# Asymptotically Faster Algorithms for the Parameterized face cover Problem

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Asymptotically Faster Algorithms for the Parameterized face cover Problem Faisal N. Abu-Khzam 1, Henning Fernau 2 and Michael A. Langston 3 1 Division of Computer Science and Mathematics, Lebanese American University, Chouran, Beirut, Lebanon 2 Wilhelm-Schickard Institut für Informatik, Universität Tübingen, D Tübingen, Germany & The University of Newcastle, Australia & The University of Hertfordshire, Hatfield, UK 3 Department of Computer Science, University of Tennessee, Knoxville, TN 37996, USA Abstract. The parameterized complexity of the face cover problem is considered. The input to this problem is a plane graph, G, ofordern. The question asked is whether, for any fixed k, there exists a set of k or fewer vertices whose boundaries collectively cover (contain) every vertex in G. The fastest previously-published face cover algorithm is achieved with the bounded search tree technique, in which branching requires O(5 k + n 2 ) time. In this paper, a structure theorem of Aksionov et al. is combined with a detailed case analysis to produce a face cover algorithm that runs in O( k +n 2 ) time. 1 Introduction and Preliminaries The bounded search tree technique is probably the most popular method for the design of efficient fixed-parameter algorithms [5]. Strategies based on this technique are also referred to as branching algorithms. The branching factor of a node in a search tree is the number of subtrees rooted at that node. The branching factor of an algorithm is the maximum branching factor taken over all the nodes in the search tree generated by that algorithm. It is elementary (due to Euler s formula) that any planar graph has at least one vertex of degree five or less. This property can be exploited in a variety of ways. In the face cover problem, for example, a vertex of degree at most five belongs to at most five faces, of which one or more must be used to cover it. In planar dominating set, on the other hand, a vertex of degree at most five must either be in the dominating set or be dominated by one of its neighbors. In each case, when branching is applied, the root of the search tree is guaranteed to have a small branching factor (five for face cover, sixforplanar dominating set). Great care must be taken, however, if one is to design a branching algorithm around this property. This is because subsequent nodes in the expansion of the search tree are apt to have larger branching factors. See [3] for a detailed discussion of this phenomenon in the case of planar dominating set. The main result of [1] was to produce an algorithm for the parameterized face cover problem with branching factor five. In this paper, we build upon and improve on this result with the use of the following structural theorem. Theorem 1. [2] Every connected plane graph with at least two vertices has either two vertices whose degrees sum to at most 5, This research has been supported in part by the U.S. National Science Foundation under grants CCR and CCR , by the U.S. Office of Naval Research under grant N , and by the U.S. Department of Energy under contract DE AC05 00OR Communicating author:

2 2 Abu-Khzam, Fernau and Langston two vertices at a distance of at most two whose degrees sum to at most 7, a triangular face containing two vertices whose degrees sum to at most 9, or two triangular faces with vertices u and v in common, where the degrees of u and v sum to at most 11. A nontrivial corollary of the above theorem is the following: Corollary 1. Let G be a plane graph in which every vertex has degree greater than 4. Then G has a pair of adjacent vertices, u and v satisfying: 1. deg(u) +deg(v) {10, 11}, 2. u and v are common to two triangular faces {u, v, z} and {u, w, v}, and 3. if w and z are the only common neighbors of u and v, then one of the following must hold: (a) at least one element from N(u) N(v) has degree 6. (b) either w or z (or both) belongs to a triangular face that is common to another pair {u,v } that satisfies (1) and (2). Proof. The existence of a pair {u, v} satisfying conditions (1) and (2) is guaranteed by theorem 1. Assume every pair {u, v} that satisfies (1) and (2) fails to satisfy (3), then we have the following: If two pairs {u, v} and {u,v } satisfy conditions (1) and (2), then {u, v} {u,v } =. Moreover (N(u) N(v)) {u,v } =. This is guaranteed by our assumption (that (3 a) doesn t hold). So it is possible to contract edges uv and u v simultaneously. Let E c = {uv u and v satisfy (1) and (2) but not (3)}. Any two elements of E c are independent (in the line graph of G). Moreover, contracting all edges of E c does not reduce the degree of any vertex of G by more than 1. This is guaranteed by our assumption (that (3 b) doesn t hold). It follows that contracting the edges of E c gives a planar graph whose minimum degree is bounded below by 6. This is impossible. To simplify the presentation of our results, we adopt the above notation throughout the sequel. That is, u and v denote a pair of vertices that satisfy conditions (1) and (2) of the previous corollary; w and z denote the common neighbors of u and v such that f w = {u, w, v} and f z = {u, v, z} are triangular faces. We make use of standard notation in graph theory and parameterized algorithmics. The size of a problem instance is denoted by n. The size of the relevant parameter is denoted by k n. A bound of O (f(k)) for a parameterized problem, where f is some superpolynomial function, means that there is a polynomial function p such that O(f(k)p(n)) is the true running time of the algorithm. In other words, a parameterized problem belongs to the class FPT of fixed-parameter tractable problems iff it admits an algorithm whose running time can be bounded above by O (f(k)) for some arbitrary function f. Once membership in FPT is established, a natural research goal is to ensure better upper bounds on the running times of parameterized algorithms. This is also the direction of this paper. In the case of the branching algorithms we address here, f(k) will be used to define an upper bound on the number of leaves contained in the search tree generated by the algorithm.

3 Faster face cover Algorithms 3 2 Active and Marked Faces Let us now define the face cover (FC) problem formally as follows: Given: A plane graph G =(V,E) withfacesetf and a positive integer k Question: Is there a face cover set C F with C k? Here, a face cover is a set of faces whose boundaries contain all vertices of the given plane graph. Consider a plane graph G =(V,E) withfacesetf.ifweconsideravertexv to be given as a set F (v) of those faces on whose boundary v lies, then a face cover set C F corresponds to a hitting set of a hypergraph H =(F, E H ), where the vertex set of F isthefacesetofg,and E H = {F (v) v V }. It was shown in [1] that a traditional HS algorithm can then be translated into a FC algorithm, where rather than deleting vertices or faces, they are marked. Vertices that are not yet marked are called active. To formulate this modified problem, we need two more notions: Let F a (v) collect all active faces incident to vertex v; deg f (v) = F a (v) be the face degree of v; V a (f) collect all active vertices on the boundary of face f; deg f (v) = V a (f) be the face size of f. Initially, all vertices and all faces are active. So, more formally, we are dealing with an annotated version of FC in the course of the algorithm, i.e.: Given: A plane (multi-)graph G =(V,E) withfacesetf, a function µ V : V {active, marked}, a function µ F : F {active, marked}, and a positive integer k. Question: Is there a set C {f F µ F (f) =active} with C k and v : µ V (v) =active F a (v) C? In addition, marked vertices are shortcut by a sort of triangulation operation. This geometrical surgery allows to finally use the fact that each planar graph possesses a vertex of degree at most five to branch at. Let us explain this idea in more details. In order to do this, let us first describe some HS reduction rules in accordance with the notation introduced above (see [6 8]. Rule 1 If F a (u) F a (v) for some active vertices u, v. Then mark v. Rule 2 If deg f (v) =1and v is active, then put the unique active incident face f (i.e., F a (v) ={f}) into the face cover and mark both v and f. Rule 3 If V a (f) V a (f ) for some active faces f,f, then mark f. As shown in [1], we have to be cautious with simply deleting vertices and faces, so that we only mark them with the above rules. However, it is indeed possible to simplify the obtained graph with a couple of surgery rules. Rule 4 If u and v are two marked vertices with u N(v), then merge u and v. (Thisway,our graph may get multiple edges or loops.) Rule 5 If u is a marked vertex with two active neighbors v, w such that u, v, w are all incident to an active face f, then partition f into two faces by introducing a new edge between v and w, and that edge has to be drawn inside of f. (This way, our graph may get multiple edges.) The new triangular face bordered by u, v, w is marked, while the other part of what was formerly the face f will be active.

4 4 Abu-Khzam, Fernau and Langston Rule 6 If deg(v) =1and if v is marked, then delete v. Rule 7 If deg a (v) =0and if v is marked, then delete v. The new face that will replace all the marked faces that formerly surrounded v will be marked, as well. Rule 8 If f is a marked face with only one vertex or with two vertices on its boundary, then choose one edge e on the boundary of f and delete e. This will destroy f. Rule 9 If e is an edge with two incident marked faces f,f, then delete e, i.e., merge f and f ; the resulting new face will be also marked. Algorithm 1 applies the above reduction rules, and is the branching algorithm described in [1]. We include it here so that we can describe how we modify and improve it. The following analysis highlights the importance of the use of low-degree vertices and the surgical operation, which we assume in the rest of this paper. Algorithm 1 A simple search tree algorithm for the annotated face cover problem, called FC-ST Require: an annotated plane graph G = (V,E) withfacesetf and marking functions µ V and µ F,apositive integer k Ensure: YES if G has an annotated face cover set C F with C k; NOotherwise Exhaustively apply the reduction rules. {The resulting instance will be also called G (etc.) as before.} if k<0 then return NO 5: else if V a = then else Let v be a vertex of lowest face degree in G. {One incident face of v must be used to cover v.} 10: Choose f F a such that f is incident to v. Mark f and all vertices that are on the boundary of f. Call the resulting marking functions µ V and µ F. if FC-ST(G, F, µ V,µ F,k 1) then 15: else Mark f, i.e., return FC-ST(G, F, µ V,µ F,k) Lemma 1. If G =(V,E) is an annotated plane graph with face set F (seen as an instance of the annotated face cover problem with parameter k) that is reduced according to the face cover reduction rules listed above, then no marked vertex will exist in G. Proof. Assume there is a marked vertex v in G. deg(v) 1, since otherwise Rule 6 would have been applicable. Hence, v has two neighbors u and w. If one of them would be marked, Rule 4 would have applied. Therefore, all neighbors of v must be active. To avoid application of Rule 7, we can assume that deg a (v) > 0. Then, Rule 5 applies deg a (v) many times. The new triangular-shaped faces that would be introduced by that rule plus the already previously marked faces incident to

5 Faster face cover Algorithms 5 v would be in fact all faces that are incident to v, and all of them are marked. Hence, Rule 7 (in possible cooperation with Rule 9) applies and deletes v. As mentioned within the reduction rules, it might occur that we create degenerated faces (i.e., faces with only one or two incident vertices) in the course of the application of the reduction rules. Lemma 2. If G =(V,E) is an annotated plane graph with face set F (seen as instance of the annotated plane graph problem with parameter k) that is reduced according to the face cover reduction rules listed above, then the only degenerated faces that might exist are active faces f with two incident vertices. Moreover, the two faces that are neighbored with such a degenerated face f via common edges are both marked. Proof. Let f be a degenerated face. If f has only one vertex v on its boundary, the following will happen: If f and v are active and deg a (v) = 1, then Rule 2 applies and puts f into the face cover. Moreover, f and v will become marked. Hence, Rule 6 applies and deletes v, sothatalsof will be replaced by a probably larger face. If f and v are active and deg a (v) > 1, then Rule 3 applies and renders f marked. If f is active but v is marked, then V a (f) =, so that Rule 3 vacuously applies and renders f marked. If f is marked, then Rule 8 applies and removes f. Hence, in the end a degenerated face with only one vertex on its boundary cannot exist in a reduced instance. Consider now a degenerated face f with two vertices u and v on its boundary. If f is marked, then Rule 8 applies and removes f. Otherwise,f is active. Let f be one of the faces with which f shares one edge. If f were active, then Rule 3 would render f marked (see previous case). Hence, all faces that share edges with f are marked in a reduced instance. The following proof is a streamlined and simplified version of the arguments found in [1]. We include it here so that we can build upon it in the analysis to follow. Theorem 2. [1] Algorithm 1 solves the annotated face cover problem in time O (5 k ). Proof. We have to show that, in an annotated (multi-)graph G, there is always a vertex with face degree at most five. Having found such a vertex v, the heuristic priority of choosing a face incident to the vertex of lowest face degree (as formulated in Algorithm 1, line 8) would let the subsequent branches be made at faces also neighboring v, so that the claim then follows. The (non-annotated) simple graph G =(V,E ) obtained from the annotated (multi-)graph G =(V,E) by putting one edge between u and v whenever there is some edge between u and v in G is planar; therefore, we can find a vertex v of degree at most five in G. However, back in G, anedgeuv in G might correspond to two edges connecting u and v, i.e., there might be up to ten faces neighboring v in G. 4 Lemma 2 shows that at most five of these faces can be active. 4 This was the basic concern when stating the O (10 k ) (actually, even worse) algorithm for the face cover problem in [5].

6 6 Abu-Khzam, Fernau and Langston 3 An Improved face cover Algorithm We now use Theorem 1 and its corollary to improve on the running time of the algorithm. Of course, as long as in the auxiliary graph G constructed according to the previous proof we find a vertex of degree four, we find a 4 k branching behaviour and are happy with it. So, the only situation that needs to be analyzed is the following one (in G ): there are two triangular faces neighbored via an edge {u, v} where the sum of the degrees of u and v is at most 11. Since we want to analyze the worst case in the sequel, we can assume that deg(u) =5anddeg(v) =6.Inthesequel,T (k) denotes the number of leaves in the search tree corresponding to our algorithm. Moreover, T (k) corresponds to the case where the algorithm is trying to find a face cover of size k. Wenow discuss some possibilities for vertex u. 1. If some of the edges incident to u in G represent degenerated faces in G and some correspond to (simple) edges in G, then Lemma 2 implies that the face degree of u in G is less than five, so that we automatically get a favorable branching. 2. If all edges incident to u in G represent degenerated faces in G, then this is true in particular for the edge uv in G. In order to achieve deg a (v) =deg(v)(= 6), all edges incident to v must also represent degenerated faces in G (otherwise, the branching would be only better, see Lemma 2). 5 We are dealing with the case that the edge {u, v} is neighboring the marked triangular faces f w = {u, w, v} and f z = {u, v, z} (in G ). So, we have the following alternatives for covering u and v; as usual, we consider first all cases of covering the small-degree vertex u. Take the degenerated face {u, w} into the cover. Then, both faces {v, w} and {u, v} will get marked by the dominated face rule 3, so that for branching at v, only four further cases need to be considered. This is hence yielding four T (k 2)-branches. Quite analogously, the case when we take {u, z} into the cover can be treated, leading to another four T (k 2)-branches. Otherwise, three possibilities remain to cover u, leading us to three T (k 1)-branches. Analyzing this branching scenario gives us: T (k) k. We show in the following section that a bound of k is achievable. 3. If all edges incident to u (in G ) correspond to simple edges in G, then we can assume (according to our previous reasonings) that also all edges incident to v (in G ) correspond to simple edges in G. To further simplify our analysis, we note the following: Observation 1 If neither u nor v belongs to a marked face, then u and v could have at most three common faces in G. To see this, let f be a face containing u, v, and w. Iff is different from f w then f w is dominated by f. This immediately implies that f w is marked, which contradicts our assumption that all 5 More precisely, if deg a (v) =5anddeg(v) = 6, this can only be if only four out of the six faces incident to v are non-degenerated. Branching first on the degenerated face uv and then (in the case that uv is not taken into the face cover) on all remaining four possibilities to cover u times four possibilities to cover v gives the recursion T (k) T (k 1) + 16T (k 2) k.

7 Faster face cover Algorithms 7 faces containing u or v are active. Since four out of the five faces of u must contain a vertex from {w, z}, only one face could be common to u and v besides f 1 and f 2. Then, we propose the following branching: Start branching at the active triangular faces f w and f z (in G ). This gives two T (k 1)- branches. Then, branch at the remaining three active faces surrounding u, followed (each time) by branches according to the remaining four active faces surrounding v; overall, this gives 12 T (k 2)-branches. Analyzing this branching gives us T (k) k. The above branching scenarios are described in Algorithm 2. The time complexity of this algorithm is O ( k ). We shall see that Corollary 1 can be used to reduce this bound below k. Algorithm 2 An advanced search tree algorithm for annotated face cover, called FC-STadvanced Require: an annotated plane graph G =(V,E) withfacesetf and marking functions µ V and µ F, a positive integer k Ensure: YES if G has an annotated face cover set C F with C k; NOotherwise Exhaustively apply the reduction rules. {The resulting instance will be also called G (etc.) as before.} if k<0 then return NO 5: else if V a = then else Let u be a vertex of lowest face degree in G. {One incident face of u must be used to cover u.} 10: if deg a (u) 4 then Choose f F a such that f is incident to u. Mark f and all vertices that are on the boundary of f. Call the resulting marking functions µ V and µ F. if FC-ST-advanced(G, F, µ V,µ F,k 1) then 15: else Mark f, i.e., return FC-ST-advanced(G, F, µ V,µ F,k) else 20: {Let N(u) ={u 1,u 2,v,w,z} be the neighbors of u and similarly N(v) ={v 1,v 2,v 3,u,w,z}.} if all active faces incident with v are degenerated then execute FC-ST-case-1 else if no active faces incident with v are degenerated then execute FC-ST-case-2 25: else {all active faces incident with u are degenerated; only one active face incident with v is degenerated} execute FC-ST-case-3 30:

8 8 Abu-Khzam, Fernau and Langston Algorithm 3 ThecodeofFC-ST-case-1 Let G = G \{u, v} and mark the face to which (formally) u, v belonged; modify F, µ V,µ F accordingly, yielding F, µ V and µ F. if FC-ST-advanced(G,F,µ V,µ F,k 1) then else 5: for all unordered vertex pairs {x, y} such that x N(u) \{v} and y N(v) \{x, u} do Modify µ V so that x and y are the only vertices of N(u) N(v) \{u, v} that are marked. if FC-ST-advanced(G,F,µ V,µ F,k 2) then 10: end for return NO Algorithm 4 ThecodeofFC-ST-case-2 Let G = G \{u, v} and mark the face to which (formally) u, v belonged; modify F, µ V,µ F accordingly, yielding F, µ V and µ F. for all vertices x {w, z} do Modify µ V so that x is the only vertex of N(u) N(v) \{u, v} that is marked. if FC-ST-advanced(G,F,µ V,µ F,k 1) then 5: end for for all vertices x {u 1,u 2} and y {v 1,v 2,v 3} do Modify µ V so that x and y are the only vertices of N(u) N(v) \{u, v} that are marked. 10: if FC-ST-advanced(G,F,µ V,µ F,k 2) then end for return NO Algorithm 5 ThecodeofFC-ST-case-3 for all faces f F a(u), g F a(v) do Mark f and g and all vertices in V a(f) V a(g); call the modified marking functions µ V and µ F. if FC-ST-advanced(G,F,µ V,µ F,k {f, g} ) then 5: end for return NO

9 Faster face cover Algorithms The Degenerated Faces Case Let us look a bit closer at the case that all edges incident with u and v represent degenerated faces. Let N(u) ={u 1,u 2,v,w,z} be the neighbors of u and similarly N(v) ={v 1,v 2,v 3,u,w,z}. If the degenerated face {u, w} is put into the cover, then both faces {v, w} and {u, v} will get marked by the dominated face rule 3, so that for branching at v, four further cases need to be considered. Moreover, notice that our reduction rules will produce the following situation thereafter: 6 u and v will be deleted. All faces formerly neighboring u or v will be merged into one large marked face f. On the boundary of f, w will be marked together with one vertex out of {v 1,v 2,v 3,z}. If the the degenerated face {u, z} is put into the cover, then a similar analysis applies. This means that (according to the previous reasoning) we are left with the following situations: u and v will be deleted. All faces formerly neighboring u or v will be merged into one large marked face f. On the boundary of f, z will be marked together with one vertex out of {v 1,v 2,v 3,w}. Now, observe that the situation that marks z together with w (on the boundary of f) has already been found before. Hence, we only need to consider three T (k 2)-branches here. The other cases are treated as before, giving three more T (k 1)-branches. Altogether, we get as a recurrence for the search tree size: which gives the estimate T (k) k. T (k) 3T (k 1) + 7T (k 2) 3.2 Dealing with Non-degenerated Faces Consider the case where all faces containing u and v are non-degenerated. We distinguish the following sub-cases: 1. Assume that there is a further common face between u and v (besides the triangular faces). Then we can branch at the three common faces of u and v first, followed by two times three branches (at u and v, resp.) to consider all cases for covering u and v. Hence, we have T (k) 3T (k 1) + 6T (k 2) k. 2. The degree of w (or z) is 6. One of the 6 faces of w is used in the cover. There are (potentially) 3 faces that are not common with u or v. Letf 1 be the face common to u and w but not v, and let f 2 bethefacecommontov and w but not u. We branch according to the following cases: (a) f 1 is selected. Then to cover v, we are left with 4 cases (since the two faces f w and f z become dominated). This sub-case produces 4T (k 2)-branches. (b) f 2 is selected. Then to cover u, we are left with 2 cases (2 and not 3 since f 1 was selected in the previous case). This sub-case leads to 2T (k 2)-branches. (c) f w is selected and covers u,v, andw. ThisgivesaT (k 1)-branch. 6 In fact, the marked vertices will again disappear by further application of reduction rules, but this will be neglected in the following argument.

10 10 Abu-Khzam, Fernau and Langston (d) None of the 3 sub-cases above is applied. So one of the 3 faces containing w is selected. After each selection, and since we assumed none of f 1,f 2 and f w is selected, we are left with the following: u has 3 faces that can be selected, one of which is f z,andv has 4 faces that can be selected, one of which is f z. The corresponding equation is: 3(T (k 2) + 6T (k 3)) Therefore, in case 2 the run time is given by T (k) T (k 1)+9T (k 2)+18T (k 3) k, which is smaller than k. 3. The degree of a neighbor v 1 of v is 6. Let f 1 and f 2 be the faces common to v and v 1.We may assume f 1 and f 2 do not contain u (We already dealt with the case where u and v have a common face other than f w and f z.). We branch according to the following cases: (a) One of the faces f 1 and f 2 is selected. Each selection leads to covering v and marking the faces {u, v, z} and {u, w, v} being dominated. Thus we are left with 3 faces to cover u. The corresponding run time is 6T (k 2) (3 for each case). (b) Neither f 1 nor f 2 is selected. We have 4 faces to cover v 1, and in each case we have: 2 faces to cover v and u simultaneously, and 2 faces to cover v but not u and 3 faces to cover u but not v. This leads to a run time equal 8T (k 2) + 24T (k 3). In case 3, the run time is T (k) 14T (k 2) + 24T (k 3) k, which is smaller than k. 4. The degree of a neighbor u 1 of u is 6. This case is similar to the previous case. Basically the same branching strategy (interchanging the roles of u and v) would lead to the estimate T (k) 16T (k 2) + 16T (k 3) k. 5. According to Corollary 1, we are left with the case where w (or z) is a common neighbor of two pairs {u, v} and {u,v } that satisfy the conditions stated in the corollary. In analogy to u, v, let w and z denote the vertices that are incident with the two triangular faces neighboring the edge u v. We can assume w = w in accordance with our corollary. We branch within two cases: (a) f w is in the cover: therefore face {u,w,v } is dominated: so we cover u and v by the branching rule: either face f z = {u,v,z } is in the cover or a pair of faces containing u and v (other than {u,w,v } and {u,v,z }) is in cover. This leads to T (k 2) + 12T (k 3) branches. (b) f w is not in the cover. So we branch with two cases: either face f z (= {u, v, z}) isincover or a pair of faces containing u and v (other than f w and f z is in the cover. This leads to T (k 1) + 12T (k 2) branches. Therefore, in case 5, we get: T (k) T (k 1) + 13T (k 2) + 12T (k 3) k. Again, this is smaller than k. The analysis described in the last two subsections leads to the following: Theorem 3. face cover has an algorithm that runs in time O ( k ). 4 Remarks We conclude with the following final remarks: Bienstock and Monma [4] considered a variant of the face cover problem where some preselected vertices need not be covered. This variant can be solved by our algorithm, as well, since it evidently gives a restriction of the annotated face cover problem.

11 Faster face cover Algorithms 11 The red-blue dominating set (restricted to planar instances) can be also solved with our algorithm. Formally, we only must (after arbitrarily embedding the given red-blue graph into the plane) mark all faces of the graph attach to each red vertex an active loop inflate a loop attached to the red vertex v along the edges that connect v with its blue neighbors until the loop (seen as a region in the plane) touches all these neighbors; then, we can finally remove v. The active faces of the resulting graph correspond to red vertices. The above reduction gives a branching algorithm for the planar red-blue dominating set, whose run time is O ( k ). This is an obvious improvement over the previous algorithm described in [5]. Finally, observe that it might well be that we can further improve on the running times for face cover and red-blue dominating set by further strengthened versions of Cor. 1. However, the corresponding algorithms would be rather complicated, as we fear. Notice that already Alg. 2 was much more complicated than Alg. 1 that we presented in the first place, and that the final algorithm that lead to the claimed running time of O ( k ) has a quite complicated branching structure. Hence, another aim of research could be to come up with still simple branching algorithms which nonetheless enjoy provable nice running times. References 1. F. N. Abu-Khzam and M. A. Langston. A direct algorithm for the parameterized face cover problem. In Proceedings of the First International Workshop on Parameterized and Exact Computation (IWPEC 2004), volume 3162 of Lecture Notes in Computer Science, pages Springer-Verlag, V. A. Aksionov, O. V. Borodin, L. S. Mel nikov, G. Sabidussi, M. Stiebitz, and B. Toft. Deeply asymmetric planar graphs. Technical Report PP , University of Southern Denmark, IMADA, Odense, Denmark, September J. Alber, H. Fan, M. R. Fellows, H. Fernau, R. Niedermeier, F. Rosamond, and U. Stege. Refined search tree techniques for the planar dominating set problem. In J. Sgall, A. Pultr, and P. Kolman, editors, Mathematical Foundations of Computer Science (MFCS 2001), volume 2136 of Lecture Notes in Computer Science, pages Springer, Long version to appear in Journal of Computer and System Sciences. 4. D. Bienstock and C. L. Monma. On the complexity of covering vertices by faces in a planar graph. SIAM J. Sci. Comput., 17:53 76, R. G. Downey and M. R. Fellows. Parameterized Complexity. Springer-Verlag, H. Fernau. A top-down approach to search-trees: Improved algorithmics for 3-Hitting Set. Technical Report TR04-073, Electronic Colloquium on Computational Complexity, R. Niedermeier and P. Rossmanith. An efficient fixed-parameter algorithm for 3-Hitting Set. Journal of Discrete Algorithms, 1:89 102, K. Weihe. Covering trains by stations or the power of data reduction. In R. Battiti and A. A. Bertossi, editors, Algorithms and Experiments ALEX 98, pages

### Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman

### Faster Fixed Parameter Tractable Algorithms for Finding Feedback Vertex Sets

Faster Fixed Parameter Tractable Algorithms for Finding Feedback Vertex Sets VENKATESH RAMAN, SAKET SAURABH, AND C. R. SUBRAMANIAN The Institute of Mathematical Sciences Abstract. A feedback vertex set

### 136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

### On planar regular graphs degree three without Hamiltonian cycles 1

On planar regular graphs degree three without Hamiltonian cycles 1 E. Grinbergs Computing Centre of Latvian State University Abstract. Necessary condition to have Hamiltonian cycle in planar graph is given.

### Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

### 2.3 Scheduling jobs on identical parallel machines

2.3 Scheduling jobs on identical parallel machines There are jobs to be processed, and there are identical machines (running in parallel) to which each job may be assigned Each job = 1,,, must be processed

### Automated Generation of Search Tree Algorithms

Automated Generation of Search Tree Algorithms for Hard Graph Modification Problems Jens Gramm Jiong Guo Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institut für Informatik, Universität Tübingen, Sand

### Partitioning edge-coloured complete graphs into monochromatic cycles and paths

arxiv:1205.5492v1 [math.co] 24 May 2012 Partitioning edge-coloured complete graphs into monochromatic cycles and paths Alexey Pokrovskiy Departement of Mathematics, London School of Economics and Political

### Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt

### Homework Exam 1, Geometric Algorithms, 2016

Homework Exam 1, Geometric Algorithms, 2016 1. (3 points) Let P be a convex polyhedron in 3-dimensional space. The boundary of P is represented as a DCEL, storing the incidence relationships between the

### CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

### Analysis of Algorithms, I

Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

### arxiv: v2 [math.co] 30 Nov 2015

PLANAR GRAPH IS ON FIRE PRZEMYSŁAW GORDINOWICZ arxiv:1311.1158v [math.co] 30 Nov 015 Abstract. Let G be any connected graph on n vertices, n. Let k be any positive integer. Suppose that a fire breaks out

### each college c i C has a capacity q i - the maximum number of students it will admit

n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

### When is a graph planar?

When is a graph planar? Theorem(Euler, 1758) If a plane multigraph G with k components has n vertices, e edges, and f faces, then n e + f = 1 + k. Corollary If G is a simple, planar graph with n(g) 3,

### Removing Even Crossings

EuroComb 2005 DMTCS proc. AE, 2005, 105 110 Removing Even Crossings Michael J. Pelsmajer 1, Marcus Schaefer 2 and Daniel Štefankovič 2 1 Department of Applied Mathematics, Illinois Institute of Technology,

### Lattice Point Geometry: Pick s Theorem and Minkowski s Theorem. Senior Exercise in Mathematics. Jennifer Garbett Kenyon College

Lattice Point Geometry: Pick s Theorem and Minkowski s Theorem Senior Exercise in Mathematics Jennifer Garbett Kenyon College November 18, 010 Contents 1 Introduction 1 Primitive Lattice Triangles 5.1

### 8.1 Min Degree Spanning Tree

CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

### FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS. Mateusz Nikodem

Opuscula Mathematica Vol. 32 No. 4 2012 http://dx.doi.org/10.7494/opmath.2012.32.4.751 FALSE ALARMS IN FAULT-TOLERANT DOMINATING SETS IN GRAPHS Mateusz Nikodem Abstract. We develop the problem of fault-tolerant

### A Structural View on Parameterizing Problems: Distance from Triviality

A Structural View on Parameterizing Problems: Distance from Triviality Jiong Guo, Falk Hüffner, and Rolf Niedermeier Wilhelm-Schickard-Institut für Informatik, Universität Tübingen, Sand 13, D-72076 Tübingen,

### Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph

### Class One: Degree Sequences

Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of

### A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

### Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902

Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler Different Graphs, Similar Properties

### Guessing Game: NP-Complete?

Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

### Approximation Algorithms

Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

### Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

### SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

### On the k-path cover problem for cacti

On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

### Even Faster Algorithm for Set Splitting!

Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective

### Subset feedback vertex set is fixed parameter tractable

Subset feedback vertex set is fixed parameter tractable Marek Cygan Marcin Pilipczuk Michał Pilipczuk Jakub Onufry Wojtaszczyk Abstract The FEEDBACK VERTEX SET problem, given an undirected graph G and

### SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices

### Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

### Offline sorting buffers on Line

Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

### Divisor graphs have arbitrary order and size

Divisor graphs have arbitrary order and size arxiv:math/0606483v1 [math.co] 20 Jun 2006 Le Anh Vinh School of Mathematics University of New South Wales Sydney 2052 Australia Abstract A divisor graph G

### Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various

### The Open University s repository of research publications and other research outputs

Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:

### The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

### Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

### GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

### Sum of Degrees of Vertices Theorem

Sum of Degrees of Vertices Theorem Theorem (Sum of Degrees of Vertices Theorem) Suppose a graph has n vertices with degrees d 1, d 2, d 3,...,d n. Add together all degrees to get a new number d 1 + d 2

### Cycles in a Graph Whose Lengths Differ by One or Two

Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS

### What s next? Reductions other than kernelization

What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov

### Computer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

- 1 - THREE TREE-PATHS Avram Zehavi Alon Itai Computer Science Department Technion - IIT, Haifa, Israel Abstract Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there

### The Union of Minimal Hitting Sets: Parameterized Combinatorial Bounds and Counting

The Union of Minimal Hitting Sets: Parameterized Combinatorial Bounds and Counting Peter Damaschke and Leonid Molokov Department of Computer Science and Engineering Chalmers University, 41296 Göteborg,

### Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

### High degree graphs contain large-star factors

High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

### Error Compensation in Leaf Power Problems

Error Compensation in Leaf Power Problems Michael Dom Jiong Guo Falk Hüffner Rolf Niedermeier April 6, 2005 Abstract The k-leaf Power recognition problem is a particular case of graph power problems: For

### HOLES 5.1. INTRODUCTION

HOLES 5.1. INTRODUCTION One of the major open problems in the field of art gallery theorems is to establish a theorem for polygons with holes. A polygon with holes is a polygon P enclosing several other

### Arrangements And Duality

Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,

### Removing even crossings

Removing even crossings Michael J. Pelsmajer a, Marcus Schaefer b, Daniel Štefankovič c a Department of Applied Mathematics, Illinois Institute of Technology, Chicago, IL 60616, USA b Department of Computer

### M-Degrees of Quadrangle-Free Planar Graphs

M-Degrees of Quadrangle-Free Planar Graphs Oleg V. Borodin, 1 Alexandr V. Kostochka, 1,2 Naeem N. Sheikh, 2 and Gexin Yu 3 1 SOBOLEV INSTITUTE OF MATHEMATICS NOVOSIBIRSK 630090, RUSSIA E-mail: brdnoleg@math.nsc.ru

### 1 if 1 x 0 1 if 0 x 1

Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

### Small Maximal Independent Sets and Faster Exact Graph Coloring

Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected

Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

### Clique coloring B 1 -EPG graphs

Clique coloring B 1 -EPG graphs Flavia Bonomo a,c, María Pía Mazzoleni b,c, and Maya Stein d a Departamento de Computación, FCEN-UBA, Buenos Aires, Argentina. b Departamento de Matemática, FCE-UNLP, La

### On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

### Finding and counting given length cycles

Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected

### The Characteristic Polynomial

Physics 116A Winter 2011 The Characteristic Polynomial 1 Coefficients of the characteristic polynomial Consider the eigenvalue problem for an n n matrix A, A v = λ v, v 0 (1) The solution to this problem

### An Approximation Algorithm for Bounded Degree Deletion

An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph

### 1 Definitions. Supplementary Material for: Digraphs. Concept graphs

Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

### Total colorings of planar graphs with small maximum degree

Total colorings of planar graphs with small maximum degree Bing Wang 1,, Jian-Liang Wu, Si-Feng Tian 1 Department of Mathematics, Zaozhuang University, Shandong, 77160, China School of Mathematics, Shandong

### Bounded Treewidth in Knowledge Representation and Reasoning 1

Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.

### ! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

### Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

### Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees

Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with

### Tree-representation of set families and applications to combinatorial decompositions

Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. buixuan@ii.uib.no

### Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

### Extremal Wiener Index of Trees with All Degrees Odd

MATCH Communications in Mathematical and in Computer Chemistry MATCH Commun. Math. Comput. Chem. 70 (2013) 287-292 ISSN 0340-6253 Extremal Wiener Index of Trees with All Degrees Odd Hong Lin School of

### The Student-Project Allocation Problem

The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.

### princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Sanjeev Arora Scribe: One of the running themes in this course is the notion of

### Degree Hypergroupoids Associated with Hypergraphs

Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated

### Mean Ramsey-Turán numbers

Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average

### Types of Degrees in Bipolar Fuzzy Graphs

pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department

### Answers to some of the exercises.

Answers to some of the exercises. Chapter 2. Ex.2.1 (a) There are several ways to do this. Here is one possibility. The idea is to apply the k-center algorithm first to D and then for each center in D

### Minimum Bisection is NP-hard on Unit Disk Graphs

Minimum Bisection is NP-hard on Unit Disk Graphs Josep Díaz 1 and George B. Mertzios 2 1 Departament de Llenguatges i Sistemes Informátics, Universitat Politécnica de Catalunya, Spain. 2 School of Engineering

### Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

### Divide-and-Conquer. Three main steps : 1. divide; 2. conquer; 3. merge.

Divide-and-Conquer Three main steps : 1. divide; 2. conquer; 3. merge. 1 Let I denote the (sub)problem instance and S be its solution. The divide-and-conquer strategy can be described as follows. Procedure

### COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

### A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

### ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu

ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a

### arxiv:1409.4299v1 [cs.cg] 15 Sep 2014

Planar Embeddings with Small and Uniform Faces Giordano Da Lozzo, Vít Jelínek, Jan Kratochvíl 3, and Ignaz Rutter 3,4 arxiv:409.499v [cs.cg] 5 Sep 04 Department of Engineering, Roma Tre University, Italy

### Combinatorial 5/6-approximation of Max Cut in graphs of maximum degree 3

Combinatorial 5/6-approximation of Max Cut in graphs of maximum degree 3 Cristina Bazgan a and Zsolt Tuza b,c,d a LAMSADE, Université Paris-Dauphine, Place du Marechal de Lattre de Tassigny, F-75775 Paris

### NP-Completeness I. Lecture 19. 19.1 Overview. 19.2 Introduction: Reduction and Expressiveness

Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce

### Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

### Best Monotone Degree Bounds for Various Graph Parameters

Best Monotone Degree Bounds for Various Graph Parameters D. Bauer Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 S. L. Hakimi Department of Electrical and Computer

### Many algorithms, particularly divide and conquer algorithms, have time complexities which are naturally

Recurrence Relations Many algorithms, particularly divide and conquer algorithms, have time complexities which are naturally modeled by recurrence relations. A recurrence relation is an equation which

### A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries

Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do

### 10. Graph Matrices Incidence Matrix

10 Graph Matrices Since a graph is completely determined by specifying either its adjacency structure or its incidence structure, these specifications provide far more efficient ways of representing a

### IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

### LOW-DEGREE PLANAR MONOMIALS IN CHARACTERISTIC TWO

LOW-DEGREE PLANAR MONOMIALS IN CHARACTERISTIC TWO PETER MÜLLER AND MICHAEL E. ZIEVE Abstract. Planar functions over finite fields give rise to finite projective planes and other combinatorial objects.

### Optimal Binary Space Partitions in the Plane

Optimal Binary Space Partitions in the Plane Mark de Berg and Amirali Khosravi TU Eindhoven, P.O. Box 513, 5600 MB Eindhoven, the Netherlands Abstract. An optimal bsp for a set S of disjoint line segments

### Graph Classification and Easy Reliability Polynomials

Mathematical Assoc. of America American Mathematical Monthly 121:1 November 18, 2014 1:11 a.m. AMM.tex page 1 Graph Classification and Easy Reliability Polynomials Pablo Romero and Gerardo Rubino Abstract.

### An example of a computable

An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

### BOUNDARY EDGE DOMINATION IN GRAPHS

BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 0-4874, ISSN (o) 0-4955 www.imvibl.org /JOURNALS / BULLETIN Vol. 5(015), 197-04 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA

### Crossing the Bridge at Night

A1:01 Crossing the Bridge at Night Günter Rote Freie Universität Berlin, Institut für Informatik Takustraße 9, D-14195 Berlin, Germany rote@inf.fu-berlin.de A1:02 August 21, 2002 A1:03 A1:04 Abstract We

### THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

1 THE PROBLEM OF WORM PROPAGATION/PREVENTION I.E. THE MINIMUM VERTEX COVER PROBLEM Prof. Tiziana Calamoneri Network Algorithms A.y. 2014/15 2 THE PROBLEM WORMS (1)! A computer worm is a standalone malware