5

CS 6783 (Applied Algorithms) Lecture 5 CS 6783 (Applied Algorithms) Lecture 5 Antonina Kolokolova January 19, 2012 1 Minimum Spanning Trees An undirected graph G is a pair (V, E); V is a set (of vertices or nodes); E is a set of (undirected)

More information

Uncertain Data Models

Uncertain Data Models Uncertain Data Models Christoph Koch EPFL Dan Olteanu University of Oxford SYNOMYMS data models for incomplete information, probabilistic data models, representation systems DEFINITION An uncertain data

More information

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016 GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

CS 161 Lecture 11 BFS, Dijkstra s algorithm Jessica Su (some parts copied from CLRS) 1 Review

CS 161 Lecture 11 BFS, Dijkstra s algorithm Jessica Su (some parts copied from CLRS) 1 Review 1 Review 1 Something I did not emphasize enough last time is that during the execution of depth-firstsearch, we construct depth-first-search trees. One graph may have multiple depth-firstsearch trees,

More information

Reductions and Satisfiability

Reductions and Satisfiability Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability

More information

11.9 Connectivity Connected Components. mcs 2015/5/18 1:43 page 419 #427

11.9 Connectivity Connected Components. mcs 2015/5/18 1:43 page 419 #427 mcs 2015/5/18 1:43 page 419 #427 11.9 Connectivity Definition 11.9.1. Two vertices are connected in a graph when there is a path that begins at one and ends at the other. By convention, every vertex is

More information

Linear Time Unit Propagation, Horn-SAT and 2-SAT

Linear Time Unit Propagation, Horn-SAT and 2-SAT Notes on Satisfiability-Based Problem Solving Linear Time Unit Propagation, Horn-SAT and 2-SAT David Mitchell mitchell@cs.sfu.ca September 25, 2013 This is a preliminary draft of these notes. Please do

More information

Basic Graph Theory with Applications to Economics

Basic Graph Theory with Applications to Economics Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman, M.S. Ramanujan, and Saket Saurabh Presenting: Hen Sender 1 Introduction 2 Abstract. It is well known that in a bipartite (and more generally in a Konig)

More information

ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007

ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007 ALGORITHMS EXAMINATION Department of Computer Science New York University December 17, 2007 This examination is a three hour exam. All questions carry the same weight. Answer all of the following six questions.

More information

Exercises Computational Complexity

Exercises Computational Complexity Exercises Computational Complexity March 22, 2017 Exercises marked with a are more difficult. 1 Chapter 7, P and NP Exercise 1. Suppose some pancakes are stacked on a surface such that no two pancakes

More information

6.001 Notes: Section 4.1

6.001 Notes: Section 4.1 6.001 Notes: Section 4.1 Slide 4.1.1 In this lecture, we are going to take a careful look at the kinds of procedures we can build. We will first go back to look very carefully at the substitution model,

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Abstract Path Planning for Multiple Robots: An Empirical Study

Abstract Path Planning for Multiple Robots: An Empirical Study Abstract Path Planning for Multiple Robots: An Empirical Study Charles University in Prague Faculty of Mathematics and Physics Department of Theoretical Computer Science and Mathematical Logic Malostranské

More information

Interactive Geometry for Surplus Sharing in Cooperative Games

Interactive Geometry for Surplus Sharing in Cooperative Games Utah State University DigitalCommons@USU Applied Economics Faculty Publications Applied Economics 2006 Interactive Geometry for Surplus Sharing in Cooperative Games Arthur J. Caplan Utah State University

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

The External Network Problem

The External Network Problem The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014 Suggested Reading: Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Probabilistic Modelling and Reasoning: The Junction

More information

Coalitional Structure Generation in Skill Games

Coalitional Structure Generation in Skill Games Coalitional Structure Generation in Skill Games Yoram Bachrach and Reshe Meir and Kyomin Jung and Pushmeet Kohli Microsoft Research, Cambridge, UK Hebrew University Jerusalem, Israel KAIST, Daejeon, Korea

More information

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes

Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes Computational Complexity and Implications for Security DRAFT Notes on Infeasible Computation for MA/CS 109 Leo Reyzin with the help of Nick Benes The Study of Computational Complexity Let s summarize what

More information

Excerpt from "Art of Problem Solving Volume 1: the Basics" 2014 AoPS Inc.

Excerpt from Art of Problem Solving Volume 1: the Basics 2014 AoPS Inc. Chapter 5 Using the Integers In spite of their being a rather restricted class of numbers, the integers have a lot of interesting properties and uses. Math which involves the properties of integers is

More information

Solutions to Homework 10

Solutions to Homework 10 CS/Math 240: Intro to Discrete Math 5/3/20 Instructor: Dieter van Melkebeek Solutions to Homework 0 Problem There were five different languages in Problem 4 of Homework 9. The Language D 0 Recall that

More information

Lecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class.

Lecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class. CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 19 Thursday, March 29 GRAPH THEORY Graph isomorphism Definition 19.1 Two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) are isomorphic, write G 1 G

More information

Combinatorics Prof. Dr. L. Sunil Chandran Department of Computer Science and Automation Indian Institute of Science, Bangalore

Combinatorics Prof. Dr. L. Sunil Chandran Department of Computer Science and Automation Indian Institute of Science, Bangalore Combinatorics Prof. Dr. L. Sunil Chandran Department of Computer Science and Automation Indian Institute of Science, Bangalore Lecture - 5 Elementary concepts and basic counting principles So, welcome

More information

Chapter 11: Graphs and Trees. March 23, 2008

Chapter 11: Graphs and Trees. March 23, 2008 Chapter 11: Graphs and Trees March 23, 2008 Outline 1 11.1 Graphs: An Introduction 2 11.2 Paths and Circuits 3 11.3 Matrix Representations of Graphs 4 11.5 Trees Graphs: Basic Definitions Informally, a

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Parameterized coloring problems on chordal graphs

Parameterized coloring problems on chordal graphs Parameterized coloring problems on chordal graphs Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary dmarx@cs.bme.hu

More information

Algorithms Exam TIN093/DIT600

Algorithms Exam TIN093/DIT600 Algorithms Exam TIN093/DIT600 Course: Algorithms Course code: TIN 093 (CTH), DIT 600 (GU) Date, time: 22nd October 2016, 14:00 18:00 Building: M Responsible teacher: Peter Damaschke, Tel. 5405 Examiner:

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

6.856 Randomized Algorithms

6.856 Randomized Algorithms 6.856 Randomized Algorithms David Karger Handout #4, September 21, 2002 Homework 1 Solutions Problem 1 MR 1.8. (a) The min-cut algorithm given in class works because at each step it is very unlikely (probability

More information

Counting the Number of Eulerian Orientations

Counting the Number of Eulerian Orientations Counting the Number of Eulerian Orientations Zhenghui Wang March 16, 011 1 Introduction Consider an undirected Eulerian graph, a graph in which each vertex has even degree. An Eulerian orientation of the

More information

A generalization of Mader s theorem

A generalization of Mader s theorem A generalization of Mader s theorem Ajit A. Diwan Department of Computer Science and Engineering Indian Institute of Technology, Bombay Mumbai, 4000076, India. email: aad@cse.iitb.ac.in 18 June 2007 Abstract

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

PART 1 GRAPHICAL STRUCTURE

PART 1 GRAPHICAL STRUCTURE PART 1 GRAPHICAL STRUCTURE in this web service in this web service 1 Treewidth and Hypertree Width Georg Gottlob, Gianluigi Greco, Francesco Scarcello This chapter covers methods for identifying islands

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information