Carrying Umbrellas: An Online Relocation Problem on Graphs

Size: px
Start display at page:

Download "Carrying Umbrellas: An Online Relocation Problem on Graphs"

Transcription

1 Carrying Umbrellas: An Online Relocation Problem on Graphs Jae-Ha Lee, Chong-Dae Park, and Kyung-Yong Chwa Dept. of Computer Science, KAIST, Korea Abstract. We introduce an online relocation problem on a graph, in which a player who walks around the nodes makes decisions on whether to relocate mobile resources, while not knowing the future requests. We call it Carrying Umbrellas. This paper gives a necessary and sufficient condition under which a competitive algorithm exists and describes an optimal algorithm and anaylzes its competitve ratio. We also extend this problem to the case of digraphs. 1 Introduction To carry an umbrella or not? This is an everyday dilemma. To illustrate some of our concepts, we describe a detailed scenario. Picture a person who walks around N places. At each place, he is told where to go next and then must go there. As a usual person, he dislikes being caught in the rain without umbrellas. Since today s weather forecast is correct, he knows if it will be rainy today. However, he does not know the future destinations and weathers, which might be controlled by a malicious adversary. We say a person is safe if he never get wet. There is a trivial safe strategy: Always carry an umbrella. However, carrying an umbrella in sunny days is annoying and stupid. As an alternative, he placed several umbrellas in advance and thinks about an efficient strategy; he hopes, through some cleverness, to minimize the number of days he carries umbrellas. By adopting the competitive analysis [8], we say a person s strategy is competitive if he carries umbrellas in a small number of days (for details, see Subsection 1.1). The following questions are immediate: 1. What is the minimum number of umbrellas with which the person can be safe and competitive? (For example, is placing one umbrella per place sufficient?) 2. What is a safe and competitive strategy? We formally define the problem next. 1.1 A Game Let G =(V,E) be a simple undirected graph with N vertices and M edges. (An extension to digraphs is straightforward and considered only in Section 5.) An integer u(v) is associated with each vertex v V, indicating the number of Supported in part by KOSEF grant A. Aggarwal, C. Pandu Rangan (Eds.): ISAAC 99, LNCS 1741, pp , c Springer-Verlag Berlin Heidelberg 1999

2 196 J.-H. Lee, C.-D. Park, and K.-Y. Chwa umbrellas placed on the vertex v. We use u(g) to represent the total number of umbrellas in G. Consider an on-line game between a player and the adversary, assuming that u(g) is fixed in advance. Game Carrying-Umbrellas(G, u(g)) 1. Initialization Player determines the initial configuration of u(g) umbrellas; Adversary chooses the initial position s V of Player; 2. for i =1to L do (a) Adversary specifies (v, w), where w is a boolean value and v V is adjacent to the current vertex of Player; (b) Player goes to v; Ifw =1, he must carry at least one umbrella; As an initialization, it is assumed that the player first determines the initial configuration of u(g) umbrellas and later the adversary chooses the initial position s V of the player, although our results described in the sequel also hold even if the initialization is done in reverse order. A play consists of L phases, where L is determined by the adversary and unknown to the player. In each phase, the adversary gives a request (v, w), where v is adjacent to the current vertex of the player and w is a boolean value indicating the weather; w = 1 indicates that it is rainy, and w =0 sunny. For this request (v, w), the player must go to the specified vertex v and decide whether to carry umbrellas or not. If w =1, he must carry at least one umbrella; Only in sunny days, he may or may not carry umbrellas. Notice that the player can carry an arbitrary number of umbrellas, if available. The player loses if he cannot find any umbrella at the current vertex in a rainy phase. A strategy of the player is said to be safe if it is guaranteed that whenever w =1 the player carries at least one umbrella. Moreover, a strategy of the player should be efficient. As a measure of efficiency, we adopt the competitive ratio [8], which has been widely used in analyzing the performance of online algorithms. Let σ =σ 1 σ L be a request sequence of the adversary, where σ i =(v i, w i ) is the request in i-th phase. The cost of a strategy A for σ, written C A (σ), is defined as the number of phases in which the player carries umbrellas by the strategy A. Then, C A (σ) C Opt (σ) the competitive ratio of the strategy A is where Opt is the optimal offline strategy. (Since Opt knows the entire σ in advance, it pays the minimum cost. However, Opt cannot be implemented by any player and is used only for comparison.) A strategy whose competitive ratio is bounded by c is termed c- competitive; it is simply said to be competitive, ifitisc-competitive for some bounded c irrespective of the length of σ. The player wins, if he has a safe and competitive strategy; he loses, otherwise. Not surprisingly, whether the player has a winning strategy depends on the number of umbrellas. In this paper, we are interested in it. Definition 1 ForagraphG, we define u (G) to be the minimum number of umbrellas with which the player has a winning strategy in G.

3 Carrying Umbrellas: An Online Relocation Problem on Graphs Summary of Our Results Let G =(V,E) be a simple graph (having no parallel edges) with N vertices and M edges. We show that u (G)=M +1. That is, no strategy of the player is safe and competitive if u(g) <M+1 (Section 3) and there exists a competitive strategy of the player if u(g) M +1 (Section 4). The competitive ratio of our strategy is b(g), the number of vertices in the largest biconnected component in G. Moreover, the upper bound is attained by a weak player that carries at most one umbrella in a phase, and the competitive ratio b(g) is optimal for some graphs when u(g)=m +1. Finally, we extend this problem to the case of digraphs (Section 5). Interestingly, u (G) of a digraph G seems to be closely related with a structure of G. We present a general upper and lower bound on u (G), which is naturally reduced to M + 1 in undirected graphs. 1.3 Related Works Every online problem can be viewed as a game between an online algorithm and the adversary[7,3,6,5]. In this prospect, Ben-David, et al. [3] introduced requestanswer game as a general model of online problems. Clearly, the problem of the present paper is an example of the request-answer game. Many research works, though not directly related with our problem, have studied online problems on a graph. Such examples include the k-server problem [1], graph coloring [2,4]. 2 Lower Bound This section describes the lower bound on u (G). For a simple explanation, we first consider a weak player that can carry at most one umbrella in a phase, and showed that u (G) M +1 for the weak player. Later the same bound is extended to the general player that can carry multiple umbrellas. Theorem 1. Let G be a simple graph (with no parallel edges) with N vertices and M edges. Under the constraint that the player can carry at most one umbrella in a phase, u (G) M +1. Proof. Assume that G is connected (otherwise, the number of umbrellas in some connected component of G is no larger than the number of edges in it, and our proof can be applied to it). We show that if u(g) M then no strategy of the player is safe and competitive in G. Equivalently, it suffices to show that any safe strategy of the player is not c-competitive, for any fixed c (< ). For convenience, imagine we are the adversary that would like to defeat the player. Let σ = σ 1 σ 2 σ L denote a request sequence that we generate. Recall that the starting vertex s of the player is determined by the adversary; We choose an arbitrary vertex as s. Suppose we were somehow able to make the player lie in s so that u (s) becomes d+1, where d is the degree of s in G. This would tell us that G {s} is deficient in umbrellas, that is, u(g {s}) is strictly less than the number of

4 198 J.-H. Lee, C.-D. Park, and K.-Y. Chwa edges in G {s}. In the next step, we make the player go into G {s}. Evenif the player has carried an umbrella, u(g {s}) is no larger than the number of edges in G {s}, and the player is in it. Now we use recursion: We make the player not safe and competitive in G {s}. (In fact, some cautions are needed to make the entire competitive ratio unbounded.) So our subgoal is to make u(s) increase to d+1. Let v 1,,v d be the adjacent vertices of s and let C 1,,C d denote the maximal connected components in G {s} such that C i includes v i. Of course, C i happen to be equal to C j even when i j. Let u(c k ) denote the number of umbrellas placed in C k. Observe that if G {s} is deficient in umbrellas, then some component C k also is. We begin with explaining how to increase u(s). Suppose that at the start of (2i 1)-th phase, the player is located at s and u(s)=j. In subsequent two phases, the adversary makes the player go to v j and return to s. That is, σ 2i 1 = (v j, sunny) and σ 2i =(s, w 2i ). The 2i-th weather w 2i is determined according to the player s decision in (2i 1)-th phase; If the player carried an umbrella in (2i 1)-th phase, w 2i is set to sunny; Otherwise rainy. The strategy of the adversary is summarized below. The first and second if parts are the generation of σ 2i 1 and σ 2i, and the last if part is to check whether deficient C k exists. If it exists, the recursive procedure Adversary(C k,v k ) is called. Remember that if u(s) becomes d+1, deficient C k exists and the recursive procedure starts. Adversary(G, s) i =1; while TRUE do if u(s) =j then σ 2i 1 =(v j, sunny); if (the player carried an umbrella for σ 2i 1 ) then σ 2i =(s, sunny); else σ 2i =(s, rainy); if (there is C k such that u(c k ) < E(C k ) ) then σ 2i+1 =(v k, sunny); Adversary(C k,v k ); end-while To see why this request sequence makes u(s) increase, we define a weighted sum Φ of the umbrellas placed in vertex s and its neighbors, where j umbrellas in s weighs 0.5, 1.5,,j 0.5, respectively and each umbrella in vertex v i weighs i. Specifically, Φ = d i=1 u(s) i u(v i )+ (j 0.5) Let Φ k denote Φ at the end of k-th phase. We are interested in the change between Φ 2k 2 and Φ 2k. Suppose that u(s) isj at the end of (2k 2)-th phase. Depending on the decision of the player, there are four cases to consider. j=1

5 Carrying Umbrellas: An Online Relocation Problem on Graphs 199 Case A. If the player carried an umbrella throughout (2k 1)-th and 2k-th phase, we have Φ 2k 2 =Φ 2k because the number of umbrellas is unchanged. However, the weather must be sunny from Adversary(G, s). Therefore, the player did an useless carrying. Case B. If the player carried an umbrella from s to v j only, Φ 2k = Φ 2k This is because the umbrella moved had weight j 0.5 ats and j at v j. Case C. If the player carried an umbrella from v j to s only, Φ 2k = Φ 2k This is because the weight of the umbrella moved changes from j to j+0.5. Case D. The remaining case is that the player never carried an umbrella. This is impossible by Adversary(G, s), because if the player didn t carry an umbrella in (2k 1)-th phase w 2k is set to rainy. In summary, over two phases 2k 1 and 2k, Φ increases or is unchanged; If Φ is unchanged, the player did useless carrying in consecutive sunny days. Note that successive useless carryings make the player s strategy not competitive, because Opt would not carry an umbrella over two sunny days. Hence, in order to be competitive, the player must sometimes increase Φ. How many times Φ can increase before u(s) becomes d+1? Recall that once u(s) becomes d+1, some deficient C k exists and we start the recursive procedures. While u(s) d, each umbrella can have 2d different weights. Moreover, since u(g) is less than or equal to the number of edges in G, Φ can increase at most 2d N 2 2 <N3 phases before u(s) becomes d+1. Thus, Φ can increase at most N 3 phases, before the recursive procedure is called. In Adversary(C k,v k ), we recursively define a request sequence and weight sum Φ. Thus, in C k, Φ can increase in at most (N 1) 3 phases, before the player moves into some its deficient subgraph. In all recursive procedures, its weight sum can increase in at most N 3 +(N 1) <N 4 phases. In the limiting case that N = 2, the player always does useless carrying. This means that the player carries an umbrella except at most N 4 phases, and that for the same input, Opt can carry an umbrella in at most N 4 phases. Finally, we choose the length L of input sequence σ sufficiently large. Specifically, we let L (c +1) (N 4 ). Then, the cost of the player s strategy A is C A (σ) L N 4 c (N 4 ) And, the cost of Opt is C Opt (σ) <N 4 Therefore, the competitive ratio is, for an arbitrary c(< ), C A (σ) C Opt (σ) >c completing the proof. With small modification, we can show the following theorem but details are omitted in this abstract. Theorem 2. If G is a graph with M edges (but no parallel ones), u (G) M+1.

6 200 J.-H. Lee, C.-D. Park, and K.-Y. Chwa 3 Upper Bound In this section, we show u (G) is no larger than M + 1. It suffices to show that if u(g)=m +1 then the player has a safe and competitive strategy. Throughout this section, we assume that u(g)=m+1. To show this theorem, we only consider the weak player that carries at most one umbrella in a phase. Imagine that we are the player that should be safe and competitive against the adversary. The heart of our strategy is how to decide whether to carry an umbrella in sunny days. To help this decision, we maintain two things: labels of umbrellas and a rooted subtree of G. First, let us explain the labels, recalling that u(g)=m+1. M umbrellas are labeled as γ(e) for each edge e E, and one remaining umbrella is labeled as Current. Under these constraints, labels are updated during the game. In addition to the labels, we also maintain a dynamic rooted subtree S of G, called skeleton. S is a subtree of G whose root is the current position of the player. The root of S has the umbrella labeled as Current. For an edge e S, the child-vertex of e has the umbrella labeled as γ(e). For an edge e/ S, the umbrella labeled as γ(e) lies in one endpoint of e. Note that all umbrellas labeled as γ(e) is placed on one endpoint of e. Inan example of Figure 1a, current skeleton S is enclosed by a dotted line and every edge in S is directed towards the child, indicating the location of its umbrella. root Fig. 1. Example of a skeleton (enclosed in a dotted line). S is initialized as follows: The player first chooses an arbitrary spanning tree T and places an umbrella in each vertex of T, with their labels undetermined. Then, the number of umbrellas used in T is N. For an edge e not in T, we place an umbrella on any endpoint of it; This umbrella is labeled as γ(e). Then, the number of umbrellas labeled equals the number of edges not in T that is M N+1 and so the total number of umbrellas used is M+1. After the adversary chooses the start vertex s, the umbrellas in T are labeled. The umbrella in s is labeled as Current, and the umbrella in v ( s) is labeled as γ(e), where e connects v with its parent in T. Now, we describe the strategy of the player. Suppose that currently, the playerisatv i 1 and the current request is (v i, w i ). If the weather is rainy, the

7 Carrying Umbrellas: An Online Relocation Problem on Graphs 201 player has no choice; it has to move to v i with carrying the umbrella Current. In this case, the player resets S as a single vertex {v i }. It is easily seen that the new skeleton satisfies the invariants, because only the umbrella Current is moved. The more difficult case is when the weather is sunny. Suppose that w i = 0, i.e., sunny. Depending on whether v i belongs to S or not, there are two cases. If v i belongs to S (Figure 2a), then the player moves to v i without an umbrella. Though no umbrellas are moved, labels must be changed. Let e 1,e 2,,e r be the edges encountered when we traverse from v i 1 to v i in S. The umbrella Current is relabeled as γ(e 1 ) and the umbrella γ(e k )is relabeled as γ(e k+1 ) for 1 k r 1 and finally, the umbrella γ(e r ) is relabeled as the new Current. Observe that new skeleton S still satisfies the invariants. If v i does not belong to S (Figure 2b), the edge e =(v i 1,v i ) does not lie in S. Remember that the umbrella γ(e) was at v i 1 or v i from the invariants. Ifthe umbrella γ(e) was placed at v i 1, the player moves to v i carrying the umbrella Current, and adds the vertex v i and the edge (v i 1,v i )tos. If the umbrella γ(e) was placed at v i, the player moves to v i without carrying an umbrella and adds the vertex v i and the edge (v i 1,v i )tos and additionally, swaps the labels of Current and γ(e). In both cases, it is easy to see that S still satisfies the invariants (see Figure 2b). v i 1 e 1 e 3 e 2 v i v i 1 e 4 v i (a) (a) Fig. 2. After Fig. 1, (v i, sunny) is given. (a) v i is in S. (b) v i is not in S. Theorem 3. Let G be a graph with N nodes and M edges. If u(g) M +1, the player s strategy is safe and b(g)-competitive, where b(g) is the number of vertices in the largest biconnected component in G. Proof. First, the player s strategy is safe from the invariant that the player always has the umbrella Current. Next, we show that the strategy of the player is N-competitive. Let us divide the request sequence into a number of stages, each of which contains exactly one rainy and starts with rainy. Remember that the player resets S to a single vertex at the start of every stage. The cost of Player(G) in a stage is at most N, because the cost 1 is paid only when S is set to a single vertex or becomes larger. The cost of Opt in a stage is at least one, because each stage starts with rainy. Therefore, the competitive ratio is at most N. The competitive ratio can

8 202 J.-H. Lee, C.-D. Park, and K.-Y. Chwa be refined to b(g) by observing that for one rainy phase from u to v, we only have to reset S only in the biconnected component containing u and v. Thus we have that u (G)=M +1. Unfortunately, the above competitive ratio is best possible for some graphs when u(g)=m +1. Theorem 4. For an N-node ring G with u(g)=m+1, the competitive ratio of any strategy is at least N. Proof. Omitted. 4 Directed Graphs In this section, we extend the result of the previous section to the case of digraphs. Our motivation is as follows: Let G =(V (G),A(G)) be a digraph. (For convenience, it is assumed that G is strongly connected, that is, there is a path from any vertex to any other vertex.) In the special case that G is a symmetric digraph (obtained by replacing each edge of an undirected graph by two directed arcs with reverse directions), u (G) = A(G) by theorems in Section 3 and 4. Does it hold for every digraph? It is easily seen that the answer is no. A counterexample is given in Figure 3. For a graph G made by adding directed arcs alternatively to the undirected n-star, we have that u (G) =u (n-star), irrelevant with the number of added arcs. Fig. 3. For this graph G, u (G) =u (8-star) = 8. Thus u (G) of a directed graph G seems not to be directly determined by A, in contrast with undirected graphs. This section shows upper and lower bound on u (G), which are not tight in general but reduce to E + 1 for undirected graphs. Let G be a digraph. See Figure 4. G c is made by contracting a path consisting of vertices with indegree 1 and outdegree 1. More exactly, it v 1,v 2 v k be a one-way path such that the indegree and outdegree of v i (2 i k 1) is 1, we replace it by an arc v 1,v k. This operation is called a contraction and G c is obtained by repeatedly applying to G contractions as long as possible. Let Ḡc be the undirected graph (with no parallel edges) such that V (Ḡc) =V (G c ) and Ḡ c contains an edge (u, w) if and only if Ḡ c contains an arc u, w or w, u. Observe that Ḡc is uniquely defined from G c. We call Ḡ c the underlying graph of G c. Theorem 5. Let G be a digraph. Then u (G) E(Ḡc) + V (G) V (G c ) +1.

9 Carrying Umbrellas: An Online Relocation Problem on Graphs 203 Fig. 4. (a) A graph G, (b) its contracted one G c, and (c) its underlying graph Ḡc. Proof. Suppose that u (G) = E(Ḡc) + V (G) V (G c ) +1. We present a competitive strategy. Among the vertices in G, we call the ones in G c c-vertices, the ones not in G c p-vertices. Note that the number of p-vertices is V (G) V (G c ). Roughly speaking, the player s strategy decides whether to carry umbrellas or not, depending on E(Ḡc) + 1 umbrellas placed on c-vertices Let us explain the initialization of u(g) umbrellas. E(Ḡc) + 1 umbrellas are placed on c-vertices by applying the initialization of the undirected graphs to Ḡ c. Each of V (G) V(G c ) umbrellas is placed at each p-vertices. Then each p-vertex has one and only one umbrella. Consider a phase, say j, in which it is rainy for the first time. Let v 1,v 2 v k be a one-way path in G where v 1 and v k are c-vertices and every v i (i 1,k)is a p-vertex. Without losing generality, suppose that the player moves from v i to v i+1 at phase j. Then the player carries an umbrella afterwards until it reaches v k.ifi = 1, then the player carries an umrbella from v 1 to v k, which corresponds to one rainy phase occured in Ḡc. Otherwise, that is, if 2 i k 1, the player carries an umrbella from v i to v k. By assuming that v 1 borrows an umbrella from v i and this umbrella will be returned to v i when the player goes to v i again, we can imagine as if the player carries an umrbella from v 1 to v k. Thus any case corresponds to one rainy phase occured in Ḡc. Afterwards, as in Theorem 3, we construct the skeleton S in Ḡc and decides whether to carry an umbrella or not according to S in Ḡc. Suppose that the player lies on a c-vertex v 1 and the adversary requests to move to v 2 where v 1,v 2, v k is a one-way path. If it is rainy, we also follows the routine explained above and skeleton becomes only one vertex v k. Otherwise, consider the strategy of the player on Ḡc and compute if the player carries an umbrella for the request (v 1,v k )onḡc. If the the palyer carries an umbrella on Ḡc, he also does in G and always carries an umbrella while traveling to v k. Otherwise, the player does not carry an umbrella, but if v 1 borrowed an umbrella from v i, v 1 returns it. After one rainy phase, the player can construct a full skeleton by carring an umbrella whenever visiting a c-vertex not in S. Thus the player s strategy is

10 204 J.-H. Lee, C.-D. Park, and K.-Y. Chwa V (G) -competitive. In fact, it is b(g)-competitive where b(g) is the size of the largest biconnected component in G. Lower bound can also be obtained for digraphs (but proofs are omitted): For a digraph G, let Ḡ c be the undirected graph (with no parallel edges) such that V (Ḡ c)=v (G c ) and Ḡc contains an edge (u, w) if and only if Ḡc contains both arcs u, w and w, u. Then u (G) E(Ḡ c) + V (G) V (G c ) +1.Thusthe gap between upper and lower bound on u (G) is E(Ḡc) E(Ḡ c). Observe that Theorem 5 is optimal for the graph given in Figure 4. 5 Concluding Remarks This paper is the first attempt on an online problem Carrying Umbrellas, and many questions remain open. First, finding u (G) for a digraph G seems to be interesting in a graph-theoretical viewpoint. Similarly, the characterization of the class of graphs such that u (G) = V (G) is an interesting open problem (among undirected graphs, such examples are only trees). Second, we think that the problem Carrying Umbrellas can be extended to be of practical use by adopting different relocation constraints and considering general resources rather than umbrellas. For now, however, it is mainly of theoretical interest. Finally, reducing the competitive ratio with more umbrellas is an open problem. Acknowledgements grateful to Oh-Heum Kwon for motivating this work. References 1. N. Alon, R. M. Karp, D. Peleg, and D. West. A graph-theoretic game and its application to the k-server problem. SIAM J. of Comput., 24(1):78 100, R. Beigel and W.I Gasarch. The mapmaker s dilemma. Discrete Applied Mathematics, 34(1):37 48, Ben-David, A. Borodin, R.M. Karp, G. Tardos, and A. Widgerson. On the power of randomization in online algorithms. In Proc. of 22nd STOC, pages , Hans L. Bodlaender. On the complexity of some coloring games. Int. J. of Foundation of Computer Science, 2: , A. Borodin and R. El-Yaniv. Online computation and competitive analysis. Cambridge University Press, M. Chrobak and L. Larmore. The searver problem and online game. In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, volume 7, pages AMS-ACM, P. Raghavan and M. Snir. Memory versus randomization in online algorithms. In Proc. of 16th ICALP, pages , D. Sleator and R. Tarjan. Amortized efficiency of list update and paging rules. Communications of ACM, 2(28): , 1985.

2. CONNECTIVITY Connectivity

2. CONNECTIVITY Connectivity 2. CONNECTIVITY 70 2. Connectivity 2.1. Connectivity. Definition 2.1.1. (1) A path in a graph G = (V, E) is a sequence of vertices v 0, v 1, v 2,..., v n such that {v i 1, v i } is an edge of G for i =

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS

JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS JOB SHOP SCHEDULING WITH UNIT LENGTH TASKS MEIKE AKVELD AND RAPHAEL BERNHARD Abstract. In this paper, we consider a class of scheduling problems that are among the fundamental optimization problems in

More information

Dominance Constraints and Dominance Graphs

Dominance Constraints and Dominance Graphs Dominance Constraints and Dominance Graphs David Steurer Saarland University Abstract. Dominance constraints logically describe trees in terms of their adjacency and dominance, i.e. reachability, relation.

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

1 Digraphs. Definition 1

1 Digraphs. Definition 1 1 Digraphs Definition 1 Adigraphordirected graphgisatriplecomprisedofavertex set V(G), edge set E(G), and a function assigning each edge an ordered pair of vertices (tail, head); these vertices together

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

Abstract. COUNTER algorithms, a family of randomized algorithms for the list update problem, were

Abstract. COUNTER algorithms, a family of randomized algorithms for the list update problem, were Revisiting the COUNTER Algorithms for List Update Susanne Albers Michael Mitzenmacher y Abstract COUNTER algorithms, a family of randomized algorithms for the list update problem, were introduced by Reingold,

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

The Cover Pebbling Number of Graphs

The Cover Pebbling Number of Graphs The Cover Pebbling Number of Graphs Betsy Crull Tammy Cundiff Paul Feltman Glenn H. Hurlbert Lara Pudwell Zsuzsanna Szaniszlo and Zsolt Tuza February 11, 2004 Abstract A pebbling move on a graph consists

More information

Chapter 3 Trees. Theorem A graph T is a tree if, and only if, every two distinct vertices of T are joined by a unique path.

Chapter 3 Trees. Theorem A graph T is a tree if, and only if, every two distinct vertices of T are joined by a unique path. Chapter 3 Trees Section 3. Fundamental Properties of Trees Suppose your city is planning to construct a rapid rail system. They want to construct the most economical system possible that will meet the

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

CMSC 380. Graph Terminology and Representation

CMSC 380. Graph Terminology and Representation CMSC 380 Graph Terminology and Representation GRAPH BASICS 2 Basic Graph Definitions n A graph G = (V,E) consists of a finite set of vertices, V, and a finite set of edges, E. n Each edge is a pair (v,w)

More information

Vertical decomposition of a lattice using clique separators

Vertical decomposition of a lattice using clique separators Vertical decomposition of a lattice using clique separators Anne Berry, Romain Pogorelcnik, Alain Sigayret LIMOS UMR CNRS 6158 Ensemble Scientifique des Cézeaux Université Blaise Pascal, F-63 173 Aubière,

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

4 Fractional Dimension of Posets from Trees

4 Fractional Dimension of Posets from Trees 57 4 Fractional Dimension of Posets from Trees In this last chapter, we switch gears a little bit, and fractionalize the dimension of posets We start with a few simple definitions to develop the language

More information

Recognizability Equals Definability for Graphs of Bounded Treewidth and Bounded Chordality

Recognizability Equals Definability for Graphs of Bounded Treewidth and Bounded Chordality Recognizability Equals Definability for Graphs of Bounded Treewidth and Bounded Chordality Hans L. Bodlaender, Utrecht University and Eindhoven University of Technology Pinar Heggernes, University of Bergen

More information

Chapter 11: Graphs and Trees. March 23, 2008

Chapter 11: Graphs and Trees. March 23, 2008 Chapter 11: Graphs and Trees March 23, 2008 Outline 1 11.1 Graphs: An Introduction 2 11.2 Paths and Circuits 3 11.3 Matrix Representations of Graphs 4 11.5 Trees Graphs: Basic Definitions Informally, a

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

Discrete mathematics

Discrete mathematics Discrete mathematics Petr Kovář petr.kovar@vsb.cz VŠB Technical University of Ostrava DiM 470-2301/02, Winter term 2018/2019 About this file This file is meant to be a guideline for the lecturer. Many

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

Noncrossing Trees and Noncrossing Graphs

Noncrossing Trees and Noncrossing Graphs Noncrossing Trees and Noncrossing Graphs William Y. C. Chen and Sherry H. F. Yan 2 Center for Combinatorics, LPMC, Nanai University, 30007 Tianjin, P.R. China chen@nanai.edu.cn, 2 huifangyan@eyou.com Mathematics

More information

K 4,4 e Has No Finite Planar Cover

K 4,4 e Has No Finite Planar Cover K 4,4 e Has No Finite Planar Cover Petr Hliněný Dept. of Applied Mathematics, Charles University, Malostr. nám. 25, 118 00 Praha 1, Czech republic (E-mail: hlineny@kam.ms.mff.cuni.cz) February 9, 2005

More information

Non-zero disjoint cycles in highly connected group labelled graphs

Non-zero disjoint cycles in highly connected group labelled graphs Non-zero disjoint cycles in highly connected group labelled graphs Ken-ichi Kawarabayashi Paul Wollan Abstract Let G = (V, E) be an oriented graph whose edges are labelled by the elements of a group Γ.

More information

Notes on Binary Dumbbell Trees

Notes on Binary Dumbbell Trees Notes on Binary Dumbbell Trees Michiel Smid March 23, 2012 Abstract Dumbbell trees were introduced in [1]. A detailed description of non-binary dumbbell trees appears in Chapter 11 of [3]. These notes

More information

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism CHAPTER 2 Graphs 1. Introduction to Graphs and Graph Isomorphism 1.1. The Graph Menagerie. Definition 1.1.1. A simple graph G = (V, E) consists of a set V of vertices and a set E of edges, represented

More information

arxiv:cs/ v1 [cs.ds] 20 Feb 2003

arxiv:cs/ v1 [cs.ds] 20 Feb 2003 The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems Benjamin Grimmer bdg79@cornell.edu arxiv:1508.05567v2 [cs.ds] 20 Jul 2017 Abstract We consider a variety of NP-Complete network

More information

The Online Connected Facility Location Problem

The Online Connected Facility Location Problem The Online Connected Facility Location Problem Mário César San Felice 1, David P. Willamson 2, and Orlando Lee 1 1 Unicamp, Institute of Computing, Campinas SP 13083-852, Brazil felice@ic.unicamp.br, lee@ic.unicamp.br

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

CPS 102: Discrete Mathematics. Quiz 3 Date: Wednesday November 30, Instructor: Bruce Maggs NAME: Prob # Score. Total 60

CPS 102: Discrete Mathematics. Quiz 3 Date: Wednesday November 30, Instructor: Bruce Maggs NAME: Prob # Score. Total 60 CPS 102: Discrete Mathematics Instructor: Bruce Maggs Quiz 3 Date: Wednesday November 30, 2011 NAME: Prob # Score Max Score 1 10 2 10 3 10 4 10 5 10 6 10 Total 60 1 Problem 1 [10 points] Find a minimum-cost

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

More information

Studying Graph Connectivity

Studying Graph Connectivity Studying Graph Connectivity Freeman Yufei Huang July 1, 2002 Submitted for CISC-871 Instructor: Dr. Robin Dawes Studying Graph Connectivity Freeman Yufei Huang Submitted July 1, 2002 for CISC-871 In some

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Optimization I : Brute force and Greedy strategy

Optimization I : Brute force and Greedy strategy Chapter 3 Optimization I : Brute force and Greedy strategy A generic definition of an optimization problem involves a set of constraints that defines a subset in some underlying space (like the Euclidean

More information

Pebbling on Directed Graphs

Pebbling on Directed Graphs Pebbling on Directed Graphs Gayatri Gunda E-mail: gundagay@notes.udayton.edu Dr. Aparna Higgins E-mail: Aparna.Higgins@notes.udayton.edu University of Dayton Dayton, OH 45469 Submitted January 25 th, 2004

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

Lecture 8: The Traveling Salesman Problem

Lecture 8: The Traveling Salesman Problem Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes

More information

Vertex Deletion games with Parity rules

Vertex Deletion games with Parity rules Vertex Deletion games with Parity rules Richard J. Nowakowski 1 Department of Mathematics, Dalhousie University, Halifax, Nova Scotia, Canada rjn@mathstat.dal.ca Paul Ottaway Department of Mathematics,

More information

Graph Algorithms Using Depth First Search

Graph Algorithms Using Depth First Search Graph Algorithms Using Depth First Search Analysis of Algorithms Week 8, Lecture 1 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Graph Algorithms Using Depth

More information

Graph Theory: Introduction

Graph Theory: Introduction Graph Theory: Introduction Pallab Dasgupta, Professor, Dept. of Computer Sc. and Engineering, IIT Kharagpur pallab@cse.iitkgp.ernet.in Resources Copies of slides available at: http://www.facweb.iitkgp.ernet.in/~pallab

More information

On the Strongly Connected and Biconnected Components of the Complement of Graphs

On the Strongly Connected and Biconnected Components of the Complement of Graphs Electronic Notes in Discrete Mathematics 17 (2004) 229 235 www.elsevier.com/locate/endm On the Strongly Connected and Biconnected Components of the Complement of Graphs Stavros D. Nikolopoulos 1 Leonidas

More information

7 Distributed Data Management II Caching

7 Distributed Data Management II Caching 7 Distributed Data Management II Caching In this section we will study the approach of using caching for the management of data in distributed systems. Caching always tries to keep data at the place where

More information

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7

Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7 CS 70 Discrete Mathematics and Probability Theory Fall 2013 Vazirani Note 7 An Introduction to Graphs A few centuries ago, residents of the city of Königsberg, Prussia were interested in a certain problem.

More information

On the Advice Complexity of Online Problems

On the Advice Complexity of Online Problems On the Advice Complexity of Online Problems (Extended Abstract) Hans-Joachim Böckenhauer 1, Dennis Komm 1, Rastislav Královič 2, Richard Královič 1, and Tobias Mömke 1 1 Department of Computer Science,

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Isometric Diamond Subgraphs

Isometric Diamond Subgraphs Isometric Diamond Subgraphs David Eppstein Computer Science Department, University of California, Irvine eppstein@uci.edu Abstract. We test in polynomial time whether a graph embeds in a distancepreserving

More information

On Universal Cycles of Labeled Graphs

On Universal Cycles of Labeled Graphs On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States

More information

arxiv: v2 [cs.ds] 9 Apr 2009

arxiv: v2 [cs.ds] 9 Apr 2009 Pairing Heaps with Costless Meld arxiv:09034130v2 [csds] 9 Apr 2009 Amr Elmasry Max-Planck Institut für Informatik Saarbrücken, Germany elmasry@mpi-infmpgde Abstract Improving the structure and analysis

More information

A Combined BIT and TIMESTAMP Algorithm for. the List Update Problem. Susanne Albers, Bernhard von Stengel, Ralph Werchner

A Combined BIT and TIMESTAMP Algorithm for. the List Update Problem. Susanne Albers, Bernhard von Stengel, Ralph Werchner A Combined BIT and TIMESTAMP Algorithm for the List Update Problem Susanne Albers, Bernhard von Stengel, Ralph Werchner International Computer Science Institute, 1947 Center Street, Berkeley, CA 94704,

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Figure 4.1: The evolution of a rooted tree.

Figure 4.1: The evolution of a rooted tree. 106 CHAPTER 4. INDUCTION, RECURSION AND RECURRENCES 4.6 Rooted Trees 4.6.1 The idea of a rooted tree We talked about how a tree diagram helps us visualize merge sort or other divide and conquer algorithms.

More information

Lecture 6: External Interval Tree (Part II) 3 Making the external interval tree dynamic. 3.1 Dynamizing an underflow structure

Lecture 6: External Interval Tree (Part II) 3 Making the external interval tree dynamic. 3.1 Dynamizing an underflow structure Lecture 6: External Interval Tree (Part II) Yufei Tao Division of Web Science and Technology Korea Advanced Institute of Science and Technology taoyf@cse.cuhk.edu.hk 3 Making the external interval tree

More information

An On-line Competitive Algorithm for Coloring P 8 -free Bipartite Graphs

An On-line Competitive Algorithm for Coloring P 8 -free Bipartite Graphs An On-line Competitive Algorithm for Coloring P 8 -free Bipartite Graphs Piotr Micek 1 and Veit Wiechert 2 1 Theoretical Computer Science Department, Faculty of Mathematics and Computer Science, Jagiellonian

More information

Discrete mathematics II. - Graphs

Discrete mathematics II. - Graphs Emil Vatai April 25, 2018 Basic definitions Definition of an undirected graph Definition (Undirected graph) An undirected graph or (just) a graph is a triplet G = (ϕ, E, V ), where V is the set of vertices,

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Logic: The Big Picture. Axiomatizing Arithmetic. Tautologies and Valid Arguments. Graphs and Trees

Logic: The Big Picture. Axiomatizing Arithmetic. Tautologies and Valid Arguments. Graphs and Trees Axiomatizing Arithmetic Logic: The Big Picture Suppose we restrict the domain to the natural numbers, and allow only the standard symbols of arithmetic (+,, =, >, 0, 1). Typical true formulas include:

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

2 Eulerian digraphs and oriented trees.

2 Eulerian digraphs and oriented trees. 2 Eulerian digraphs and oriented trees. A famous problem which goes back to Euler asks for what graphs G is there a closed walk which uses every edge exactly once. (There is also a version for non-closed

More information

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points MC 0 GRAPH THEORY 0// Solutions to HW # 0 points + XC points ) [CH] p.,..7. This problem introduces an important class of graphs called the hypercubes or k-cubes, Q, Q, Q, etc. I suggest that before you

More information

On k-dimensional Balanced Binary Trees*

On k-dimensional Balanced Binary Trees* journal of computer and system sciences 52, 328348 (1996) article no. 0025 On k-dimensional Balanced Binary Trees* Vijay K. Vaishnavi Department of Computer Information Systems, Georgia State University,

More information

Embedded Width, A Variation of Treewidth for Planar Graphs

Embedded Width, A Variation of Treewidth for Planar Graphs Embedded Width, A Variation of Treewidth for Planar Graphs Robert Weber Advisor: Glencora Borradaile Abstract A commonly studied property of graphs is treewidth, a measure of how tree-like a graph is.

More information

Discrete Mathematics for CS Spring 2008 David Wagner Note 13. An Introduction to Graphs

Discrete Mathematics for CS Spring 2008 David Wagner Note 13. An Introduction to Graphs CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Note 13 An Introduction to Graphs Formulating a simple, precise specification of a computational problem is often a prerequisite to writing a

More information

9 Distributed Data Management II Caching

9 Distributed Data Management II Caching 9 Distributed Data Management II Caching In this section we will study the approach of using caching for the management of data in distributed systems. Caching always tries to keep data at the place where

More information

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Pawe l Żyliński Institute of Mathematics University of Gdańsk, 8095 Gdańsk, Poland pz@math.univ.gda.pl Submitted: Sep 9, 005;

More information

Algorithm 23 works. Instead of a spanning tree, one can use routing.

Algorithm 23 works. Instead of a spanning tree, one can use routing. Chapter 5 Shared Objects 5.1 Introduction Assume that there is a common resource (e.g. a common variable or data structure), which different nodes in a network need to access from time to time. If the

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Recitation 4: Elimination algorithm, reconstituted graph, triangulation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation

More information

Exercise set 2 Solutions

Exercise set 2 Solutions Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8 An Introduction to Graphs Formulating a simple, precise specification of a computational problem is often a prerequisite

More information

FINAL EXAM SOLUTIONS

FINAL EXAM SOLUTIONS COMP/MATH 3804 Design and Analysis of Algorithms I Fall 2015 FINAL EXAM SOLUTIONS Question 1 (12%). Modify Euclid s algorithm as follows. function Newclid(a,b) if a

More information

Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft)

Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft) Lecture notes on: Maximum matching in bipartite and non-bipartite graphs (Draft) Lecturer: Uri Zwick June 5, 2013 1 The maximum matching problem Let G = (V, E) be an undirected graph. A set M E is a matching

More information

Chapter 2 Graphs. 2.1 Definition of Graphs

Chapter 2 Graphs. 2.1 Definition of Graphs Chapter 2 Graphs Abstract Graphs are discrete structures that consist of vertices and edges connecting some of these vertices. Graphs have many applications in Mathematics, Computer Science, Engineering,

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

MAT 7003 : Mathematical Foundations. (for Software Engineering) J Paul Gibson, A207.

MAT 7003 : Mathematical Foundations. (for Software Engineering) J Paul Gibson, A207. MAT 7003 : Mathematical Foundations (for Software Engineering) J Paul Gibson, A207 paul.gibson@it-sudparis.eu http://www-public.it-sudparis.eu/~gibson/teaching/mat7003/ Graphs and Trees http://www-public.it-sudparis.eu/~gibson/teaching/mat7003/l2-graphsandtrees.pdf

More information

Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games. 1 Introduction

Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games. 1 Introduction Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games Wayne Goddard School of Geological and Computer Sciences University of Natal, Durban South Africa Grzegorz Kubicki Department of Mathematics

More information

Testing Maximal 1-planarity of Graphs with a Rotation System in Linear Time

Testing Maximal 1-planarity of Graphs with a Rotation System in Linear Time Testing Maximal 1-planarity of Graphs with a Rotation System in Linear Time Peter Eades 1, Seok-Hee Hong 1, Naoki Katoh 2, Giuseppe Liotta 3, Pascal Schweitzer 4, and Yusuke Suzuki 5 1 University of Sydney,

More information

Paths. Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph.

Paths. Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph. Paths Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph. Formal Definition of a Path (Undirected) Let n be a nonnegative integer

More information

The Game Chromatic Number of Some Classes of Graphs

The Game Chromatic Number of Some Classes of Graphs The Game Chromatic Number of Some Classes of Graphs Casper Joseph Destacamento 1, Andre Dominic Rodriguez 1 and Leonor Aquino-Ruivivar 1,* 1 Mathematics Department, De La Salle University *leonorruivivar@dlsueduph

More information

Chordal Graphs: Theory and Algorithms

Chordal Graphs: Theory and Algorithms Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also

More information

Algorithms Exam TIN093/DIT600

Algorithms Exam TIN093/DIT600 Algorithms Exam TIN093/DIT600 Course: Algorithms Course code: TIN 093 (CTH), DIT 600 (GU) Date, time: 22nd October 2016, 14:00 18:00 Building: M Responsible teacher: Peter Damaschke, Tel. 5405 Examiner:

More information

Vertex-Colouring Edge-Weightings

Vertex-Colouring Edge-Weightings Vertex-Colouring Edge-Weightings L. Addario-Berry a, K. Dalal a, C. McDiarmid b, B. A. Reed a and A. Thomason c a School of Computer Science, McGill University, University St. Montreal, QC, H3A A7, Canada

More information

Minimal Equation Sets for Output Computation in Object-Oriented Models

Minimal Equation Sets for Output Computation in Object-Oriented Models Minimal Equation Sets for Output Computation in Object-Oriented Models Vincenzo Manzoni Francesco Casella Dipartimento di Elettronica e Informazione, Politecnico di Milano Piazza Leonardo da Vinci 3, 033

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs

Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs Kazuhiro Kurita 1, Kunihiro Wasa 2, Hiroki Arimura 1, and Takeaki Uno 2 1 IST, Hokkaido University, Sapporo, Japan 2 National

More information

Face Width and Graph Embeddings of face-width 2 and 3

Face Width and Graph Embeddings of face-width 2 and 3 Face Width and Graph Embeddings of face-width 2 and 3 Instructor: Robin Thomas Scribe: Amanda Pascoe 3/12/07 and 3/14/07 1 Representativity Recall the following: Definition 2. Let Σ be a surface, G a graph,

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

arxiv: v1 [math.ho] 7 Nov 2017

arxiv: v1 [math.ho] 7 Nov 2017 An Introduction to the Discharging Method HAOZE WU Davidson College 1 Introduction arxiv:1711.03004v1 [math.ho] 7 Nov 017 The discharging method is an important proof technique in structural graph theory.

More information