Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy

Size: px
Start display at page:

Download "Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy"

Transcription

1 Graph Theory for Modelling a Survey Questionnaire Pierpaolo Massoli, ISTAT via Adolfo Ravà 150, Roma, Italy pimassol@istat.it 1. Introduction Questions can be usually asked following specific patterns in the questionnaires used to collect survey data. Depending on the complexity of the questionnaire, several different questionnaire routes can emerge. As a matter of fact, questions can be asked in accordance with the answers given to another questions. It is important to establish which responses are missing and which are not applicable ones. Questionnaire routes are also called skip patterns (Fagan and Greenberg, 1988). As a result of an inadequate mathematical model, only a partial set of these patterns is often extracted by looking at the questionnaire. This practice can lead to an ineffective data checking and to the creation of more software than necessary causing errors as a result of also an harder software maintenance. However, it is quite common to collect information in relation to the questionnaire such as: number of variables, type of variables, range of each quantitative variable, items of each qualitative variable and so on. This information is called metadata; it is commonly used to manage data processing in its entirety. Moreover, there are several examples reported in literature about the use of graph theory (Diestel, 2005) that one can address for modelling the diverse steps of the survey data processing. In order to describe a survey questionnaire completely, the suitable mathematical structure, widely adopted, is the acyclic directed graph. This paper proposes a possible use of metadata to obtain the graph related to a typical survey questionnaire. Skip patterns are necessary to assess the feasibility for each record in the questionnaire dataset collecting the responses to all the interviews. A good modelling must recognize the questions which should have been answered but are missing from the not applicable ones. The approach proposed here requires less matrix algebra than others. This work proposes the construction of a feasibility check algorithm to be adopted in any survey. Basic definitions and terminology of graph theory are reported in Paragraph 2. In Paragraph 3, the metadata needed to deal with varying classic questionnaire structures are introduced. Paragraph 4 describes how the directed graph is used to check the questionnaire data record feasibility. A brief discussion of the results and further developments are discussed in the conclusion of the paper. 2. Basic definitions A graph is a pair of sets G = (V, E) so that E is a subset of V x V and V E = Ø The elements of the finite set V are called vertices v i (with i = 1, 2, 3,, n where n is the cardinality of V) and the elements e k = (v i, v j ) of E are not ordered pairs of V called edges (with k = 1, 2, 3,, m where m is the cardinality of E). A graph in which its edges are not ordered pairs of vertices is called undirected because each edge has not a direction. A vertex v i is incident with an edge e j if v i e j meaning the vertex v i belongs to the edge e j. Two vertices v i and v j are adjacent if and only if there exists an edge joining them. Two vertices incident with an edge are called its ends. In a directed graph the edges are ordered pairs of vertices (label j of the vertex v j is greater than the label I of the vertex v i ). A path from v i to v k (k n) is a sequence of vertices and edges in which all vertices are distinct. If the vertices are not distinct then the path is a chain. The number of edges in a path or in a chain is called length.

2 If v i and v j are vertices of a graph and if there exists a path with initial vertex v i and terminal vertex v j then there is a path from v i to v j. If there exists a path from v i to v j then v i preceeds v j and v j succeeds v i. If there is an edge incident to v i and to v j then v i is an immediate predecessor to v j and v j is an immediate successor to v i. A graph in which there are only paths is called acyclic because contains no cycles. A path that is not contained in another paths is called maximal. It is always possible to find (or eventually to create) a unique vertex from which one or more edges start but none ends (source) and a unique vertex in which one or more edges end but none starts (sink) such that each maximal of the graph has the source as its initial vertex and the sink as its terminal vertex. A very important matrix needed to deal with a graph G = (V, E) with V = {v 1, v 2,, v n } vertices and E = {e 1, e 2,, e m } edges is the incidence matrix (of a directed graph) B = {b ij } (n x m) defined as follows: + 1 if v i e j and e j is outcoming from v i b ij = if v i e j and e j is incoming in v i (1) 0 otherwise In the case of an undirected graph becomes b ij =1 if v i e j regardless of the direction of the edge e j. As well known in literature, the product BB T equals the sum of two matrices A + D. Matrix A={a ij } is a (n x n) matrix called adjacency matrix with 0/1 elements where a ij =1 if v i and v j are adjacent. This matrix is symmetric for an undirected graph while for a directed graph becomes triangular and it is usually called source-target matrix. Matrix D is also a (n x n) diagonal matrix with element d ii that are equal to the degree 1 of vertex v i (I = 1, 2,, n). 3. Questionnaire metadata All the interviews conducted using the same questionnaire are usually collected in the same dataset. Each interview comprises a data record of the dataset. The number of variables n v in each data record depends on the questionnaire s responses which can be stored in one or more than one variable. There are questions for which a single response is appropriate and others with a multiple choice response. Classic variable types include the numeric type and the character one. These two variable types are, respectively, used to store a response concerning with one s personal income and a string showing the profession of an individual. The domain and the range of variables are used respectively for qualitative and quantitative variables. As a broad generalization, all the information concerning the order of variables, variable types and all the leaps from one question to another, has been stored in an ASCII file with comma separated values format. This file is called routing metadata file. The description of this file is given below in Table 1. In view of the fact that there is a marked analogy between vertices and variables as well as edges and items, this file must contain all the structural information so that one is able to construct the graph which underlies the questionnaire. 1 The degree of a vertex is the total number of edges incident with it.

3 Table 1 Routing file record layout Column Description 1 Variable name character 2 Number of items - integer numbe<r [0, + ) 3 Minimum variable value integer number (-, + ) 4 Maximum variable value integer number (-, + ) 5 Group s label - integer number (-, + ) 6 Number of the leaps - integer number [-1, 98] 7 First variable item that realizes the leap - integer number (-, + ) 8 Variable to visit because of the first leap character 9 Second variable item that realizes the leap integer number (-, + ) 10 Variable to visit because of the second leap - character Each variable is represented by a vertex. Each variable s item corresponds to an edge. Variables are sorted in the routing file according to the order of the questions in the questionnaire. Variables types considered in this paper are: numeric type for all those questions whose responses are coded using a progressive integer number and character type for all those questions which accept an open response (a word or a phrase). In order to distinguish a character variable from a numeric one, for the former the number of items n items equals 0 with a minimum variable s value v min equal to a null value and a maximum value v max equal to 1 (variable filled). As mentioned above, a numeric variable can be quantitative or qualitative. For quantitative variables, the number of items must be equal to 1 and the minimum variable s value and its maximum value give the variable s range. For qualitative variables, the number of items is greater than 0 and the minimum variable s value and its maximum give the variable s domain; taking into account that consecutive variable s items are equidistant 2 with a distance equalling (v max - v min ) / (n items 1). Moreover, the interviewer commonly checks additional information regarding the interviewee or is asked to recall a previously given answer. Even though this practice should be avoided because it is often a cause of errors, this information determines which skip pattern has to be used to continue the interview and complicates or, at worst, makes impossible to derive an acyclic directed graph from the questionnaire. Therefore, in order to ensure the construction of the graph, it could be necessary to insert auxiliary variables in the routing file as well as in the questionnaire dataset. These variables are not directly related to any question and are created in accordance with specific information contained in another ASCII file called auxiliary file. A description of this auxiliary metadata file is given in Table 2. In this paper, variables that are directly related to the questionnaire are called base variables. By using this technique, it is always possible to traverse correctly the graph starting from its source (initial variable) in order to arrive at its sink (terminal variable). The construction of this variable can involve base variables of the same dataset, base variables that belong to another dataset or both. An auxiliary variable is always qualitative with a numeric code and its items are valued in accordance with the base variables even if the base variables are quantitative. Each base variable is related to a block made by one or more rows. Each row in a block refers to an item of the base variable. Blocks are read in accordance with the order of the block labels (third column of the auxiliary file). There is no theoretical limitation to the number of base variable s blocks that 2 A qualitative variable whose items are not equidistant can be treated with the construction of an auxiliary variable to be inserted in the routing file as an immediate successor of that variable.

4 one s can write in an auxiliary file. As shown in Table 2, a flag is used to decide whether the base variable must be dropped from the questionnaire dataset or not. Table 2 Auxiliary file record layout Column Description 1 Auxiliary variable s name character 2 Auxiliary variable s item integer number (-, + ) 3 Label of the base variable s block integer number [1, + ) 4 Dataset name where is the first base variable character 5 First base variable name character 6 Key variable to merge with the dataset of the interviews - character 7 Item of the first base variable - integer number [-, + ) 8 Minimum value of the first base variable - real number (-, + ) 9 Maximum value of the first base variable - real number (-, + ) 10 Flag that indicates if the base variables are to be dropped (0/1) Each row of the auxiliary file regarding the same auxiliary variable in the same base variable s block is a statement in logical OR with the others belonging to the same block. Different base variable blocks concerning with the same auxiliary variable constitute statements in logical AND relation. More than one base variable can be computed to evaluate the related auxiliary variable s item. Certain features of the questionnaire s structures are the multiple choice responses and also responses that always involve two different and mutually exclusive variables (for example, a question in which the interviewee could declare the amount of a certain expense: it caters for not having that expense at all). In order to model these two classic questions, the concept of group (of variables) has been introduced. A multiple choice response is related to a group in logical OR relation. Mutually exclusive responses correspond to a question asking, for example, the amount of a certain expense but the subject being interviewed could not have that expense at all. These cases are modelled by means of a group of two variables in logical XOR relation. From the graphs theory point of view, these two groups of variables are considered both as they were a unique vertex so that an edge incident to this vertex can be incident to one or more variable of the group if this is a OR group or can be incident to one of the two variables of the XOR group. The fifth column of the routing metadata file is used to depict these structures namely, if the variable is single (single response) the integer value written in the column is equal to 0 while it is a positive integer number for OR groups and a negative integer number for XOR groups. Each group is labelled with the same integer number. The remaining columns are required to draw the questionnaire routes completely. The sixth column indicates how many leaps ahead (n routes ) can be done starting from the variable k written in the first column at the same row. Obviously, number of the leaps must be a positive integer less or equal to the number of items of the variable k. A value equal to 0 means that there are no leaps and the variable k+1 immediately below is adjacent, for every items, to variable k. A value equal to -1 means that variable k and k+1 are not adjacent (there is not an edge joining them). A value equal to 98 is a special code to indicate that there is a leap to the variable h > k regardless of the item s value of variable k. Next columns in the routing file are an alternate sequence of item of the variable k and name of the variable h > k whose value should be present if the variable k assumes the item value indicated in the previous column. Length of this sequence depends on the number of the leaps indicated by n routes.

5 Figure 1 Acyclic graph underlying a questionnaire In Figure 1 an example of directed acyclic graph with a source (v 1 ) and a sink (v 9 ) is shown. The graph refers to a questionnaire with 3 single response questions, 1 multiple choice response question and 1 mutually exclusive responses question. Nine variables are necessary to store the responses as it can be seen from the routing file in Table 3. Table 3 Routing file example Name n items v min v max l group n routes item 1 leap 1 item 2 v 1 2 e 1 e e 1 v6 v 2 1 e 3 e v 3 1 e 4 e e 4 v 9 v 4 1 e 5 e v 5 2 e 6 e e 6 V 9 v 6 1 e 8 e v 7 1 e 9 e v 8 1 e 10 e v 9.. Vertices set V of the graph has 9 elements while edges set E has 10 elements. Variable v 1 corresponds to the source vertex while v 9 corresponds to the sink vertex of the graph. The transposed incidence matrix of the graph in Figure 1 is reported below (Equation 2) and can be directly derived from the metadata in Table 3.

6 T B = (2) Because of the variables groups presence, there are more than two vertices incident with the same edge. This is a very common matrix structure when one deals with a typical survey questionnaire. 4. Questionnaire data record feasibility check An algorithm organized in three steps is proposed, in order to check the feasibility of each record in the questionnaire dataset X(n r x n v ) with n r records and n v variables. There are base and eventually auxiliary variables in the dataset. In the first step, a copy X * (n r x n items ) of the questionnaire dataset must be transformed such that each variable in a data record is related to as many dummy variables as the number of its items. In the second step, the transposed incidence matrix B T (n items x n v ) of the graph underlying the questionnaire must be evaluated reading the routing metadata file. In the third step, the matrix B T is used to check out missing data or missing not allowed for each record in X *. The pseudo code about the third step is shown in Figure 2. Figure 2 Feasibility check for each record in X find all the variables (vertices) not null in X and creates a vector (1 x n v ) with 0/1 elements (0 = variable empty, 1 = variable filled) --> datapath find all the items (edges) not null in X* --> items_list for each item i in items_list find in the i-th row of the matrix B T vertex with value = +1 initial_vertex find in the i-th row of the matrix B T vertex with value = -1 terminal_vertex for k from initial_vertex to terminal_vertex match the k-th element of datapath with the absolute value of the k-th element of the i-th row of matrix B T test if (test > 0) then "value must be missing" if (test < 0) then "missing value not allowed" end for end for end for

7 Because of variable groups presence, the algorithm reported in Figure 2 should be changed. As a consequence, the complexity of the algorithm would increase as well as the computational effort. Therefore, in order to make the computational effort lighter, matrices dimensions must be kept the smallest as possible. Thus, each group of vertices is coarsened to a new vertex as if it were related to a single variable. This task is accomplished during the first step of the algorithm proposed by inserting an appropriate auxiliary variable in the questionnaire dataset that substitutes the related group of variables. This new variable is created by using the information written in the auxiliary file. Variables groups substitution causes the questionnaire dataset and its related incidence matrix reduction (a lower number of variables). Figure 3 Graph after vertices coarsening As it is shown in Figure 3, two auxiliary variables (v aux1, v aux2 ) substitute the variable groups (v 3, v 4 ) and (v 5, v 6, v 7 ) so that the coarsened graph reduces to 6 variables. In this case, the number of items of the coarsened graph remains the same as in the original one. Table 4 Auxiliary file for XOR and OR variables groups Name item aux block basedset basename key item base (v base ) min (v base ) max Drop v aux1 1 1 V 3 e 4 1 v aux1 2 1 V 4 (e 5 ) min (e 5 ) max 1 v aux2 1 V 6 e 8 1 v aux2 1 V 7 e 9 1 v aux2 1 V 8 e This file is needed to create the statements reported in Figure 4 and Figure 5.

8 Figure 4 Statement for a XOR group v aux1 = <empty value> if v 3 = e 4 then v aux1 = 1 else if (e 4 ) min v 4 (e 4 ) max then v aux1 = 2 Figure 5 Statement for a OR group create an array with the names of the variables of the group L={V 7, V 8, V 9 } create an array with the number of items n items ={1, 1, 1} create an array with the minimum values e min ={e 7, e 8, e 9 } S = 0 missing_values = 0 for each element k in L if L(k) is not equal to <empty value> then if n items (k) = 2 then S = S + 2 (k-1) * (L(k) - e min (k)) / 2 else S = S + 2 (k-1) else missing_values = missing_values + 1 end for if missing_values = <length of L> then S = <empty value> v aux2 = S Group of base variables in logical OR relation is substituted by a numeric quantitative variable (n items field of the auxiliary variable must be equal to 1) whose value S indicates those base variables filled or left empty (n items field of the base variable is equal to 1) as well as those variables that accept a positive or a negative response (n items field of the base variable is equal to 2). In order to complete the algorithm for the construction of auxiliary variables, the case of a generic auxiliary variable (n routes equal to 0) must be treated. An example of an auxiliary variable related to three base variables is reported in Tables 5-7. Table 5 Auxiliary file block for creating a generic auxiliary variable (block 1) Name item aux block basedset basename key item base (v base ) min (v base ) max Drop v aux 1 1 v base1 x 1 0 v aux 2 1 v base1 x 2 0

9 Table 6 Auxiliary file block for creating a generic auxiliary variable (block 2) Name item aux block basedset basename key item base (v base ) min (v base ) max Drop v aux 2 dset 2 v base2 v key2 y 1 0 v aux 2 dset 2 v base2 v key2 y 2 0 Table 6 Auxiliary file block for creating a generic auxiliary variable (block 3) Name item aux block basedset basename key item base (v base ) min (v base ) max Drop v aux 1 3 dset 3 v base3 v key3 u min u max 0 v aux 2 3 dset 3 v base3 v key3 w min w max 0 These three blocks generate the statement reported in Figure 6 which is applied to the questionnaire dataset that has to be checked. Figure 6 Statement for creating a generic auxiliary variable for each record in the (temporary) dataset where to insert the auxiliary variable if it is the first occurrence of the key variable then v aux = <empty value> if (v aux is not equal to μ) and (v base1 = x 1 ) and (v base2 = y 1 ) and (u min v base3 u max ) then v aux = 1 if (v aux is not equal to μ) and (v base1 = x 1 ) and (v base2 = y 2 ) and (u min v base3 u max ) then v aux = 1 if (v aux is not equal to μ) and (v base1 = x 2 ) and (v base2 = y 1 ) and (w min v base3 w max ) then v aux = 2 if (v aux is not equal to μ) and (v base1 = x 2 ) and (v base2 = y 2 ) and (w min v base3 w max ) then v aux = 2 if it is the last occurrence of the key variable then save the record with the inserted v aux end for For base variables belonging to other datasets (base datasets), these latter are firstly merged one by one with the questionnaire dataset using the related key variables. The number of records in the resulting temporary dataset can be larger than the number of records of the original questionnaire dataset. This depends on the type of base datasets (for example, in a social survey an household level questionnaire dataset merged with an individual level base dataset) as well as the variable used to link the base dataset to the questionnaire dataset (key variable). Because the auxiliary variable is related to the questionnaire dataset, the number of records after its insertion must remain the same as before. Furthermore, it is used the value μ which equals the lowest auxiliary variable s item in order to solve the problem of constructing an auxiliary variable even in all those cases which require that the interviewer checks whether the interviewee has answered at least one yes to a question related to a group of variables where each variable has two items (yes/no) and none of the variables is in logical relation one to each other.

10 5. Conclusions The feasibility check has been implemented using SAS System V9.1 on Windows XP platform. The software package developed here is generalized and the following inputs are required: a questionnaire dataset, a routing metadata file and an auxiliary metadata file (if necessary). Related outputs are: a dataset containing all the errors encountered and a report file. This latter includes a detailed description of the errors encountered and also different statistics such as the number of errors per record and the number of errors per variable in order to get an exhaustive analysis about the records feasibility of the questionnaire dataset. For testing purposes, this software has been used to assess the feasibility of the data records concerning with the household register, the household questionnaire and the personal questionnaire 3 administered in the European Survey on Income and Living Conditions (EU-SILC). As an example, in Table 7 are reported some results of the check executed on the household questionnaire. Table 7 Summary of the feasibility check Input dataset HOUSEHOLD_QUESTIONNAIRE Number of records Number of base variables 356 Number of character variables 18 Number of auxiliary variables 9 Number of variables in routing file 365 Number of XOR groups 10 Number of OR groups 22 Graph s incidence matrix dimensions 265 x 598 Overall duration of the feasibility check 02 h 07 m s % of feasible records 60.2 Because this approach is general, the related software developed could be applied to any survey that uses a questionnaire as method of data collection. The execution time of the feasibility check should be the lowest as possible to improve efficiency. Leaving apart matters of machine performances, execution time is strictly related to the matrices dimensions of the graph underlying the questionnaire and to matters code optimization. For these reasons, software implementation is still in progress being continually updated. The considerable advantages of modelling a survey questionnaire using graph theory rely in a very compact and effective tool to be used in data production; this tool helps to manage every changes in the questionnaire form simply using the related metadata files. In addition, diverse methods are available after the graph construction, one can adopt such as, for example, graph partitioning to divide the questionnaire in different sections in order to treat them separately, minimum paths searching and a complete skip patterns listing in order to measure questionnaire complexity. 3 For more details see:

11 References Diestel, R. (2005), Graph Theory, Springer-Verlag HeidenBerg, New York. Fagan, J. and Greenberg, B. Y. (1988), Using Graph Theory to Analyze Skip Patterns in Questionnaires, Bureau of the Census Statistical Research Division Report series SRD research report number: Census/SRD/RR-88106, Washington, D.C : Statistical Research Division Bureau of the Census.

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VI: Chapter 5, part 2; Chapter 6, part 1 R. Paul Wiegand George Mason University, Department of Computer Science March 8, 2006 Outline 1 Topological

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents

E-Companion: On Styles in Product Design: An Analysis of US. Design Patents E-Companion: On Styles in Product Design: An Analysis of US Design Patents 1 PART A: FORMALIZING THE DEFINITION OF STYLES A.1 Styles as categories of designs of similar form Our task involves categorizing

More information

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions

Dr. Amotz Bar-Noy s Compendium of Algorithms Problems. Problems, Hints, and Solutions Dr. Amotz Bar-Noy s Compendium of Algorithms Problems Problems, Hints, and Solutions Chapter 1 Searching and Sorting Problems 1 1.1 Array with One Missing 1.1.1 Problem Let A = A[1],..., A[n] be an array

More information

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data

Alessandro Del Ponte, Weijia Ran PAD 637 Week 3 Summary January 31, Wasserman and Faust, Chapter 3: Notation for Social Network Data Wasserman and Faust, Chapter 3: Notation for Social Network Data Three different network notational schemes Graph theoretic: the most useful for centrality and prestige methods, cohesive subgroup ideas,

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

GraphBLAS Mathematics - Provisional Release 1.0 -

GraphBLAS Mathematics - Provisional Release 1.0 - GraphBLAS Mathematics - Provisional Release 1.0 - Jeremy Kepner Generated on April 26, 2017 Contents 1 Introduction: Graphs as Matrices........................... 1 1.1 Adjacency Matrix: Undirected Graphs,

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Crises Management in Multiagent Workflow Systems

Crises Management in Multiagent Workflow Systems Crises Management in Multiagent Workflow Systems Małgorzata Żabińska Department of Computer Science, AGH University of Science and Technology, al. Mickiewicza 30, 30-059 Kraków, Poland zabinska@agh.edu.pl

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

Vertex Magic Total Labelings of Complete Graphs

Vertex Magic Total Labelings of Complete Graphs AKCE J. Graphs. Combin., 6, No. 1 (2009), pp. 143-154 Vertex Magic Total Labelings of Complete Graphs H. K. Krishnappa, Kishore Kothapalli and V. Ch. Venkaiah Center for Security, Theory, and Algorithmic

More information

LECTURES 3 and 4: Flows and Matchings

LECTURES 3 and 4: Flows and Matchings LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016 GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set

More information

MOST attention in the literature of network codes has

MOST attention in the literature of network codes has 3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces

More information

by conservation of flow, hence the cancelation. Similarly, we have

by conservation of flow, hence the cancelation. Similarly, we have Chapter 13: Network Flows and Applications Network: directed graph with source S and target T. Non-negative edge weights represent capacities. Assume no edges into S or out of T. (If necessary, we can

More information

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Material handling and Transportation in Logistics Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Introduction to Graph Theory Graph Theory As Mathematical

More information

Notes for Lecture 20

Notes for Lecture 20 U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general

More information

Vertex Magic Total Labelings of Complete Graphs 1

Vertex Magic Total Labelings of Complete Graphs 1 Vertex Magic Total Labelings of Complete Graphs 1 Krishnappa. H. K. and Kishore Kothapalli and V. Ch. Venkaiah Centre for Security, Theory, and Algorithmic Research International Institute of Information

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics Lecturer: Mgr. Tereza Kovářová, Ph.D. tereza.kovarova@vsb.cz Guarantor: doc. Mgr. Petr Kovář, Ph.D. Department of Applied Mathematics, VŠB Technical University of Ostrava About this

More information

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling

The Bounded Edge Coloring Problem and Offline Crossbar Scheduling The Bounded Edge Coloring Problem and Offline Crossbar Scheduling Jonathan Turner WUCSE-05-07 Abstract This paper introduces a variant of the classical edge coloring problem in graphs that can be applied

More information

Encoding/Decoding, Counting graphs

Encoding/Decoding, Counting graphs Encoding/Decoding, Counting graphs Russell Impagliazzo and Miles Jones Thanks to Janine Tiefenbruck http://cseweb.ucsd.edu/classes/sp16/cse21-bd/ May 13, 2016 11-avoiding binary strings Let s consider

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. An Introduction to Graph Theory

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. An Introduction to Graph Theory SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics An Introduction to Graph Theory. Introduction. Definitions.. Vertices and Edges... The Handshaking Lemma.. Connected Graphs... Cut-Points and Bridges.

More information

Graph and Digraph Glossary

Graph and Digraph Glossary 1 of 15 31.1.2004 14:45 Graph and Digraph Glossary A B C D E F G H I-J K L M N O P-Q R S T U V W-Z Acyclic Graph A graph is acyclic if it contains no cycles. Adjacency Matrix A 0-1 square matrix whose

More information

Greedy algorithms is another useful way for solving optimization problems.

Greedy algorithms is another useful way for solving optimization problems. Greedy Algorithms Greedy algorithms is another useful way for solving optimization problems. Optimization Problems For the given input, we are seeking solutions that must satisfy certain conditions. These

More information

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies:

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies: UNIT 5 CSE 103 - Unit V- Graph GRAPH Graph is another important non-linear data structure. In tree Structure, there is a hierarchical relationship between, parent and children that is one-to-many relationship.

More information

Practice Problems for the Final

Practice Problems for the Final ECE-250 Algorithms and Data Structures (Winter 2012) Practice Problems for the Final Disclaimer: Please do keep in mind that this problem set does not reflect the exact topics or the fractions of each

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY

BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY General definitions; Representations; Graph Traversals; Topological sort; Graphs definitions & representations Graph theory is a fundamental tool in sparse

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

The External Network Problem

The External Network Problem The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the

More information

CSE 373 Final Exam 3/14/06 Sample Solution

CSE 373 Final Exam 3/14/06 Sample Solution Question 1. (6 points) A priority queue is a data structure that supports storing a set of values, each of which has an associated key. Each key-value pair is an entry in the priority queue. The basic

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Big Data Management and NoSQL Databases

Big Data Management and NoSQL Databases NDBI040 Big Data Management and NoSQL Databases Lecture 10. Graph databases Doc. RNDr. Irena Holubova, Ph.D. holubova@ksi.mff.cuni.cz http://www.ksi.mff.cuni.cz/~holubova/ndbi040/ Graph Databases Basic

More information

Graph drawing in spectral layout

Graph drawing in spectral layout Graph drawing in spectral layout Maureen Gallagher Colleen Tygh John Urschel Ludmil Zikatanov Beginning: July 8, 203; Today is: October 2, 203 Introduction Our research focuses on the use of spectral graph

More information

XVIII Open Cup named after E.V. Pankratiev Stage 1: Grand Prix of Romania, Sunday, September 17, 2017

XVIII Open Cup named after E.V. Pankratiev Stage 1: Grand Prix of Romania, Sunday, September 17, 2017 Problem A. Balance file: 1 second 512 mebibytes We say that a matrix A of size N N is balanced if A[i][j] + A[i + 1][j + 1] = A[i + 1][j] + A[i][j + 1] for all 1 i, j N 1. You are given a matrix A of size

More information

Data Analytics and Boolean Algebras

Data Analytics and Boolean Algebras Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com

More information

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM NAME: This exam is open: - books - notes and closed: - neighbors - calculators ALGORITHMS QUALIFYING EXAM The upper bound on exam time is 3 hours. Please put all your work on the exam paper. (Partial credit

More information

Minimum Cost Edge Disjoint Paths

Minimum Cost Edge Disjoint Paths Minimum Cost Edge Disjoint Paths Theodor Mader 15.4.2008 1 Introduction Finding paths in networks and graphs constitutes an area of theoretical computer science which has been highly researched during

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

Algorithm Design (8) Graph Algorithms 1/2

Algorithm Design (8) Graph Algorithms 1/2 Graph Algorithm Design (8) Graph Algorithms / Graph:, : A finite set of vertices (or nodes) : A finite set of edges (or arcs or branches) each of which connect two vertices Takashi Chikayama School of

More information

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Introduction and Overview

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Introduction and Overview Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Introduction and Overview Welcome to Analysis of Algorithms! What is an Algorithm? A possible definition: a step-by-step

More information

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL

CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL CHAPTER 5 GENERATING TEST SCENARIOS AND TEST CASES FROM AN EVENT-FLOW MODEL 5.1 INTRODUCTION The survey presented in Chapter 1 has shown that Model based testing approach for automatic generation of test

More information

Network optimization: An overview

Network optimization: An overview Network optimization: An overview Mathias Johanson Alkit Communications 1 Introduction Various kinds of network optimization problems appear in many fields of work, including telecommunication systems,

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

Binary Relations McGraw-Hill Education

Binary Relations McGraw-Hill Education Binary Relations A binary relation R from a set A to a set B is a subset of A X B Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B. We can also represent

More information

of optimization problems. In this chapter, it is explained that what network design

of optimization problems. In this chapter, it is explained that what network design CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The

More information

17/05/2018. Outline. Outline. Divide and Conquer. Control Abstraction for Divide &Conquer. Outline. Module 2: Divide and Conquer

17/05/2018. Outline. Outline. Divide and Conquer. Control Abstraction for Divide &Conquer. Outline. Module 2: Divide and Conquer Module 2: Divide and Conquer Divide and Conquer Control Abstraction for Divide &Conquer 1 Recurrence equation for Divide and Conquer: If the size of problem p is n and the sizes of the k sub problems are

More information

2 ATTILA FAZEKAS The tracking model of the robot car The schematic picture of the robot car can be seen on Fig.1. Figure 1. The main controlling task

2 ATTILA FAZEKAS The tracking model of the robot car The schematic picture of the robot car can be seen on Fig.1. Figure 1. The main controlling task NEW OPTICAL TRACKING METHODS FOR ROBOT CARS Attila Fazekas Debrecen Abstract. In this paper new methods are proposed for intelligent optical tracking of robot cars the important tools of CIM (Computer

More information

Graph Theory. Part of Texas Counties.

Graph Theory. Part of Texas Counties. Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.

More information

Slides for Faculty Oxford University Press All rights reserved.

Slides for Faculty Oxford University Press All rights reserved. Oxford University Press 2013 Slides for Faculty Assistance Preliminaries Author: Vivek Kulkarni vivek_kulkarni@yahoo.com Outline Following topics are covered in the slides: Basic concepts, namely, symbols,

More information

A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs

A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs Nicolas Lichiardopol Attila Pór Jean-Sébastien Sereni Abstract In 1981, Bermond and Thomassen conjectured that every digraph

More information

Graph Matrices and Applications: Motivational Overview The Problem with Pictorial Graphs Graphs were introduced as an abstraction of software structure. There are many other kinds of graphs that are useful

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA Chapter 1 : BioMath: Transformation of Graphs Use the results in part (a) to identify the vertex of the parabola. c. Find a vertical line on your graph paper so that when you fold the paper, the left portion

More information

Simplicial Complexes of Networks and Their Statistical Properties

Simplicial Complexes of Networks and Their Statistical Properties Simplicial Complexes of Networks and Their Statistical Properties Slobodan Maletić, Milan Rajković*, and Danijela Vasiljević Institute of Nuclear Sciences Vinča, elgrade, Serbia *milanr@vin.bg.ac.yu bstract.

More information

A Database of Categories

A Database of Categories A Database of Categories Michael Fleming Department of Computer Science University of Waterloo Waterloo, Ont, Canada Ryan Gunther Department of Computer Science University of Waterloo Waterloo, Ont, Canada

More information

Konigsberg Bridge Problem

Konigsberg Bridge Problem Graphs Konigsberg Bridge Problem c C d g A Kneiphof e D a B b f c A C d e g D a b f B Euler s Graph Degree of a vertex: the number of edges incident to it Euler showed that there is a walk starting at

More information

Graph Theory. ICT Theory Excerpt from various sources by Robert Pergl

Graph Theory. ICT Theory Excerpt from various sources by Robert Pergl Graph Theory ICT Theory Excerpt from various sources by Robert Pergl What can graphs model? Cost of wiring electronic components together. Shortest route between two cities. Finding the shortest distance

More information

Data Structures Brett Bernstein

Data Structures Brett Bernstein Data Structures Brett Bernstein Final Review 1. Consider a binary tree of height k. (a) What is the maximum number of nodes? (b) What is the maximum number of leaves? (c) What is the minimum number of

More information

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model

More information

EULERIAN DIGRAPHS AND DYCK WORDS, A BIJECTION

EULERIAN DIGRAPHS AND DYCK WORDS, A BIJECTION EULERIAN DIGRAPHS AND DYCK WORDS, A BIJECTION PIETRO CODARA, OTTAVIO M. D ANTONA, MARCO GENUZIO Abstract. The main goal of this work is to establish a bijection between Dyck words and a family of Eulerian

More information

REDUCING GRAPH COLORING TO CLIQUE SEARCH

REDUCING GRAPH COLORING TO CLIQUE SEARCH Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University

More information

Introduction aux Systèmes Collaboratifs Multi-Agents

Introduction aux Systèmes Collaboratifs Multi-Agents M1 EEAII - Découverte de la Recherche (ViRob) Introduction aux Systèmes Collaboratifs Multi-Agents UPJV, Département EEA Fabio MORBIDI Laboratoire MIS Équipe Perception et Robotique E-mail: fabio.morbidi@u-picardie.fr

More information

Job-shop scheduling with limited capacity buffers

Job-shop scheduling with limited capacity buffers Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de

More information

Discrete Mathematics, Spring 2004 Homework 8 Sample Solutions

Discrete Mathematics, Spring 2004 Homework 8 Sample Solutions Discrete Mathematics, Spring 4 Homework 8 Sample Solutions 6.4 #. Find the length of a shortest path and a shortest path between the vertices h and d in the following graph: b c d a 7 6 7 4 f 4 6 e g 4

More information

A Model of Machine Learning Based on User Preference of Attributes

A Model of Machine Learning Based on User Preference of Attributes 1 A Model of Machine Learning Based on User Preference of Attributes Yiyu Yao 1, Yan Zhao 1, Jue Wang 2 and Suqing Han 2 1 Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada

More information

Topological Invariance under Line Graph Transformations

Topological Invariance under Line Graph Transformations Symmetry 2012, 4, 329-335; doi:103390/sym4020329 Article OPEN ACCESS symmetry ISSN 2073-8994 wwwmdpicom/journal/symmetry Topological Invariance under Line Graph Transformations Allen D Parks Electromagnetic

More information

DIT960 Datastrukturer

DIT960 Datastrukturer DIT90 Datastrukturer suggested solutions for exam 07-0-0. The following code takes as input two arrays with elements of the same type. The arrays are called a and b. The code returns a dynamic array which

More information

Mathematics. 2.1 Introduction: Graphs as Matrices Adjacency Matrix: Undirected Graphs, Directed Graphs, Weighted Graphs CHAPTER 2

Mathematics. 2.1 Introduction: Graphs as Matrices Adjacency Matrix: Undirected Graphs, Directed Graphs, Weighted Graphs CHAPTER 2 CHAPTER Mathematics 8 9 10 11 1 1 1 1 1 1 18 19 0 1.1 Introduction: Graphs as Matrices This chapter describes the mathematics in the GraphBLAS standard. The GraphBLAS define a narrow set of mathematical

More information

Lesson 2 7 Graph Partitioning

Lesson 2 7 Graph Partitioning Lesson 2 7 Graph Partitioning The Graph Partitioning Problem Look at the problem from a different angle: Let s multiply a sparse matrix A by a vector X. Recall the duality between matrices and graphs:

More information

Sankalchand Patel College of Engineering - Visnagar Department of Computer Engineering and Information Technology. Assignment

Sankalchand Patel College of Engineering - Visnagar Department of Computer Engineering and Information Technology. Assignment Class: V - CE Sankalchand Patel College of Engineering - Visnagar Department of Computer Engineering and Information Technology Sub: Design and Analysis of Algorithms Analysis of Algorithm: Assignment

More information

Packet #6: Counting & Graph Theory. Applied Discrete Mathematics

Packet #6: Counting & Graph Theory. Applied Discrete Mathematics Packet #6: Counting & Graph Theory Applied Discrete Mathematics Table of Contents Counting Pages 1-8 Graph Theory Pages 9-16 Exam Study Sheet Page 17 Counting Information I. Product Rule: A B C = A * B

More information

A New Heuristic Layout Algorithm for Directed Acyclic Graphs *

A New Heuristic Layout Algorithm for Directed Acyclic Graphs * A New Heuristic Layout Algorithm for Directed Acyclic Graphs * by Stefan Dresbach Lehrstuhl für Wirtschaftsinformatik und Operations Research Universität zu Köln Pohligstr. 1, 50969 Köln revised August

More information

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 5 May 23 This question paper has 4 printed sides. Part A has questions of 3 marks each. Part B has 7 questions

More information

An Introduction to Graph Theory

An Introduction to Graph Theory An Introduction to Graph Theory CIS008-2 Logic and Foundations of Mathematics David Goodwin david.goodwin@perisic.com 12:00, Friday 17 th February 2012 Outline 1 Graphs 2 Paths and cycles 3 Graphs and

More information

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS

LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

The self-minor conjecture for infinite trees

The self-minor conjecture for infinite trees The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

H. W. Kuhn. Bryn Mawr College

H. W. Kuhn. Bryn Mawr College VARIANTS OF THE HUNGARIAN METHOD FOR ASSIGNMENT PROBLEMS' H. W. Kuhn Bryn Mawr College The author presents a geometrical modelwhich illuminates variants of the Hungarian method for the solution of the

More information

CPS 616 TRANSFORM-AND-CONQUER 7-1

CPS 616 TRANSFORM-AND-CONQUER 7-1 CPS 616 TRANSFORM-AND-CONQUER 7-1 TRANSFORM AND CONQUER Group of techniques to solve a problem by first transforming the problem into one of: 1. a simpler/more convenient instance of the same problem (instance

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

CS388C: Combinatorics and Graph Theory

CS388C: Combinatorics and Graph Theory CS388C: Combinatorics and Graph Theory David Zuckerman Review Sheet 2003 TA: Ned Dimitrov updated: September 19, 2007 These are some of the concepts we assume in the class. If you have never learned them

More information

Analysis of high dimensional data via Topology. Louis Xiang. Oak Ridge National Laboratory. Oak Ridge, Tennessee

Analysis of high dimensional data via Topology. Louis Xiang. Oak Ridge National Laboratory. Oak Ridge, Tennessee Analysis of high dimensional data via Topology Louis Xiang Oak Ridge National Laboratory Oak Ridge, Tennessee Contents Abstract iii 1 Overview 1 2 Data Set 1 3 Simplicial Complex 5 4 Computation of homology

More information

Lecture 1: Introduction and Motivation Markus Kr otzsch Knowledge-Based Systems

Lecture 1: Introduction and Motivation Markus Kr otzsch Knowledge-Based Systems KNOWLEDGE GRAPHS Introduction and Organisation Lecture 1: Introduction and Motivation Markus Kro tzsch Knowledge-Based Systems TU Dresden, 16th Oct 2018 Markus Krötzsch, 16th Oct 2018 Course Tutors Knowledge

More information