Computing optimal linear layouts of trees in linear time

Size: px
Start display at page:

Download "Computing optimal linear layouts of trees in linear time"

Transcription

1 Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, Passau, Germany, Abstract. We present a linear time algorithm which, given a tree, computes a linear layout optimal with respect to vertex separation. As a consequence optimal edge search strategies, optimal node search strategies, and optimal interval augmentations can be computed also in Ç Òµ for trees. This improves the running time of former algorithms from Ç Ò ÐÓ Òµ to Ç Òµ and answers two related open questions raised in [7] and [15]. 1 1 Introduction The vertex separation of graphs has been introduced in [13] in the form of a vertex separator game. It is an important concept with theoretical and practical value. Its closer relation to the black-white pebble game of [6] constitutes the theoretical value in complexity theory. Applications in certain layout problems as Weinberger arrays, gate matrix layout, and PLA-folding constitute the practical value in VLSI, see [16]. The vertex separation of a graph can be defined using linear layouts, see [7]. A linear layout, or simply a layout, Ä of a graph is a permutation of the vertices of. Intuitively Ä describes how the vertices are to be laid out along a horizontal line. The -th vertex cut of Ä defines how many of the first vertices in Ä are adjacent to a vertex lying right to the -th vertex in Ä. The vertex separation of Ä is the maximum over all vertex cuts of Ä. The vertex separation of a graph, Ú µ, is the minimum vertex separation of its layouts. Ä is optimal if its vertex separation is Ú µ and therefore as small as possible. Recently the vertex separation of a graph has received more attention due to its closer relation to several well known graph parameters as edge search number, node search number, interval thickness, and path-width. Edge searching has been introduced in [18]. We regard the edges of a graph as pipes contaminated by a gas. A team of searchers (clearers) has to clear all edges of. To do so the team has to find an edge search strategy which is a sequence of the following activities: µ place a searcher on a vertex as a guard, µ remove a searcher from a vertex, and µ slide a searcher along an edge. A contaminated edge becomes cleared if one of its endpoints is guarded and a searcher slides along the edge from the guarded endpoint to the other endpoint of the edge. In [12] it has been shown that recontamination can be disallowed without increasing the search number of any graph. The edge search number of, µ, is the minimum number of the searchers needed 1 It should be clear that there are some published papers in which similar results are claimed. Later it turned out that the suggested algorithms do not run in Ç Òµ as stated but in Ç Ò ÐÓ Òµ.

2 to clear. An edge search strategy of is optimal if it needs the smallest possible number of searchers (this number is µ). Node searching is another version of graph searching and has been introduced in [11]. In this slightly different version the third activity of the edge searching disappears. An edge is cleared once both endpoints are simultaneously guarded by searchers. The node search number of is denoted by Ò µ. Interval thickness has been introduced in [10]. Given a set of intervals Á of the real line the interval graph of Á is obtained by representing every interval by a vertex and every intersection of two intervals by an edge between their corresponding vertices. The interval thickness of a graph, µ, is the smallest maximum clique over all interval supergraphs of. An interval set Á is an optimal interval augmentation of if the interval graph À of Á is a supergraph of and the maximum clique of À has the smallest possible size µ. Path-width has been introduced in [19, 20]. The path-decomposition of a graph is a sequence ½ ¾ Ö of vertex subsets of, such that µ every edge of has both ends in some set and µ if a vertex of occurs in some sets and,, then the same vertex occurs in all sets with. The width of is the maximum number of vertices in any minus ½. The path-width of, ÔÛ µ, is the minimum width over all path-decompositions of. A path-decomposition of is optimal if its width is ÔÛ µ which is the smallest possible. Rather surprisingly all notions mentioned above are closely related to each other. We will explain this in the following discussion: In [7] it has been shown that for every graph Ú µ µ Ú µ ¾. The authors have also shown that µ Ú ¼ µ, where ¼ is the ¾-expansion of. ¼ is obtained from by replacing every edge Ù Ú by the edges Ù Ü Ü Ý, and Ý Ú where Ü and Ý are two new vertices. Furthermore an algorithm has been presented which (by using a suitable data structure) transforms a given optimal layout Ä ¼ of ¼ into an optimal edge search strategy Ë of in linear time. Since the size of Ä ¼ and ¼ is Ç Þ µµ we imply that for every graph the computation of its optimal edge search strategy requires no more time than the computation of its optimal layout. In [11] it has been shown that Ò µ Ú µ ½. The authors have also presented an algorithm which (by using a suitable data structure) transforms a given optimal layout into an optimal node search strategy in linear time. In [10] it has been shown that µ Ò µ and that a given optimal node search strategy can be transformed into an optimal interval augmentation in linear time. In [9] it has been shown that ÔÛ µ Ú µ. Additionally an algorithm has been presented which (by using a suitable data structure) transforms a given optimal layout into an optimal path-decomposition in linear time in the output size. Here the transformation time is not necessarily linear in the input size since the size of an optimal path-decomposition may be ÔÛ µ times larger than the size of an optimal layout. Summarizing we get: For every graph the above parameters are almost the same. Moreover given an input graph the computation of an optimal edge search strategy, an optimal node search strategy, and an optimal interval augmentation of is possible in Ç Ø Òµµ time where Ø Òµ is the time required by the computation of an optimal layout of. The computation of an optimal path-decomposition is possible in time Ç Ø Òµ µ, where is the size of the computed path-decomposition.

3 Unfortunately given a graph and an integer the problems whether or not Ú µ and µ are both NP-complete, see [13] and [15], respectively. By the discussion above we obtain that the problems whether or not Ò µ, µ, and ÔÛ µ are also NP-complete. They remain NP-complete even for chordal graphs [8], starlike graphs [8], and for planar graphs with maximum degree three [17, 14]. For some special graphs the above problems are solvable in polynomial time. Examples are cographs [4], permutation graphs [3], and graphs of bounded tree-width [2]. Especially if is fixed then the problems can be solved in Ç Òµ (but exponential in ) [1]. Here we consider trees. It has been shown in [7] that the vertex separation and in [15] that the edge search number can be computed in Ç Òµ. Thus the node search number, the interval thickness and the path-width can also be computed in Ç Òµ. However the computation of optimal layouts, optimal edge search strategies, optimal node search strategies, optimal interval augmentations, and optimal path-decompositions is more complicated. In [7] an algorithm is given for optimal layouts and in [15] for optimal edge strategies. These algorithms needing Ç Ò ÐÓ Òµ time were the fastest known so far. The authors have raised the question whether this time can be reduced to Ç Òµ. In this paper we establish an algorithm computing an optimal layout of an input tree in Ç Òµ. As a consequence of this result and the discussion above the computation of an optimal edge search strategy, an optimal node search strategy, and an optimal interval augmentation of an input tree can be done in Ç Òµ. Especially the computation of an optimal path-decomposition can be done in linear time in the output size. 2 Preliminaries We consider undirected graphs Î µ. For convenience loops and multiple edges are disallowed. A (linear) layout of is a one to one mapping Ä Î ½ ¾ Î. For an integer ½ Î the -th cut of Ä, denoted by ÙØ Ä µ, is the number of vertices which are mapped to integers less than or equal to and adjacent to a vertex mapped to an integer larger than. Formally ÙØ Ä µ Ù Ù Úµ ¾ with Ä Ùµ and Ä Úµ. The vertex separation of with respect to Ä, denoted by Ú Ä µ, is the maximum over all cuts of Ä, i.e., Ú Ä µ Ñ Ü ½ Î ÙØ Ä µ. For convenience Ú Ä µ is also called the vertex separation of Ä. The vertex separation of, denoted by Ú µ, is the minimum vertex separation over all layouts of, i.e., Ú µ Ñ Ò Ú Ä µ. A layout Ä of is optimal if Ú µ Ú Ä µ. Ä In this paper we deal with rooted trees. Let Ì be a tree and Ù a vertex of Ì. The branches of Ì at Ù are the tree components obtained by the removal of Ù from Ì. Ì Ù denotes the subtree of Ì rooted at Ù and containing all descendants of Ù in Ì. The subtrees rooted at the sons of Ù are called the subtrees of Ù. Let Ú ½ Ú be (arbitrary) vertices of a subtree Ì Ù. Ì Ù Ú ½ Ú denotes the tree obtained from Ì Ù by removing Ì Ú ½ Ì Ú. Notice that Ì Ù Ú ½ Ú is rooted at Ù. In [7] the following lemma has been shown. Lemma 1. Let Ì be a tree and ½ an integer. Then µ iff for all vertices Ù of Ì at most two branches of Ì at Ù have vertex separation and all other branches have vertex separation ½.

4 Corollary 1. Let Ì be a tree with Ò vertices. Then µ ÐÓ Ò ½ ÐÓ Ò ½. Next we recall the definition of critical vertices and vertex labelling, see [7]. Definition 1. Let Ì be a tree with µ. A vertex Ú is -critical in Ì if there are two sons Ú ½ and Ú ¾ of Ú with Ú ½ µ Ú ¾ µ. Observe that by Lemma 1 the vertex Ú in the above definition can not have more than two sons with vertex separation. By the same lemma we obtain: Lemma 2. Let Ì be a tree with µ. Then at most one vertex in Ì is -critical. The following labelling technique has been introduced in [7]. Similar methods were used in [21, 5, 15]. Definition 2. Let Ì be a tree rooted at Ù with µ ½. A list of integers Ð ½ ¾ Ô µ with ½ ¾ Ô ¼ is a label of Ù if there is a set of vertices Ú ½ Ú Ô ½ Ú Ô Ù in Ì such that (i) For ½ Ô, Ù Ú ½ Ú µ ½, (ii) For ½ Ô, Ú is a -critical vertex in Ì Ù Ú ½ Ú ½, (iii) either Ú Ô Ùµ is the Ô -critical vertex in Ì Ù Ú ½ Ú Ô ½ or there is no Ô - critical vertex in Ì Ù Ú ½ Ú Ô ½. We call Ú ½ Ú Ô ½ Ú Ô Ùµ the vertices corresponding to Ð. Notice that the vertex separation of Ì is the largest integer occurring in Ð. If Ú is - critical ( -noncritical) in Ì Ù Ú ½ Ú ½ then we say that is critical (noncritical) in Ð. By definition all Ú are critical in Ð except possibly Ú Ô Ùµ. By Lemma 2 it is easy to see that the label Ð and the vertices corresponding to Ð are unique. Lemma 3. Let Ì be a tree rooted at Ù. The label Ð of Ù and the vertices corresponding to Ð are unique. Let Ì be a tree rooted at Ù. In [7] a linear algorithm is given computing the label Ð of Ù. Since the vertex separation is the largest integer occurring in Ð this algorithm also computes the vertex separation of Ì in linear time. The idea of the algorithm is to compute Ð bottom up. Let Ù ½ Ù be the sons of Ù and Ð the label of Ù in Ì Ù for ½. The label Ð is computed by recursively computing the labels Ð and then by combining them. By definition the label of the leaves is ¼µ. It is interesting to note that by the computation of Ð some of the old labels Ð ½ Ð must be destroyed. However the computation of an optimal layout of Ì is more complicated. The best known algorithm needs Ç Ò ÐÓ Òµ time [7] where it was stated as an open question whether or not there exists an Ç Òµ layout algorithm. In the following we give an affirmative answer. 3 Optimal layouts in linear time We establish an Ç Òµ algorithm computing optimal layouts of trees. The idea is to compute the layout of a tree by first computing the layouts of the subtrees of its root and then by combining them. First we show how to compute an optimal layout of certain trees (we call them simple trees) using the optimal layouts of its subtrees. Then we extend this to arbitrary trees. For convenience we define a layout by a list of vertices and use the concatenation operator ² of lists which makes our claims more readable.

5 3.1 Simple trees and their optimal layouts Definition 3. A tree is -simple if the label of its root is Ð µ. Let Ì be a -simple tree. Ì is called noncritical if is noncritical in Ð. Otherwise Ì is called critical. Intuitively, Ì is noncritical -simple if µ and Ì contains no -critical vertex. Ì is critical -simple if µ and the root of Ì is the (unique) -critical vertex. Notice that every noncritical ¼-simple tree is a singleton and that there are no critical ¼-simple trees. The next two lemmas are more or less consequences of Definition 3. Lemma 4. Let Ì be a noncritical -simple tree rooted at Ù. Then at most one of the subtrees of Ù in Ì is noncritical -simple and all other subtrees have vertex separation ½. Lemma 5. Let Ì be a critical -simple tree rooted at Ù. Then exactly two of the subtrees of Ù in Ì are noncritical -simple and all other subtrees have vertex separation ½. We will construct an optimal layout of a tree by efficiently combining the optimal layouts of the subtrees. In order to do so the optimal layouts of the subtrees must have a suitable form. This leads to the introduction of left extendable, right extendable, and sparse layouts. For a tree Ì let Ì Û be the tree obtained from Ì by adding a new vertex Û and an edge between Û and the root of Ì. Definition 4. Let Ä be a layout of a tree Ì. If Ì is a singleton then Ä is both left and right extendable. Otherwise Ä is left extendable if Ú Ûµ²Ä Ì Û µ Ú Ä Ì µ and right extendable if Ú Ä² Ûµ Ì Û µ Ú Ä Ì µ. Intuitively, Ä is left (right) extendable if the maximal vertex cut of Ä does not increase when we add an edge between root Ù and a new vertex Û left (right) to Ä. Definition 5. Let Ä be a layout of a tree Ì rooted at Ù. Ä is sparse if no vertices Ú and Û in Ì with Ä Úµ Ä Ùµ Ä Ûµ are adjacent in Ì. Intuitively, Ä is sparse if no vertex left to Ù is adjacent to a vertex right to Ù in Ä. Lemma 6. Every noncritical -simple tree Ì has both an optimal left extendable layout ÐÄ and an optimal right extendable layout ÖÄ. Proof. Let Ù be the root of Ì and Ù ½ Ù the sons of Ù. Let Ä be an optimal layout of the subtree Ì Ù for ½. The proof is by induction on the height of Ì. For ¼ the tree Ì is a singleton and by Definition 4 the claim is clear. For the induction step consider Ì of height ½. By Lemma 4 at most one subtree of Ù is noncritical -simple and all other subtrees have vertex separation at most ½. If no subtree of Ù is noncritical -simple then the layout of Ì in Fig. 1 µ is both optimal left and optimal right extendable. If a subtree of Ù, say Ì Ù ½, is noncritical -simple then let ÐÄ ½ be an optimal left and ÖÄ ½ an optimal right extendable layout of Ì Ù ½. Both exist by the induction hypothesis. Then the layout ÐÄ and ÖÄ of Ì in Fig. 1 µ and 1 µ is optimal left extendable and optimal right extendable, respectively.

6 ÄÑ Ö ÄÑ Ö µ ½ ¾ µ Ñ Ò ÑÖ Ñ ¼ Ö Ò ¼ Ö Ö Ù ½µ Ù ¾µ Ù ½µ Ù ¾µ Ù µ Ä Ä½ ÄÑ Ò µ ÐÄ ÖÄ Ð ÄÑÖ µ Ä ¾ µ ÐÄ µ ÖÄ Ö ÄÑÖ µ Ä Û½ Û ÛÒµ Ù Ù½ Ù¾ Ù ÐÄ ½ ÖÄÙ Ù Ù¾ Ù Ù Ù½ Ù½ Ù Ù¾ Ù Ù Û½ ÛÒµ ÐÄ Û½ ¼ ÛÒµ ¼ Ľ ľ Ä ½ ÖÄ Ä Ä¾ Ä Ä ÐĽ ÖĽ ľ Ä Ä ÐĽ Fig. 1. Optimal extendable layouts of noncritical simple trees. The thick lines represent layouts. ÖÄ Û Ì Ì ¼ Ì ½ Lemma 7. Every critical -simple tree Ì has an optimal sparse layout Ä. Ì ¾ Ì Ì Proof. Let Ù be the root of Ì and Ù ½ Ù the sons of Ù. By Lemma 5 exactly two ½µ ¾µ subtrees of Ù, say Ì Ù ½ and Ì Ù, are noncritical -simple and all other subtrees have µ vertex separation µ ½. By Lemma 6, Ì Ù ½ has an optimal right extendable layout ½ ¾ µ ÖÄ ½ and Ì Ù has anñ optimal left extendable layout ÐÄ. Let Ä be an optimal layout Ò of the subtree Ì Ù for ¾ ½. Then the layout Ä in Fig. 2 is an optimal sparse ÑÖ layout of Ì. Ñ ¼ Ö Ò ¼ Ö Ö ÄÑ Ò Ð ÄÑÖ µ Ä Ö ÄÑÖ µ Û½ Û ÛÒµ Û½ ÛÒµ Û½ ¼ ÛÒµ ¼ ÖĽ Ù½ Ù Ù¾ Ù Ù ½ ٠ľ Ä Ä ½ ÐÄ Fig. 2. Optimal sparse layouts of critical simple trees. The thick lines represent layouts. Remark 1. The proofs of the last two lemmas provide construction schemes for optimal extendable layouts of noncritical simple trees and for optimal sparse layouts of critical simple trees. For the constructions only the optimal extendable layouts of the noncritical simple subtrees and arbitrary optimal layouts of the remaining subtrees are needed. 3.2 Arbitrary trees and their optimal layouts The main idea is to partition a tree Ì into smaller simple trees and to define the coarse layout of Ì as the list of the optimal (extendable or sparse) layouts of the smaller trees. Definition 6. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let Ú ½ Ú Ô be the vertices corresponding to Ð, see Definition 2. The parts Ì, ½ Ô, of Ì are defined as follows, see Fig. 3. (i) Ì ½ is the subtree Ì Ú ½ and (ii) Ì is the subtree of Ì Ù Ú ½ Ú ½ rooted at Ú for ¾ Ô. Lemma 8. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Then every part Ì, ½ Ô, is -simple. Especially, all parts are critical except possibly Ì Ô which may be noncritical.

7 µ Ñ Ò ÑÖ Ñ ¼ Ö Ò ¼ Ö Ì Ù ½ ¾ µ Ù Ö ÄÑ Ö Ú Ú µ ÄÑ Ò Ð ÄÑÖ µ Ö ÄÑÖ µ ½µ Û½ Û ÛÒµ Û½ ÛÒµ Û½ ¼ ÛÒµ ¼ Ú½ Ú¾ ¾µ Ú½ Ì ½ Ì Ú¾ Ì ¾ Ì Fig. 3. The parts Ì of Ì Notation 1 Let Ì be a tree and Ì a -simple part of Ì. If Ì is noncritical then Ð Ä denotes an optimal left extendable and Ö Ä an optimal right extendable layout of Ì. If Ì is critical then Ä denotes an optimal sparse layout of Ì. Remember that all these layouts exist since Lemmas 6 and 7. Definition 7. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. The coarse layout of Ì is defined as Ä ½ Ä ¾ Ä Ô µ if Ô is critical in Ð Ä ½ Ä ¾ Ä Ô ½ Ð Ä Ô Ö Ä Ô µµ otherwise. The coarse layout is a flexible representation of an optimal layout. In fact, an optimal layout can be computed from the coarse layout very efficiently. In order to show this we need some new notions: The focus of a layout Ä is a distinguished vertex of Ä partitioning Ä into two sublists ÔÖ Äµ and ٠ĵ. The prefix of Ä, ÔÖ Äµ, consists of the focus and the vertices of Ä which are left to the focus. The suffix of Ä, ٠ĵ, consists of the vertices of Ä which are right to the focus. Given two layouts Ä and Ä ¼ and their focuses, the layout Ä Ä ¼ is defined by Ä Ä ¼ ÔÖ Äµ²Ä ¼ ² ٠ĵ. The focus of Ä Ä ¼ is the focus of Ä ¼. Notice that operation is associative in the computation of both layouts and their focuses. We will apply only on layouts of simple trees. The focus of a layout of a simple tree is defined as the root of the simple tree. Lemma 9. Let Ì be a tree and Ð ½ ¾ Ô µ the label of its root. (i) If Ô is critical in Ð then Ä Ä ½ Ä ¾ Ä Ô is an optimal layout of Ì, (ii) If Ô is not critical in Ð then Ä Ä ½ Ä Ô ½ Ð Ä Ô is an optimal layout of Ì. Now we are going to show how to compute a coarse layout of a tree using the coarse layouts of its subtrees. The following lemma is important. Lemma 10. Let Ì be a tree rooted at Ù, Ð ½ ¾ Ô µ the label of Ù, and Ù ½ Ù the sons of Ù. (i) The simple parts Ì ½ Ì ¾ Ì Ô ½ of Ì are exactly the simple parts of Ì Ù ½, Ì Ù with vertex separation larger than Ô,

8 (ii) No subtree Ì Ù, ½, has a critical Ô -simple part. From Lemma 10 we directly obtain: Lemma 11. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let ½ be the coarse layouts of the subtrees of Ù. The components of ½ with vertex separation larger than Ô can be adopted as the first Ô ½ components Ä ½ Ä ¾ Ä Ô ½ of a coarse layout of Ì. Given the layouts Ä ½ Ä ¾ Ä Ô ½ they must be sorted according to the integers ½ Ô ½ for the construction of a coarse layout of Ì. In order to sort as less elements as possible we first find the subtree of Ù with the largest vertex separation, say Ì Ù. Then we find a large prefix of the coarse layout of Ì Ù which is also a prefix of the coarse layout of Ì. The layouts of this prefix need not be sorted because they are already sorted in the coarse layout of Ì Ù. The next lemma shows how to find such a prefix which is large enough for our later complexity considerations. Lemma 12. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. Let Ù ½ Ù be the sons of Ù and Ð be the label of Ù in Ì Ù for ½. Let Ð Ñ ½ Ñ ¾ Ñ Ö µ be the largest and Ð Ò ½ Ò ¾ Ò µ the second largest label over all Ð, where largest means containing the largest element. Then ½ ¾ µ Ñ ½ Ñ ¾ Ñ µ where is the largest index ½ Ö ½ with Ñ Ñ Ü Ñ ½ Ò ½ ½. Hence the first components of the coarse layout of Ì Ù can be adopted as the first components of the coarse layout of Ì. Next we show how to compute the last component Ä Ô or Ð Ä Ô Ö Ä Ô µ of the coarse layout of Ì. Lemma 13. Let Ì be a tree rooted at Ù and Ð ½ ¾ Ô µ the label of Ù. If the last component Ô of Ð, the information whether Ô is critical in Ð, and the coarse layouts of the subtrees of Ù are given then the last component of the coarse layout of Ì is computable. Proof. Let be the coarse layout of Ì, Ù ½ Ù the sons of Ù, and the coarse layouts of the subtrees Ì Ù for ½. Let ¼ be the list obtained from by removing all layout components with vertex separation larger than Ô. By Lemma 10 µ the lists ¼ are the coarse layouts of the subtrees of Ù in Ì Ô. There are two cases: Case 1: Ì Ô is noncritical Ô -simple. We have to compute Ð Ä Ô and Ö Ä Ô. Assume that Ù has a noncritical Ô -simple subtree in Ì Ô, say Ì Ô Ù ½ (otherwise the proof is similar). By Remark 1 we need the optimal (left and right) extendable layouts of Ì Ô Ù ½ and the optimal layouts of the other subtrees Ì Ô Ù, ¾. The optimal extendable layouts are in the (only) component of ¼ ½ and the optimal layouts of the other subtrees can be computed from ¼, ½, using Lemma 9. Case 2: Ì Ô is critical Ô -simple. We have to compute an optimal sparse layout Ä Ô of Ì Ô. Without loss of generality let Ì Ô Ù ½ and Ì Ô Ù be the noncritical Ô -simple subtrees of Ù in Ì Ô. By Remark 1 we need the optimal extendable layouts of Ì Ô Ù ½

9 and Ì Ô Ù and the optimal layouts of the other subtrees Ì Ô Ù, ¾ ½. The optimal extendable layouts are in the components of ¼ and ½ ¼ ¾. The optimal layouts of the other subtrees can be computed from ¼, ¾ ½, using Lemma Linear time layout Algorithm We assume that every vertex Ù of Ì is marked by the last element Ô of the label Ð ½ Ô µ of Ù in Ì Ù and by an indicator whether or not Ô is critical in Ð. Our layout algorithm first recursively computes the coarse layouts of the subtrees of Ù. Then using the mark of Ù and the coarse layouts of the subtrees of Ù it computes the coarse layout of Ì Ù. At the end an optimal layout of Ì is computed from the coarse layout of Ì. To achieve linear time we need a suitable representation of the coarse layouts based on the following representation of the labels given in [7]. A label is a list of blocks, where a block contains consecutive integers and is represented by an interval consisting of the endpoints of the block in decreasing order. For example the label Ð ¾ ¼µ is represented by Ð µ ¾µ ¼ ¼µµ. Let Ð Ñ ½ Ò ½ µ Ñ ¾ Ò ¾ µ Ñ Ö ½ Ò Ö ½ µ Ñ Ö Ò Ö µµ be the representation of the label of Ù in Ì Ù where Ñ Ö Ò Ö ; otherwise we split the last interval Ñ Ö Ò Ö µ into two intervals Ñ Ö Ò Ö ½µ and Ò Ö Ò Ö µ. The coarse layout of Ì Ù is represented by a list of Ö records, one for every interval Ñ Ò µ. The first Ö ½ records consist of four fields. Two fields are of type integer and two are pointers. For ½ Ö ½ the first field of the -th record is reserved for Ñ, the second for Ò, the third for a pointer to the layout ÄÑ Ò ÄÑ ÄÑ ½ ÄÒ, and the fourth for a pointer to the focus of ÄÑ Ò. For the last Ö-th record there are two cases. If Ñ Ö is critical in Ð then the Ö-th record has the same structure as before, but now both integer fields are reserved for Ñ Ö since in this case Ñ Ö Ò Ö. If Ñ Ö is not critical in Ð then the Ö-th record has two additional fields which are pointers. Here the first two integer fields are reserved for Ñ Ö, the third field is reserved for a pointer to Ð ÄÑÖ, the fourth for a pointer to the focus of Ð ÄÑÖ, the fifth for a pointer to Ö ÄÑÖ and the sixth for a pointer to the focus of Ö ÄÑÖ. This data structure allows the computation of the prefix and suffix of a layout in constant time. Now we present our layout algorithm. function ÓÔØ Ñ Ð Ð ÝÓÙØ Ì ØÖ Ù ÖÓÓص Ð ÝÓÙØ; ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ; Compute optimal layout Ä from according to Lemma 9 return Ä; function ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì ØÖ Ù ÖÓÓص Ó Ö Ð ÝÓÙØ; Let Ù be the root of Ì if (Ì contains only Ù) then ¼ ¼ Ùµ Ù Ùµ Ùµµ; return else Let Ù ½ Ù be the sons of Ù in Ì ; for all Ù do ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ; return ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ;

10 function ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù Ú ÖØ Ü ½ Ó Ö Ð ÝÓÙص Ó Ö Ð ÝÓÙØ; Let Ø be the coarse layout of the subtree of Ù with the largest vertex separation 1: Excise prefix Ø from Ø according to Lemma 12; Let Ô be the mark of Ù 2: Ê list containing all records Ñ Ò µ of ½ with Ñ Ô ; 3: Sort all records of Ê according to their first integer fields; 4: Compact Ê by replacing all consecutive records Ñ Ò µ Ñ ½ Ò ½ ½ ½ µ Ñ Ö Ò Ö Ö Ö µ with Ò Ñ ½ ½ for Ö by the record Ñ Ò Ö µ, where ½ Ö and Ö ; 5: Compute the last component of according to Lemma 13, using the mark of Ù; 6: Ø ²Ê²; return ; Lemma 14. Given an input tree Ì ÓÑÔÙØ Ó Ö Ð ÝÓÙØ correctly computes the representation of a coarse layout of Ì. Proof. Let Ù be the root of Ì, Ù ½ Ù the sons of Ù and Ð ½ ¾ Ô µ the label of Ù. The proof is by induction on the height of Ì. For ¼, Ì consists only of the root Ù. In this case ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ results in ¼ ¼ Ùµ Ù Ùµ Ùµµ and the claim trivially holds. Now let Ì be of height ½. By the induction hypothesis ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ correctly computes the representations of the coarse layouts of Ì Ù. We show that Ø ²Ê² computed in step is a correct representation of the coarse layout of Ì. By Lemma 12, Ø computed in step ½ can be adopted as the prefix of. Now consider the list Ê computed in step ¾. First observe that no has a record Ñ Ò µ with Ñ Ô Ò, otherwise subtree Ì Ù would have a critical Ô - simple part which contradicts to Lemma 10 µ. That means the records of Ê include exactly those layout components of the coarse layouts of the subtrees which have vertex separation larger than Ô. Now, by Lemma 11 and the associativity of, Ê after sorting in step, and compacting in step can be adopted from. Finally, by Lemma 13 and the associativity of, the record computed in step can be adopted as the last record of. Hence Ø ²Ê² is a correct representation of the coarse layout of Ì. By Lemma 14, Lemma 9 and the associativity of we conclude: Theorem 2. The function ÓÔØ Ñ Ð Ð ÝÓÙØ correctly computes an optimal layout of an input tree. Next we show that the time complexity of our algorithm is linear. Lemma 15. Let Ì be a tree rooted at Ù and Ù ½ Ù the sons of Ù. Let, ½, be the representation of a coarse layout of Ì Ù. Let be the th largest vertex separation of the subtrees of Ù. The time required by ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ to compute the representation of the coarse layout of Ì is Ç ¾ ¾ µ, where ½ does not appear and ¾ appears twice.

11 Proof. First observe that Ù µ is the integer in the first field of the first record of. The time required in step ½ is Ç ¾ ½µ. We only need to search Ø from the right to the left until we find the first consecutive records Ñ Ò µ and Ñ ½ Ò ½ ½ ½ µ with Ò Ñ Ü Ñ ½ ¾ ½, see also Lemma 12. Step ¾ takes time linear in the number of the records in ½, i.e., time Ç ¾ ¾ µ (note that Ø is removed from Ø ). In step the sorting of the records of Ê according to the integers in their first fields can be done in Ç ¾ ½µ using bucket sort. To see this observe that these integers are µ all ¾ except possibly one (this would occur in the first field of the first record of Ø ) and µ all pairwise different since Lemma 10 µ. The time required in step is Ç ¾ ½µ since Ê contains at most ¾ ½ records. Step clearly can be done in Ç ¾ ¾ µ. Finally step takes constant time. Hence the execution time of ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ is Ç ¾ ¾ µ. Let Ì be a tree, Ù a vertex in Ì, and an integer. Let Õ Ù be the number of the vertices Ú in Ì Ù having a brother Ú ¼ such that Ú µ Ú ¼ µ. In a similar way as in the proof of Lemma ½ from [7] we can prove the next lemma. Lemma 16. Let Ì be a tree rooted at Ù. The time required by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ È µ Ì Ùµ is Ò Õ Ù µ where is a constant and Ò the size of Ì. Proof. Let Ù ½ Ù be the sons of Ù. The proof is by induction on the height of Ì. For ¼, ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ needs time ½ where ½ is the time needed by ¼ ¼ Ùµ Ù Ùµ Ùµµ. Hence the claim holds for every ½. Now consider Ì of height ½. The time needed by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ is the time Ø ½ needed by ÓÑ Ò Ó Ö Ð ÝÓÙØ Ù ½ µ plus the time Ø ¾ needed by the calls ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ù Ù µ, ½. By Lemma 15 and the induction hypothesis we have Ø ½ Ø ¾ ¾ ¾ ¾ µ È È Ù µ Ò Õ Ù µ, where Ò is the size of Ì Ù. Moreover it is easy to verify that ½ ¾ ¾ Ø ½ Ø ¾ ½ È ½ È Ù µ Õ Ù È µ È È Ò µ ¾ ¾ È µ Ò Õ Ù µ and the proof is complete. The following has been proved in [7], page 77. Õ Ù. Defining Ñ Ü ½ ¾ we get ½ È Ù µ È µ Õ Ù µ Ò Õ Ù È µ Lemma 17. Let Ì be a tree rooted at Ù. Then Õ Ù Ò where Ò is the size of Ì. By Lemmas 16 and 17 we obtain: Lemma 18. The time required by ÓÑÔÙØ Ó Ö Ð ÝÓÙØ Ì Ùµ is linear in the size of Ì.

12 By Corollary 1 a coarse layout of Ì contains at most ÐÓ Ò records, where Ò is the size of Ì. Hence given a coarse layout the computation of an optimal layout according to Lemma 9 takes at most Ç ÐÓ Òµ time. This and Lemma 18 imply our last theorem. Theorem 3. The time complexity of the function ÓÔØ Ñ Ð Ð ÝÓÙØ is linear in the size of the input tree. References [1] H. Bodlaender. A linear time algorithm for finding tree-decompositions of small treewidth. SIAM J. Comput., 25(6): , [2] H. Bodlaender and T. Kloks. Efficient and constructive algorithms for the pathwidth and treewidth of graphs. J. Algorithms, 21: , [3] H. Bodlaender, T. Kloks, and D. Kratsch. Treewidth and pathwidth of permutation graphs. SIAM J. Disc. Math., 8: , [4] H. Bodlaender and R. Möhring. The pathwidth and treewidth of cographs. SIAM J. Disc. Math., 6: , [5] M. Chung, F. Makedon, I. Sudborough, and J. Turner. Polynomial algorithms for the mincut linear arrangement problem on degree restricted trees. SIAM J. Comput., 14(1): , [6] S. Cook and R. Sethi. Storage requirements for deterministic polynomial finite recognizable languages. J. Comput. System Sci., 13:25 37, [7] J. Ellis, I. Sudborough, and J. Turner. The vertex separation and search number of a graph. Inform. Comput., 113:50 79, [8] J. Gustedt. On the pathwidth of chordal graphs. Disc. Appl. Math., 45: , [9] N. Kinnersley. The vertex separation number of a graph equals its path-width. Inform. Process. Lett., 142: , [10] L. Kirousis and C. Papadimitriou. Interval graphs and searching. Disc. Math., 55: , [11] L. Kirousis and C. Papadimitriou. Searching and pebbling. Theor. Comp. Science, 47: , [12] A. LaPaugh. Recontamination does not help to search a graph. J. Assoc. Comput. Mach., 40(2): , [13] T. Lengauer. Black-white pebbles and graph separation. Acta Informat., 16: , [14] F. Makedon and I. Sudborough. On minimizing width in linear layouts. Disc. Appl. Math., 23: , [15] N. Megiddo, S. Hakimi, M. Garey, D. Johnson, and C. Papadimitriou. The complexity of searching a graph. J. Assoc. Comput. Mach., 35(1):18 44, [16] R. H. Möhring. Graph problems related to gate matrix layout and PLA folding. In E. Mayr, H. Noltmeier, and M. Syslo, editors, Computational Graph Theory, pages Springer Verlag, [17] F. Monien and I. Sudborough. Min cut is NP-complete for edge weighted trees. Theor. Comp. Science, 58: , [18] T. Parsons. Pursuit-evasion in a graph. In Y. Alavi and D. Lick, editors, Theory and Applications of Graphs, pages Springer-Verlag, New York/Berlin, [19] N. Robertson and P. Seymour. Graph minors. I. Excluding a forest. J. Comb. Theory Series B, 35:39 61, [20] N. Robertson and P. Seymour. Disjoint paths A servey. SIAM J. Alg. Disc. Meth., 6: , [21] M. Yannakakis. A polynomial algorithm for the min-cut linear arrangement of trees. J. Assoc. Comput. Mach., 32(4): , 1985.

Necessary edges in k-chordalizations of graphs

Necessary edges in k-chordalizations of graphs Necessary edges in k-chordalizations of graphs Hans L. Bodlaender Abstract In this note, we look at which edges must always be added to a given graph G = (V, E), when we want to make it a chordal graph

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

An Effective Upperbound on Treewidth Using Partial Fill-in of Separators

An Effective Upperbound on Treewidth Using Partial Fill-in of Separators An Effective Upperbound on Treewidth Using Partial Fill-in of Separators Boi Faltings Martin Charles Golumbic June 28, 2009 Abstract Partitioning a graph using graph separators, and particularly clique

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

arxiv: v1 [cs.dm] 21 Dec 2015

arxiv: v1 [cs.dm] 21 Dec 2015 The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey

More information

Mixed search number and linear-width of interval and split graphs

Mixed search number and linear-width of interval and split graphs Mixed search number and linear-width of interval and split graphs Fedor V. Fomin Pinar Heggernes Rodica Mihai August 9, 2007 Abstract We show that the mixed search number and the linear-width of interval

More information

VLSI Layouts and DNA Physical Mappings Michael J. Dinneen Computer Research and Applications Los Alamos National Laboratory Los Alamos, N.M I

VLSI Layouts and DNA Physical Mappings Michael J. Dinneen Computer Research and Applications Los Alamos National Laboratory Los Alamos, N.M I VLSI Layouts and DNA Physical Mappings Michael J. Dinneen Computer Research and Applications Los Alamos National Laboratory Los Alamos, N.M. 87545 1 Introduction In this short note, we show that an important

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME

PLANAR GRAPH BIPARTIZATION IN LINEAR TIME PLANAR GRAPH BIPARTIZATION IN LINEAR TIME SAMUEL FIORINI, NADIA HARDY, BRUCE REED, AND ADRIAN VETTA Abstract. For each constant k, we present a linear time algorithm that, given a planar graph G, either

More information

COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES

COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES Volume 2, Number 1, Pages 61 66 ISSN 1715-0868 COLORING EDGES AND VERTICES OF GRAPHS WITHOUT SHORT OR LONG CYCLES MARCIN KAMIŃSKI AND VADIM LOZIN Abstract. Vertex and edge colorability are two graph problems

More information

Coloring edges and vertices of graphs without short or long cycles

Coloring edges and vertices of graphs without short or long cycles Coloring edges and vertices of graphs without short or long cycles Marcin Kamiński and Vadim Lozin Abstract Vertex and edge colorability are two graph problems that are NPhard in general. We show that

More information

Search problems on 1-skeletons of regular. Abstract. For pursuit-evasion games played on 1-skeletons of regular polyhedrons

Search problems on 1-skeletons of regular. Abstract. For pursuit-evasion games played on 1-skeletons of regular polyhedrons Search problems on 1-skeletons of regular polyhedrons F.V. Fomin P.A. Golovach y N.N. Petrov z Abstract For pursuit-evasion games played on 1-skeletons of regular polyhedrons some problems of nding the

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

A Comparison of Structural CSP Decomposition Methods

A Comparison of Structural CSP Decomposition Methods A Comparison of Structural CSP Decomposition Methods Georg Gottlob Institut für Informationssysteme, Technische Universität Wien, A-1040 Vienna, Austria. E-mail: gottlob@dbai.tuwien.ac.at Nicola Leone

More information

Monotonicity in Graph Searching

Monotonicity in Graph Searching JOURNAL OF ALGORITHMS 12, 239-245 (1991) Monotonicity in Graph Searching D. BIENSTOCK* ANDPAULSEYMOUR Bellcore, 445 South Street, Morristown, New Jersey 07960 Received May 1988; accepted November 1990

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

SFU CMPT Lecture: Week 9

SFU CMPT Lecture: Week 9 SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Vertex Cover is Fixed-Parameter Tractable

Vertex Cover is Fixed-Parameter Tractable Vertex Cover is Fixed-Parameter Tractable CS 511 Iowa State University November 28, 2010 CS 511 (Iowa State University) Vertex Cover is Fixed-Parameter Tractable November 28, 2010 1 / 18 The Vertex Cover

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Parameterized coloring problems on chordal graphs

Parameterized coloring problems on chordal graphs Parameterized coloring problems on chordal graphs Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary dmarx@cs.bme.hu

More information

On the Performance of Greedy Algorithms in Packet Buffering

On the Performance of Greedy Algorithms in Packet Buffering On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,

More information

On Structural Parameterizations of the Matching Cut Problem

On Structural Parameterizations of the Matching Cut Problem On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 10

CPSC 536N: Randomized Algorithms Term 2. Lecture 10 CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very

More information

Lecture Notes on GRAPH THEORY Tero Harju

Lecture Notes on GRAPH THEORY Tero Harju Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................

More information

A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees

A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees Kedar Dhamdhere ½ ¾, Srinath Sridhar ½ ¾, Guy E. Blelloch ¾, Eran Halperin R. Ravi and Russell Schwartz March 17, 2005 CMU-CS-05-119

More information

Embedded Width, A Variation of Treewidth for Planar Graphs

Embedded Width, A Variation of Treewidth for Planar Graphs Embedded Width, A Variation of Treewidth for Planar Graphs Robert Weber Advisor: Glencora Borradaile Abstract A commonly studied property of graphs is treewidth, a measure of how tree-like a graph is.

More information

Graph Traversal. 1 Breadth First Search. Correctness. find all nodes reachable from some source node s

Graph Traversal. 1 Breadth First Search. Correctness. find all nodes reachable from some source node s 1 Graph Traversal 1 Breadth First Search visit all nodes and edges in a graph systematically gathering global information find all nodes reachable from some source node s Prove this by giving a minimum

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Optimal Time Bounds for Approximate Clustering

Optimal Time Bounds for Approximate Clustering Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract

More information

An exact algorithm for max-cut in sparse graphs

An exact algorithm for max-cut in sparse graphs An exact algorithm for max-cut in sparse graphs F. Della Croce a M. J. Kaminski b, V. Th. Paschos c a D.A.I., Politecnico di Torino, Italy b RUTCOR, Rutgers University c LAMSADE, CNRS UMR 7024 and Université

More information

Exponential time algorithms for the minimum dominating set problem on some graph classes

Exponential time algorithms for the minimum dominating set problem on some graph classes Exponential time algorithms for the minimum dominating set problem on some graph classes Serge Gaspers University of Bergen Department of Informatics N-500 Bergen, Norway. gaspers@ii.uib.no Dieter Kratsch

More information

External-Memory Breadth-First Search with Sublinear I/O

External-Memory Breadth-First Search with Sublinear I/O External-Memory Breadth-First Search with Sublinear I/O Kurt Mehlhorn and Ulrich Meyer Max-Planck-Institut für Informatik Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany. Abstract. Breadth-first search

More information

Edge Eavesdropping Games

Edge Eavesdropping Games Edge Eavesdropping Games Amos Beimel 1, and Matthew Franklin 2, 1 Department of Computer Science, Ben-Gurion University. 2 Department of Computer Science, University of California, Davis. Abstract. Motivated

More information

Directed Single Source Shortest Paths in Linear Average Case Time

Directed Single Source Shortest Paths in Linear Average Case Time Directed Single Source Shortest Paths in inear Average Case Time Ulrich Meyer MPI I 2001 1-002 May 2001 Author s Address ÍÐÖ ÅÝÖ ÅܹÈÐÒ¹ÁÒ ØØÙØ ĐÙÖ ÁÒÓÖÑØ ËØÙÐ ØÞÒÙ Û ½¾ ËÖÖĐÙÒ umeyer@mpi-sb.mpg.de www.uli-meyer.de

More information

The Disjoint Paths Problem on Chordal Graphs

The Disjoint Paths Problem on Chordal Graphs The Disjoint Paths Problem on Chordal Graphs Frank Kammer and Torsten Tholey Institut für Informatik, Universität Augsburg, D-86135 Augsburg, Germany {kammer,tholey}@informatik.uni-augsburg.de Abstract.

More information

Minimal comparability completions of arbitrary graphs

Minimal comparability completions of arbitrary graphs Minimal comparability completions of arbitrary graphs Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment of directions to its

More information

Dominating Set on Bipartite Graphs

Dominating Set on Bipartite Graphs Dominating Set on Bipartite Graphs Mathieu Liedloff Abstract Finding a dominating set of minimum cardinality is an NP-hard graph problem, even when the graph is bipartite. In this paper we are interested

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

9 About Intersection Graphs

9 About Intersection Graphs 9 About Intersection Graphs Since this lecture we focus on selected detailed topics in Graph theory that are close to your teacher s heart... The first selected topic is that of intersection graphs, i.e.

More information

Preprocessing for treewidth

Preprocessing for treewidth Preprocessing for treewidth Bodlaender, H.L.; Jansen, B.M.P.; Kratsch, S. Published in: arxiv Published: 21/04/2011 Please check the document version of this publication: A submitted manuscript is the

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Optimal Static Range Reporting in One Dimension

Optimal Static Range Reporting in One Dimension of Optimal Static Range Reporting in One Dimension Stephen Alstrup Gerth Stølting Brodal Theis Rauhe ITU Technical Report Series 2000-3 ISSN 1600 6100 November 2000 Copyright c 2000, Stephen Alstrup Gerth

More information

Bipartite Roots of Graphs

Bipartite Roots of Graphs Bipartite Roots of Graphs Lap Chi Lau Department of Computer Science University of Toronto Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only

More information

Graphs and Discrete Structures

Graphs and Discrete Structures Graphs and Discrete Structures Nicolas Bousquet Louis Esperet Fall 2018 Abstract Brief summary of the first and second course. É 1 Chromatic number, independence number and clique number The chromatic

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

Making arbitrary graphs transitively orientable: Minimal comparability completions

Making arbitrary graphs transitively orientable: Minimal comparability completions Making arbitrary graphs transitively orientable: Minimal comparability completions Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment

More information

NOTE ON MINIMALLY k-connected GRAPHS

NOTE ON MINIMALLY k-connected GRAPHS NOTE ON MINIMALLY k-connected GRAPHS R. Rama a, Suresh Badarla a a Department of Mathematics, Indian Institute of Technology, Chennai, India ABSTRACT A k-tree is either a complete graph on (k+1) vertices

More information

Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth

Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth Micha l Pilipczuk Institute of Informatics, University of Warsaw, Poland Workshop on Exact Algorithms and Lower

More information

On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

More information

arxiv: v1 [cs.ds] 8 Jan 2019

arxiv: v1 [cs.ds] 8 Jan 2019 Subset Feedback Vertex Set in Chordal and Split Graphs Geevarghese Philip 1, Varun Rajan 2, Saket Saurabh 3,4, and Prafullkumar Tale 5 arxiv:1901.02209v1 [cs.ds] 8 Jan 2019 1 Chennai Mathematical Institute,

More information

Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem

Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Expected Runtimes of Evolutionary Algorithms for the Eulerian Cycle Problem Frank Neumann Institut für Informatik und Praktische Mathematik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany fne@informatik.uni-kiel.de

More information

Queue Layouts, Tree-Width, and Three-Dimensional Graph Drawing

Queue Layouts, Tree-Width, and Three-Dimensional Graph Drawing Queue Layouts, Tree-Width, and Three-Dimensional Graph Drawing David R. Wood School of Computer Science Carleton University Ottawa, Canada Ú Û º ÖÐ ØÓÒº Abstract. A three-dimensional (straight-line grid)

More information

On-line multiplication in real and complex base

On-line multiplication in real and complex base On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR 7089 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks

More information

Decreasing the Diameter of Bounded Degree Graphs

Decreasing the Diameter of Bounded Degree Graphs Decreasing the Diameter of Bounded Degree Graphs Noga Alon András Gyárfás Miklós Ruszinkó February, 00 To the memory of Paul Erdős Abstract Let f d (G) denote the minimum number of edges that have to be

More information

On the subgraphs of the (2 )-grid

On the subgraphs of the (2 )-grid R u t c o r Research R e p o r t On the subgraphs of the (2 )-grid Josep Díaz a Marcin Kamiński b Dimitrios M. Thilikos c RRR 18 2007, May 2007 RUTCOR Rutgers Center for Operations Research Rutgers University

More information

A generalization of Mader s theorem

A generalization of Mader s theorem A generalization of Mader s theorem Ajit A. Diwan Department of Computer Science and Engineering Indian Institute of Technology, Bombay Mumbai, 4000076, India. email: aad@cse.iitb.ac.in 18 June 2007 Abstract

More information

An Abstraction Algorithm for the Verification of Level-Sensitive Latch-Based Netlists

An Abstraction Algorithm for the Verification of Level-Sensitive Latch-Based Netlists An Abstraction Algorithm for the Verification of Level-Sensitive Latch-Based Netlists Jason Baumgartner ½, Tamir Heyman ¾, Vigyan Singhal, and Adnan Aziz ½ IBM Enterprise Systems Group, Austin, Texas 78758,

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Chordal graphs MPRI

Chordal graphs MPRI Chordal graphs MPRI 2017 2018 Michel Habib habib@irif.fr http://www.irif.fr/~habib Sophie Germain, septembre 2017 Schedule Chordal graphs Representation of chordal graphs LBFS and chordal graphs More structural

More information

Optimization Problems in Dotted Interval Graphs

Optimization Problems in Dotted Interval Graphs Optimization Problems in Dotted Interval Graphs Danny Hermelin hermelin@mpi-inf.mpg.de Julián Mestre mestre@it.usyd.edu.au March 1, 2012 Dror Rawitz rawitz@eng.tau.ac.il Abstract The class of D-dotted

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

Improved algorithms for constructing fault-tolerant spanners

Improved algorithms for constructing fault-tolerant spanners Improved algorithms for constructing fault-tolerant spanners Christos Levcopoulos Giri Narasimhan Michiel Smid December 8, 2000 Abstract Let S be a set of n points in a metric space, and k a positive integer.

More information

arxiv: v5 [cs.dm] 9 May 2016

arxiv: v5 [cs.dm] 9 May 2016 Tree spanners of bounded degree graphs Ioannis Papoutsakis Kastelli Pediados, Heraklion, Crete, reece, 700 06 October 21, 2018 arxiv:1503.06822v5 [cs.dm] 9 May 2016 Abstract A tree t-spanner of a graph

More information

Kernelization Upper Bounds for Parameterized Graph Coloring Problems

Kernelization Upper Bounds for Parameterized Graph Coloring Problems Kernelization Upper Bounds for Parameterized Graph Coloring Problems Pim de Weijer Master Thesis: ICA-3137910 Supervisor: Hans L. Bodlaender Computing Science, Utrecht University 1 Abstract This thesis

More information

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can

The problem of minimizing the elimination tree height for general graphs is N P-hard. However, there exist classes of graphs for which the problem can A Simple Cubic Algorithm for Computing Minimum Height Elimination Trees for Interval Graphs Bengt Aspvall, Pinar Heggernes, Jan Arne Telle Department of Informatics, University of Bergen N{5020 Bergen,

More information

The self-minor conjecture for infinite trees

The self-minor conjecture for infinite trees The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper

More information

Fully dynamic algorithm for recognition and modular decomposition of permutation graphs

Fully dynamic algorithm for recognition and modular decomposition of permutation graphs Fully dynamic algorithm for recognition and modular decomposition of permutation graphs Christophe Crespelle Christophe Paul CNRS - Département Informatique, LIRMM, Montpellier {crespell,paul}@lirmm.fr

More information

Structure and Complexity in Planning with Unary Operators

Structure and Complexity in Planning with Unary Operators Structure and Complexity in Planning with Unary Operators Carmel Domshlak and Ronen I Brafman ½ Abstract In this paper we study the complexity of STRIPS planning when operators have a single effect In

More information

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada

More information

APPROXIMATION ALGORITHMS FOR TREEWIDTH. Keywords: Treewidth, Triangulation, Tree Decomposition, Network Flow.

APPROXIMATION ALGORITHMS FOR TREEWIDTH. Keywords: Treewidth, Triangulation, Tree Decomposition, Network Flow. APPROXIMATION ALGORITHMS FOR TREEWIDTH EYAL AMIR COMPUTER SCIENCE DEPARTMENT UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN URBANA, IL 61801, USA EYAL@CS.UIUC.EDU Abstract. This paper presents algorithms whose

More information

A Note on Karr s Algorithm

A Note on Karr s Algorithm A Note on Karr s Algorithm Markus Müller-Olm ½ and Helmut Seidl ¾ ½ FernUniversität Hagen, FB Informatik, LG PI 5, Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de ¾ TU München,

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Department of Computer Science and Information Theory Budapest University of Technology and Economics Budapest H-1521 Hungary dmarx@cs.bme.hu Abstract.

More information

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles SIAM J. COMPUT. Vol. 0, No. 0, pp. 000 000 c XXXX Society for Industrial and Applied Mathematics REVISITING TUCKER S ALGORITHM TO COLOR CIRCULAR ARC GRAPHS MARIO VALENCIA-PABON Abstract. The circular arc

More information

Generalized Pebbling Number

Generalized Pebbling Number International Mathematical Forum, 5, 2010, no. 27, 1331-1337 Generalized Pebbling Number A. Lourdusamy Department of Mathematics St. Xavier s College (Autonomous) Palayamkottai - 627 002, India lourdugnanam@hotmail.com

More information

Connectivity and Inference Problems for Temporal Networks

Connectivity and Inference Problems for Temporal Networks Connectivity and Inference Problems for Temporal Networks (Extended Abstract for STOC 2000) David Kempe Jon Kleinberg Ý Amit Kumar Þ October, 1999 Abstract Many network problems are based on fundamental

More information

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Recitation 4: Elimination algorithm, reconstituted graph, triangulation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation

More information

Encoding/Decoding, Counting graphs

Encoding/Decoding, Counting graphs Encoding/Decoding, Counting graphs Russell Impagliazzo and Miles Jones Thanks to Janine Tiefenbruck http://cseweb.ucsd.edu/classes/sp16/cse21-bd/ May 13, 2016 11-avoiding binary strings Let s consider

More information

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM, Montpelier, France. Ö Ð ÖÑÑ Ö Cork

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Cleaning an Arbitrary Regular Network with Mobile Agents

Cleaning an Arbitrary Regular Network with Mobile Agents Cleaning an Arbitrary Regular Network with Mobile Agents Paola Flocchini, Amiya Nayak and Arno Schulz School of Information Technology and Engineering University of Ottawa 800 King Edward Avenue Ottawa,

More information

Some Remarks on the Geodetic Number of a Graph

Some Remarks on the Geodetic Number of a Graph Some Remarks on the Geodetic Number of a Graph Mitre C. Dourado 1, Fábio Protti 2, Dieter Rautenbach 3, and Jayme L. Szwarcfiter 4 1 ICE, Universidade Federal Rural do Rio de Janeiro and NCE - UFRJ, Brazil,

More information

Thread graphs, linear rank-width and their algorithmic applications

Thread graphs, linear rank-width and their algorithmic applications Thread graphs, linear rank-width and their algorithmic applications Robert Ganian Faculty of Informatics, Masaryk University Botanická 68a, Brno, Czech Republic xganian1@fi.muni.cz Abstract. Many NP-hard

More information

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria

FEDOR V. FOMIN. Lectures on treewidth. The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria FEDOR V. FOMIN Lectures on treewidth The Parameterized Complexity Summer School 1-3 September 2017 Vienna, Austria Why treewidth? Very general idea in science: large structures can be understood by breaking

More information

Solving NP-hard Problems on Special Instances

Solving NP-hard Problems on Special Instances Solving NP-hard Problems on Special Instances Solve it in poly- time I can t You can assume the input is xxxxx No Problem, here is a poly-time algorithm 1 Solving NP-hard Problems on Special Instances

More information

A more efficient algorithm for perfect sorting by reversals

A more efficient algorithm for perfect sorting by reversals A more efficient algorithm for perfect sorting by reversals Sèverine Bérard 1,2, Cedric Chauve 3,4, and Christophe Paul 5 1 Département de Mathématiques et d Informatique Appliquée, INRA, Toulouse, France.

More information

Embedding a graph-like continuum in some surface

Embedding a graph-like continuum in some surface Embedding a graph-like continuum in some surface R. Christian R. B. Richter G. Salazar April 19, 2013 Abstract We show that a graph-like continuum embeds in some surface if and only if it does not contain

More information

The Online Median Problem

The Online Median Problem The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas

More information

Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs

Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs Efficient Enumeration Algorithm for Dominating Sets in Bounded Degenerate Graphs Kazuhiro Kurita 1, Kunihiro Wasa 2, Hiroki Arimura 1, and Takeaki Uno 2 1 IST, Hokkaido University, Sapporo, Japan 2 National

More information