Certifying Algorithms and Forbidden Induced Subgraphs
|
|
- Henry Kelley
- 5 years ago
- Views:
Transcription
1 /32 and P. Heggernes 1 D. Kratsch 2 1 Institutt for Informatikk Universitetet i Bergen Norway 2 Laboratoire d Informatique Théorique et Appliquée Université Paul Verlaine - Metz France Dagstuhl - Germany May 20-25, 2007
2 2/32 Outline 1 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? 2 Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph 3 Previous Work Our Results Cographs Trivially Perfect Graphs
3 /32 Why certifying Algorithms? Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? The LEDA Platform of Combinatorial and Geometric Computing : The Planarity Test Story Software Engineering : hard to avoid bugs in software Algorithm vs. software : Correctness of an algorithm does not imply that its implementations have no bugs. Bugs : no termination, wrong result, much too time consuming, much too space consuming, etc.
4 /32 What to do about bugs? Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Program Verification : Methods to find and avoid bugs in software. Algorithm Design : Methods to design algorithms such that bugs in the implementation can be avoided?? Algorithm Design : Algorithms that support an easy authentication of their results using certificates. The implementation may or may not have bugs.
5 /32 A Planarity Test : Certificates Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Linear-time planarity test (e.g. [Hopcroft, Tarjan]) outputs : YES or NO planar embedding (certificate) if input planar Kuratowski graph (certificate) if input non planar Is this all we need?
6 /32 A Planarity Test : Certificates Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Linear-time planarity test (e.g. [Hopcroft, Tarjan]) outputs : YES or NO planar embedding (certificate) if input planar Kuratowski graph (certificate) if input non planar Is this all we need?
7 /32 A Planarity Test : Certificates Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Linear-time planarity test (e.g. [Hopcroft, Tarjan]) outputs : YES or NO planar embedding (certificate) if input planar Kuratowski graph (certificate) if input non planar Is this all we need?
8 /32 A Planarity Test : Certificates Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Linear-time planarity test (e.g. [Hopcroft, Tarjan]) outputs : YES or NO planar embedding (certificate) if input planar Kuratowski graph (certificate) if input non planar Is this all we need?
9 A Planarity Test : Authentication Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? We need to verify the correctness of each certificate!! Verify whether the planar embedding is indeed a planar embedding of the input graph. Verify whether the Kuratowski graph is indeed a subdivision of the input graph. Note that if authentication is positive then the input is certainly planar resp. non planar, no matter whether the planarity test has bugs or not. /32
10 A Planarity Test : Authentication Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? We need to verify the correctness of each certificate!! Verify whether the planar embedding is indeed a planar embedding of the input graph. Verify whether the Kuratowski graph is indeed a subdivision of the input graph. Note that if authentication is positive then the input is certainly planar resp. non planar, no matter whether the planarity test has bugs or not. /32
11 A Planarity Test : Authentication Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? We need to verify the correctness of each certificate!! Verify whether the planar embedding is indeed a planar embedding of the input graph. Verify whether the Kuratowski graph is indeed a subdivision of the input graph. Note that if authentication is positive then the input is certainly planar resp. non planar, no matter whether the planarity test has bugs or not. /32
12 A Planarity Test : Authentication Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? We need to verify the correctness of each certificate!! Verify whether the planar embedding is indeed a planar embedding of the input graph. Verify whether the Kuratowski graph is indeed a subdivision of the input graph. Note that if authentication is positive then the input is certainly planar resp. non planar, no matter whether the planarity test has bugs or not. /32
13 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? General framework of a Certifying Recognition Algorithm Recognition algorithm input : graph G output : YES and certificate for membership output : NO and certificate for non-membership /32 Authentication input : graph G, output of recognition algorithm including certificate output : YES if the certificate has all required properties w.r.t. to the input G
14 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? General framework of a Certifying Recognition Algorithm Recognition algorithm input : graph G output : YES and certificate for membership output : NO and certificate for non-membership /32 Authentication input : graph G, output of recognition algorithm including certificate output : YES if the certificate has all required properties w.r.t. to the input G
15 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? General framework of a Certifying Recognition Algorithm Recognition algorithm input : graph G output : YES and certificate for membership output : NO and certificate for non-membership /32 Authentication input : graph G, output of recognition algorithm including certificate output : YES if the certificate has all required properties w.r.t. to the input G
16 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? General framework of a Certifying Recognition Algorithm Recognition algorithm input : graph G output : YES and certificate for membership output : NO and certificate for non-membership /32 Authentication input : graph G, output of recognition algorithm including certificate output : YES if the certificate has all required properties w.r.t. to the input G
17 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? General framework of a Certifying Recognition Algorithm Recognition algorithm input : graph G output : YES and certificate for membership output : NO and certificate for non-membership /32 Authentication input : graph G, output of recognition algorithm including certificate output : YES if the certificate has all required properties w.r.t. to the input G
18 8/32 Time and space Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Resources needed by a certifying algorithm : running time of recognition algorithm running time of authentication algorithm (membership/non-membership) space needed by certificate Certifying planarity test : running time of recognition algorithm : O(n + m) running time of authentication algorithm for membership : O(n + m) running time of authentication algorithm for non-membership : O(n)
19 8/32 Time and space Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Resources needed by a certifying algorithm : running time of recognition algorithm running time of authentication algorithm (membership/non-membership) space needed by certificate Certifying planarity test : running time of recognition algorithm : O(n + m) running time of authentication algorithm for membership : O(n + m) running time of authentication algorithm for non-membership : O(n)
20 9/32 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? Sublinear, Linear and Weak Certificates sublinear certificates A certificate is sublinear if the running time of its authentication algorithm is tighter than a linear one. linear certificates A certificate is linear if the running time of its authentication algorithm linear. weak certificates A certificate is weak if the running time of its authentication algorithm is the same (or even longer) as the one of the recognition algorithm.
21 10/32 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? A Good Certifying Recognition Algorithm A certifying algorithm to recognize a graph class should preferably have the following properties : Good certifying algorithm Recognition algorithm has linear running time. Membership certificates are linear. Non-membership certificates are sublinear. Informal and Important : An authentication algorithm should be simple and easy to implement. It should not redo the computation from scratch and it should by no means rely on the recognition algorithm.
22 11/32 1 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? 2 Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph 3 Previous Work Our Results Cographs Trivially Perfect Graphs Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph
23 12/32 Characterisation of Graph Classes Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph Certifying recognition algorithms for a graph class G often rely on characterisations of G. Characterizations by forbidden (induced) subgraphs are of particular interest when designing certifying algorithms : highly regarded in graph theory any hereditary graph class can be characterized by their minimal forbidden induced subgraphs corresponding certificates often sublinear corresponding certificates very easy to authenticate
24 13/32 Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph Split Graphs, Cographs and Trivially Perfect Graphs Split Graphs [Földes & Hammer 77] A graph is split if and only if it contains no vertex set that induces 2K 2, C 4, or C 5. Cographs A graph is a cograph if and only if it contains no vertex set that induces P 4. Trivially Perfect Graphs [Golumbic 78] A graph is trivially perfect if and only if it contains no vertex subset that induces P 4 or C 4.
25 14/32 Subgraphs as Certificates Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph Small forbidden (induced) subgraphs are... natural certificates (typically of non-membership) sublinear certificates often not provided by classical recognition algorithms Convincing certificates Small forbidden induced subgraphs are particularly convincing certificates for the user of a corresponding software package. E.g. they can be highlighted in a graphical presentation of the input graph.
26 5/32 Authentication in O(n) Time Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph authentication algorithm The input to the authentication algorithm (to check whether the certificate induces a fixed subgraph H of G) is the input graph G = (V, E) represented by adjacency lists and a certificate A V of constant size. It can be authenticated in time O(n) whether vertex set A induces a subgraph H in the input graph G. Preferably for some fixed labeling of the vertices of H, the recognition algorithm assigns (by pointers) the vertices of H to the set A, indicating an isomorphism between H and G[A].
27 15/32 Authentication in O(n) Time Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph authentication algorithm The input to the authentication algorithm (to check whether the certificate induces a fixed subgraph H of G) is the input graph G = (V, E) represented by adjacency lists and a certificate A V of constant size. It can be authenticated in time O(n) whether vertex set A induces a subgraph H in the input graph G. Preferably for some fixed labeling of the vertices of H, the recognition algorithm assigns (by pointers) the vertices of H to the set A, indicating an isomorphism between H and G[A].
28 6/32 Authentication in O(1) Time Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph authentication in O(1) time The input to the authentication algorithm (to check whether the certificate induces a fixed subgraph H of G) is the input graph G = (V, E) represented by ordered adjacency lists and a certificate A V of constant size. It can be authenticated in time O(1) whether vertex set A induces a subgraph H of the input graph G. Use ordered adjacency lists to represent the input graph G. The recognition algorithm passes the set A to the authentication algorithm by adding pointers to all the edges and non edges of G[A] in the ordered adjacency lists.
29 6/32 Authentication in O(1) Time Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph authentication in O(1) time The input to the authentication algorithm (to check whether the certificate induces a fixed subgraph H of G) is the input graph G = (V, E) represented by ordered adjacency lists and a certificate A V of constant size. It can be authenticated in time O(1) whether vertex set A induces a subgraph H of the input graph G. Use ordered adjacency lists to represent the input graph G. The recognition algorithm passes the set A to the authentication algorithm by adding pointers to all the edges and non edges of G[A] in the ordered adjacency lists.
30 16/32 Authentication in O(1) Time Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph authentication in O(1) time The input to the authentication algorithm (to check whether the certificate induces a fixed subgraph H of G) is the input graph G = (V, E) represented by ordered adjacency lists and a certificate A V of constant size. It can be authenticated in time O(1) whether vertex set A induces a subgraph H of the input graph G. Use ordered adjacency lists to represent the input graph G. The recognition algorithm passes the set A to the authentication algorithm by adding pointers to all the edges and non edges of G[A] in the ordered adjacency lists.
31 Previous Work Our Results Cographs Trivially Perfect Graphs 1 Why certifying algorithms? A Certifying Planarity Test Certificates and authentication What is a Good Certifying Algorithm? 2 Characterisation of Graph Classes Subgraphs as Certificates Authentication of a Subgraph 3 Previous Work Our Results Cographs Trivially Perfect Graphs 7/32
32 18/32 Previous Work Previous Work Our Results Cographs Trivially Perfect Graphs Linear-time certifying algorithms to recognize... planar graphs [LEDA99] chordal graphs [Tarjan & Yannakakis 84/85] cographs [Corneil et al. 85] interval and permutation graphs [Kratsch et al. 06] proper interval graphs [Hell & Huang 04, Meister 05] proper interval bigraphs [Hell & Huang 04] proper circular-arc graphs [Kaplan & Nussbaum 06] unit circular-arc graphs [Kaplan & Nussbaum 06]
33 19/32 Our Results I Previous Work Our Results Cographs Trivially Perfect Graphs Linear-time certifying algorithms to recognize... split graphs threshold graphs bipartite chain graphs cobipartite chain graphs trivially perfect graphs {2K 2, C 4, C 5 }-free {2K 2, C 4, P 4 }-free {2K 2, C 3, C 5 }-free {2K 2, C 3, C 5 }-free {C 4, P 4 }-free
34 20/32 Our Results II Previous Work Our Results Cographs Trivially Perfect Graphs All our certifying algorithms are such that... recognition algorithm has linear running time membership certificate is model of the class membership certificate is linear non-membership certificate is a small forbidden induced subgraph of the class non-membership certificate is sublinear authentication of non-membership certificates in O(1)
35 1/32 Cographs I Previous Work Our Results Cographs Trivially Perfect Graphs definition by graph operations Cographs are defined as follows : A graph consisting of a single vertex is a cograph. Let G 1 and G 2 be cographs. Then the join of G 1 and G 2 is again a cograph. Let G 1 and G 2 be cographs. Then the union of G 1 and G 2 is again a cograph. There are no other cographs.
36 2/32 Cographs II Previous Work Our Results Cographs Trivially Perfect Graphs P 4 -free graphs A graph G is a cograph iff it has no vertex subset that induces a P 4. cotree A graph G is a cograph iff it has a cotree representation. The cotree of a cograph is uniquely determined.
37 Linear time recognition algorithms Previous Work Our Results Cographs Trivially Perfect Graphs There are various linear-time recognition algorithms for cographs. [Corneil et al. 85] linear running time cotree as membership certificate vertex set inducing a P 4 as non-membership certificate sublinear non-membership certificate Does this imply immediately a good certifying algorithm? 3/32
38 Linear time recognition algorithms Previous Work Our Results Cographs Trivially Perfect Graphs There are various linear-time recognition algorithms for cographs. [Corneil et al. 85] linear running time cotree as membership certificate vertex set inducing a P 4 as non-membership certificate sublinear non-membership certificate Does this imply immediately a good certifying algorithm? 3/32
39 4/32 Missing Previous Work Our Results Cographs Trivially Perfect Graphs Find a linear time algorithm that given a graph G = (V, E) and a tree T, decides whether T is a cotree of G. EXERCISE
40 4/32 Missing Previous Work Our Results Cographs Trivially Perfect Graphs Find a linear time algorithm that given a graph G = (V, E) and a tree T, decides whether T is a cotree of G. EXERCISE
41 5/32 Trivially Perfect Previous Work Our Results Cographs Trivially Perfect Graphs Definition A graph G is trivially perfect if for each induced subgraph H of G, the number of maximal cliques of H is equal to the maximum size of an independent set of H [Golumbic 78]. [Golumbic 78] A graph is trivially perfect if and only if it contains no vertex subset that induces P 4 or C 4. [Brandstädt et al.] Trivially perfect graphs are exactly the chordal cographs.
42 6/32 How to certify? Previous Work Our Results Cographs Trivially Perfect Graphs Using known recognition algorithms Both chordal graphs and cographs have linear time certifying algorithms [Tarjan & Yannakakis 84/85, Corneil et al. 85, Habib & Paul 05]. Obtaining a forbidden induced subgraph as a certificate of non-membership can be done by using those algorithms. However The challenge is to give a certificate of membership that can be authenticated in O(n + m) time.
43 7/32 Our membership certificates Previous Work Our Results Cographs Trivially Perfect Graphs universal-in-a-component ordering (uco) A vertex ordering α = (v 1, v 2,..., v n ) of a graph G is a universal-in-a-component ordering (uco) if for 1 i n, the vertex v i is universal in the connected component of G[{v i, v i+1,..., v n }] that v i belongs to. A graph is trivially perfect if and only if it has a uco. special type of cotree A cograph G is a trivially perfect graph if and only if, in the cotree T of G, every 1-node has at most one child that is a 0-node.
44 Linear membership certificates Previous Work Our Results Cographs Trivially Perfect Graphs authentication For both membership certificates we provide a simple authentication algorithm with running time O(n + m). good certifying algorithm Thus we obtain two linear time certifying algorithms to recognize trivially perfect graphs and each has linear membership and sublinear non-membership certificates. 8/32
45 Previous Work Our Results Cographs Trivially Perfect Graphs Merci à tous!
46 For Further Reading I Previous Work Our Results Cographs Trivially Perfect Graphs A. Brandstädt, V. B. Le, and J. P. Spinrad, Graph classes : A survey. Philadelphia, SIAM, D. G. Corneil, H. Lerchs, and L. Stewart-Burlingham, Complement reducible graphs. Discrete Applied Mathematics 3 : ,1981. D. G. Corneil, Y. Perl, and L. K. Stewart, A linear recognition algorithm for cographs. SIAM J. Comput., 14 : , S. Földes and P. L. Hammer, Split graphs. Congressus Numerantium, 19 : , M.C. Golumbic, Trivially perfect graphs. Discrete Math. 24 : , 1978.
47 For Further Reading II Previous Work Our Results Cographs Trivially Perfect Graphs M. C. Golumbic, Algorithmic Graph Theory and Perfect Graphs. Second edition, Annals of Discrete Mathematics 57. Elsevier, M. Habib and C. Paul, A simple linear time algorithm for cograph recognition. Discrete Applied Mathematics, 145 : , P. Hell and J. Huang, Certifying LexBFS recognition algorithms for proper interval graphs and proper interval bigraphs. SIAM J. Discrete Math., 18 : , H. Kaplan and Y. Nussbaum, Certifying algorithms for recognizing proper circular-arc graphs and unit circular-arc graphs. Proc. of WG 2006, LNCS 4271, (2006), pp D. Kratsch, R. M. McConnell, K. Mehlhorn and J. P. Spinrad, Certifying algorithms to recognize interval and permutation graphs. SIAM J. Computing, 36 : , 2006.
48 For Further Reading III Previous Work Our Results Cographs Trivially Perfect Graphs K. Mehlhorn and S. Näher, LEDA : A Platform for Combinatorial and Geometric Computing, Cambridge University Press, D. Meister, Recognition and computation of minimal triangulations for AT-free claw-free and co-comparability graphs. Discrete Appl. Math., 146 : , R. E. Tarjan and M. Yannakakis, Simple linear-time algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM J. Comput., 13 : , Addendum : SIAM J. Computing, 14 : , 1985.
A fully dynamic algorithm for modular decomposition and recognition of cographs
Discrete Applied Mathematics 136 (2004) 329 340 www.elsevier.com/locate/dam A fully dynamic algorithm for modular decomposition and recognition of cographs Ron Shamir a, Roded Sharan b; a School of Computer
More informationNew Graph Classes of Bounded Clique-Width
New Graph Classes of Bounded Clique-Width Andreas Brandstädt 1, Feodor F. Dragan 2, Hoàng-Oanh Le 1, and Raffaele Mosca 3 1 Institut für Theoretische Informatik, Fachbereich Informatik, Universität Rostock,
More informationMinimal dominating sets in graph classes: combinatorial bounds and enumeration
Minimal dominating sets in graph classes: combinatorial bounds and enumeration Jean-François Couturier 1, Pinar Heggernes 2, Pim van t Hof 2, and Dieter Kratsch 1 1 LITA, Université Paul Verlaine - Metz,
More informationMinimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes
Minimal Dominating Sets in Graphs: Enumeration, Combinatorial Bounds and Graph Classes J.-F. Couturier 1 P. Heggernes 2 D. Kratsch 1 P. van t Hof 2 1 LITA Université de Lorraine F-57045 Metz France 2 University
More informationGraph Isomorphism Completeness for Chordal bipartite graphs and Strongly Chordal Graphs
Graph Isomorphism Completeness for Chordal bipartite graphs and Strongly Chordal Graphs Ryuhei Uehara a Seinosuke Toda b Takayuki Nagoya c a Natural Science Faculty, Komazawa University. 1 b Department
More informationPartial Characterizations of Circular-Arc Graphs
Partial Characterizations of Circular-Arc Graphs F. Bonomo a,1,3, G. Durán b,2,4, L.N. Grippo a,5, M.D. Safe a,6 a CONICET and Departamento de Computación, FCEyN, UBA, Buenos Aires, Argentina b Departamento
More informationDynamic Distance Hereditary Graphs using Split Decomposition
Dynamic Distance Hereditary Graphs using Split Decomposition Emeric Gioan CNRS - LIRMM - Université Montpellier II, France December 7, 2007 Joint work with C. Paul (CNRS - LIRMM) Dynamic graph representation
More informationMaking arbitrary graphs transitively orientable: Minimal comparability completions
Making arbitrary graphs transitively orientable: Minimal comparability completions Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment
More informationComplexity Results on Graphs with Few Cliques
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School
More informationProper Helly Circular-Arc Graphs
Proper Helly Circular-Arc Graphs Min Chih Lin 1, Francisco J. Soulignac 1 and Jayme L. Szwarcfiter 2 1 Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de Computación,
More informationApproximating minimum cocolorings
Information Processing Letters 84 (2002) 285 290 www.elsevier.com/locate/ipl Approximating minimum cocolorings Fedor V. Fomin a,, Dieter Kratsch b, Jean-Christophe Novelli c a Heinz Nixdorf Institute,
More informationDominating Set on Bipartite Graphs
Dominating Set on Bipartite Graphs Mathieu Liedloff Abstract Finding a dominating set of minimum cardinality is an NP-hard graph problem, even when the graph is bipartite. In this paper we are interested
More informationExponential time algorithms for the minimum dominating set problem on some graph classes
Exponential time algorithms for the minimum dominating set problem on some graph classes Serge Gaspers University of Bergen Department of Informatics N-500 Bergen, Norway. gaspers@ii.uib.no Dieter Kratsch
More informationKRUSKALIAN GRAPHS k-cographs
KRUSKALIAN GRAPHS k-cographs Ling-Ju Hung Ton Kloks Department of Computer Science and Information Engineering National Chung Cheng University, Min-Hsiung, Chia-Yi 62102, Taiwan Email: hunglc@cs.ccu.edu.tw
More informationChordal graphs MPRI
Chordal graphs MPRI 2017 2018 Michel Habib habib@irif.fr http://www.irif.fr/~habib Sophie Germain, septembre 2017 Schedule Chordal graphs Representation of chordal graphs LBFS and chordal graphs More structural
More informationMinimal Universal Bipartite Graphs
Minimal Universal Bipartite Graphs Vadim V. Lozin, Gábor Rudolf Abstract A graph U is (induced)-universal for a class of graphs X if every member of X is contained in U as an induced subgraph. We study
More informationThe graph isomorphism problem on geometric graphs
The graph isomorphism problem on geometric graphs Ryuhei Uehara To cite this version: Ryuhei Uehara. The graph isomorphism problem on geometric graphs. Discrete Mathematics and Theoretical Computer Science,
More informationChordal Graphs: Theory and Algorithms
Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also
More informationContracting Chordal Graphs and Bipartite Graphs to Paths and Trees
Contracting Chordal Graphs and Bipartite Graphs to Paths and Trees Pinar Heggernes Pim van t Hof Benjamin Léveque Christophe Paul Abstract We study the following two graph modification problems: given
More informationDynamic Distance Hereditary Graphs Using Split Decomposition
Dynamic Distance Hereditary Graphs Using Split Decomposition Emeric Gioan Christophe Paul LIRMM Research Report 07007 March 19, 2007 Abstract The problem of maintaining a representation of a dynamic graph
More informationDynamic Distance Hereditary Graphs using Split Decomposition
Dynamic Distance Hereditary Graphs using Split Decomposition Short version from Proceedings ISAAC 07 (Sendai, Japan) LNCS 4835 Emeric Gioan and Christophe Paul CNRS - LIRMM, Université de Montpellier 2,
More informationLast course. Last course. Michel Habib 28 octobre 2016
Last course Michel Habib habib@irif.fr http://www.irif.fr/~habib 28 octobre 2016 Schedule Introduction More structural insights on chordal graphs Properties of reduced clique graphs Exercises Interval
More informationMinimal dominating sets in interval graphs and trees
Minimal dominating sets in interval graphs and trees Petr A. Golovach a, Pinar Heggernes a, Mamadou Moustapha Kanté b, Dieter Kratsch c,, Yngve Villanger a a Department of Informatics, University of Bergen,
More informationSome Remarks on the Geodetic Number of a Graph
Some Remarks on the Geodetic Number of a Graph Mitre C. Dourado 1, Fábio Protti 2, Dieter Rautenbach 3, and Jayme L. Szwarcfiter 4 1 ICE, Universidade Federal Rural do Rio de Janeiro and NCE - UFRJ, Brazil,
More informationarxiv: v1 [cs.dm] 21 Dec 2015
The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey
More informationTriangle Graphs and Simple Trapezoid Graphs
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University
More informationSome new results on circle graphs. Guillermo Durán 1
Some new results on circle graphs Guillermo Durán 1 Departamento de Ingeniería Industrial, Facultad de Ciencias Físicas y Matemáticas, Universidad de Chile, Santiago, Chile gduran@dii.uchile.cl Departamento
More informationA New Approach to Graph Recognition and Applications to Distance-Hereditary Graphs
Nakano S-i, Uehara R, Uno T. A new approach to graph recognition and applications to distance-hereditary graphs. JOUR- NAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(3): 517 533 May 2009 A New Approach to Graph
More informationPolarity of chordal graphs
Discrete Applied Mathematics 156 (2008) 2469 2479 www.elsevier.com/locate/dam Polarity of chordal graphs Tınaz Ekim a,, Pavol Hell b, Juraj Stacho b, Dominique de Werra a a ROSE, Ecole Polytechnique Fédérale
More informationCharacterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs
ISSN 0975-3303 Mapana J Sci, 11, 4(2012), 121-131 https://doi.org/10.12725/mjs.23.10 Characterization of Super Strongly Perfect Graphs in Chordal and Strongly Chordal Graphs R Mary Jeya Jothi * and A Amutha
More informationCharacterizations of graph classes by forbidden configurations
Characterizations of graph classes by forbidden configurations Zdeněk Dvořák September 14, 2015 We consider graph classes that can be described by excluding some fixed configurations. Let us give some
More informationNecessary edges in k-chordalizations of graphs
Necessary edges in k-chordalizations of graphs Hans L. Bodlaender Abstract In this note, we look at which edges must always be added to a given graph G = (V, E), when we want to make it a chordal graph
More informationApproximation Algorithms for Geometric Intersection Graphs
Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline
More informationOn cliques of Helly Circular-arc Graphs
Electronic Notes in Discrete Mathematics 30 (2008) 117 122 www.elsevier.com/locate/endm On cliques of Helly Circular-arc Graphs Min Chih Lin a,1, Ross M. McConnell b, Francisco J. Soulignac a,2 and Jayme
More informationLinear Time Split Decomposition Revisited
Linear Time Split Decomposition Revisited Pierre Charbit Fabien de Montgoler Mathieu Ranot LIAFA, Univ. Paris Diderot - CNRS, ANR Project Graal {charbit,fm,raffinot}@liafa.jussieu.fr Abstract Given a family
More informationSmall Survey on Perfect Graphs
Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families
More informationChordal deletion is fixed-parameter tractable
Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It
More informationarxiv: v1 [cs.ds] 14 Dec 2018
Graph classes and forbidden patterns on three vertices Laurent Feuilloley 1,2,3 and Michel Habib 1,3 arxiv:1812.05913v1 [cs.ds] 14 Dec 2018 1 IRIF, UMR 8243 CNRS & Paris Diderot University, Paris, France
More informationProbe Distance-Hereditary Graphs
Proc. 16th Computing: The Australasian Theory Symposium (CATS 2010), Brisbane, Australia Probe Distance-Hereditary Graphs Maw-Shang Chang 1 Ling-Ju Hung 1 Peter Rossmanith 2 1 Department of Computer Science
More informationClosed orders and closed graphs
DOI: 10.1515/auom-2016-0034 An. Şt. Univ. Ovidius Constanţa Vol. 24(2),2016, 159 167 Closed orders and closed graphs Marilena Crupi Abstract The class of closed graphs by a linear ordering on their sets
More informationBlock Duplicate Graphs and a Hierarchy of Chordal Graphs
Block Duplicate Graphs and a Hierarchy of Chordal Graphs Martin Charles Golumbic Uri N. Peled August 18, 1998 Revised October 24, 2000 and March 15, 2001 Abstract A block graph is a graph whose blocks
More informationChordal Probe Graphs (extended abstract)
Chordal Probe Graphs (extended abstract) Martin Charles Golumbic Marina Lipshteyn Abstract. In this paper, we introduce the class of chordal probe graphs which are a generalization of both interval probe
More informationFinding and listing induced paths and cycles
1 Finding and listing induced paths and cycles 2 3 Chính T. Hoàng Marcin Kamiński Joe Sawada R. Sritharan November 30, 2010 4 5 6 7 8 9 10 11 Abstract Many recognition problems for special classes of graphs
More informationOn the Recognition of P 4 -Comparability Graphs
On the Recognition of P 4 -Comparability Graphs Stavros D. Nikolopoulos and Leonidas Palios Department of Computer Science, University of Ioannina GR-45110 Ioannina, Greece {stavros,palios}@cs.uoi.gr Abstract.
More informationDirac-type characterizations of graphs without long chordless cycles
Dirac-type characterizations of graphs without long chordless cycles Vašek Chvátal Department of Computer Science Rutgers University chvatal@cs.rutgers.edu Irena Rusu LIFO Université de Orléans irusu@lifo.univ-orleans.fr
More informationEvery DFS Tree of a 3-Connected Graph Contains a Contractible Edge
Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge Amr Elmasry Kurt Mehlhorn Jens M. Schmidt Abstract Let G be a 3-connected graph on more than 4 vertices. We show that every depth-first-search
More informationOn Structural Parameterizations of the Matching Cut Problem
On Structural Parameterizations of the Matching Cut Problem N. R. Aravind, Subrahmanyam Kalyanasundaram, and Anjeneya Swami Kare Department of Computer Science and Engineering, IIT Hyderabad, Hyderabad,
More informationEquivalence of the filament and overlap graphs of subtrees of limited trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 19:1, 2017, #20 Equivalence of the filament and overlap graphs of subtrees of limited trees arxiv:1508.01441v4 [cs.dm] 14 Jun 2017 Jessica
More informationGraph Theory. Probabilistic Graphical Models. L. Enrique Sucar, INAOE. Definitions. Types of Graphs. Trajectories and Circuits.
Theory Probabilistic ical Models L. Enrique Sucar, INAOE and (INAOE) 1 / 32 Outline and 1 2 3 4 5 6 7 8 and 9 (INAOE) 2 / 32 A graph provides a compact way to represent binary relations between a set of
More informationHelly Property, Clique Graphs, Complementary Graph Classes, and Sandwich Problems
Helly Property, Clique Graphs, Complementary Graph Classes, and Sandwich Problems Mitre C. Dourado 1, Priscila Petito 2, Rafael B. Teixeira 2 and Celina M. H. de Figueiredo 2 1 ICE, Universidade Federal
More informationParameterized coloring problems on chordal graphs
Parameterized coloring problems on chordal graphs Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary dmarx@cs.bme.hu
More informationMinimal comparability completions of arbitrary graphs
Minimal comparability completions of arbitrary graphs Pinar Heggernes Federico Mancini Charis Papadopoulos Abstract A transitive orientation of an undirected graph is an assignment of directions to its
More informationRecognition of Circular-Arc Graphs and Some Subclasses
TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF COMPUTER SCIENCE Recognition of Circular-Arc Graphs and Some Subclasses This thesis was submitted in partial fulfillment
More informationA Simple Linear-Time Modular Decomposition Algorithm for Graphs, Using Order Extension
A Simple Linear-Time Modular Decomposition Algorithm for Graphs, Using Order Extension Michel Habib, Fabien De Montgolfier, Christophe Paul To cite this version: Michel Habib, Fabien De Montgolfier, Christophe
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 158 (2010) 434 443 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam On end-vertices of Lexicographic Breadth
More informationOn some subclasses of circular-arc graphs
On some subclasses of circular-arc graphs Guillermo Durán - Min Chih Lin Departamento de Computación Facultad de Ciencias Exactas y Naturales Universidad de Buenos Aires e-mail: {willy,oscarlin}@dc.uba.ar
More informationSome results on Interval probe graphs
Some results on Interval probe graphs In-Jen Lin and C H Wu Department of Computer science Science National Taiwan Ocean University, Keelung, Taiwan ijlin@mail.ntou.edu.tw Abstract Interval Probe Graphs
More informationMaximizing the Strong Triadic Closure in Split Graphs and Proper Interval Graphs
Maximizing the Strong Triadic Closure in Split Graphs and Proper Interval Graphs Athanasios L. Konstantinidis 1 and Charis Papadopoulos 2 1 Department of Mathematics, University of Ioannina, Greece skonstan@cc.uoi.gr
More informationGraphs and Orders Cours MPRI
Graphs and Orders Cours MPRI 2012 2013 Michel Habib habib@liafa.univ-paris-diderot.fr http://www.liafa.univ-paris-diderot.fr/~habib Chevaleret novembre 2012 Table des Matières Introduction Definitions
More informationGraph Theory: Introduction
Graph Theory: Introduction Pallab Dasgupta, Professor, Dept. of Computer Sc. and Engineering, IIT Kharagpur pallab@cse.iitkgp.ernet.in Resources Copies of slides available at: http://www.facweb.iitkgp.ernet.in/~pallab
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 160 (2012) 505 512 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam 1-planarity of complete multipartite
More informationTolerance Graphs and Orders. 1 Introduction and Overview. Stefan Felsner
Tolerance Graphs and Orders Stefan Felsner Freie Universität Berlin, Fachbereich Mathematik und Informatik, Takustr. 9, 14195 Berlin, Germany E-mail: felsner@inf.fu-berlin.de Abstract. We show that if
More informationPolynomial-time algorithms for Subgr Isomorphism in small graph classes o graphs. Author(s)Konagaya, Matsuo; Otachi, Yota; Ueha
JAIST Reposi https://dspace.j Title Polynomial-time algorithms for Subgr Isomorphism in small graph classes o graphs Author(s)Konagaya, Matsuo; Otachi, Yota; Ueha Citation Discrete Applied Mathematics,
More informationarxiv: v1 [math.co] 20 Nov 2018
A remark on the characterization of triangulated graphs arxiv:1811.08411v1 [math.co] 20 Nov 2018 R. GARGOURI a H. NAJAR b a Taibah University, College of Sciences, Department of Mathematics Madinah, Saudi
More informationInterval completion with few edges
Interval completion with few edges Pinar Heggernes Christophe Paul Jan Arne Telle Yngve Villanger Abstract We present an algorithm with runtime O(k 2k n 3 m) for the following NP-complete problem [8, problem
More information3-colouring AT-free graphs in polynomial time
3-colouring AT-free graphs in polynomial time Juraj Stacho Wilfrid Laurier University, Department of Physics and Computer Science, 75 University Ave W, Waterloo, ON N2L 3C5, Canada stacho@cs.toronto.edu
More informationForbidden subgraph characterization of bipartite unit probe interval graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 52 (2012), Pages 19 31 Forbidden subgraph characterization of bipartite unit probe interval graphs David E. Brown Department of Mathematics and Statistics Utah
More informationTHE INDEPENDENCE NUMBER PROJECT:
THE INDEPENDENCE NUMBER PROJECT: α-properties AND α-reductions C. E. LARSON DEPARTMENT OF MATHEMATICS AND APPLIED MATHEMATICS VIRGINIA COMMONWEALTH UNIVERSITY 1. Introduction A graph property P is an α-property
More informationR. Sritharan Computer Science Department The University of Dayton Joint work with Chandra Mohan Krishnamurthy (TeleNav) and Arthur Busch (The
R. Sritharan Computer Science Department The University of Dayton Joint work with Chandra Mohan Krishnamurthy (TeleNav) and Arthur Busch (The University of Dayton) Feodor Dragan (Kent State University)
More informationOn the Convexity Number of Graphs
On the Convexity Number of Graphs Mitre C. Dourado 1, Fábio Protti, Dieter Rautenbach 3, and Jayme L. Szwarcfiter 4 1 ICE, Universidade Federal Rural do Rio de Janeiro and NCE - UFRJ, Brazil, email: mitre@nce.ufrj.br
More informationA Decomposition for Chordal graphs and Applications
A Decomposition for Chordal graphs and Applications Michel Habib Joint work with Vincent Limouzy and Juraj Stacho Pretty Structure, Existencial Polytime Jack Edmonds Birthday, 7-9 april 2009 Schedule Chordal
More informationAbstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.
Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph
More informationColoring Fuzzy Circular Interval Graphs
Coloring Fuzzy Circular Interval Graphs Friedrich Eisenbrand 1 Martin Niemeier 2 SB IMA DISOPT EPFL Lausanne, Switzerland Abstract Computing the weighted coloring number of graphs is a classical topic
More informationA Survey on Algorithmic Aspects of Modular Decomposition 1
A Survey on Algorithmic Aspects of Modular Decomposition 1 Michel Habib a and Christophe Paul b a LIAFA, Univ. Paris Diderot - Paris VII, France b CNRS, LIRMM, Univ. Montpellier II, France Abstract The
More informationContracting a chordal graph to a split graph or a tree
Contracting a chordal graph to a split graph or a tree Petr A. Golovach 1, Marcin Kamiński 2, and Daniël Paulusma 1 1 School of Engineering and Computing Sciences, Durham University, Science Laboratories,
More informationAlgorithm design in Perfect Graphs N.S. Narayanaswamy IIT Madras
Algorithm design in Perfect Graphs N.S. Narayanaswamy IIT Madras What is it to be Perfect? Introduced by Claude Berge in early 1960s Coloring number and clique number are one and the same for all induced
More informationLecture Notes on Graph Theory
Lecture Notes on Graph Theory Vadim Lozin 1 Introductory concepts A graph G = (V, E) consists of two finite sets V and E. The elements of V are called the vertices and the elements of E the edges of G.
More informationLinear Time Split Decomposition Revisited
Linear Time Split Decomposition Revisited Pierre Charbit, Fabien De Montgolfier, Mathieu Raffinot To cite this version: Pierre Charbit, Fabien De Montgolfier, Mathieu Raffinot. Linear Time Split Decomposition
More informationTHE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES Ali Mansouri 1 and Mohamed Salim bouhlel 2 1 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia 2 Department of Electronic
More informationAn Effective Upperbound on Treewidth Using Partial Fill-in of Separators
An Effective Upperbound on Treewidth Using Partial Fill-in of Separators Boi Faltings Martin Charles Golumbic June 28, 2009 Abstract Partitioning a graph using graph separators, and particularly clique
More informationPlanarity Algorithms via PQ-Trees (Extended Abstract)
Electronic Notes in Discrete Mathematics 31 (2008) 143 149 www.elsevier.com/locate/endm Planarity Algorithms via PQ-Trees (Extended Abstract) Bernhard Haeupler 1 Department of Computer Science, Princeton
More informationarxiv: v1 [cs.dm] 24 Apr 2015
On Pairwise Compatibility of Some Graph (Super)Classes T. Calamoneri a,1, M. Gastaldello a,b, B. Sinaimeri b a Department of Computer Science, Sapienza University of Rome, Italy b INRIA and Université
More informationChapter 1. Introduction. 1.1 Background and Motivation
Chapter 1 Introduction 1.1 Background and Motivation Our mathematical adventure begins with a collection of intervals on the real line. The intervals may have come from an application, for example, they
More informationA NEW TEST FOR INTERVAL GRAPHS. Wen-Lian Hsu 1
A NEW TEST FOR INTERVAL GRAPHS Wen-Lian Hsu 1 Institute of Information Science, Academia Sinica Taipei, Taiwan, Republic of China hsu@iis.sinica.edu.tw Abstract An interval graph is the intersection graph
More informationRecognizing Bipolarizable and P 4 -Simplicial Graphs
Recognizing Bipolarizable and P 4 -Simplicial Graphs Stavros D. Nikolopoulos and Leonidas Palios Department of Computer Science, University of Ioannina GR-45110 Ioannina, Greece {stavros,palios}@cs.uoi.gr
More informationVadim V. Lozin a , USA. b RUTCOR, Rutgers University, 640 Bartholomew Road, Piscataway, NJ
R u t c o r Research R e p o r t A polynomial algorithm to find an independent set of maximum weight in a fork-free graph Vadim V. Lozin a Martin Milanič b RRR 30-2005, October 2005 RUTCOR Rutgers Center
More informationAlgorithmic Graph Theory and Perfect Graphs
Algorithmic Graph Theory and Perfect Graphs Second Edition Martin Charles Golumbic Caesarea Rothschild Institute University of Haifa Haifa, Israel 2004 ELSEVIER.. Amsterdam - Boston - Heidelberg - London
More informationVertex 3-colorability of claw-free graphs
Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,
More informationComputational Discrete Mathematics
Computational Discrete Mathematics Combinatorics and Graph Theory with Mathematica SRIRAM PEMMARAJU The University of Iowa STEVEN SKIENA SUNY at Stony Brook CAMBRIDGE UNIVERSITY PRESS Table of Contents
More informationGraph-Theoretic Algorithms Project Report. Trapezoid Graphs. Reza Dorrigiv February 2004
Graph-Theoretic Algorithms Project Report Trapezoid Graphs Reza Dorrigiv rdorrigiv@cs.uwaterloo.ca February 2004 Introduction Trapezoid graphs are intersection graphs of trapezoids between two horizontal
More informationConstructions of k-critical P 5 -free graphs
1 2 Constructions of k-critical P 5 -free graphs Chính T. Hoàng Brian Moore Daniel Recoskie Joe Sawada Martin Vatshelle 3 January 2, 2013 4 5 6 7 8 Abstract With respect to a class C of graphs, a graph
More informationLinear Separation of Connected Dominating Sets in Graphs (Extended Abstract) Nina Chiarelli 1 and Martin Milanič 2
Linear Separation of Connected Dominating Sets in Graphs (Extended Abstract) Nina Chiarelli 1 and Martin Milanič 2 1 University of Primorska, UP FAMNIT, Glagoljaška 8, SI6000 Koper, Slovenia nina.chiarelli@student.upr.si
More informationBayesian Networks, Winter Yoav Haimovitch & Ariel Raviv
Bayesian Networks, Winter 2009-2010 Yoav Haimovitch & Ariel Raviv 1 Chordal Graph Warm up Theorem 7 Perfect Vertex Elimination Scheme Maximal cliques Tree Bibliography M.C.Golumbic Algorithmic Graph Theory
More information9 About Intersection Graphs
9 About Intersection Graphs Since this lecture we focus on selected detailed topics in Graph theory that are close to your teacher s heart... The first selected topic is that of intersection graphs, i.e.
More informationMaximum Cardinality Search for Computing Minimal Triangulations of Graphs 1
Algorithmica (2004) 39: 287 298 DOI: 10.1007/s00453-004-1084-3 Algorithmica 2004 Springer-Verlag New York, LLC Maximum Cardinality Search for Computing Minimal Triangulations of Graphs 1 Anne Berry, 2
More informationDeciding k-colorability of P 5 -free graphs in polynomial time
Deciding k-colorability of P 5 -free graphs in polynomial time Chính T. Hoàng Marcin Kamiński Vadim Lozin Joe Sawada Xiao Shu April 16, 2008 Abstract The problem of computing the chromatic number of a
More informationCertifying Algorithms p.1/20
Certifying Algorithms Kurt Mehlhorn MPI für Informatik Saarbrücken Germany Certifying Algorithms p.1/20 Outline of Talk run uncertified planarity test Certifying Algorithms: motivation and concept Three
More informationClique-Width for Four-Vertex Forbidden Subgraphs
Clique-Width for Four-Vertex Forbidden Subgraphs Andreas Brandstädt 1 Joost Engelfriet 2 Hoàng-Oanh Le 3 Vadim V. Lozin 4 March 15, 2005 1 Institut für Informatik, Universität Rostock, D-18051 Rostock,
More informationPerfect Matchings in Claw-free Cubic Graphs
Perfect Matchings in Claw-free Cubic Graphs Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, 305-701, Republic of Korea sangil@kaist.edu Submitted: Nov 9, 2009; Accepted: Mar 7, 2011; Published:
More informationComputing the K-terminal Reliability of Circle Graphs
Computing the K-terminal Reliability of Circle Graphs Min-Sheng Lin *, Chien-Min Chen Department of Electrical Engineering National Taipei University of Technology Taipei, Taiwan Abstract Let G denote
More information