Graphs with at most two trees in a forest building process
|
|
- Timothy Townsend
- 6 years ago
- Views:
Transcription
1 Grphs with t most two trees in forest uilding process rxiv: v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order, nd then only keep edges incident to vertex which is not incident to ny previous edge. The resulting forest is dependent on the ordering of the edges, nd so we cn sk, for exmple, how likely is it for the process to produce grph with k trees. We look t ll grphs which cn produce t most two trees in this process nd determine the proilities of hving either one or two trees. From this we construct infinite fmilies of grphs which re non-isomorphic ut produce the sme proilities. Introduction We consider the following forest uilding process:. Tke ll of the edges of the grph, remove them nd sort them in some order. 2. Go through the edges nd only put those edges ck in which connects to some vertex not previously seen y ny edge. From this, we must end up with forest (or grph without cycles since we cn never dd n edge tht closes cycle. As n exmple, in Figure we list ll 24 different wys to order the edges nd group them sed on the resulting forest formed. We will consider the prolem: How mny different edge orderings produce given numer, sy k, of trees in the resulting grph. Equivlently, wht is the proility tht if we tke rndom ordering of the edges, we produce forest with k trees. We will let P(G,k denote this proility. From Figure, we see tht P(G, 5 nd P(G,2 (note tht 6 6 the proilities need to sum to. This process ws implicitly used in pper of Butler et l. [2] for the complete grph, nd explicitly introduced in pper y Berikkyzy et l. [] where some sic properties were estlished nd the proilities for complete iprtite grphs were determined. We summrize these results here. Deprtment of Mthemtics, Iow Stte University, Ames, IA 500 USA {utler,hmnk,hrdtme}@istte.edu
2 e e 2 e 3 e 4 e e 2 e 3 e 4 e e 2 e 3 e 4 e e 2 e 3 e 4 (e,e 2,e 4,e 3 (e,e 2,e 3,e 4 (e,e 3,e 4,e 2 (e,e 4,e 2,e 3 (e 2,e,e 4,e 3 (e,e 3,e 2,e 4 (e 3,e,e 4,e 2 (e,e 4,e 3,e 2 (e 2,e 4,e,e 3 (e 2,e,e 3,e 4 (e 3,e 4,e,e 2 (e 4,e,e 2,e 3 (e 2,e 4,e 3,e (e 2,e 3,e,e 4 (e 3,e 4,e 2,e (e 4,e,e 3,e 2 (e 4,e 2,e,e 3 (e 2,e 3,e 4,e (e 4,e 3,e,e 2 (e 4,e 2,e 3,e (e 3,e,e 2,e 4 (e 4,e 3,e 2,e (e 3,e 2,e,e 4 (e 3,e 2,e 4,e Figure : The results from different edge orderings of the pw grph. Theorem (Butler et l. [2]. We hve P(K n,k ( n n 2k,k,k ( 2n 2 n 2 n 2k. Theorem 2 (Berikkyzy et l. []. We hve P(K s,t,k (s+t( s t k( k st ( s+t. s For smll grphs (t most 5 vertices, the proilities re given in Berikkyzy et l. []. There re few instnces where two grphs would hve the sme proilities for ll k listed, nd most of those were edge-trnsitive grphs. More generlly, the following ws oserved. Oservtion (Berikkyzy et l. []. If G is n edge-trnsitive grph with minimum degree of t lest 2 nd e is ny edge, then we hve P(G,k P(G e,k for ll k. In essence, this follows y noting tht the lst edge in n ordering is never kept, nd y symmetry every edge is the lst edge in n ordering eqully often. The gol of this note is to compute the proilities for more fmilies of grphs, nmely grphswhich cnproduce tmost two trees in theforest uilding process. Using this, we will produce infinitely mny exmples of non-isomorphic grphs G nd H where the proilities gree nd neither G or H re edge-trnsitive. 2 Grphs with t most two trees We re interested in exploring the grphs which cn produce t most two trees in the forest uilding process. Equivlently, this sttes tht there re t most two disjoint edges in the grph (disjoint in the sense tht they shre no vertex. Proposition. The only non-empty grphs without isolted vertices, which contin no pir of disjoint edges, re str grphs (K,n nd the tringle grph (K 3. Proof. If the grph is not connected, then tking one edge from two different components gives two disjoint edges. So we my ssume the grph is connected. 2
3 Ifthegrphhstwo disjoint edges, thenwecnconnect thesetogether ypth, creting pth of length t lest four. Conversely, if the grph hs pth of length t lest four, then it must contin two disjoint edges. So we cn conclude the longest pth is pth with t most three vertices. If the longest pth hs two vertices, then the grph is K 2. If the longest pth hs three vertices nd the ends of the pth re not lefs then it must e tht the ends connect nd form tringle. Since the pw grph hs two disjoint edges, this cn only hppen if the grph is K 3. Finlly, if we re not tringle nd don t hve pth of length four (nd hence no cycles, then it must e tht we re str. Proposition 2. If grph without isolted vertices hs vertex v of degree t lest five nd contins no set of three disjoint edges, then deleting v nd ll incident edges, nd removing ny isolted vertices results in either n empty grph, str, or K 3. Proof. Let v e vertex of degree t lest 5 in the grph. Suppose tht the resulting grph from deleting the vertex v nd ll incident edges, nd removing ny isolted vertices is not the empty grph, str, or K 3. Proposition sttes tht the only non-empty grphs without isolted vertices, tht contin no set of two disjoint edges, is the str grph nd K 3. Thus the resulting grph will contin t lest two disjoint edges. Cll these edges e nd e 2 ; note neither of these edges re incident to v. At most four edges incident to v re lso incident to the edges e nd e 2. Since v hs degree t lest 5, this leves t lest one edge, e 3, tht is connected to v nd not incident to e or e 2. Thus the originl grph contins set of three disjoint edges. Finlly, we oserve tht if ll the degrees re ounded nd the grph is connected, then s n gets lrge, the dimeter must lso grow which forces three disjoint edges. Puttingthislltogether, weseethtfornlrgeenough(infct, n 6theonlyconnected grphs which produce t most two trees, nd re not strs, re the following five fmilies. GS,,c The strs K,+ nd K,+c which hve leves glued together. (Glued strs. GS +,,c The strs K,+ nd K,+c which hve leves glued together nd the centers joined y n edge. (Glued strs with n edge. Pw The pw grph with leves ppended to the vertex of degree. Di The dimond grph ( four-cycle with n extr edge with leves ppended to one of the vertices of degree 2. (K 4 The complete grph on four vertices with leves ppended to one of the vertices. Note tht the first two of these correspond to Proposition 2 where the remining grph is str; nd the lst three of these correspond to Proposition 2 where the remining grph is K 3. These grphs re shown in Figure 2. 3
4 c c ( GS,,c ( GS +,,c (c Pw (d Di (e (K 4 Figure 2: The five fmilies of grphs. 3 Computing proilities for the fmilies We now turn our ttention to computing the proilities tht grph ends in one or two trees in the forest uilding process. We cn find these proilities y noting tht if there re m edges in the grph, then the proility tht we end with two trees is {rerrngements with two trees} P(G,2. m! We will focus on counting the rerrngements which produce two trees. Prticulrly, we wnt to count rerrngements where t some point n edge occurs, not t the strt, nd involves two vertices which hve not een previously seen. Sincewewillecountingrerrngements, wewillfinditusefultoknowhowtomnipulte inomil coefficients. Recll tht ( n k n! is the numer of wys to choose k elements k!(n k! (in our cse this will usully e loctions out of n n element set. There re mny inomil coefficient identities (see Grhm, Knuth, nd Ptshnik [3, Ch. 5] for good introduction; we will need to mke repeted use of the following well-known result. Proposition 3. We hve ( ( l j q +j m n j ( l+q + m+n+ ( where the sum rnges over ll vlues where the summnds re nonzero. Theorem 3. We hve the following proilities. P(GS,,c, P(GS +,,c, (+c+(+c + (++(+ 2+c+2 (+c+(+c (++( c+ Proof. Since P(GS,,c,+P(GS,,c,2, we cn focus on computing the proility of resulting in two trees. We now clim 4
5 P(GS,,c,2 + c ( ( j i (i+j!(+c i(+2+c i j! (+2+c! ( c ( j i (i+j!(+ i(+2+c i j! (+2+c! +c +2+c + +2+c. (2 This comes from the two cses, nmely where our first edge initilly comes from the top hlf (i.e., edges coming from the str K,+, nd where our first edge initilly comes from the ottom hlf (i.e., edges coming from the str K,+c. We focus on the top hlf cse, s the ottom hlf follows y n identicl rgument y interchnging the roles of nd c. Determining if we hve two trees comes down to wht hppens when we pick our first edge from the str K,+c. We look t ll wys tht this occurs y first picking edges from K,+ nd then considering wht hppens when we pick our edge from K,+c. In prticulr, we will pick j edges from the lef vertices nd i edges from the gluing vertices. We now run over ll possiilities for i nd j. For ech choice of edges we now consider ll possile ordering s follows: ( j corresponds to which of the j edges mong the were chosen. ( i corresponds to which of the i edges mong the were chosen. (i+j! indictes how mny wys to order these i+j edges (note tht these i+j edges re ll of the initil edges. ( + c i indictes how mny edges disjoint from the ones ove re ville to choose, if we wnt to crete two trees. (+2+c i j! is the numer of wys to rerrnge the remining edges. This gives ll orderings of edges possile, to get the proility we now divide y the totl numer of orderings which is (+2+c!. Note tht in the summtion we need to correct for i 0, j 0 which does not fll into the cse where the first edge is from the top. So we sutrct this term off t the end, which gives the +c term t the end. +2+c To now simplify these sums we cn repetedly pply (. So we hve the following. ( ( j i (i+j!(+c i(+2+c i j!!! j!( j! i!( i!!!(+c i (+2+c!( i! (+2+c! (i+j!(+c i(+2+c i j!!!(+c i(2+c i! (+2+c!( i! (+2+c! (i+j!(+2+c i j! i!j! ( j! 5 (i+j!(+2+c i j! i!j! ( j!(2+c i!
6 !!(+c i(2+c i! (+2+c!( i!!!(+c i(2+c i! (+2+c!( i! ( ( i+j +2+c i j i 2+c i ( +2+c 2+c!!(+c i(2+c i! (+2+c! (+2+c!( i! (2+c!!!(+c i(2+c i! ( i!(2+c!!(+c! (2+c! (2+c i! ( i!(+c! (+c i!(+c! ( ( ( 2+c i i ( ( 2+c i i (+c (2+c! +c 0 +c!(+c! ( ( ( 2+c 2+c (+c (2+c! +c +c+!(+c! ( (+c (2+c! (2+c! (+c!! (2+c! (+c+!(! (+c+(+c By similr process, the other doule sum ecomes c ( c ( j i (i+j!(+ i(+2+c i j! (+2+c! (++(+. Now replcing the doule sums y these simplified expressions we hve ( P(GS,,c,2 Finlly we note (+c+(+c P(GS,,c, P(GS,,c,2 +c ( +2+c + (++( c (+c+(+c (++(+. (+c+(+c + (++(+, estlishing the result for GS,,c. The result for P(GS +,,c,2 follows y similr rgument, the only difference eing the dditionl edge which cnnot e used in order to result in two trees. So (2 would now ecome 6
7 P(GS +,,c,2 + ( ( j i (i+j!(+c i(+2+c i j! c ( c ( j i (+2+c+! (i+j!(+ i(+2+c i j! (+2+c+! The rest of the rgument works in the sme wy s efore. Theorem 4. We hve the following proilities. P(Pw, P(Di, P((K 4, c +2+c c+. Proof. We will gin compute the proility tht there re two trees in the process. However, in these cses there re mny more possiilities to consider. To simplify the sitution, we mke the following oservtion: Every edge which is lef in the originl grph will lwys e kept in the forest uilding process. This indictes if there re multiple leves off of single vertex v, then we only need to know when the first lef ws chosen. This is ecuse, y the first lef, v will hve een seen y some edge. So we now represent the remining grphs from Figure 2, s shown in Figure 3, where corresponds to ll of the leves condensed down; nd the remining edges re leled s indicted with ech lel other thn corresponding to single edge. c d d c c d e f e f e g Pw Di (K 4 Figure 3: The remining three grphs with the leves collpsed to single edge. For ech grph, we now look t ll possile wys to strt selecting edges nd end with pir of disjoint edges. We lso find the proility of strting our selection in prticulr wy. Recll tht n edge mrked corresponds to different edges, nd so until we select tht edge, we ssume ll of them hven t een seen nd re ville for picking; fter selection y the oservtion, we cn ssume they hve ll een seen. (In other words, it is only the reltive ordering of the different types of edges tht mtter. For the pw grph, we hve the possiilities shown in Tle (the first column indictes every possile sequence of choices of edges until two trees re formed, while the second 7
8 Strt of edge orderings resulting in 2 trees Proilities of n ordering c, d, e +4 4 e, e c, d, e e e cd, ce, dc, de, ed, ec ced, cde, dce, dec, ecd, edc Tle : Proilities ssocited with Pw. column indictes the proility of ny one of those sequence of choices eing mde. If we now sum ll of these proilities together, we get P(Pw, , estlishing the result (recll tht P(Pw,+P(Pw,2. The results for the remining two grphs re estlished in the sme wy nd the corresponding proilities re given in Tles 2 nd 3. 4 Exmples of grphs with the sme proilities Using the formuls from the theorems in the preceding section, we cn now compute the proilities for lrge numer of these grphs efficiently. In prticulr, we exmined ll grphs up through five hundred vertices in these fmilies, nd discovered severl exmples of fmilies of non-isomorphic grphs which produce the sme proilities. Proposition 4. Given s,t with s dividing into 2t(t+, let r 2t(t+. Then we hve s for ll k P(GS r+3t+,s,t,k P(GS t,r+s+2t+,t,k P(GS 3t+s+,r,t,k. This immeditely follows y pplying the formuls for the proilities from Theorem 3. Proposition 5. Given t, then we hve for ll k P(GS 5t+3,t,2t,k P(GS 5t+,t+,2t+,k. This lso immeditely follows y pplying the formuls for proilities from Theorem 3. We note tht there were mny other exmples of pirs of glued str grphs which re not 8
9 Strt of edge orderings resulting in 2 trees Proilities of n ordering d, e, f +5 5 f, ce, ec, f d, e, f f, ce f, ce de, df, ed, ef, fd, fe def, dfe, edf, efd, fde, fed Tle 2: Proilities ssocited with Di. Strt of edge orderings resulting in 2 trees Proilities of n ordering e, f, g +6 6 f, ce, dg, ec, f, gd e, f, g f, dg, ce f, dg, ce ef, eg, fe, fg, ge, gf efg, egf, feg, fge, gef, gfe Tle 3: Proilities ssocited with (K 4. 9
10 Figure 4: Exmples of set of three grphs with the sme proilities from Proposition 4. In this cse s t. explined y Propositions 4 nd 5. A complete chrcteriztion of ll such pirs of glued strs remins elusive. Looking eyond glued strs, we found very few pirs of grphs with the sme proilities nd the results do not seem to fit ny ptterns. As n exmple, ll pirs of grphs from the GS +,,c fmily up through 500 vertices with the sme proilities re listed elow (it is possile tht this is complete list for this fmily. 5 Conclusion P(GS + 7,3,9,k P(GS+ 0,9,0,k P(GS + 28,5,9,k P(GS+ 26,8,8,k P(GS + 03,5,48,k P(GS+ 63,7,32,k P(GS + 95,23,53,k P(GS+ 53,66,52,k We found the proilities for ll connected grphs which cn form t most two trees in this forest uilding process. A nturl next step is to consider grphs with t most three trees. As n exmple, two pirs of grphs with t most three trees nd mtching proilities re given in Figure 5. This is suggestive tht these re the strt of n infinite fmily of such grphs, ut we hve not yet estlished this. One difficulty is tht unlike the sitution for two trees where only one proility needed to e computed (since the proilities sum to one, this requires tht two proilities e computed. References [] Zhnr Berikkyzy, Steve Butler, Jy Cummings, Kristin Heysse, Pul Horn, Ruth Luo, nd Brent Morn, A forest uilding process on simple grphs, Discrete Mthemtics 34 (208, [2] Steve Butler, Fn Chung, Jy Cummings, nd Ron Grhm, Edge flipping in the complete grph, Advnces in Applied Mthemtics 69 (205, [3] Ronld L. Grhm, Donld E. Knuth, nd Oren Ptshnik, Concrete Mthemtics, second edition, Addison-Wesley,
11 P(G, P(G, P(G, P(G, P(G, P(G, Figure 5: Two pirs of grphs with t most three trees nd producing the sme proilities.
If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationCS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig
CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of
More informationF. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.
Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationA dual of the rectangle-segmentation problem for binary matrices
A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht
More informationMTH 146 Conics Supplement
105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points
More informationCOMBINATORIAL PATTERN MATCHING
COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationSection 3.1: Sequences and Series
Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one
More informationTries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries
Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/
More informationTyping with Weird Keyboards Notes
Typing with Weird Keyords Notes Ykov Berchenko-Kogn August 25, 2012 Astrct Consider lnguge with n lphet consisting of just four letters,,,, nd. There is spelling rule tht sys tht whenever you see n next
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationZZ - Advanced Math Review 2017
ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More informationCS481: Bioinformatics Algorithms
CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in
More informationSuffix trees, suffix arrays, BWT
ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time
More informationCSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011
CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationNotes for Graph Theory
Notes for Grph Theory These re notes I wrote up for my grph theory clss in 06. They contin most of the topics typiclly found in grph theory course. There re proofs of lot of the results, ut not of everything.
More informationLily Yen and Mogens Hansen
SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst
More informationThe Complexity of Nonrepetitive Coloring
The Complexity of Nonrepetitive Coloring Dániel Mrx Institut für Informtik Humoldt-Universitt zu Berlin dmrx@informtik.hu-erlin.de Mrcus Schefer Deprtment of Computer Science DePul University mschefer@cs.depul.edu
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationCS201 Discussion 10 DRAWTREE + TRIES
CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationCompilers Spring 2013 PRACTICE Midterm Exam
Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs
More informationAlgorithm Design (5) Text Search
Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationGrade 7/8 Math Circles Geometric Arithmetic October 31, 2012
Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationUNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES
UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS COMPUTATION & LOGIC Sturdy st April 7 : to : INSTRUCTIONS TO CANDIDATES This is tke-home exercise. It will not
More informationSuffix Tries. Slides adapted from the course by Ben Langmead
Suffix Tries Slides dpted from the course y Ben Lngmed en.lngmed@gmil.com Indexing with suffixes Until now, our indexes hve een sed on extrcting sustrings from T A very different pproch is to extrct suffixes
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem
Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil
More informationCSCE 531, Spring 2017, Midterm Exam Answer Key
CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationLesson 4.4. Euler Circuits and Paths. Explore This
Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different
More information1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?
1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection
More informationIntermediate Information Structures
CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationCS 241 Week 4 Tutorial Solutions
CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it
More informationΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών
ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop
More informationINTRODUCTION TO SIMPLICIAL COMPLEXES
INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min
More informationCSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe
CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()
More informationDynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012
Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.
More information50 AMC LECTURES Lecture 2 Analytic Geometry Distance and Lines. can be calculated by the following formula:
5 AMC LECTURES Lecture Anlytic Geometry Distnce nd Lines BASIC KNOWLEDGE. Distnce formul The distnce (d) between two points P ( x, y) nd P ( x, y) cn be clculted by the following formul: d ( x y () x )
More informationThe Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center
Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org
More informationΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών. Lecture 3b Lexical Analysis Elias Athanasopoulos
ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy RecogniNon of Tokens if expressions nd relnonl opertors if è if then è then else è else relop è
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationSimplifying Algebra. Simplifying Algebra. Curriculum Ready.
Simplifying Alger Curriculum Redy www.mthletics.com This ooklet is ll out turning complex prolems into something simple. You will e le to do something like this! ( 9- # + 4 ' ) ' ( 9- + 7-) ' ' Give this
More informationMATH 2530: WORKSHEET 7. x 2 y dz dy dx =
MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl
More informationImplementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this
More information1 Quad-Edge Construction Operators
CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More informationLecture 7: Integration Techniques
Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.
More informationCompression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv
Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions
More informationthis grammar generates the following language: Because this symbol will also be used in a later step, it receives the
LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.
More informationCSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded
More informationThe Greedy Method. The Greedy Method
Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationThe Complexity of Nonrepetitive Coloring
The Complexity of Nonrepetitive Coloring Dániel Mrx Deprtment of Computer Science nd Informtion Theory Budpest University of Technology nd Econonomics Budpest H-1521, Hungry dmrx@cs.me.hu Mrcus Schefer
More informationOutline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST
Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is
More informationarxiv: v1 [math.co] 18 Sep 2015
Improvements on the density o miml -plnr grphs rxiv:509.05548v [mth.co] 8 Sep 05 János Brát MTA-ELTE Geometric nd Algeric Comintorics Reserch Group rt@cs.elte.hu nd Géz Tóth Alréd Rényi Institute o Mthemtics,
More informationSingle-Player and Two-Player Buttons & Scissors Games
Single-Plyer nd Two-Plyer Buttons & Scissors Gmes The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Burke, Kyle, et
More informationMisrepresentation of Preferences
Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationLecture 8: Graph-theoretic problems (again)
COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V
More informationInformation Retrieval and Organisation
Informtion Retrievl nd Orgnistion Suffix Trees dpted from http://www.mth.tu.c.il/~himk/seminr02/suffixtrees.ppt Dell Zhng Birkeck, University of London Trie A tree representing set of strings { } eef d
More informationIntegration. September 28, 2017
Integrtion September 8, 7 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my
More informationSOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES
SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationGreedy Algorithm. Algorithm Fall Semester
Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion
More informationCompanion Mathematica Notebook for "What is The 'Equal Weight View'?"
Compnion Mthemtic Notebook for "Wht is The 'Equl Weight View'?" Dvid Jehle & Brnden Fitelson July 9 The methods used in this notebook re specil cses of more generl decision procedure
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationAnswer Key Lesson 6: Workshop: Angles and Lines
nswer Key esson 6: tudent Guide ngles nd ines Questions 1 3 (G p. 406) 1. 120 ; 360 2. hey re the sme. 3. 360 Here re four different ptterns tht re used to mke quilts. Work with your group. se your Power
More information1.5 Extrema and the Mean Value Theorem
.5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue
More informationGeorge Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables
George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets
More informationLR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table
TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph
More informationAngles. Angles. Curriculum Ready.
ngles ngles urriculum Redy www.mthletics.com ngles mesure the mount of turn in degrees etween two lines tht meet t point. Mny gmes re sed on interpreting using ngles such s pool, snooker illirds. lck
More informationarxiv:math/ v2 [math.co] 28 Feb 2006
Chord Digrms nd Guss Codes for Grphs rxiv:mth/0508269v2 [mth.co] 28 Feb 2006 Thoms Fleming Deprtment of Mthemtics University of Cliforni, Sn Diego L Joll, C 92093-0112 tfleming@mth.ucsd.edu bstrct lke
More informationSummer Review Packet For Algebra 2 CP/Honors
Summer Review Pcket For Alger CP/Honors Nme Current Course Mth Techer Introduction Alger uilds on topics studied from oth Alger nd Geometr. Certin topics re sufficientl involved tht the cll for some review
More informationcisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:
cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles
More informationLexical Analysis: Constructing a Scanner from Regular Expressions
Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More information10.2 Graph Terminology and Special Types of Graphs
10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the
More informationIntegration. October 25, 2016
Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve
More informationThe dictionary model allows several consecutive symbols, called phrases
A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion
More information