The robber strikes back
|
|
- Primrose Stewart
- 6 years ago
- Views:
Transcription
1 The robber strkes back Anthony Bonato 1, Stephen Fnbow 2, Przemysław Gordnowcz 3, Al Hadar 4, Wllam B. Knnersley 1, Deter Mtsche 5, Paweł Prałat 1, and Ladslav Stacho 6 1 Ryerson Unversty 2 St. Francs Xaver Unversty 3 Techncal Unversty of Lodz 4 Carleton Unversty 5 Unversty of Nce Sopha-Antpols 6 Smon Fraser Unversty Abstract We consder the new game of Cops and Attackng Robbers, whch s dentcal to the usual Cops and Robbers game except that f the robber moves to a vertex contanng a sngle cop, then that cop s removed from the game. We study the mnmum number of cops needed to capture a robber on a graph G, wrtten cc(g). We gve bounds on cc(g) n terms of the cop number of G n the classes of bpartte graphs and dameter two, K 1,m-free graphs. AMS 2010 Subject Classfcaton: 05C57 Keywords: Cops and Robbers, cop number, bpartte graphs, claw-free graphs. 1 Introducton Cops and Robbers s a vertex-pursut game played on graphs that has been the focus of much recent attenton. Throughout, we only consder fnte, connected, and smple undrected graphs. There are two players consstng of a set of cops and a sngle robber. The game s played over a sequence of dscrete tme-steps or rounds, wth the cops gong frst n the frst round and then playng on alternate tme-steps. The cops and robber occupy vertces, and more than one cop may occupy a vertex. When a player s ready to move n a round they may move to a neghbourng vertex or pass by remanng on ther own vertex. Observe that any subset of cops may move n a gven round. The cops wn f after some fnte number of rounds, one of them can occupy the same vertex as the robber. Ths s called a capture. The robber wns f he can avod capture ndefntely. A wnnng strategy for the cops s a set of rules that f followed result n a wn for the cops, and a wnnng strategy for the robber s defned analogously. If we place a cop at each vertex, then the cops are guaranteed to wn. Therefore, the mnmum number of cops requred to wn n a graph G s a well defned postve nteger, named the cop number of the graph G. We wrte c(g) for the cop number of a graph G. For example, the Petersen graph has cop number 3. Nowakowsk and Wnkler [14], and ndependently Qullot [19], consdered the game wth one cop only; the ntroducton of the cop number came n [1]. Many papers have now been wrtten on cop number snce these three early works; see the book [8] for addtonal references and background on the cop number. See also the surveys [2, 4, 5]. The authors were supported by grants from NSERC and Ryerson Unversty. 1
2 Many varants of Cops and Robbers have been studed. For example, we may allow a cop to capture the robber from a dstance k, wherek s a non-negatve nteger [7], play on edges [12], allow one or both players to move wth dfferent speeds or teleport, or allow the robber to be nvsble. See Chapter 8 of [8] for a non-comprehensve survey of varants of Cops and Robber. We consder a new varant of the game of Cops and Robbers, where the robber s able to essentally strke back aganst the cops. We say that the robber attacks acopfhechoosestomovetoavertexonwhcha cop s present and elmnates her from the game. In the game of Cops and Attackng Robbers, the robber may attack a cop, but cannot start the game by movng to a vertex occuped by a cop; all other rules of the game are the same as n the classc Cops and Robbers. We note that f two cops are on a vertex u and the robber moves to u, then only one cop on u s elmnated; the remanng cop then captures the robber and the game ends. We wrte cc(g) for the mnmum number of cops needed to capture the robber. Note that cc(g) s the analogue of the cop number n the game of Cops and Attackng Robber; our choce of notaton wll be made more transparent once we state Theorem 1. We refer to cc(g) as the cc-number of G. Snce placng a cop on each vertex of G results n a wn for the cops, the parameter cc(g) s well-defned. To llustrate that cc(g) can take dfferent values from the cop number, consder that for the cycle C n wth n vertces we have the followng equaltes (whch are easly verfed): 1 f n =3, cc(c n )= 2 f 4 n 6, 3 else. We outlne some basc results and bounds for the cc-number n Secton 2. We consder bounds on cc(g) n terms of c(g) n Secton 3. In Secton 4 we gve the bound of cc(g) c(g) +2 nthecasethatg s bpartte; see Theorem 9. In the fnal secton, we supply n Theorem 10 an upper bound for cc(g) for K 1,m -free, dameter two graphs. For background on graph theory see [20]. For a vertex u, weletn(u) denote the neghbour set of u, and N[u] =N(u) {u} denote the closed neghbour set of u. The set of vertces of dstance 2 to u s denoted by N 2 (u). We denote by δ(g) the mnmum degree n G. In a graph G, asets of vertces s a domnatng set f every vertex not n S has a neghbor n S. The domnaton number of G, wrtten γ(g), s the mnmum cardnalty of a domnatng set. The grth of a graph s the length of the shortest cycle contaned n that graph, and s f the graph contans no cycles. 2 Basc results In ths secton we collect together some basc results for the cc-number. As the proofs are ether elementary or mnor varatons of the analogous proofs for the cop number, they are omtted. The frst result on the game of Cops and Attackng Robbers s the followng theorem; note that the second nequalty naturally nspres the notaton cc(g). We use the notaton c(g) for the edge cop number, whch s a varant where the cops and robber move on edges; see [12]. Theorem 1. If G s a graph, then c(g) cc(g) mn{2c(g), 2 c(g),γ(g)}. The followng theorem s foundatonal n the theory of the cop number. Theorem 2. [1] If G has grth at least 5, then c(g) δ(g). The followng theorem extends ths result to the cc-number. 2
3 Theorem 3. If G has grth at least 5, then cc(g) δ(g)+1. Isometrc paths play an mportant role n several key theorems n the game of Cops and Robbers, such as the cop number of planar graphs (see Chapter 4 of [8]). We call a path P n a graph G sometrc f the shortest dstance between any two vertces s equal n the graph nduced by P and n G. For a fxed nteger k 1, an nduced subgraph H of G s k-guardable f, after fntely many moves, k cops can move only n the vertces of H n such a way that f the robber moves nto H at round t, then he wll be captured at round t +1by a cop n H. For example, a clque n a graph s 1-guardable. Agner and Fromme [1] proved the followng result. Theorem 4. [1] An sometrc path s 1-guardable. We have an analogue of Theorem 4 for the cc-number. Theorem 5. An sometrc path s 2-guardable n the game of Cops and Attackng Robbers, but need not be 1-guardable. See Fgure 1 for an example where the robber can freely move onto an sometrc path wthout beng captured by a sole cop. R C Fgure 1: One cop cannot guard the sometrc path (depcted n bold). We assume that the robber has just arrved at ther vertex and t s the cop s turn to move. AgraphG s called planar f t can be embedded n a plane wthout two of ts edges crossng. It was shown frst n [1] that planar graphs requre at most three cops to catch the robber; see [8] for an alternatve proof of ths fact. Gven the results above, we may conjecture that the cc-number of a planar graph s at most 4 or even 5, but ether bound remans unproven. Outerplanar graphs are those that can be embedded n the plane wthout crossngs n such a way that all of the vertces belong to the unbounded face of the embeddng. Clarke proved the followng theorem n her doctoral thess. Theorem 6. [11] If G s outerplanar, then c(g) 2. The counterpart to Theorem 6 s the followng. Theorem 7. If G s outerplanar, then cc(g) 3. Meynel s conjecture frst communcated by Frankl [13] s one of the most mportant open problems surroundng the game of Cops and Robbers. The conjecture states that c(n) =O( n), wherec(n) s the maxmum of c(g) over all n-vertex, connected graphs. Cops and Robbers has been studed extensvely for random graphs (see for example, [3, 9, 15, 16]), partly owng to a search for counterexamples to Meynel s conjecture. However, t was recently shown that Meynel s conjecture holds asymptotcally almost surely (that s, wth probablty tendng to 1 as the number of vertces tends to nfnty) for both bnomal random graphs G(n, p) [17] as well as random d-regular graphs [18]. 3
4 In [9] t was shown that for dense random graphs, where p = n o(1) and p<1 ɛ for some ɛ>0, asymptotcally almost surely we have that c(g(n, p)) = (1 + o(1))γ(g(n, p)) = (1 + o(1)) log 1/(1 p) n, (1) Note that (1) mples that c(g(n, p)) = (1 + o(1))cc(g(n, p)) for the stated range of p; n partcular, applyng (1) to the p =1/2 case (whch corresponds to the unform probablty space of all labelled graphs on n vertces), we have that for every ɛ>0, almost all graphs satsfy cc(g)/c(g) [1, 1+ɛ]. Unfortunately, the asymptotc value of the cop number s not known for sparser graphs. However, t may be provable that c(g(n, p)) = (1 + o(1))cc(g(n, p)) for sparse graphs, wthout fndng an asymptotc value. We fnsh the secton by notng that graphs wth cc(g) =1are precsely those wth a unversal vertex. However, characterzng those graphs G wth cc(g) =2s an open problem. Graphs wth cc(g) =2nclude cop-wn graphs wthout unversal vertces, and graphs whch are not cop-wn but have domnaton number 2. Before the reader conjectures ths gves a characterzaton, note that the graph n Fgure 2 wth cc-number equalng 2 s n nether class. Fgure 2: A graph G wth c(g) =cc(g) =2and γ(g) =3. 3 How large can the cc-number be? One of the man unanswered questons on the game of Cops and Attackng Robbers s how large the ccnumber can be relatve to the cop number. Many of the results from the last secton mght lead one to (mstakenly) conjecture that cc(g) c(g)+1 for all graphs, and ths was the thnkng of the authors and others for some tme. We provde a counterexample below. By Theorem 1, we know that cc(g) s bounded above by 2c(G). For example, ths s a tght bound for a path of length at least 3. However, we do not know an mproved bound whch apples to general graphs, nor do we possess graphs G wth c(g) > 2 whose cc-number equals 2c(G). In ths secton, we outlne one approach whch may ultmately yeld such examples. Improved bounds for several graph classes are outlned n the next two sectons. Our constructon utlzes lne graphs of hypergraphs. For a postve nteger k, ak-unform hypergraph has every hyperedge of cardnalty k. A hypergraph s lnear f any two hyperedges ntersect n at most one vertex. The lne graph of a hypergraph H, wrtten L(H), has one vertex for each hyperedge of H, wth two vertces adjacent f the correspondng hyperedges ntersect. Lemma 8. Let H be a lnear k-unform hypergraph wth mnmum degree at least 3 and grth at least 5. If L(H) has domnaton number at least 2k, then cc(l(h)) 2k. 4
5 Proof. Suppose there are at most 2k 1 cops. Snce the domnaton number of L(H) s at least 2k, the robber can choose an ntal poston that lets hm survve the cops frst move. To show that 2k 1 cops cannot catch the robber n the game of Cops and Attackng Robber on L(H), suppose otherwse, and consder the state of the game on the robber s fnal turn (that s, just before he s to be captured). Let v be the robber s current vertex, E v the correspondng edge of H, andw 1,w 2,...,w k the elements of E v. The neghbours of v n L(H) are precsely those vertces correspondng to edges of H that ntersect E v ;denotebys w the set of vertces (other than v) correspondng to edges contanng w. Each S w s a clque; moreover, snce H has mnmum degree at least 3, each contans at least two vertces. By hypotheses for H, t follows that the S w are dsjont and that no vertex outsde S w domnates more than one vertex nsde. Fnally, snce H has grth at least 5, no vertex n G domnates vertces n two dfferent S w (that s, the neghbourhoods N[S w ] only have v n common). Consder the cops current postons. The cops must domnate all of N[v], snce otherwse the robber would be able to survve for one more round (by movng to an undomnated vertex). Snce the N[S w ] only have v n common, for some j we have at most one cop n N[S wj ]. If n fact there are no cops n N[S wj ], then no vertces of S wj are domnated, a contradcton. Thus, S wj contans exactly one cop. Snce each vertex outsde S wj domnates at most one vertex nsde and S wj contans at least two vertces, the cop must actually stand wthn S wj. However, snce she s the only cop wthn N[S wj ], the robber may attack the cop wthout leavng hmself open to capture on the next turn. Thus, the robber always has a means to avod capture on the cops next turn. Hence, at least 2k cops are needed to capture the robber, as clamed. We am to fnd, for all k, graphs G such that c(g) =k and cc(g) =2k. Ths, however, remans open for all k 3. As an applcaton of the lemma, take H to be the Petersen graph. It s easly verfed that c(l(h)) = 2; see also [12]. Lemma 8 wth k =2shows that cc(l(h)) 4; hence, Theorem 1 then mples that cc(l(h)) = 4. See Fgure 3 for a drawng of the lne graph of the Petersen graph. Fgure 3: The lne graph of the Petersen graph. 4 Bpartte graphs For bpartte graphs, we derve the followng upper bound. Theorem 9. For every connected bpartte graph G, we have that cc(g) c(g)+2. Proof. Fx a connected bpartte graph G. Letk = c(g); wegveastrategyfork +2 cops to wn the game of Cops and Attackng Robbers on G. Label the cops C 1,C 2,...,C k,c 1,C 2. Intutvely, cops C 1,C 2,...,C k attempt to follow a wnnng strategy for the ordnary Cops and Robber game on G; snce they must avod beng klled by the robber, they may not be able to follow ths strategy exactly, but can follow t closely enough. Cops C 1 and C 2 play a dfferent role: they occupy a common vertex throughout the game, and n each round, they smply move closer to the robber. Ths has the effect of eventually forcng the robber to 5
6 move on every turn. (Snce the cops move together, the robber cannot safely attack ether one.) Further, when the robber passes, the cops C 1,C 2,...,C k,c1,c2 pass. Therefore, we may suppose throughout that the robber moves to a new vertex on each turn. It remans to formally specfy the movements of C 1,C 2,...,C k. To each cop C, we assocate a shadow S. Throughout the game the shadows follow a wnnng strategy for the ordnary game on G. LetC (t), S (t), and R (t) denote the postons of C, S, and the robber, respectvely, at the end of round t. We mantan the followng nvarants for 1 k and all t: 1. S (t) 2. f C (t+1) 3. C (t+1) N[C (t) ] (that s, each cop remans on or adjacent to her shadow); S (t+1),thens (t+1) and R (t) belong to dfferent partte sets of G; s not adjacent to R (t) (that s, the robber never has the opportunty to attack any cop). On round t +1, each cop C moves as follows: (a) If C (t) (b) f C (t) S (t),thenc moves to S (t) ; = S (t),ands (t+1) s not adjacent to R (t),thenc moves to S (t+1) ; (c) otherwse, C remans at her current vertex. By nvarant (1), ths s clearly a legal strategy. We clam that all three nvarants are mantaned. Invarant (1) s straghtforward to verfy. For nvarant (2), frst suppose that C (t) = S (t), but C (t+1) S (t+1). By the cops strategy, ths can happen only when S (t+1) s adjacent to R (t), n whch case the shadow and robber belong to dfferent partte sets, as desred. Now suppose that C (t) S (t) and C (t+1) S (t+1). By the cops strategy we have C (t+1) = S (t). It follows that C (t+1) C (t), S (t+1) S (t),andr (t 1) R (t).thus,fs (t) and R (t 1) belong to dfferent partte sets, then so must S (t+1) and R (t) ; that s, the nvarant s mantaned. For nvarant (3), f S (t+1) s adjacent to R (t), then we may suppose that S (t+1) S (t), snce otherwse the shadow would have captured the robber n round t +1. By the cops strategy, we now have that C (t+1) S (t+1). But now the cop and her shadow are n dfferent partte sets by nvarant (1), and the shadow and robber are n dfferent partte sets by nvarant (2), so the cop and robber are n the same partte set, contradctng adjacency of the cop and the robber. Snce the shadows follow a wnnng strategy, eventually some shadow S captures the robber; that s, for some t, we have that ether S (t) = R (t) or S (t+1) = R (t). In the former case, nvarant (3) mples that C (t) S (t) and nvarant (1) mples that C captures the robber n round t +1. Now consder that case when S (t+1) = R (t). By nvarant (2), snce S (t+1) s not adjacent to R (t),wenfacthavethat C (t+1) = S (t+1) = R (t), so the cops have won. 5 K 1,m -free, dameter 2 graphs We provde one more result gvng an upper bound on the cc-number for a set of graph classes. Theorem 10. Let G be a K 1,m -free, dameter 2 graph, where m 3. Then cc(g) c(g)+2m 2. When m =3, Theorem 10 apples to claw-free graphs; see [10] for a characterzaton of these graphs. The cop number of dameter 2 graphs was studed n [6]. 6
7 Proof of Theorem 10. AcopC s back-up toacopc f C s n N[C ]. Note that a cop wth a back-up cannot be attacked wthout the robber beng captured n the next round. Now let c(g) =r, and consder c(g) cops labelled C 1,C 2,...,C r. We refer to these r-many cops as squad 1. Label an addtonal 2m 2 cops as Ĉ,1 and Ĉ,2, where 1 m 1; these cops form squad 2. The ntuton behnd the proof s that the cops n squad 2 act as back-up for those n squad 1, who play ther usual strategy on G. Further, the cops Ĉ,j are postoned n such a way that the cops C k need only restrct ther movements to the second neghbourhood of some fxed vertex. More explctly, fx a vertex x of G. Move squad 2 so that they are contaned n N[x]. Next, poston each of the cops Ĉ,1 on x. Hence, R must reman n N 2 (x) or he wll lose n the next round (n partcular, no squad 2 cop s ever attacked). Throughout the game we wll always mantan the property that there are m 1 cops on x. We note that the squad 2 cops n N(x) can move there essentally as f that subgraph were a clque, and n addton, preserve the property that m 1 cops reman on x. To see ths, f Ĉ,2 were on y N(x) and the cops would lke to move to z N(x), then move Ĉ,2 to x, and move some squad 2 cop from x to z. In partcular, a cop from squad 2 can arrange thngs so that she s adjacent to a cop n squad 1 after at most one move. We refer to ths movement of the squad two cops as a hop, as the cops appear to jump from one vertex of N(x) to another (although what s really happenng s that the cops are cyclng through x). Note that hops mantan m 1 cops on x. We now descrbe a strategy S for the cops, and then show that t s wnnng. The cops n squad 1 play exactly as n the usual game of Cops and Robbers; note that the squad 1 cops may leave N 2 (x) dependng on ther strategy, but R wll never leave N 2 (x). The squad 2 cops play as follows. Squad 2 cops do not move unless the followng occurs: a squad 1 cop C k moves to a neghbour of R, and C k has no back-up from a squad 1 cop. In that case, some squad 2 cop Ĉ,j hops to a vertex of N(x) whch s adjacent to C k. There are a suffcent number of squad 2 cops to ensure ths property, snce f m (or more) squad 1copsmoveto neghbours of R, then some of these cops must be adjacent to each other as G s K 1,m -free (n partcular, the cops n N(R) play the role of back-ups to each other). Hence, the squad 1 cops may apply ther wnnng strategy n the usual game and ensure that whenever they move to a neghbour of R, some squad 2 cop serves as back-up. In partcular, R wll never attack a squad 1 cop for the duraton of the game. Thus, S s a wnnng strategy n the game of Cops and Attackng Robbers. References [1] M. Agner, M. Fromme, A game of cops and robbers, Dscrete Appled Mathematcs 8 (1984) [2] W. Bard, A. Bonato, Meynel s conjecture on the cop number: a survey, Journal of Combnatorcs 3 (2012) [3] B. Bollobás, G. Kun, I. Leader, Cops and robbers n a random graph, Journal of Combnatoral Theory Seres B 103 (2013) [4] A. Bonato, WHAT IS... Cop Number? Notces of the Amercan Mathematcal Socety 59 (2012) [5] A. Bonato, Catch me f you can: Cops and Robbers on graphs, In: Proceedngs of the 6th Internatonal Conference on Mathematcal and Computatonal Models (ICMCM 11), [6] A. Bonato, A. Burgess, Cops and Robbers on graphs based on desgns, Journal of Combnatoral Desgns 21 (2013) [7] A. Bonato, E. Chnforooshan, P. Prałat, Cops and Robbers from a dstance, Theoretcal Computer Scence 411 (2010)
8 [8] A. Bonato, R.J. Nowakowsk, The Game of Cops and Robbers on Graphs, Amercan Mathematcal Socety, Provdence, Rhode Island, [9] A. Bonato, P. Prałat, C. Wang, Network securty n models of complex networks, Internet Mathematcs 4 (2009) [10] M. Chudnovsky, P. Seymour, Clawfree Graphs IV - Decomposton theorem, Journal of Combnatoral Theory. Ser B 98 (2008) [11] N.E. Clarke, Constraned Cops and Robber, Ph.D. Thess, Dalhouse Unversty, [12] A. Dudek, P. Gordnowcz, P. Prałat, Cops and Robbers playng on edges, Preprnt [13] P. Frankl, Cops and robbers n graphs wth large grth and Cayley graphs, Dscrete Appled Mathematcs 17 (1987) [14] R.J. Nowakowsk, P. Wnkler, Vertex-to-vertex pursut n a graph, Dscrete Mathematcs 43 (1983) [15] T. Łuczak, P. Prałat, Chasng robbers on random graphs: zgzag theorem, Random Structures and Algorthms 37 (2010) [16] P. Prałat, When does a random graph have constant cop number?, Australasan Journal of Combnatorcs 46 (2010) [17] P. Prałat, N.C. Wormald, Meynel s conjecture holds for random graphs, Preprnt, [18] P. Prałat, N.C. Wormald, Meynel s conjecture holds for random d-regular graphs, Preprnt [19] A. Qullot, Jeux et pontes fxes sur les graphes, Thèse de 3ème cycle, Unversté de Pars VI, 1978, [20] D.B. West, Introducton to Graph Theory, 2nd edton, Prentce Hall,
COPS AND ROBBER WITH CONSTRAINTS
COPS AND ROBBER WITH CONSTRAINTS FEDOR V. FOMIN, PETR A. GOLOVACH, AND PAWE L PRA LAT Abstract. Cops & Robber s a classcal pursut-evason game on undrected graphs, where the task s to dentfy the mnmum number
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationRamsey numbers of cubes versus cliques
Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey
More informationOn Embedding and NP-Complete Problems of Equitable Labelings
IOSR Journal o Mathematcs (IOSR-JM) e-issn: 78-578, p-issn: 39-765X Volume, Issue Ver III (Jan - Feb 5), PP 8-85 wwwosrjournalsorg Ombeddng and NP-Complete Problems o Equtable Labelngs S K Vadya, C M Barasara
More informationThe Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces
Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationthe nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an
On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationOn the diameter of random planar graphs
On the dameter of random planar graphs Gullaume Chapuy, CNRS & LIAFA, Pars jont work wth Érc Fusy, Pars, Omer Gménez, ex-barcelona, Marc Noy, Barcelona. Probablty and Graphs, Eurandom, Endhoven, 04. Planar
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationMore on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne
More on the Lnear k-arborcty of Regular Graphs R E L Aldred Department of Mathematcs and Statstcs Unversty of Otago PO Box 56, Dunedn New Zealand Ncholas C Wormald Department of Mathematcs Unversty of
More informationStrong games played on random graphs
Strong games played on random graphs Asaf Ferber Department of Mathematcs Massachusetts Insttute of Technology Cambrdge, U.S.A. ferbera@mt.edu Pascal Pfster Insttute of Theoretcal Computer Scence ETH Zürch
More informationCATCH ME IF YOU CAN: COPS AND ROBBERS ON GRAPHS
International Conference on Mathematical and Computational Models PSG College of Technology, Coimbatore Copyright 2011, Narosa Publishing House, New Delhi, India CATCH ME IF YOU CAN: COPS AND ROBBERS ON
More informationComputation of a Minimum Average Distance Tree on Permutation Graphs*
Annals of Pure and Appled Mathematcs Vol, No, 0, 74-85 ISSN: 79-087X (P), 79-0888(onlne) Publshed on 8 December 0 wwwresearchmathscorg Annals of Computaton of a Mnmum Average Dstance Tree on Permutaton
More informationTree Spanners on Chordal Graphs: Complexity, Algorithms, Open Problems
Tree Spanners on Chordal Graphs: Complexty, Algorthms, Open Problems A. Brandstädt 1, F.F. Dragan 2, H.-O. Le 1, and V.B. Le 1 1 Insttut für Theoretsche Informatk, Fachberech Informatk, Unverstät Rostock,
More informationAll-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University
Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths
More informationCordial and 3-Equitable Labeling for Some Star Related Graphs
Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,
More informationBridges and cut-vertices of Intuitionistic Fuzzy Graph Structure
Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -
More informationUNIT 2 : INEQUALITIES AND CONVEX SETS
UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationTree Spanners for Bipartite Graphs and Probe Interval Graphs 1
Algorthmca (2007) 47: 27 51 DOI: 10.1007/s00453-006-1209-y Algorthmca 2006 Sprnger Scence+Busness Meda, Inc. Tree Spanners for Bpartte Graphs and Probe Interval Graphs 1 Andreas Brandstädt, 2 Feodor F.
More informationCapacitated Domination and Covering: A Parameterized Perspective
Capactated Domnaton and Coverng: A Parameterzed Perspectve Mchael Dom Danel Lokshtanov Saket Saurabh Yngve Vllanger Abstract Capactated versons of Domnatng Set and Vertex Cover have been studed ntensvely
More informationBrave New World Pseudocode Reference
Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationb * -Open Sets in Bispaces
Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationLECTURE : MANIFOLD LEARNING
LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationA Note on Competitive Diffusion Through Social Networks
A Note on Compettve Dffuson Through Socal Networks Noga Alon Mchal Feldman Arel D. Procacca Moshe Tennenholtz Abstract We ntroduce a game-theoretc model of dffuson of technologes, advertsements, or nfluence
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar
Internatonal Journal of Scentfc & Engneerng Research Volume 7 Issue 5 May-6 34 Some Polygonal Sum Labelng of Bstar DrKAmuthavall SDneshkumar ABSTRACT- A (p q) graph G s sad to admt a polygonal sum labelng
More information5 The Primal-Dual Method
5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationAn Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane
An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola
More informationCell Count Method on a Network with SANET
CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan
More informationReport on On-line Graph Coloring
2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationRange images. Range image registration. Examples of sampling patterns. Range images and range surfaces
Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples
More information1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su
Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationPlanar Capacitated Dominating Set is W[1]-hard
Planar Capactated Domnatng Set s W[1]-hard Hans L. Bodlaender 1, Danel Lokshtanov 2, and Eelko Pennnkx 1 1 Department of Informaton and Computng Scences, Unverstet Utrecht, PO Box 80.089, 3508TB Utrecht,
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationDiscrete Applied Mathematics. Shortest paths in linear time on minor-closed graph classes, with an application to Steiner tree approximation
Dscrete Appled Mathematcs 7 (9) 67 684 Contents lsts avalable at ScenceDrect Dscrete Appled Mathematcs journal homepage: www.elsever.com/locate/dam Shortest paths n lnear tme on mnor-closed graph classes,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationTheoretical Computer Science
Theoretcal Computer Scence 481 (2013) 74 84 Contents lsts avalable at ScVerse ScenceDrect Theoretcal Computer Scence journal homepage: www.elsever.com/locate/tcs Increasng the mnmum degree of a graph by
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationFace numbers of nestohedra
Face numbers of nestohedra from Faces of generalzed permutohedra, math.co/0609184 jont wth A. Postnkov and L. Wllams. Mnsymposum Algebrasche und geometrsche Kombnatork Erlangen 16 September 2008 Vc Rener
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationMath Homotopy Theory Additional notes
Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths
More informationCSE 326: Data Structures Quicksort Comparison Sorting Bound
CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationComplexity to Find Wiener Index of Some Graphs
Complexty to Fnd Wener Index of Some Graphs Kalyan Das Department of Mathematcs Ramnagar College, Purba Mednpur, West Bengal, Inda Abstract. The Wener ndex s one of the oldest graph parameter whch s used
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationOdd Graceful Labeling of Some New Type of Graphs
Internatonal Journal o Mathematcs Trends and Technology IJMTT) Volume 41 Number 1- January 2017 Odd Graceul Labelng o Some New Type o Graphs Sushant Kumar Rout 1 Debdas Mshra 2 and Purna chandra Nayak
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationGreedy Technique - Definition
Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:
More informationO n processors in CRCW PRAM
PARALLEL COMPLEXITY OF SINGLE SOURCE SHORTEST PATH ALGORITHMS Mshra, P. K. Department o Appled Mathematcs Brla Insttute o Technology, Mesra Ranch-8355 (Inda) & Dept. o Electroncs & Electrcal Communcaton
More informationNETWORKS of dynamical systems appear in a variety of
Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal
More informationKey words. Graphics processing unit, GPU, digital geometry, computational geometry, parallel computation, CUDA, OpenCL
PROOF OF CORRECTNESS OF THE DIGITAL DELAUNAY TRIANGULATION ALGORITHM THANH-TUNG CAO, HERBERT EDELSBRUNNER, AND TIOW-SENG TAN Abstract. We prove that the dual of the dgtal Vorono dagram constructed by floodng
More informationK-means and Hierarchical Clustering
Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your
More informationApproximating Clique and Biclique Problems*
Ž. JOURNAL OF ALGORITHMS 9, 17400 1998 ARTICLE NO. AL980964 Approxmatng Clque and Bclque Problems* Dort S. Hochbaum Department of Industral Engneerng and Operatons Research and Walter A. Haas School of
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationSemi - - Connectedness in Bitopological Spaces
Journal of AL-Qadsyah for computer scence an mathematcs A specal Issue Researches of the fourth Internatonal scentfc Conference/Second صفحة 45-53 Sem - - Connectedness n Btopologcal Spaces By Qays Hatem
More informationCovering Pairs in Directed Acyclic Graphs
Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationMetric Characteristics. Matrix Representations of Graphs.
Graph Theory Metrc Characterstcs. Matrx Representatons of Graphs. Lecturer: PhD, Assocate Professor Zarpova Elvra Rnatovna, Department of Appled Probablty and Informatcs, RUDN Unversty ezarp@mal.ru Translated
More informationLine geometry, according to the principles of Grassmann s theory of extensions. By E. Müller in Vienna.
De Lnengeometre nach den Prnzpen der Grassmanschen Ausdehnungslehre, Monastshefte f. Mathematk u. Physk, II (89), 67-90. Lne geometry, accordng to the prncples of Grassmann s theory of extensons. By E.
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationRecognizing Cartesian products in linear time
Dscrete Mathematcs 307 (2007) 472 483 www.elsever.com/locate/dsc Recognzng Cartesan products n lnear tme Wlfred Imrch a, Iztok Petern b a Char of Appled Mathematcs, Montanunverstät Leoben, A-8700 Leoben,
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationNotes on Organizing Java Code: Packages, Visibility, and Scope
Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng
More information