Lecture 18&19: Iterative relaxation
|
|
|
- Emily McDaniel
- 9 years ago
- Views:
Transcription
1 CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 18&19: Iterative relaxation Lecturer: Mohammad R. Salavatipour Date: Nov 5, 2009 Scriber: Zhong Li 1 Spanning Tree Polytope Last lecture we started studying the following LP for the problem of finding minimum spanning tree in a given graph G = (V,E): We call this LP MST. Our goal is to prove that: min w e x e s.t. x(e(s)) S 1, S V x(e(v )) = V 1 x e 0. Theorem 1.1 LP MST is integral, i.e. every bfs of this LP is integral. We know that any bfs is uniquely determined by n linearly independent tight constraints (where n is number of variables of the LP ). Since we have exponentially many constraints in this LP, a bfs may be satisfying many of them with equality (i.e. being tight). We want a good set of linearly independent tight constraints defining it. The notion of good here will be clear soon. First, observe that in any bfs, we can safely delete any edge e E with x e = 0 from the graph. So we can assume that every edge of G has x e > 0. Our goal is to show that there are at most v 1 linearly independent tight constraints which implies that there are at most v 1 non-zero variables. Since for any set S with size S = 2, the condition x(e(s)) S 1 implies the value of that edge must be at most 1 and because x(e(v)) = v 1 we get that all the v 1 non-zero variables must have value exactly 1, i.e. the bfs is integral. 1.1 Uncrossing Technique and Laminar Families of Tight Sets Here we introduce a technique by which we can prove the existence of a special structure for bfs. Definition 1.2 Two sets X,Y over a ground set U are called crossing if X Y, X Y, and Y X. A family of sets is called laminar if no two sets in the family cross. From this definition, it is easy to see that if two sets in a laminar family have non-empty intersection then one is a subset of the other. If we define a graph T associated with a laminar family F of sets, in which we have a node u S in T for every sets S F, u S is called parent of v S if S is the smallest set of F that contains S then it is easy to see that T is a forest (doesn t have any cycles). The next lemma shows that if every set of a laminar family has size at least 2 then there are at most n 1 sets in the laminar family. Lemma 1.3 Let U be a ground set of size n and L be a laminar family of non-crossing sets without sets of size 1 (singletons ). Then L n 1. 1
2 Proof: We can prove this by induction. We say S L is maximal if there is no set S L with S S. Let S 1,S 2,...,S m be maximal sets in L. Since they don t cross, this gives a partitioning of U. As for the base case, if U = 2, since we don t have singletons, we have only one set S i. For the induction step, using induction hypothesis, the number of sets of L contained in S i is at most S i 1. Therefore, L m i=1 ( S i 1) = ( m i=1 S i ) m = n m n 1. Uncrossing, is a powerful technique in combinatorial optimization. The following observation can be proved by noting that every type of edge (as in Figure??) contributes the same amount to each side of the equation below: Observation 1.4 For any two sets of vertices X, Y V. Then x(e(x)) + x(e(y )) = x(e(x Y )) + x(e(x Y )) x(δ(x,y )) where δ(x, Y ) denotes the edges between X and Y. An immediate corollary is: Corollary 1.5 For any two sets X,Y V : x(e(x)) + x(e(y )) x(e(x Y )) + x(e(x Y )). Let x be a bfs of the LP MST with x e > 0 for all edges e E. Let F = {S x(e(s)) = S 1} be the family of all tight constraints of the LP. For each set S we use χ(e(s)) to denote the characteristic vector of E(S) of size E : χ(e(s)) = { 1 if e E(S) 0 o.w. Lemma 1.6 If S,T F and S T, then both S T and S T are in F. Furthermore, χ(e(s)) + χ(e(t)) = χ(e(s T)) + χ(e(s T)). Proof: S 1 + T 1 = x(e(s)) + x(e(t)) since S,T F x(e(s T)) + x(e(s T)) by Corollary 1.5 S T 1 + S T 1 since these are constraints in the LP = S 1 + T 1 So all inequalities must hold with equality, and in particular x(e(s T)) + x(e(s T)) = S T 1 + S T 1. Thus, we must have both S T and S T be tight constraints. Therefore, S T and S T are in F. Also we must have x(δ(s,t)) = 0 which implies χ(e(s)) + χ(e(t)) = χ(e(s T)) + χ(e(s T)). We use span(f) to denote the vector space of those sets S F i.e. the vector space of {χ(e(s)) : S F}. Lemma 1.7 If L is a maximal laminar subfamily of F, then span(l) = span(f). Proof: Suppose L is a maximal laminar family of F, but span(l) span(f). For each S L define intersect(s, L) = {T L S and T intersect}. There must be a set S F with χ(e(s)) span(l). Choose such a set S with smallest value of intersect(s, L). Observe that intersect(s, L) 1 or else L {S} is a larger laminar family. Let T be one of the sets in L that S intersects. We will prove the following Proposition shortly. 2
3 Proposition 1.8 intersection(s T, L) < intersection(s, L) intersection(s T, L) < intersection(s, L) For now assume this proposition is true. Applying Lemma 1.6 to S and T, we get both S T and S T are in F. So using this proposition and by minimality of intersect(s, L), both S T and S T are in span(l). On the other hand, χ(e(s)) + χ(e(t)) = χ(e(s T)) + χ(e(s T)). Since χ(e(s T)) and χ(e(s T)) are in span(l) and T L, we must have χ(e(s)) span(l), a contradiction. So it only remains to prove the above proposition. For a set R L with R T, R does not intersect T (since L is a laminar family). So whenever R intersects S T or S T, R also intersects S. Thus, we obtain the following: Lemma 1.9 Let x be a bfs of the LP MST with x e > 0 for all e E and let F = {S x(e(s)) = S 1}. Then there is a laminar family L F such that: 1. vectors of {χ(e(s)) S L} are linearly independent, and 2. span(l) = span(f) 3. L = E 1.2 Iterative Algorithm Here we describe an iterative algorithm to obtain a tree T from a bfs of the LP MST ; this is done by picking edges with value 1 in the LP iteratively: Iterative MST algorithm F while V (G) do Find a bfs x of LP MST and remove any edge e with x e = 0 Find a vertex v with degree 1, say e = uv; then G G {v} and F F {e} Lemma 1.10 For any bfs x with x e > 0 for all edges, there is a vertex v with deg(v) = 1. Proof: Suppose all nodes have d(v) 2 in support E (i.e. edges that are left). Then E = 1 2 v G deg(v) V. Since there is no edges with x e = 0, each tight constraint is of the form x(e(s)) = S 1. By Lemma 1.9, there is a laminar family L with L = E V ; but by Lemma 1.3, L V 1, this is a contradiction. We can also modify the last step in the following way: Find an edge e with x e = 1 and then G G/e and F F {e} where G/e means the graph obtained contracting edge e. Then we can prove the following lemma instead of Lemma 1.10: Lemma 1.11 For any bfs x with x e > 0 for all edges, there is an edge e with x e = 1. 3
4 Proof: By Lemma 1.9, there are L linearly independent tight constraints of the form x(e(s)) = S 1, and L = E. We derive a contradiction by a counting argument. Assign one token for each edge e to the smallest set in L that contains both endpoints of e. So there are a total of E tokens. We show we can collect 1 token for each set and still have some extra tokens, which is a clear contradiction. Let S L be a set have children R 1,...,R k (in the laminar family). Since these are all tight sets, we have: x(e(s)) = S 1 x(e(r i )) = R i 1 for all 1 i k Subtracting the sides we get: x(e(s)) i x(e(r i )) = S i R i + k 1 Let A = E(S)\ i E(R i). Then x(e(a)) = S i R i + k 1. Set S gets exactly one token for each edge in A. If A = then χ(e(s)) = i χ(e(r i)) which contradicts linear independence of L. Also we cannot have A = 1 since x(e(a)) is an integer (as the right-hand side is sum/difference of sizes of a number of sets) and each x e is assumed to be fractional. Therefore, S gets at least two tokens! Using Lemma 1.10 or 1.11 it is easy to show that the iterative algorithms find a MST. Theorem 1.12 The iterative algorithm (and its alternate form) find a MST. Proof: It only remains to show that the result is a spanning tree and this is done by induction on the number of iterations. Consider the first form of the algorithm. If we find a vertex of degree 1, say deg(v) = 1 then the edge incident to it must have x e = 1 (since x(δ(v)) 1 is a constraint). Thus each edge added to F in either form of the algorithm has value 1. When e is added to F and v is removed from G note that for any spanning tree T of G {v}, we can build a spanning tree T of G by defining T = T {e}. So it is sufficient that we find a spanning tree in G = G {v}. Note that the restriction of x to E(G ), call it x res, is a feasible solution to the LP for G. So by induction, we find a tree F for G of cost at most optimum value of the LP for G. Thus c(f ) c x r es and C(F) = C(F ) + c e. Thus since x e = 1. c(f) c x res + c e = c x 2 Min-cost Arborescence We can use the same technique to show that the standard LP for the minimum cost r-arborescence problem is integral. Here we are given a digraph D = (V,A) and with root r, a cost function c : A R 0. Our goal is to find a minimum cost r-arborescence. It is easy to see that the following is an LP relaxation: 4
5 min c a x a s.t. x(δ in (S)) 1 S V r x(δ in (v)) = 1 v V r x(δ in (r)) = 0 x a 0. We leave it as an exercise to prove the following lemma: Lemma 2.1 Let x be a bfs of the above LP, and assume all edges a have x a > 0. There is a laminar family L such that: 1. x is the unique solution to the linear system {x(δ in (S)) = 1 : S L} 2. The vectors {χ(δ in (S)) : S L} are linearly independent, and 3. L = A Then an algorithm similar to the algorithm of MST in which in each rounds picks an edge with x a = 1 finds a minimum cost r-arborescence (details are an exercise). 3 Minimum Cost Bounded Degree Spanning Tree In this section we show how iterative algorithms can solve even more general problems (although approximately). Here we consider the problem of bounded degree spanning trees. Given a graph G = (V, E) and a bound k, suppose we want to find a spanning tree with maximum degree at most k. This is NP-complete since with k = 2, it is the Hamiltonian path problem. Theorem 3.1 (Furer & Raghavarchi 90) There is a polynomial time algorithm that finds a spanning tree of maximum degree a most k + 1 (if there is one of with maximum degree at most k). As a more general case, suppose each edge of the graph has some given cost c e. Also, each vertex v has a given bound B v and our goal is to find a minimum cost spanning tree with degree bounded by B v s. Theorem 3.2 (Singh & Lan 07) There is a polynomial time algorithm that finds a spanning tree of cost at most opt and degree in which every vertex v has degree at most B v + 1. In this lecture and the next lecture, we prove this theorem. For that end, we first formulate the problem as an integer program and consider the LP relaxation. The following LP is the relaxation for an even more general form of the problem in which we have degree bounds B v for a subset W V of vertices. We call the following LP, LP BDMST. min c e x e S V X(E(S)) S 1 X(E(V )) = V 1 v W X(δ(v)) B v X e 0 5
6 For ease of exposition, we first prove a weaker version of the above theorem. We show that the following algorithm finds a tree whose cost is at most optimum and degree of every vertex v is bounded by at most B v + 2. Additive +2 approximation for BDMST F while V (G) do Find a bfs x of LP BDMST and remove any edge e with x e = 0 If there is a vertex v V with at most one edge e = uv incident to v then F F {e} G G {v} W W {v} B u B u 1 If there is a vertex v W with deg E (v) 3 then W W {v} Return F So at each iteration, if there is an edge e that is the only edge incident to v, and we show that we must have x e 1 and we pick this edge. Thus the cost we pay for an edge is not more than what the optimum pays. We argue that if there is no such vertex v with an edge of value 1 then there is a vertex v W with d(v) 3; so at each iteration we make progress in one of the two steps. Note that if there is a vertex v with d(v) 3 and we remove this constraint since B v 1 in the worst case we will have picked all the at most 3 edges incident with v in our final solution, so the degree bound will be at most 3 which is at most B v + 2. Let F = {S V : x(e(s)) = S 1} be the set of tight set constraints. Then the following lemma can be proved similar to lemma 1.9 by applying uncrossing to sets in F: Lemma 3.3 Let x be a bfs of LP BDMSP with x e > 0 for all edges. There is a T W with x(δ(v)) = B v for each v T, and a laminar family L F such that 1. vectors {χ(e(s)) : S L} {χ(δ(v)) : v T } are linearly independent 2. vector space of span(l) {χ(δ(v)) : v T } = span(f) 3. L + T = E By the argument given earlier, it is thus sufficient to prove the following lemma: Lemma 3.4 (Main lemma) Let x be a bfs of LP BDMSP with x e > 0 for all edges. There is a vertex v with degree(v) = 1 or there is a vertex v W with degree(v) 3. Proof: By way of contradiction, suppose that none of these holds, i.e. each vertex v V has degree(v) 2 and each v W has degree(v) 4. Thus, with V = n: E = 1 2 v V degree(v) 1 (4 W + 2(n W )) = n + W. (1) 2 By the previous lemma, there is a laminar family L F and set T W with L + T = E. Since L has sets of size at least 2, L n 1. Thus E = L + T n 1 + T n 1 + W which contradicts inequality (1). 6
7 Theorem 3.5 The iterative algorithm given above returns a tree T with cost at most optimum and d(v) B v + 2 for each v W. Proof: If there is a node v with degree(v) = 1 then since x(δ(v)) 1 is a valid constraint (obtained by subtracting x(e(v v)) V 2 from x(e(v )) = V 1), we must have x e 1. So we pay no more than what the LP pays at each step we pick an edge. Also, the remaining variables define a feasible solution for the residual LP, so inductively, the cost of T is at most the cost of the LP solution. As for the degree bounds, let B v be the current residual degree bound for a vertex v. It is easy to see that since we always pick full edges and update the degree bounds, if v W then deg F (v)+b v = B v. Now when v is removed from W (because it has deg(v) 3) then deg T (v) deg F (v) + 3 B v B v + 3 B v + 2, since B v Additive +1 approximation algorithm In this Section we prove Theorem 3.2. We start from a bfs and show that at each iteration we can either find an edge e with x e = 1 ( and so pick it) or there is a vertex v W with deg(v) B v + 1 and we relax the constraint. The following equivalent algorithm is easier to analyze. We start from a bfs x with x e > 0, for all e E. We iteratively find a vertex v W with deg(v) B v + 1 and remove v from W. At the end we have the LP without any degree constraints, so it is the same LP as for MST and is thus integral. Additive +1 approximation for BDMST while V (G) do Find a bfs x of LP BDMST and remove any edge e with x e = 0 Let v W be a node with deg(v) B v + 1. W W {v} Return all edges with x e = 1. It is easy to see that if at each iteration we find a vertex v W with deg(v) B v + 1 then the degree of v at the final solution is no more than B v + 1 once we remove that constraint from the LP. Also, x as it is, is feasible for the more relaxed LP. Therefore, the value of the solution for the residual (relaxed) LP is no more than opt. This implies that at the end we have a tree with cost at most optimum and degree bounds are violated by no more than +1. Thus we only have to show that at each iteration of the algorithm we can find such a vertex v W to remove from W. Note that from Lemma 3.3 we can find the laminar family L F and tight degree nodes T W such that L + T = E and the corresponding constraints are linearly independent. We prove the following Lemma: Lemma 3.6 Let x be a bfs of the LP BDMST with x e > 0 for all edges and L and T be as in Lemma 3.3. Then if T then there is a node v W such that degree(v) B v + 1. We will see the proof of this lemma next lecture and that completes the proof of Theorem
Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal
Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal ABSTACT Mohit Singh Tepper School of Business Carnegie Mellon University Pittsburgh, PA USA [email protected] In the MINIMUM
5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Connectivity and cuts
Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
THE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
Tree-representation of set families and applications to combinatorial decompositions
Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. [email protected]
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
Triangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
CMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling
6.854 Advanced Algorithms Lecture 16: 10/11/2006 Lecturer: David Karger Scribe: Kermin Fleming and Chris Crutchfield, based on notes by Wendy Chu and Tudor Leu Minimum cost maximum flow, Minimum cost circulation,
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
CHAPTER 9. Integer Programming
CHAPTER 9 Integer Programming An integer linear program (ILP) is, by definition, a linear program with the additional constraint that all variables take integer values: (9.1) max c T x s t Ax b and x integral
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
Mean Ramsey-Turán numbers
Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average
Chapter 3: Section 3-3 Solutions of Linear Programming Problems
Chapter 3: Section 3-3 Solutions of Linear Programming Problems D. S. Malik Creighton University, Omaha, NE D. S. Malik Creighton University, Omaha, NE Chapter () 3: Section 3-3 Solutions of Linear Programming
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
The chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Lecture 17 : Equivalence and Order Relations DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion
Steiner Tree Approximation via IRR. Randomized Rounding
Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related
. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2
4. Basic feasible solutions and vertices of polyhedra Due to the fundamental theorem of Linear Programming, to solve any LP it suffices to consider the vertices (finitely many) of the polyhedron P of the
GRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
Midterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
Linear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
Minimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
Linear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
LEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
Problem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
INCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
On the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
Network Flow I. Lecture 16. 16.1 Overview. 16.2 The Network Flow Problem
Lecture 6 Network Flow I 6. Overview In these next two lectures we are going to talk about an important algorithmic problem called the Network Flow Problem. Network flow is important because it can be
Method To Solve Linear, Polynomial, or Absolute Value Inequalities:
Solving Inequalities An inequality is the result of replacing the = sign in an equation with ,, or. For example, 3x 2 < 7 is a linear inequality. We call it linear because if the < were replaced with
The Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1
GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept
Polytope Examples (PolyComp Fukuda) Matching Polytope 1
Polytope Examples (PolyComp Fukuda) Matching Polytope 1 Matching Polytope Let G = (V,E) be a graph. A matching in G is a subset of edges M E such that every vertex meets at most one member of M. A matching
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
Single machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
Graph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis [email protected] http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
Linear Programming I
Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Solutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University [email protected] 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
3.1 Solving Systems Using Tables and Graphs
Algebra 2 Chapter 3 3.1 Solve Systems Using Tables & Graphs 3.1 Solving Systems Using Tables and Graphs A solution to a system of linear equations is an that makes all of the equations. To solve a system
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
An Approximation Algorithm for Bounded Degree Deletion
An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
Linear Programming for Optimization. Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc.
1. Introduction Linear Programming for Optimization Mark A. Schulze, Ph.D. Perceptive Scientific Instruments, Inc. 1.1 Definition Linear programming is the name of a branch of applied mathematics that
Lecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover
Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt
Adaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy
A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy David P. Williamson Anke van Zuylen School of Operations Research and Industrial Engineering, Cornell University,
How To Solve The Line Connectivity Problem In Polynomatix
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany RALF BORNDÖRFER MARIKA NEUMANN MARC E. PFETSCH The Line Connectivity Problem Supported by the DFG Research
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
Determine If An Equation Represents a Function
Question : What is a linear function? The term linear function consists of two parts: linear and function. To understand what these terms mean together, we must first understand what a function is. The
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with
136 CHAPTER 4. INDUCTION, GRAPHS AND TREES
136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
1 The Line vs Point Test
6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity
Transportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
2.5 Zeros of a Polynomial Functions
.5 Zeros of a Polynomial Functions Section.5 Notes Page 1 The first rule we will talk about is Descartes Rule of Signs, which can be used to determine the possible times a graph crosses the x-axis and
SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH
CHAPTER 3 SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH ABSTRACT This chapter begins with the notion of block distances in graphs. Using block distance we defined the central tendencies of a block, like B-radius
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS RUSS WOODROOFE 1. Unique Factorization Domains Throughout the following, we think of R as sitting inside R[x] as the constant polynomials (of degree 0).
Distributed Computing over Communication Networks: Maximal Independent Set
Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.
Linear Algebra. A vector space (over R) is an ordered quadruple. such that V is a set; 0 V ; and the following eight axioms hold:
Linear Algebra A vector space (over R) is an ordered quadruple (V, 0, α, µ) such that V is a set; 0 V ; and the following eight axioms hold: α : V V V and µ : R V V ; (i) α(α(u, v), w) = α(u, α(v, w)),
SCORE SETS IN ORIENTED GRAPHS
Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in
The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Data Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
Chapter 20. Vector Spaces and Bases
Chapter 20. Vector Spaces and Bases In this course, we have proceeded step-by-step through low-dimensional Linear Algebra. We have looked at lines, planes, hyperplanes, and have seen that there is no limit
Lecture 2: August 29. Linear Programming (part I)
10-725: Convex Optimization Fall 2013 Lecture 2: August 29 Lecturer: Barnabás Póczos Scribes: Samrachana Adhikari, Mattia Ciollaro, Fabrizio Lecci Note: LaTeX template courtesy of UC Berkeley EECS dept.
