COL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:

Similar documents
Lecture 10: Strongly Connected Components, Biconnected Graphs

Graph Algorithms. Andreas Klappenecker. [based on slides by Prof. Welch]

Lecture 3: Graphs and flows

Depth-First Search Depth-first search (DFS) is another way to traverse the graph.

Graph Algorithms Using Depth First Search

These are not polished as solutions, but ought to give a correct idea of solutions that work. Note that most problems have multiple good solutions.

Algorithm Design and Analysis

CSE 331: Introduction to Algorithm Analysis and Design Graphs

Copyright 2000, Kevin Wayne 1

Undirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11

Lecture 22 Tuesday, April 10

Cut vertices, Cut Edges and Biconnected components. MTL776 Graph algorithms

Treewidth and graph minors

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

U.C. Berkeley CS170 : Algorithms, Fall 2013 Midterm 1 Professor: Satish Rao October 10, Midterm 1 Solutions

Assignment # 4 Selected Solutions

Graph Algorithms. Imran Rashid. Jan 16, University of Washington

Strongly Connected Components

CS521 \ Notes for the Final Exam

UCSD CSE 101 MIDTERM 1, Winter 2008

COMPSCI 311: Introduction to Algorithms First Midterm Exam, October 3, 2018

CSE 417: Algorithms and Computational Complexity. 3.1 Basic Definitions and Applications. Goals. Chapter 3. Winter 2012 Graphs and Graph Algorithms

st-orientations September 29, 2005

Graphs. Part I: Basic algorithms. Laura Toma Algorithms (csci2200), Bowdoin College

Elementary Graph Algorithms CSE 6331

Searching in Graphs (cut points)

3.1 Basic Definitions and Applications. Chapter 3. Graphs. Undirected Graphs. Some Graph Applications

CS781 Lecture 2 January 13, Graph Traversals, Search, and Ordering

Graph Algorithms. Definition

Chapter 3. Graphs. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Solution to Graded Problem Set 4

Problem Set 2 Solutions

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

3.1 Basic Definitions and Applications

Undirected Graphs. DSA - lecture 6 - T.U.Cluj-Napoca - M. Joldos 1

CSE Winter 2015 Quiz 1 Solutions

COL 702 : Assignment 1 solutions

DFS & STRONGLY CONNECTED COMPONENTS

Solutions to relevant spring 2000 exam problems

Graph. Vertex. edge. Directed Graph. Undirected Graph

Trees. Arash Rafiey. 20 October, 2015

CSCE f(n) = Θ(g(n)), if f(n) = O(g(n)) and f(n) = Ω(g(n)).

Copyright 2000, Kevin Wayne 1

15-451/651: Design & Analysis of Algorithms October 5, 2017 Lecture #11: Depth First Search and Strong Components last changed: October 17, 2017

7.3 Spanning trees Spanning trees [ ] 61

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1

On the Page Number of Upward Planar Directed Acyclic Graphs

Matching Theory. Figure 1: Is this graph bipartite?

Algorithms: Lecture 10. Chalmers University of Technology

3.1 Basic Definitions and Applications

Chapter 3. Graphs CLRS Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

4 Basics of Trees. Petr Hliněný, FI MU Brno 1 FI: MA010: Trees and Forests

3.4 Testing Bipartiteness

Solutions. (a) Claim: A d-ary tree of height h has at most 1 + d +...

CS/COE 1501 cs.pitt.edu/~bill/1501/ Graphs

MC 302 GRAPH THEORY 10/1/13 Solutions to HW #2 50 points + 6 XC points

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Graph Representation

CS4800: Algorithms & Data Jonathan Ullman

Binary Decision Diagrams

CS 161 Lecture 11 BFS, Dijkstra s algorithm Jessica Su (some parts copied from CLRS) 1 Review

Scribes: Romil Verma, Juliana Cook (2015), Virginia Williams, Date: May 1, 2017 and Seth Hildick-Smith (2016), G. Valiant (2017), M.

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CISC 320 Midterm Exam

Graph Representations and Traversal

MAL 376: Graph Algorithms I Semester Lecture 1: July 24

CS2 Algorithms and Data Structures Note 10. Depth-First Search and Topological Sorting

Notes slides from before lecture. CSE 21, Winter 2017, Section A00. Lecture 10 Notes. Class URL:

Lecture 8: PATHS, CYCLES AND CONNECTEDNESS

1. Suppose you are given a magic black box that somehow answers the following decision problem in polynomial time:

Algorithm Design and Analysis

Finding Strongly Connected Components

Goals! CSE 417: Algorithms and Computational Complexity!

CIS 121 Data Structures and Algorithms Minimum Spanning Trees

Broadcast: Befo re 1

1 Connected components in undirected graphs

Dist(Vertex u, Vertex v, Graph preprocessed) return u.dist v.dist

Applications of BDF and DFS

Homework 2. Sample Solution. Due Date: Thursday, May 31, 11:59 pm

Strongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other.

implementing the breadth-first search algorithm implementing the depth-first search algorithm

Solutions to In-Class Problems Week 4, Fri

Design and Analysis of Algorithms

CSCE 750, Fall 2002 Notes 6 Page Graph Problems ffl explore all nodes (breadth first and depth first) ffl find the shortest path from a given s

γ(ɛ) (a, b) (a, d) (d, a) (a, b) (c, d) (d, d) (e, e) (e, a) (e, e) (a) Draw a picture of G.

CS/COE

We will show that the height of a RB tree on n vertices is approximately 2*log n. In class I presented a simple structural proof of this claim:

Properties of red-black trees

Introduction to Algorithms I

CSE 101. Algorithm Design and Analysis Miles Jones Office 4208 CSE Building Lecture 5: SCC/BFS

DO NOT RE-DISTRIBUTE THIS SOLUTION FILE

CS170 Discussion Section 4: 9/18

Lecture 10 Graph algorithms: testing graph properties

CSE 101. Algorithm Design and Analysis Miles Jones and Russell Impagliazzo Miles Office 4208 CSE Building

Faster and Dynamic Algorithms For Maximal End-Component Decomposition And Related Graph Problems In Probabilistic Verification

Graph Algorithms. Chapter 22. CPTR 430 Algorithms Graph Algorithms 1

Fundamental Graph Algorithms Part Three

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD

Transcription:

Name: Entry number: There are 6 questions for a total of 75 points. 1. Consider functions f(n) = 10n2 n + 3 n and g(n) = n3 n. Answer the following: (a) ( 1 / 2 point) State true or false: f(n) is O(g(n)). (b) ( 1 / 2 point) State true or false: f(n) is Ω(g(n)). (c) (2 points) Give reason for your answer to part (b). (a) (b) True False Solution: f(n) is Ω(g(n)) iff there exists constants c > 0, n 0 0 such that for all n n 0 f(n) c g(n). So, f(n) is not Ω(g(n)) iff for all constants c > 0, n 0 0, there exists n n 0 such that f(n) < c g(n). Note that (c/2)n3 n > 3 n when n > 2/c for any constant c. Moreover, note that (c/2)n3 n > 10n2 n (3/2) n > 20/c n > log 3/2 (20/c). Combining the previous two statements, we get that for any constant c > 0, cn3 n > (10n2 n +3 n ) when n > max (2/c, log 3/2 (20/c)). This further implies that for any constants c > 0, n 0 0, cn 3 n > (10n 2 n + 3 n ) for n = max (2c, log 3/2 (20c), n 0 ). Note that n n 0. So, for any constants c > 0, n 0 0, there is a number n n 0 (n above is such a number) such that cn3 n > (10n2 n + 3 n ). This implies that f(n) is not Ω(g(n)). 2. (2 points) A rooted tree has a special node r called the root and zero or more rooted subtrees T 1,..., T k each of whose roots are connected to r. The root of each subtree is called the child of r and r is called the parent of each child. Nodes with no children are called leaf nodes. A binary tree is a rooted tree in which each node has at most two children. Show by induction that in any binary tree the number of nodes with two children is exactly one less than the number of leaves. Solution: We prove by induction on the number of vertices of the binary tree. Consider the proposition: P (i): In any binary tree with i nodes, the number of nodes with two children is exactly one less than the number of leaves. We will show by induction that P (i) is true for all i. Base case: P (1) is true since a binary tree with one node has 1 leaf and 0 nodes with two children. Inductive step: Assume that P (1), P (2),..., P (k) are true. We will argue that P (k + 1) is true. Indeed, consider any binary tree T with k + 1 nodes and consider any leaf v in this tree. Let u be the parent of v in the tree. Consider the tree T obtained by removing v and its edge from T. Note that T is a binary tree with k nodes. Let x T and x T denote the number of nodes with two children in T and T respectively. Let y T and y T denote the number of leaves in T and T respectively. By induction hypothesis we know that: x T = y T 1 (1) 1 of 7

There are two cases to consider: Case 1 u has two children in T : In this case, x T = x T 1 and y T = y T 1. This is because in T, u is a node with only one child and T has one less leaf node. So, from (1), we get that x T = y T 1. Case 2 u has only one child in T : In this case, x T = x T and y T = y T. This is because after removing v, u becomes a leaf node in T and the number of nodes with two children does not change between T and T. So, from (1), we get that x T = y T 1. This completes the proof. 3. (20 points) Given an undirected graph, we call a vertex critical if its removal disconnects the graph. Design an algorithm that finds all the critical vertices in a given graph. Give pseudocode, discuss running time, and give proof of correctness. Solution: Critical vertices are more popularly known as articulation points. The edges in any undirected graph may be categorized into the following two classes with respect to the execution of DF S with starting vertex s: 1. Tree edges: These are the edges in the DFS tree obtained. 2. Back edges: These are the remaining edges. These are the edges the lead to a vertex that has already been explored. Note that for undirected graphs such a vertex is a predecessor (w.r.t. DFS tree) of the vertex being explored. Let T be the DFS tree rooted at s that is obtained by running DF S starting from s. Before going further, let us make the following observations: Claim 1: The leaves of T are not critical vertices. Proof. This is trivial since removing a leaf does not disconnect the tree and hence does not disconnect the graph. Claim 2: The root s is a critical vertex iff it has at least two children in T. Proof. If s has only one child, then removing s does not disconnect the graph. If s has more than 1 child, then removing s will disconnect the children since there cannot be an edge between a vertices that belong to different sub-trees of s. For determining whether an internal node is a critical node, we will have to do a bit more. While doing DF S, let us number the vertices in order of their discovery. That is, every time an unexplored vertex is visited, we number it with the next integer. Let us call this the start time for the vertex (since in some sense, it denotes the time at which this node was discovered). The following algorithm does this numbering: 2 of 7

- time 0 DFS-with-start(u) - Mark u as explored and set start(v) ++time - While there is an unexplored neighbor v of u: - DFS-with-start(v) Let us define a back-path for a vertex u to be a path that takes tree edges starting from u followed by a back edge. For each vertex v, we also calculate a number low(v), which is the start time of a vertex with lowest value of start that is reachable using a back-path from v. The following algorithm calculates such a number. - time 0 DFS-with-low(u) - Mark u as explored, set start(u) + + time, and set low(u) start(u) - For every neighbor v of u: - If v is unexplored - parent(v) u - DFS-with-low(v) - low(u) min (low(u), low(v)) - Else if (parent(u) v) - low(u) min (low(u), start(v)) Now, we can make the following claims with respect to the numbering defined above. Claim 3: If an internal node u has a child v such that low(v) start(u), then v is a critical node. Proof. This is true since there is no path from any vertex in the tree T v rooted at v to any other vertex that is not v or a vertex in T v. Claim 4: For any internal node u, if all its children have low value smaller than the start time of u, then u is not a critical node. Proof. Consider the sub-tree T v rooted at any child v of u. Since low(v) < start(u), there is a path from any vertex in T v to a predecessor of u in T. So removal of u does not disconnect the graph. Finally, we note that the above checks may be performed while computing these numbers. The algorithm is given below: 3 of 7

- time 0 OutputCritical(G) - Call DFS-with-critical(s) for any starting vertex s - If there are at least two nodes u, v such that parent(u) = parent(v) = s, then output s is a critical vertex DFS-with-critical(u) - Mark u as explored, set start(u) + + time, and set low(u) start(u) - For every neighbor v of u: - If v is unexplored - parent(v) u - DFS-with-low(v) - If (low(v) start(u)), then output u is a critical vertex - low(u) min (low(u), low(v)) - Else if (parent(u) v) - low(u) min (low(u), start(v)) The correctness follows from claims 3 and 4. Running time: The running time is proportional to the running time of DFS. So, it is O(n + m). 4. Consider two vertices s and t in a given graph. A pair of vertices (u, v) (different from s and t) are called bi-critical with respect to s and t if the removal of u and v from the graph disconnects s and t. Suppose we consider graphs where the shortest distance between s and t is strictly greater than n/3. With respect to such graphs, answer the questions below: (a) (5 points) Prove or disprove the following statement: There exists a pair of vertices that are bi-critical with respect to s and t. Solution: Consider the layers obtained when doing BFS with starting vertex s. layers be L(0), L(1),... We know that t is present in a layer with number r > n 3. Claim 1: There is at least one layer 1 i < r such that L(i) 2. Let these Proof. For the sake of contradiction assume that for all 1 j < r, L(j) > 2. Then L(0) L(1)... L(r) 1 + 3 + 3 +... + 3 +1 n + 2 which is a contradiction. }{{} n/3 terms Claim 2: Removing the vertices in any layer L(i) for i < r, disconnects s and t. Proof. This follows from the property that all graph edges are between vertices in the same or adjacent layers. (b) (5 points) Design an algorithm for finding a bi-critical pair of vertices with respect to given vertices s and t. Discuss running time. Proof of correctness is not required. 4 of 7

Solution: Given the above claims, the algorithm and its proof of correctness is simple: BiCrititcal(G, s, t) - Do BF S(G, s) storing the layers. - Let L(r) be the layer in which t is present and let L(i) be the layer s.t. i < r and L(i) 2. - If L(i) = 2, then output the vertices of L(i). Otherwise, output the vertex in L(i) and any other vertex other than s and t. Running time: The running time of the above algorithm is the same as that of BFS plus the time spent in checking the layers. This would be O(n + m). 5. (20 points) A directed graph G = (V, E) is called one-way-connected if for all pair of vertices u and v there is a path from vertex u to v or there is a path from vertex v to u. Note that the or in the previous statement is a logical OR and not XOR. Design an algorithm to check if a given graph is one-way-connected. Give pseudocode, discuss running time and give proof of correctness. Solution: Let V 1, V 2,..., V k be the vertex sets of the strongly connected components of the graph G. As discussed in class, there is an O(n + m) algorithm to find the strongly connected components in any directed graph. We will construct another graph G scc = (V scc, E scc ) in which there is a node corresponding to each strongly connected component of G. Let the nodes in G scc be denoted by 1, 2,..., k. As for the edges, (i, j) E scc iff there is a vertex u V i and a vertex v V j such that (u, v) E. Claim 1: G scc is a DAG. Proof. Assume for the sake of contradiction that there is a cycle in G scc. Let i 1, i 2,..., i l, i 1 denote this cycle in G scc. Then note that this implies that for any pair of vertices u, v V i1 V ı2... V il there is a path from u to v and there is a path from v to u. We only prove existence of path in one direction, and the other direction follows by symmetry. Suppose u V ip and v V iq such that p < q. Note that since there is an edge from i p to i p+1 in G scc, this means that there is a directed edge from a vertex x V ip to a vertex y V ip+1. Since V ip is a strongly connected component, this means that there is a path from u to x in G and this further means that there is a path from u to y in G. This further means that there is a path from u to all vertices in V ip+1 since V ip+1 is a strongly connected component. We can extend this argument to V ip+2,..., V q proving that there is a path from u to any vertex in V q and in particular path from u to v. This gives us a contradiction since the above implies that V i1,..., V il should form a single strongly connected component. Next, we give the crucial claim that will give us our algorithm. Claim 2: G is one-way connected iff G scc has a unique topological ordering. Proof. The proof follows from the proof of the next two claims. Claim 2.1 If G scc has a unique topological ordering, then G is one-way connected. 5 of 7

Proof. Let i 1, i 2,..., i k be the unique topological ordering of G scc. It follows that (i 1, i 2 ), (i 2, i 3 ),..., (i k 1, i k ) E scc. Consider any two vertices u, v V. Let u V ip and v V iq. WLOG assume that p < q. Then by the same arguments as that in the proof of Claim 1, we get that there is a path from u to v. Claim 2.2 If G scc does not have a unique topological ordering, then G is not one-way connected. Proof. Since G scc does not have a unique topological ordering, it means that there are two orderings and two nodes i p, i q in V scc such that i p appears before i q as per the first ordering and i p appears later than i q as per the second ordering. The former means that there is no path from i q to i p in G scc and the latter means that there is no path from i p to i q in G scc. This in turn implies that there is no path from any vertex in V ip to any vertex in V iq in G and vice versa. Now what remains to be done is to figure out a way to determine if there is a unique topological ordering of G scc. This is easily done using the following algorithm. OneWayConnected(G) - Use algorithm discussed in class to find the strongly connected components and construct the graph G scc = (V scc, E scc ) - G G scc - For i = 1 to V scc - If there are more than two vertices with in-degree 0 in G - return( G is not one-way connected ) - Else let v be the vertex in G with no incoming edges - Let G be the graph obtained from G by removing v and its edges - G G - return( G is one-way connected ) Proof of correctness: If the algorithm outputs G is one-way connected, that means that at each step it found a unique vertex with 0 in-degree. This means that there is a directed edge from this unique vertex in the i th step to the unique vertex in the (i + 1) th step which further implies that there is a unique topological ordering. If in any iteration, there are at least two vertices with 0 in-coming edges, then that means that these vertices can be in any relative order with respect to each other. Which means that unique ordering is not possible. Now the correctness follows from Claim 2. Running time: Tarjan s algorithm takes O(n + m) and so does constructing G scc. The time taken within the for loop is proportional to the size of G scc which is at most O(n + m). So, the total running time of the algorithm is O(n + m). 6. (20 points) Given a directed acyclic graph G = (V, E) and a vertex u, design an algorithm that outputs all vertices S V such that for all v S, there is an even length simple path from u to v in G. (A simple path is a path will all distinct vertices.) Give pseudocode, discuss running time, and give proof of correctness. 6 of 7

Solution: Algorithm: Given a graph G = (V, E), we construct a new graph G = (V, E ) by splitting every vertex in V into two vertices. For a vertex i V we create two copies of the vertex and call it i odd and i even. That is, for every vertex i V, V has i odd and i even. As for edges, for every edge (i, j) E, we add two edges (i odd, j even ) and (i even, j odd ) to E. Now, we just run DF S(u even ) on the graph G and output all i such that i even is visited while doing DF S(u even ). The following two claims prove the correctness of our algorithm. Claim 1: For every vertex v such that there is an even length path from u to v, the above algorithm will output v. Proof. Let u, i 1, i 2,..., i k, v be an even length path from u to v. Then k is an odd number. Given this, note that there is a path u even, i odd 1, i even 2,..., i odd k, v even in the graph G. So, v even is reachable from u even. So our algorithm will output v. Claim 2: If our algorithm outputs a vertex v, then there is an even length path from u to v in G. Proof. Our algorithms outputs v iff v even is reachable from u even in G. Consider the path from u even to v even in the DFS tree obtained during execution of DF S(u even ) on G. Let this path be denoted by u even, i l1 1, il2 2,..., il k k, v even. Note that l 1 = odd since all directed edges are from vertices labeled even to vertices labeled odd or vertices labeled odd to vertices labeled even. This further implies that l 2 = even, l 3 = odd,..., l k = odd. This means that k is odd. This implies that there is an even length path in G from u to v since u, i 1, i 2,..., i k, v is a path in G. Running time: The running time is proportional to the running time of DF S on a graph that is at most double the size of G. So, the running time is O(n + m). 7 of 7