Fixed Parameter Algorithms for one-sided crossing minimization Revisited

Size: px
Start display at page:

Download "Fixed Parameter Algorithms for one-sided crossing minimization Revisited"

Transcription

1 Fixed Prmeter Algorithms for one-sided crossing minimiztion Revisited Vid Dujmović 1, Henning Fernu 2,3, nd Michel Kufmnn 2 1 McGill University, School of Computer Science, 3480 University St., Montrel, QC H3A 2A7, Cnd, vid@cs.mcgill.c 2 Universität Tüingen, WSI für Informtik, Snd 13, Tüingen, Germny fernu / mk@informtik.uni-tueingen.de 3 The University of Newcstle, School of Electr. nd Computer Science, University Drive, Cllghn, NSW 2308, Austrli fernu@newcstle.edu.u Astrct. We exhiit smll prolem kernel for the prolem onesided crossing minimiztion which plys n importnt role in grph drwing lgorithms sed on the Sugiym lyering pproch. Moreover, we improve on the serch tree lgorithm developed in [5] nd derive n O( k + kn 2 ) lgorithm for this prolem, where k upperounds the numer of tolerted crossings of stright lines involved in the drwings of n n-vertex grph. Reltions of this grph-drwing prolem to the lgeric prolem of finding weighted liner extension of n ordering similr to [7] re exhiited. 1 Introduction nd Prolem Definition We consider the following prolem k-one-sided crossing minimiztion, clled k-oscm for short in this pper: Given: A iprtite grph G =(V 1,V 2,E) nd liner order < 1 on V 1. Prmeter: k Question: Is there liner order < on V 2 such tht, when the vertices from V 1 re plced on line (lso clled lyer) L 1 in the order induced y < 1 nd the vertices from V 2 re plced on second lyer L 2 (prllel to L 1 ) in the order induced y <, then drwing stright lines for ech edge in E will introduce no more thn k edge crossings. We denote y OSCM the optimiztion version (tht is, non-prmeterized version) of this prolem. (k-)oscm is the key procedure in the well-known lyout frmework for lyered drwings commonly known s the Sugiym lgorithm. After the first phse (the ssignment of the vertices to lyers), the order of the vertices within the lyers hs to e fixed such tht the numer of the corresponding crossings of the edges etween two djcent lyers is minimized. Finlly, the concrete position of the vertices within the lyers is determined ccording the previously computed order. The crossing minimiztion step, lthough most essentil in the Sugiym pproch, is n NP-complete prolem. The most commonly used method is the G. Liott (Ed.): GD 2003, LNCS 2912, pp , c Springer-Verlg Berlin Heidelerg 2004

2 Fixed Prmeter Algorithms 333 lyer-y-lyer sweep where, strting from i = 1, the order for L i is fixed nd the order for L i+1 tht minimizes the numer of crossings mongst the edges etween lyers L i nd L i+1 is determined. After incresing index i to the mximum lyer index, we turn round nd repet this process from the ck with decresing indices. In ech step, n OSCM prolem hs to e solved. Unfortuntely, this seemingly elementry prolem is NP-complete [6], even for sprse grphs [8]. Jünger nd Mutzel [7] trnsformed the OSCM prolem to liner ordering prolem which they solve with the rnch nd cut method. This elementry grph drwing prolem ttrcted severl reserchers from the re of fixed-prmeter trctle (FPT) lgorithms [2]. The first pproches to the more generl vrint of this prolem hve een pulished y Dujmović et l. in [3] nd [4]. The lst one hs een gretly improved y Dujmović nd Whitesides [5] who chieved n O( k n 2 ) lgorithm for this prolem. In this pper, we derive n O( k + kn 2 ) lgorithm, which significntly lowers the constnts involved in the exponentil serch tree lgorithm prt. Moreover, we exhiit smll prolem kernel for this prolem, which hs not een done efore. More specificlly, this mens tht, with the id of some reduction rules, we cn rrive t n instnce of k-oscm with the numer of vertices involved eing ounded y 3k(k ). 2 Bsics We strt with some formlities. The numer of vertices of grph G =(V,E) is denoted y n = V. For ech vertex v V, let N(v) denote the set of vertices djcent to v nd let deg(v) = N(v) denote the degree of v in G. The sugrph of G induced y the set of vertices V V is denoted y G[V ]. A iprtite grph G =(V 1,V 2,E) together with liner orderings on V 1 nd on V 2 is lso clled drwing of G. This formultion implicitly ssumes drwing of G where the vertices of V 1 nd V 2 re drwn on two (virtul) horizontl lines, the line L 1 corresponding to V 1 eing ove the line L 2 corresponding to V 2.Ifu<vfor two vertices on L 1 or on L 2, we will lso sy tht u is to the left of v. A liner order on V 2 tht minimizes the numer of crossings suject to the fixed liner order of V 1 is clled n optiml ordering nd the corresponding drwing of G is clled n optiml drwing. Since the positions of isolted vertices in ny drwing re irrelevnt, we disregrd isolted vertices of the input grph G in wht follows. If V 2 = 2, then there re only two different drwings. This gives us the useful notion of crossing numer. Given iprtite grph G =(V 1,V 2,E) with V 2 > 1, for ny two distinct vertices, V 2, define c to e the numer of crossings in the drwing of G[{, } (N() N())] when <is ssumed. Furthermore, for ny V 2 with deg(v) > 0, let l e the leftmost neighour of on L 1, nd r e the rightmost neighour of. We cll two vertices, V 2 interfering or unsuited if there exists some x N() with l < x < r,or there exists some x N() with l <x<r. Otherwise, they re clled suited.

3 334 V. Dujmović, H. Fernu, nd M. Kufmnn Oserve tht, for {, } suited, c c = 0. Dujmović nd Whitesides hve shown tht, in ny optiml ordering < of the vertices of V 2,wefind<if r l. This mens tht ll suited pirs pper in their nturl ordering. In the next section we will need the following generl nottion. A directed grph (digrph) otined from n undirected grph G y replcing every edge {u, v} y the two rcs (u, v) nd (v, u) is denoted y D(G). The undirected grph otined from digrph G y putting n edge {u, v} whenever there is n rc (u, v) ing is denoted y U(G). Finlly, the grph complement of G is denoted y G c. It is importnt to note tht we only del with simple (di-)grphs, i.e., grphs hving no (self-)loops or multiple edges. The set of rcs of digrph G is denoted y A(G). 3 Getting Smll Kernel In this section, we give drstic reduction of the complexity of k-oscm. Recll tht prtil order is n irreflexive, symmetric nd trnsitive reltion. A prtilly ordered set (or poset), denoted y P =(V,A), is set V tken together with prtil order A on it. For two distinct elements, V, if either < or <in A, then the pir {, } is comprle in P ; else the pir is incomprle. A prtil order is liner if every pir of elements of V is comprle. If A V V is prtil order on V, then we cll ny prtil order L A completion of A. More lgericlly speking, it cn lso e clled (weighted) liner extension. As is well known, every poset P (V,A) cn e represented s directed cyclic digrph with vertex set V nd rc reltion A which is prtil order. For simplicity, we will equte posets nd directed cyclic grphs in the following, so we refer to posets s ordered or liner digrphs. Consider the following prolem k-weighted completion of n ordering (k-wco): Given: An ordered digrph P = (V,A) nd cost function c mpping A(D([U(P )] c )) into the nonnegtive integers; y setting c to zero for rcs in A(D(U(P ))), we cn interpret the domin of c s V (P ) V (P ). Prmeter: k Question: Is there selection A of rcs from A(D([U(P )] c )) such tht the trnsitive closure (A A(P )) + is liner order nd {c() (A A(P )) + } k? It is quite ovious tht OSCM cn e solved with the help of WCO; the liner order which is imed t is the permuttion of the vertices on the second lyer which minimizes the numer of crossings involved, so tht the crossing numer c is the cost of the rc (, ) in the digrph model. Since it is esy to see tht WCO is nondeterministiclly solvle in polynomil time, nd since Edes nd Wormld [6] hve shown tht OSCM is NP-hrd, we cn immeditely deduce: Lemm 1. WCO is NP-complete. Jünger nd Mutzel [7] gve n ILP-formultion of the OSCM prolem s liner ordering prolem which they could solve with rnch nd cut method.

4 Fixed Prmeter Algorithms 335 In contrst, our lgorithm for OSCM (oth the kerneliztion nd the serch tree prt) cn e seen s growing lrger nd lrger prts of the liner order of the vertices of the second lyer we re iming t. When settling the ordering etween nd, we lso sy tht we re committing <or <. Dujmović nd Whitesides hve shown tht, for ech instnce of OSCM, suited pirs pper in their nturl ordering in ny optiml drwing. Tht justifies the following first reduction rule: RR1: For every suited pir of vertices {, } from V 2 with c > 0, commit <. Furthermore, consider set S V 2 such tht ll the vertices in S re djcent to the exct sme set of neighours in V 1. It is simple to oserve tht ritrrily permuting the vertices of S in ny drwing cnnot ffect the totl numer of crossings. This oservtion justifies the following second reduction rule: RR2: For every pir of vertices {, } from V 2 with N() =N(), (ritrrily) commit <. Notice tht if c = c = 0 then (disregrding isolted vertices) deg() = deg() = 1ndN() = N(). Therefore, fter pplying these two reduction rules to n instnce of k-oscm, we otin the ordered digrph P =(V 2,A), where pir of vertices is incomprle in P only if oth of the crossing numers of tht pir re nonzero. Hence, we cn ssume tht c is mpping ech rc of A(D([U(P )] c )) onto positive integer. We cll the corresponding specilized prolem k-positive completion of n ordering (k-pwco). Our resoning up to now shows tht this specil cse is lso NP-hrd. Exhustively pplying the following two reduction rules shows tht k-pwco hs smll liner-size prolem kernel. RRLO1: If v is vertex in ordered digrph P =(V,A) of mximl degree, tht is, the sum of the indegrees nd outdegrees of v equls V 1, then remove v nd consider the instnce (P [V v],k). To see the soundness of this rule, oserve tht oth P nd P [V v] hve trnsitive rc reltions. After hving pplied RRLO1 exhustively, there is, for ech vertex v V, nother vertex v V (P ) such tht the pir {v, v } is incomprle in P. By the positivity ssumption, committing v<v or v <v will cost t lest one unit nd will, furthermore, t est mximize the degree of v nd v. By n inductive rgument, it follows tht the ordered digrph P in RRLO1-reduced instnce of k-pwco cnnot hve more thn 2k vertices. In n ordered digrph P =(V,A), cll two incomprle vertices u, v V independent with respect to w if {u, w} nd {v, w} re comprle in P ; dependent with respect to w if {u, w} or {v, w} re incomprle in P ; independent (in P )if{u, v} re independent with respect to ll w V \ {u, v}; dependent (in P )if{u, v} re dependent with respect to some w V \{u, v}; trnsitive with respect to w if either {u, w} or {v, w} is comprle ut not oth.

5 336 V. Dujmović, H. Fernu, nd M. Kufmnn Being trnsitive with respect to w mens tht committing v<uor u<v commits y trnsitivity v<w, w<v, u<wor w<u. RRLO2: If the vertices u nd v re independent in given ordered digrph P =(V,A) nd if c((u, v)) <c((v, u)), then reduce the prolem instnce to ((V,A {(u, v)}),k c((u, v)). The soundness of RRLO2 is ovious. In fct, this rule is generlizle: RRLOq for ny fixed q>1: For ech connected component C V of [U(P )] c with C q, solve PWCO optimlly on P [C]. The reduced instnce will see the orderings etween ll pirs of vertices from C settled, nd the prmeter will e reduced ccordingly. Note tht this implies tht ll the vertices of C re isolted in the reduced [U(P )] c nd cn thus e deleted y the RRLO1. This new rule yields kernel of size k q+1 q, since fter exhustive ppliction of this rule nd RRLO1, ech connected component of [U(P )] c hs t lest (q+1) vertices nd thus t lest q edges. Correspondingly, t lest q rcs with weight of t lest one per rc hve to e dded per component, therefore there re t most k/q components. In other words, kernel size of k cn e pproximted with ritrry precision. This type of ehviour hs not een found in other prmeterized lgorithms yet. However, this pproximtion comes t price: Solving this prolem on grphs with q vertices cn only e done in exponentil time (ssuming P NP). Still, ritrry constnts q or q = log k re possile choices for polynomil-time kerneliztion lgorithms. It is therefore desirle to find esy optimlity criteri for smll vlues of q (s q = 2). The soundness of the reduction rule RRLOq is redily seen.assume tht C is connected component of [U(P )] c. Consider vertex x C. Since C is connected component in [U(P )] c, x is comprle with ech y C (otherwise, y nd x would e connected in the complement grph). Hence, C cn e portioned into C l = {y C y<x} nd C r = {y C x<y}. Since C l <x<c r, either C l = or C r = ; otherwise, there would e no connection etween vertices of C l nd vertices of C r in the complement grph. Hence, x will never e ordered in-etween two vertices from C. Therefore, we cn conclude: Theorem 1. Fix some 1 <α 1.5. Then, ech instnce of k-pwco dmits prolem kernel of size αk. Considering k-oscm in slightly more generl fshion, nmely, llowing some pirs of V 2 to e lredy committed s prt of the input, we cn conclude: Corollry 1. Fix some 1 <α 1.5. Then, ech instnce of k-oscm cn e reduced to n instnce (P =(V 2,A),k) of k-pwco, with V 2 αk. Proof. Applying RRLO1 nd RRLO2 (nd RRLOq) tok-oscm exhustively results in prtil order on V 2 where the crossing numers of the incomprle pirs re positive. Therefore, this prtil order on V 2, together with the positive crossing numers of incomprle pirs comprises n instnce of k-pwco, which y Theorem 1 hs the kernel of size V 2 αk.

6 Fixed Prmeter Algorithms 337 This hs not yet given us prolem kernel for the originl prolem, since V 1 (nd hence E ) hs not yet een ounded y function of k. With tht im, consider the following simple reduction rule RRlrge: Ifc >kthen do: if c k then commit <else return NO. This is clerly sound rule. Moreover notice, tht if vertex V 2 hs deg() > 2k + 1, then for every vertex V 2, c >kor c >kre true. Therefore, fter performing RRlrge exhustively in comintion with RRLO1, ll the vertices of V 2 of degree lrger thn 2k + 1 will hve een removed from the OSCM-instnce. This yields: Theorem 2. For some 1 <α 1.5, k-oscm dmits prolem kernel G = (V 1,V 2,E) with V 1 (2k +1) V 2 ( 3k(k )), V 2 αk, nd E (2k + 1) V 2. The following lgorithm summrizes how to otin prolem kernel: Algorithm 1 (Kerneliztion for k-oscm). Compute the crossing numers c for ll pirs (, ). If k<, V 2 min(c,c ) then nswer NO. If k, V 2 mx(c,c ) then YES; output n ritrry liner order. Apply reduction rules RR1, RR2 (nd RR3). Apply reduction rules RRLO1, RRLO2, nd RRlrge exhustively. The rule RR3 is derived in Section 6, s it is needed y the serch tree prt of our lgorithm. For now, while considering kerneliztion only, we cn disregrd this reduction rule. Since computing the crossing numers is the predominnt computtionl prt (tking time O(kn 2 ) even when comined with RRlrge ccording to Dujmović nd Whitesides), we conclude tht the kerneliztion preprocessing tkes time O(kn 2 ). As result of this kerneliztion, the vertices of V 2 re prtilly ordered. Our serch tree lgorithm presented in the next section cn cope with such pre-set instnces of k-oscm. Therefore, we will otin running time of the form O(f(k)+kn 2 ) for the k-oscm prolem. 4 A Generl Overview of the Serch Tree Algorithm Our serch tree for the OSCM prolem slightly devites from the one constructed y Dujmović nd Whitesides in their pper. Hence, we give some detils in wht follows. Consider two distinct vertices, V 2 with c = i nd c = j. Then, the pir {, } is lso clled n i/j pttern. As is the stndrd prctice when developing serch tree sed FPT lgorithms, ech node of serch tree is ssocited with prolem instnce. In the cse of k-oscm, we let n instnce consist of n ordered digrph P =(V 2,A) nd n integer k. P contins the rcs corresponding to ll the pirs of vertices of V 2 committed thus fr, nd k gives the remining numer of llowed edge crossings, tht is, k = k (v,u) A c vu. Initilly (in the root node) the rcs

7 338 V. Dujmović, H. Fernu, nd M. Kufmnn of P re determined y the kerneliztion. In ech node of the serch tree, if k is negtive, then the node returns NO, otherwise we look for pir of dependent vertices {, } tht form n i/j pttern such tht either i+j 4, or i =2,j =1 nd {, } is trnsitive. If such pir {, } is found we rnch the prolem instnce into two new prolems instnces. In one we commit <nd in the other we commit >; consequently, in ech prolem instnce we updte the ordered digrph P nd lower the prmeter k ccordingly. (By dding (v, w) to A nd then computing trnsitive closure (A (v, w)) + we get the updted ordered digrph P =(V 2, (A (v, w)) + ).) If no pir s descried ove is found, then we commit ll the remining incomprle pirs in P deterministiclly. The detils nd the correctness of this pproch will e discussed in Section 7. The running time of FPT lgorithms is dominted y the prt exponentil in prmeter k. In our cse, tht prt is ounded y the size of the serch tree. We now nlyse tht size. Firstly, oserve tht ech internl node of our serch tree hs two rnches. If one rnch lowers the prmeter k y 1, nd the other y 2, we denote the corresponding rnching vector y ( 1, 2 ). Since ll i/j ptterns with i =0orj = 0 re lredy committed (y the reduction rules RR1 nd RR2 during the kerneliztion), ech internl node of the serch tree hs 1 > 0 nd 2 > 0. Furthermore, ech node tht rnches on trnsitive 2/1 pttern commits y trnsitivity n extr i/j pttern where i, j > 0. Thus ech internl node hs Therefore, in the worst cse, ech node of our serch tree hs rnching vector (2, 2) or (3, 1). The size s(k) of the serch tree oeying these rnching vectors cn e deduced s follows: The recurrence corresponding to the (2, 2) rnching vector is s(k) = 2s(k 2) + O(1). Solving this recurrence gives s(k) < k. The recurrence corresponding to the (1, 3) rnching vector is s(k) = s(k 1) + s(k 3) + O(1). Solving this recurrence gives s(k) < k. Thus in the worst cse, the size of our serch tree is less thn k. This is in contrst to the serch tree with (2, 1) rnching vector derived y Dujmović nd Whitesides tht gives s(k) < k. In node of our serch tree tht does not rnch (tht is, in lef), ll the incomprle pirs form 1/1 nd 2/1 ptterns. To e le to commit these pirs deterministiclly, we study the structurl properties of such ptterns in the next section. In Section 7, we finlly give detiled lgorithm for the k-oscm prolem nd the proof of its correctness. 5 Some Structurl Properties of 2/1 nd 1/1 Ptterns We strt this section with the following known nd useful equlity [1, Chpter 9]: c + c = deg() deg() N() N(). (1) This implies tht if deg() deg() then (deg() 1) deg() c + c deg() deg(). (2)

8 Fixed Prmeter Algorithms 339 We now study 1/1 nd 2/1 ptterns. As convention, we will lel vertices from the first lyer y (decorted) letters x, y, z nd vertices from the second lyer y letters,, c. For clrity, we will drw neighours of s non-filled circles nd neighours of s filled-in circles. Lemm 2. In the cse of 1/1 or 2/1 ptterns, nd if c =1, we must find the sitution depicted in the figure elow. x y Moreover, ech remining neighour of (if ny) must e to the right of y (or y itself), while ech remining neighour of (if ny) must e to the left of x (or x itself). (Otherwise, c > 1.) Theorem 3. If c = c =1, then there re two siclly different situtions (tht cn e otined y enhncing the sitution sketched in Lemm 2): 1. nd re ech djcent to x nd y only. In other words, deg() = deg() = 2 nd N() =N(), s illustrted in the figure elow. x y 2. Two sucses rise: () If deg() =1, then hs (esides x) nother neighour x to the right of y. In ddition to x nd x, my only e djcent to y. () If deg() =1, then hs (esides y) nother neighour y to the left of x. In ddition to y nd y, my only e djcent to x. Both situtions re illustrted in the figure elow. x y x y x y Proof. By inequlity (2) either deg() = deg() = 2, or one of, hs degree one. Consider first the cse where deg() = deg() =2. Then y equlity (1), N() =N() s otherwise c + c 3. Consider now the cse where deg() = 1. Then hs (esides x) exctly one neighour x strictly to the right of y s otherwise either the pir {, } is suited or c > 1.

9 340 V. Dujmović, H. Fernu, nd M. Kufmnn Vertex cnnot hve neighour strictly to the left of y s otherwise c > 1. Thus in ddition to x nd x, cn only e djcent to y. The remining cse where deg() = 1 is symmetric. Theorem 4. Let the pir {, } form 1/2 pttern, tht is, c =1nd c =2. Then there re two siclly different situtions: 1. In the following figures, neither nor cn hve ny other neighours. x = y x y x y y = x 2. In the following figure (on the left-hnd side), in ddition to x, x nd x, vertex my only e djcent to y, while hs no other neighours. The figure on the right-hnd side cn e symmetriclly interpreted. x y x y x y y x Proof. By inequlity (2) either deg() = deg() = 2, or one of, hs degree one. Consider first the cse where deg() = deg() = 2 nd let x nd y denote the remining neighours of nd, respectively. Hving oth x y nd y x is not possile s otherwise y equlity (1), c + c = 4. Hving oth x = y nd y = x gives the first cse of the previous theorem. Therefore, if x = y then x<y <ys otherwise, {, } is suited or c =1. On the other hnd, if y = x, then x<x <ys otherwise, {, } is suited or c =1. Consider now the cse where deg() = 1. The cse where deg() = 1 is symmetric. In ddition to x, hs exctly one neighour x strictly to the left of y s otherwise, c 2. Vertex hs exctly one neighour x strictly to the right of y s otherwise, either the pir {, } is suited or c > 1. Thus in ddition to x, x nd x, cn only e djcent to y.

10 6 A Reduction Rule for 2/1 Pttern Fixed Prmeter Algorithms 341 The reduction rule RR2 presented in Section 3 resolves the sitution descried in the first cse of Theorem 3. Unfortuntely, the second cse of Theorem 3 does not dmit similr simple resolution. Let us now reconsider the 2/1 ptterns identified in Theorem 4. The second kind of the pttern descried in tht theorem is in sense similr to (ut more complicted thn) the second pttern of Theorem 3 nd hence dmits no deterministic solution. Consider the first cse in Theorem 4 with hving neighour distinct from x nd y. Let I denote ny drwing where <nd let II denote the drwing otined from drwing I y swpping nd. Let the totl numer of crossings in I nd II e denoted y c I nd c II respectively. Consider the following figure nd tles. T I A 1 A 2 A 3 T II A 1 A 2 A 3 X X X X X X X X X X X X X X These tles red s follows: if there re m ij edges connecting vertices from X i with vertices from A j, then there re T x (X i,a j )m ij crossings etween these m ij edges nd the edges shown in the ove sketches for cse x {I,II}. Itis cler tht the columns lelled A 1 nd A 3 re identicl in oth tles: swpping nd cn only ffect the reltive order of vertices in A 2 compred to nd. The oxed entries show the only differences etween the tles. It follows tht c I c II = c c + m 42 +2m 52 + m 62 > 0, since m 42 +2m 52 + m 62 0 nd c c = 1. This implies tht whenever this sitution from Theorem 4 rises, ny optiml drwing shows <. The first cse in Theorem 4 where hs neighour distinct from x nd y is symmetric; the sme nlysis pplies. This justifies the next reduction rule: RR3: In the situtions descried in the first cse of Theorem 4, lwys let <. Since in every optiml drwing ll the pirs of this type pper in their cheper ordering, we pply this reduction rule t the very eginning of our lgorithm, tht is we dd this rule to the kerneliztion s shown in Algor. 1.

11 342 V. Dujmović, H. Fernu, nd M. Kufmnn Hving this reduction rule is instrumentl in ounding the size of the serch tree, s will ecome cler from the two lemms in the next section. 7 The Algorithm for the OSCM Prolem We re now redy to present the prmeterized lgorithm we suggest for OSCM: Algorithm 2 (A prmeterized lgorithm for OSCM). - kernelize In node of serch tree with instnce (P,k ) do 0: if k < 0 return NO. 1: Apply RRLO1, RRLO2 nd RRlrge exhustively. 2: if in P there is n incomprle i/j pttern {,} such tht i + j 4 rnch on < nd <; updte P nd k ccordingly 3: else if in P there is dependent 2/1 pttern {,} rnch on < nd <; updte P nd k ccordingly 4: else //the remining 2/1 ptterns re independent; thus, RRLO2 pplies resolve ll remining 1/1 ptterns ritrrily updte P nd k ccordingly; if k < 0 return NO else YES. The correctness of this lgorithm is cler from the nlysis presented in the previous sections. Wht remins is to nlyse the rnching vectors of the internl nodes in the serch tree ssocited with the lgorithm. As required y the nlysis presented in Section 3, we now show tht the rnching vector ( 1, 2 ) in ech internl node hs nd 1, 2 > 0. Lemm 3 (Min Lemm). Let {, } e pir of dependent vertices forming 2/1 pttern in step 3 of the lgorithm. Then {, } is trnsitive pir. Proof. Since {, } is dependent in P, there must e vertex c such tht {, c} or {, c} re incomprle in P. It suffices to show tht one of these two pirs re comprle in P. In the step 3 of the lgorithm, the only remining incomprle pirs re 1/1 ptterns of the second type in Theorem 3 nd 2/1 ptterns of the second type in Theorem 4. Therefore, let without loss of generlity deg() = 3 (or deg() = 4) nd deg() = 1. If deg(c) 2 then y the inequlity (2), c c + c c 4 nd thus the ordering of {, c} is settled either y RR1 or y the step 2 of the lgorithm. Therefore, deg(c) = 1. In tht cse, the pir {, c} forms 0/i pttern nd its ordering is settled y either RR1 or RR2. A direct consequence of this lemm is the following. Lemm 4. The rnching vector ( 1, 2 ) in ech internl node of the serch tree hs nd 1, 2 > 0.

12 Fixed Prmeter Algorithms 343 Proof. Bsed on the reduction rules RR1 nd RR2, in ech node of serch tree ll the incomprle (nd dependent) ptterns i/j hve i > 0 nd j > 0, thus in ech node 1, 2 > 0. Furthermore, ll the nodes rnched in the step 2, hve i + j 4 nd thus hve The remining nodes re rnched in step 3. Ech such node rnches on dependent 2/1 pttern {, }. By the previous lemm, committing either <or <determines, without loss of generlity, the ordering of pir {, c}. Hving een incomprle t step 3 initilly, the pir {, c} hs c c,c c 1. Therefore, we hve in this cse, too. 8 Conclusions In this pper, we present new serch tree sed prmeterized lgorithm for the k-oscm prolem. Due to possile rekerneliztions [9], we my deduce: Theorem 5. The prolem of k-oscm cn e solved in time O( k + kn 2 ). It remins to e determined whether further progress is possile, especilly in further lowering the se of the exponent in the running time of the serch tree lgorithm. Our present cse nlysis shows t two plces rnching ehviour which mtches the upper ound stted in the previous theorem, nmely when rnching t 3/1 nd t 2/1 ptterns. A detiled nlysis of 3/1 ptterns my e worthwhile, ut will proly e very tedious, requiring considertions of ll the possile comintions. Let us finlly remrk tht even with the possily more difficult prolem k- PWCO, we re le to derive serch tree lgorithm with etter rnching ehviour thn Dujmović nd Whitesides did for k-oscm. Since the result is of certin interest on its own, we will stte it in the following. Theorem 6. k-pwco cn e solved in time O( k + kn 2 ). In fct, the worst cse rnching vector in our lgorithm is (2, 4, 4, 4). Acknowledgments. We re grteful for hints of F. Rosmond, P. Shw nd M. Sudermn on drft versions of this pper. References 1. Di Bttist, G., Edes P., Tmssi R. nd I. G. Tollis, Grph Drwing: Algorithms for the Visuliztion of Grphs, Prentice Hll, R. Downey nd M. Fellows. Prmeterized Complexity, Springer, V. Dujmović, M. Fellows, M. Hllet, M. Kitching, G. Liott, C. McCrtin, N. Nishimur, P. Rgde, F. Rosemnd, M. Sudermn, S. Whitesides,nd D. Wood, An efficient fixed prmeter pproch to two-lyer plnriztion. In P. Mutzel nd M. Jünger, eds., Grph Drwing GD 01, LNCS 2265, pges Springer, V. Dujmović, M. Fellows, M. Hllet, M. Kitching, G. Liott, C. McCrtin, N. Nishimur, P. Rgde, F. Rosemnd, M. Sudermn, S. Whitesides,nd D. Wood, On the prmeterized complexity of lyered grph drwing, In F. Meyer uf der Heide, ed., Europen Symposium on Algorithms ESA 01, LNCS 2161, pges Springer, 2001.

13 344 V. Dujmović, H. Fernu, nd M. Kufmnn 5. V. Dujmović nd S. Whitesides. An efficient fixed prmeter trctle lgorithm for 1-sided crossing minimiztion. In M. T. Goodrich nd S. G. Koourov, eds., Grph Drwing GD 02, LNCS 2528, pges Springer, P. Edes nd N. C. Wormld. Edge crossings in drwings of iprtite grphs. Algorithmic, 11: , M. Jünger nd P. Mutzel. 2-lyer strightline crossing minimiztion: performnce of exct nd heuristic lgorithms. J. Grph Algorithms Appl., 1:1 25, X. Munoz, W. Unger, nd I. Vrto, One sided crossing minimiztion is NP-hrd for sprse grphs. In P. Mutzel nd M. Jünger, eds., Grph Drwing GD 01, LNCS 2265, pges Springer, R. Niedermeier nd P. Rossmnith. A generl method to speed up fixed-prmetertrctle lgorithms. Informtion Processing Letters, 73: , Sugiym K., S. Tgw nd M. Tod. Methods for visul understnding of hierrchicl system structures, IEEE Trnsctions on Systems, Mn nd Cyernetics, 11: , 1981.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

arxiv: v1 [math.co] 18 Sep 2015

arxiv: v1 [math.co] 18 Sep 2015 Improvements on the density o miml -plnr grphs rxiv:509.05548v [mth.co] 8 Sep 05 János Brát MTA-ELTE Geometric nd Algeric Comintorics Reserch Group rt@cs.elte.hu nd Géz Tóth Alréd Rényi Institute o Mthemtics,

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

EXPONENTIAL & POWER GRAPHS

EXPONENTIAL & POWER GRAPHS Eponentil & Power Grphs EXPONENTIAL & POWER GRAPHS www.mthletics.com.u Eponentil EXPONENTIAL & Power & Grphs POWER GRAPHS These re grphs which result from equtions tht re not liner or qudrtic. The eponentil

More information

Notes for Graph Theory

Notes for Graph Theory Notes for Grph Theory These re notes I wrote up for my grph theory clss in 06. They contin most of the topics typiclly found in grph theory course. There re proofs of lot of the results, ut not of everything.

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

arxiv: v2 [cs.dm] 17 May 2014

arxiv: v2 [cs.dm] 17 May 2014 EXTENDING ARTIAL RERESENTATIONS OF INTERVAL GRAHS. KLAVÍK, J. KRATOCHVÍL, Y. OTACHI, T. SAITOH, AND T. VYSKOČIL rxiv:1306.2182v2 [cs.dm] 17 My 2014 Astrct. Intervl grphs re intersection grphs of closed

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Institut für Informtik Humoldt-Universitt zu Berlin dmrx@informtik.hu-erlin.de Mrcus Schefer Deprtment of Computer Science DePul University mschefer@cs.depul.edu

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

The Basic Properties of the Integral

The Basic Properties of the Integral The Bsic Properties of the Integrl When we compute the derivtive of complicted function, like + sin, we usull use differentition rules, like d [f()+g()] d f()+ d g(), to reduce the computtion d d d to

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7. CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Deprtment of Computer Science nd Informtion Theory Budpest University of Technology nd Econonomics Budpest H-1521, Hungry dmrx@cs.me.hu Mrcus Schefer

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Typing with Weird Keyboards Notes

Typing with Weird Keyboards Notes Typing with Weird Keyords Notes Ykov Berchenko-Kogn August 25, 2012 Astrct Consider lnguge with n lphet consisting of just four letters,,,, nd. There is spelling rule tht sys tht whenever you see n next

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Single-Player and Two-Player Buttons & Scissors Games

Single-Player and Two-Player Buttons & Scissors Games Single-Plyer nd Two-Plyer Buttons & Scissors Gmes The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Burke, Kyle, et

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Suffix trees, suffix arrays, BWT

Suffix trees, suffix arrays, BWT ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018 Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

On Approximating Restricted Cycle Covers

On Approximating Restricted Cycle Covers On Approximting Restricted Cycle Covers Bodo Mnthey Universität zu Lüeck, Institut für Theoretische Informtik Rtzeurger Allee 160, 23538 Lüeck, Germny mnthey@tcs.uni-lueeck.de Astrct. A cycle cover of

More information

ORDER AUTOMATIC MAPPING CLASS GROUPS. Colin Rourke and Bert Wiest

ORDER AUTOMATIC MAPPING CLASS GROUPS. Colin Rourke and Bert Wiest PACIFIC JOURNAL OF MATHEMATICS ol. 94, No., 000 ORDER AUTOMATIC MAPPING CLASS GROUPS Colin Rourke nd Bert Wiest We prove tht the mpping clss group of compct surfce with finite numer of punctures nd non-empty

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

Hyperbolas. Definition of Hyperbola

Hyperbolas. Definition of Hyperbola CHAT Pre-Clculus Hyperols The third type of conic is clled hyperol. For n ellipse, the sum of the distnces from the foci nd point on the ellipse is fixed numer. For hyperol, the difference of the distnces

More information

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012 Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

arxiv: v1 [cs.cg] 9 Dec 2016

arxiv: v1 [cs.cg] 9 Dec 2016 Some Counterexmples for Comptible Tringultions rxiv:62.0486v [cs.cg] 9 Dec 206 Cody Brnson Dwn Chndler 2 Qio Chen 3 Christin Chung 4 Andrew Coccimiglio 5 Sen L 6 Lily Li 7 Aïn Linn 8 Ann Lubiw 9 Clre Lyle

More information

Math 142, Exam 1 Information.

Math 142, Exam 1 Information. Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

arxiv: v1 [cs.cg] 1 Jun 2016

arxiv: v1 [cs.cg] 1 Jun 2016 HOW TO MORPH PLANAR GRAPH DRAWINGS Soroush Almdri, Ptrizio Angelini, Fidel Brrer-Cruz, Timothy M. Chn, Giordno D Lozzo, Giuseppe Di Bttist, Fbrizio Frti, Penny Hxell, Ann Lubiw, Murizio Ptrignni, Vincenzo

More information

CSCE 531, Spring 2017, Midterm Exam Answer Key

CSCE 531, Spring 2017, Midterm Exam Answer Key CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round

More information

arxiv:cs.cg/ v1 18 Oct 2005

arxiv:cs.cg/ v1 18 Oct 2005 A Pir of Trees without Simultneous Geometric Embedding in the Plne rxiv:cs.cg/0510053 v1 18 Oct 2005 Mrtin Kutz Mx-Plnck-Institut für Informtik, Srbrücken, Germny mkutz@mpi-inf.mpg.de October 19, 2005

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

Integration. September 28, 2017

Integration. September 28, 2017 Integrtion September 8, 7 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

I/O Efficient Dynamic Data Structures for Longest Prefix Queries

I/O Efficient Dynamic Data Structures for Longest Prefix Queries I/O Efficient Dynmic Dt Structures for Longest Prefix Queries Moshe Hershcovitch 1 nd Him Kpln 2 1 Fculty of Electricl Engineering, moshik1@gmil.com 2 School of Computer Science, himk@cs.tu.c.il, Tel Aviv

More information

Determining Single Connectivity in Directed Graphs

Determining Single Connectivity in Directed Graphs Determining Single Connectivity in Directed Grphs Adm L. Buchsbum 1 Mrtin C. Crlisle 2 Reserch Report CS-TR-390-92 September 1992 Abstrct In this pper, we consider the problem of determining whether or

More information

The Fundamental Theorem of Calculus

The Fundamental Theorem of Calculus MATH 6 The Fundmentl Theorem of Clculus The Fundmentl Theorem of Clculus (FTC) gives method of finding the signed re etween the grph of f nd the x-xis on the intervl [, ]. The theorem is: FTC: If f is

More information

Geometrical tile design for complex neighborhoods

Geometrical tile design for complex neighborhoods COMPUTATIONAL NEUROSCIENCE ORIGINAL RESEARCH ARTICLE pulished: 23 Novemer 2009 doi: 103389/neuro100202009 Geometricl tile design for complex neighorhoods Eugen Czeizler* nd Lil Kri Deprtment of Computer

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Compilers Spring 2013 PRACTICE Midterm Exam

Compilers Spring 2013 PRACTICE Midterm Exam Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information