Notes and Comments for [1]

Size: px
Start display at page:

Download "Notes and Comments for [1]"

Transcription

1 Notes and Comments for [1] Zhang Qin July 14, 007 The purpose of the notes series Good Algorithms, especially for those natural problems, should be simple and elegant. Natural problems are those with universal assumptions, and search for a solution with symmetric properties. However, in the real world, things are not perfect; problems are often skewed. And the biggest obstacle is, things are often difficult. People believe that randomization and approximation may come to rescue, and then, algorithms become even more erratic. Honestly, randomization and approximation themselves are inherently symmetric, and algorithms could still be simple, effective and beautiful. But like the play of Go 1, they might not still be the best. However, most of us still prefer a move in Go with massiness and resulting in sound shape, even if it could not bring us the maximum benefits. And simple, elegant algorithms are still be thought the most valuable treasure computer scientists bring to the human beings. This notes series is devoted to those good algorithms, which have simple and beautiful ideas, as well as succinct and polished analysis. For the sake of convenience, some of the technical details might be neglected, and some analysis will be simplified. Contents Abstract some key words which denotes the major ideas/techniques one could learn. State the problem the paper want to solve clearly, along with its contributes. Dig out the intuition of the paper, and present the general idea. Summarize the main algorithms. Study the major techniques used and the art of the analysis. Some comments and conclusion 1 An Asian board game, some ugly moves may bring the best results. 1

2 1 Key words Property testing, random sampling, graph algorithm. Problems and Goals There are tons of results in this paper. And here we just select one of it, the k-colorability Testing Algorithm. We first introduce two important concepts. The graphs we assume in this note are undirected (but in the adjacent matrix representation, we can think it as a directed graph with duplicated edges), simple and dense graphs. Definition.1 property testing algorithm. We say that A is a property testing algorithm for the class of function F if for every n, ɛ and δ and for every function f and distribution D n over {0, 1} n the following holds if f F n then with probability at least 1 δ (over the examples drawn from D n and the possible coins of A), A accepts f (i.e., output 1). if f is ɛ-far from F n then with probability at least 1 δ (over the examples drawn from D n and the possible coins of A), A reject f (i.e., output 0). Definition. violating edges and good k-partitions. We say that an edge e = (u, v) E(G) is a violating edge with respect to a k- partition π: V (G) [k] if π(u) = π(v). We say that k-partition is ɛ-good if it has at most ɛn violating edges (otherwise it is ɛ-bad. The partition is perfect if it has no violating edge) Our task is try to construct a k-colorability Testing Algorithm for a given dense undirected graph G = (V, E) with V = N such that It is a property testing algorithm. Its query complexity is O ( k 4 log (k/δ) ɛ 6 ) and running time Exp(O ( k log (k/δ) ɛ 3 ) ). If the test graph G is k-colorable, then it is accepted with probability 1. With probability at least 1 δ (over the choice of the sampled vertices), it is possible to construct an ɛ-good k-partition of V (G) in addition time O ( log(k/δ) ɛ ) N. Actually in the analysis, we treat every undirected edge as two direct edges. That s why sometimes we see the violating edges doubled, but that is not important to us anyway

3 3 Intuition and General Idea The philosophy lies behind the notion of property testing (we restrict it to graph property testing here) is that we try to speculate the global property of the graph by examining only a local configuration of that graph, and we also try to make the speculation almost (with high probability) accurate. For example, in the k-colorability problem, we randomly sample a few (some constant independent with N) vertices (form a set X) along with the edges incident to them. We use our algorithm to experiment possible k-colorings on these elements and build one say, π on U X if possible, and then extend π to a global coloring π over the whole vertices set V. During the construction of π, we also use a small set of vertices S to test the goodness of our π. And if all the π s we could construct is bad, we could say that G is not k-colorable with high probability. otherwise, if one of them is good, then we could say G is k-colorable by introducing a small group of violating edges. A crucial observation in the analysis is that we do not need the sample approximate well all the relevant quantities. For example, here we allow some violating edges (up to the ɛn ). That s the key of fact that a constant number of sampling vertices suffice. This is a simple but great idea. Perfect solutions are always cost a lot, and in most cases approximation solutions or fault (various kinds) tolerant solutions may work pretty well! In this particular problem, during the coloring procedure, a natural idea is that we shall try to fix those restricting vertices (that is, those have little colors to choose due to the color configurations of their neighbors) first. And the rest could be done easily. During the coloring procedure, the color we give to a vertex should not effect the freedom of many of its neighbor vertices. 3 This is the guide line throughout the algorithm. 4 Algorithm and Explanation The general algorithm is described as follows. Algorithm k-colorability Testing(G), output accept/reject 1. Choose a uniformly set X = U S of total size O ( k log(k/δ) ɛ 3 ), where U = U 1 U... U l with l = 4k/ɛ and U i i=1,,...,l = S = m = O(l ɛ 1 log(k/δ)). For every pair of vertices v 1, v X, query if (v 1, v ) E(G). Let G X be the induced subgraph. 3. If k-colorable Verify(G X )=true, then output accept, else output reject. 3 freedom is in terms of the number of colors a vertex could still choose 3

4 Algorithm k-colorable Verify(U), output true/false 1. For any possible k-partition of U, denote π (a) (U, π ) =Contruct Core(U, π) (U : troublesome vertices.) (b) Use brute force to test if there is a perfect k-partition of U S that extends π, output true and return.. Output false. We would like to introduce several definitions in order to continue. Definition 4.1 clusters. Let U be a set of vertices, and let π be a perfect k-partition of U. Define U i = {v U : π (v) = i}. For each subset A [k], we define the A-cluster with respect to π as follows (let Γ(v) be the set of the neighbors of v): ) C A = ( Γ(U i) i A \ Γ(U i) Obviously, any v C A cannot be placed in any V i such that i A. Definition 4. restricting vertex. (restricting: not die but close to die.) A pair (v, i), where v C A, A / [k] and i Ā is said to be restricting with respect to a k-partition π of U if v has at least ɛ N neighbors in 4 B:i/ BC B. A vertex v C A, A / [k], is restricting with respect to π if for every i Ā, the pair (v, i) is restricting. The clusters are with respect to π. Intuitively, a vertex v C A is restricting if for every i Ā, add v to U i will cause many of its neighbors to move to a cluster corresponding to a bigger subset. Algorithm Contruct Core(U, π), output U (conceptual version, used only for the analysis.) 1. U =.. For j = 1,,... (index of copies) do the following. Consider the current set U and its partition π. (a) If there are less than ɛ N restricting vertices with respect to π then halt and output U. (b) If there are at least ɛ N vertices but there is no restricting vertex in U j, then halt and output an error symbol (seldom happen). (c) Otherwise add the first (by any fixed order 4 ) restricting vertex in U j to U. Go on to the next iteration. 4 One can think that we give an order to all vertices in U j aforehand. i/ A 4

5 Algorithm Contruct Core(U, π), output U (practical version.) 1. U =.. For j = 1,,... do the following. Consider the current set U and its partition π. (a) Uniformly select a set W j of size Θ ( ) log(k/ɛδ) ɛ (b) For each u U j, let R(u, i) be the set of neighbors of u in W j that belong to B-clusters such that i / B. If for some u U j, R(u, i) / W j 3ɛ/ for every i Ā, then we conclude that u is a restricting vertex, and we select the first (according to some fix order) such vertex in U j to U. When there is no such vertex, halt. Definition 4.3 close partitions. A partition of (U, π ) is called closed if there are less than ɛ N restricting vertices with respect to π. Remark 4.1 We observe (see the algorithm Contruct Core(U) and the corresponding analysis section 5) the following simple but important facts: The algorithm output a set U this set together with its induced partition are closed. And the algorithm output a closed partition with high probability ( 1 δ ). Thus with high probability, we would get a close partition. Definition 4.4 forbidden sets. Let (U, π ) be closed and consider the clusters with respect to π. For each v V (G)\U, we define the forbidden set of v, denoted F v, as the smallest set satisfying F v A, where v C A. For every i Ā, if v has at least ɛ 4 N neighbors in the cluster C B for which i / B, then i is in F v. For u U, define F u = [k]\{π (u)}. Be confused by these definitions? Actually, they just tell us which color we could choose and among those which is best to choose. A guide line here is that the color we choose for a vertex should not affect too much about the freedom of its neighbors. Algorithm Coloring(V, {F v : v V }) 5

6 1. For each v V \U we select a sample of S = Θ ( ) log(k/(ɛδ)) ɛ vertices, and approximate, for each i Ā (where v C A), the number of neighbors (denoted M) that v has in B-clusters such that i / B. And if M ɛ S, 4 add i to F v.. For each u U, F u = [k]\{π (u)}. 3. For every vertex v V, assign a color π(v) / F v. 4. For those v with F v = [k], assign an arbitrary color. A few explanations. 1. The remark 4.1 is true according to two facts. First, after at most l = 4k/ɛ, the procedure Contruct Core(U) halts, and output U or error. Second, with high probability, the procedure halts with output U rather than error. These two facts will be illustrate in section 5.. In the practical version of the Contruct Core(U), we use sampling again to avoid the time overhead to query every vertex in V in order to determine those restricting vertices in U j. The analysis will be given in section 5. An observation here is that we need not care about the borderline of ɛ N. All that we need to do is try to find restricting vertex in U j and continue. If cannot find, halt. That borderline is just useful for the analysis. Note that in the practical version, there is no error state. 3. In the procedure Coloring(V, {F v : v V }), one problem is that some vertices might have no color to choose, that is, F v = [k]. However, we will see later in the analysis that such vertices are rare ( ɛ N), thus we could choose an arbitrary color for it. 5 Major Techniques and Proofs 5.1 Proof of Remark 4.1 Remember we need two things. The algorithm should halt within l steps. The algorithm seldom output error. The first is true because every vertices will stay in at most k different clusters (bigger and bigger) during the whole procedure. And every time a restricting vertex is picked, at least ɛ n neighbor vertices will be picked to a different (bigger) 4 cluster. Since there are n vertices, so at most (l =)4k/ɛ such events would happen. 6

7 The second due to our choice of U i (1 i l) to be m = O ( ) l log(k/δ) ɛ. If there is at least ɛ N restricting vertices. Then the probability that U i contains none of them is at most ( ) m 1 ɛ < δ k l, Further more, there are at most k l different coloring schemes for the vertices picked in those (at most l) rounds. Since every time we add the first vertices in U i, and it could be colored in at most k colors. Therefore with probability greater than 1 δ, the procedure never output error. 5. Vertices which have No Color to Use is Rare That is, #vertices belonging to C [k] or with F v = [k] is small. If F v = [k] and v / C [k], v must be a restricting vertex due to the second item of the Definition of forbidden vertex. And we already show that the number of restricting vertices would be less than ɛ N when the algorithm terminates. Otherwise v C [k], we need the check set S (remember X = U S) to prove that C [k] is small with high probability. We say a (closed) pair (U, π ) is ɛ-useful if C [k] < ɛ N, otherwise it is ɛ-unuseful. The crucial observation is that Claim 5.1 If (U, π ) is ɛ-unuseful, then with probability 1 δ k l, there is no perfect partition for U S which extend π Proof. If C [k] ɛ N the probability of S contains no vertex in C [k] is at most ( 1 ɛ ) S ( = 1 ɛ ) O(l ɛ 1 log(k/δ)) δ k l Since there are at most k l closed pairs of (U, π ), we have the following Corollary 5.1 If all the closed partitions (U, π ) are unuseful, with probability 1 δ over the choices of S, there is no perfect k-partition of X = U S. In other words, if there is a k-partition with probability greater than δ, there must be a useful closed partition. 5.3 Put things together Now we put things together. Suppose the probability that G is k-colorable is greater than δ, we have following deduction. P r[g is k-colorable] δ Remark 4.1 P r[g is k-colorable there is an output U ] > δ Corollary 5.1 Exist an ɛ-useful closed pair(u, π ) Algo Coloring Obtain an ɛ-good partition. 7

8 Last section already shows that vertices with no color to use is rare, that is, less than ɛ N in total. Coloring them with arbitrary color will introduce at most 4 ɛ N violating edges since each vertices incident with at most n edge (every undirected edge would be counted twice here). In the next section, we would see that if we use the practical version of Contruct Core(U), we will introduce another (at most) ɛ N bad vertices, which contribute another ɛ N violating edges, 4 thus the total we have at most ɛn violating edges. The other direction (that is, if G is not k-colorable) follows directly from the Corollary Small Samplings Suffice That is, a small set of sampling vertices suffices to determine restricting vertices and forbidden sets, see algorithm Contruct Core(U) and Coloring(V, F v ). As posed in section, we want the query time and running time to be independent on n. Thus we d better perform sampling, and fortunately we can sample a set of vertices whose cardinality is independent on n to determine restricting vertices and forbidden sets (which related to n) with high probability. The seemingly magical fact actually makes use of the following two assumptions (implicitly) graph is dense. error torrent. We want the following two properties. 1. If for some u U j, R(u, i) / W j 3ɛ/ for every i Ā, then u is a restricting vertex with probability at least 1 δ. If this is true, we can 4l conclude that algorithm Contruct Core(U) works correctly with probability at least 1 δ. 4. With probability at least 1 δ 4, there are at most ɛ 4 N vertices whose F vs (the forbidden set) are wrongly computed. (These wrongly computed vertices would contribute another (at most) ɛ N violating edges as mentioned before.) The first property could be proved directly by using Chernoff bound. Use the additive form P r [ 1 m m i=1 X i p > γ ] < e γm. Here m = W j = Θ ( ) log(k/ɛδ) ɛ, p = ɛ, γ = 3ɛ, and plug in these values we get what we need. 4 We use basically the same method for the second. We still choose m, p, γ as in the first case, and the right bound is O ( ) ɛδ k. Since we have at most k colors to test for each vertex, the error bound would be less than ɛδ. Thus the expected number of vertices who are wrongly approximated (differ significantly from the

9 expected value) by the samplings is O(ɛδ)N. Apply the Markov inequality, we have P r[#wrongly approximated vertices ɛ O(ɛδN) N] ɛ 4 N δ Conclusion and Comments One kind of excellent papers = natural and beautiful idea + deep exploration and analysis + fundamental results. References [1] Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. In IEEE Symposium on Foundations of Computer Science, pages ,

Summarize of Great Papers

Summarize of Great Papers Summarize of Great Papers Zhang Qin July 14, 2007 The purpose of this summary Good Algorithms, especially for those natural problems, should be simple and elegant. Natural problems are those with universal

More information

Lecture and notes by: Nate Chenette, Brent Myers, Hari Prasad November 8, Property Testing

Lecture and notes by: Nate Chenette, Brent Myers, Hari Prasad November 8, Property Testing Property Testing 1 Introduction Broadly, property testing is the study of the following class of problems: Given the ability to perform (local) queries concerning a particular object (e.g., a function,

More information

1 Matchings in Graphs

1 Matchings in Graphs Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs

Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs Robert Krauthgamer 1 Approximating Average Degree in a Graph Input: A graph represented (say) as the adjacency

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

Theoretical Computer Science. Testing Eulerianity and connectivity in directed sparse graphs

Theoretical Computer Science. Testing Eulerianity and connectivity in directed sparse graphs Theoretical Computer Science 412 (2011) 6390 640 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Testing Eulerianity and connectivity

More information

CS264: Homework #4. Due by midnight on Wednesday, October 22, 2014

CS264: Homework #4. Due by midnight on Wednesday, October 22, 2014 CS264: Homework #4 Due by midnight on Wednesday, October 22, 2014 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Turn in your solutions

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

Lecture 9: Zero-Knowledge Proofs

Lecture 9: Zero-Knowledge Proofs Great Ideas in Theoretical Computer Science Summer 2013 Lecture 9: Zero-Knowledge Proofs Lecturer: Kurt Mehlhorn & He Sun A zero-knowledge proof is an interactive protocol (game) between two parties, a

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Comparing the strength of query types in property testing: The case of testing k-colorability

Comparing the strength of query types in property testing: The case of testing k-colorability Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron October 1, 2007 Abstract We study the power of four

More information

Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

More information

Towards the Proof of the PCP Theorem

Towards the Proof of the PCP Theorem CS640 Computational Complexity Towards the Proof of the PCP Theorem Instructor: Manindra Agrawal Scribe: Ramprasad Saptharishi Last class we saw completed our discussion on expander graphs. We shall now

More information

Comparing the strength of query types in property testing: The case of testing k-colorability

Comparing the strength of query types in property testing: The case of testing k-colorability Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron Abstract We study the power of four query models

More information

Testing Eulerianity and Connectivity in Directed Sparse Graphs

Testing Eulerianity and Connectivity in Directed Sparse Graphs Testing Eulerianity and Connectivity in Directed Sparse Graphs Yaron Orenstein School of EE Tel-Aviv University Ramat Aviv, Israel yaronore@post.tau.ac.il Dana Ron School of EE Tel-Aviv University Ramat

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1

Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1 Graph fundamentals Bipartite graph characterization Lemma. If a graph contains an odd closed walk, then it contains an odd cycle. Proof strategy: Consider a shortest closed odd walk W. If W is not a cycle,

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,

More information

Maximal Independent Set

Maximal Independent Set Chapter 4 Maximal Independent Set In this chapter we present a first highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

1 Minimum Cut Problem

1 Minimum Cut Problem CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum

More information

Lecture 5. Figure 1: The colored edges indicate the member edges of several maximal matchings of the given graph.

Lecture 5. Figure 1: The colored edges indicate the member edges of several maximal matchings of the given graph. 5.859-Z Algorithmic Superpower Randomization September 25, 204 Lecture 5 Lecturer: Bernhard Haeupler Scribe: Neil Shah Overview The next 2 lectures are on the topic of distributed computing there are lots

More information

Algebraic method for Shortest Paths problems

Algebraic method for Shortest Paths problems Lecture 1 (06.03.2013) Author: Jaros law B lasiok Algebraic method for Shortest Paths problems 1 Introduction In the following lecture we will see algebraic algorithms for various shortest-paths problems.

More information

Lecture 6: Spectral Graph Theory I

Lecture 6: Spectral Graph Theory I A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 6: Spectral Graph Theory I September 5, 013 Lecturer: Ryan O Donnell Scribe: Jennifer Iglesias 1 Graph Theory For this course we will be working on

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011 Stanford University CS359G: Graph Partitioning and Expanders Handout 8 Luca Trevisan March 3, 20 Lecture 8 In which we prove properties of expander graphs. Quasirandomness of Expander Graphs Recall that

More information

Notes 8: Expander Codes and their decoding

Notes 8: Expander Codes and their decoding Introduction to Coding Theory CMU: Spring 010 Notes 8: Expander Codes and their decoding March 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ankit Sharma In this lecture, we shall look

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

Maximal Independent Set

Maximal Independent Set Chapter 0 Maximal Independent Set In this chapter we present a highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study in

More information

Bipartite Roots of Graphs

Bipartite Roots of Graphs Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only

More information

Testing Euclidean Minimum Spanning Trees in the Plane

Testing Euclidean Minimum Spanning Trees in the Plane Testing Euclidean Minimum Spanning Trees in the Plane Artur Czumaj Christian Sohler Department of Computer Science Heinz Nixdorf Institute University of Warwick Computer Science Department Coventry CV4

More information

CONNECTIVITY AND NETWORKS

CONNECTIVITY AND NETWORKS CONNECTIVITY AND NETWORKS We begin with the definition of a few symbols, two of which can cause great confusion, especially when hand-written. Consider a graph G. (G) the degree of the vertex with smallest

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix. CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear

More information

Lecture 7: Asymmetric K-Center

Lecture 7: Asymmetric K-Center Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Recitation 4: Elimination algorithm, reconstituted graph, triangulation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Hi everyone. I hope everyone had a good Fourth of July. Today we're going to be covering graph search. Now, whenever we bring up graph algorithms, we

Hi everyone. I hope everyone had a good Fourth of July. Today we're going to be covering graph search. Now, whenever we bring up graph algorithms, we Hi everyone. I hope everyone had a good Fourth of July. Today we're going to be covering graph search. Now, whenever we bring up graph algorithms, we have to talk about the way in which we represent the

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

Research Question Presentation on the Edge Clique Covers of a Complete Multipartite Graph. Nechama Florans. Mentor: Dr. Boram Park

Research Question Presentation on the Edge Clique Covers of a Complete Multipartite Graph. Nechama Florans. Mentor: Dr. Boram Park Research Question Presentation on the Edge Clique Covers of a Complete Multipartite Graph Nechama Florans Mentor: Dr. Boram Park G: V 5 Vertex Clique Covers and Edge Clique Covers: Suppose we have a graph

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Ma/CS 6b Class 5: Graph Connectivity

Ma/CS 6b Class 5: Graph Connectivity Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should

More information

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)

Lecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3) COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms

More information

Complete Cototal Domination

Complete Cototal Domination Chapter 5 Complete Cototal Domination Number of a Graph Published in Journal of Scientific Research Vol. () (2011), 547-555 (Bangladesh). 64 ABSTRACT Let G = (V,E) be a graph. A dominating set D V is said

More information

All-Pairs Nearly 2-Approximate Shortest-Paths in O(n 2 polylog n) Time

All-Pairs Nearly 2-Approximate Shortest-Paths in O(n 2 polylog n) Time All-Pairs Nearly 2-Approximate Shortest-Paths in O(n 2 polylog n) Time Surender Baswana 1, Vishrut Goyal 2, and Sandeep Sen 3 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany. sbaswana@mpi-sb.mpg.de

More information

1 Definition of Reduction

1 Definition of Reduction 1 Definition of Reduction Problem A is reducible, or more technically Turing reducible, to problem B, denoted A B if there a main program M to solve problem A that lacks only a procedure to solve problem

More information

Sublinear Algorithms Lectures 1 and 2. Sofya Raskhodnikova Penn State University

Sublinear Algorithms Lectures 1 and 2. Sofya Raskhodnikova Penn State University Sublinear Algorithms Lectures 1 and 2 Sofya Raskhodnikova Penn State University 1 Tentative Topics Introduction, examples and general techniques. Sublinear-time algorithms for graphs strings basic properties

More information

Notes for Recitation 9

Notes for Recitation 9 6.042/18.062J Mathematics for Computer Science October 8, 2010 Tom Leighton and Marten van Dijk Notes for Recitation 9 1 Traveling Salesperson Problem Now we re going to talk about a famous optimization

More information

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Venkatesan Guruswami Carnegie Mellon University Pittsburgh, PA 53 Email: guruswami@cmu.edu Ray Li Carnegie Mellon University

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Lecture 6: Graph Properties

Lecture 6: Graph Properties Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Greedy Algorithms. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms

Greedy Algorithms. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms Greedy Algorithms A greedy algorithm is one where you take the step that seems the best at the time while executing the algorithm. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms Coin

More information

Algorithms for Euclidean TSP

Algorithms for Euclidean TSP This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation

More information

princeton univ. F 15 cos 521: Advanced Algorithm Design Lecture 2: Karger s Min Cut Algorithm

princeton univ. F 15 cos 521: Advanced Algorithm Design Lecture 2: Karger s Min Cut Algorithm princeton univ. F 5 cos 5: Advanced Algorithm Design Lecture : Karger s Min Cut Algorithm Lecturer: Pravesh Kothari Scribe:Pravesh (These notes are a slightly modified version of notes from previous offerings

More information

Problem Set 3. MATH 778C, Spring 2009, Austin Mohr (with John Boozer) April 15, 2009

Problem Set 3. MATH 778C, Spring 2009, Austin Mohr (with John Boozer) April 15, 2009 Problem Set 3 MATH 778C, Spring 2009, Austin Mohr (with John Boozer) April 15, 2009 1. Show directly that P 1 (s) P 1 (t) for all t s. Proof. Given G, let H s be a subgraph of G on s vertices such that

More information

ON THE STRONGLY REGULAR GRAPH OF PARAMETERS

ON THE STRONGLY REGULAR GRAPH OF PARAMETERS ON THE STRONGLY REGULAR GRAPH OF PARAMETERS (99, 14, 1, 2) SUZY LOU AND MAX MURIN Abstract. In an attempt to find a strongly regular graph of parameters (99, 14, 1, 2) or to disprove its existence, we

More information

Instructor: Padraic Bartlett. Lecture 2: Schreier Diagrams

Instructor: Padraic Bartlett. Lecture 2: Schreier Diagrams Algebraic GT Instructor: Padraic Bartlett Lecture 2: Schreier Diagrams Week 5 Mathcamp 2014 This class s lecture continues last s class s discussion of the interplay between groups and graphs. In specific,

More information

Coloring 3-colorable Graphs

Coloring 3-colorable Graphs Coloring 3-colorable Graphs Pawan Kumar Aurora Advised by Prof. Shashank K Mehta Department of Computer Science and Engineering Indian Institute of Technology, Kanpur State of the Art Seminar k-coloring

More information

Restricted edge connectivity and restricted connectivity of graphs

Restricted edge connectivity and restricted connectivity of graphs Restricted edge connectivity and restricted connectivity of graphs Litao Guo School of Applied Mathematics Xiamen University of Technology Xiamen Fujian 361024 P.R.China ltguo2012@126.com Xiaofeng Guo

More information

Ma/CS 6b Class 26: Art Galleries and Politicians

Ma/CS 6b Class 26: Art Galleries and Politicians Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

1 Matchings with Tutte s Theorem

1 Matchings with Tutte s Theorem 1 Matchings with Tutte s Theorem Last week we saw a fairly strong necessary criterion for a graph to have a perfect matching. Today we see that this condition is in fact sufficient. Theorem 1 (Tutte, 47).

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

arxiv: v1 [cs.dm] 30 Apr 2014

arxiv: v1 [cs.dm] 30 Apr 2014 The stable set polytope of (P 6,triangle)-free graphs and new facet-inducing graphs Raffaele Mosca arxiv:1404.7623v1 [cs.dm] 30 Apr 2014 May 1, 2014 Abstract The stable set polytope of a graph G, denoted

More information

Lecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY

Lecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day Show that the Dense

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Graph Connectivity G G G

Graph Connectivity G G G Graph Connectivity 1 Introduction We have seen that trees are minimally connected graphs, i.e., deleting any edge of the tree gives us a disconnected graph. What makes trees so susceptible to edge deletions?

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Solutions for the Exam 6 January 2014

Solutions for the Exam 6 January 2014 Mastermath and LNMB Course: Discrete Optimization Solutions for the Exam 6 January 2014 Utrecht University, Educatorium, 13:30 16:30 The examination lasts 3 hours. Grading will be done before January 20,

More information

Algorithmica 2002 Springer-Verlag New York Inc.

Algorithmica 2002 Springer-Verlag New York Inc. Algorithmica (2002) 32: 302 343 DOI: 10.1007/s00453-001-0078-7 Algorithmica 2002 Springer-Verlag New York Inc. Property Testing in Bounded Degree Graphs 1 O. Goldreich 2 and D. Ron 3 Abstract. We further

More information

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,

More information

6 Randomized rounding of semidefinite programs

6 Randomized rounding of semidefinite programs 6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can

More information

14.1 Encoding for different models of computation

14.1 Encoding for different models of computation Lecture 14 Decidable languages In the previous lecture we discussed some examples of encoding schemes, through which various objects can be represented by strings over a given alphabet. We will begin this

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 2018 February 10, 2018 Combinatorics 1. Consider a 2 3 grid where each entry is one of 0, 1, and 2. For how many such grids is the sum of the numbers in every row and in every column a multiple

More information

Course Introduction / Review of Fundamentals of Graph Theory

Course Introduction / Review of Fundamentals of Graph Theory Course Introduction / Review of Fundamentals of Graph Theory Hiroki Sayama sayama@binghamton.edu Rise of Network Science (From Barabasi 2010) 2 Network models Many discrete parts involved Classic mean-field

More information

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions Introduction Chapter 9 Graph Algorithms graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 2 Definitions an undirected graph G = (V, E) is

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS276: Cryptography Handout N24 Luca Trevisan April 21, 2009 Notes for Lecture 24 Scribed by Milosh Drezgich, posted May 11, 2009 Summary Today we introduce the notion of zero knowledge proof

More information

Coloring 3-Colorable Graphs

Coloring 3-Colorable Graphs Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)

More information

Testing subgraphs in large graphs

Testing subgraphs in large graphs Testing subgraphs in large graphs Noga Alon Abstract Let H be a fixed graph with h vertices, let G be a graph on n vertices and suppose that at least ɛn 2 edges have to be deleted from it to make it H-free.

More information

MATH 682 Notes Combinatorics and Graph Theory II

MATH 682 Notes Combinatorics and Graph Theory II 1 Matchings A popular question to be asked on graphs, if graphs represent some sort of compatability or association, is how to associate as many vertices as possible into well-matched pairs. It is to this

More information

ON SWELL COLORED COMPLETE GRAPHS

ON SWELL COLORED COMPLETE GRAPHS Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains

More information

12.1 Formulation of General Perfect Matching

12.1 Formulation of General Perfect Matching CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007 CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 5

CPSC 536N: Randomized Algorithms Term 2. Lecture 5 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 5 University of British Columbia In this lecture we continue to discuss applications of randomized algorithms in computer networking.

More information

Algorithms for Grid Graphs in the MapReduce Model

Algorithms for Grid Graphs in the MapReduce Model University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Dissertations, and Student Research Computer Science and Engineering, Department

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method Po-Shen Loh June 2010 1 Warm-up 1. (Russia 1996/4 In the Duma there are 1600 delegates, who have formed 16000 committees of 80 persons each. Prove that one can find two committees

More information