Math.Subj.Class.(2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A 15.
|
|
- Lindsey Bond
- 5 years ago
- Views:
Transcription
1 UNIVERSITY OF LJUBLJANA INSTITUTE OF MATHEMATICS, PHYSICS AND MECHANICS DEPARTMENT OF THEORETICAL COMPUTER SCIENCE JADRANSKA 19, LJUBLJANA, SLOVENIA Preprint series, Vol. 40 (2002), 799 GENERALIZED CORES Vladimir Batagelj, Matjaž Zaveršnik ISSN First version: November 24, 2001 Math.Subj.Class.(2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A 15. Presented at Recent Trends in Graph Theory, Algebraic Combinatorics, and Graph Algorithms; September 24 27, 2001, Bled, Slovenia, Supported by the Ministry of Education, Science and Sport of Slovenia, Project J Ljubljana, December 29, 2001
2
3 Generalized Cores Vladimir Batagelj, Matjaž Zaveršnik University of Ljubljana, FMF, Department of Mathematics, and IMFM Ljubljana, Department of TCS, Jadranska ulica 19, Ljubljana, Slovenia vladimir.batagelj@uni-lj.si matjaz.zaversnik@fmf.unilj.si Abstract Cores are, besides connectivity components, one among few concepts that provides us with efficient decompositions of large graphs and networks. In the paper a generalization of the notion of core of a graph based on vertex property function is presented. It is shown that for the local monotone vertex property functions the corresponding cores can be determined in time. Key words: generalized cores, large networks, decomposition, algorithm. Math. Subj. Class. (2000): 05 A 18, 05 C 70, 05 C 85, 05 C 90, 68 R 10, 68 W 40, 92 H 30, 93 A Cores The notion of core was introduced by Seidman in 1983 [6]. is the set of vertices and $ is the set of lines Let! #"%$'& be a simple graph. (edges or arcs). We will denote ()+*,-* and./0* $ *. A subgraph 12+!34"%$ *,35& induced by the set 376+ is a 8 -core or a core of order 8 iff 9;:=<>3@?BACEDF:G&5HI8 and 1 is a maximum subgraph with this property. The core of maximum order is also called the main core. The core number of vertex : is the highest order of a core that contains this vertex. we also often call it a core. Since the set 3 determines the corresponding core J The degree ACED;:& can be the number of neighbors in an undirected graph or in-degree, out-degree, in-degree K out-degree,... determining different types of cores. The cores have the following important properties:
4 2 L -cores 2 Figure 1: 0, 1, 2 and 3 core M The cores are nested: NPORQSUT 1-V 6W1YX M Cores are not necessarily connected subgraphs. In this paper we present a generalization of the notion of core from degrees to other properties of vertices. 2 Z -cores Let [/+! #"%$\"^] & be a network, where _`!P"%$a& is a graph and ]b?c$ed IR is a function assigning values to lines. A vertex property function on [, or a L function for short, is a function Lf:"hgi&, :j<), gb6k with real values. Examples of vertex property functions: : in graph n, and lm:"hg &ople:&uqrg, gs6k. 1. LUt:"hgi&opACEDGuv:& 2. L;wx:"hgi&o indegu :G& 3. L;yx:"hgi&o outdegu :& 4. Lz{:"hgi&o indegu :G&K outdegu :G& 5. L; x:"hgi&o~}=x ƒ E ubˆ ] :;"^ŠB&, where ]b?{$ed IR Œ 6. L; x:"hgi&opž x x ƒ E ubˆ ] :"^ŠB&, where ]b?c$ed IR 7. L :"hgi&o number of cycles of length 8 through vertex : Let lm:g& denotes the set of neighbors of vertex
5 2 L -cores 3 The subgraph 1 `!34"%$ *,35& induced by the set 3`6k is a L -core at level ã< IR iff M 9;:j< 3b?{ãš=Lf:" 3& M 3 is maximal such set. The function L is monotone iff it has the property 3\t œ 3aw\Tž9 :j<)0? Lf:;" 3\th&vš=Lf:;" 3awŸ&^& All among functions L t LB are monotone. For monotone function the L -core at level can be determined by successively deleting vertices with value of L lower than. 3I? ~ ; while : <)3b?EL :" 35&'O> do 3`? ~3W \ : ; Theorem 1 For monotone function L the above procedure determines the L -core at level. Proof: The set 3 returned by the procedure evidently has the first property from the L -core definition. Let us also show that for monotone L the result of the procedure is independent of the order of deletions. Suppose the contrary there are two different L -cores at level, determined by sets 3 and. The core 3 was produced by deleting the sequence Š#t, Š;w, Š y,..., Š ; and by the sequence :Gt, :xw, :xy,..., :{ª. Assume that «43ž. We will show that this leads to contradiction. Take any =<W «3. To show that it also can be deleted we first apply the sequence : t, : w, : y,..., : ª to get. Since R< _ 3 it appears in the sequence Š t, Š w, Š y,..., ŠB \I. Let g Œ ` and gfx# gfx±²t ³ Š;X. Then, since 9;N <W µ µ L? LfŠ X " gfx±²t¹& O, we have, by monotonicity of L, also 9;N'<e µ µ L=?L ŠBX "! ' º&»gfX¼±²t½& Op. Therefore also all ŠX <¾ ` 3 are deleted ` 3 a contradiction. Since the result of the procedure is uniquely defined and vertices outside 3 have L value lower than, the final set 3 satisfies also the second condition from the definition of L -core it is the L -core at level. À Corolary 1 For monotone function L the cores are nested t OW w T1YÁû6W1¾ÁÅÄ Proof: Follows directly from the theorem 1. Since the result is independent of the order of deletions we first determine the 1)ÁÅÄ. In the following we eventually delete some additional vertices thus producing 1 ÁÃÂ. Therefore 1 Áà6W1 ÁÅÄ. À
6 Ê 2 L -cores 4 Example of nonmonotone L function: where ]s?ó$ed Lf:;"hg &P ÇÇÆ È ÉÇÇ * le:;"hg &E* Ë x ƒ E ubˆ Consider the following L function ] :;"^ŠB& le:;"hg &P ÌxÍ%ÎCEÏ%Ð\Ñ Ò%C IR Œ on the network [/`!P"%$ "^] &,bs Ô;"¹ÕŸ"%ÖŸ"% "¹Øx"¹Ù, $ ÅÔ?cÕE&ÚÛÕ»?cÖ&ÚÅÖ»?Ó &ÚÛÕ»?ÓØŸ&ÜÛØi? ÙU& ] Ý Þ Þ We get different results depending on whether we first delete the vertex Õ or Ö (or Ø ) see Figure 2. Figure 2: Nonmonotone L function The original network is a L -core at level 2. Applying the algorithm to the network we have three choices for the first vertex to be deleted: Õ, Ö or Ø. Deleting Õ we get, after removing the isolated vertex Ô, the L -core 3 t ` ÖŸ"% "¹Øx"¹Ù at level 3. Note that the values of L in vertices Ö and Ø increased from 2 to 3.
7 3 Algorithms 5 Deleting Ö (or symmetrically Ø we analyze only the first case) we get the set 34w- Ô;"¹ÕŸ"¹Øx"¹Ù at level 2 the value at Õ increased to 2.5. In the next step we can delete either the vertex Õ, producing the set 3 y»` ŸØx"¹Ù at level 3, or the vertex Ø, producing the L -core 3 z s Ô;"¹Õ at level 4. As we see, the result of the algorithm depends on the order of deletions. The L -core at level 4 is not contained in the L -core at level 3. 3 Algorithms 3.1 Algorithm for ß -core at level à The L function is local iff Lf:"hgi&PRLf:;"%le:;"hg &^& The functions L t L from examples are local; LU is not local for 8áH>Ý. In the following we shall assume also that for the function L there exists a constant L Œ such that 9;:j<)0?hLf:;"¹ {&orl Œ For a local L function an â.~ž UÛã-"%ä ÌxDv( &^& algorithm for determining L -core at level exists (assuming that Lf:;"%le:;" 35&^& can be computed in â ÅACED;åa:&^& ). INPUT: graph ns`! #"%$'& represented by lists of neighbors and ṽ< IR OUTPUT: 3b6k, 3 is a L -core at level 1. 3b? ; 2. for : <) do Lfæ :cç? RLf:;"%le:;" 35&^& ; 3. Õ ŠNèÅ.ºN!( éøôlf:;"ålb& ; 4. while Lfæ ê LëçUO> do begin I? ~3 \ ìê LU ; 4.2. for :j<ylm ê¹l " 35& do begin Lfæ :{ç? RLf:"%lm:" 3&^& ; Š{L; ÓÔc ^Ø éøôl :"ÅLB& ; end; end; The step can often be speeded up by updating the L æ :{ç. This algorithm is straightforwardly extended to produce the hierarchy of L -cores. The hierarchy is determined by the core-number assigned to each vertex the highest level value of L -cores that contain the vertex.
8 Ê 3.2 Determining the hierarchy of L -cores Determining the hierarchy of ß -cores INPUT: graph ns`! #"%$'& represented by lists of neighbors OUTPUT: table Öhê í{ø with core number for each vertex 1. 3b? ; 2. for : <) do Lfæ :cç? RLf:;"%le:;" 35&^& ; 3. Õ ŠNèÅ.ºN!( éøôlf:;"ålb& ; 4. while în cøê Ù#Ûé;ØÔLB&aï do begin I? ~3 \ ìê LU ; 4.2. ÖhêŸí{ØÓæ ìê Lëç? elfæ ìê Lëç ; 4.3. for :j<ylm ê¹l " 35& do begin Lfæ :{ç? pž ^Lfæ ê¹lç!"ålf:"%lm:" 3&^&¹ ; Š{L; ÓÔc ^Ø éøôl :"ÅLB& ; end; end; Let us assume that ð is a maximum time needed for computing the value of Lf:"hgi&, : <>, g_6+. Then the complexity of statements is ñpt^±yò«â ( &fkkâjåð ( &fk âj(iä ÌxDP( &aiâ (¾ó Ž ²Åð "%ä ÌxDo( &^&. Let us now look at the body of the while loop. Since at each repetition of the body the size of the set 3 is decreased by 1 there are at most ( repetitions. Statements 4.1 and 4.2 can be implemented to run in constant time, thus contributing ñ zhô,t zhô w «â ( & to the loop. In all combined repetitions of the while and for loops each line is considered at most once. Therefore the body of the for loop (statements 4.3,1 and 4.3.2) is executed at most. times contributing at most ñfzhô y\k.õóåð K5âjÅä ÌxDa( &^& to the while loop. Often the value Lf:;"%le:;" 35&^& can be updated in constant time ð âj &. Summing up all the contributions we get the total time complexity of the algorithm ñ Wñ t^±y KRñ zhô,t zhô w KRñ zhô y ~â.@óžj ²Åð "%ä ÌxDo( &^&. For a local L function, for which the value of Lf:;"%le:;" 35&^& can be computed in âjåacedóå :&^& ), we have ðs â Ûãj&. The described algorithm is partially implemented in program for large networks analysis Pajek (Slovene word for Spider) for Windows (32 bit) [1]. It is freely available, for noncommercial use, at its homepage: A standalone implementation of the algorithm in C is available at For the property functions Lft L;z a quicker âj.r& core determining algorithm can be developed [4].
9 Ê 4 Example Internet Connections 7 Table 1: L -cores of the Routing Data Network at Different Levels. 8 ( 8 ( Example Internet Connections As an example of application of the proposed algorithm we applied it to the routing data on the Internet network. This network was produced from web scanning data (May 1999) available from It can be obtained also as a Pajek s NET file from It has ö Ý xøg vertices, ùxø öxù arcs (loops were removed), ã@ øg, and average degree is Þ µ Þ. The arcs have as values the number of traceroute paths which contain the arc. Using Pajek implementation of the proposed algorithm on 300 MHz PC we obtained in 3 seconds the LB -cores segmentation presented in Table 1 there are ( ú vertices with L -core number in the interval %ú ±²t "^ ìúç. The program also determined the L² -core number for every vertex. Figure 3 shows a L -core at level of the Internet network every vertex inside this core is visited by at least traceroute paths. In the figure the sizes of circles representing vertices are proportional to (the square roots of) their LU -core numbers. Since the arcs values span from 1 to they can not be displayed directly. We recoded them according to the thresholds ÊxÊxÊ arcs. ócö ú ±²t, 8 "¹ö "¹ÞaµEµEµ. These class numbers are represented by the thickness of the
10 4 Example Internet Connections 8 Figure 3: L -core of the Routing Data Network.
11 5 Conclusions 9 5 Conclusions The cores, because they can be efficiently determined, are one among few concepts that provide us with meaningful decompositions of large networks [5]. We expect that different approaches to the analysis of large networks can be built on this basis. For example, the sequence of vertices in sequential coloring can be determined by descending order of their core numbers (combined with their degrees). We obtain on this basis the following upper bound on the chromatic number of a given graph û º&ašsóK core º& Cores can also be used to localize the search for interesting subnetworks in large networks [3, 2]: M If it exists, a 8 -component is contained in a 8 -core. M If it exists, a 8 -clique is contained in a 8 -core. ü»º&aš core ¾&. Acknowledgment This work was supported by the Ministry of Education, Science and Sport of Slovenia, Project J It is a detailed version of the part of the talk presented at Recent Trends in Graph Theory, Algebraic Combinatorics, and Graph Algorithms, September 24 27, 2001, Bled, Slovenia,
12 REFERENCES 10 References [1] BATAGELJ, V. & MRVAR, A. (1998). Pajek A Program for Large Network Analysis. Connections 21 (2), [2] BATAGELJ, V. & MRVAR, A. (2000). Some Analyses of Erdős Collaboration Graph. Social Networks 22, [3] BATAGELJ, V., MRVAR, A. & ZAVERŠNIK, M. (1999). Partitioning approach to visualization of large graphs. In KRATOCHVÍL, Jan (ed.). Proceedings of 7th International Symposium on Graph Drawing, September 15-19, 1999, Štiřín Castle, Czech Republic. (Lecture notes in computer science, 1731). Berlin [etc.]: Springer, [4] BATAGELJ, V. & ZAVERŠNIK, M. (2001). An â.r& Algorithm for Cores Decomposition of Networks. Manuscript, Submitted. [5] GAREY, M. R. & JOHNSON, D. S. (1979). Computer and intractability. San Francisco: Freeman. [6] SEIDMAN, S. B. (1983). Network structure and minimum degree. Social Networks 5, [7] WASSERMAN, S. & FAUST, K. (1994). Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.
AN ALGORITHM FOR CORES DECOMPOSITION OF NETWORKS
UNIVERSITY OF LJUBLJANA INSTITUTE OF MATHEMATICS, PHYSICS AND MECHANICS DEPARTMENT OF THEORETICAL COMPUTER SCIENCE JADRANSKA 19, 1 000 LJUBLJANA, SLOVENIA Preprint series, Vol. 40 (2002), 798 AN ALGORITHM
More informationarxiv:cs/ v1 [cs.ds] 25 Oct 2003
arxiv:cs/0310049v1 [cs.ds] 25 Oct 2003 An O(m) Algorithm for Cores Decomposition of Networks Vladimir Batagelj, Matjaž Zaveršnik University of Ljubljana, FMF, Department of Mathematics, and IMFM Ljubljana,
More informationA subquadratic triad census algorithm for large sparse networks with small maximum degree
Social Networks 23 (2001) 237 243 A subquadratic triad census algorithm for large sparse networks with small maximum degree Vladimir Batagelj, Andrej Mrvar Department of Mathematics, University of Ljubljana,
More informationA subquadratic triad census algorithm for large sparse networks with small maximum degree
A subquadratic triad census algorithm for large sparse networks with small maximum degree Vladimir Batagelj and Andrej Mrvar University of Ljubljana Abstract In the paper a subquadratic (O(m), m is the
More informationFirst Steps to Network Visualization with Pajek
First Steps to Network Visualization with Pajek Vladimir Batagelj University of Ljubljana Slovenia University of Konstanz, Analysis of Political and Managerial Networks May 1, 00, 16h, room C 44 V. Batagelj:
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationOn vertex-coloring edge-weighting of graphs
Front. Math. China DOI 10.1007/s11464-009-0014-8 On vertex-coloring edge-weighting of graphs Hongliang LU 1, Xu YANG 1, Qinglin YU 1,2 1 Center for Combinatorics, Key Laboratory of Pure Mathematics and
More informationGraphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405
Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:
More informationBUCKLEY. User s Guide
BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationMath 776 Graph Theory Lecture Note 1 Basic concepts
Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 158 (2010) 771 778 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Complexity of the packing coloring problem
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More informationProperly Colored Paths and Cycles in Complete Graphs
011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More informationAdorn. Slab Serif Smooth R E G U LAR. v22622x
s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,
More information-Colorability of -free Graphs
A B C -Colorability of -free Graphs C. Hoàng J. Sawada X. Shu Abstract A polynomial time algorithm that determines for a fixed integer whether or not a -free graph can be -colored is presented in this
More informationAdorn. Serif. Smooth. v22622x
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
More informationVersion /10/2015. Type specimen. Bw STRETCH
Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a
More informationREDUCING GRAPH COLORING TO CLIQUE SEARCH
Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationPointers & Arrays. CS2023 Winter 2004
Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this
More informationOn median graphs and median grid graphs
On median graphs and median grid graphs Sandi Klavžar 1 Department of Mathematics, PEF, University of Maribor, Koroška cesta 160, 2000 Maribor, Slovenia e-mail: sandi.klavzar@uni-lj.si Riste Škrekovski
More informationComputing optimal linear layouts of trees in linear time
Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationarxiv: v1 [math.mg] 8 Aug 2008 M. Cencelj, D. Repovš and M. Skopenkov
A SHORT PROOF OF THE TWELVE POINTS THEOREM arxiv:0808.1217v1 [math.mg] 8 Aug 2008 M. Cencelj, D. Repovš and M. Skopenkov Abstract. We present a short elementary proof of the following Twelve Points Theorem:
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationA 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition
A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationPointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationPolynomial-time Algorithm for Determining the Graph Isomorphism
American Journal of Information Science and Computer Engineering Vol. 3, No. 6, 2017, pp. 71-76 http://www.aiscience.org/journal/ajisce ISSN: 2381-7488 (Print); ISSN: 2381-7496 (Online) Polynomial-time
More informationThe NP-Completeness of Some Edge-Partition Problems
The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006
More informationThe b-chromatic number of cubic graphs
The b-chromatic number of cubic graphs Marko Jakovac Faculty of Natural Sciences and Mathematics, University of Maribor Koroška 60, 000 Maribor, Slovenia marko.jakovac@uni-mb.si Sandi Klavžar Faculty of
More informationLaurent Beaudou 1, Sylvain Gravier 1, Sandi Klavžar 2,3,4, Michel
Laurent Beaudou 1, Sylvain Gravier 1, Sandi Klavžar 2,3,4, Michel Mollard 1, Matjaž Kovše 2,4, 1 Institut Fourier - ERTé Maths à Modeler, CNRS/Université Joseph Fourier, France 2 IMFM, Slovenia 3 University
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.
More information124 DISTO pro 4 / pro 4 a-1.0.0zh
0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0
More informationCharacterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs
ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha
More informationAdorn. Slab Serif BOLD. v x. user s gu ide
Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions
More informationOn competition numbers of complete multipartite graphs with partite sets of equal size. Boram PARK, Suh-Ryung KIM, and Yoshio SANO.
RIMS-1644 On competition numbers of complete multipartite graphs with partite sets of equal size By Boram PARK, Suh-Ryung KIM, and Yoshio SANO October 2008 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationColorability in Orthogonal Graph Drawing
Colorability in Orthogonal Graph Drawing Jan Štola Department of Applied Mathematics, Charles University Malostranské nám. 25, Prague, Czech Republic Jan.Stola@mff.cuni.cz Abstract. This paper studies
More informationSchmidt Process can be applied, this means that every nonzero subspace of 8 has an orthonormal basis.
8The Gram-Schmidt Process The Gram-Schmidt Process is an algorithm used to convert any basis for a subspace [ of 8 into a new orthogonal basis for [. This orthogonal basis can then be normalized, if desired,
More informationarxiv:cs/ v1 [cs.ds] 20 Feb 2003
The Traveling Salesman Problem for Cubic Graphs David Eppstein School of Information & Computer Science University of California, Irvine Irvine, CA 92697-3425, USA eppstein@ics.uci.edu arxiv:cs/0302030v1
More informationCassandra: Distributed Access Control Policies with Tunable Expressiveness
Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationMath.3336: Discrete Mathematics. Chapter 10 Graph Theory
Math.3336: Discrete Mathematics Chapter 10 Graph Theory Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall
More informationA New Game Chromatic Number
Europ. J. Combinatorics (1997) 18, 1 9 A New Game Chromatic Number G. C HEN, R. H. S CHELP AND W. E. S HREVE Consider the following two-person game on a graph G. Players I and II move alternatively to
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationOnline Scheduling for Sorting Buffers
Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102
More information[8] that this cannot happen on the projective plane (cf. also [2]) and the results of Robertson, Seymour, and Thomas [5] on linkless embeddings of gra
Apex graphs with embeddings of face-width three Bojan Mohar Department of Mathematics University of Ljubljana Jadranska 19, 61111 Ljubljana Slovenia bojan.mohar@uni-lj.si Abstract Aa apex graph is a graph
More informationMinor-monotone crossing number
Minor-monotone crossing number Drago Bokal, Gašper Fijavž, Bojan Mohar To cite this version: Drago Bokal, Gašper Fijavž, Bojan Mohar. Minor-monotone crossing number. Stefan Felsner. 2005 European Conference
More informationResponse Time Analysis of Asynchronous Real-Time Systems
Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340
More informationAlgorithmic complexity of two defence budget problems
21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationarxiv: v1 [cs.dm] 21 Dec 2015
The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey
More informationarxiv: v1 [math.co] 5 Nov 2010
Segment representation of a subclass of co-planar graphs Mathew C. Francis, Jan Kratochvíl, and Tomáš Vyskočil arxiv:1011.1332v1 [math.co] 5 Nov 2010 Department of Applied Mathematics, Charles University,
More informationOn subgraphs of Cartesian product graphs
On subgraphs of Cartesian product graphs Sandi Klavžar 1 Department of Mathematics, PEF, University of Maribor, Koroška cesta 160, 2000 Maribor, Slovenia sandi.klavzar@uni-lj.si Alenka Lipovec Department
More informationGraphs: Introduction. Ali Shokoufandeh, Department of Computer Science, Drexel University
Graphs: Introduction Ali Shokoufandeh, Department of Computer Science, Drexel University Overview of this talk Introduction: Notations and Definitions Graphs and Modeling Algorithmic Graph Theory and Combinatorial
More informationAdorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on
More informationTriangle Graphs and Simple Trapezoid Graphs
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationThe crossing number of K 1,4,n
Discrete Mathematics 308 (2008) 1634 1638 www.elsevier.com/locate/disc The crossing number of K 1,4,n Yuanqiu Huang, Tinglei Zhao Department of Mathematics, Normal University of Hunan, Changsha 410081,
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More informationHow can we lay cable at minimum cost to make every telephone reachable from every other? What is the fastest route between two given cities?
1 Introduction Graph theory is one of the most in-demand (i.e. profitable) and heavily-studied areas of applied mathematics and theoretical computer science. May graph theory questions are applied in this
More informationEuropean Journal of Combinatorics. Homotopy types of box complexes of chordal graphs
European Journal of Combinatorics 31 (2010) 861 866 Contents lists available at ScienceDirect European Journal of Combinatorics journal homepage: www.elsevier.com/locate/ejc Homotopy types of box complexes
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationSome Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks
Some Approximation Algorithms for Constructing Combinatorial Structures Fixed in Networks Jianping Li Email: jianping@ynu.edu.cn Department of Mathematics Yunnan University, P.R. China 11 / 31 8 ¹ 1 3
More informationCOLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES
Volume 2, Number 1, Pages 61 66 ISSN 1715-0868 COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES MARCIN KAMIŃSKI AND VADIM LOZIN Abstract. Vertex and edge colorability are two graph problems
More informationPreimages of Small Geometric Cycles
Preimages of Small Geometric Cycles Sally Cockburn Department of Mathematics Hamilton College, Clinton, NY scockbur@hamilton.edu Abstract A graph G is a homomorphic preimage of another graph H, or equivalently
More informationMath 778S Spectral Graph Theory Handout #2: Basic graph theory
Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible
More informationOn Universal Cycles of Labeled Graphs
On Universal Cycles of Labeled Graphs Greg Brockman Harvard University Cambridge, MA 02138 United States brockman@hcs.harvard.edu Bill Kay University of South Carolina Columbia, SC 29208 United States
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationGraph Vertex Colorability & the Hardness. Mengfei Cao COMP-150 Graph Theory Tufts University
Dec. 15 th, Presentation for Final Project Graph Vertex Colorability & the Hardness Mengfei Cao COMP-150 Graph Theory Tufts University Framework In General: Graph-2-colorability is in N Graph-3-colorability
More informationarxiv:math/ v1 [math.co] 20 Nov 2005
THE DISTANCE OF A PERMUTATION FROM A SUBGROUP OF S n arxiv:math/0550v [math.co] 20 Nov 2005 RICHARD G.E. PINCH For Bela Bollobas on his 60th birthday Abstract. We show that the problem of computing the
More informationStrengthened Brooks Theorem for digraphs of girth at least three
Strengthened Brooks Theorem for digraphs of girth at least three Ararat Harutyunyan Department of Mathematics Simon Fraser University Burnaby, B.C. V5A 1S6, Canada aha43@sfu.ca Bojan Mohar Department of
More informationMath 414 Lecture 2 Everyone have a laptop?
Math 44 Lecture 2 Everyone have a laptop? THEOREM. Let v,...,v k be k vectors in an n-dimensional space and A = [v ;...; v k ] v,..., v k independent v,..., v k span the space v,..., v k a basis v,...,
More informationarxiv: v1 [math.co] 7 Dec 2018
SEQUENTIALLY EMBEDDABLE GRAPHS JACKSON AUTRY AND CHRISTOPHER O NEILL arxiv:1812.02904v1 [math.co] 7 Dec 2018 Abstract. We call a (not necessarily planar) embedding of a graph G in the plane sequential
More informationExtremal Graph Theory. Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay.
Extremal Graph Theory Ajit A. Diwan Department of Computer Science and Engineering, I. I. T. Bombay. Email: aad@cse.iitb.ac.in Basic Question Let H be a fixed graph. What is the maximum number of edges
More informationBar k-visibility Graphs
Bar k-visibility Graphs Alice M. Dean Department of Mathematics Skidmore College adean@skidmore.edu William Evans Department of Computer Science University of British Columbia will@cs.ubc.ca Ellen Gethner
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationThe Tractability of Global Constraints
The Tractability of Global Constraints Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM-CNRS, Montpelier, France. bessiere@lirmm.fr Cork Constraint Computation Center,
More informationExpected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem
Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Frank Neumann Institut für Informatik und Praktische Mathematik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany fne@informatik.uni-kiel.de
More informationLecture 6: Graph Properties
Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content
More informationEfficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms
Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu
More informationCommunication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationA Graph-Theoretic Network Security Game
A Graph-Theoretic Network Security Game Marios Mavronicolas Vicky Papadopoulou Anna Philippou Paul Spirakis May 16, 2008 A preliminary version of this work appeared in the Proceedings of the 1st International
More informationThe packing chromatic number of infinite product graphs
The packing chromatic number of infinite product graphs Jiří Fiala a Sandi Klavžar b Bernard Lidický a a Department of Applied Mathematics and Inst. for Theoretical Computer Science (ITI), Charles University,
More informationHoneyBee User s Guide
HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is
More informationGraph Theory: Introduction
Graph Theory: Introduction Pallab Dasgupta, Professor, Dept. of Computer Sc. and Engineering, IIT Kharagpur pallab@cse.iitkgp.ernet.in Resources Copies of slides available at: http://www.facweb.iitkgp.ernet.in/~pallab
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationOn Structural Parameterizations of the Matching Cut Problem
On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,
More informationLecture Notes on GRAPH THEORY Tero Harju
Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................
More informationBetween Packable and Arbitrarily Packable Graphs: Packer Spoiler Games. 1 Introduction
Between Packable and Arbitrarily Packable Graphs: Packer Spoiler Games Wayne Goddard School of Geological and Computer Sciences University of Natal, Durban South Africa Grzegorz Kubicki Department of Mathematics
More informationCHAPTER 5. b-colouring of Line Graph and Line Graph of Central Graph
CHAPTER 5 b-colouring of Line Graph and Line Graph of Central Graph In this Chapter, the b-chromatic number of L(K 1,n ), L(C n ), L(P n ), L(K m,n ), L(K 1,n,n ), L(F 2,k ), L(B n,n ), L(P m ӨS n ), L[C(K
More informationCharacterisation of Restrained Domination Number and Chromatic Number of a Fuzzy Graph
Characterisation of Restrained Domination Number and Chromatic Number of a Fuzzy Graph 1 J.S.Sathya, 2 S.Vimala 1 Research Scholar, 2 Assistant Professor, Department of Mathematics, Mother Teresa Women
More informationDO NOT RE-DISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE
More information