On the Approximation of Largest Common. Subtrees and Largest Common Point Sets. Technology, Tatsunokuchi, Ishikawa , Japan

Size: px
Start display at page:

Download "On the Approximation of Largest Common. Subtrees and Largest Common Point Sets. Technology, Tatsunokuchi, Ishikawa , Japan"

Transcription

1 On the Approximation of Largest Common Subtrees and Largest Common Point Sets Tatsuya Akutsu 1 and Magnus M. Halldorsson 2 1 Department of Computer Science, Gunma University, Kiryu, Gunma 376, Japan 2 School of Information Science, Japan Advanced Institute of Science and Technology, Tatsunokuchi, Ishikawa , Japan Abstract. This paper considers the approximability of the largest common subtree and the largest common subgraph problems, which have applications in molecular biology. It is shown that approximating the problems within a factor of n is NP-complete, while a general search algorithm which approximates both problems within a factor of O(n= log n) is presented. Moreover, several variants of the largest common subtree problem are studied. 1 Introduction In computational biology and chemistry, there is a frequent need to extract a common pattern from multiple data. A good example is the extraction of a common pattern from multiple amino acid sequences automatically, which has been studied extensively from both theoretical and practical viewpoints. We consider two such applications. One involves nding a common pattern from multiple molecules. Several methods have been developed for nding the largest common connected subgraph of multiple graphs, and have been applied to study the relationship between structures and chemical activities [11]. The other application is nding common substructures of a collection of 3-dimensional protein structures. Many methods have been given for nding common substructures of two protein structures [10, 12], and Russel and Barton have developed a method for multiple protein structures, and have applied it to multiple sequence alignment [10]. However, neither of these two applications have seen many studies from a theoretical perspective. This paper gives a theoretical analysis of the complexity of nding nearly optimal solutions for the abovementioned problems. The problems are formalized under the names largest common subtree problem (LCST) and the largest common point set problem (LCP). Given a collection of trees, possibly with labels on the vertices, the LCST problem is to nd a tree of maximum size that is isomorphic to a subtree in each of the input trees. It is a special case of a problem considered in [11]. We are particularly interested in the bounded-degree case, since the maximum vertex degree is bounded by constant in all molecules. Given a collection of geometric point sets, the LCP problem is to nd a set of points that is congruent to a subset of each input point set. It is closely related to the

2 problem of nding common substructures of multiple protein structures, since 3-dimensional protein structures are frequently treated as point sequences. Our main result is that both problems are very hard to approximate, when the number of input sets (trees/point sets) is unbounded. In particular, it is N P -complete to approximate the problems within a factor of n, where n is the size of the smallest input set. This holds for both labeled and unlabeled trees of bounded degree (LCST), and for one dimensional point sets (LCP). From the other direction, we present a general search algorithm that yields a non-trivial performance ratio for both problems, or O(n= log n). We further consider several variants of the LCST problem, both in terms of the format of the input trees (e.g. unbounded/bounded number of input trees, labels, and degree; ordered trees), and in terms of the denition used for a subtree (e.g. induced subgraph; required to include the root; descendants inheriting membership) and prove hardness and approximability results. Let us briey review related results. LCST for two trees can be solved in polynomial time [6] and LCST for three trees is NP-hard [1]. LCST can be solved in polynomial time if the maximum vertex degree is bounded and the number of input trees is xed [1]. Zhang and Jiang have shown that computing the largest tree that can be obtained from two unordered trees via few editing operations is MAX SNP-hard [13]. Approximate and exact matching problems between two point sets have been studied extensively in computational geometry, but we are not aware of results on larger collections of point sets. 2 The Hardness of Approximating Common Subtrees In this, and the following two sections, we consider the largest common subtree (LCST) problem. LCST is dened formally as follows: given a collection of trees T S = ft 1 ; ; T K g, nd a common tree with the maximum number of edges, where a tree T is called a common tree of T S if T is isomorphic to a subtree (i.e. a connected induced subgraph) of each T i. Let n denote the size of the smallest tree of the input, K the number of trees, and 1 the maximum degree of a vertex. An approximation algorithm A for a maximization problem approximates the optimal cost opt(x) within a factor of f(n) if, for all instances X of the problem of size n, opt(x)=a(x) f(n), where A(X) is the size of the solution produced by the algorithm. An independent set of graph G(V; E) is a set I of mutually non-adjacent vertices, i.e. satisfying (8v i ; v j 2 I)(fv i ; v j g =2 E). Arora et al. proved that for some > 0, the size of the maximum independent set of a graph cannot be approximated within a factor of n in polynomial time unless P=NP [3]. We show here that LCST cannot be approximated within a factor of n unless P=NP, by giving an approximation preserving reduction from the Independent Set problem. We shall consider directed (i.e. rooted) trees, while the same argument holds also for undirected trees. First, consider the case when the number of labels is unbounded.

3 Theorem 1. For some > 0, LCST for labeled trees cannot be approximated within a factor of n unless P=NP. Proof. We show that if LCST can be approximated within a factor of n, then Maximum Independent Set can be approximated within a factor of n 2. The theorem then follows from [3]. The reduction is similar to that of [8], with an additional technique introduced. Given a graph G, where V (G) = fv 1 ; : : : ; v N g and without loss of generality N = jv (G)j = 2 h for some cardinal h, we construct a collection T S of complete binary trees ft 1 ; T 2 ; : : : ; T g. The last tree T is of height h + H, where H will be specied later. Assuming some order among the children of each node, let (w 1 ; w 2 ; : : : ; wn ) be the sequence of nodes at depth h (with the root at depth 0), with node wj labeled by j. Other nodes in the tree are labeled by 0. The other trees T i, 1 i N, are of height h + H + 1 and consist of two subtrees R i and S i of height h + H, connected by an additional vertex. The vertices at height h in each subtree, (r i 1 ; ri 2 ; : : : ; ri n) and (s i 1 ; si 2 ; : : : ; si n), are labeled by: label(r i j) = j; if j = i _ fvi ; v j g =2 E, 02; otherwise, label(s i j) = 02; if j = i, j; otherwise, with all other nodes of the trees labeled by 0. Intuitively, the labels of vertices r i j encode the adjacency list of graph vertex v i. Observe that a common subtree T will be contained in either the R i or the S i portion of each input tree. A maximal common subtree will contain all the L = 2 H descendents of the non-zero labeled vertices it contains, as well as all the N 0 1 ancestors of non-zero labeled vertices in T =R i =S i. The vertices in T with positive labels describe exactly an independent set in the graph. Namely, we can construct an independent set I by: I = fv i j (9w 2 V (T))(label(w) = i)g: Thus, given a common subtree of size at least kl + N 0 2, we obtain an independent set of size k. Furthermore, this can be mapped back, thus, the independence number of the graph is m i the LCST size is ml + N 0 2. Now let H = h, thus L = 2N 0 1. Then the approximation ratio of the Independent Set instance is bounded by m k 2( ml + N 0 2 kl + N 0 2 ) 2n O(N 2 ); using that n = je(t )j = NL + N 0 2 2N 2. We now modify the construction for unlabeled trees. Theorem 2. For some > 0, LCST for unlabeled trees cannot be approximated within a factor of n unless P=NP.

4 T T i Nc logn w 1 w 2 w N c logn w 1 2c logn Nc logn w 2 complete binary tree of size L w N similar to T Fig. 1. Forms of trees constructed in Thm. 2 Proof. The proof is similar to that of Thm. 1, while the form of the constructed trees are modied as shown in Fig. 1. Vertices rj i (and similarly si j, w j ) are each replaced by a path of length ic log N, starting with new node wj i and ending with node ^w j i. Here, c is some xed integer satisfying c log N > 2 log N +dlog Le+ 1. The descendants of ^w j i are deleted if label(wi j ) = 02 in the proof of Thm. 1. Let q denote the size of the tree excluding the descendants of the ^w-nodes, i.e. q = c N(N01) log N +2N 02. It is easy to see that the size of LCST is ml+q 2 if and only if the size of the maximum independent set is m. Moreover, this can be obtained constructively. Given a common subtree T with at least kl + q edges, we extract an independent I with at least k vertices as follows: v i 2 I i there are at least two leaves w 1 and w 2 of T whose depth modulo c log N is i and whose lowest common ancestor is of depth at least ic log N. Then for L = (N 2 log N), the approximation ratio of the independent set instance is bounded by m=k < 2(mL + q)=(kl + q), which is at most n O(). 3 Algorithms for Approximating Common Subtrees We now consider some polynomial time algorithms that nd common subtrees of guaranteed size. Let us initially consider unlabeled trees. One approach is to look for simple types of subtrees, for instance paths. Compute the longest path of each tree, and use the shortest of those as the

5 common subtree solution. If the least maximum degree of the trees is bounded by 1, then there exists a path in each tree with at least log 1 n = log n= log 1 vertices. A O(n= log 1 n) performance ratio then follows. A similar approach can be used on high degree trees. Find the largest star in each tree, and let the smallest, of size 1 + 1, be the common subtree solution. Combine this with the above path and use the larger solution of size max 1 (1 + 1; log 1 n) log n= log log n. A performance ratio of O(n log log n= log n) is then automatic. Observe that in both cases did we solve optimally a restricted version of the problem, where the solution is to belong to these special subclasses of trees. Paths and stars are linearly ordered in terms of containment and thus easily solvable. More generally, we can solve this restricted problem for any family of trees that is polynomially bounded, or whose collection of maximal solutions is polynomially bounded. We now turn our attention to a dierent approach that holds also for labeled trees. We consider a simple but general search algorithm, previously used for graph coloring approximation [4, 7]. It is applicable to any hereditary subgraph/subset problem, i.e. for nding a subgraph satisfying property X which is also satised by any subsolution. The algorithm nds a subgraph of size m = dlog k jv je, whenever the graph contains an X-subgraph of size djv j=ke. The Common Subtree problem calls for the solution to be a tree, which is not a hereditary property. Nevertheless, because the input is a tree, there is a unique way to extend a subset of the vertices or edges of a tree into a proper subtree. CommonSubtreeSearch(T S = (T 1 ; T 2 ; : : : T K ),k) f T S contains a common subtree on d n=k e nodes g Partition V (T 1 ) into subsets B 1 ; B 2 ; : : : B dn=kme of size at most km each. for each B i do for each S B of m elements do S 0 Unique extension of S to a subtree in T 1 od od if S is a common subtree of T S then return S; halt return \T S did not contain a common subtree on d n=k e nodes" end To verify the correctness of the algorithm, suppose there is a common subtree of size dn=ke. By the pigeonhole principle, some B i must contain a subset of T of size dn=(km)e=dn=ke m: Since we search each B exhaustively, the search must succeed. As for the complexity, the repetitions of the inner loop is km (ek) m = e log n = n O(1) : m

6 Using that we can eciently check if a given tree is a common subtree, it follows that the algorithm runs in polynomial time. The randomized version of this method is particularly appealing: Repeatedly select a random subset of size m and verify if it satises the property. By similar analysis it succeed within n iterations, with high probability. In the absence of knowing k or the size of the optimal solution, we run CommonSubtreeSearch for k = 1; 2; 3; : : : until rst success is encountered. The size of the solution will then be log n=jop T j n, where OP T is the size of the optimal solution, and the performance ratio O(n= log n). Corollary 3. LCST can be approximated with a O(n= log n) factor. 4 Variants of LCST We now consider several variations on the theme of nding a largest common subtree of a collection of trees. The variations involve on one hand the structure of the input trees, and on the other hand the denition of the concept of a 'subtree'. The input can be restricted in three main ways by bounding crucial parameters: A) Number of labels, B) Maximum degree, and C) Number of input trees. The previous hardness result already holds for the rst two parameters optimally restricted: one (or zero) label, and degree at most two (at most two children). Incidentally, if maximum degree is two, the problem reduces to the well-known Largest Common Substring problem. In the case of constant number of trees, the problem can be solved in polynomial time if the degree is also bounded, even for labeled trees [1]. The reduction of [1] that proves the NP-hardness for 3 trees of unbounded degree can be seen to prove MAX SNP-hardness as well, showing that the problem does not have a polynomial time approximation schema. Another variation of the input format concerns whether there is an order among the children that must be preserved. This is largely a concern for unlabeled graphs, since an ordering can always be simulated with labels. Again, the previous hardness result holds. Corollary 4. LCST is as hard to approximate as the Independent Set problem, independent of the number of labels, maximum degree, and ordering constraints. When the number of trees is bounded, it is polynomial solvable on bounded degree graphs, but MAX SNP-hard for unbounded degree. Now consider variations of the denition of the term subtree. The canonical denition that we have used is that of a tree induced by a set of vertices/edges. Because the input graphs are also trees, this coincides both with the denition of an induced connected subgraph as well as with subtrees uniquely obtained by specifying only the leaves. Another natural version asks for an induced { not necessarily connected { subgraph, i.e. a forest. This comes in two avors: induced by a set of edges, or by a set of vertices.

7 The edge (vertex) subset variant, respectively, can be approximated within a factor of ( ) on unlabeled graphs with maximum degree 1 by the following simple approach: Pick an edge in each tree and add to solution; remove the edge and all incident edges (remove the edges, incident edges and edges incident on those, i.e. all edges within distance 2); iterate until some tree is empty. Because at each step we add one edge to the solution but remove at most ( ), this ratio is maintained. This can be generalized to trees with L distinct labels, by applying the above method on each of the collection of forests induced by the edges with that label, and using the largest result. This can be improved and generalized to graphs of unbounded degree by choosing disjoint stars instead of edges. We focus here on the edge subset version. We process each tree by repeating the following operation: Pick an internal vertex whose children are all leaves; keep the star rooted by that vertex; delete the vertex, its children and all incident edges (including the edge to the vertex' parent) from the tree. The result for each tree, is a collection of stars, which can be compactly represented as a multiset of integers. We now nd a maximum common collection of substars, from the collections of all the trees. The main argument is that for each star we select, we remove only that star and one additional edge which for the current purpose can be thought of as a degenerate star. The star we select matches both of these; thus we match at least half of the optimal solution, for a performance ratio of 2. In the case of trees with unbounded labels and unbounded degree, we can prove a strong hardness result by modifying the construction of the proof of Thm. 1. Eliminate all the unlabeled nodes (nodes with label 0), and make all w i j nodes to be children of the nearest r node. A common subtree will now contain a set of w nodes corresponding to an independent set and a single additional r node. Hence, any approximation for these instances will lead to equally good approximations for the independent set problem. We have the following result. Theorem 5. When a subtree is dened as a subgraph induced by a set of edges, the Common Subtree problem can be approximated within a factor of 2L on inputs with unbounded degree, unbounded number of input trees, and L labels. If the labels are also unbounded, the problem is as hard to approximate as the Independent Set problem. Finally, we consider two additional subtree variations. In one, the subtree must contain all the vertices headed by a given node w. That is, the subtree must consist of one of the two parts that appear when some edge of the tree is removed. This case turns out to be easy to solve because there are only 2n distinct such subtrees of a tree on n vertices. This holds for all the input variations above. This can be generalized to leveled subtrees, where the common subtree must contain precisely the vertices of level at most t below the node w. This includes the case when we restrict the solution to be a complete (1 0 1)-ary tree. The other case is a slight modication of the canonical case, where the input graphs are rooted and the subtrees are required to contain the root. The hardness results from the previous section hold equally for this case by a slight

8 modication of the construction. We modify the tree T by adding a new root adjacent only to the old root. The new root will match the roots of the other trees, while the old root will match either of R i or S i 's roots. As before, this holds for unlabeled trees of unbounded degree. However, in the case of ordered trees or when the labels of children must be distinct, the problem can be solved by simple recursive checking. Corollary 6. The LCST problem is hard to approximate even if the common subtree must match the roots of the trees, but can be solved in polynomial time if the subtrees are required to contain all the descendants of the highest vertex. 5 Largest Common Point Set Problem We now consider the largest common point set problem (LCP), dened as follows: given a collection of D-dimensional point sets SS = fs 1 ; ; S K g, nd a common point set with the maximum number of elements, where a point set C is a common point set of SS if C is congruent to a subset of each S i. We assume D is xed, and let n denote the size of the smallest input point set. First, we show that LCP is hard to approximate, even on the real line. Theorem 7. For some > 0, the LCP problem cannot be approximated within a factor of n unless P=NP. Proof. The reduction is similar to that of Thm. 1, but considerably simpler. Given a graph G on N vertices, we construct a collection S of point sets fs 1 ; S 2 ; : : : ; S g. Let L 1 and L 2 be suciently large numbers such that L 1 N 2 and L 2 N L 1, e.g. L 1 = 100N 2 and L 2 = 100NL 1. Corresponding to each vertex v j dene two points P j, R j on the real line by: P 1 = 0, P j = P j01 + L 1 + j 0 2 for 1 < j N, and R j = L 2 + P j. Let S = fp 1 ; ; P N g, and, for 1 i N, S i = f P j j j = i _ fv i ; v j g =2 E g [ f R j j j 6= i g: Note that if S i is not transformed by x 7! x or x 7! x 0 L 2, the number of elements of the intersection between S and the transformed point set can be at most 2. Thus, G has an independent set of size m if and only if there exists a common point set of size m, where we assume w.l.o.g. m > 2. Moreover, we can construct an independent set of size m in polynomial time given a common point set of size m. Finally, note that n, the size of the smallest point set, is N. While the LCP problem normally requires exact correspondence, the above result holds even if a small gap is allowed between corresponding points. In addition, we can easily obtain the same results for two variants. In one, the point sets are ordered and the order in sequences must be preserved. In the other, instead of point sets we are given graphs where each vertex is a point in D-dimensional space and each edge is a line segment connecting its endpoints.

9 In spite of this hardness result, the LCP problem can be solved in polynomial time if the number of point sets K is bounded. Consider all combinations of D + 1 elements from each set, which, if matching, uniquely denes an isometric transformation of the point sets, and count the points that match. This runs in time polynomial in the size of the input, where the degree depends on K and D. (See also [2].) Theorem 8. LCP can be solved in polynomial time for any xed value of K. Note that LCP can be approximated within a factor of O(n= log n) by the general algorithm described in Section 3 even if K is unbounded. References 1. T. Akutsu. An RNC algorithm for nding a largest common subtree of two trees. IEICE Transactions on Information and Systems, vol. E75-D, no. 1, pp. 95{101, Jan T. Akutsu. On determining the congruity of point sets in higher dimensions. These proceedings. 3. S. Arora, C. Lund, R. Motwani, M. Sudan and M. Szegedy. Proof verication and hardness of approximation problems. Proc. 33rd IEEE Symp. on Foundations of Computer Science, pp. 14{23, Oct B. Berger and J. Rompel. A better performance guarantee for approximate graph coloring. Algorithmica, vol. 5, no. 4, pp. 459{466, C. Branden and J. Tooze. Introduction to Protein Structure, Garland Publishing Inc., New York, M. R. Garey and D. S. Johnson. Computers and Intractability, Freeman, New York, M. M. Halldorsson. A still better performance guarantee for approximate graph coloring. Inform. Process. Lett., vol. 45, pp. 19{23, 25 January R. Maier. The complexity of some problems on subsequences and supersequences. J. ACM, vol. 25, pp. 322{336, C. Papadimitriou and M. Yannakakis. Optimization, approximation, and complexity classes. J. Computer and System Sciences, vol. 43, no. 3, pp. 425{440, Dec R. B. Russel and G. J. Barton. Multiple protein sequence alignment from tertiary structure comparison: assignment of global and residue condence levels. PRO- TEINS: Structure, Function, and Genetics, vol. 14, pp. 309{323, Y. Takahashi, Y. Satoh, H. Suzuki and S. Sasaki. Recognition of largest common structural fragment among a variety of chemical structures. Analytical Sciences, vol. 3, pp.23{28, G. Vriend and C. Sander. Detection of common three-dimensional substructures in proteins. PROTEINS: Structure, Function, and Genetics, vol. 11, pp. 52{58, K. Zhang and T. Jiang. Some MAX SNP-hard results concerning unordered labeled trees. To appear in Information Processing Letters.

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees

A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

Independent Sets in Hypergraphs with. Applications to Routing Via Fixed Paths. y.

Independent Sets in Hypergraphs with. Applications to Routing Via Fixed Paths. y. Independent Sets in Hypergraphs with Applications to Routing Via Fixed Paths Noga Alon 1, Uri Arad 2, and Yossi Azar 3 1 Department of Mathematics and Computer Science, Tel-Aviv University noga@mathtauacil

More information

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models. Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected

More information

15.4 Longest common subsequence

15.4 Longest common subsequence 15.4 Longest common subsequence Biological applications often need to compare the DNA of two (or more) different organisms A strand of DNA consists of a string of molecules called bases, where the possible

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

Combinatorial Problems on Strings with Applications to Protein Folding

Combinatorial Problems on Strings with Applications to Protein Folding Combinatorial Problems on Strings with Applications to Protein Folding Alantha Newman 1 and Matthias Ruhl 2 1 MIT Laboratory for Computer Science Cambridge, MA 02139 alantha@theory.lcs.mit.edu 2 IBM Almaden

More information

Connecting face hitting sets in planar graphs

Connecting face hitting sets in planar graphs Connecting face hitting sets in planar graphs Pascal Schweitzer and Patrick Schweitzer Max-Planck-Institute for Computer Science Campus E1 4, D-66123 Saarbrücken, Germany pascal@mpi-inf.mpg.de University

More information

v 2 v 3 v 1 v 0 K 3 K 1

v 2 v 3 v 1 v 0 K 3 K 1 It is Hard to Know when Greedy is Good for Finding Independent Sets Hans L. Bodlaender, Dimitrios M. Thilikos, Koichi Yamazaki Department of Computer Science, Utrecht University, P.O. Box 80.089, 3508

More information

31.6 Powers of an element

31.6 Powers of an element 31.6 Powers of an element Just as we often consider the multiples of a given element, modulo, we consider the sequence of powers of, modulo, where :,,,,. modulo Indexing from 0, the 0th value in this sequence

More information

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable A Simplied NP-complete MAXSAT Problem Venkatesh Raman 1, B. Ravikumar 2 and S. Srinivasa Rao 1 1 The Institute of Mathematical Sciences, C. I. T. Campus, Chennai 600 113. India 2 Department of Computer

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Dominance Constraints and Dominance Graphs

Dominance Constraints and Dominance Graphs Dominance Constraints and Dominance Graphs David Steurer Saarland University Abstract. Dominance constraints logically describe trees in terms of their adjacency and dominance, i.e. reachability, relation.

More information

Section Summary. Introduction to Trees Rooted Trees Trees as Models Properties of Trees

Section Summary. Introduction to Trees Rooted Trees Trees as Models Properties of Trees Chapter 11 Copyright McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Chapter Summary Introduction to Trees Applications

More information

ABSTRACT Finding a cut or nding a matching in a graph are so simple problems that hardly are considered problems at all. Finding a cut whose split edg

ABSTRACT Finding a cut or nding a matching in a graph are so simple problems that hardly are considered problems at all. Finding a cut whose split edg R O M A TRE DIA Universita degli Studi di Roma Tre Dipartimento di Informatica e Automazione Via della Vasca Navale, 79 { 00146 Roma, Italy The Complexity of the Matching-Cut Problem Maurizio Patrignani

More information

16 Greedy Algorithms

16 Greedy Algorithms 16 Greedy Algorithms Optimization algorithms typically go through a sequence of steps, with a set of choices at each For many optimization problems, using dynamic programming to determine the best choices

More information

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can A Simple Cubic Algorithm for Computing Minimum Height Elimination Trees for Interval Graphs Bengt Aspvall, Pinar Heggernes, Jan Arne Telle Department of Informatics, University of Bergen N{5020 Bergen,

More information

A New Approach to Graph Recognition and Applications to Distance-Hereditary Graphs

A New Approach to Graph Recognition and Applications to Distance-Hereditary Graphs Nakano S-i, Uehara R, Uno T. A new approach to graph recognition and applications to distance-hereditary graphs. JOUR- NAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(3): 517 533 May 2009 A New Approach to Graph

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Graph Algorithms Using Depth First Search

Graph Algorithms Using Depth First Search Graph Algorithms Using Depth First Search Analysis of Algorithms Week 8, Lecture 1 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Graph Algorithms Using Depth

More information

CS 441 Discrete Mathematics for CS Lecture 26. Graphs. CS 441 Discrete mathematics for CS. Final exam

CS 441 Discrete Mathematics for CS Lecture 26. Graphs. CS 441 Discrete mathematics for CS. Final exam CS 441 Discrete Mathematics for CS Lecture 26 Graphs Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Final exam Saturday, April 26, 2014 at 10:00-11:50am The same classroom as lectures The exam

More information

An undirected graph is a tree if and only of there is a unique simple path between any 2 of its vertices.

An undirected graph is a tree if and only of there is a unique simple path between any 2 of its vertices. Trees Trees form the most widely used subclasses of graphs. In CS, we make extensive use of trees. Trees are useful in organizing and relating data in databases, file systems and other applications. Formal

More information

A generalization of Mader s theorem

A generalization of Mader s theorem A generalization of Mader s theorem Ajit A. Diwan Department of Computer Science and Engineering Indian Institute of Technology, Bombay Mumbai, 4000076, India. email: aad@cse.iitb.ac.in 18 June 2007 Abstract

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

More information

Chapter Summary. Introduction to Trees Applications of Trees Tree Traversal Spanning Trees Minimum Spanning Trees

Chapter Summary. Introduction to Trees Applications of Trees Tree Traversal Spanning Trees Minimum Spanning Trees Trees Chapter 11 Chapter Summary Introduction to Trees Applications of Trees Tree Traversal Spanning Trees Minimum Spanning Trees Introduction to Trees Section 11.1 Section Summary Introduction to Trees

More information

Expected Approximation Guarantees for the Demand Matching Problem

Expected Approximation Guarantees for the Demand Matching Problem Expected Approximation Guarantees for the Demand Matching Problem C. Boucher D. Loker September 2006 Abstract The objective of the demand matching problem is to obtain the subset M of edges which is feasible

More information

On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

The External Network Problem

The External Network Problem The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the

More information

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing

1 Introduction The concept of graph spanners has been studied in several recent papers in the context of communication networks, distributed computing On the Hardness of Approximating Spanners Guy Kortsarz June 1, 1999 Abstract A k spanner of a connected graph G = (V; E) is a subgraph G 0 consisting of all the vertices of V and a subset of the edges,

More information

A Linear Time Algorithm for the Minimum Spanning Tree Problem. on a Planar Graph. Tomomi MATSUI. (January 1994 )

A Linear Time Algorithm for the Minimum Spanning Tree Problem. on a Planar Graph. Tomomi MATSUI. (January 1994 ) A Linear Time Algorithm for the Minimum Spanning Tree Problem on a Planar Graph Tomomi MATSUI (January 994 ) Department of Mathematical Engineering and Information Physics Faculty of Engineering, University

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

arxiv: v2 [cs.cc] 29 Mar 2010

arxiv: v2 [cs.cc] 29 Mar 2010 On a variant of Monotone NAE-3SAT and the Triangle-Free Cut problem. arxiv:1003.3704v2 [cs.cc] 29 Mar 2010 Peiyush Jain, Microsoft Corporation. June 28, 2018 Abstract In this paper we define a restricted

More information

Chapter 10: Trees. A tree is a connected simple undirected graph with no simple circuits.

Chapter 10: Trees. A tree is a connected simple undirected graph with no simple circuits. Chapter 10: Trees A tree is a connected simple undirected graph with no simple circuits. Properties: o There is a unique simple path between any 2 of its vertices. o No loops. o No multiple edges. Example

More information

The Complexity of the Network Design Problem

The Complexity of the Network Design Problem The Complexity of the Network Design Problem D. S. Johnson Bell Laboratories Murray Hill, New Jersey J. K. Lenstra Mathematisch Centrurn Amsterdam, The Netherlands A. H. G. Rinnooy Kan Erasmus University

More information

Weak Dynamic Coloring of Planar Graphs

Weak Dynamic Coloring of Planar Graphs Weak Dynamic Coloring of Planar Graphs Caroline Accurso 1,5, Vitaliy Chernyshov 2,5, Leaha Hand 3,5, Sogol Jahanbekam 2,4,5, and Paul Wenger 2 Abstract The k-weak-dynamic number of a graph G is the smallest

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Max-Planck Institut fur Informatik, Im Stadtwald, Saarbrucken, Germany,

Max-Planck Institut fur Informatik, Im Stadtwald, Saarbrucken, Germany, An Approximation Scheme for Bin Packing with Conicts Klaus Jansen 1 Max-Planck Institut fur Informatik, Im Stadtwald, 66 13 Saarbrucken, Germany, email : jansen@mpi-sb.mpg.de Abstract. In this paper we

More information

Graph and Digraph Glossary

Graph and Digraph Glossary 1 of 15 31.1.2004 14:45 Graph and Digraph Glossary A B C D E F G H I-J K L M N O P-Q R S T U V W-Z Acyclic Graph A graph is acyclic if it contains no cycles. Adjacency Matrix A 0-1 square matrix whose

More information

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19: CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny

More information

A Polynomial Time Approximation Scheme for the problem of Interconnecting Highways. Technical Report

A Polynomial Time Approximation Scheme for the problem of Interconnecting Highways. Technical Report A Polynomial Time Approximation Scheme for the problem of Interconnecting Highways Technical Report Department of Computer Science and Engineering University of Minnesota 4-192 EECS Building 200 Union

More information

Approximation Algorithms for Finding Highly. Samir Khuller. Dept. of Computer Science. University of Maryland. College Park, MD 20742

Approximation Algorithms for Finding Highly. Samir Khuller. Dept. of Computer Science. University of Maryland. College Park, MD 20742 Approximation Algorithms for Finding Highly Connected Subgraphs Samir Khuller Dept. of Computer Science University of Maryland College Park, MD 20742 samir@cs.umd.edu (301) 405 6765 This chapter is dedicated

More information

Counting the Number of Eulerian Orientations

Counting the Number of Eulerian Orientations Counting the Number of Eulerian Orientations Zhenghui Wang March 16, 011 1 Introduction Consider an undirected Eulerian graph, a graph in which each vertex has even degree. An Eulerian orientation of the

More information

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction Rearrangement of DNA fragments: a branch-and-cut algorithm 1 C. E. Ferreira 1 C. C. de Souza 2 Y. Wakabayashi 1 1 Instituto de Mat. e Estatstica 2 Instituto de Computac~ao Universidade de S~ao Paulo e-mail:

More information

arxiv:cs/ v1 [cs.ds] 20 Feb 2003

arxiv:cs/ v1 [cs.ds] 20 Feb 2003 The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Lecture 4: September 11, 2003

Lecture 4: September 11, 2003 Algorithmic Modeling and Complexity Fall 2003 Lecturer: J. van Leeuwen Lecture 4: September 11, 2003 Scribe: B. de Boer 4.1 Overview This lecture introduced Fixed Parameter Tractable (FPT) problems. An

More information

CSE 548: Analysis of Algorithms. Lecture 13 ( Approximation Algorithms )

CSE 548: Analysis of Algorithms. Lecture 13 ( Approximation Algorithms ) CSE 548: Analysis of Algorithms Lecture 13 ( Approximation Algorithms ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Fall 2017 Approximation Ratio Consider an optimization problem

More information

Kernelization Upper Bounds for Parameterized Graph Coloring Problems

Kernelization Upper Bounds for Parameterized Graph Coloring Problems Kernelization Upper Bounds for Parameterized Graph Coloring Problems Pim de Weijer Master Thesis: ICA-3137910 Supervisor: Hans L. Bodlaender Computing Science, Utrecht University 1 Abstract This thesis

More information

FINAL EXAM SOLUTIONS

FINAL EXAM SOLUTIONS COMP/MATH 3804 Design and Analysis of Algorithms I Fall 2015 FINAL EXAM SOLUTIONS Question 1 (12%). Modify Euclid s algorithm as follows. function Newclid(a,b) if a

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Towards more efficient infection and fire fighting

Towards more efficient infection and fire fighting Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department

More information

1 Matchings in Graphs

1 Matchings in Graphs Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent

More information

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies

Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Improved upper and lower bounds on the feedback vertex numbers of grids and butterflies Florent R. Madelaine and Iain A. Stewart Department of Computer Science, Durham University, Science Labs, South Road,

More information

Characterizations of graph classes by forbidden configurations

Characterizations of graph classes by forbidden configurations Characterizations of graph classes by forbidden configurations Zdeněk Dvořák September 14, 2015 We consider graph classes that can be described by excluding some fixed configurations. Let us give some

More information

Galaxy Cutsets in Graphs

Galaxy Cutsets in Graphs Galaxy Cutsets in Graphs Nicolas Sonnerat and Adrian Vetta Abstract. Given a network G = (V, E), we say that a subset of vertices S V has radius r if it is spanned by a tree of depth at most r. We are

More information

Contracting Chordal Graphs and Bipartite Graphs to Paths and Trees

Contracting Chordal Graphs and Bipartite Graphs to Paths and Trees Contracting Chordal Graphs and Bipartite Graphs to Paths and Trees Pinar Heggernes Pim van t Hof Benjamin Léveque Christophe Paul Abstract We study the following two graph modification problems: given

More information

Bipartite Roots of Graphs

Bipartite Roots of Graphs Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only

More information

The Number of Connected Components in Graphs and Its. Applications. Ryuhei Uehara. Natural Science Faculty, Komazawa University.

The Number of Connected Components in Graphs and Its. Applications. Ryuhei Uehara. Natural Science Faculty, Komazawa University. The Number of Connected Components in Graphs and Its Applications Ryuhei Uehara uehara@komazawa-u.ac.jp Natural Science Faculty, Komazawa University Abstract For any given graph and an integer k, the number

More information

4 Fractional Dimension of Posets from Trees

4 Fractional Dimension of Posets from Trees 57 4 Fractional Dimension of Posets from Trees In this last chapter, we switch gears a little bit, and fractionalize the dimension of posets We start with a few simple definitions to develop the language

More information

15.4 Longest common subsequence

15.4 Longest common subsequence 15.4 Longest common subsequence Biological applications often need to compare the DNA of two (or more) different organisms A strand of DNA consists of a string of molecules called bases, where the possible

More information

Foundations of Discrete Mathematics

Foundations of Discrete Mathematics Foundations of Discrete Mathematics Chapter 12 By Dr. Dalia M. Gil, Ph.D. Trees Tree are useful in computer science, where they are employed in a wide range of algorithms. They are used to construct efficient

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

r (1,1) r (2,4) r (2,5) r(2,6) r (1,3) r (1,2)

r (1,1) r (2,4) r (2,5) r(2,6) r (1,3) r (1,2) Routing on Trees via Matchings? Alan Roberts 1, Antonis Symvonis 1 and Louxin Zhang 2 1 Department of Computer Science, University of Sydney, N.S.W. 2006, Australia 2 Department of Computer Science, University

More information

Online Coloring Known Graphs

Online Coloring Known Graphs Online Coloring Known Graphs Magnús M. Halldórsson Science Institute University of Iceland IS-107 Reykjavik, Iceland mmh@hi.is, www.hi.is/ mmh. Submitted: September 13, 1999; Accepted: February 24, 2000.

More information

MATH 363 Final Wednesday, April 28. Final exam. You may use lemmas and theorems that were proven in class and on assignments unless stated otherwise.

MATH 363 Final Wednesday, April 28. Final exam. You may use lemmas and theorems that were proven in class and on assignments unless stated otherwise. Final exam This is a closed book exam. No calculators are allowed. Unless stated otherwise, justify all your steps. You may use lemmas and theorems that were proven in class and on assignments unless stated

More information

On Universal Cycles of Labeled Graphs

On Universal Cycles of Labeled Graphs On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

G G[S] G[D]

G G[S] G[D] Edge colouring reduced indierence graphs Celina M. H. de Figueiredo y Celia Picinin de Mello z Jo~ao Meidanis z Carmen Ortiz x Abstract The chromatic index problem { nding the minimum number of colours

More information

Y. Han* B. Narahari** H-A. Choi** University of Kentucky. The George Washington University

Y. Han* B. Narahari** H-A. Choi** University of Kentucky. The George Washington University Mapping a Chain Task to Chained Processors Y. Han* B. Narahari** H-A. Choi** *Department of Computer Science University of Kentucky Lexington, KY 40506 **Department of Electrical Engineering and Computer

More information

Signed domination numbers of a graph and its complement

Signed domination numbers of a graph and its complement Discrete Mathematics 283 (2004) 87 92 www.elsevier.com/locate/disc Signed domination numbers of a graph and its complement Ruth Haas a, Thomas B. Wexler b a Department of Mathematics, Smith College, Northampton,

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

THE FREUDENTHAL-HOPF THEOREM

THE FREUDENTHAL-HOPF THEOREM THE FREUDENTHAL-HOPF THEOREM SOFI GJING JOVANOVSKA Abstract. In this paper, we will examine a geometric property of groups: the number of ends of a group. Intuitively, the number of ends of a group is

More information

Faster parameterized algorithm for Cluster Vertex Deletion

Faster parameterized algorithm for Cluster Vertex Deletion Faster parameterized algorithm for Cluster Vertex Deletion Dekel Tsur arxiv:1901.07609v1 [cs.ds] 22 Jan 2019 Abstract In the Cluster Vertex Deletion problem the input is a graph G and an integer k. The

More information

On the Page Number of Upward Planar Directed Acyclic Graphs

On the Page Number of Upward Planar Directed Acyclic Graphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 17, no. 3, pp. 221 244 (2013) DOI: 10.7155/jgaa.00292 On the Page Number of Upward Planar Directed Acyclic Graphs Fabrizio Frati 1 Radoslav

More information

arxiv: v1 [cs.ds] 19 Feb 2014

arxiv: v1 [cs.ds] 19 Feb 2014 Turing Kernelization for Finding Long Paths and Cycles in Restricted Graph Classes Bart M. P. Jansen 1 University of Bergen, Norway. Bart.Jansen@ii.uib.no arxiv:1402.4718v1 [cs.ds] 19 Feb 2014 Abstract.

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Theorem 3.1 (Berge) A matching M in G is maximum if and only if there is no M- augmenting path.

Theorem 3.1 (Berge) A matching M in G is maximum if and only if there is no M- augmenting path. 3 Matchings Hall s Theorem Matching: A matching in G is a subset M E(G) so that no edge in M is a loop, and no two edges in M are incident with a common vertex. A matching M is maximal if there is no matching

More information

if for every induced subgraph H of G the chromatic number of H is equal to the largest size of a clique in H. The triangulated graphs constitute a wid

if for every induced subgraph H of G the chromatic number of H is equal to the largest size of a clique in H. The triangulated graphs constitute a wid Slightly Triangulated Graphs Are Perfect Frederic Maire e-mail : frm@ccr.jussieu.fr Case 189 Equipe Combinatoire Universite Paris 6, France December 21, 1995 Abstract A graph is triangulated if it has

More information

1. Why Study Trees? Trees and Graphs. 2. Binary Trees. CITS2200 Data Structures and Algorithms. Wood... Topic 10. Trees are ubiquitous. Examples...

1. Why Study Trees? Trees and Graphs. 2. Binary Trees. CITS2200 Data Structures and Algorithms. Wood... Topic 10. Trees are ubiquitous. Examples... . Why Study Trees? CITS00 Data Structures and Algorithms Topic 0 Trees and Graphs Trees and Graphs Binary trees definitions: size, height, levels, skinny, complete Trees, forests and orchards Wood... Examples...

More information

Results on the min-sum vertex cover problem

Results on the min-sum vertex cover problem Results on the min-sum vertex cover problem Ralucca Gera, 1 Craig Rasmussen, Pantelimon Stănică 1 Naval Postgraduate School Monterey, CA 9393, USA {rgera, ras, pstanica}@npsedu and Steve Horton United

More information

Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs

Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 603 631 (2014) DOI: 10.7155/jgaa.00339 Complexity of Disjoint Π-Vertex Deletion for Disconnected Forbidden Subgraphs Jiong

More information

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks Thomas Erlebach Department of Computer Science University of Leicester, UK te17@mcs.le.ac.uk Ambreen Shahnaz Department of Computer

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information