Spanheight, A Natural Extension of Bandwidth and Treedepth

Size: px
Start display at page:

Download "Spanheight, A Natural Extension of Bandwidth and Treedepth"

Transcription

1 Master s Thesis Spanheight, A Natural Extension of Banwith an Treeepth Author: N. van Roen Supervisor: Prof. r. Hans. L. Bolaener A thesis sumitte in fulfilment of the requirements for the egree of Master of Science in the Faculty of Science Department of Information an Computing Sciences ICA Octoer, 2015

2 Astract In graph theory, the anwith prolem has a long history, an a numer of practical applications. Fomin, Heggernes, an Telle [20] introuce treespan, an extension from anwith to epth first search spanning trees in the context of the occupancy measure in search games. It is the equivalent of a tree-ecomposition, where ajacent ags ifferentiate with at most 1 vertex, an each vertex is only allowe to appear in at most k ags. Dregi [16] explore parameterize algorithms for treespan uner the name ajacencyspan. In this thesis, we efine spanheight as a ifferent extension from anwith to epth first search spanning trees. A spanheight-ecomposition is a DFS spanning tree, in which every pair of ajacent vertices are connecte with a path of length at most k + 2. It is the equivalent of a tree-ecomposition, where ajacent ags ifferentiate with at most 1 vertex, an the su-tree inuce y ags containing a vertex v has height at most k + 2. We proof spanheight to e NP-Complete. We introuce a single exponential algorithm for k-spanheight using O(n 2 9 n ) time an O(n 2 2 n ) space. This algorithm is ase on the ucketassignment technique from Feige [17]. Attempting to fin an FPT algorithm, we argue that the graph minor theorem an Courcelle s theorem cannot e use to proof the FPT memership of spanheight. Instea we proof it to e FPT when restricte to graphs of oune treeepth. Finally we present an O(nt 4 2 7t3 2 t log t ) time an O(n 2 3t3 2 t log t ) space FPT algorithm y parameterizing on the treeepth t of a graph. A secon prolem we stuy is restricte-spanheight, which is a special case of spanheight where the DFS spanning tree is restricte to eges from the input graph. For restrictespanheight we provie similar results to spanheight. As a sie result we look at reconfiguration of DFS spanning trees. The results in this thesis are mainly of theoretical significance, ecause the presente algorithms are very slow. i

3 Acknowlegements I woul like to thank Hans Bolaener for introucing me to the fiel of exact an parameterize algorithms. For suggesting spanheight as a topic for this thesis, an helping me fin great literature. For the countless iscussions an comments on early versions of algorithms. I want to thank all memers of the treewith stuy group for the TACO ay, an the weekly talks on complexity proofs, FPT algorithms, an other topics like measure an conquer. Thank you for listening to my presentation on an early version of this thesis, an giving valuale comments. Finally, I woul like to thank my parents Eugène an Mirana, for everything. ii

4 Contents Acknowlegements ii 1 Introuction Organization of this thesis Preliminaries Definitions Depth first search spanning tree Treewith Treeepth Banwith DFS Spanning Tree Reconfiguration 9 4 Properties of Spanheight Relation to anwith Relation to treewith Relation to treeepth NP-Completeness 14 6 Exact Algorithms Spanheight algorithm Restricte-spanheight algorithm The Graph Minor Theorem 24 8 Courcelle s Theorem Restricte-treeepth Restricte-spanheight Treeepth Spanheight Restricte-spanheight FPT Algorithm Main algorithm Operations Correctness of Algorithm Running time Spanheight FPT algorithm Main algorithm Algorithm operations Correctness of Algorithm Running time Conclusion 51 iii

5 Chapter 1 Introuction Fomin, Heggernes, an Telle [20] introuce the graph property treespan. Their motivation comes from graph ase search games, which strongly resemle well known graph prolems. A search game consist of a single fugitive, an multiple cops. The fugitive is invisile, an is caught when a cop stans on the same vertex of the graph, an the fugitive has no vertex to escape to. In a stanar search the cops move much slower than the fugitive. The prolem of fining the minimum numer of cops for which there exist a guarantee strategy to catch the fugitive is the equivalent of fining a minimal path-ecomposition of the graph. This is trivially true when the cops start searching at a vertex in the root ag, an walk to a vertex in the chil ag, such that every vertex in the chil ag is occupie y a cop. They continue this process until all ags are searche. The fugitive cannot reach the upper sie of the path-ecomposition without walking on the same vertex as a cop, y the efinition of a path-ecomposition. In a special search version calle Inert or Lazy search, the fugitive is only allowe to move just efore the cops are going to walk to his vertex. This version enales the graph to e ecompose into a tree structure, ecause ranches can e searche inepenently. The minimum numer of cops for this type of prolem is equal to the treewith of a graph. A ifferent optimization ojective, minimizes the numer of turns a cop spens on each iniviual vertex. This is calle the occupation time of a vertex, an the prolem is equivalent to the anwith prolem. The anwith prolem is equivalent to fining an optimal pathecomposition with the following properties: The numer of ags that contain a vertex v, is oune y the anwith For each pair of ajacent ags, exactly one vertex is introuce an/or forgotten, such that X 1 \ X 2 = 1. The main interest of Fomin et al was to fin the graph property that is equivalent to a Lazy Search version of the anwith prolem, or equivalently, a Lazy Search minimizing the Occupation time. This prolem is an extension of anwith to trees, an equivalent to fining an optimal tree-ecomposition with the following properties: The numer of ags that contain a vertex v, is oune y the treespan k For each pair of ajacent ags, exactly one vertex is introuce an/or forgotten, such that X 1 \ X 2 = 1. They call this search prolem treespan. Numer of Searchers Occupation Time Stanar Search pathwith anwith Lazy Search treewith treespan Fomin et al. also proof certain properties for treespan of specific graph classes, an show that treespan is NP-Complete on coipartite graphs. Rautenach [25] presents lower ouns for treespan ase on the chromatic numer, connectivity numer an the ratio etween eges an vertices of a graph. In [16], Dregi efines ajacencyspan, as the structural graph prolem equivalent to the graph search prolem treespan. The equivalence follows from the fact that oth prolems are equivalent to the same restricte type of tree-ecomposition of a graph. 1

6 Chapter 1. Introuction 2 a c a c Figure 1.1: A mapping of a graph G to the interval [1..4] with anwith 3. The grey ege enotes that {a, } are ajacent in G. Figure 1.2: A DFS spanning tree of Figure 1.1, where the vertex is place in its own ranch, reucing the istances etween ajacent vertices. The grey eges are ack-eges. In this thesis, we have a ifferent viewpoint on anwith, an a ifferent extension to trees. A solution to the anwith prolem is a mapping of the vertices v V to the interval [1..n]. Such that the istance etween any pair of ajacent vertices, in this interval, is at most (see Figure 1.1). This interval can e seen as a DFS spanning tree consisting of a path, an we formulate the following question. Can we create ranches on this path, to ecrease the anwith? We formally efine this as spanheight: Spanheight Instance: An unirecte connecte graph G = (V, E), an a positive integer k. Question: Can we a eges to E an get the graph H = (V, E ), where H is calle a supergraph of G. Does there exist a DFS spanning tree T = (V, F, r) of H in which every ack-ege in E \ F spans at most k vertices? For the anwith solution in Figure 1.1, it is shown in Figure 1.2, that allowing ranches will ecrease the maximum istance etween the ajacent vertices. Therefore, we elieve that spanheight is a natural extension of anwith to trees. The spanheight prolem has a relation to tree-ecompositions. In fact the spanheight prolem is equivalent to fining an optimal treeecomposition with the following properties: The su-tree, inuce y the ags containing v, has height oune y the spanheight k. For each pair of ajacent ags, exactly one vertex is introuce an/or forgotten, such that X 1 \ X 2 = 1. These efinitions allows us to compare treespan an spanheight. It is trivial that a solution for treespan is also a solution for spanheight, an therefore treespan upper ouns spanheight. Spanheight strongly resemles the treeepth of a graph, which also searches DFS spanning trees. The ojective function of treeepth is to minimize the istance etween the root an every leaf vertex. Therefore, oth prolems minimize the istance etween pairs of vertices on epth first search spanning trees. However, spanheight is much harer ecause its ojective function is local to every vertex. Our motivation to research spanheight comes from the oservation that spanheight seems to e an extension from treeepth to something closer to treewith. An since oth treeepth an treewith have interesting practical applications, maye spanheight will as well. The research ojective of this thesis is to fin fast algorithms for spanheight. In this search we will e using the anwith, treewith an treeepth relations to spanheight. A secon prolem we stuy is restricte-spanheight, which is a special case of spanheight where the epth first search spanning tree is restricte to eges from the input graph. For restricte-spanheight we provie similar results to spanheight. A goo reason for stuying oth prolems is to stuy the effect of this restriction on the complexity. Restricte-spanheight Instance: An unirecte connecte graph G = (V, E), an a positive integer k. Question: Does there exist a DFS spanning tree T = (V, F ) of G in which every ack-ege in E \ F spans at most k vertices?

7 Chapter 1. Introuction 3 The complexity class Fixe Parameter Tractaility (areviate FPT) is concerne with fining faster algorithms for NP-Complete prolems y solving the prolem for a restricte set of instances. This restricte set of instances must amit a certain property, which is calle the parameter. The concept is that we esign an algorithm, that is exponential in the size of the parameter, an polynomial in the length of the input. This gives a running time of O(poly(n) f(k)), where f(k) is allowe to e an exponential function in the parameter k. The function f(k) is often in the form of 2 k, ut larger exponential functions are allowe. Transferring the exponential epenency from 2 n to 2 k is eneficial when k is much smaller. A requirement of FPT algorithms is that k is a constant an inepenent of n. Because k is a small constant, the running time of an FPT algorithm is polynomial with a hien constant (exponential) factor. Kernelization is a metho to reuce the size of the input from n to O(poly(k)) for some parameter k. This effectively creates an FPT algorithm if this reuction takes polynomial time (See [15], chapter 4-5). Assuming the AND-istillation conjecture hols, there oes not exist a polynomial kernel for the graph property treewith. The similarity etween treewith an spanheight makes us assume that same type of argument is applicale to spanheight, an we will not consier Kernelization in this thesis. However, in [6] treewith is shown to have a kernel on graphs of oune vertex cover numer, an this approach may e use to create a kernel for spanheight as well. Dynamic programming on a tree-ecomposition of the input graph is another well researche metho to create FPT algorithms (See [15], chapter 10-12,15). The enefit of this approach is that it works for a lot of prolems. For example, the prolems Inepenent set an Hamiltonian cycle are uner strong assumptions not in FPT, ut the versions restricte to graphs of oune treewith are in FPT. For most local graph prolems there oes not seem to exist a trivial single exponential time 2 k FPT algorithm on treeecompositions. Cygan et al. [14] show that a small group of locality prolems o amit single exponential proailistic algorithms. In [9, 7] Boleaner et al. show that these prolems also amit single exponential eterministic algorithms using representative sets. Uner the Strong Exponential Time Hypothesis assumption, we can fin lower ouns on the minimum complexity of FPT algorithms parameterize y treewith (see [23]). These lower ouns are useful to etermine of known algorithms are optimal. Dynamic programming on a tree-ecompositions requires computing a tree-ecomposition eforehan. Computing a tree-ecomposition of oune treewith can e one in linear time Bolaener [3]. The tutorial [4] y the same author summarizes upper ouns an lower ouns etween treewith an relate prolems, an lists results on special graph classes. There are a numer of FPT algorithms on tree-ecompositions using epth first search. In [5] the epth first search algorithm is use to etect circus graph minors, creating an FPT algorithm for a special case of graph minor tests. [15, chapter 15] expans on this, an shows how to use epth first search as a parameterize algorithm esign tool using the Plehn-Voigt Theorem. The DFS spanning tree prolem treeepth amits an O (2 t2 ) time algorithm on a tree-ecomposition [26]. There are many other graph properties that can e use as a FPT algorithm esign tools. For the anwith prolem, the only known FPT algorithm parameterizes y the vertex cover numer s of the graph (Fellows et al. [18]). When s is small, than all other O(n) vertices of the graph can e categorize into at 2 s categories. This is than use to create an algorithm that focuses on the numer of vertices per category, instea of each vertex iniviually. In [16, chapter 7.2], Dregi introuces an FPT algorithm for treespan with a running time of O(s 2+s 4 s n+(s2 s ) 2.5(s+1)2s +o(s2 s) ), where s enotes the size of a vertex cover of the graph. This algorithm can e trivially change to output a solution for the spanheight prolem, an therefore we informally claim that spanheight is FPT for graphs of oune vertex cover numer. Their algorithm is ase on the similar algorithm for anwith from [18]. It enumerates all structures on the vertex cover, an inserts the other categorize vertices using an FPT version of the Integer Linear Programming prolem, oune y the numer of categories 2 s. The completeness an correctness of their algorithm is questionale, ecause they only give a rough sketch of the ILP moel. However, eing familiar with the original FPT algorithm for anwith, we are ale to recognize that a more refine ILP moel oes exist. The complexity analyses for this algorithm contains small mistakes. Most notaly, the algorithm efines O(s 2 s+1 ) zones, an every zone is assigne one of the O(2 s ) vertex categories. The algorithm must exhaustively enumerate

8 Chapter 1. Introuction 4 all possile cominations, giving a total of O((2 s ) s 2s+1 ) iterations. However, their analyses incorrectly states that they enumerate at most O(s4 s ) ifferent cominations, possily ecause they thought the numer of cominations was multiplicative. In chapter 5 of the same paper, Dregi present an XP algorithm, y oserving that graphs of oune treespan, have oune egree of 2k. Note that this egree oun oes not translate to spanheight. In chapter 7.1, a correct O (s n ) algorithm is given for treespan. Then incorrectly, they ofuscate this into a FPT algorithm for treespan restricte to graphs of oune treespan k an oune vertex cover numer s. Their metho consist of using the egree oun to rewrite s n to the equivalent running time s s2k ecause s2k n. 1.1 Organization of this thesis In Chapter 3 we look at the reconfiguration on DFS spanning trees, which seems to e useful for heuristic purposes an not for exact algorithms for spanheight. In Chapter 4 the relationship etween spanheight an treeepth, treewith an anwith is explore. In Chapter 5 we proof NP-Completeness for oth versions of spanheight with a reuction from treeepth. Then we focus on fining fast exact algorithms. First a single exponential algorithm for graphs of oune spanheight is given in Chapter 6. This algorithm is strongly ase on the ucke-assignment algorithm for anwith. The same algorithm is then aapte to solve restricte-spanheight. In orer to get an exact su-exponential algorithm we proof that our prolems are Fixe Parameter Tractale. Chapter 7 an 8 look at meta-theorems for proving memership in FPT. First we consier the graph minor theorem an proof that it oes not hol for spanheight. Then in Chapter 8 we use Courcelle s theorem to fin FPT instances of oth prolems. Chapter 9 presents a linear time FPT algorithm for restricte-spanheight on graphs of oune restrictespanheight. Chapter 10 is aout a linear time FPT algorithm for spanheight on graphs of oune treeepth.

9 Chapter 2 Preliminaries 2.1 Definitions (Graphs). We will use G = (V, E) to efine an unirecte graph. We will use n to enote the size of the set of vertices V = n. The graph G is allowe to e isconnecte, meaning that it consist of multiple isconnecte components, unless it is specifically state that G is connecte. The set V contains all vertices of G. The set E contains all unirecte eges {v, w} E of G etween any pair of vertices v V an w V such that v w. (Ege an vertex sets). We will often use E(G) an V (G) to reference to the ege an vertex set of a graph G = (V, E). The notation is also use for paths an a trees. This limits the numer of variales we have to efine an the reaer has to rememer. (Path). A path P etween a vertex v an w is an orere sequence of vertices incluing the enpoints. The length of a path can e expresse as P an equals the numer of vertices on this path incluing the enpoints. When the path etween two points is exclusive, the enpoints are not on the path. (Trees an roote trees). Unroote trees are acyclic graphs an are efine y the tuple T = (V, F ), where V is a set of vertices, F is a set of tree-eges. In this thesis we will mostly use roote trees unless specifie otherwise. Let T = (V, F, r) e a roote tree, where r V is the root vertex. (Tree-Path). Let T = (V, F ) e a tree, a tree-path P is a path etween using vertices V (P ) V (T ) that uses only tree-eges E(P ) E(T ). (Height of a roote tree). The height of a vertex v in a roote tree is the maximum length of a path from v to a leaf vertex. Therefore, the height of a leaf equals 1. The height of a roote tree equals the height of the root vertex. ([property-] ecomposition). We use "ecomposition" to enote a structure create from a graph G, such this structure amits to the specifications of the given graph property. For example: A tree-ecomposition is a ecomposition of a graph into a tree structure of treewith at most tw. A path-ecomposition is a ecomposition of a graph into a path of pathwith at most tw. A anwith-ecomposition is a ecomposition of a graph into an interval graph of anwith at most. A spanheight-ecomposition is a ecomposition of a supergraph into a epth first search spanning tree of a spanheight at most k. A restricte-spanheight-ecomposition is a ecomposition of a graph into a epth first search spanning tree of a spanheight at most k. 5

10 Chapter 2. Preliminaries Depth first search spanning tree Let G = (V, E) e an unirecte an connecte graph where V is a set of n vertices an E is a set of unirecte eges. An example of such a graph G is given elow in Figure 2.1. A roote spanning tree of a graph G is a roote tree that contains all the vertices from the graph an a suset of the eges. Let T = (V, F ) e a roote spanning tree of the graph G using all vertices in V an let F E e a suset of the eges of the original graph G as isplaye in Figure 2.2. c a e Figure 2.1: An example of a graph G = (V, E). Figure 2.2: An example of a roote spanning tree of G. a e c Figure 2.3: The same spanning tree, with the non-tree eges ae in a grey color. a e c A DFS spanning tree is a special type of spanning tree in which we classify the non-tree eges, which are eges from the original graph G, that are not inclue in the spanning tree itself. We classify each non-tree ege as either a ack-ege or a cross-ege. In Figure 2.2 we have not isplaye the non-tree eges, ut in Figure 2.2 we ae all the non-tree eges of the graph G using grey colore eges. For the non-tree ege {a, }, the vertices a is a escenant of, we call this non-tree ege a ack-ege going ack up in the tree. The non-tree ege {c, e} is ifferent, the vertex c is not an ancestor of the vertex of e ecause it is containe in a ifferent ranch of the spanning tree. This type of non-tree ege is calle a cross-ege ecause it crosses etween tree-ranches. Of these two types of non-tree eges, a DFS spanning tree foris the existence of cross-eges. As a consequence all non-tree eges must e ack-eges. The spanning tree from Figure 2.2 an 2.3 is therefore not a DFS spanning tree. A DFS spanning tree of the graph G is isplaye in Figure 2.4. Every graph of n vertices amits at least n ifferent DFS spanning trees y picking ifferent roots. Computing a DFS spanning tree of a graph can e one in O( V + E ) time y the famous epth first search algorithm that enumerates all vertices in a pre-fix manner. a e c Figure 2.4: A DFS spanning tree of the graph from Figure 2.1. For a ack-ege etween two vertices a an c. Let P path etween a an c. We say that vertices P \{a, c} are spanne y the ack-ege. We will also reference to these vertices as elow the ack-ege. DFS spanning trees have many applications, e.g. solving puzzles, fining the connecte components of a graph, an fining a path etween two vertices in a graph. There are also many algorithms that use the epth first search algorithm to solve har prolems heuristically, e.g. heuristics for the constraint satisfaction prolem, an for jo scheuling prolems.

11 Chapter 2. Preliminaries Treewith The graph property calle treewith measures how much a connecte unirecte graph resemles a tree-structure. It efines a tree-ecomposition as a mapping of an aritrary connecte (cyclic) graph G = (V, E) onto a special type of unroote tree ({X i i I}, T = (I, F )). The tree T is uil with numere ags, with numers i I. The set of eges etween the numere ags are represente as the set F. Each ag i I of the T contains a suset of vertices X i V. A tree-ecomposition has the following properties: i I X i = V, every vertex is containe in the tree-ecomposition. For every ege {v, w} E of the original graph, there exist a ag i I containing oth v an w, or equivalently ( v, w V )(({v, w} E) ( i I)(v, w X i )). For every vertex v V, the set of ags containing it {X i v X i, i I}, form a connecte su-tree of T. An example of a tree-ecomposion is given in Figure 2.5. The treewith of a tree-ecomposition is the size of the iggest ag minus 1 or equivalently max i I X i 1. The treewith of a graph epens on the ensity/sparsity, a single vertex has treewith 0, an a tree has treewith 1. a,, a,c, e c j,e,g c,h,j f g h i f,e,g h,i,j Figure 2.5: A graph an its tree-ecomposition of treewith 2. Deciing if there exist a tree ecomposition with tree-with at most k of a graph is NP- Complete [2], ut the prolem is shown to e in FPT an solvale in linear time an linear space ut with a constant exponential factor. A lot of NP-Har prolems have a lower orer of complexity when the input graph G is a tree structure. However, an algorithm that only solves a prolem for trees is not very useful in practice. Tree-ecompositions are more practical than general trees ecause it allows us to exploit treelike properties of cyclic graphs. A path-ecomposition is a special case of a tree-ecomposition, where no join noes are allowe. As a consequence, it will always e a path Nice tree-ecomposition The operations on a tree-ecomposition naturally ivie into four separate operations: leaf, introuce, forget, an join. Instea of etecting which operations apply to each ag of the treeecomposition we transform the tree-ecomposition in what is calle a nice tree-ecomposition. In a nice tree-ecomposition the ags have the following properties. Every ag has zero, one or two chilren. Leaf ags contain only a single vertex. A join ag X, an its two chilren X an X contain the exact same vertices X = X = X. An introuce ag X introucing the vertex v has a single chil X, where X \ {v} = X. A forget ag X forgetting the vertex v has a single chil X, where X = X \ {v}.

12 Chapter 2. Preliminaries Treeepth The graph property calle treeepth measures for a graph G what the smallest height of any DFS spanning tree is when we are allowe to create new eges. The ecision prolem is NP- Complete on ipartite an coipartite graphs [8]. Treeepth Instance: An unirecte connecte graph G = (V, E) an a positive integer k. Question: Can we a eges to E an get the graph H = (V, E ). Does there exist a DFS spanning tree T = (V, F ) of H with height at most k? Graphs of low treeepth look like stars, with the root vertex as the center. It has a numer of practical applications that have generate interest in the prolem. It has een introuce multiple times using ifferent names an efinitions: as minimum elimination tree y Pothen in 1988; as orere coloring y Katchalksi et al. in 1995; as vertex ranking y Bolaener et al. in 1998; as treeepth y Nešetřil an Ossona e Menez in It has some interesting relations to the other prolems in this thesis, it upper ouns oth the spanheight an the treewith of a graph (Chapter 4). We will create an FPT algorithm for spanheight y parameterizing on the treeepth of a graph. The version of treeepth without ege creation oes not have any pulishe research to our knowlege. Therefore, we introuce it in Chapter 5 as part of an NP-Completeness proof. 2.5 Banwith Banwith Instance: An unirecte connecte graph G = (V, E) an a positive integer. Question: Does there exist a function f that maps vertices v V to the interval [1..n], such that for every ege {v, w} E the istance f(v) f(w) etween the vertices is at most?

13 Chapter 3 DFS Spanning Tree Reconfiguration In our search for an algorithm for restricte-spanheight we iscovere an DFS spanning tree reconfiguration operator. While not use in any of our algorithms, it is an interesting sie result. The transformation operator has the aility to make small local changes to a DFS spanning trees. Furthermore, the operation can e use to turn any tree T into a DFS spanning tree with small local changes to remove cross-eges, such that the main structure of T can e maintaine. We will show that this operator can e use to create any DFS spanning tree of a graph in a polynomial numer of steps. Applications of our reconfiguration operator are heuristic an local search algorithms for prolems on DFS spanning trees. Graph transformation A graph transformation transforms the structure of a graph G into a graph H. There exists a goo summary on the topic y W. Goar an H. Smart in "Distances etween graphs uner ege operations", 1997 [22]. While we are intereste DFS spanning trees instea of graphs we will use similar notations an proofs. Suppose ε enotes a symmetric nonreflexive inary relation on the graphs. Then we say that graph G can e transforme into graph H in k steps y ε if there exists a sequence G = ε G 0, G 1, G 2,..., G k = H of graphs such that G i Gi+1 for 0 i k 1. The istance δ ε (G, H) etween G an H is the minimum value of k such that G can e transforme into H in k steps y ε, if such k exists; otherwise the istance is efine to e. Not all pairs of graphs have finite istance k for every function ε. For example, G cannot e transforme into H when they have a ifferent numer of vertices/eges an ε oes not have the aility to introuce new vertices/eges. Geometric non-crossing spanning tree transformation In geometric graphs there exists the prolem of transforming a spanning tree T with non-crossing eges (planar) to T. Noncrossing enotes that no pair of eges of the spanning tree cross each other given the euler coorinates of the vertices. The transformation uner the planer restriction allows any ege to e create etween any pair of vertices, which again is a little ifferent from our goals, ut the analyses of their planar restriction is interesting. An upper oun is given in "A quaratic istance oun on sliing etween crossing-free spanning trees" (2006) y O. Aichholzer an K. Reinhart [1]. The proof uses the ege operation calle "slie triangle" ST which moves the eges along a triangle on 3 points. This satisfies the non-crossing property when the triangle has no interior vertices. They then show that every non-crossing spanning tree can e transforme to a x-monotone non-crossing spanning tree in O(N 2 ) steps using ST, an the symmetrical property of ST allows for transformations in the general case. For ST they prove that this upper oun is tight y giving an example case that requires O(N 2 ) steps. The previous transformations o not apply to DFS spanning trees ecause they require that an ege can e create etween any pair of vertices. An in DFS spanning trees we can only use eges from the original graph. Furthermore, the previous transformations only affect the new an ol enpoints of a single ege; while an operation on a DFS spanning tree can effect all other vertices of the graph as well. 9

14 Chapter 3. DFS Spanning Tree Reconfiguration 10 Definition (Tree-ege introuction σ ). Let σ enote a symmetric nonreflexive inary relation on DFS spanning trees. The function σ takes an ack-ege {x, y} that spans the path P in the DFS spanning tree T an introuces it as a tree-ege in the new DFS spanning tree T. This creates a cycle in T, which we reak y setting the parent of every internal vertex of P to their chil in P in the new tree T. As a result of the tree-ege introuce, the vertices from P are suject to cross-eges with other vertices in T. Iteratively, pick the highest cross-ege from T, an introuce it using σ, until all cross-eges are remove from the tree. This process is illustrate in Figure 3.1. The propose metho preserves the ol su-tree as much as possile. Lemma 3.1. A tree-ege introuction σ can e compute in O(n 3 ) time. Proof. Let T = (V, E, r) e a tree with n vertices. Let a tree-ege introuction σ e performe on the cross-ege {v, w} where epth(v) = i an epth(w) = j. Let a e their lowest common ancestor vertex. Aing {v, w} as a tree-ege of T creates a cycle through a. Assume w.l.o.g. that the vertex v has a greater epth than w. The cycle is roken y making every vertex on the path P etween v an a an escenant of w. We make two oservations: There exist a vertex u on the path P with the same epth as w, an as a consequence of the tree-ege introuction, its epth increases. We conclue that there are at most O(n) vertices at epth j in T, an the numer of vertices at epth j ecreases y 1, after each cross-ege removal incient to a vertex at epth j. Only the vertices in the path P are move at each cross-ege removal. Any new cross-eges create as a sie effect, must e incient to P. An the vertices incient to these new cross-eges must have een escenants v. We conclue that new cross-eges are create etween only vertices of greater epth than j The algorithm iteratively removes cross-eges starting at epth 1, until the lowest leaf noe with epth at most O(n) is reache. At each epth i, the algorithm introuces cross-eges using the σ operation, until one of the following cases is reache: There is only 1 vertex at epth i left, an it cannot have cross-eges to vertices at epth i or lower. There are multiple vertices at epth i left, an they have no cross-eges to vertices at epth i or lower. Every epth takes at most O(n) steps, an it takes O(n) time to process a step, giving a O(n 3 ) algorithm. Our efinition of the transformation σ uses a top-own orering of the cross-eges to avoi re-introucing cross-eges after they have een remove. This allows us to oun the numer of steps y O(n 2 ) with O(n) work per step. Does this upper oun also hols for an aritrary a a c e f a e c f a e f c e f c (a) efore () iteration 1 (c) iteration 2 () en Figure 3.1: Introucing {a, } as a tree-ege with σ. After the first step, this creates crosseges, which are remove in a top own approach.

15 Chapter 3. DFS Spanning Tree Reconfiguration 11 orering of the cross-eges? We elieve this to e true, ecause for every aritrary tree T we teste, even an aritrary orering seems to remove all cross-eges in at most O(n 2 ) steps. We have unale to fin a formal proof to answer this question. A graph transformation is of limite usefulness when it can only search a suset of the search space of DFS spanning trees. The following theorem shows that our transformation can reach the complete search space. Theorem 3.2. The istance etween a pair of aritrary DFS spanning trees is oune y O(n) steps of the tree-ege introuce σ operation. Proof. Let T = (V, E, r) e the DFS spanning tree that we transform into the DFS spanning tree T = (V, E, r ). Iterate the vertices of T in prefix orering. For every vertex v V, let w V e the parent, an introuce the ege {v, w} in T as tree-ege using σ. Once w is a parent of v in T, then this remains this way, ecause new cross-eges are create only elow v. After all vertices are iterate, T is transforme into T, ecause the parent-chil relations are equivalent.

16 Chapter 4 Properties of Spanheight The spanheight prolem allows eges to e ae to the graph in orer to get a new graph with lower spanheight. In Figure 4.1 we illustrate a DFS spanning tree with spanheight 2, which trivially is optimal. Once we allow the ege {a, c} to e create, the spanheight of the new graph is reuce to 1 as illustrate in Figure 4.2. a c Figure 4.1: An optimal DFS spanning tree without ege creation. a c Figure 4.2: A DFS spanning tree with the create ege etween a an c of the graph from Figure 4.1. Any solution for restricte-spanheight is also a solution to spanheight, an therefore the spanheight of a graph upper ouns a restricte-spanheight of the same graph. In the introuction it was also shown that treespan upper ouns the spanheight. A notale trivial case for spanheight is trees, ecause they o not contain ack-eges, an are alreay epth first search spanning trees. They have a spanheight zero. 4.1 Relation to anwith Spanheight irectly resemles the anwith prolem, ecause they oth restrict the istance etween ajacent vertices in their respective output structures. The ifference is that the output structure of anwith is a path, an a DFS spanning tree in the case of spanheight. The ifference in output structure makes us to elieve that there is not a strong relation etween the two prolems. Clearly anwith is an upper oun on the spanheight of a graph, ecause every anwith ecomposition of anwith is also a DFS spanning tree. The NP-Harness cases are also ifferent; anwith is NP-Complete on tree structures, while spanheight is easy on tree structures. The relation to anwith that we exploit in this thesis are the methos use to esign algorithms for anwith. 4.2 Relation to treewith Lemma 4.1. Let T = (V, H, r) e a DFS spanning tree roote at r of G with spanheight k, then there exist a tree-ecomposition ({X i i I}, T = (I, F )) of G with treewith k + 1. Proof. We transform T into a tree-ecomposition an prove that the three properties of a treeecomposition are satisfie. The first step is to create a ag i v I for every vertex v V. Then we copy the tree structure of T y creating an ege {i v, i w } F if an only if the corresponing ege {v, w} H exist in T. An for every vertex ag i v, let X iv e the set containing the first k + 2 vertices on the path from v to the root r, inclusive. Cleary every vertex from G is containe in T an therefore has an associate ag i v in the tree-ecomposition. The ags that can contain a vertex v form a connecte su-graph roote at 12

17 Chapter 4. Properties of Spanheight 13 the ag i v. We have left to show that every pair v, w V of ajacent vertices in G, are containe together in a ag of T. The vertices v, w must form an ancestor/escenant relationship in T an the path P connecting them has length at most k + 2 y efinition. Let v e the lowest vertex of the two, then the ag X iv contains every vertex on P incluing w y construction. This proofs the last property. A consequence of this lemma is that the spanheight of a graph upper-ouns the treewith of a graph. 4.3 Relation to treeepth The maximum istance etween any pair of vertices in a treeepth-ecomposition, is t. This is also a spanheight-ecomposition of spanheight t, an it follows that the treeepth is an upper oun on spanheight of a graph. Later in this thesis we will use the following property to create an FPT algorithm for spanheight. Lemma 4.2. Let T = (V, F, r) e DFS spanning tree of a connecte unirecte graph G = (V, E) with spanheight at most k an with ege creation F E. Let q e the maximum length of any path in G. The height of T is at most (q 1) k + q. Proof. Let v V e a leaf of T. Let P e a path from v to r in G. Oserve that any pair of ajacent vertices on P, have istance at most k + 1 etween each other in T, or the spanheight is larger than k. Using structural inuction, starting at the leaf v in T. We travel on T to reach the next vertex u on the path P, which has istance at most k + 1 from v. Continue this proceure until the root r of T is reache. At every step of this proceure, we move only up or own in the tree ecause there o not exist cross-eges in T. If we move only up, then we visit at most ( P 1) k + P vertices. This proves that the maximum istance etween any leaf v an the root r is a function of the spanheight in comination with the maximum length of any path in G. This upper oun can also e expresse in terms of the treeepth of a graph. Corollary 4.3. Let T = (V, F, r) e DFS spanning tree of a connecte unirecte graph G = (V, E) with spanheight at most k an with ege creation F E. Let t e the treeepth of G. The height of T is at most (2 t 1) k + 2 t t2 t. Proof. Nešetřil an Menez [24, formula 6.2] show that for graphs of oune treeepth t, the maximum length q of any path in G, is upper oune y 2 t. In the formula from Lemma 4.2 we sustitute q with 2 t. Recall that treeepth upper ouns the spanheight an sustitute k with t. Oserve that t k + 1, an we simplify (2 t 1) k + 2 t < 2 t (k + 1) 2 t t.

18 Chapter 5 NP-Completeness In this section we will present a NP-completeness proof for the spanheight prolem with a reuction from treeepth. But first we show that treeepth when restricte to eges from the original graph remains NP-har. This proof is analog to the NP-harness proof for the normal version of treeepth (Or equivalently vertex ranking) in [8]. Restricte-treeepth Instance: An unirecte connecte graph G = (V, E), an a positive integer k. Question: Does there exist a DFS spanning tree F = (V, E, r) of G with height lower or equal to k, such that V = V an E E? We will show that this prolem reuces to the alance complete ipartite supgraph prolem (areviate BCBS). The BCBS prolem is the NP-complete [21, GT24] an efine as follows: Balance complete ipartite supgraph Instance: A ipartite graph G = (V, E), an a positive integer k. Question: Are there two isjoint suset W 1, W 2 V such that W 1 = W 2 = k an such that u W 1, v W 2 implies that {u, v} E? BCBS on i- Theorem 5.1. Restricte-treeepth on coipartite graphs is reucile to partite graphs. Proof. Let G = (V 1, V 2, E) e a ipartite graph of n vertices an let k e a positive integer. Together they form an instance to the BCBS prolem. We claim that G contains a alance complete ipartite graph using 2 k vertices, if an only if the coipartite graph G create from G amits a DFS spanning tree restricte to eges from G of height (n k + 2). Let W 1 V 1, W 2 V 2 with W 1 = W 2 = k e a solution to the BCBS prolem on G. Let G = (V 1, V 2, E ) e the coipartite graph create from G such that V 1 = V 1, V 2 = V 2, an create eges e E e E. We create a DFS spanning tree for G as illustrate in Figure 5.1: Create an universal vertex a with two ranches/sutrees elow it. One ranch is a path using the vertices from W 1 an the other ranch is a path using the vertices from W 2. These paths can e create without creating new eges ecause y efinition of G the vertices containe in W 1 an W 2 form cliques in G. This also oes not create cross-eges ecause y efinition of G there oes not exist an ege from any vertex u W 1 to v W 2 in G. By efinition the vertices from V 1 \ W 1 from a clique an we create a path using these vertices aove the vertex a. Then we a a new universal vertex as root, an finally a a path using the vertices V 2 \ W 2 aove. The tree is a long path ening the vertex a, with two ranches elow it of length k, giving a tree height of (n k + 2). Let F e any DFS spanning tree of G, then F resemles the structure escrie aove. Let e the root of F with a as a chil of, an elow a two ranches. One ranch is a path using the vertices from V 1 an the other a path using the vertices from V 2. Let this e the left tree from Figure 5.2. Oserve that vertices containe in V 1 an V 2 form a clique in G, an therefore they can never create new su-ranches in F without creating cross-eges. Therefore, vertices can only move up an own while re-configuring the tree. As a consequence, any cross-eges 14

19 Chapter 5. NP-Completeness 15 q 1 q 2 q 5 z 1 z 2 a z 3 z 4 q 3 q 4 Figure 5.1: A DFS spanning tree of a coipartite graph with V 1 = {z 1, z 2, z 3, z 4 }, an V 2 = {q 1, q 2, q 3, q 4, q 5 }. The eges of the cliques V 1 an V 2 are represente y otte eges, the eges with an enpoint in V 1 an V 2 are represente y a soli grey ege, an the tree-eges are rawn using a soli lack color. The eges of the two universal vertices a an are not rawn for increase clarity. q 1 a q 2 z 1 z 1 z 2 z 3 z 4 q 1 q 2 q 3 q 4 q 5 z 2 a z 3 z 4 q 3 q 4 q 5 Figure 5.2: Two spanning trees of a coipartite graph G as efine in Figure 5.1. The vertices forming cross-eges in the left tree are move up into the tree on the right. etween the ranches elow a must e remove y moving a vertex from elow a to aove a. Let the right tree of Figure 5.2 e an example where all cross-eges are remove. We conclue that every DFS spanning tree of G consist of a path ening in some vertex x, with two ranches elow x. Let F e any aritrary DFS spanning tree of G with treeepth (n k + 2) with k 1, then as proven its structure consist of a path ening in some vertex x with two ranches elow it. As proven one sie of the ranch can only use vertices W 1 from V 1 an the other sie uses the vertices W 2 from V 2. Then W 1 an W 2 form a complete ipartite su-graph of G y efinition of G. If W 1 > W 2, then the treeepth is (n W 1 +2), an we can take any suset of W 1 W 1 such that W 1 = W 2 = k, an they form a alance complete ipartite su-graph in G. Corollary 5.2. Restricte-treeepth is NP-Complete on coipartite graphs. Proof. The NP-harness on coipartite graphs follows irectly from the reuction in Theorem 5.1 to the BCBS prolem which is known to e NP-Complete from [21]. To prove NP-Completeness we have left to show that there exist a polynomial time certificate testing the valiity of a solution. Let T = (V, F, r) e DFS spanning tree of trepepth k of the unirecte connecte graph G = (V, E). First compute for each vertex in T the height y iterating them in postfix orer. If the height of the root vertex is lower or higher than k then the treeepth is satisfie. To test if T is a vali DFS tree we must test whether T contains all vertices from G, is acyclic an connecte, ut also that is oes not contain cross-eges. These tests are trivially

20 Chapter 5. NP-Completeness 16 one in polynomial time. We conclue that there trivially exist such an certificate proving the corollary. Theorem 5.3. Restricte-spanheight is reucile to restricte-treeepth on aritrary graphs. Proof. Let G = (V, E) e a an unirecte connecte graph of n vertices an let k e a positive integer. Together they form an instance to the treeepth prolem. We claim that G amits a DFS spanning tree of height k, if an only if the graph G, constructe from G y aing a gaget, amits a DFS spanning tree of spanheight k 1. Let T = (V, F, r) e a DFS spanning tree of G with treeepth k, for an example see the left tree in Figure 5.3. A a set Z containing (2 k + 1) new vertices to G to get the new graph G. In aition a the ege-set ({z i, z j } z i, z j Z, 1 i < j Z, j i < k) an make z k+1 an universal vertex in G as illustrate in Figure 5.3. We claim that any DFS spanning tree T of G with spanheight k 1 must contain a DFS spanning tree T of G with treeepth k as a su-tree, with as a consequence the correctness of the theorem. This claim follows from the fact that for every vertex z i Z, the parent in T is z i+1, except the highest two z 2 k an z 2 k+1. The vertices from G are require to have istance at most k + 1 from the universal vertex z k+1. Since z k+1 alreay has a parent, the vertices from G are either ancestors or escenants of z k+1. When we o not allow ege creation, the vertices from G have no eges to the ancestors of z k+1, an are therefore escenants. Even if we allow the creation of eges, placing any vertex etween any pair of z i an z i+1 is impossile, ecause them eing a clique of size k requires them to form a path 7.1. Placing a vertex from G aove the vertex z 2 k will create a ack-ege with spanheight at least k, which is higher than the allowe k 1. We conclue that the vertices from G form a su-tree of T elow z k+1 with height at most k, such that the leafs have istance at most k + 1 to the universal vertex z k+1. By efinition this sutree is a DFS spanning tree T with treeepth k of G. We have left to show that for each vertex z i Z except z 2 k an z 2 k+1, the parent in T is require to e z i+1. The reverse orering is also possile w.l.o.g. The parent relation follows from the efinition of the cliques, there are a cliques on the vertices with inices (1 to k + 1), (2 to k + 2),..., an (k+1 to 2 k + 1). Each clique has size k + 1, an must form a path in the in the tree T. Let i e the inex of vertex z i, an j = i+1 of z j. Then z i an z j share a clique an must have an ancestor-escenant relationship. Furthermore, at least 1 of the following hols: z i is part of a clique (i k to i) with only vertices with inex < j, every vertex of this clique must e on one sie of j to e ale to form path. z j is part of a clique (j to j + k) using only vertices with inex > i, every vertex of this clique must e on one sie of i to e ale to form path. Therefore, there are only two orerings of the vertices with spanheight at most k. Orere y ecreasing inex an y increasing inex. The highest vertex z 2 k+1 is the only exception, ecause it is only part of one clique, it can move elow z k+1 ut this oes not affect the placement an spanheight of any vertices. Corollary 5.4. Restricte-spanheight is NP-Complete. Proof. The NP-harness follows irectly from the reuction in Theorem 5.3 to the restrictetreeepth prolem which is proven to e NP-Complete on coipartite graphs in Corollary 5.2. To prove NP-Completeness we have left to show that there exist a polynomial time certificate testing the valiity a solution. Let T = (V, F, r) e DFS spanning tree of spanheight k of the unirecte connecte graph G = (V, E). First compute for each vertex in T the height y iterating them in post-fix orer, an then test for each ege if the height ifference is lower or equal to k + 1. The DFS property is trivially teste. We conclue that there trivially exist a certificate proving the corollary.

21 Chapter 5. NP-Completeness 17 z 9 z 8 z 7 z 6 z 5 a z 4 a f e g z 3 z 2 z 1 f e g Figure 5.3: Left the DFS spanning tree of treeepth k = 4 of a graph G. On the right the DFS spanning tree of spanheight k 1 the graph of G create from G y aing the vertices z i for 1 i 2 k + 1, an the universal vertex z k+1. The lighter grey eges are ack-eges, not all ack-eges of the universal vertex are not shown for clarity. Corollary 5.5. Spanheight is reucile to treeepth on aritrary graphs. Proof. This follows irectly from Theorem 5.3. Let T e a DFS spanning tree of G with treeepth k. The reuction creates a graph G such that the DFS spanning tree T of G with spanheight k 1 contains the tree T as a su-tree. Allowing the tree T to use eges that o not exist in G will still allow us to use it as su-graph of T for the spanheight prolem. Furthermore, Theorem 5.3 shows that even with ege creation the gaget still works as placing vertices aove the universal vertex is impossile with respect to the spanheight. Corollary 5.6. Spanheight is NP-Complete. Proof. The NP-harness follows irectly from the reuction in Corollary 5.5 to the treeepth prolem which is proven to e NP-Complete on ipartite an coipartite graphs in [8]. To prove NP-Completeness we have left to show that there exist a polynomial time certificate testing the valiity a solution. Let T = (V, F, r) e a DFS spanning tree with spanheight k of the unirecte connecte graph G = (V, E). First compute for each vertex in T the height y iterating them in post-fix orer, an then test for each ege if the height ifference is lower or equal to k + 1. The other DFS properties are trivially teste. We conclue that there trivially exist a certificate proving the corollary.

22 Chapter 6 Exact Algorithms In this chapter we introuce exact algorithms for the ecision prolems spanheight an restrictespanheight. Both prolems can trivially e solve e performing an exhaustive search in the solution space. The size of the solution space for NP-Complete prolems is so large that such an enumeration is intractale. For a lot of cominatorial prolems there exist faster algorithms using ynamic programming techniques. These algorithms still require exponential time, ut are much more efficient than an exhaustive search. The running time of these "efficient" algorithms is in the orer of O (c n ), where c is a small constant, preferaly as low as possile. The fastest known exact algorithm for treeepth uses O( n ) time ue to Fomin, Giannopoulou, an Pilipczuk [19]. Another variant calle treeepth with capacity amits an O( n ) algorithm [27]. In this chapter we efine an single exponential time algorithm for oth spanheight an restricte-spanheight. We will raw inspiration from the existing exact algorithms for anwith. In [17] Feige an Killian introuce a ucket-assignment scheme to solve anwith in O (10 n ) time an polynomial space. This algorithm has een improve y Cygan an Pilipczuk in [13] to get a O (5 n ) time an O (2 n ) space algorithm. Finally using measure an conquer the same authors foun a O (4.83 n ) time an O (4 n ) space algorithm in [12]. 6.1 Spanheight algorithm Our algorithm will e an aaptation of the secon fastest algorithm y Cygan an Pilipczuk. It consists of two phases. First we assign vertices to segments. Definition (Segments an layers). Let T = (V, E, r) e roote tree. Vertices in this tree have a fixe height. A layer at height i contains all vertices of height i. The height of a layer is counte from the ottom of the tree to the top. The height of layer is use to reference to ajacent layers. In Figure 6.2 the layers are rawn using horizontal lines, an height is isplaye at the right sie. A segment represents a group of k + 2 layers. In Figure 6.2 the tree is partitione in 3 segments covering all layers of the tree. The size of a segment is chosen as k + 2 such that any ack-ege in the tree lies within a segment, or etween two neighoring segments. If not, then this ack-ege must span at least k + 2 vertices, which is not allowe in our solution space. The main concept of the algorithm is to first partition all vertices into segments. An then fin the position of these vertices within the segment in a secon phase of the algorithm. Partition the interval [1, 2n] in 2n k+2 segments. The segments form a line, with a parentchil relations ship etween every pair of consecutive segments. Assign a vertex v V to the mile segment. Iteratively, take a vertex v V that is not assigne to a segment, ut has at least one neighor u that is assigne to a segment. The placement of v must e in the in the same segment as u, or one of the two connecting segments. If not then the ack-ege etween them spans at least 1 segment with a path using k + 1 vertices, which violates the spanheight constraint. If there is no vali placement for v, then this partial segment assignment will never lea to a solution. For every vertex there are 3 options which will e enumerate in an exhaustive search. 18

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

CMSC 430 Introduction to Compilers. Spring Register Allocation

CMSC 430 Introduction to Compilers. Spring Register Allocation CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8

Positions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8 Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

arxiv: v2 [math.co] 5 Jun 2018

arxiv: v2 [math.co] 5 Jun 2018 Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex

More information

Efficient and Scalable Sequence-Based XML Filtering

Efficient and Scalable Sequence-Based XML Filtering Efficient an Scalale Sequence-Base XML Filtering Mariam Salloum University of California, Riversie, CA, USA msalloum@cs.ucr.eu ABSTRACT The uiquitous aoption of XML as the stanar of ata exchange over the

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

On the Energy Efficiency of Content Delivery Architectures

On the Energy Efficiency of Content Delivery Architectures On the Energy Efficiency of Delivery Architectures Kyle Guan, Gary Atkinson, an Daniel C. Kilper Bell Las, Acatel-Lucent, 79 Holmel Roa, Holmel, NJ 07733 Ece Gulsen MIT, 77 Mass. Ave., Camrige, MA 039

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT CONSTUCTION AN ANALYSIS OF INVESIONS IN S AN H Arunima ay Final Paper, MATH 399 Spring 008 ASTACT The construction use to otain inversions in two-imensional Eucliean space was moifie an applie to otain

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs R u t c o r Research R e p o r t Vertex 3-coloraility of claw-free graphs M. Kamiński a V. Lozin RRR 8 2007, Feruary 2007 RUTCOR Rutgers Center for Operations Research Rutgers University 640 Bartholomew

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016 8/6/06 Program Analysis https://www.cse.iitb.ac.in/~karkare/cs68/ Flow Graph Theory Acknowlegement Slies base on the material at http://infolab.stanfor.eu/~ullman/ragon/ w06/w06.html Amey Karkare Dept

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

An ECA-based Control-rule formalism for the BPEL Process Modularization *

An ECA-based Control-rule formalism for the BPEL Process Modularization * Availale online at www.scienceirect.com Proceia Environmental Sciences 11 (2011) 511 517 An ECA-ase Control-rule formalism for the BPEL Process Moularization * Bang Ouyang, Farong Zhong **, Huan Liu Department

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Properties of the Derivative Lecture 9.

Properties of the Derivative Lecture 9. Properties of the Derivative Lecture 9. Recall that the average rate of change of a function y = f(x) over the interval from a to a + h, with h 0, is the slope of the line between y x f(a + h) f(a) =,

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Large Monochromatic Components in Two-colored Grids

Large Monochromatic Components in Two-colored Grids Large Monochromatic Components in Two-colore Gris Jiří Matoušek 1 Aleš Přívětivý 2 Department of Applie Mathematics 1,2 an Institute of Theoretical Computer Science (ITI) 1 Charles University Malostranské

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Kernelization Upper Bounds for Parameterized Graph Coloring Problems

Kernelization Upper Bounds for Parameterized Graph Coloring Problems Kernelization Upper Bounds for Parameterized Graph Coloring Problems Pim de Weijer Master Thesis: ICA-3137910 Supervisor: Hans L. Bodlaender Computing Science, Utrecht University 1 Abstract This thesis

More information

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont Theory of Integers CS389L: Automated Logical Reasoning Omega Test Işıl Dillig Earlier, we talked aout the theory of integers T Z Signature of T Z : Σ Z : {..., 2, 1, 0, 1, 2,..., 3, 2, 2, 3,..., +,, =,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS REALIZABLE TRIPLES IN DOMINATOR COLORINGS by Douglas M. Fletcher II June 2007 Thesis Co-Avisors: Ralucca Gera Craig Rasmussen Approve for public release;

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

4.2 Implicit Differentiation

4.2 Implicit Differentiation 6 Chapter 4 More Derivatives 4. Implicit Differentiation What ou will learn about... Implicitl Define Functions Lenses, Tangents, an Normal Lines Derivatives of Higher Orer Rational Powers of Differentiable

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Graduate Algorithms CS F-15 Graphs, BFS, & DFS

Graduate Algorithms CS F-15 Graphs, BFS, & DFS Grauate Algorithms CS67-206F-5 Graphs, BFS, & DFS Davi Galles Department o Computer Science University o San Francisco 5-0: Graphs A graph consists o: A set o noes or vertices (terms are interchangeable)

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths

Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Partitions and Packings of Complete Geometric Graphs with Plane Spanning Double Stars and Paths Master Thesis Patrick Schnider July 25, 2015 Advisors: Prof. Dr. Emo Welzl, Manuel Wettstein Department of

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing

Computer Graphics Chapter 7 Three-Dimensional Viewing Viewing Computer Graphics Chapter 7 Three-Dimensional Viewing Outline Overview of Three-Dimensional Viewing Concepts The Three-Dimensional Viewing Pipeline Three-Dimensional Viewing-Coorinate Parameters Transformation

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria FEDOR V. FOMIN Lectures on treewidth The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria Why treewidth? Very general idea in science: large structures can be understood by breaking

More information

1 Shortest Path Problems

1 Shortest Path Problems CS268: Geometric Algorithms Hanout #7 Design an Analysis Original Hanout #18 Stanfor University Tuesay, 25 February 1992 Original Lecture #8: 4 February 1992 Topics: Shortest Path Problems Scribe: Jim

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

The Berlin Airlift ( ) was an operation by the United States and Great. Linear Programming. Preview Exercises

The Berlin Airlift ( ) was an operation by the United States and Great. Linear Programming. Preview Exercises 790 Chapter 7 Sstems of Equations an Inequalities 108. The reason that sstems of linear inequalities are appropriate for moeling health weight is ecause guielines give health weight ranges, rather than

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description Theory of ntegers This lecture: Decision procedure for qff theory of integers CS389L: Automated Logical Reasoning Lecture 13: The Omega Test şıl Dillig As in previous two lectures, we ll consider T Z formulas

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

CS 188: Artificial Intelligence Fall Search Gone Wrong?

CS 188: Artificial Intelligence Fall Search Gone Wrong? CS 188: Artificial Intelligence Fall 2009 Lecture 3: A* Search 9/3/2009 Pieter Aeel UC Berkeley Many slides from Dan Klein Search Gone Wrong? 1 Announcements Assignments: Project 0 (Python tutorial): due

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Natalia M. Pacheco-Tallaj Advisors: Dr. Kevin Schreve and Dr. Nicholas Vlamis. University of Michigan Math Department Summer 2017 Math REU.

Natalia M. Pacheco-Tallaj Advisors: Dr. Kevin Schreve and Dr. Nicholas Vlamis. University of Michigan Math Department Summer 2017 Math REU. THURSTON NORM OF 2 GENERATOR, 1 RELATOR GROUPS Natalia M. Pacheco-Tallaj Avisors: Dr. Kevin Schreve an Dr. Nicholas Vlamis University of Michigan Math Department Summer 2017 Math REU Contents 1 Backgroun

More information

CAMERAS AND GRAVITY: ESTIMATING PLANAR OBJECT ORIENTATION. Zhaoyin Jia, Andrew Gallagher, Tsuhan Chen

CAMERAS AND GRAVITY: ESTIMATING PLANAR OBJECT ORIENTATION. Zhaoyin Jia, Andrew Gallagher, Tsuhan Chen CAMERAS AND GRAVITY: ESTIMATING PLANAR OBJECT ORIENTATION Zhaoyin Jia, Anrew Gallagher, Tsuhan Chen School of Electrical an Computer Engineering, Cornell University ABSTRACT Photography on a mobile camera

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Recent Results from Analyzing the Performance of Heuristic Search

Recent Results from Analyzing the Performance of Heuristic Search Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu

More information

Treewidth: Preprocessing and Kernelization

Treewidth: Preprocessing and Kernelization Treewidth: Preprocessing and Kernelization Hans L. Bodlaender Joint work with Arie Koster, Frank van den Eijkhof, Bart Jansen, Stefan Kratsch, Vincent Kreuzen 1 This talk Survey of work on preprocessing

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information