Graph Searching & Perfect Graphs

Size: px
Start display at page:

Download "Graph Searching & Perfect Graphs"

Transcription

1 Grph Serhing & Perfet Grphs Lll Moutdid University of Toronto Astrt Perfet grphs, y definition, hve nie struture, tht grph serhing seems to extrt in, often non-inexpensive, mnner. We srth the surfe of this elegnt reserh re y giving two exmples: Lexiogrphi Bredth Serh on Chordl Grphs, nd Lexiogrphi Depth First Serh on Coomprility grphs. 1 Introdution Here s one prtiulr wy to ope with NP-hrdness: Suppose we know some struture out the ojet we re deling with, n we exploit sid struture to ome up with simple (hmm...?), effiient lgorithms to NP-hrd prolems. One exmple of this struture is the intervl representtion most people re fmilir with, where in suh setting we were le to solve the independent set prolem in liner time, wheres the independent set prolem on ritrry grphs nnot even e pproximted in polynomil time to onstnt ftor (unless P = NP). Before we delve into the topi, let s rell some definitions. Let G(V, E) e finite nd simple (no loops nd no multiple edges) grph: The neighourhood of vertex v is the set of verties djent to v. We write N(v) = {u uv E}. The losed neighourhood of v is N[v] = N(v) {v}. The omplement of G, denoted G(V, E) is the grph on the sme set of verties s G, where for ll u, v V, uv E uv / E. A indued sugrph of G is grph G (V, E ) where V V nd u, v V, uv E uv E. A yle C k = v 1, v 2,..., v k in G is n indued sugrph where for i [k], v i v i+1 edges present in C k. mod k re the only A lique is set S V where u, v S, uv E. The lique numer of G, denoted ω(g), is the size of the lrgest lique in G. An independent set is set S V where u, v S, uv / E. The independent set numer of G, denoted α(g), is the size of the lrgest independent set in G. These notes re of guest leture I gve for the Advned Algorithm Design ourse. 1

2 A proper olouring is funtion ol : V {1, 2,..., k} tht ssigns vlues i [k] suh tht uv E, ol(u) ol(v). The hromti numer of G, denoted χ(g), is the minimum numer of olours needed to properly olour G. A lique over of G, is prtioning P 1, P 2,..., P k of the verties of V where P i is lique. k i=1 P i = V nd i [k], The minimum lique numer of G, denoted κ(g), is the minimum numer of liques needed to over G. A hole is n odd yle on 5 or more verties. An ntihole is the omplement of hole. A grph G is omplete if G is lique. A vertex v V is simpliil if N(v) indues lique. A seprtor of grph G is suset of verties S V whose removl from G disonnets the grph into two or more onneted omponents. An -seprtor is seprtor of G tht disonnets from. A -seprtor S is miniml if no proper suset of S lso seprtes from. Some (ovious) remrks: The omplement of lique is n independent set nd vie vers. The lique numer of grph is lwys lower ound to its hromti numer; nd the lique over numer is lwys n upper ound to the indpendent set numer. To illustrte the definitions ove, onsider the grph elow: d χ(g) = ω(g) = 3 α(g) = κ(g) = 2 The sugrph H(V, E ) where V = {,, } nd E = {, } is not n indued sugrph of G, sine the edge / E. The set S = {,, } is lique in G, S = {,, d} is not. The set {, d} is n independent set, {, d, } is not. A proper olouring of G would e ol() = ol(d) = 1, ol() = 2, ol() = 3, therefore χ(g) 3. Sine ω(g) χ(g) nd ω(g) = 3, it follows χ(g) = 3 is optiml. Perfet Grphs: A grph fmily tht reeived signifint ttention euse of its nie struture is the lss of perfet grphs. Definition 1. A grph G(V, E) is perfet if for every indued sugrph H of G: χ(h) = ω(h) Perfet grphs were introdued y Clude Berge in the sixties, nd hve sine een well studied. In ft, mny NP-hrd prolems n e solved effiiently on perfet grphs using the ellipsoids method, however reserh is still eing developed to ome up with truly omintoril lgorithms. 2

3 Mny grph fmilies elong to the lss of perfet grphs; intervl grphs for instne, permuttion grphs - whih you my hve seen in the longest susequene prolem. We will fous on different grph lss, known s hordl grphs. First, we list two min theorems regrding perfet grphs. Theorem 1 (The Wek Perfet Grph Theorem). A grph is perfet if nd only if its omplement is perfet. Theorem 2 (The Strong Perfet Grph Theorem). A grph is perfet if nd only if it does not ontin n indued hole or n indued ntihole. Grph Serhing: Definition 2. Grph serhing is mehnism to trverse the grph one vertex t time in speifi mnner. Clssil grph serhes you ve seen efore re BFS nd DFS. In the reminder of this leture, we will look t two exmples of two grph serhes pplied on different grph lsses. Setion 2 fouses on Lexiogrphi Bredth First Serh nd Chordl grphs. Setion 3 fouses on Lexiogrphi Depth First Serh nd Coomprility grphs. 2 Lexiogrphi Bredth First Serh & Chordl Grphs 2.1 Chordl Grphs Definition 3. A grph G(V, E) is hordl if the lrgest indued yle in G is tringle. Chordl grphs re sometimes referred to s tringulted grphs s well. Convine yourself tht hordlity is hereditry property. This mens if G is hordl, so is every indued sugrph of G. Theorem 3. Chordl grphs re perfet. Proof. By the Strong Perfet Grph Theorem, it suffies to show tht if G hs no hole or ntihole. It is esy to see tht G hs no holes sine the lrgest yle is tringle. Suppose G ontins n ntihole C. Let C e the omplement of C in G. C is n odd yle with 5 or more verties. Notie first tht the omplement of C 5 is C 5 nd thus C C 5 sine G is hordl. Any other odd yle C k 7 in G must hve two edges, d where nd re oth not djent to nd d. In C, d forms C 4, therey ontrditing G eing hordl. Theorem 4. Every miniml seprtor of hordl grph is lique. Proof. Let G(V, E) e hordl grph. If G is omplete, then lim lerly holds. Suppose G is not omplete. Let S e miniml seprtor of G. Suppose S is not lique. This mens there exists two verties u, v S suh tht uv / E. Sine S is seprtor, G\S hs two or more onneted omponents. Let C 1, C 2 e two of these onneted omponents. Sine u S, there must exist two verties C 1, C 2 suh tht u elongs to n, pth, for otherwise S\{u} is smller seprtor thn S ( ontrdition to the minimlity of S). Similrly, there must exist two verties C 1, d C 2 suh tht v elongs to, d pth. Sine, C 1, let P 1 e n indued, pth in C 1 (onvine yourself suh pth must exist), nd let P 2 e n indued d, pth in C 2. Consider the sugrph indued y P 1, P 2, u nd v. This sugrph is yle of length t lest 4 (when =, = d, we hve C 4 =, u,, v). A ontrdition gin to G eing hordl. Therefore uv E nd S is lique. 3

4 Theorem 5. If G is hordl, then either G is omplete or G hs t lest two non-djent simpliil verties. Proof. The proof is y indution on the size of the grph, i.e. the numer of verties. If V = 1, then G is lerly omplete. Suppose V > 1 nd G is not omplete, then G hs miniml seprtor S. By Thereom 4, S is lique. Let C 1, C 2 e two onneted omponents of G\S. Consider the sugrph G 1 = C 1 S of G, sine hordlity is hereditry property, G 1 is hordl nd y indution hypothesis, G 1 is either omplete or hs t lest two non-djent simpliil verties. Either wy G 1 hs simpliil vertex tht remins simpliil in G (why?). Similrly G 2 = C 2 S is hordl nd hs t lest one simpliil vertex tht remins simpliil in G. Therefore G hs two non-djent simpliil verties. Corollry 1. G is hordl iff every indued sugrph of G hs simpliil vertex. Proof. left s n exerise. 2.2 Perfet Elimintion Orders Given grph G(V, E), nd totl ordering σ = v 1,..., v n of V. Let N (v i ) denote the neighours of v i tht pper to the left of v i in σ. Define N + (v i ) nlogously. N (v i ) = {v j : v j v i E nd j < i} N + (v i ) = {v j : v j v i E nd i < j} For two verties v i, v j suh tht i < j, we write v i σ v j to denote tht v i is the left of v j in σ. We drop the susript if σ is ler in the ontext, nd write v i v j. Definition 4. A vertex ordering σ = v 1, v 2,..., v n is perfet elimintion order - or PEO - if for ll i [n], v i is simpliil to the left in σ, i.e. N (v i ) is lique. σ =, e,, d,, f d e f Figure 1: Exmple of PEO ordering on grph G Surprisingly, one n use PEO to hrterize hordl grphs. Theorem 6. G is hordl if nd only if G hs perfet elimintion order. Proof. Suppose G hs PEO σ ut is not hordl. Let C e n indued yle in G on 4 or more verties. Let w e the vertex of C tht ppers lst in σ. Then w must hve t lest two predeessors in σ (nmely its neighours in C), ll them u, v. Then u, v σ w nd uv / E. A ontrdition to w eing simpliil to the left in σ. 4

5 Conversely, let G e hordl grph. By Theorem 5, G hs simpliil vertex. Cll it v n. Sine hordlity is hereditry property, G v n is lso hordl. An indution on the size of G now onludes the proof. In prtiulr, let σ = v 1, v 2,..., v n 1 e PEO of G v n, then σ = σ v n 1 is PEO of G sine v n is simpliil in G. Applitions: One of the min prolems in struturl grph theory is grph reognition: Given lss of grphs G tht stisfies some sort of struture, nd grph G, is it esy/hrd to hek if G G? Sine PEOs fully hrterize hordl grphs (Theorem 6), hordl grph reognition redues to omputing PEO (or t lest one wy to reognize this grph fmily would e to ompute PEO). Before looking t the omplexity of omputing suh orderings, let s see wht else we n use them for. Consider the following lgorithm: Algorithm 1 GreedyCOL Input: An ritrry grph G(V, E) nd n ordering σ of V. Output: A proper olouring of the verties of G. 1: for i = 1... n do 2: ssign v i the smllest olour not used mong N (v i ). 3: end for Running GreedyCOL on the ordering elow produes 3-olouring where 2-olouring exists. It s in ft esy to onstrut grphs where this lgorithm ehves ritrrily d. Surprisingly, if GreedyCOL is given good ordering, it produes n optiml olouring for ertin grph fmilies, hordl eing one of them, s shown in Theorem 7 elow. σ d ol( ) Theorem 7. If σ is PEO, lgorithm GreedyCOL gives n optiml olouring. Proof. Consider vertex v i in σ. Sine v i hs N (v i ) left neighours, t lest one of the olours 1,..., N (v i ) + 1 is not used mong N (v i ). Therefore the mximum numer of olours used y GreedyCOL is mx N (v i ) + 1. Let v i e the vertex tht hieves mx i N (v i ) + 1 = N (vi ) + 1. We therefore hve χ(g) N (v i ) + 1 (1) i Sine σ is PEO, v i is simpliil to its left in σ nd so N (vi ) forms lique, nd thus ω(g) N (v i ) + 1 (2) We know tht Comining (1), (2), nd (3) we get ω(g) χ(g) (3) χ(g) N (v i ) + 1 ω(g) χ(g) χ(g) = ω(g) = N (v i ) The ontention of σ nd v n 5

6 Therefore lgorithm GreedyCOL produes n optiml olouring on G. Corollry 2. Algorithm GreedyCOL n e tweked to ompute mximum lique on G if σ is PEO. Proof. The proof follows from perfetion. Exerise: Prove tht the following lgorithm omputes mximum independent set if G is hordl nd σ PEO. Algorithm 2 GreedyIS Input: An ritrry grph G(V, E) nd n ordering σ of V. Output: An independent set S 1: S = 2: for i = n... 1 do Notie we re snning σ in reverse order. 3: Add v i to S if none of its neighours pper in S lredy. 4: end for The question remins then: How do we ome up with PEO? Is it NP-hrd to ompute suh n ordering? No! In ft there is simple elegnt lgorithm to ompute suh n ordering in *drum roll* liner time *drum roll*! 2.3 Lexiogrphi Bredth First Serh Lexiogrphi redth first serh (LexBFS) is vrint of BFS, tht ssigns lexiogrphi lels to verties, nd uses sid lels to rek ny ties tht might our. Consider the grph elow for instne. e d σ =, d,,, e π =, d,,, e σ is BFS, verties,, d tied. π is LexBFS, verties nd d re not tied ny more. Figure 2: BFS vs. LexBFS LexBFS would modify BFS to visit verties with stronger previous pull first. In the exmple ove for instne, one, d were visited, we hve N () N (), nd thus we re fored to visit efore euse vertex is pulled y d. This ondition lone - on the size of left neighourhoods - does not tully hrterize LexBFS. In ddition to left neighourhoods, LexBFS tkes into ount the ordering of the verties in σ. In prtiulr, every LexBFS is first BFS, nd thus must respet the redth first ondition efore heking the size of left neighourhoods. Algorithm 3 elow formlly desries this grph serh. 6

7 Algorithm 3 LexBFS Input: A grph G(V, E) nd strt vertex s Output: An ordering σ of V 1: ssign the lel ɛ to ll verties, nd lel(s) {n + 1} 2: for i 1 to n do 3: pik n unnumered vertex v with lexiogrphilly lrgest lel 4: σ(i) v v is ssigned the numer i 5: foreh unnumered vertex w djent to v do 6: ppend(n i) to lel(w) 7: end for 8: end for e d f σ(i) Affeted Verties σ σ(1) = d lel() = lel() = lel(f) = d 5 σ(2) = lel() = 54 nd lel() = 4 d, σ(3) = lel() = 43 nd lel(e) = 3 d,, σ(4) = f lel(e) = 32 d,,, f σ(5) = d,,, f, σ(6) = e d,,, f,, e Figure 3: A step y step omputtion of LexBFS ordering on G strting t vertex d. LexBFS ws introdued y Rose, Trjn nd Lueker [6] to reognize hordl grphs. proved the following theorem: Theorem 8. Let G(V, E) e hordl grph, then LexFS(G) is PEO. In prtiulr they In order to prove Theorem 8, we use the following hrteriztion of LexBFS orderings given y Drgn, Flk nd Brndstädt [3]: Theorem 9. [The LexBFS 4 Point Condition] Let G(V, E) e n ritrry grph, nd σ n ordering of V. σ is LexBFS ordering if nd only if for every triple, if E, / E, then there exists vertex d suh tht d nd d E, d / E. The triple s defined ove is lled d (needy? :) LexBFS triple, nd vertex d privte neighour of with respet to. It is esy to see tht suh vertex d must exist nd e neighour of sine σ is BFS. The ft tht d / E, ensures tht must indeed e pulled first efore, despite the pull of on. Intuitively, this just ptures the lexiogrphi vrint. d Figure 4: The LexBFS 4 Point Condition Using the LexBFS 4 Point Condition, it is now esy to prove Theorem 8. 7

8 Proof of Theorem 8. Let G e hordl grph, nd σ = LexBFS(G). Suppose σ is not PEO. Choose vertex x to e the left most (the first) vertex in σ where N (x) is not simpliil. In prtiulr, let y, z x e two neighours of x suh tht yz / E. Without loss of generlity, suppose z y. By Theorem 9, there must exist vertex w suh tht w z nd wy E, wx / E. If wz E, the qudruple wzyx forms C 4, ontrdition to G eing hordl. Therefore wz / E, in whih se w z y forms needy/d LexBFS triple. Agin y Theorem 9, there must exist privte neighour q of z with respet to y, nd q w. Using the hordlity of G, it is esy to see tht qw / E, thus reting yet nother d triple. We repet the sme rgument over nd over gin, therey ontrditing the finiteness of G. Therefore x is simpliil, nd σ PEO. In the reminder of this setion, we riefly disuss one wy to implement LexBFS in liner time. 2.4 Prtition Refinement Definition 5. Let S = {u 1, u 2,..., u k } e set of elements. A olletion P = {P 1, P 2,..., P k } is prtition of S if for ll i j [k], P i P j = nd k i=1 P i = S. The P i s re lled prtition lsses. Definition 6. Given set S, prtition P = {P 1,..., P k } of S, nd suset T S, we sy tht T refines P if i [k], P i is repled with su-prtitions A i, B i in this order, where A i = P i T, B i = P i \T. This is known s prtition refinement, where T is used to refine the prtitions of S. One elegnt nd effiient wy to implement LexBFS in liner time for ritrry grphs (liner in the size of the grph, so O(m + n) time where m = E, n = V ) is y mens of prtition refinement [4]. The set S is V, nd T is the neighourhood of vertex p, lled pivot. The lgorithm goes s follows: Initilly σ is empty. We strt y letting P = {P 1 = V }. We hoose n ritrry strt vertex s V s pivot, nd use N(s) to refine P. We ppend s to σ. Initilly, we reple V with A 1 = V N(s), B 1 = V \N(s). The new prtition now looks like P = {A 1, B 1 }. Every time pivot p is seleted to refine, it is ppended to the ordering. In generl, given prtition P = {P 1, P 2,..., P k }, nd pivot p, we use N(p) to refine P y reting the following new prtition {P 1 N(p), P 1 \N(p), P 2 N(p), P 2 \N(p),..., P i N(p), P i \N(p),..., P k N(p), P k \N(p)}, while mintining the order of the prtition lsses, nd ppend p to σ. A vertex is eligile to e pivot if nd only if it elongs to the first prtition lss. The lgorithm stops when ll the prtition lsses re either empty or ontin single vertex. Exmple: Consider the grph in Figure 3, we will use prtition refinement to produe the sme LexBFS ordering in the tle of the sme figure. Initilly we strt with one prtition lss, V = {,,, d, e, f}. We hoose n ritrry strt vertex, d nd refine s follows: P 1 = V N(d) = {,, f} P 2 = V \N(d) = {, e} σ = d so fr. Verties in P 1 re ll eligile to e pivots, we hoose vertex s the next pivot nd refine 8

9 P = {P 1, P 2 } s follows: P 1 N() = {} P 1 \N() = {f} P 2 N() = {} P 2 \N() = {e} σ = d,. The new prtition now is P = {{}, {f}, {}, {e}} in this order. Sine ll the prtition lsses re singletons, the refinement is done, nd σ is d,,, f,, e, the sme LexBFS ordering produed in Figure 3. Try to onvine yourself (prove) tht every ordering produed y this refinement is indeed LexBFS ordering of n (ritrry) grph, in prtiulr notie the prllelism of mintining the ordering of the prtition lsses nd ppending lexiogrphi lels. 3 Lexiogrphi Depth First Serh & Coomprility Grphs Next, we ll look t nother exmple of different grph serh used on different grph lss. 3.1 Coomprility Grphs Coomprility grphs re lrge, well studied, grph fmily. It stritly ontins numer of grph lsses inluding intervl grphs nd permuttion grphs. In ft, lssil hrteriztion of intervl grph is the following: Theorem 10. A grph G(V, E) is n intervl grph if nd only if G is hordl nd oomprility. Coomprility grphs re the omplement of omprility grphs. A grph G(V, E) is omprility grph if its edge set dmits trnsitive orienttion. Tht is, there is wy to orient (single diretion) the edges in E, suh tht for every triple,, oriented,, there must exist n edge oriented. Coomprility grphs re perfet, nd thus y the Wek Perfet Grph Theorem, so re omprility grphs. Figure 5 elow gives n exmple of omprility nd non-omprility grph. Convine yourself tht the grph on the left is indeed omprility grph, y oming up with trnsitive orienttion of the its edges; wheres the grph on the right is not. d d e e Figure 5: A omprility grph (to the left) nd non-omprility grph (to the right). Coomprility grphs n e hrterized y oomprility orderings, lso known s umrell-free orderings. In prtiulr, grph G(V, E) is oomprility grph if nd only if there exists n ordering σ of V suh tht for every triple σ σ, if E then either E or E or oth. It is esy to see tht umrell free orderings re preisely trnsitive orienttions of the omprility grph. 9

10 Side note: There is lose reltionship etween oomprility/omprility grphs nd prtilly ordered sets. A prtilly ordered set, or poset, P (V, ) is n irreflexive, ntisymmetri nd trnsitive reltion on the set V. In prtiulr, two elements, V re omprle if or, otherwise they re inomprle, we write. euse of trnsitivity, if three elements re omprle, then. This is preisely wht trnsitive orienttion is on omprility grph. In ft, if G(V, E) is omprility grph, then G together with trnsitive orienttion of E n equivlently e represented y poset P (V, ) where E if nd only if nd re omprle in P. And thus umrell-free orderings n too e represented y posets. This equivlene gives nother wy to solve prolems for these grph fmilies. For more on posets nd order theory in generl, hek Tom Trotter s ourse [leture 13 nd eyond]. The Wiki pge is good strt too. 3.2 Lexiogrphi Depth First Serh One n extend DFS to lexiogrphi version s well, known s lexiogrphi depth first serh. LexDFS (for short) ws introdued in [2], nd hs sine led to numer of effiient lgorithms, espeilly on oomprility grphs. We egin y looking t properties of this grph serh, then give n exmple of its use; nmely ertifying lgorithm to ompute mximum independent set (MIS) on oomprility grphs. Formlly, LexDFS ssigns lels to verties s they re eing proessed, ties re roken using the lels, where verties with the highest lel re hosen first. A similr ide to wht LexBFS does, ut s we will see, the leling tkes into ount the depth spet of the serh s well. Algorithm 4 elow is forml desription of this proess. Algorithm 4 LexDFS Input: A grph G(V, E) nd strt vertex s Output: An ordering σ of V 1: ssign the lel ɛ to ll verties, nd lel(s) {0} 2: for i 1 to n do 3: pik n unnumered vertex v with lexiogrphilly lrgest lel 4: σ(i) v v is ssigned the numer i 5: foreh unnumered vertex w djent to v do 6: prepend i to lel(w) 7: end for 8: end for Running the lgorithm on the grph in Figure 2, gives the following ordering LexDFS(G) = σ =,,, e, d. (4) Notie in prtiulr how we re fored to visit vertex e efore vertex d. LexDFS n too e hrterized y 4 Point Condition, given y [2], whih sys: Theorem 11. [The LexDFS 4 Point Condition] Let G(V, E) e n ritrry grph, nd σ n ordering of V. σ is LexDFS ordering if nd only if for every triple, if E, / E, then there exists vertex d suh tht d nd d E, d / E. Vertex d is privte neighour of with respet to. Intuitively, the theorem shows tht despite vertex hving pull from vertex tht does not hve, sine σ is LexDFS, there must exist vertex lter (deeper?) in the ordering tht pulled first. This vertex is d. The forml proof of the sttement of the theorem is left s n exerise. 10

11 d Figure 6: The LexDFS 4 Point Condition Unfortuntely LexDFS nnot e implemented in liner time - yet - for ritrry grphs; prtition refinement is indeed one wy to do so, ut it requires the reshuffling/sorting of the prtitions, nd this sorting is the ottlenek to liner time lgorithm. However, linerity is hieved for speifi grph fmilies, oomprility eing one of them [5]. Multi-Sweep Algorithms: For the purpose of this (MIS) prolem, we need to introdue wht we ll multi-sweep lgorithms. These re lgorithms tht ompute sequene of orderings 2 σ 1, σ 2,... where σ i is used to ompute σ i+1. This mens, tht if there re dditionl ties etween verties when omputing σ i+1, the lgorithm uses σ i to rek them using some speifi rule. We will fous on the so lled + rule; where ties re roken y hoosing the right most vertex in σ i. Formlly, we write τ =LexDFS + (G, σ), where σ is some ordering of G, nd τ is LexDFS ordering of G tht uses σ to rek ties y lwys hoosing the right most vertex in σ. Consider for instne, the grph in Figure 2. Let σ =,,, e, d e the ordering omputed erlier in (4). A LexDFS + (G, σ) of G is the unique ordering τ = d,,,, e: vertex d ws hosen first euse it ws the right most vertex in σ, ws seond euse it ws the right most eligile vertex in σ, et. One nie property of + sweeps is the preservtion of umrell-free orderings; this mens: Theorem 12. Let G(V, E) e oomprility grph, nd σ n ritrry umrell-free ordering. The ordering τ =LexDFS + (G, σ) is n umrell-free ordering. We ll τ LexDFS umrell-free ordering. For proof of this result, see [1]. umrell-free orderings. In ft, the uthors hrterize ll the grph serhes tht preserve Comining Theorems 11 nd 12, one n dedue the LexDFS C 4 property of oomprility grphs (Figure 7). Let τ e n umrell-free ordering. Let e d triple in τ. This mens τ τ, where E, / E. Sine τ is n umrell-free ordering, it follows tht E. Sine is d LexDFS triple, there must exist privte neighour d of with respet to, suh tht τ d τ nd d E, d / E. The edge d E is now fored, for otherwise, we would hve τ d τ nd E nd oth d, d / E. A ontrdition to τ eing umrell-free. τ: d Figure 7: The LexDFS C 4 Property of oomprility grphs. 3.3 Mximum Independent Set on Coomprility Grphs We now present ertifying lgorithm to ompute mximum independent set (MIS) on oomprility grphs. A ertifying lgorithm is n lgorithm tht, long with solution, produes ertifite to hek if sid solution is indeed optiml. First, let s ome up with nturl ertifite for this prolem. 2 Either LexBFS, LexDFS or ny other type of orderings 11

12 We note tht omputing mximum independent set on oomprility grphs is equivlent to omputing mximum lique in the orresponding omprility grph. Sine oth grph fmilies re perfet, the lique numer is the hromti numer in the omprility grph. So one wy to ertify mximlity of the lique is to give proper olouring tht mthes the size of the lique. Let s look t the following exmple. Let G(V, E) e omprility grph, nd H(V, E ) = G the omplement of G. d d e f e f Figure 8: G omprility grph on the left, nd H the omplement of G on the right The grph in Figure 8 is omprility grph, s witnessed y the following trnsitive order τ =,, f,, e, d. Sine the lrgest lique in G is of size 3, nmely {,, d}, it follows tht the hromti numer of G, χ(g) = 3, nd proper olouring is given y the oloured verties ove. Every olour lss (the set of verties tht reeived the sme olour) forms n independent set in G. Therefore the olour lsses of G form liques in H. In ft, they form lique over of H. Sine χ(g) is minimum, the numer of olour lsses in minimum nd thus the lique over in H is minimum. We thus hve: χ(g) = ω(g) α(h) = κ(h) The lique over numer for ny grph is lwys n upper ound on the independent set - sine one n ollet t most one vertex from eh lique to ple in the independent set, nd these olleted verties re not neessrily pirwise independent. Therefore one wy to ertify the optimlity of the MIS lgorithm is to produe n independent set nd lique over of equl size. We n do this euse oomprility grphs re perfet. This is preisely wht we will do. Algorithm 5 Mximum Independent Set in Coomprility Grphs Input: A oomprility grph G(V, E) nd n umrell-free ordering σ. Output: An independent set S of G. 1: τ = LexDFS + (G, σ) 2: Sn τ right to left nd greedily dd verties to S tht do not lredy hve neighours in S. Rell tht greedy olletion of n independent set is the proess of snning the ordering -in this se right to left- nd pling vertex in S s long s none of its neighours re lredy in S. We illustrte Algorithm 5 on the grph H in Figure 8 (redrwn differently) elow (Figure 9). Notie (or hek for yourself) tht σ is indeed n umrell-free ordering, ut not LexDFS ordering (doesn t need to e) - in prtiulr σ σ f is d LexDFS triple. The lgorithm egins y pling (right most in τ) in S, this removes f nd, the right most ville vertex in τ is. Thus S, this removes e, then the right most eligile vertex is d. Thus S = {,, d}. 12

13 f e d σ =,, f,, e, d τ = LexDFS + (H, σ) = d, e,,, f, S = {,, d} Figure 9: An illustrtion of the lgorithm. Theorem 13. Algorithm 5 produes mximum independent set of G. Proof. Let τ = u 1, u 2,..., u n, nd let S = v 1, v 2,..., v k e the verties in the independent set where v k τ v k 1 τ... τ v 2 τ v 1 = u n. For every i [k], let T i e the set of verties in τ from v i (inluded) up to ut not inluding v i+1 ; T i = {u j v i+1 τ u j τ v i } {v i }. Clerly S is n independent set. Insted of proving the optimlity of the S, i.e. tht it is of mximum size, we ll produe lique over of equl rdinlity. In prtiulr, we lim tht for ny v i S, T i forms lique. If this is true, then eh v i elongs to lique in G, the T i s form lique over, nd thus S = κ(g). Therey ompleting the proof. Suppose there exists vertex v i suh T i is not lique. Let, T i e two verties suh tht τ τ v i nd / E. Notie tht v i is different thn oth nd, otherwise we ontrdit the hoie of v i+1. This triple v i forms d LexDFS triple in τ where / E, v i, v i E. By the LexDFS 4 Point Condition, there must exist vertex d suh tht τ d τ nd d E, dv i / E. However τ d nd dv i / E ontrdits the onstrution of T i nd thus the hoie of v i+1. Therefore E nd T i is lique. An lgorithm from the ook. A proof from the ook. :) To go k to the exmple in Figure 9, the lique over we get is {, f}, {,, e}, {d}. For the urious mind: Multi-sweep lgorithms hve led to numer of elegnt results in lgorithmi nd struturl grph theory. Below is list of some other prolems solved using grph serhing on vrious grph lsses - emil me for referenes. Grph reognition for numer of grph fmilies. Colouring, independent set, lique, lique over. Longest pth, Hmilton pth, nd minimum pth over (this ltter is n generliztion of the Hmilton pth prolem: Wht is the minimum numer (k) of pths neessry to over ll verties in G? For k = 1, we hve Hmilton pth.) Weighted Hmilton pth, i.e. TSP pth version, on proper intervl grphs. Mximum mthing in liner time. Domintion - vrious type of domintion prolems. One exmple is the dominting pir prolem: Given grph G(V, E), does there exist pir u, v V, suh tht every uv pth domintes G? A pth P domintes grph, if every vertex in G is either on P or hs neighour on P. Miniml/minimum tringultions: Given n ritrry grph G(V, E), wht is the minimum numer of edges one n dd to turn G into hordl grph? 13

14 Referenes [1] Derek G Corneil, Jérémie Dusrt, Mihel Hi, nd Ekkehrd Kohler. On the power of grph serhing for oomprility grphs. SIAM Journl on Disrete Mthemtis, 30(1): , [2] Derek G Corneil nd Rihrd M Krueger. A unified view of grph serhing. SIAM Journl on Disrete Mthemtis, 22(4): , [3] Feodor F Drgn, Flk Nioli, nd Andres Brndstädt. Lexfs-orderings nd powers of grphs. In Interntionl Workshop on Grph-Theoreti Conepts in Computer Siene, pges Springer, [4] Mihel Hi, Ross MConnell, Christophe Pul, nd Lurent Viennot. Lex-fs nd prtition refinement, with pplitions to trnsitive orienttion, intervl grph reognition nd onseutive ones testing. Theoretil Computer Siene, 234(1):59 84, [5] Ekkehrd Köhler nd Lll Moutdid. Liner time lexdfs on oomprility grphs. In Sndinvin Workshop on Algorithm Theory, pges Springer, [6] Donld J Rose, R Endre Trjn, nd George S Lueker. Algorithmi spets of vertex elimintion on grphs. SIAM Journl on omputing, 5(2): ,

Lecture 12 : Topological Spaces

Lecture 12 : Topological Spaces Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Adjacency. Adjacency Two vertices u and v are adjacent if there is an edge connecting them. This is sometimes written as u v.

Adjacency. Adjacency Two vertices u and v are adjacent if there is an edge connecting them. This is sometimes written as u v. Terminology Adjeny Adjeny Two verties u nd v re djent if there is n edge onneting them. This is sometimes written s u v. v v is djent to nd ut not to. 2 / 27 Neighourhood Neighourhood The open neighourhood

More information

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother

More information

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler CS5 Fll 04Leture (lmost there) /6 Seven Bridges of Königserg Grphs Prof. Tny Berger-Wolf Leonrd Euler 707-783 Is it possile to wlk with route tht rosses eh ridge e Seven Bridges of Königserg Forget unimportnt

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml

More information

Chapter 4 Fuzzy Graph and Relation

Chapter 4 Fuzzy Graph and Relation Chpter 4 Fuzzy Grph nd Reltion Grph nd Fuzzy Grph! Grph n G = (V, E) n V : Set of verties(node or element) n E : Set of edges An edge is pir (x, y) of verties in V.! Fuzzy Grph ~ n ( ~ G = V, E) n V :

More information

Lecture 13: Graphs I: Breadth First Search

Lecture 13: Graphs I: Breadth First Search Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry

More information

Tight triangulations: a link between combinatorics and topology

Tight triangulations: a link between combinatorics and topology Tight tringultions: link between ombintoris nd topology Jonthn Spreer Melbourne, August 15, 2016 Topologil mnifolds (Geometri) Topology is study of mnifolds (surfes) up to ontinuous deformtion Complited

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V) Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from

More information

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page.

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page. 6045J/18400J: Automt, Computbility nd Complexity Mrh 30, 2005 Quiz 2: Solutions Prof Nny Lynh Vinod Vikuntnthn Plese write your nme in the upper orner of eh pge Problem Sore 1 2 3 4 5 6 Totl Q2-1 Problem

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...

More information

Width and Bounding Box of Imprecise Points

Width and Bounding Box of Imprecise Points Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Problem Final Exam Set 2 Solutions

Problem Final Exam Set 2 Solutions CSE 5 5 Algoritms nd nd Progrms Prolem Finl Exm Set Solutions Jontn Turner Exm - //05 0/8/0. (5 points) Suppose you re implementing grp lgoritm tt uses ep s one of its primry dt strutures. Te lgoritm does

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Journal of Combinatorial Theory, Series A

Journal of Combinatorial Theory, Series A Journl of Comintoril Theory, Series A 0 (0) Contents lists ville t SiVerse SieneDiret Journl of Comintoril Theory, Series A www.elsevier.om/lote/jt Spheril tiling y ongruent pentgons Hongho Go, Nn Shi,

More information

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 [Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth

More information

Calculus Differentiation

Calculus Differentiation //007 Clulus Differentition Jeffrey Seguritn person in rowot miles from the nerest point on strit shoreline wishes to reh house 6 miles frther down the shore. The person n row t rte of mi/hr nd wlk t rte

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Introduction. Example

Introduction. Example OMS0 Introution isjoint sets n minimum spnning trees In this leture we will strt by isussing t struture use for mintining isjoint subsets of some bigger set. This hs number of pplitions, inluing to mintining

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

Computational geometry

Computational geometry Leture 23 Computtionl geometry Supplementl reding in CLRS: Chpter 33 exept 33.3 There re mny importnt prolems in whih the reltionships we wish to nlyze hve geometri struture. For exmple, omputtionl geometry

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

Tiling Triangular Meshes

Tiling Triangular Meshes Tiling Tringulr Meshes Ming-Yee Iu EPFL I&C 1 Introdution Astrt When modelling lrge grphis senes, rtists re not epeted to model minute nd repetitive fetures suh s grss or snd with individul piees of geometry

More information

CS553 Lecture Introduction to Data-flow Analysis 1

CS553 Lecture Introduction to Data-flow Analysis 1 ! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Graph theory Route problems

Graph theory Route problems Bhelors thesis Grph theory Route prolems Author: Aolphe Nikwigize Dte: 986 - -5 Sujet: Mthemtis Level: First level (Bhelor) Course oe: MAE Astrt In this thesis we will review some route prolems whih re

More information

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,

More information

[SYLWAN., 158(6)]. ISI

[SYLWAN., 158(6)]. ISI The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI

More information

Can Pythagoras Swim?

Can Pythagoras Swim? Overview Ativity ID: 8939 Mth Conepts Mterils Students will investigte reltionships etween sides of right tringles to understnd the Pythgoren theorem nd then use it to solve prolems. Students will simplify

More information

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book inl xm Review 06 M 236 e sure to loo over ll of your tests, s well s over the tivities you did in the tivity oo 1 1. ind the mesures of the numered ngles nd justify your wor. Line j is prllel to line.

More information

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front

More information

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs Honors Thesis: Investigting the Algebri Properties of Cyley Digrphs Alexis Byers, Wittenberg University Mthemtis Deprtment April 30, 2014 This pper utilizes Grph Theory to gin insight into the lgebri struture

More information

Midterm Exam CSC October 2001

Midterm Exam CSC October 2001 Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not

More information

Convex Hull Algorithms. Convex hull: basic facts

Convex Hull Algorithms. Convex hull: basic facts CG Leture D Conve Hull Algorithms Bsi fts Algorithms: Nïve, Gift wrpping, Grhm sn, Quik hull, Divide-nd-onquer Lower ound 3D Bsi fts Algorithms: Gift wrpping, Divide nd onquer, inrementl Conve hulls in

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

McAfee Web Gateway

McAfee Web Gateway Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Outline. CS38 Introduction to Algorithms. Graphs. Graphs. Graphs. Graph traversals

Outline. CS38 Introduction to Algorithms. Graphs. Graphs. Graphs. Graph traversals Outline CS38 Introution to Algorithms Leture 2 April 3, 2014 grph trversls (BFS, DFS) onnetivity topologil sort strongly onnete omponents heps n hepsort greey lgorithms April 3, 2014 CS38 Leture 2 2 Grphs

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

Line The set of points extending in two directions without end uniquely determined by two points. The set of points on a line between two points

Line The set of points extending in two directions without end uniquely determined by two points. The set of points on a line between two points Lines Line Line segment Perpendiulr Lines Prllel Lines Opposite Angles The set of points extending in two diretions without end uniquely determined by two points. The set of points on line between two

More information

Error Numbers of the Standard Function Block

Error Numbers of the Standard Function Block A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution

More information

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.4.1.0 Due to the omplex nture of this updte, plese fmilirize yourself with these instrutions nd then ontt RGB Spetrum Tehnil

More information

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees.

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees. 428 T FOU 4.3 Blned Trees T BT GOIT IN T VIOU setion work well for wide vriety of pplitions, ut they hve poor worst-se performne. s we hve noted, files lredy in order, files in reverse order, files with

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph The Visul omputer mnusript No. (will e inserted y the editor) Plo Diz-Gutierrez M. Gopi Qudrilterl nd Tetrhedrl Mesh Stripifition Using 2-Ftor Prtitioning of the Dul Grph strt In order to find 2-ftor of

More information

Parallelization Optimization of System-Level Specification

Parallelization Optimization of System-Level Specification Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion

More information

s 1 t 4 s 2 4 t 2 a b r 2 r 8 r10 g 4

s 1 t 4 s 2 4 t 2 a b r 2 r 8 r10 g 4 k-pirs Non-Crossing Shortest Pths in Simple Polgon Evnthi Ppdopoulou Northwestern Universit, Evnston, Illinois 60208, USA Astrt. This pper presents n O(n + k) time lgorithm to ompute the set of k non-rossing

More information

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Math 227 Problem Set V Solutions. f ds =

Math 227 Problem Set V Solutions. f ds = Mth 7 Problem Set V Solutions If is urve with prmetriztion r(t), t b, then we define the line integrl f ds b f ( r(t) ) dr dt (t) dt. Evlute the line integrl f(x,y,z)ds for () f(x,y,z) xosz, the urve with

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Lists in Lisp and Scheme

Lists in Lisp and Scheme Lists in Lisp nd Scheme Lists in Lisp nd Scheme Lists re Lisp s fundmentl dt structures, ut there re others Arrys, chrcters, strings, etc. Common Lisp hs moved on from eing merely LISt Processor However,

More information

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,

More information

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator.

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator. COMMON FRACTIONS BASIC DEFINITIONS * A frtion is n inite ivision. or / * In the frtion is lle the numertor n is lle the enomintor. * The whole is seprte into "" equl prts n we re onsiering "" of those

More information

CS453 INTRODUCTION TO DATAFLOW ANALYSIS

CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

Containers: Queue and List

Containers: Queue and List Continers: Queue n List Queue A ontiner in whih insertion is one t one en (the til) n eletion is one t the other en (the he). Also lle FIFO (First-In, First-Out) Jori Cortell n Jori Petit Deprtment of

More information

Doubts about how to use azimuth values from a Coordinate Object. Juan Antonio Breña Moral

Doubts about how to use azimuth values from a Coordinate Object. Juan Antonio Breña Moral Douts out how to use zimuth vlues from Coordinte Ojet Jun Antonio Breñ Morl # Definition An Azimuth is the ngle from referene vetor in referene plne to seond vetor in the sme plne, pointing towrd, (ut

More information

arxiv: v1 [cs.cg] 12 Sep 2007

arxiv: v1 [cs.cg] 12 Sep 2007 Conneting Polygoniztions i Strethes nd Twngs Mirel Dmin Roin Fltlnd Joseph O Rourke Suneet Rmswmi rxi:070.121 [s.cg] 12 Sep 2007 Astrt We show tht the spe of polygoniztions of fixed plnr point set S of

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

String comparison by transposition networks

String comparison by transposition networks String omprison y trnsposition networks Alexnder Tiskin (Joint work with Peter Krushe) Deprtment of Computer Siene University of Wrwik http://www.ds.wrwik..uk/~tiskin (inludes n extended version of this

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

and vertically shrinked by

and vertically shrinked by 1. A first exmple 1.1. From infinite trnsltion surfe mp to end-periodi mp. We begin with n infinite hlf-trnsltion surfe M 0 desribed s in Figure 1 nd n ffine mp f 0 defined s follows: the surfe is horizontlly

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018

Premaster Course Algorithms 1 Chapter 6: Shortest Paths. Christian Scheideler SS 2018 Premster Course Algorithms Chpter 6: Shortest Pths Christin Scheieler SS 8 Bsic Grph Algorithms Overview: Shortest pths in DAGs Dijkstr s lgorithm Bellmn-For lgorithm Johnson s metho SS 8 Chpter 6 Shortest

More information

Geometrical reasoning 1

Geometrical reasoning 1 MODULE 5 Geometril resoning 1 OBJECTIVES This module is for study y n individul teher or group of tehers. It: looks t pprohes to developing pupils visulistion nd geometril resoning skills; onsiders progression

More information

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for

More information

Research Article Determining Sensor Locations in Wireless Sensor Networks

Research Article Determining Sensor Locations in Wireless Sensor Networks Interntionl Journl of Distriuted Sensor Networks Volume 2015, Artile ID 914625, 6 pges http://dx.doi.org/10.1155/2015/914625 Reserh Artile Determining Sensor Lotions in Wireless Sensor Networks Zimo Li

More information

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline CPSC 852 Internetworking The Network Lyer: Routing in the Internet Mihele Weigle Deprtment of Computer Siene Clemson University mweigle@s.lemson.edu http://www.s.lemson.edu/~mweigle/ourses/ps852 1 The

More information

WORKSHOP 8A TENSION COUPON

WORKSHOP 8A TENSION COUPON WORKSHOP 8A TENSION COUPON WS8A-2 Workshop Ojetives Buil the tension oupon geometry Control the mesh y using tehniques isusse in lss Compre FEA stress results to theoretil results From Stress Conentrtion

More information