The robber strikes back

Size: px
Start display at page:

Download "The robber strikes back"

Transcription

1 The robber strkes back Anthony Bonato 1, Stephen Fnbow 2, Przemysław Gordnowcz 3, Al Hadar 4, Wllam B. Knnersley 1, Deter Mtsche 5, Paweł Prałat 1, and Ladslav Stacho 6 1 Ryerson Unversty 2 St. Francs Xaver Unversty 3 Techncal Unversty of Lodz 4 Carleton Unversty 5 Unversty of Nce Sopha-Antpols 6 Smon Fraser Unversty Abstract We consder the new game of Cops and Attackng Robbers, whch s dentcal to the usual Cops and Robbers game except that f the robber moves to a vertex contanng a sngle cop, then that cop s removed from the game. We study the mnmum number of cops needed to capture a robber on a graph G, wrtten cc(g). We gve bounds on cc(g) n terms of the cop number of G n the classes of bpartte graphs and dameter two, K 1,m-free graphs. AMS 2010 Subject Classfcaton: 05C57 Keywords: Cops and Robbers, cop number, bpartte graphs, claw-free graphs. 1 Introducton Cops and Robbers s a vertex-pursut game played on graphs that has been the focus of much recent attenton. Throughout, we only consder fnte, connected, and smple undrected graphs. There are two players consstng of a set of cops and a sngle robber. The game s played over a sequence of dscrete tme-steps or rounds, wth the cops gong frst n the frst round and then playng on alternate tme-steps. The cops and robber occupy vertces, and more than one cop may occupy a vertex. When a player s ready to move n a round they may move to a neghbourng vertex or pass by remanng on ther own vertex. Observe that any subset of cops may move n a gven round. The cops wn f after some fnte number of rounds, one of them can occupy the same vertex as the robber. Ths s called a capture. The robber wns f he can avod capture ndefntely. A wnnng strategy for the cops s a set of rules that f followed result n a wn for the cops, and a wnnng strategy for the robber s defned analogously. If we place a cop at each vertex, then the cops are guaranteed to wn. Therefore, the mnmum number of cops requred to wn n a graph G s a well defned postve nteger, named the cop number of the graph G. We wrte c(g) for the cop number of a graph G. For example, the Petersen graph has cop number 3. Nowakowsk and Wnkler [14], and ndependently Qullot [19], consdered the game wth one cop only; the ntroducton of the cop number came n [1]. Many papers have now been wrtten on cop number snce these three early works; see the book [8] for addtonal references and background on the cop number. See also the surveys [2, 4, 5]. The authors were supported by grants from NSERC and Ryerson Unversty. 1

2 Many varants of Cops and Robbers have been studed. For example, we may allow a cop to capture the robber from a dstance k, wherek s a non-negatve nteger [7], play on edges [12], allow one or both players to move wth dfferent speeds or teleport, or allow the robber to be nvsble. See Chapter 8 of [8] for a non-comprehensve survey of varants of Cops and Robber. We consder a new varant of the game of Cops and Robbers, where the robber s able to essentally strke back aganst the cops. We say that the robber attacks acopfhechoosestomovetoavertexonwhcha cop s present and elmnates her from the game. In the game of Cops and Attackng Robbers, the robber may attack a cop, but cannot start the game by movng to a vertex occuped by a cop; all other rules of the game are the same as n the classc Cops and Robbers. We note that f two cops are on a vertex u and the robber moves to u, then only one cop on u s elmnated; the remanng cop then captures the robber and the game ends. We wrte cc(g) for the mnmum number of cops needed to capture the robber. Note that cc(g) s the analogue of the cop number n the game of Cops and Attackng Robber; our choce of notaton wll be made more transparent once we state Theorem 1. We refer to cc(g) as the cc-number of G. Snce placng a cop on each vertex of G results n a wn for the cops, the parameter cc(g) s well-defned. To llustrate that cc(g) can take dfferent values from the cop number, consder that for the cycle C n wth n vertces we have the followng equaltes (whch are easly verfed): 1 f n =3, cc(c n )= 2 f 4 n 6, 3 else. We outlne some basc results and bounds for the cc-number n Secton 2. We consder bounds on cc(g) n terms of c(g) n Secton 3. In Secton 4 we gve the bound of cc(g) c(g) +2 nthecasethatg s bpartte; see Theorem 9. In the fnal secton, we supply n Theorem 10 an upper bound for cc(g) for K 1,m -free, dameter two graphs. For background on graph theory see [20]. For a vertex u, weletn(u) denote the neghbour set of u, and N[u] =N(u) {u} denote the closed neghbour set of u. The set of vertces of dstance 2 to u s denoted by N 2 (u). We denote by δ(g) the mnmum degree n G. In a graph G, asets of vertces s a domnatng set f every vertex not n S has a neghbor n S. The domnaton number of G, wrtten γ(g), s the mnmum cardnalty of a domnatng set. The grth of a graph s the length of the shortest cycle contaned n that graph, and s f the graph contans no cycles. 2 Basc results In ths secton we collect together some basc results for the cc-number. As the proofs are ether elementary or mnor varatons of the analogous proofs for the cop number, they are omtted. The frst result on the game of Cops and Attackng Robbers s the followng theorem; note that the second nequalty naturally nspres the notaton cc(g). We use the notaton c(g) for the edge cop number, whch s a varant where the cops and robber move on edges; see [12]. Theorem 1. If G s a graph, then c(g) cc(g) mn{2c(g), 2 c(g),γ(g)}. The followng theorem s foundatonal n the theory of the cop number. Theorem 2. [1] If G has grth at least 5, then c(g) δ(g). The followng theorem extends ths result to the cc-number. 2

3 Theorem 3. If G has grth at least 5, then cc(g) δ(g)+1. Isometrc paths play an mportant role n several key theorems n the game of Cops and Robbers, such as the cop number of planar graphs (see Chapter 4 of [8]). We call a path P n a graph G sometrc f the shortest dstance between any two vertces s equal n the graph nduced by P and n G. For a fxed nteger k 1, an nduced subgraph H of G s k-guardable f, after fntely many moves, k cops can move only n the vertces of H n such a way that f the robber moves nto H at round t, then he wll be captured at round t +1by a cop n H. For example, a clque n a graph s 1-guardable. Agner and Fromme [1] proved the followng result. Theorem 4. [1] An sometrc path s 1-guardable. We have an analogue of Theorem 4 for the cc-number. Theorem 5. An sometrc path s 2-guardable n the game of Cops and Attackng Robbers, but need not be 1-guardable. See Fgure 1 for an example where the robber can freely move onto an sometrc path wthout beng captured by a sole cop. R C Fgure 1: One cop cannot guard the sometrc path (depcted n bold). We assume that the robber has just arrved at ther vertex and t s the cop s turn to move. AgraphG s called planar f t can be embedded n a plane wthout two of ts edges crossng. It was shown frst n [1] that planar graphs requre at most three cops to catch the robber; see [8] for an alternatve proof of ths fact. Gven the results above, we may conjecture that the cc-number of a planar graph s at most 4 or even 5, but ether bound remans unproven. Outerplanar graphs are those that can be embedded n the plane wthout crossngs n such a way that all of the vertces belong to the unbounded face of the embeddng. Clarke proved the followng theorem n her doctoral thess. Theorem 6. [11] If G s outerplanar, then c(g) 2. The counterpart to Theorem 6 s the followng. Theorem 7. If G s outerplanar, then cc(g) 3. Meynel s conjecture frst communcated by Frankl [13] s one of the most mportant open problems surroundng the game of Cops and Robbers. The conjecture states that c(n) =O( n), wherec(n) s the maxmum of c(g) over all n-vertex, connected graphs. Cops and Robbers has been studed extensvely for random graphs (see for example, [3, 9, 15, 16]), partly owng to a search for counterexamples to Meynel s conjecture. However, t was recently shown that Meynel s conjecture holds asymptotcally almost surely (that s, wth probablty tendng to 1 as the number of vertces tends to nfnty) for both bnomal random graphs G(n, p) [17] as well as random d-regular graphs [18]. 3

4 In [9] t was shown that for dense random graphs, where p = n o(1) and p<1 ɛ for some ɛ>0, asymptotcally almost surely we have that c(g(n, p)) = (1 + o(1))γ(g(n, p)) = (1 + o(1)) log 1/(1 p) n, (1) Note that (1) mples that c(g(n, p)) = (1 + o(1))cc(g(n, p)) for the stated range of p; n partcular, applyng (1) to the p =1/2 case (whch corresponds to the unform probablty space of all labelled graphs on n vertces), we have that for every ɛ>0, almost all graphs satsfy cc(g)/c(g) [1, 1+ɛ]. Unfortunately, the asymptotc value of the cop number s not known for sparser graphs. However, t may be provable that c(g(n, p)) = (1 + o(1))cc(g(n, p)) for sparse graphs, wthout fndng an asymptotc value. We fnsh the secton by notng that graphs wth cc(g) =1are precsely those wth a unversal vertex. However, characterzng those graphs G wth cc(g) =2s an open problem. Graphs wth cc(g) =2nclude cop-wn graphs wthout unversal vertces, and graphs whch are not cop-wn but have domnaton number 2. Before the reader conjectures ths gves a characterzaton, note that the graph n Fgure 2 wth cc-number equalng 2 s n nether class. Fgure 2: A graph G wth c(g) =cc(g) =2and γ(g) =3. 3 How large can the cc-number be? One of the man unanswered questons on the game of Cops and Attackng Robbers s how large the ccnumber can be relatve to the cop number. Many of the results from the last secton mght lead one to (mstakenly) conjecture that cc(g) c(g)+1 for all graphs, and ths was the thnkng of the authors and others for some tme. We provde a counterexample below. By Theorem 1, we know that cc(g) s bounded above by 2c(G). For example, ths s a tght bound for a path of length at least 3. However, we do not know an mproved bound whch apples to general graphs, nor do we possess graphs G wth c(g) > 2 whose cc-number equals 2c(G). In ths secton, we outlne one approach whch may ultmately yeld such examples. Improved bounds for several graph classes are outlned n the next two sectons. Our constructon utlzes lne graphs of hypergraphs. For a postve nteger k, ak-unform hypergraph has every hyperedge of cardnalty k. A hypergraph s lnear f any two hyperedges ntersect n at most one vertex. The lne graph of a hypergraph H, wrtten L(H), has one vertex for each hyperedge of H, wth two vertces adjacent f the correspondng hyperedges ntersect. Lemma 8. Let H be a lnear k-unform hypergraph wth mnmum degree at least 3 and grth at least 5. If L(H) has domnaton number at least 2k, then cc(l(h)) 2k. 4

5 Proof. Suppose there are at most 2k 1 cops. Snce the domnaton number of L(H) s at least 2k, the robber can choose an ntal poston that lets hm survve the cops frst move. To show that 2k 1 cops cannot catch the robber n the game of Cops and Attackng Robber on L(H), suppose otherwse, and consder the state of the game on the robber s fnal turn (that s, just before he s to be captured). Let v be the robber s current vertex, E v the correspondng edge of H, andw 1,w 2,...,w k the elements of E v. The neghbours of v n L(H) are precsely those vertces correspondng to edges of H that ntersect E v ;denotebys w the set of vertces (other than v) correspondng to edges contanng w. Each S w s a clque; moreover, snce H has mnmum degree at least 3, each contans at least two vertces. By hypotheses for H, t follows that the S w are dsjont and that no vertex outsde S w domnates more than one vertex nsde. Fnally, snce H has grth at least 5, no vertex n G domnates vertces n two dfferent S w (that s, the neghbourhoods N[S w ] only have v n common). Consder the cops current postons. The cops must domnate all of N[v], snce otherwse the robber would be able to survve for one more round (by movng to an undomnated vertex). Snce the N[S w ] only have v n common, for some j we have at most one cop n N[S wj ]. If n fact there are no cops n N[S wj ], then no vertces of S wj are domnated, a contradcton. Thus, S wj contans exactly one cop. Snce each vertex outsde S wj domnates at most one vertex nsde and S wj contans at least two vertces, the cop must actually stand wthn S wj. However, snce she s the only cop wthn N[S wj ], the robber may attack the cop wthout leavng hmself open to capture on the next turn. Thus, the robber always has a means to avod capture on the cops next turn. Hence, at least 2k cops are needed to capture the robber, as clamed. We am to fnd, for all k, graphs G such that c(g) =k and cc(g) =2k. Ths, however, remans open for all k 3. As an applcaton of the lemma, take H to be the Petersen graph. It s easly verfed that c(l(h)) = 2; see also [12]. Lemma 8 wth k =2shows that cc(l(h)) 4; hence, Theorem 1 then mples that cc(l(h)) = 4. See Fgure 3 for a drawng of the lne graph of the Petersen graph. Fgure 3: The lne graph of the Petersen graph. 4 Bpartte graphs For bpartte graphs, we derve the followng upper bound. Theorem 9. For every connected bpartte graph G, we have that cc(g) c(g)+2. Proof. Fx a connected bpartte graph G. Letk = c(g); wegveastrategyfork +2 cops to wn the game of Cops and Attackng Robbers on G. Label the cops C 1,C 2,...,C k,c 1,C 2. Intutvely, cops C 1,C 2,...,C k attempt to follow a wnnng strategy for the ordnary Cops and Robber game on G; snce they must avod beng klled by the robber, they may not be able to follow ths strategy exactly, but can follow t closely enough. Cops C 1 and C 2 play a dfferent role: they occupy a common vertex throughout the game, and n each round, they smply move closer to the robber. Ths has the effect of eventually forcng the robber to 5

6 move on every turn. (Snce the cops move together, the robber cannot safely attack ether one.) Further, when the robber passes, the cops C 1,C 2,...,C k,c1,c2 pass. Therefore, we may suppose throughout that the robber moves to a new vertex on each turn. It remans to formally specfy the movements of C 1,C 2,...,C k. To each cop C, we assocate a shadow S. Throughout the game the shadows follow a wnnng strategy for the ordnary game on G. LetC (t), S (t), and R (t) denote the postons of C, S, and the robber, respectvely, at the end of round t. We mantan the followng nvarants for 1 k and all t: 1. S (t) 2. f C (t+1) 3. C (t+1) N[C (t) ] (that s, each cop remans on or adjacent to her shadow); S (t+1),thens (t+1) and R (t) belong to dfferent partte sets of G; s not adjacent to R (t) (that s, the robber never has the opportunty to attack any cop). On round t +1, each cop C moves as follows: (a) If C (t) (b) f C (t) S (t),thenc moves to S (t) ; = S (t),ands (t+1) s not adjacent to R (t),thenc moves to S (t+1) ; (c) otherwse, C remans at her current vertex. By nvarant (1), ths s clearly a legal strategy. We clam that all three nvarants are mantaned. Invarant (1) s straghtforward to verfy. For nvarant (2), frst suppose that C (t) = S (t), but C (t+1) S (t+1). By the cops strategy, ths can happen only when S (t+1) s adjacent to R (t), n whch case the shadow and robber belong to dfferent partte sets, as desred. Now suppose that C (t) S (t) and C (t+1) S (t+1). By the cops strategy we have C (t+1) = S (t). It follows that C (t+1) C (t), S (t+1) S (t),andr (t 1) R (t).thus,fs (t) and R (t 1) belong to dfferent partte sets, then so must S (t+1) and R (t) ; that s, the nvarant s mantaned. For nvarant (3), f S (t+1) s adjacent to R (t), then we may suppose that S (t+1) S (t), snce otherwse the shadow would have captured the robber n round t +1. By the cops strategy, we now have that C (t+1) S (t+1). But now the cop and her shadow are n dfferent partte sets by nvarant (1), and the shadow and robber are n dfferent partte sets by nvarant (2), so the cop and robber are n the same partte set, contradctng adjacency of the cop and the robber. Snce the shadows follow a wnnng strategy, eventually some shadow S captures the robber; that s, for some t, we have that ether S (t) = R (t) or S (t+1) = R (t). In the former case, nvarant (3) mples that C (t) S (t) and nvarant (1) mples that C captures the robber n round t +1. Now consder that case when S (t+1) = R (t). By nvarant (2), snce S (t+1) s not adjacent to R (t),wenfacthavethat C (t+1) = S (t+1) = R (t), so the cops have won. 5 K 1,m -free, dameter 2 graphs We provde one more result gvng an upper bound on the cc-number for a set of graph classes. Theorem 10. Let G be a K 1,m -free, dameter 2 graph, where m 3. Then cc(g) c(g)+2m 2. When m =3, Theorem 10 apples to claw-free graphs; see [10] for a characterzaton of these graphs. The cop number of dameter 2 graphs was studed n [6]. 6

7 Proof of Theorem 10. AcopC s back-up toacopc f C s n N[C ]. Note that a cop wth a back-up cannot be attacked wthout the robber beng captured n the next round. Now let c(g) =r, and consder c(g) cops labelled C 1,C 2,...,C r. We refer to these r-many cops as squad 1. Label an addtonal 2m 2 cops as Ĉ,1 and Ĉ,2, where 1 m 1; these cops form squad 2. The ntuton behnd the proof s that the cops n squad 2 act as back-up for those n squad 1, who play ther usual strategy on G. Further, the cops Ĉ,j are postoned n such a way that the cops C k need only restrct ther movements to the second neghbourhood of some fxed vertex. More explctly, fx a vertex x of G. Move squad 2 so that they are contaned n N[x]. Next, poston each of the cops Ĉ,1 on x. Hence, R must reman n N 2 (x) or he wll lose n the next round (n partcular, no squad 2 cop s ever attacked). Throughout the game we wll always mantan the property that there are m 1 cops on x. We note that the squad 2 cops n N(x) can move there essentally as f that subgraph were a clque, and n addton, preserve the property that m 1 cops reman on x. To see ths, f Ĉ,2 were on y N(x) and the cops would lke to move to z N(x), then move Ĉ,2 to x, and move some squad 2 cop from x to z. In partcular, a cop from squad 2 can arrange thngs so that she s adjacent to a cop n squad 1 after at most one move. We refer to ths movement of the squad two cops as a hop, as the cops appear to jump from one vertex of N(x) to another (although what s really happenng s that the cops are cyclng through x). Note that hops mantan m 1 cops on x. We now descrbe a strategy S for the cops, and then show that t s wnnng. The cops n squad 1 play exactly as n the usual game of Cops and Robbers; note that the squad 1 cops may leave N 2 (x) dependng on ther strategy, but R wll never leave N 2 (x). The squad 2 cops play as follows. Squad 2 cops do not move unless the followng occurs: a squad 1 cop C k moves to a neghbour of R, and C k has no back-up from a squad 1 cop. In that case, some squad 2 cop Ĉ,j hops to a vertex of N(x) whch s adjacent to C k. There are a suffcent number of squad 2 cops to ensure ths property, snce f m (or more) squad 1copsmoveto neghbours of R, then some of these cops must be adjacent to each other as G s K 1,m -free (n partcular, the cops n N(R) play the role of back-ups to each other). Hence, the squad 1 cops may apply ther wnnng strategy n the usual game and ensure that whenever they move to a neghbour of R, some squad 2 cop serves as back-up. In partcular, R wll never attack a squad 1 cop for the duraton of the game. Thus, S s a wnnng strategy n the game of Cops and Attackng Robbers. References [1] M. Agner, M. Fromme, A game of cops and robbers, Dscrete Appled Mathematcs 8 (1984) [2] W. Bard, A. Bonato, Meynel s conjecture on the cop number: a survey, Journal of Combnatorcs 3 (2012) [3] B. Bollobás, G. Kun, I. Leader, Cops and robbers n a random graph, Journal of Combnatoral Theory Seres B 103 (2013) [4] A. Bonato, WHAT IS... Cop Number? Notces of the Amercan Mathematcal Socety 59 (2012) [5] A. Bonato, Catch me f you can: Cops and Robbers on graphs, In: Proceedngs of the 6th Internatonal Conference on Mathematcal and Computatonal Models (ICMCM 11), [6] A. Bonato, A. Burgess, Cops and Robbers on graphs based on desgns, Journal of Combnatoral Desgns 21 (2013) [7] A. Bonato, E. Chnforooshan, P. Prałat, Cops and Robbers from a dstance, Theoretcal Computer Scence 411 (2010)

8 [8] A. Bonato, R.J. Nowakowsk, The Game of Cops and Robbers on Graphs, Amercan Mathematcal Socety, Provdence, Rhode Island, [9] A. Bonato, P. Prałat, C. Wang, Network securty n models of complex networks, Internet Mathematcs 4 (2009) [10] M. Chudnovsky, P. Seymour, Clawfree Graphs IV - Decomposton theorem, Journal of Combnatoral Theory. Ser B 98 (2008) [11] N.E. Clarke, Constraned Cops and Robber, Ph.D. Thess, Dalhouse Unversty, [12] A. Dudek, P. Gordnowcz, P. Prałat, Cops and Robbers playng on edges, Preprnt [13] P. Frankl, Cops and robbers n graphs wth large grth and Cayley graphs, Dscrete Appled Mathematcs 17 (1987) [14] R.J. Nowakowsk, P. Wnkler, Vertex-to-vertex pursut n a graph, Dscrete Mathematcs 43 (1983) [15] T. Łuczak, P. Prałat, Chasng robbers on random graphs: zgzag theorem, Random Structures and Algorthms 37 (2010) [16] P. Prałat, When does a random graph have constant cop number?, Australasan Journal of Combnatorcs 46 (2010) [17] P. Prałat, N.C. Wormald, Meynel s conjecture holds for random graphs, Preprnt, [18] P. Prałat, N.C. Wormald, Meynel s conjecture holds for random d-regular graphs, Preprnt [19] A. Qullot, Jeux et pontes fxes sur les graphes, Thèse de 3ème cycle, Unversté de Pars VI, 1978, [20] D.B. West, Introducton to Graph Theory, 2nd edton, Prentce Hall,

COPS AND ROBBER WITH CONSTRAINTS

COPS AND ROBBER WITH CONSTRAINTS COPS AND ROBBER WITH CONSTRAINTS FEDOR V. FOMIN, PETR A. GOLOVACH, AND PAWE L PRA LAT Abstract. Cops & Robber s a classcal pursut-evason game on undrected graphs, where the task s to dentfy the mnmum number

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Ramsey numbers of cubes versus cliques

Ramsey numbers of cubes versus cliques Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey

More information

On Embedding and NP-Complete Problems of Equitable Labelings

On Embedding and NP-Complete Problems of Equitable Labelings IOSR Journal o Mathematcs (IOSR-JM) e-issn: 78-578, p-issn: 39-765X Volume, Issue Ver III (Jan - Feb 5), PP 8-85 wwwosrjournalsorg Ombeddng and NP-Complete Problems o Equtable Labelngs S K Vadya, C M Barasara

More information

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

On the diameter of random planar graphs

On the diameter of random planar graphs On the dameter of random planar graphs Gullaume Chapuy, CNRS & LIAFA, Pars jont work wth Érc Fusy, Pars, Omer Gménez, ex-barcelona, Marc Noy, Barcelona. Probablty and Graphs, Eurandom, Endhoven, 04. Planar

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne More on the Lnear k-arborcty of Regular Graphs R E L Aldred Department of Mathematcs and Statstcs Unversty of Otago PO Box 56, Dunedn New Zealand Ncholas C Wormald Department of Mathematcs Unversty of

More information

Strong games played on random graphs

Strong games played on random graphs Strong games played on random graphs Asaf Ferber Department of Mathematcs Massachusetts Insttute of Technology Cambrdge, U.S.A. ferbera@mt.edu Pascal Pfster Insttute of Theoretcal Computer Scence ETH Zürch

More information

CATCH ME IF YOU CAN: COPS AND ROBBERS ON GRAPHS

CATCH ME IF YOU CAN: COPS AND ROBBERS ON GRAPHS International Conference on Mathematical and Computational Models PSG College of Technology, Coimbatore Copyright 2011, Narosa Publishing House, New Delhi, India CATCH ME IF YOU CAN: COPS AND ROBBERS ON

More information

Computation of a Minimum Average Distance Tree on Permutation Graphs*

Computation of a Minimum Average Distance Tree on Permutation Graphs* Annals of Pure and Appled Mathematcs Vol, No, 0, 74-85 ISSN: 79-087X (P), 79-0888(onlne) Publshed on 8 December 0 wwwresearchmathscorg Annals of Computaton of a Mnmum Average Dstance Tree on Permutaton

More information

Tree Spanners on Chordal Graphs: Complexity, Algorithms, Open Problems

Tree Spanners on Chordal Graphs: Complexity, Algorithms, Open Problems Tree Spanners on Chordal Graphs: Complexty, Algorthms, Open Problems A. Brandstädt 1, F.F. Dragan 2, H.-O. Le 1, and V.B. Le 1 1 Insttut für Theoretsche Informatk, Fachberech Informatk, Unverstät Rostock,

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1 Algorthmca (2007) 47: 27 51 DOI: 10.1007/s00453-006-1209-y Algorthmca 2006 Sprnger Scence+Busness Meda, Inc. Tree Spanners for Bpartte Graphs and Probe Interval Graphs 1 Andreas Brandstädt, 2 Feodor F.

More information

Capacitated Domination and Covering: A Parameterized Perspective

Capacitated Domination and Covering: A Parameterized Perspective Capactated Domnaton and Coverng: A Parameterzed Perspectve Mchael Dom Danel Lokshtanov Saket Saurabh Yngve Vllanger Abstract Capactated versons of Domnatng Set and Vertex Cover have been studed ntensvely

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

b * -Open Sets in Bispaces

b * -Open Sets in Bispaces Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

LECTURE : MANIFOLD LEARNING

LECTURE : MANIFOLD LEARNING LECTURE : MANIFOLD LEARNING Rta Osadchy Some sldes are due to L.Saul, V. C. Raykar, N. Verma Topcs PCA MDS IsoMap LLE EgenMaps Done! Dmensonalty Reducton Data representaton Inputs are real-valued vectors

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A Note on Competitive Diffusion Through Social Networks

A Note on Competitive Diffusion Through Social Networks A Note on Compettve Dffuson Through Socal Networks Noga Alon Mchal Feldman Arel D. Procacca Moshe Tennenholtz Abstract We ntroduce a game-theoretc model of dffuson of technologes, advertsements, or nfluence

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar

International Journal of Scientific & Engineering Research, Volume 7, Issue 5, May ISSN Some Polygonal Sum Labeling of Bistar Internatonal Journal of Scentfc & Engneerng Research Volume 7 Issue 5 May-6 34 Some Polygonal Sum Labelng of Bstar DrKAmuthavall SDneshkumar ABSTRACT- A (p q) graph G s sad to admt a polygonal sum labelng

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

Cell Count Method on a Network with SANET

Cell Count Method on a Network with SANET CSIS Dscusson Paper No.59 Cell Count Method on a Network wth SANET Atsuyuk Okabe* and Shno Shode** Center for Spatal Informaton Scence, Unversty of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-8656, Japan

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Planar Capacitated Dominating Set is W[1]-hard

Planar Capacitated Dominating Set is W[1]-hard Planar Capactated Domnatng Set s W[1]-hard Hans L. Bodlaender 1, Danel Lokshtanov 2, and Eelko Pennnkx 1 1 Department of Informaton and Computng Scences, Unverstet Utrecht, PO Box 80.089, 3508TB Utrecht,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Discrete Applied Mathematics. Shortest paths in linear time on minor-closed graph classes, with an application to Steiner tree approximation

Discrete Applied Mathematics. Shortest paths in linear time on minor-closed graph classes, with an application to Steiner tree approximation Dscrete Appled Mathematcs 7 (9) 67 684 Contents lsts avalable at ScenceDrect Dscrete Appled Mathematcs journal homepage: www.elsever.com/locate/dam Shortest paths n lnear tme on mnor-closed graph classes,

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Theoretical Computer Science

Theoretical Computer Science Theoretcal Computer Scence 481 (2013) 74 84 Contents lsts avalable at ScVerse ScenceDrect Theoretcal Computer Scence journal homepage: www.elsever.com/locate/tcs Increasng the mnmum degree of a graph by

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Face numbers of nestohedra

Face numbers of nestohedra Face numbers of nestohedra from Faces of generalzed permutohedra, math.co/0609184 jont wth A. Postnkov and L. Wllams. Mnsymposum Algebrasche und geometrsche Kombnatork Erlangen 16 September 2008 Vc Rener

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Complexity to Find Wiener Index of Some Graphs

Complexity to Find Wiener Index of Some Graphs Complexty to Fnd Wener Index of Some Graphs Kalyan Das Department of Mathematcs Ramnagar College, Purba Mednpur, West Bengal, Inda Abstract. The Wener ndex s one of the oldest graph parameter whch s used

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Odd Graceful Labeling of Some New Type of Graphs

Odd Graceful Labeling of Some New Type of Graphs Internatonal Journal o Mathematcs Trends and Technology IJMTT) Volume 41 Number 1- January 2017 Odd Graceul Labelng o Some New Type o Graphs Sushant Kumar Rout 1 Debdas Mshra 2 and Purna chandra Nayak

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

O n processors in CRCW PRAM

O n processors in CRCW PRAM PARALLEL COMPLEXITY OF SINGLE SOURCE SHORTEST PATH ALGORITHMS Mshra, P. K. Department o Appled Mathematcs Brla Insttute o Technology, Mesra Ranch-8355 (Inda) & Dept. o Electroncs & Electrcal Communcaton

More information

NETWORKS of dynamical systems appear in a variety of

NETWORKS of dynamical systems appear in a variety of Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal

More information

Key words. Graphics processing unit, GPU, digital geometry, computational geometry, parallel computation, CUDA, OpenCL

Key words. Graphics processing unit, GPU, digital geometry, computational geometry, parallel computation, CUDA, OpenCL PROOF OF CORRECTNESS OF THE DIGITAL DELAUNAY TRIANGULATION ALGORITHM THANH-TUNG CAO, HERBERT EDELSBRUNNER, AND TIOW-SENG TAN Abstract. We prove that the dual of the dgtal Vorono dagram constructed by floodng

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Approximating Clique and Biclique Problems*

Approximating Clique and Biclique Problems* Ž. JOURNAL OF ALGORITHMS 9, 17400 1998 ARTICLE NO. AL980964 Approxmatng Clque and Bclque Problems* Dort S. Hochbaum Department of Industral Engneerng and Operatons Research and Walter A. Haas School of

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Semi - - Connectedness in Bitopological Spaces

Semi - - Connectedness in Bitopological Spaces Journal of AL-Qadsyah for computer scence an mathematcs A specal Issue Researches of the fourth Internatonal scentfc Conference/Second صفحة 45-53 Sem - - Connectedness n Btopologcal Spaces By Qays Hatem

More information

Covering Pairs in Directed Acyclic Graphs

Covering Pairs in Directed Acyclic Graphs Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Metric Characteristics. Matrix Representations of Graphs.

Metric Characteristics. Matrix Representations of Graphs. Graph Theory Metrc Characterstcs. Matrx Representatons of Graphs. Lecturer: PhD, Assocate Professor Zarpova Elvra Rnatovna, Department of Appled Probablty and Informatcs, RUDN Unversty ezarp@mal.ru Translated

More information

Line geometry, according to the principles of Grassmann s theory of extensions. By E. Müller in Vienna.

Line geometry, according to the principles of Grassmann s theory of extensions. By E. Müller in Vienna. De Lnengeometre nach den Prnzpen der Grassmanschen Ausdehnungslehre, Monastshefte f. Mathematk u. Physk, II (89), 67-90. Lne geometry, accordng to the prncples of Grassmann s theory of extensons. By E.

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Recognizing Cartesian products in linear time

Recognizing Cartesian products in linear time Dscrete Mathematcs 307 (2007) 472 483 www.elsever.com/locate/dsc Recognzng Cartesan products n lnear tme Wlfred Imrch a, Iztok Petern b a Char of Appled Mathematcs, Montanunverstät Leoben, A-8700 Leoben,

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information