Computing optimal linear layouts of trees in linear time
|
|
- Linette Colleen Brown
- 5 years ago
- Views:
Transcription
1 Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, Passau, Germany, Abstract. We present a linear time algorithm which, given a tree, computes a linear layout optimal with respect to vertex separation. As a consequence optimal edge search strategies, optimal node search strategies, and optimal interval augmentations can be computed also in Ç Òµ for trees. This improves the running time of former algorithms from Ç Ò ÐÓ Òµ to Ç Òµ and answers two related open questions raised in [7] and [15]. 1 1 Introduction The vertex separation of graphs has been introduced in [13] in the form of a vertex separator game. It is an important concept with theoretical and practical value. Its closer relation to the black-white pebble game of [6] constitutes the theoretical value in complexity theory. Applications in certain layout problems as Weinberger arrays, gate matrix layout, and PLA-folding constitute the practical value in VLSI, see [16]. The vertex separation of a graph can be defined using linear layouts, see [7]. A linear layout, or simply a layout, Ä of a graph is a permutation of the vertices of. Intuitively Ä describes how the vertices are to be laid out along a horizontal line. The -th vertex cut of Ä defines how many of the first vertices in Ä are adjacent to a vertex lying right to the -th vertex in Ä. The vertex separation of Ä is the maximum over all vertex cuts of Ä. The vertex separation of a graph, Ú µ, is the minimum vertex separation of its layouts. Ä is optimal if its vertex separation is Ú µ and therefore as small as possible. Recently the vertex separation of a graph has received more attention due to its closer relation to several well known graph parameters as edge search number, node search number, interval thickness, and path-width. Edge searching has been introduced in [18]. We regard the edges of a graph as pipes contaminated by a gas. A team of searchers (clearers) has to clear all edges of. To do so the team has to find an edge search strategy which is a sequence of the following activities: µ place a searcher on a vertex as a guard, µ remove a searcher from a vertex, and µ slide a searcher along an edge. A contaminated edge becomes cleared if one of its endpoints is guarded and a searcher slides along the edge from the guarded endpoint to the other endpoint of the edge. In [12] it has been shown that recontamination can be disallowed without increasing the search number of any graph. The edge search number of, µ, is the minimum number of the searchers needed 1 It should be clear that there are some published papers in which similar results are claimed. Later it turned out that the suggested algorithms do not run in Ç Òµ as stated but in Ç Ò ÐÓ Òµ.
2 to clear. An edge search strategy of is optimal if it needs the smallest possible number of searchers (this number is µ). Node searching is another version of graph searching and has been introduced in [11]. In this slightly different version the third activity of the edge searching disappears. An edge is cleared once both endpoints are simultaneously guarded by searchers. The node search number of is denoted by Ò µ. Interval thickness has been introduced in [10]. Given a set of intervals Á of the real line the interval graph of Á is obtained by representing every interval by a vertex and every intersection of two intervals by an edge between their corresponding vertices. The interval thickness of a graph, µ, is the smallest maximum clique over all interval supergraphs of. An interval set Á is an optimal interval augmentation of if the interval graph À of Á is a supergraph of and the maximum clique of À has the smallest possible size µ. Path-width has been introduced in [19, 20]. The path-decomposition of a graph is a sequence ½ ¾ Ö of vertex subsets of, such that µ every edge of has both ends in some set and µ if a vertex of occurs in some sets and,, then the same vertex occurs in all sets with. The width of is the maximum number of vertices in any minus ½. The path-width of, ÔÛ µ, is the minimum width over all path-decompositions of. A path-decomposition of is optimal if its width is ÔÛ µ which is the smallest possible. Rather surprisingly all notions mentioned above are closely related to each other. We will explain this in the following discussion: In [7] it has been shown that for every graph Ú µ µ Ú µ ¾. The authors have also shown that µ Ú ¼ µ, where ¼ is the ¾-expansion of. ¼ is obtained from by replacing every edge Ù Ú by the edges Ù Ü Ü Ý, and Ý Ú where Ü and Ý are two new vertices. Furthermore an algorithm has been presented which (by using a suitable data structure) transforms a given optimal layout Ä ¼ of ¼ into an optimal edge search strategy Ë of in linear time. Since the size of Ä ¼ and ¼ is Ç Þ µµ we imply that for every graph the computation of its optimal edge search strategy requires no more time than the computation of its optimal layout. In [11] it has been shown that Ò µ Ú µ ½. The authors have also presented an algorithm which (by using a suitable data structure) transforms a given optimal layout into an optimal node search strategy in linear time. In [10] it has been shown that µ Ò µ and that a given optimal node search strategy can be transformed into an optimal interval augmentation in linear time. In [9] it has been shown that ÔÛ µ Ú µ. Additionally an algorithm has been presented which (by using a suitable data structure) transforms a given optimal layout into an optimal path-decomposition in linear time in the output size. Here the transformation time is not necessarily linear in the input size since the size of an optimal path-decomposition may be ÔÛ µ times larger than the size of an optimal layout. Summarizing we get: For every graph the above parameters are almost the same. Moreover given an input graph the computation of an optimal edge search strategy, an optimal node search strategy, and an optimal interval augmentation of is possible in Ç Ø Òµµ time where Ø Òµ is the time required by the computation of an optimal layout of. The computation of an optimal path-decomposition is possible in time Ç Ø Òµ µ, where is the size of the computed path-decomposition.
3 Unfortunately given a graph and an integer the problems whether or not Ú µ and µ are both NP-complete, see [13] and [15], respectively. By the discussion above we obtain that the problems whether or not Ò µ, µ, and ÔÛ µ are also NP-complete. They remain NP-complete even for chordal graphs [8], starlike graphs [8], and for planar graphs with maximum degree three [17, 14]. For some special graphs the above problems are solvable in polynomial time. Examples are cographs [4], permutation graphs [3], and graphs of bounded tree-width [2]. Especially if is fixed then the problems can be solved in Ç Òµ (but exponential in ) [1]. Here we consider trees. It has been shown in [7] that the vertex separation and in [15] that the edge search number can be computed in Ç Òµ. Thus the node search number, the interval thickness and the path-width can also be computed in Ç Òµ. However the computation of optimal layouts, optimal edge search strategies, optimal node search strategies, optimal interval augmentations, and optimal path-decompositions is more complicated. In [7] an algorithm is given for optimal layouts and in [15] for optimal edge strategies. These algorithms needing Ç Ò ÐÓ Òµ time were the fastest known so far. The authors have raised the question whether this time can be reduced to Ç Òµ. In this paper we establish an algorithm computing an optimal layout of an input tree in Ç Òµ. As a consequence of this result and the discussion above the computation of an optimal edge search strategy, an optimal node search strategy, and an optimal interval augmentation of an input tree can be done in Ç Òµ. Especially the computation of an optimal path-decomposition can be done in linear time in the output size. 2 Preliminaries We consider undirected graphs Î µ. For convenience loops and multiple edges are disallowed. A (linear) layout of is a one to one mapping Ä Î ½ ¾ Î. For an integer ½ Î the -th cut of Ä, denoted by ÙØ Ä µ, is the number of vertices which are mapped to integers less than or equal to and adjacent to a vertex mapped to an integer larger than. Formally ÙØ Ä µ Ù Ù Úµ ¾ with Ä Ùµ and Ä Úµ. The vertex separation of with respect to Ä, denoted by Ú Ä µ, is the maximum over all cuts of Ä, i.e., Ú Ä µ Ñ Ü ½ Î ÙØ Ä µ. For convenience Ú Ä µ is also called the vertex separation of Ä. The vertex separation of, denoted by Ú µ, is the minimum vertex separation over all layouts of, i.e., Ú µ Ñ Ò Ú Ä µ. A layout Ä of is optimal if Ú µ Ú Ä µ. Ä In this paper we deal with rooted trees. Let Ì be a tree and Ù a vertex of Ì. The branches of Ì at Ù are the tree components obtained by the removal of Ù from Ì. Ì Ù denotes the subtree of Ì rooted at Ù and containing all descendants of Ù in Ì. The subtrees rooted at the sons of Ù are called the subtrees of Ù. Let Ú ½ Ú be (arbitrary) vertices of a subtree Ì Ù. Ì Ù Ú ½ Ú denotes the tree obtained from Ì Ù by removing Ì Ú ½ Ì Ú. Notice that Ì Ù Ú ½ Ú is rooted at Ù. In [7] the following lemma has been shown. Lemma 1. Let Ì be a tree and ½ an integer. Then µ iff for all vertices Ù of Ì at most two branches of Ì at Ù have vertex separation and all other branches have vertex separation ½.
4 Corollary 1. Let Ì be a tree with Ò vertices. Then µ ÐÓ Ò ½ ÐÓ Ò ½. Next we recall the definition of critical vertices and vertex labelling, see [7]. Definition 1. Let Ì be a tree with µ. A vertex Ú is -critical in Ì if there are two sons Ú ½ and Ú ¾ of Ú with Ú ½ µ Ú ¾ µ. Observe that by Lemma 1 the vertex Ú in the above definition can not have more than two sons with vertex separation. By the same lemma we obtain: Lemma 2. Let Ì be a tree with µ. Then at most one vertex in Ì is -critical. The following labelling technique has been introduced in [7]. Similar methods were used in [21, 5, 15]. Definition 2. Let Ì be a tree rooted at Ù with µ ½. A list of integers Ð ½ ¾ Ô µ with ½ ¾ Ô ¼ is a label of Ù if there is a set of vertices Ú ½ Ú Ô ½ Ú Ô Ù in Ì such that (i) For ½ Ô, Ù Ú ½ Ú µ ½, (ii) For ½ Ô, Ú is a -critical vertex in Ì Ù Ú ½ Ú ½, (iii) either Ú Ô Ùµ is the Ô -critical vertex in Ì Ù Ú ½ Ú Ô ½ or there is no Ô - critical vertex in Ì Ù Ú ½ Ú Ô ½. We call Ú ½ Ú Ô ½ Ú Ô Ùµ the vertices corresponding to Ð. Notice that the vertex separation of Ì is the largest integer occurring in Ð. If Ú is - critical ( -noncritical) in Ì Ù Ú ½ Ú ½ then we say that is critical (noncritical) in Ð. By definition all Ú are critical in Ð except possibly Ú Ô Ùµ. By Lemma 2 it is easy to see that the label Ð and the vertices corresponding to Ð are unique. Lemma 3. Let Ì be a tree rooted at Ù. The label Ð of Ù and the vertices corresponding to Ð are unique. Let Ì be a tree rooted at Ù. In [7] a linear algorithm is given computing the label Ð of Ù. Since the vertex separation is the largest integer occurring in Ð this algorithm also computes the vertex separation of Ì in linear time. The idea of the algorithm is to compute Ð bottom up. Let Ù ½ Ù be the sons of Ù and Ð the label of Ù in Ì Ù for ½. The label Ð is computed by recursively computing the labels Ð and then by combining them. By definition the label of the leaves is ¼µ. It is interesting to note that by the computation of Ð some of the old labels Ð ½ Ð must be destroyed. However the computation of an optimal layout of Ì is more complicated. The best known algorithm needs Ç Ò ÐÓ Òµ time [7] where it was stated as an open question whether or not there exists an Ç Òµ layout algorithm. In the following we give an affirmative answer. 3 Optimal layouts in linear time We establish an Ç Òµ algorithm computing optimal layouts of trees. The idea is to compute the layout of a tree by first computing the layouts of the subtrees of its root and then by combining them. First we show how to compute an optimal layout of certain trees (we call them simple trees) using the optimal layouts of its subtrees. Then we extend this to arbitrary trees. For convenience we define a layout by a list of vertices and use the concatenation operator ² of lists which makes our claims more readable.
5 3.1 Simple trees and their optimal layouts Definition 3. A tree is -simple if the label of its root is Ð µ. Let Ì be a -simple tree. Ì is called noncritical if is noncritical in Ð. Otherwise Ì is called critical. Intuitively, Ì is noncritical -simple if µ and Ì contains no -critical vertex. Ì is critical -simple if µ and the root of Ì is the (unique) -critical vertex. Notice that every noncritical ¼-simple tree is a singleton and that there are no critical ¼-simple trees. The next two lemmas are more or less consequences of Definition 3. Lemma 4. Let Ì be a noncritical -simple tree rooted at Ù. Then at most one of the subtrees of Ù in Ì is noncritical -simple and all other subtrees have vertex separation ½. Lemma 5. Let Ì be a critical -simple tree rooted at Ù. Then exactly two of the subtrees of Ù in Ì are noncritical -simple and all other subtrees have vertex separation ½. We will construct an optimal layout of a tree by efficiently combining the optimal layouts of the subtrees. In order to do so the optimal layouts of the subtrees must have a suitable form. This leads to the introduction of left extendable, right extendable, and sparse layouts. For a tree Ì let Ì Û be the tree obtained from Ì by adding a new vertex Û and an edge between Û and the root of Ì. Definition 4. Let Ä be a layout of a tree Ì. If Ì is a singleton then Ä is both left and right extendable. Otherwise Ä is left extendable if Ú Ûµ²Ä Ì Û µ Ú Ä Ì µ and right extendable if Ú Ä² Ûµ Ì Û µ Ú Ä Ì µ. Intuitively, Ä is left (right) extendable if the maximal vertex cut of Ä does not increase when we add an edge between root Ù and a new vertex Û left (right) to Ä. Definition 5. Let Ä be a layout of a tree Ì rooted at Ù. Ä is sparse if no vertices Ú and Û in Ì with Ä Úµ Ä Ùµ Ä Ûµ are adjacent in Ì. Intuitively, Ä is sparse if no vertex left to Ù is adjacent to a vertex right to Ù in Ä. Lemma 6. Every noncritical -simple tree Ì has both an optimal left extendable layout ÐÄ and an optimal right extendable layout ÖÄ. Proof. Let Ù be the root of Ì and Ù ½ Ù the sons of Ù. Let Ä be an optimal layout of the subtree Ì Ù for ½. The proof is by induction on the height of Ì. For ¼ the tree Ì is a singleton and by Definition 4 the claim is clear. For the induction step consider Ì of height ½. By Lemma 4 at most one subtree of Ù is noncritical -simple and all other subtrees have vertex separation at most ½. If no subtree of Ù is noncritical -simple then the layout of Ì in Fig. 1 µ is both optimal left and optimal right extendable. If a subtree of Ù, say Ì Ù ½, is noncritical -simple then let ÐÄ ½ be an optimal left and ÖÄ ½ an optimal right extendable layout of Ì Ù ½. Both exist by the induction hypothesis. Then the layout ÐÄ and ÖÄ of Ì in Fig. 1 µ and 1 µ is optimal left extendable and optimal right extendable, respectively.
6 ÄÑ Ö ÄÑ Ö µ ½ ¾ µ Ñ Ò ÑÖ Ñ ¼ Ö Ò ¼ Ö Ö Ù ½µ Ù ¾µ Ù ½µ Ù ¾µ Ù µ Ä Ä½ ÄÑ Ò µ ÐÄ ÖÄ Ð ÄÑÖ µ Ä ¾ µ ÐÄ µ ÖÄ Ö ÄÑÖ µ Ä Û½ Û ÛÒµ Ù Ù½ Ù¾ Ù ÐÄ ½ ÖÄÙ Ù Ù¾ Ù Ù Ù½ Ù½ Ù Ù¾ Ù Ù Û½ ÛÒµ ÐÄ Û½ ¼ ÛÒµ ¼ Ľ ľ Ä ½ ÖÄ Ä Ä¾ Ä Ä ÐĽ ÖĽ ľ Ä Ä ÐĽ Fig. 1. Optimal extendable layouts of noncritical simple trees. The thick lines represent layouts. ÖÄ Û Ì Ì ¼ Ì ½ Lemma 7. Every critical -simple tree Ì has an optimal sparse layout Ä. Ì ¾ Ì Ì Proof. Let Ù be the root of Ì and Ù ½ Ù the sons of Ù. By Lemma 5 exactly two ½µ ¾µ subtrees of Ù, say Ì Ù ½ and Ì Ù, are noncritical -simple and all other subtrees have µ vertex separation µ ½. By Lemma 6, Ì Ù ½ has an optimal right extendable layout ½ ¾ µ ÖÄ ½ and Ì Ù has anñ optimal left extendable layout ÐÄ. Let Ä be an optimal layout Ò of the subtree Ì Ù for ¾ ½. Then the layout Ä in Fig. 2 is an optimal sparse ÑÖ layout of Ì. Ñ ¼ Ö Ò ¼ Ö Ö ÄÑ Ò Ð ÄÑÖ µ Ä Ö ÄÑÖ µ Û½ Û ÛÒµ Û½ ÛÒµ Û½ ¼ ÛÒµ ¼ ÖĽ Ù½ Ù Ù¾ Ù Ù ½ ٠ľ Ä Ä ½ ÐÄ Fig. 2. Optimal sparse layouts of critical simple trees. The thick lines represent layouts. Remark 1. The proofs of the last two lemmas provide construction schemes for optimal extendable layouts of noncritical simple trees and for optimal sparse layouts of critical simple trees. For the constructions only the optimal extendable layouts of the noncritical simple subtrees and arbitrary optimal layouts of the remaining subtrees are needed. 3.2 Arbitrary trees and their optimal layouts The main idea is to partition a tree Ì into smaller simple trees and to define the coarse layout of Ì as the list of the optimal (extendable or sparse) layouts of the smaller trees. Definition 6. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let Ú ½ Ú Ô be the vertices corresponding to Ð, see Definition 2. The parts Ì, ½ Ô, of Ì are defined as follows, see Fig. 3. (i) Ì ½ is the subtree Ì Ú ½ and (ii) Ì is the subtree of Ì Ù Ú ½ Ú ½ rooted at Ú for ¾ Ô. Lemma 8. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Then every part Ì, ½ Ô, is -simple. Especially, all parts are critical except possibly Ì Ô which may be noncritical.
7 µ Ñ Ò ÑÖ Ñ ¼ Ö Ò ¼ Ö Ì Ù ½ ¾ µ Ù Ö ÄÑ Ö Ú Ú µ ÄÑ Ò Ð ÄÑÖ µ Ö ÄÑÖ µ ½µ Û½ Û ÛÒµ Û½ ÛÒµ Û½ ¼ ÛÒµ ¼ Ú½ Ú¾ ¾µ Ú½ Ì ½ Ì Ú¾ Ì ¾ Ì Fig. 3. The parts Ì of Ì Notation 1 Let Ì be a tree and Ì a -simple part of Ì. If Ì is noncritical then Ð Ä denotes an optimal left extendable and Ö Ä an optimal right extendable layout of Ì. If Ì is critical then Ä denotes an optimal sparse layout of Ì. Remember that all these layouts exist since Lemmas 6 and 7. Definition 7. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. The coarse layout of Ì is defined as Ä ½ Ä ¾ Ä Ô µ if Ô is critical in Ð Ä ½ Ä ¾ Ä Ô ½ Ð Ä Ô Ö Ä Ô µµ otherwise. The coarse layout is a flexible representation of an optimal layout. In fact, an optimal layout can be computed from the coarse layout very efficiently. In order to show this we need some new notions: The focus of a layout Ä is a distinguished vertex of Ä partitioning Ä into two sublists ÔÖ Äµ and ٠ĵ. The prefix of Ä, ÔÖ Äµ, consists of the focus and the vertices of Ä which are left to the focus. The suffix of Ä, ٠ĵ, consists of the vertices of Ä which are right to the focus. Given two layouts Ä and Ä ¼ and their focuses, the layout Ä Ä ¼ is defined by Ä Ä ¼ ÔÖ Äµ²Ä ¼ ² ٠ĵ. The focus of Ä Ä ¼ is the focus of Ä ¼. Notice that operation is associative in the computation of both layouts and their focuses. We will apply only on layouts of simple trees. The focus of a layout of a simple tree is defined as the root of the simple tree. Lemma 9. Let Ì be a tree and Ð ½ ¾ Ô µ the label of its root. (i) If Ô is critical in Ð then Ä Ä ½ Ä ¾ Ä Ô is an optimal layout of Ì, (ii) If Ô is not critical in Ð then Ä Ä ½ Ä Ô ½ Ð Ä Ô is an optimal layout of Ì. Now we are going to show how to compute a coarse layout of a tree using the coarse layouts of its subtrees. The following lemma is important. Lemma 10. Let Ì be a tree rooted at Ù, Ð ½ ¾ Ô µ the label of Ù, and Ù ½ Ù the sons of Ù. (i) The simple parts Ì ½ Ì ¾ Ì Ô ½ of Ì are exactly the simple parts of Ì Ù ½, Ì Ù with vertex separation larger than Ô,
8 (ii) No subtree Ì Ù, ½, has a critical Ô -simple part. From Lemma 10 we directly obtain: Lemma 11. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let ½ be the coarse layouts of the subtrees of Ù. The components of ½ with vertex separation larger than Ô can be adopted as the first Ô ½ components Ä ½ Ä ¾ Ä Ô ½ of a coarse layout of Ì. Given the layouts Ä ½ Ä ¾ Ä Ô ½ they must be sorted according to the integers ½ Ô ½ for the construction of a coarse layout of Ì. In order to sort as less elements as possible we first find the subtree of Ù with the largest vertex separation, say Ì Ù. Then we find a large prefix of the coarse layout of Ì Ù which is also a prefix of the coarse layout of Ì. The layouts of this prefix need not be sorted because they are already sorted in the coarse layout of Ì Ù. The next lemma shows how to find such a prefix which is large enough for our later complexity considerations. Lemma 12. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let Ù ½ Ù be the sons of Ù and Ð be the label of Ù in Ì Ù for ½. Let Ð Ñ ½ Ñ ¾ Ñ Ö µ be the largest and Ð Ò ½ Ò ¾ Ò µ the second largest label over all Ð, where largest means containing the largest element. Then ½ ¾ µ Ñ ½ Ñ ¾ Ñ µ where is the largest index ½ Ö ½ with Ñ Ñ Ü Ñ ½ Ò ½ ½. Hence the first components of the coarse layout of Ì Ù can be adopted as the first components of the coarse layout of Ì. Next we show how to compute the last component Ä Ô or Ð Ä Ô Ö Ä Ô µ of the coarse layout of Ì. Lemma 13. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. If the last component Ô of Ð, the information whether Ô is critical in Ð, and the coarse layouts of the subtrees of Ù are given then the last component of the coarse layout of Ì is computable. Proof. Let be the coarse layout of Ì, Ù ½ Ù the sons of Ù, and the coarse layouts of the subtrees Ì Ù for ½. Let ¼ be the list obtained from by removing all layout components with vertex separation larger than Ô. By Lemma 10 µ the lists ¼ are the coarse layouts of the subtrees of Ù in Ì Ô. There are two cases: Case 1: Ì Ô is noncritical Ô -simple. We have to compute Ð Ä Ô and Ö Ä Ô. Assume that Ù has a noncritical Ô -simple subtree in Ì Ô, say Ì Ô Ù ½ (otherwise the proof is similar). By Remark 1 we need the optimal (left and right) extendable layouts of Ì Ô Ù ½ and the optimal layouts of the other subtrees Ì Ô Ù, ¾. The optimal extendable layouts are in the (only) component of ¼ ½ and the optimal layouts of the other subtrees can be computed from ¼, ½, using Lemma 9. Case 2: Ì Ô is critical Ô -simple. We have to compute an optimal sparse layout Ä Ô of Ì Ô. Without loss of generality let Ì Ô Ù ½ and Ì Ô Ù be the noncritical Ô -simple subtrees of Ù in Ì Ô. By Remark 1 we need the optimal extendable layouts of Ì Ô Ù ½
9 and Ì Ô Ù and the optimal layouts of the other subtrees Ì Ô Ù, ¾ ½. The optimal extendable layouts are in the components of ¼ and ½ ¼ ¾. The optimal layouts of the other subtrees can be computed from ¼, ¾ ½, using Lemma Linear time layout Algorithm We assume that every vertex Ù of Ì is marked by the last element Ô of the label Ð ½ Ô µ of Ù in Ì Ù and by an indicator whether or not Ô is critical in Ð. Our layout algorithm first recursively computes the coarse layouts of the subtrees of Ù. Then using the mark of Ù and the coarse layouts of the subtrees of Ù it computes the coarse layout of Ì Ù. At the end an optimal layout of Ì is computed from the coarse layout of Ì. To achieve linear time we need a suitable representation of the coarse layouts based on the following representation of the labels given in [7]. A label is a list of blocks, where a block contains consecutive integers and is represented by an interval consisting of the endpoints of the block in decreasing order. For example the label Ð ¾ ¼µ is represented by Ð µ ¾µ ¼ ¼µµ. Let Ð Ñ ½ Ò ½ µ Ñ ¾ Ò ¾ µ Ñ Ö ½ Ò Ö ½ µ Ñ Ö Ò Ö µµ be the representation of the label of Ù in Ì Ù where Ñ Ö Ò Ö ; otherwise we split the last interval Ñ Ö Ò Ö µ into two intervals Ñ Ö Ò Ö ½µ and Ò Ö Ò Ö µ. The coarse layout of Ì Ù is represented by a list of Ö records, one for every interval Ñ Ò µ. The first Ö ½ records consist of four fields. Two fields are of type integer and two are pointers. For ½ Ö ½ the first field of the -th record is reserved for Ñ, the second for Ò, the third for a pointer to the layout ÄÑ Ò ÄÑ ÄÑ ½ ÄÒ, and the fourth for a pointer to the focus of ÄÑ Ò. For the last Ö-th record there are two cases. If Ñ Ö is critical in Ð then the Ö-th record has the same structure as before, but now both integer fields are reserved for Ñ Ö since in this case Ñ Ö Ò Ö. If Ñ Ö is not critical in Ð then the Ö-th record has two additional fields which are pointers. Here the first two integer fields are reserved for Ñ Ö, the third field is reserved for a pointer to Ð ÄÑÖ, the fourth for a pointer to the focus of Ð ÄÑÖ, the fifth for a pointer to Ö ÄÑÖ and the sixth for a pointer to the focus of Ö ÄÑÖ. This data structure allows the computation of the prefix and suffix of a layout in constant time. Now we present our layout algorithm. function ÓÔØ Ñ Ð Ð ÝÓÙØ Ì ØÖ Ù ÖÓÓص Ð ÝÓÙØ; ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ; Compute optimal layout Ä from according to Lemma 9 return Ä; function ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì ØÖ Ù ÖÓÓص Ó Ö Ð ÝÓÙØ; Let Ù be the root of Ì if (Ì contains only Ù) then ¼ ¼ Ùµ Ù Ùµ Ùµµ; return else Let Ù ½ Ù be the sons of Ù in Ì ; for all Ù do ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ; return ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ;
10 function ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù Ú ÖØ Ü ½ Ó Ö Ð ÝÓÙص Ó Ö Ð ÝÓÙØ; Let Ø be the coarse layout of the subtree of Ù with the largest vertex separation 1: Excise prefix Ø from Ø according to Lemma 12; Let Ô be the mark of Ù 2: Ê list containing all records Ñ Ò µ of ½ with Ñ Ô ; 3: Sort all records of Ê according to their first integer fields; 4: Compact Ê by replacing all consecutive records Ñ Ò µ Ñ ½ Ò ½ ½ ½ µ Ñ Ö Ò Ö Ö Ö µ with Ò Ñ ½ ½ for Ö by the record Ñ Ò Ö µ, where ½ Ö and Ö ; 5: Compute the last component of according to Lemma 13, using the mark of Ù; 6: Ø ²Ê²; return ; Lemma 14. Given an input tree Ì ÓÑÔÙØ Ó Ö Ð ÝÓÙØ correctly computes the representation of a coarse layout of Ì. Proof. Let Ù be the root of Ì, Ù ½ Ù the sons of Ù and Ð ½ ¾ Ô µ the label of Ù. The proof is by induction on the height of Ì. For ¼, Ì consists only of the root Ù. In this case ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ results in ¼ ¼ Ùµ Ù Ùµ Ùµµ and the claim trivially holds. Now let Ì be of height ½. By the induction hypothesis ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ correctly computes the representations of the coarse layouts of Ì Ù. We show that Ø ²Ê² computed in step is a correct representation of the coarse layout of Ì. By Lemma 12, Ø computed in step ½ can be adopted as the prefix of. Now consider the list Ê computed in step ¾. First observe that no has a record Ñ Ò µ with Ñ Ô Ò, otherwise subtree Ì Ù would have a critical Ô - simple part which contradicts to Lemma 10 µ. That means the records of Ê include exactly those layout components of the coarse layouts of the subtrees which have vertex separation larger than Ô. Now, by Lemma 11 and the associativity of, Ê after sorting in step, and compacting in step can be adopted from. Finally, by Lemma 13 and the associativity of, the record computed in step can be adopted as the last record of. Hence Ø ²Ê² is a correct representation of the coarse layout of Ì. By Lemma 14, Lemma 9 and the associativity of we conclude: Theorem 2. The function ÓÔØ Ñ Ð Ð ÝÓÙØ correctly computes an optimal layout of an input tree. Next we show that the time complexity of our algorithm is linear. Lemma 15. Let Ì be a tree rooted at Ù and Ù ½ Ù the sons of Ù. Let, ½, be the representation of a coarse layout of Ì Ù. Let be the th largest vertex separation of the subtrees of Ù. The time required by ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ to compute the representation of the coarse layout of Ì is Ç ¾ ¾ µ, where ½ does not appear and ¾ appears twice.
11 Proof. First observe that Ù µ is the integer in the first field of the first record of. The time required in step ½ is Ç ¾ ½µ. We only need to search Ø from the right to the left until we find the first consecutive records Ñ Ò µ and Ñ ½ Ò ½ ½ ½ µ with Ò Ñ Ü Ñ ½ ¾ ½, see also Lemma 12. Step ¾ takes time linear in the number of the records in ½, i.e., time Ç ¾ ¾ µ (note that Ø is removed from Ø ). In step the sorting of the records of Ê according to the integers in their first fields can be done in Ç ¾ ½µ using bucket sort. To see this observe that these integers are µ all ¾ except possibly one (this would occur in the first field of the first record of Ø ) and µ all pairwise different since Lemma 10 µ. The time required in step is Ç ¾ ½µ since Ê contains at most ¾ ½ records. Step clearly can be done in Ç ¾ ¾ µ. Finally step takes constant time. Hence the execution time of ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ is Ç ¾ ¾ µ. Let Ì be a tree, Ù a vertex in Ì, and an integer. Let Õ Ù be the number of the vertices Ú in Ì Ù having a brother Ú ¼ such that Ú µ Ú ¼ µ. In a similar way as in the proof of Lemma ½ from [7] we can prove the next lemma. Lemma 16. Let Ì be a tree rooted at Ù. The time required by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ È µ Ì Ùµ is Ò Õ Ù µ where is a constant and Ò the size of Ì. Proof. Let Ù ½ Ù be the sons of Ù. The proof is by induction on the height of Ì. For ¼, ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ needs time ½ where ½ is the time needed by ¼ ¼ Ùµ Ù Ùµ Ùµµ. Hence the claim holds for every ½. Now consider Ì of height ½. The time needed by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ is the time Ø ½ needed by ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ plus the time Ø ¾ needed by the calls ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ, ½. By Lemma 15 and the induction hypothesis we have Ø ½ Ø ¾ ¾ ¾ ¾ µ È È Ù µ Ò Õ Ù µ, where Ò is the size of Ì Ù. Moreover it is easy to verify that ½ ¾ ¾ Ø ½ Ø ¾ ½ È ½ È Ù µ Õ Ù È µ È È Ò µ ¾ ¾ È µ Ò Õ Ù µ and the proof is complete. The following has been proved in [7], page 77. Õ Ù. Defining Ñ Ü ½ ¾ we get ½ È Ù µ È µ Õ Ù µ Ò Õ Ù È µ Lemma 17. Let Ì be a tree rooted at Ù. Then Õ Ù Ò where Ò is the size of Ì. By Lemmas 16 and 17 we obtain: Lemma 18. The time required by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ is linear in the size of Ì.
12 By Corollary 1 a coarse layout of Ì contains at most ÐÓ Ò records, where Ò is the size of Ì. Hence given a coarse layout the computation of an optimal layout according to Lemma 9 takes at most Ç ÐÓ Òµ time. This and Lemma 18 imply our last theorem. Theorem 3. The time complexity of the function ÓÔØ Ñ Ð Ð ÝÓÙØ is linear in the size of the input tree. References [1] H. Bodlaender. A linear time algorithm for finding tree-decompositions of small treewidth. SIAM J. Comput., 25(6): , [2] H. Bodlaender and T. Kloks. Efficient and constructive algorithms for the pathwidth and treewidth of graphs. J. Algorithms, 21: , [3] H. Bodlaender, T. Kloks, and D. Kratsch. Treewidth and pathwidth of permutation graphs. SIAM J. Disc. Math., 8: , [4] H. Bodlaender and R. Möhring. The pathwidth and treewidth of cographs. SIAM J. Disc. Math., 6: , [5] M. Chung, F. Makedon, I. Sudborough, and J. Turner. Polynomial algorithms for the mincut linear arrangement problem on degree restricted trees. SIAM J. Comput., 14(1): , [6] S. Cook and R. Sethi. Storage requirements for deterministic polynomial finite recognizable languages. J. Comput. System Sci., 13:25 37, [7] J. Ellis, I. Sudborough, and J. Turner. The vertex separation and search number of a graph. Inform. Comput., 113:50 79, [8] J. Gustedt. On the pathwidth of chordal graphs. Disc. Appl. Math., 45: , [9] N. Kinnersley. The vertex separation number of a graph equals its path-width. Inform. Process. Lett., 142: , [10] L. Kirousis and C. Papadimitriou. Interval graphs and searching. Disc. Math., 55: , [11] L. Kirousis and C. Papadimitriou. Searching and pebbling. Theor. Comp. Science, 47: , [12] A. LaPaugh. Recontamination does not help to search a graph. J. Assoc. Comput. Mach., 40(2): , [13] T. Lengauer. Black-white pebbles and graph separation. Acta Informat., 16: , [14] F. Makedon and I. Sudborough. On minimizing width in linear layouts. Disc. Appl. Math., 23: , [15] N. Megiddo, S. Hakimi, M. Garey, D. Johnson, and C. Papadimitriou. The complexity of searching a graph. J. Assoc. Comput. Mach., 35(1):18 44, [16] R. H. Möhring. Graph problems related to gate matrix layout and PLA folding. In E. Mayr, H. Noltmeier, and M. Syslo, editors, Computational Graph Theory, pages Springer Verlag, [17] F. Monien and I. Sudborough. Min cut is NP-complete for edge weighted trees. Theor. Comp. Science, 58: , [18] T. Parsons. Pursuit-evasion in a graph. In Y. Alavi and D. Lick, editors, Theory and Applications of Graphs, pages Springer-Verlag, New York/Berlin, [19] N. Robertson and P. Seymour. Graph minors. I. Excluding a forest. J. Comb. Theory Series B, 35:39 61, [20] N. Robertson and P. Seymour. Disjoint paths A servey. SIAM J. Alg. Disc. Meth., 6: , [21] M. Yannakakis. A polynomial algorithm for the min-cut linear arrangement of trees. J. Assoc. Comput. Mach., 32(4): , 1985.
Necessary edges in k-chordalizations of graphs
Necessary edges in k-chordalizations of graphs Hans L. Bodlaender Abstract In this note, we look at which edges must always be added to a given graph G = (V, E), when we want to make it a chordal graph
More informationParameterized graph separation problems
Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationAn Effective Upperbound on Treewidth Using Partial Fill-in of Separators
An Effective Upperbound on Treewidth Using Partial Fill-in of Separators Boi Faltings Martin Charles Golumbic June 28, 2009 Abstract Partitioning a graph using graph separators, and particularly clique
More informationChordal deletion is fixed-parameter tractable
Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It
More informationDesigning Networks Incrementally
Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying
More informationarxiv: v1 [cs.dm] 21 Dec 2015
The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey
More informationMixed search number and linear-width of interval and split graphs
Mixed search number and linear-width of interval and split graphs Fedor V. Fomin Pinar Heggernes Rodica Mihai August 9, 2007 Abstract We show that the mixed search number and the linear-width of interval
More informationVLSI Layouts and DNA Physical Mappings Michael J. Dinneen Computer Research and Applications Los Alamos National Laboratory Los Alamos, N.M I
VLSI Layouts and DNA Physical Mappings Michael J. Dinneen Computer Research and Applications Los Alamos National Laboratory Los Alamos, N.M. 87545 1 Introduction In this short note, we show that an important
More informationSFU CMPT Lecture: Week 8
SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing
More informationPLANAR GRAPH BIPARTIZATION IN LINEAR TIME
PLANAR GRAPH BIPARTIZATION IN LINEAR TIME SAMUEL FIORINI, NADIA HARDY, BRUCE REED, AND ADRIAN VETTA Abstract. For each constant k, we present a linear time algorithm that, given a planar graph G, either
More informationCOLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES
Volume 2, Number 1, Pages 61 66 ISSN 1715-0868 COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES MARCIN KAMIŃSKI AND VADIM LOZIN Abstract. Vertex and edge colorability are two graph problems
More informationColoring edges and vertices of graphs without short or long cycles
Coloring edges and vertices of graphs without short or long cycles Marcin Kamiński and Vadim Lozin Abstract Vertex and edge colorability are two graph problems that are NPhard in general. We show that
More informationSearch problems on 1-skeletons of regular. Abstract. For pursuit-evasion games played on 1-skeletons of regular polyhedrons
Search problems on 1-skeletons of regular polyhedrons F.V. Fomin P.A. Golovach y N.N. Petrov z Abstract For pursuit-evasion games played on 1-skeletons of regular polyhedrons some problems of nding the
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationA Comparison of Structural CSP Decomposition Methods
A Comparison of Structural CSP Decomposition Methods Georg Gottlob Institut für Informationssysteme, Technische Universität Wien, A-1040 Vienna, Austria. E-mail: gottlob@dbai.tuwien.ac.at Nicola Leone
More informationMonotonicity in Graph Searching
JOURNAL OF ALGORITHMS 12, 239-245 (1991) Monotonicity in Graph Searching D. BIENSTOCK* ANDPAULSEYMOUR Bellcore, 445 South Street, Morristown, New Jersey 07960 Received May 1988; accepted November 1990
More informationGraphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405
Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationSFU CMPT Lecture: Week 9
SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal
More informationVertex Cover is Fixed-Parameter Tractable
Vertex Cover is Fixed-Parameter Tractable CS 511 Iowa State University November 28, 2010 CS 511 (Iowa State University) Vertex Cover is Fixed-Parameter Tractable November 28, 2010 1 / 18 The Vertex Cover
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationParameterized coloring problems on chordal graphs
Parameterized coloring problems on chordal graphs Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary dmarx@cs.bme.hu
More informationOn the Performance of Greedy Algorithms in Packet Buffering
On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,
More informationOn Structural Parameterizations of the Matching Cut Problem
On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,
More informationA General Greedy Approximation Algorithm with Applications
A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationFrom Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols
From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationLecture Notes on GRAPH THEORY Tero Harju
Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................
More informationA New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees
A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees Kedar Dhamdhere ½ ¾, Srinath Sridhar ½ ¾, Guy E. Blelloch ¾, Eran Halperin R. Ravi and Russell Schwartz March 17, 2005 CMU-CS-05-119
More informationEmbedded Width, A Variation of Treewidth for Planar Graphs
Embedded Width, A Variation of Treewidth for Planar Graphs Robert Weber Advisor: Glencora Borradaile Abstract A commonly studied property of graphs is treewidth, a measure of how tree-like a graph is.
More informationGraph Traversal. 1 Breadth First Search. Correctness. find all nodes reachable from some source node s
1 Graph Traversal 1 Breadth First Search visit all nodes and edges in a graph systematically gathering global information find all nodes reachable from some source node s Prove this by giving a minimum
More informationEfficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms
Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationOptimal Time Bounds for Approximate Clustering
Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract
More informationAn exact algorithm for max-cut in sparse graphs
An exact algorithm for max-cut in sparse graphs F. Della Croce a M. J. Kaminski b, V. Th. Paschos c a D.A.I., Politecnico di Torino, Italy b RUTCOR, Rutgers University c LAMSADE, CNRS UMR 7024 and Université
More informationExponential time algorithms for the minimum dominating set problem on some graph classes
Exponential time algorithms for the minimum dominating set problem on some graph classes Serge Gaspers University of Bergen Department of Informatics N-500 Bergen, Norway. gaspers@ii.uib.no Dieter Kratsch
More informationExternal-Memory Breadth-First Search with Sublinear I/O
External-Memory Breadth-First Search with Sublinear I/O Kurt Mehlhorn and Ulrich Meyer Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany. Abstract. Breadth-first search
More informationEdge Eavesdropping Games
Edge Eavesdropping Games Amos Beimel 1, and Matthew Franklin 2, 1 Department of Computer Science, Ben-Gurion University. 2 Department of Computer Science, University of California, Davis. Abstract. Motivated
More informationDirected Single Source Shortest Paths in Linear Average Case Time
Directed Single Source Shortest Paths in inear Average Case Time Ulrich Meyer MPI I 2001 1-002 May 2001 Author s Address ÍÐÖ ÅÝÖ ÅܹÈÐÒ¹ÁÒ ØØÙØ ĐÙÖ ÁÒÓÖÑØ ËØÙÐ ØÞÒÙ Û ½¾ ËÖÖĐÙÒ umeyer@mpi-sb.mpg.de www.uli-meyer.de
More informationThe Disjoint Paths Problem on Chordal Graphs
The Disjoint Paths Problem on Chordal Graphs Frank Kammer and Torsten Tholey Institut für Informatik, Universität Augsburg, D-86135 Augsburg, Germany {kammer,tholey}@informatik.uni-augsburg.de Abstract.
More informationMinimal comparability completions of arbitrary graphs
Minimal comparability completions of arbitrary graphs Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment of directions to its
More informationDominating Set on Bipartite Graphs
Dominating Set on Bipartite Graphs Mathieu Liedloff Abstract Finding a dominating set of minimum cardinality is an NP-hard graph problem, even when the graph is bipartite. In this paper we are interested
More informationResponse Time Analysis of Asynchronous Real-Time Systems
Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340
More information9 About Intersection Graphs
9 About Intersection Graphs Since this lecture we focus on selected detailed topics in Graph theory that are close to your teacher s heart... The first selected topic is that of intersection graphs, i.e.
More informationPreprocessing for treewidth
Preprocessing for treewidth Bodlaender, H.L.; Jansen, B.M.P.; Kratsch, S. Published in: arxiv Published: 21/04/2011 Please check the document version of this publication: A submitted manuscript is the
More informationFOUR EDGE-INDEPENDENT SPANNING TREES 1
FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem
More informationOptimal Static Range Reporting in One Dimension
of Optimal Static Range Reporting in One Dimension Stephen Alstrup Gerth Stølting Brodal Theis Rauhe ITU Technical Report Series 2000-3 ISSN 1600 6100 November 2000 Copyright c 2000, Stephen Alstrup Gerth
More informationBipartite Roots of Graphs
Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only
More informationGraphs and Discrete Structures
Graphs and Discrete Structures Nicolas Bousquet Louis Esperet Fall 2018 Abstract Brief summary of the first and second course. É 1 Chromatic number, independence number and clique number The chromatic
More informationVertex 3-colorability of claw-free graphs
Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,
More informationMaking arbitrary graphs transitively orientable: Minimal comparability completions
Making arbitrary graphs transitively orientable: Minimal comparability completions Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment
More informationNOTE ON MINIMALLY k-connected GRAPHS
NOTE ON MINIMALLY k-connected GRAPHS R. Rama a, Suresh Badarla a a Department of Mathematics, Indian Institute of Technology, Chennai, India ABSTRACT A k-tree is either a complete graph on (k+1) vertices
More informationFixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth
Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth Micha l Pilipczuk Institute of Informatics, University of Warsaw, Poland Workshop on Exact Algorithms and Lower
More informationOn 2-Subcolourings of Chordal Graphs
On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring
More informationarxiv: v1 [cs.ds] 8 Jan 2019
Subset Feedback Vertex Set in Chordal and Split Graphs Geevarghese Philip 1, Varun Rajan 2, Saket Saurabh 3,4, and Prafullkumar Tale 5 arxiv:1901.02209v1 [cs.ds] 8 Jan 2019 1 Chennai Mathematical Institute,
More informationExpected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem
Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Frank Neumann Institut für Informatik und Praktische Mathematik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany fne@informatik.uni-kiel.de
More informationQueue Layouts, Tree-Width, and Three-Dimensional Graph Drawing
Queue Layouts, Tree-Width, and Three-Dimensional Graph Drawing David R. Wood School of Computer Science Carleton University Ottawa, Canada Ú Û º ÖÐ ØÓÒº Abstract. A three-dimensional (straight-line grid)
More informationOn-line multiplication in real and complex base
On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR 7089 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks
More informationDecreasing the Diameter of Bounded Degree Graphs
Decreasing the Diameter of Bounded Degree Graphs Noga Alon András Gyárfás Miklós Ruszinkó February, 00 To the memory of Paul Erdős Abstract Let f d (G) denote the minimum number of edges that have to be
More informationOn the subgraphs of the (2 )-grid
R u t c o r Research R e p o r t On the subgraphs of the (2 )-grid Josep Díaz a Marcin Kamiński b Dimitrios M. Thilikos c RRR 18 2007, May 2007 RUTCOR Rutgers Center for Operations Research Rutgers University
More informationA generalization of Mader s theorem
A generalization of Mader s theorem Ajit A. Diwan Department of Computer Science and Engineering Indian Institute of Technology, Bombay Mumbai, 4000076, India. email: aad@cse.iitb.ac.in 18 June 2007 Abstract
More informationAn Abstraction Algorithm for the Verification of Level-Sensitive Latch-Based Netlists
An Abstraction Algorithm for the Verification of Level-Sensitive Latch-Based Netlists Jason Baumgartner ½, Tamir Heyman ¾, Vigyan Singhal, and Adnan Aziz ½ IBM Enterprise Systems Group, Austin, Texas 78758,
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationComplexity Results on Graphs with Few Cliques
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School
More informationChordal graphs MPRI
Chordal graphs MPRI 2017 2018 Michel Habib habib@irif.fr http://www.irif.fr/~habib Sophie Germain, septembre 2017 Schedule Chordal graphs Representation of chordal graphs LBFS and chordal graphs More structural
More informationOptimization Problems in Dotted Interval Graphs
Optimization Problems in Dotted Interval Graphs Danny Hermelin hermelin@mpi-inf.mpg.de Julián Mestre mestre@it.usyd.edu.au March 1, 2012 Dror Rawitz rawitz@eng.tau.ac.il Abstract The class of D-dotted
More informationPaths, Flowers and Vertex Cover
Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is
More informationImproved algorithms for constructing fault-tolerant spanners
Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.
More informationarxiv: v5 [cs.dm] 9 May 2016
Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph
More informationKernelization Upper Bounds for Parameterized Graph Coloring Problems
Kernelization Upper Bounds for Parameterized Graph Coloring Problems Pim de Weijer Master Thesis: ICA-3137910 Supervisor: Hans L. Bodlaender Computing Science, Utrecht University 1 Abstract This thesis
More informationThe problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can
A Simple Cubic Algorithm for Computing Minimum Height Elimination Trees for Interval Graphs Bengt Aspvall, Pinar Heggernes, Jan Arne Telle Department of Informatics, University of Bergen N{5020 Bergen,
More informationThe self-minor conjecture for infinite trees
The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper
More informationFully dynamic algorithm for recognition and modular decomposition of permutation graphs
Fully dynamic algorithm for recognition and modular decomposition of permutation graphs Christophe Crespelle Christophe Paul CNRS - Département Informatique, LIRMM, Montpellier {crespell,paul}@lirmm.fr
More informationStructure and Complexity in Planning with Unary Operators
Structure and Complexity in Planning with Unary Operators Carmel Domshlak and Ronen I Brafman ½ Abstract In this paper we study the complexity of STRIPS planning when operators have a single effect In
More informationAnalysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two
Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada
More informationAPPROXIMATION ALGORITHMS FOR TREEWIDTH. Keywords: Treewidth, Triangulation, Tree Decomposition, Network Flow.
APPROXIMATION ALGORITHMS FOR TREEWIDTH EYAL AMIR COMPUTER SCIENCE DEPARTMENT UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN URBANA, IL 61801, USA EYAL@CS.UIUC.EDU Abstract. This paper presents algorithms whose
More informationA Note on Karr s Algorithm
A Note on Karr s Algorithm Markus Müller-Olm ½ and Helmut Seidl ¾ ½ FernUniversität Hagen, FB Informatik, LG PI 5, Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de ¾ TU München,
More informationChordal deletion is fixed-parameter tractable
Chordal deletion is fixed-parameter tractable Dániel Marx Department of Computer Science and Information Theory Budapest University of Technology and Economics Budapest H-1521 Hungary dmarx@cs.bme.hu Abstract.
More informationKey words. graph algorithms, chromatic number, circular arc graphs, induced cycles
SIAM J. COMPUT. Vol. 0, No. 0, pp. 000 000 c XXXX Society for Industrial and Applied Mathematics REVISITING TUCKER S ALGORITHM TO COLOR CIRCULAR ARC GRAPHS MARIO VALENCIA-PABON Abstract. The circular arc
More informationGeneralized Pebbling Number
International Mathematical Forum, 5, 2010, no. 27, 1331-1337 Generalized Pebbling Number A. Lourdusamy Department of Mathematics St. Xavier s College (Autonomous) Palayamkottai - 627 002, India lourdugnanam@hotmail.com
More informationConnectivity and Inference Problems for Temporal Networks
Connectivity and Inference Problems for Temporal Networks (Extended Abstract for STOC 2000) David Kempe Jon Kleinberg Ý Amit Kumar Þ October, 1999 Abstract Many network problems are based on fundamental
More informationRecitation 4: Elimination algorithm, reconstituted graph, triangulation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation
More informationEncoding/Decoding, Counting graphs
Encoding/Decoding, Counting graphs Russell Impagliazzo and Miles Jones Thanks to Janine Tiefenbruck http://cseweb.ucsd.edu/classes/sp16/cse21-bd/ May 13, 2016 11-avoiding binary strings Let s consider
More informationDisjoint, Partition and Intersection Constraints for Set and Multiset Variables
Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM, Montpelier, France. Ö Ð ÖÑÑ Ö Cork
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationCleaning an Arbitrary Regular Network with Mobile Agents
Cleaning an Arbitrary Regular Network with Mobile Agents Paola Flocchini, Amiya Nayak and Arno Schulz School of Information Technology and Engineering University of Ottawa 800 King Edward Avenue Ottawa,
More informationSome Remarks on the Geodetic Number of a Graph
Some Remarks on the Geodetic Number of a Graph Mitre C. Dourado 1, Fábio Protti 2, Dieter Rautenbach 3, and Jayme L. Szwarcfiter 4 1 ICE, Universidade Federal Rural do Rio de Janeiro and NCE - UFRJ, Brazil,
More informationThread graphs, linear rank-width and their algorithmic applications
Thread graphs, linear rank-width and their algorithmic applications Robert Ganian Faculty of Informatics, Masaryk University Botanická 68a, Brno, Czech Republic xganian1@fi.muni.cz Abstract. Many NP-hard
More informationFEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria
FEDOR V. FOMIN Lectures on treewidth The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria Why treewidth? Very general idea in science: large structures can be understood by breaking
More informationSolving NP-hard Problems on Special Instances
Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances
More informationA more efficient algorithm for perfect sorting by reversals
A more efficient algorithm for perfect sorting by reversals Sèverine Bérard 1,2, Cedric Chauve 3,4, and Christophe Paul 5 1 Département de Mathématiques et d Informatique Appliquée, INRA, Toulouse, France.
More informationEmbedding a graph-like continuum in some surface
Embedding a graph-like continuum in some surface R. Christian R. B. Richter G. Salazar April 19, 2013 Abstract We show that a graph-like continuum embeds in some surface if and only if it does not contain
More informationThe Online Median Problem
The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas
More informationEfficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs
Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs Kazuhiro Kurita 1, Kunihiro Wasa 2, Hiroki Arimura 1, and Takeaki Uno 2 1 IST, Hokkaido University, Sapporo, Japan 2 National
More information