Notes and Comments for [1]
|
|
- Evan Matthews
- 5 years ago
- Views:
Transcription
1 Notes and Comments for [1] Zhang Qin July 14, 007 The purpose of the notes series Good Algorithms, especially for those natural problems, should be simple and elegant. Natural problems are those with universal assumptions, and search for a solution with symmetric properties. However, in the real world, things are not perfect; problems are often skewed. And the biggest obstacle is, things are often difficult. People believe that randomization and approximation may come to rescue, and then, algorithms become even more erratic. Honestly, randomization and approximation themselves are inherently symmetric, and algorithms could still be simple, effective and beautiful. But like the play of Go 1, they might not still be the best. However, most of us still prefer a move in Go with massiness and resulting in sound shape, even if it could not bring us the maximum benefits. And simple, elegant algorithms are still be thought the most valuable treasure computer scientists bring to the human beings. This notes series is devoted to those good algorithms, which have simple and beautiful ideas, as well as succinct and polished analysis. For the sake of convenience, some of the technical details might be neglected, and some analysis will be simplified. Contents Abstract some key words which denotes the major ideas/techniques one could learn. State the problem the paper want to solve clearly, along with its contributes. Dig out the intuition of the paper, and present the general idea. Summarize the main algorithms. Study the major techniques used and the art of the analysis. Some comments and conclusion 1 An Asian board game, some ugly moves may bring the best results. 1
2 1 Key words Property testing, random sampling, graph algorithm. Problems and Goals There are tons of results in this paper. And here we just select one of it, the k-colorability Testing Algorithm. We first introduce two important concepts. The graphs we assume in this note are undirected (but in the adjacent matrix representation, we can think it as a directed graph with duplicated edges), simple and dense graphs. Definition.1 property testing algorithm. We say that A is a property testing algorithm for the class of function F if for every n, ɛ and δ and for every function f and distribution D n over {0, 1} n the following holds if f F n then with probability at least 1 δ (over the examples drawn from D n and the possible coins of A), A accepts f (i.e., output 1). if f is ɛ-far from F n then with probability at least 1 δ (over the examples drawn from D n and the possible coins of A), A reject f (i.e., output 0). Definition. violating edges and good k-partitions. We say that an edge e = (u, v) E(G) is a violating edge with respect to a k- partition π: V (G) [k] if π(u) = π(v). We say that k-partition is ɛ-good if it has at most ɛn violating edges (otherwise it is ɛ-bad. The partition is perfect if it has no violating edge) Our task is try to construct a k-colorability Testing Algorithm for a given dense undirected graph G = (V, E) with V = N such that It is a property testing algorithm. Its query complexity is O ( k 4 log (k/δ) ɛ 6 ) and running time Exp(O ( k log (k/δ) ɛ 3 ) ). If the test graph G is k-colorable, then it is accepted with probability 1. With probability at least 1 δ (over the choice of the sampled vertices), it is possible to construct an ɛ-good k-partition of V (G) in addition time O ( log(k/δ) ɛ ) N. Actually in the analysis, we treat every undirected edge as two direct edges. That s why sometimes we see the violating edges doubled, but that is not important to us anyway
3 3 Intuition and General Idea The philosophy lies behind the notion of property testing (we restrict it to graph property testing here) is that we try to speculate the global property of the graph by examining only a local configuration of that graph, and we also try to make the speculation almost (with high probability) accurate. For example, in the k-colorability problem, we randomly sample a few (some constant independent with N) vertices (form a set X) along with the edges incident to them. We use our algorithm to experiment possible k-colorings on these elements and build one say, π on U X if possible, and then extend π to a global coloring π over the whole vertices set V. During the construction of π, we also use a small set of vertices S to test the goodness of our π. And if all the π s we could construct is bad, we could say that G is not k-colorable with high probability. otherwise, if one of them is good, then we could say G is k-colorable by introducing a small group of violating edges. A crucial observation in the analysis is that we do not need the sample approximate well all the relevant quantities. For example, here we allow some violating edges (up to the ɛn ). That s the key of fact that a constant number of sampling vertices suffice. This is a simple but great idea. Perfect solutions are always cost a lot, and in most cases approximation solutions or fault (various kinds) tolerant solutions may work pretty well! In this particular problem, during the coloring procedure, a natural idea is that we shall try to fix those restricting vertices (that is, those have little colors to choose due to the color configurations of their neighbors) first. And the rest could be done easily. During the coloring procedure, the color we give to a vertex should not effect the freedom of many of its neighbor vertices. 3 This is the guide line throughout the algorithm. 4 Algorithm and Explanation The general algorithm is described as follows. Algorithm k-colorability Testing(G), output accept/reject 1. Choose a uniformly set X = U S of total size O ( k log(k/δ) ɛ 3 ), where U = U 1 U... U l with l = 4k/ɛ and U i i=1,,...,l = S = m = O(l ɛ 1 log(k/δ)). For every pair of vertices v 1, v X, query if (v 1, v ) E(G). Let G X be the induced subgraph. 3. If k-colorable Verify(G X )=true, then output accept, else output reject. 3 freedom is in terms of the number of colors a vertex could still choose 3
4 Algorithm k-colorable Verify(U), output true/false 1. For any possible k-partition of U, denote π (a) (U, π ) =Contruct Core(U, π) (U : troublesome vertices.) (b) Use brute force to test if there is a perfect k-partition of U S that extends π, output true and return.. Output false. We would like to introduce several definitions in order to continue. Definition 4.1 clusters. Let U be a set of vertices, and let π be a perfect k-partition of U. Define U i = {v U : π (v) = i}. For each subset A [k], we define the A-cluster with respect to π as follows (let Γ(v) be the set of the neighbors of v): ) C A = ( Γ(U i) i A \ Γ(U i) Obviously, any v C A cannot be placed in any V i such that i A. Definition 4. restricting vertex. (restricting: not die but close to die.) A pair (v, i), where v C A, A / [k] and i Ā is said to be restricting with respect to a k-partition π of U if v has at least ɛ N neighbors in 4 B:i/ BC B. A vertex v C A, A / [k], is restricting with respect to π if for every i Ā, the pair (v, i) is restricting. The clusters are with respect to π. Intuitively, a vertex v C A is restricting if for every i Ā, add v to U i will cause many of its neighbors to move to a cluster corresponding to a bigger subset. Algorithm Contruct Core(U, π), output U (conceptual version, used only for the analysis.) 1. U =.. For j = 1,,... (index of copies) do the following. Consider the current set U and its partition π. (a) If there are less than ɛ N restricting vertices with respect to π then halt and output U. (b) If there are at least ɛ N vertices but there is no restricting vertex in U j, then halt and output an error symbol (seldom happen). (c) Otherwise add the first (by any fixed order 4 ) restricting vertex in U j to U. Go on to the next iteration. 4 One can think that we give an order to all vertices in U j aforehand. i/ A 4
5 Algorithm Contruct Core(U, π), output U (practical version.) 1. U =.. For j = 1,,... do the following. Consider the current set U and its partition π. (a) Uniformly select a set W j of size Θ ( ) log(k/ɛδ) ɛ (b) For each u U j, let R(u, i) be the set of neighbors of u in W j that belong to B-clusters such that i / B. If for some u U j, R(u, i) / W j 3ɛ/ for every i Ā, then we conclude that u is a restricting vertex, and we select the first (according to some fix order) such vertex in U j to U. When there is no such vertex, halt. Definition 4.3 close partitions. A partition of (U, π ) is called closed if there are less than ɛ N restricting vertices with respect to π. Remark 4.1 We observe (see the algorithm Contruct Core(U) and the corresponding analysis section 5) the following simple but important facts: The algorithm output a set U this set together with its induced partition are closed. And the algorithm output a closed partition with high probability ( 1 δ ). Thus with high probability, we would get a close partition. Definition 4.4 forbidden sets. Let (U, π ) be closed and consider the clusters with respect to π. For each v V (G)\U, we define the forbidden set of v, denoted F v, as the smallest set satisfying F v A, where v C A. For every i Ā, if v has at least ɛ 4 N neighbors in the cluster C B for which i / B, then i is in F v. For u U, define F u = [k]\{π (u)}. Be confused by these definitions? Actually, they just tell us which color we could choose and among those which is best to choose. A guide line here is that the color we choose for a vertex should not affect too much about the freedom of its neighbors. Algorithm Coloring(V, {F v : v V }) 5
6 1. For each v V \U we select a sample of S = Θ ( ) log(k/(ɛδ)) ɛ vertices, and approximate, for each i Ā (where v C A), the number of neighbors (denoted M) that v has in B-clusters such that i / B. And if M ɛ S, 4 add i to F v.. For each u U, F u = [k]\{π (u)}. 3. For every vertex v V, assign a color π(v) / F v. 4. For those v with F v = [k], assign an arbitrary color. A few explanations. 1. The remark 4.1 is true according to two facts. First, after at most l = 4k/ɛ, the procedure Contruct Core(U) halts, and output U or error. Second, with high probability, the procedure halts with output U rather than error. These two facts will be illustrate in section 5.. In the practical version of the Contruct Core(U), we use sampling again to avoid the time overhead to query every vertex in V in order to determine those restricting vertices in U j. The analysis will be given in section 5. An observation here is that we need not care about the borderline of ɛ N. All that we need to do is try to find restricting vertex in U j and continue. If cannot find, halt. That borderline is just useful for the analysis. Note that in the practical version, there is no error state. 3. In the procedure Coloring(V, {F v : v V }), one problem is that some vertices might have no color to choose, that is, F v = [k]. However, we will see later in the analysis that such vertices are rare ( ɛ N), thus we could choose an arbitrary color for it. 5 Major Techniques and Proofs 5.1 Proof of Remark 4.1 Remember we need two things. The algorithm should halt within l steps. The algorithm seldom output error. The first is true because every vertices will stay in at most k different clusters (bigger and bigger) during the whole procedure. And every time a restricting vertex is picked, at least ɛ n neighbor vertices will be picked to a different (bigger) 4 cluster. Since there are n vertices, so at most (l =)4k/ɛ such events would happen. 6
7 The second due to our choice of U i (1 i l) to be m = O ( ) l log(k/δ) ɛ. If there is at least ɛ N restricting vertices. Then the probability that U i contains none of them is at most ( ) m 1 ɛ < δ k l, Further more, there are at most k l different coloring schemes for the vertices picked in those (at most l) rounds. Since every time we add the first vertices in U i, and it could be colored in at most k colors. Therefore with probability greater than 1 δ, the procedure never output error. 5. Vertices which have No Color to Use is Rare That is, #vertices belonging to C [k] or with F v = [k] is small. If F v = [k] and v / C [k], v must be a restricting vertex due to the second item of the Definition of forbidden vertex. And we already show that the number of restricting vertices would be less than ɛ N when the algorithm terminates. Otherwise v C [k], we need the check set S (remember X = U S) to prove that C [k] is small with high probability. We say a (closed) pair (U, π ) is ɛ-useful if C [k] < ɛ N, otherwise it is ɛ-unuseful. The crucial observation is that Claim 5.1 If (U, π ) is ɛ-unuseful, then with probability 1 δ k l, there is no perfect partition for U S which extend π Proof. If C [k] ɛ N the probability of S contains no vertex in C [k] is at most ( 1 ɛ ) S ( = 1 ɛ ) O(l ɛ 1 log(k/δ)) δ k l Since there are at most k l closed pairs of (U, π ), we have the following Corollary 5.1 If all the closed partitions (U, π ) are unuseful, with probability 1 δ over the choices of S, there is no perfect k-partition of X = U S. In other words, if there is a k-partition with probability greater than δ, there must be a useful closed partition. 5.3 Put things together Now we put things together. Suppose the probability that G is k-colorable is greater than δ, we have following deduction. P r[g is k-colorable] δ Remark 4.1 P r[g is k-colorable there is an output U ] > δ Corollary 5.1 Exist an ɛ-useful closed pair(u, π ) Algo Coloring Obtain an ɛ-good partition. 7
8 Last section already shows that vertices with no color to use is rare, that is, less than ɛ N in total. Coloring them with arbitrary color will introduce at most 4 ɛ N violating edges since each vertices incident with at most n edge (every undirected edge would be counted twice here). In the next section, we would see that if we use the practical version of Contruct Core(U), we will introduce another (at most) ɛ N bad vertices, which contribute another ɛ N violating edges, 4 thus the total we have at most ɛn violating edges. The other direction (that is, if G is not k-colorable) follows directly from the Corollary Small Samplings Suffice That is, a small set of sampling vertices suffices to determine restricting vertices and forbidden sets, see algorithm Contruct Core(U) and Coloring(V, F v ). As posed in section, we want the query time and running time to be independent on n. Thus we d better perform sampling, and fortunately we can sample a set of vertices whose cardinality is independent on n to determine restricting vertices and forbidden sets (which related to n) with high probability. The seemingly magical fact actually makes use of the following two assumptions (implicitly) graph is dense. error torrent. We want the following two properties. 1. If for some u U j, R(u, i) / W j 3ɛ/ for every i Ā, then u is a restricting vertex with probability at least 1 δ. If this is true, we can 4l conclude that algorithm Contruct Core(U) works correctly with probability at least 1 δ. 4. With probability at least 1 δ 4, there are at most ɛ 4 N vertices whose F vs (the forbidden set) are wrongly computed. (These wrongly computed vertices would contribute another (at most) ɛ N violating edges as mentioned before.) The first property could be proved directly by using Chernoff bound. Use the additive form P r [ 1 m m i=1 X i p > γ ] < e γm. Here m = W j = Θ ( ) log(k/ɛδ) ɛ, p = ɛ, γ = 3ɛ, and plug in these values we get what we need. 4 We use basically the same method for the second. We still choose m, p, γ as in the first case, and the right bound is O ( ) ɛδ k. Since we have at most k colors to test for each vertex, the error bound would be less than ɛδ. Thus the expected number of vertices who are wrongly approximated (differ significantly from the
9 expected value) by the samplings is O(ɛδ)N. Apply the Markov inequality, we have P r[#wrongly approximated vertices ɛ O(ɛδN) N] ɛ 4 N δ Conclusion and Comments One kind of excellent papers = natural and beautiful idea + deep exploration and analysis + fundamental results. References [1] Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. In IEEE Symposium on Foundations of Computer Science, pages ,
Summarize of Great Papers
Summarize of Great Papers Zhang Qin July 14, 2007 The purpose of this summary Good Algorithms, especially for those natural problems, should be simple and elegant. Natural problems are those with universal
More informationLecture and notes by: Nate Chenette, Brent Myers, Hari Prasad November 8, Property Testing
Property Testing 1 Introduction Broadly, property testing is the study of the following class of problems: Given the ability to perform (local) queries concerning a particular object (e.g., a function,
More information1 Matchings in Graphs
Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent
More informationAn Eternal Domination Problem in Grids
Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationMatching Theory. Figure 1: Is this graph bipartite?
Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to
More informationSublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs
Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs Robert Krauthgamer 1 Approximating Average Degree in a Graph Input: A graph represented (say) as the adjacency
More informationDisjoint directed cycles
Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint
More informationTheoretical Computer Science. Testing Eulerianity and connectivity in directed sparse graphs
Theoretical Computer Science 412 (2011) 6390 640 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Testing Eulerianity and connectivity
More informationCS264: Homework #4. Due by midnight on Wednesday, October 22, 2014
CS264: Homework #4 Due by midnight on Wednesday, October 22, 2014 Instructions: (1) Form a group of 1-3 students. You should turn in only one write-up for your entire group. (2) Turn in your solutions
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can
More informationLecture 9: Zero-Knowledge Proofs
Great Ideas in Theoretical Computer Science Summer 2013 Lecture 9: Zero-Knowledge Proofs Lecturer: Kurt Mehlhorn & He Sun A zero-knowledge proof is an interactive protocol (game) between two parties, a
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationComparing the strength of query types in property testing: The case of testing k-colorability
Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron October 1, 2007 Abstract We study the power of four
More informationSuperconcentrators of depth 2 and 3; odd levels help (rarely)
Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv
More informationTowards the Proof of the PCP Theorem
CS640 Computational Complexity Towards the Proof of the PCP Theorem Instructor: Manindra Agrawal Scribe: Ramprasad Saptharishi Last class we saw completed our discussion on expander graphs. We shall now
More informationComparing the strength of query types in property testing: The case of testing k-colorability
Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron Abstract We study the power of four query models
More informationTesting Eulerianity and Connectivity in Directed Sparse Graphs
Testing Eulerianity and Connectivity in Directed Sparse Graphs Yaron Orenstein School of EE Tel-Aviv University Ramat Aviv, Israel yaronore@post.tau.ac.il Dana Ron School of EE Tel-Aviv University Ramat
More informationClustering Using Graph Connectivity
Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the
More informationDefinition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1
Graph fundamentals Bipartite graph characterization Lemma. If a graph contains an odd closed walk, then it contains an odd cycle. Proof strategy: Consider a shortest closed odd walk W. If W is not a cycle,
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,
More informationMaximal Independent Set
Chapter 4 Maximal Independent Set In this chapter we present a first highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study
More informationModule 7. Independent sets, coverings. and matchings. Contents
Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More information1 Minimum Cut Problem
CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum
More informationLecture 5. Figure 1: The colored edges indicate the member edges of several maximal matchings of the given graph.
5.859-Z Algorithmic Superpower Randomization September 25, 204 Lecture 5 Lecturer: Bernhard Haeupler Scribe: Neil Shah Overview The next 2 lectures are on the topic of distributed computing there are lots
More informationAlgebraic method for Shortest Paths problems
Lecture 1 (06.03.2013) Author: Jaros law B lasiok Algebraic method for Shortest Paths problems 1 Introduction In the following lecture we will see algebraic algorithms for various shortest-paths problems.
More informationLecture 6: Spectral Graph Theory I
A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 6: Spectral Graph Theory I September 5, 013 Lecturer: Ryan O Donnell Scribe: Jennifer Iglesias 1 Graph Theory For this course we will be working on
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 18 Luca Trevisan March 3, 2011
Stanford University CS359G: Graph Partitioning and Expanders Handout 8 Luca Trevisan March 3, 20 Lecture 8 In which we prove properties of expander graphs. Quasirandomness of Expander Graphs Recall that
More informationNotes 8: Expander Codes and their decoding
Introduction to Coding Theory CMU: Spring 010 Notes 8: Expander Codes and their decoding March 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ankit Sharma In this lecture, we shall look
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationMaximal Independent Set
Chapter 0 Maximal Independent Set In this chapter we present a highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study in
More informationBipartite Roots of Graphs
Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only
More informationTesting Euclidean Minimum Spanning Trees in the Plane
Testing Euclidean Minimum Spanning Trees in the Plane Artur Czumaj Christian Sohler Department of Computer Science Heinz Nixdorf Institute University of Warwick Computer Science Department Coventry CV4
More informationCONNECTIVITY AND NETWORKS
CONNECTIVITY AND NETWORKS We begin with the definition of a few symbols, two of which can cause great confusion, especially when hand-written. Consider a graph G. (G) the degree of the vertex with smallest
More informationAdvanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret
Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely
More informationSmall Survey on Perfect Graphs
Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families
More informationIntroduction III. Graphs. Motivations I. Introduction IV
Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg
More informationLecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.
CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationRecitation 4: Elimination algorithm, reconstituted graph, triangulation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation
More informationA GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY
A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,
More informationHi everyone. I hope everyone had a good Fourth of July. Today we're going to be covering graph search. Now, whenever we bring up graph algorithms, we
Hi everyone. I hope everyone had a good Fourth of July. Today we're going to be covering graph search. Now, whenever we bring up graph algorithms, we have to talk about the way in which we represent the
More informationCS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department
CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of
More informationDischarging and reducible configurations
Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs
More informationAdvanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs
Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material
More informationResearch Question Presentation on the Edge Clique Covers of a Complete Multipartite Graph. Nechama Florans. Mentor: Dr. Boram Park
Research Question Presentation on the Edge Clique Covers of a Complete Multipartite Graph Nechama Florans Mentor: Dr. Boram Park G: V 5 Vertex Clique Covers and Edge Clique Covers: Suppose we have a graph
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal
More informationMa/CS 6b Class 5: Graph Connectivity
Ma/CS 6b Class 5: Graph Connectivity By Adam Sheffer Communications Network We are given a set of routers and wish to connect pairs of them to obtain a connected communications network. The network should
More informationLecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)
COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms
More informationComplete Cototal Domination
Chapter 5 Complete Cototal Domination Number of a Graph Published in Journal of Scientific Research Vol. () (2011), 547-555 (Bangladesh). 64 ABSTRACT Let G = (V,E) be a graph. A dominating set D V is said
More informationAll-Pairs Nearly 2-Approximate Shortest-Paths in O(n 2 polylog n) Time
All-Pairs Nearly 2-Approximate Shortest-Paths in O(n 2 polylog n) Time Surender Baswana 1, Vishrut Goyal 2, and Sandeep Sen 3 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany. sbaswana@mpi-sb.mpg.de
More information1 Definition of Reduction
1 Definition of Reduction Problem A is reducible, or more technically Turing reducible, to problem B, denoted A B if there a main program M to solve problem A that lacks only a procedure to solve problem
More informationSublinear Algorithms Lectures 1 and 2. Sofya Raskhodnikova Penn State University
Sublinear Algorithms Lectures 1 and 2 Sofya Raskhodnikova Penn State University 1 Tentative Topics Introduction, examples and general techniques. Sublinear-time algorithms for graphs strings basic properties
More informationNotes for Recitation 9
6.042/18.062J Mathematics for Computer Science October 8, 2010 Tom Leighton and Marten van Dijk Notes for Recitation 9 1 Traveling Salesperson Problem Now we re going to talk about a famous optimization
More informationEfficiently decodable insertion/deletion codes for high-noise and high-rate regimes
Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Venkatesan Guruswami Carnegie Mellon University Pittsburgh, PA 53 Email: guruswami@cmu.edu Ray Li Carnegie Mellon University
More informationPACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS
PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed
More informationLecture 6: Graph Properties
Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht
More informationGreedy Algorithms. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms
Greedy Algorithms A greedy algorithm is one where you take the step that seems the best at the time while executing the algorithm. Previous Examples: Huffman coding, Minimum Spanning Tree Algorithms Coin
More informationAlgorithms for Euclidean TSP
This week, paper [2] by Arora. See the slides for figures. See also http://www.cs.princeton.edu/~arora/pubs/arorageo.ps Algorithms for Introduction This lecture is about the polynomial time approximation
More informationprinceton univ. F 15 cos 521: Advanced Algorithm Design Lecture 2: Karger s Min Cut Algorithm
princeton univ. F 5 cos 5: Advanced Algorithm Design Lecture : Karger s Min Cut Algorithm Lecturer: Pravesh Kothari Scribe:Pravesh (These notes are a slightly modified version of notes from previous offerings
More informationProblem Set 3. MATH 778C, Spring 2009, Austin Mohr (with John Boozer) April 15, 2009
Problem Set 3 MATH 778C, Spring 2009, Austin Mohr (with John Boozer) April 15, 2009 1. Show directly that P 1 (s) P 1 (t) for all t s. Proof. Given G, let H s be a subgraph of G on s vertices such that
More informationON THE STRONGLY REGULAR GRAPH OF PARAMETERS
ON THE STRONGLY REGULAR GRAPH OF PARAMETERS (99, 14, 1, 2) SUZY LOU AND MAX MURIN Abstract. In an attempt to find a strongly regular graph of parameters (99, 14, 1, 2) or to disprove its existence, we
More informationInstructor: Padraic Bartlett. Lecture 2: Schreier Diagrams
Algebraic GT Instructor: Padraic Bartlett Lecture 2: Schreier Diagrams Week 5 Mathcamp 2014 This class s lecture continues last s class s discussion of the interplay between groups and graphs. In specific,
More informationColoring 3-colorable Graphs
Coloring 3-colorable Graphs Pawan Kumar Aurora Advised by Prof. Shashank K Mehta Department of Computer Science and Engineering Indian Institute of Technology, Kanpur State of the Art Seminar k-coloring
More informationRestricted edge connectivity and restricted connectivity of graphs
Restricted edge connectivity and restricted connectivity of graphs Litao Guo School of Applied Mathematics Xiamen University of Technology Xiamen Fujian 361024 P.R.China ltguo2012@126.com Xiaofeng Guo
More informationMa/CS 6b Class 26: Art Galleries and Politicians
Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover
More informationA Reduction of Conway s Thrackle Conjecture
A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854
More information1 Matchings with Tutte s Theorem
1 Matchings with Tutte s Theorem Last week we saw a fairly strong necessary criterion for a graph to have a perfect matching. Today we see that this condition is in fact sufficient. Theorem 1 (Tutte, 47).
More informationLecture 5: Graphs. Rajat Mittal. IIT Kanpur
Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks
More informationarxiv: v1 [cs.dm] 30 Apr 2014
The stable set polytope of (P 6,triangle)-free graphs and new facet-inducing graphs Raffaele Mosca arxiv:1404.7623v1 [cs.dm] 30 Apr 2014 May 1, 2014 Abstract The stable set polytope of a graph G, denoted
More informationLecture 21: Other Reductions Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY
Lecture 21: Other Reductions Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day Show that the Dense
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationGraph Connectivity G G G
Graph Connectivity 1 Introduction We have seen that trees are minimally connected graphs, i.e., deleting any edge of the tree gives us a disconnected graph. What makes trees so susceptible to edge deletions?
More informationFOUR EDGE-INDEPENDENT SPANNING TREES 1
FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem
More informationSolutions for the Exam 6 January 2014
Mastermath and LNMB Course: Discrete Optimization Solutions for the Exam 6 January 2014 Utrecht University, Educatorium, 13:30 16:30 The examination lasts 3 hours. Grading will be done before January 20,
More informationAlgorithmica 2002 Springer-Verlag New York Inc.
Algorithmica (2002) 32: 302 343 DOI: 10.1007/s00453-001-0078-7 Algorithmica 2002 Springer-Verlag New York Inc. Property Testing in Bounded Degree Graphs 1 O. Goldreich 2 and D. Ron 3 Abstract. We further
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More information6 Randomized rounding of semidefinite programs
6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can
More information14.1 Encoding for different models of computation
Lecture 14 Decidable languages In the previous lecture we discussed some examples of encoding schemes, through which various objects can be represented by strings over a given alphabet. We will begin this
More informationHMMT February 2018 February 10, 2018
HMMT February 2018 February 10, 2018 Combinatorics 1. Consider a 2 3 grid where each entry is one of 0, 1, and 2. For how many such grids is the sum of the numbers in every row and in every column a multiple
More informationCourse Introduction / Review of Fundamentals of Graph Theory
Course Introduction / Review of Fundamentals of Graph Theory Hiroki Sayama sayama@binghamton.edu Rise of Network Science (From Barabasi 2010) 2 Network models Many discrete parts involved Classic mean-field
More information11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions
Introduction Chapter 9 Graph Algorithms graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 2 Definitions an undirected graph G = (V, E) is
More informationNotes for Lecture 24
U.C. Berkeley CS276: Cryptography Handout N24 Luca Trevisan April 21, 2009 Notes for Lecture 24 Scribed by Milosh Drezgich, posted May 11, 2009 Summary Today we introduce the notion of zero knowledge proof
More informationColoring 3-Colorable Graphs
Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)
More informationTesting subgraphs in large graphs
Testing subgraphs in large graphs Noga Alon Abstract Let H be a fixed graph with h vertices, let G be a graph on n vertices and suppose that at least ɛn 2 edges have to be deleted from it to make it H-free.
More informationMATH 682 Notes Combinatorics and Graph Theory II
1 Matchings A popular question to be asked on graphs, if graphs represent some sort of compatability or association, is how to associate as many vertices as possible into well-matched pairs. It is to this
More informationON SWELL COLORED COMPLETE GRAPHS
Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains
More information12.1 Formulation of General Perfect Matching
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,
More informationNumber Theory and Graph Theory
1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com
More informationTopic: Local Search: Max-Cut, Facility Location Date: 2/13/2007
CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 5
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 5 University of British Columbia In this lecture we continue to discuss applications of randomized algorithms in computer networking.
More informationAlgorithms for Grid Graphs in the MapReduce Model
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Dissertations, and Student Research Computer Science and Engineering, Department
More informationThe Probabilistic Method
The Probabilistic Method Po-Shen Loh June 2010 1 Warm-up 1. (Russia 1996/4 In the Duma there are 1600 delegates, who have formed 16000 committees of 80 persons each. Prove that one can find two committees
More information