A Simpler Characterization of a Spectral Lower Bound on the Clique Number
|
|
- Katherine Chapman
- 7 years ago
- Views:
Transcription
1 A Simpler Characterization of a Spectral Lower Bound on the Clique Number E. Alper Yıldırım April 4, 2009 Abstract Given a simple, undirected graph G, Budinich [Discrete Applied Mathematics, ), ] proposed a lower bound on the clique number of G by combining the quadratic programming formulation of the clique number due to Motzkin and Straus 965) with the spectral decomposition of the adjacency matrix of G. This lower bound improves the previously known spectral lower bounds on the clique number that rely on the Motzkin-Straus formulation. In this paper, we give a simpler, alternative characterization of this lower bound. For regular graphs, this simpler characterization allows us to obtain a simple, closed-form expression of this lower bound as a function of the positive eigenvalues of the adjacency matrix. Our computational results shed light on the quality of this lower bound in comparison with the other spectral lower bounds on the clique number. Key words: Maximum clique, maximum stable set, stability number, clique number, spectra of graphs. AMS Subject Classifications: 05C69, 90C35, 65K05, 90C20 Department of Industrial Engineering, Bilkent University, Bilkent, Ankara, Turkey yildirim@bilkent.edu.tr)
2 Introduction Let G = V, E) be a simple, undirected graph with a vertex set V = {, 2,..., n} and an edge set E consisting of m edges. A clique C V is a set of mutually adjacent vertices. The clique number of G, denoted by ωg), is the size of the maximum clique in G. A set S V is a stable set of G if each pair of vertices in S is mutually nonadjacent. The cardinality of the maximum stable set of G is called the stability number of G and is denoted by αg). The maximum clique problem is equivalent to the maximum stable set problem on G, the complement of G. We denote the n n adjacency matrix of G by A G. It is well-known that computing or even approximating) the clique number of a graph is in general an NP-hard problem [7]. The recent survey paper by Bomze et al. [2] provides an account of the fairly rich literature including applications, formulations, exact algorithms, heuristics, bounds, and estimates. However, the clique number and a maximum clique can be computed in polynomial time for certain classes of graphs such as perfect graphs and complements of t-perfect graphs [6, 3]. In the literature, several connections have been established between the clique or stability number of a graph and the spectral properties of the adjacency matrix or of the Laplacian matrix of G see, e.g., [4, 2, 3, 0, 8, 5, ]). In particular, Budinich [3] proposed a lower bound on the clique number of a given graph G by combining the quadratic programming formulation of the clique number due to Motzkin and Straus [9] and the spectral decomposition of the adjacency matrix A G. He established that this lower bound improves the previously known spectral lower bounds that rely on the Motzkin-Straus formulation. In this paper, we give a simpler, alternative characterization of this lower bound. In contrast with the characterization of the lower bound in [3], our characterization requires the solution of a much simpler quadratic linesearch problem. For regular graphs, this simpler characterization allows us to obtain a simple, closed-form expression of this lower bound as a function of the positive eigenvalues of A G. Our computational results shed light on the quality of the proposed lower bound in comparison with the other spectral lower bounds on the clique number. 2
3 This paper is organized as follows. In the remainder of this section, we define our notation. Section 2 discusses the continuous formulation of Motzkin and Straus [9] and reviews several known lower bounds on the clique number. Section 3 presents the simpler, alternative characterization of the lower bound due to Budinich [3]. The closed-form expression of this lower bound for the class of regular graphs is the topic of Section 4. The computational results are presented in Section 5. Section 6 concludes the paper.. Notation R n denotes the n-dimensional Euclidean space. For u R n, u i denotes the ith component of u. The complete graph on n vertices is denoted by K n. We reserve e to denote the vector of all ones in the appropriate dimension and e j to represent the unit vector whose jth component i. The n )-dimensional unit simplex in R n is denoted by n, i.e., n := {x R n : e T x =, x 0}. For a graph G = V, E) with V = {,...,n}, A G S n denotes the adjacency matrix of G. For a nonempty subset C V, we use χ C to denote the characteristic vector of C scaled by / C so that χ C n. 2 Formulation and Lower Bounds Given a simple, undirected graph G = V, E) with V = n, Motzkin and Straus [9] established that ωg) = max x n x T A G x, ) which is a continuous formulation of a combinatorial optimization problem. In addition to paving the way for the use of continuous optimization methods to solve the maximum clique problem, this formulation plays a central role in the derivation of lower bounds on the clique number of G. By ), ωg) µ x) := x T A G x, for all x n. 2) 3
4 Using the fact that x = /n)e n, it follows that ωg) n 2 n 2 2m, 3) where m = E is the number of edges of G. This bound matches the clique number for complete graphs K n and their complements. In addition to computing the clique number, the formulation ) can in some cases be used to identify a maximum clique. For any maximum clique C V, χ C is a global optimal solution of ). However, a drawback of the Motzkin-Straus formulation ) is the existence of global optimal solutions that do not correspond to characteristic vectors of maximum cliques of G. For instance, if G is the 4-cycle C 4, then χ V = /4)e is a global optimal solution of ) despite the fact that V is not a clique of G. In an attempt to circumvent this drawback of the Motzkin-Straus formulation, Bomze [] proposed the following regularized continuous formulation: 2ωG) = max x T A G x + ) x n 2 xt x. 4) In contrast with ), each local maximizer is strict and corresponds to the characteristic vector of a maximal clique maximal with respect to inclusion). Also, each global maximizer is strict and corresponds to the characteristic vector of a maximum clique. Similarly to ), this alternative formulation can be used to derive a lower bound on the clique number of G: ωg) β x) := 2 x T A G x /2) x T x), for all x n. 5) Despite the fact that the alternative formulation 4) has more appealing properties in terms of identifying cliques, the following lemma establishes that the Motzkin-Straus formulation actually yields better lower bounds. Lemma 2. Let G = V, E) be a simple, undirected graph such that V = n. For each x n, µ x) β x), i.e., the lower bound 2) obtained from the Motzkin-Straus formulation ) is at least as good as the lower bound 5) obtained from the Bomze formulation 4). 4
5 Proof. Let x n. Note that x T I + A G ) x x T ee T ) x = e T x) 2 =, where we used the fact that x 0 and I + A G is a matrix consisting only of zeroes and ones. Therefore, which completes the proof. β x) = 2 x T A G x ) 2 xt x, = 2 x T A G x x T I + A G ) x, x T A G x = µ x), By Lemma 2., we henceforth restrict our attention to the Motzkin-Straus formulation ). Most of the other lower bounds in the literature are obtained by combining the formulation ) with the spectral theory of graphs. Henceforth, we assume that G = V, E) is a connected graph without loss of generality, since the maximum clique problem can otherwise be decomposed into smaller problems on each connected component of G. We now collect some results about the spectra of such graphs. The reader is referred to [4] for further details. Theorem 2. Let G = V, E) be a connected graph with the adjacency matrix A G S n such that V = n 2 and let λ λ 2... λ n denote the spectrum of A G.. n i= λ i = λ n and λ λ n, i.e., λ is the spectral radius of A G. 3. A G is irreducible, which implies that there exists a positive eigenvector u R n, called the Perron eigenvector, corresponding to the simple eigenvalue λ, called the Perron root. 4. e R n is an eigenvector of A G corresponding to λ if and only if G is a regular graph. 5. A G has exactly one positive eigenvalue λ if and only if G is a complete multipartite graph. 5
6 Given a graph G, let λ > 0 and u R n denote the Perron root and the positive Perron eigenvector of A G, respectively. Using the feasible solution ˆx := / )u n of ), where := e T u, Wilf [2] established that ωg) µˆx) = s2 s 2 λ = λ s 2 λ +, 6) with equality if G is a complete graph. The lower bound 6) is an improvement over the lower bound 3). More recently, Budinich [3] proposed a new lower bound that makes use of all the eigenvectors of A G. In particular, if u, u 2,..., u n denotes the eigenvectors of A G of unit Euclidean norm corresponding to the eigenvalues λ λ 2... λ n, respectively, where u > 0, one can construct a family of unit vectors y i β) = β u i + β 2 u R n, i = 2, 3,..., n, 7) where β, ). Then, z i β) := /e T y i β))y i β) is a feasible solution of ) for i = 2, 3,..., n as long as β [l i, u i ], where Let l i := max j:u i j >0 and let g i := max β [l i,u i ] It follows from ) that u j u j )2 + u ij )2 < 0, u i := min j:u i j <0 z i β) T A G z i β) = max β [l i,u i ] u j u j )2 + u ij )2 > 0, i = 2, 3,..., n. 8) β 2 λ i + β 2 )λ βe T u i ) + i = 2, 3,..., n. 9) β 2 ) 2, g := max i=2,3,...,n g i. 0) ωg) g. ) Unless G is a complete multipartite graph, Budinich shows that ) strictly improves upon 6). A comparison of the three lower bounds reveals that 3) is the easiest to compute and is provably the weakest one. While 6) requires only the computation of the Perron root and the Perron eigenvector, one needs the full spectrum and the full set of eigenvectors to compute ). 6
7 3 A Simpler Characterization Given a simple, connected, undirected graph G = V, E) with V = n, recall the Motzkin- Strauss formulation: ωg) = max x n x T A G x. Let u, u 2,..., u n denote the eigenvectors of A G of unit Euclidean norm corresponding to the eigenvalues λ λ 2... λ n, respectively, where u > 0. For τ R, let us define the following family of solutions: w i τ) := ) u + τ u i si ) u ), i = 2, 3,..., n, 2) where s i := e T u i, i =, 2,..., n. 3) It is easy to verify that e T w i τ) =, i = 2, 3,..., n for all τ R. Furthermore, since u > 0, it follows that w i τ) n if and only if τ [τl i, τi u ], where τ i l := max j:d i j >0 u j d i j ) < 0, τi u u j := min > 0, i = 2, 3,..., n, 4) j:d i j <0 d i j ) where d i := u i si Therefore, we can define the following linesearch problems: ) u, i = 2, 3,..., n. 5) ν i := max w i τ) T A G w i τ), 6a) τ [τl i,τi u ] ) ) 2 si τ = max λ + λ i τ 2, 6b) τ [τl i,τi u ] { ) ) λ 2λ s i ) = max τ + λ i + λ ) } s i ) 2 τ 2, i = 2, 3,..., n. 6c) τ [τl i,τi u ] Let us define s 2 Since w i τ) n for τ [τl i, τi u ], i = 2, 3,...,n, it follows that s 2 s 2 ν := max i=2,3,...,n ν i. 7) ωg) ν. 8) 7
8 The next proposition establishes that the lower bound 8) is exactly the same as the improved bound ) due to Budinich. Proposition 3. Let G = V, E) be a simple, undirected, connected graph. The lower bounds 8) and ) agree. Proof. We prove the assertion by establishing a one-to-one correspondence between the feasible solutions of the linesearch problems 9) and 6). Let us fix i {2, 3,..., n}. Let β [l i, u i ], where l i and u i are given by 8). Therefore, z i β ) = e T y i β ) y i β ) = β s i ) + β u i + ) β ) 2 u, 9) β ) 2 where y i β ) is given by 7), is a feasible solution of the linesearch problem 9). We will show that z i β ) corresponds to a feasible solution of the line search problem 6) for i = i. Let us define τ := β β s i ) + β ) 2. 20) Consider the linesearch problem 6) corresponding to i = i. By 2), ) τ w i τ ) = τ s u i i ) + u, β = β s i ) + u i β ) + 2 β ) 2 β s i ) + u, β ) 2 = z i β ), where we used 20) in the penultimate line and 9) in the last one. Since z i β ) n, it follows that τ [τ i l, τ i u ], where τ i l Conversely, let ˆτ [τl i, τu i ]. By 2) and 4), ) ˆτsi ) w i ˆτ) = ˆτ u i + u and τ i u are given by 4). This implies that ν i g i. is a feasible solution of the linesearch problem 6) corresponding to i = i. Let us define ˆβ := ˆτ) 2 + ˆτ ˆτ si ) ) ). 2 /2 2) 8
9 Then, ˆβ) 2 = ˆτ) 2 ) 2 ˆτ) 2 + ˆτ si ) /2 = ˆτs i ) ) ) ˆτ), 2 /2 2 + ˆτ si ) where we used the fact that ˆτ s i ) 0 since otherwise w i ˆτ) will necessarily have a negative component by 2). It follows that z i ˆβ) = = ˆβs i ) + ˆβ) 2 ˆτs i ) + = w i ˆτ). ˆτsi ) ) ) ˆβ u i + ˆβ) 2 u, ˆτu i + ˆτsi ) ) u ), Since w i ˆτ) n, it follows that ˆµ [l i, u i ], which implies that g i ν i. Since i is arbitrary, we have g i = ν i, i = 2, 3,..., n. Therefore, g = ν, which implies that / ν ) = / g ). Note that each linesearch problem 6) has a quadratic objective function and is therefore considerably simpler compared to its counterpart 9) required for the computation of ). Furthermore, this alternative characterization leads to a simple, closed-form expression for regular graphs, which is the topic of the next section. 4 Regular Graphs A graph G = V, E) is said to be k-regular if each vertex in V has exactly k neighbors. In this section, we turn our attention into the special class of regular graphs. We first establish certain properties of the lower bounds on such graphs. Then, we present a closed-form expression of the lower bound ) on this class of graphs using the simpler characterization outlined in Section 3. First, we establish that the lower bounds 3) and 6) coincide on this class of graphs. 9
10 Lemma 4. Let G = V, E) be a connected, k-regular graph with V = n vertices. Then, each of the lower bounds 3) and 6) is equal to n/n k). Proof. Since 2m = nk, the lower bound 3) is given by n 2 /n 2 2m) = n 2 /n 2 nk) = n/n k). Let us consider the lower bound 6). Since G is a regular graph of degree k, we have A G e = ke, which implies that k R is the Perron root with the corresponding Perron eigenvector u = / n)e. Since = e T u = n, it follows that the lower bound 6) is given by s 2 /s2 λ ) = n/n k), which establishes the assertion. Next, we establish that each of the three lower bounds 3), 6), and ) or, equivalently 8)) coincides with the clique number ωg) on connected, regular, complete multipartite graphs. Proposition 4. Let G = V, E) be a connected, k-regular, complete multipartite graph with V = n. Then, each of the three lower bounds 3), 6), and ) or, equivalently 8)) coincides with ωg). Proof. Note that the vertices of G can be partitioned into t subsets such that each subset contains exactly n/t mutually nonadjacent vertices. Since G is a k-regular, complete multipartite graph, we have k = t )n/t). Clearly, ωg) = t since each subset can contribute at most one vertex to any clique and there exists a clique of size t. By Lemma 4., the lower bounds 3) and 6) are equal to n/n k) = n/n t )n/t)) = t = ωg). Since G is a regular, connected, complete multipartite graph, it follows from [3, Proposition 3] that the lower bounds ) and 6) agree, which completes the proof. 4. Closed-Form Expression of Budinich s Lower Bound In this section, we present a simpler, closed-form expression of the lower bound ) for regular graphs relying on the alternative, simpler characterization of this lower bound given by 8). 0
11 Proposition 4.2 Let G = V, E) be a connected, k-regular graph with V = n. Let λ λ 2... λ n denote the eigenvalues of A G with the corresponding eigenvectors u, u 2,..., u n, where u > 0, and let P = {i {2, 3,..., n} : λ i > 0}. Then, the lower bound ) or, equivalently 8)) is given by { } n ωg) max n k, max i P k τ, 22) n i) 2 λ i where τ i := max { min min j:u i j <0 n u i j, j:u i j >0 nu i j }, i P. 23) Proof. Note that P = if and only if G is a complete, regular multipartite graph by Theorem 2.. In this case, the lower bound 8) is given by n/n k) and coincides with the clique number ωg) by Proposition 4.. Suppose that G is not a complete multipartite graph. Since G is a regular graph, it follows that u = / n)e is the Perron eigenvector of A G corresponding to the Perron root λ = k with = e T u = n. Therefore, s i = e T u i = 0, i = 2, 3,..., n, which implies that d i = u i, i = 2, 3,...,n by 5). By 4), τl i = max j:u i j >0 nu i j = min, τ i j:u i j >0 nu i u = min i = 2, 3,..., n. j j:u i j <0 n u i j, Therefore, we have, by 6), that ) k ν i = max τ [τl i,τi u ] n + τ2 )λ i, i = 2, 3,..., n. Clearly, ν i = k + τ n i) 2 λ i if i P, k n otherwise, where τ i is defined as in 23). The assertion follows from 8) and 7). We remark that Proposition 4.2 improves Wilf s lower bound for regular graphs given in [2, Theorem 3].
12 5 Computational Results Recently, using an upper bound on the smallest eigenvalue λ n of A G, Nikiforov [] established that 2m ωg) + ) n 2m 2m λ 24) n n n), with equality if and only if G is a complete regular multipartite graph. In an attempt to assess and compare the quality of the four spectral lower bounds 3), 6), 8) or, equivalently )), and 24) we evaluated each bound on each of the sixty six instances in the DIMACS collection of clique problems using MATLAB. The major work in computing each of the lower bounds 6), 8), and 24) was the computation of the eigenvalue decomposition of the adjacency matrix A G. Rather than presenting the bounds for each instance, we report our computational results in terms of several statistics since they provide much more insight about the quality of each lower bound. As shown in [3], the lower bound 8) or, equivalently )) is an improvement over each of the lower bounds 3) and 6), which is also confirmed by our computational results. The lower bound 3), which is the easiest to compute, is always the weakest one among all four lower bounds. The lower bound 6) is tighter than 3). The lower bounds 8) and 24) always outperform 3) and 6). Our results reveal that the lower bounds 8) and 24) are generally incomparable. Among the four lower bounds, the lower bound 24) was the sharpest on thirty nine instances while Budinich s bound 8) outperformed the other bounds in the remaining twenty seven instances. To assess the quality of each lower bound in further detail, we computed, for each instance, the ratio of each lower bound to the corresponding clique number. This ratio can be viewed as an approximation factor. We restricted our analysis to the fifty five instances in the DIMACS collection whose clique numbers are known. For each lower bound 3), 6), 8), and 24), we report several statistics related to these approximation ratios in Table. Table reveals that Budinich s lower bound 8) achieves the best average approximation ratio among all the lower bounds despite the fact that Nikiforov s lower bound 24) was 2
13 3) 6) 8) 24) Average Standard Deviation Maximum Minimum Table : Several Statistics About the Average Approximation Ratios the sharpest on the majority of the instances. Furthermore, while Budinich s lower bound agrees with the clique number on the DIMACS instances hamming6-2, hamming8-2, and hamming0-2, the lower bound 24) is at most within about 68% of the clique number among all instances. Figure : Distribution of Approximation Ratios The distribution of the approximation ratios for each lower bound is depicted in Figure. The horizontal axis represents the approximation ratios in ten equal intervals given by 0, 0.], 0., 0.2],..., 0.9, 0] and the vertical axis denotes the number of DIMACS in- 3
14 stances whose approximation ratio falls into the corresponding interval. Each of the four lower bounds is denoted by a different color as stated in the figure. A close examination of Figure reveals that Budinich s lower bound 8) achieves larger approximation ratios on more instances in comparison with the other lower bounds. We remark that the lower bound 8) is within 90% of the clique number on five instances whereas none of the other lower bounds achieves an approximation ratio of more than 0.7 on any of the instances. In our computational experiments, we used each of the two characterizations ) and 8) to compute Budinich s lower bound. While both bounds agree in theory, our computational results revealed that the original characterization ) always yields slightly smaller values in comparison with the simpler characterization 8) presented in this paper. This might be due to the fact that the original characterization is more prone to numerical errors. It follows that the simpler characterization seems to be more appealing also from a computational point of view. 6 Concluding Remarks In this paper, we presented a simpler, alternative characterization of a spectral lower bound on the clique number due to Budinich [3]. Our characterization leads to a closed-form expression of this lower on regular graphs. Our computational results shed light on the quality of this lower bound in comparison with other spectral lower bounds on the clique number. Given the hardness of any nontrivial approximation of the clique number, the construction of efficiently computable lower bounds may have significant implications towards the computation of clique number on larger graphs. For instance, good lower bounds can lead to a considerable reduction in the running time of search algorithms such as branch-and-bound. In the near future, we intend to continue our work on obtaining efficient upper and lower bounds by considering various tractable inner and outer approximations to the continuous formulation ) of the clique number. 4
15 References [] I. M. Bomze. Evolution towards the maximum clique. Journal of Global Optimization, 0:43 64, 997. [2] I. M. Bomze, M. Budinich, P. M. Pardalos, and M. Pelillo. The maximum clique problem. In D.-Z. Du and P. M. Pardalos, editors, Handbook of Combinatorial Optimization Supplement Volume A), page 74. Kluwer Academic, Boston, Massachusetts, U.S.A., 999. [3] M. Budinich. Exact bounds on the order of the maximum clique of a graph. Discrete Applied Mathematics, 27: , [4] D. M. Cvetković, M. Doob, and H. Sachs. Spectra of Graphs. Pure and Applied Mathematics. Academic Press, Inc., New York, 979. [5] C. D. Godsil and M. W. Newman. Eigenvalue bounds for independent sets. Journal of Combinatorial Theory, Series B, 98:72 734, [6] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial Optimization. Springer, New York, 988. [7] J. Hastad. Clique is hard to approximate within n ǫ. Acta Mathematica, 82):05 42, 999. [8] M. Lu, H. Liu, and F. Tian. Laplacian spectral bounds for clique and independence numbers of graphs. Journal of Combinatorial Theory, Series B, 97: , [9] T. S. Motzkin and E. G. Straus. Maxima for graphs and a new proof of a theorem of Turán. Canadian Journal of Mathematics, 7: , 965. [0] V. Nikiforov. The smallest eigenvalue of k r -free graphs. Discrete Mathematics, 306:62 66,
16 [] V. Nikiforov. More spectral bounds on the clique and independence numbers. Journal of Combinatorial Theory, Series B, doi:0.06/j.jctb [2] H. S. Wilf. Spectral bounds for the clique and independence numbers of graphs. Journal of Combinatorial Theory, Series B, 40:3 7, 986. [3] E. A. Yıldırım and X. Fan-Orzechowski. On extracting maximum stable sets in perfect graphs using Lovász s theta function. Computational Optimization and Applications, 332 3): ,
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationCOMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
More informationDATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
More informationINDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
More informationConductance, the Normalized Laplacian, and Cheeger s Inequality
Spectral Graph Theory Lecture 6 Conductance, the Normalized Laplacian, and Cheeger s Inequality Daniel A. Spielman September 21, 2015 Disclaimer These notes are not necessarily an accurate representation
More informationCompletely Positive Cone and its Dual
On the Computational Complexity of Membership Problems for the Completely Positive Cone and its Dual Peter J.C. Dickinson Luuk Gijben July 3, 2012 Abstract Copositive programming has become a useful tool
More informationInner Product Spaces and Orthogonality
Inner Product Spaces and Orthogonality week 3-4 Fall 2006 Dot product of R n The inner product or dot product of R n is a function, defined by u, v a b + a 2 b 2 + + a n b n for u a, a 2,, a n T, v b,
More informationYILUN SHANG. e λi. i=1
LOWER BOUNDS FOR THE ESTRADA INDEX OF GRAPHS YILUN SHANG Abstract. Let G be a graph with n vertices and λ 1,λ,...,λ n be its eigenvalues. The Estrada index of G is defined as EE(G = n eλ i. In this paper,
More informationBest Monotone Degree Bounds for Various Graph Parameters
Best Monotone Degree Bounds for Various Graph Parameters D. Bauer Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 S. L. Hakimi Department of Electrical and Computer
More informationMathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
More informationNOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationarxiv:1203.1525v1 [math.co] 7 Mar 2012
Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined
More informationNetwork File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
More informationDegree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationIntroduction to Matrix Algebra
Psychology 7291: Multivariate Statistics (Carey) 8/27/98 Matrix Algebra - 1 Introduction to Matrix Algebra Definitions: A matrix is a collection of numbers ordered by rows and columns. It is customary
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationDefinition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
More informationSimilarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
More informationAnalysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
More informationNETZCOPE - a tool to analyze and display complex R&D collaboration networks
The Task Concepts from Spectral Graph Theory EU R&D Network Analysis Netzcope Screenshots NETZCOPE - a tool to analyze and display complex R&D collaboration networks L. Streit & O. Strogan BiBoS, Univ.
More informationMath 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
More informationJUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
More informationOn three zero-sum Ramsey-type problems
On three zero-sum Ramsey-type problems Noga Alon Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel and Yair Caro Department of Mathematics
More informationPh.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor
Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai
More informationON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
More informationTU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines
The problem: load balancing with bounded look-ahead Input: integer m 2: number of machines integer k 0: the look-ahead numbers t 1,..., t n : the job sizes Problem: assign jobs to machines machine to which
More informationThe chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
More informationUSE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu ABSTRACT This
More informationTricyclic biregular graphs whose energy exceeds the number of vertices
MATHEMATICAL COMMUNICATIONS 213 Math. Commun., Vol. 15, No. 1, pp. 213-222 (2010) Tricyclic biregular graphs whose energy exceeds the number of vertices Snježana Majstorović 1,, Ivan Gutman 2 and Antoaneta
More informationTransportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
More informationNo: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
More informationSection 4.4 Inner Product Spaces
Section 4.4 Inner Product Spaces In our discussion of vector spaces the specific nature of F as a field, other than the fact that it is a field, has played virtually no role. In this section we no longer
More information3. Let A and B be two n n orthogonal matrices. Then prove that AB and BA are both orthogonal matrices. Prove a similar result for unitary matrices.
Exercise 1 1. Let A be an n n orthogonal matrix. Then prove that (a) the rows of A form an orthonormal basis of R n. (b) the columns of A form an orthonormal basis of R n. (c) for any two vectors x,y R
More informationCS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
More informationPolynomials. Dr. philippe B. laval Kennesaw State University. April 3, 2005
Polynomials Dr. philippe B. laval Kennesaw State University April 3, 2005 Abstract Handout on polynomials. The following topics are covered: Polynomial Functions End behavior Extrema Polynomial Division
More informationTree-representation of set families and applications to combinatorial decompositions
Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. buixuan@ii.uib.no
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationPart 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
More informationLecture 17 : Equivalence and Order Relations DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationThe Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
More informationOn the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More information1 Sets and Set Notation.
LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most
More informationContinuity of the Perron Root
Linear and Multilinear Algebra http://dx.doi.org/10.1080/03081087.2014.934233 ArXiv: 1407.7564 (http://arxiv.org/abs/1407.7564) Continuity of the Perron Root Carl D. Meyer Department of Mathematics, North
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationSplit Nonthreshold Laplacian Integral Graphs
Split Nonthreshold Laplacian Integral Graphs Stephen Kirkland University of Regina, Canada kirkland@math.uregina.ca Maria Aguieiras Alvarez de Freitas Federal University of Rio de Janeiro, Brazil maguieiras@im.ufrj.br
More informationHow To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationHigh degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
More informationby the matrix A results in a vector which is a reflection of the given
Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that
More informationMathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
More information1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
More informationTiers, Preference Similarity, and the Limits on Stable Partners
Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider
More informationInner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
More information(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
More informationNotes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
More informationSpecial Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
More informationGRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
More informationCOUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics
More informationOn the Relationship between Classes P and NP
Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,
More informationCONTINUED FRACTIONS AND FACTORING. Niels Lauritzen
CONTINUED FRACTIONS AND FACTORING Niels Lauritzen ii NIELS LAURITZEN DEPARTMENT OF MATHEMATICAL SCIENCES UNIVERSITY OF AARHUS, DENMARK EMAIL: niels@imf.au.dk URL: http://home.imf.au.dk/niels/ Contents
More informationCHAPTER 9. Integer Programming
CHAPTER 9 Integer Programming An integer linear program (ILP) is, by definition, a linear program with the additional constraint that all variables take integer values: (9.1) max c T x s t Ax b and x integral
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More information4.5 Linear Dependence and Linear Independence
4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then
More informationNan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
More informationState of Stress at Point
State of Stress at Point Einstein Notation The basic idea of Einstein notation is that a covector and a vector can form a scalar: This is typically written as an explicit sum: According to this convention,
More informationEfficient Out-of-Sample Extension of Dominant-Set Clusters
Efficient Out-of-Sample Extension of Dominant-Set Clusters Massimiliano Pavan and Marcello Pelillo Dipartimento di Informatica, Università Ca Foscari di Venezia Via Torino 155, 30172 Venezia Mestre, Italy
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationAn Approximation Algorithm for Bounded Degree Deletion
An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph
More informationTHE SCHEDULING OF MAINTENANCE SERVICE
THE SCHEDULING OF MAINTENANCE SERVICE Shoshana Anily Celia A. Glass Refael Hassin Abstract We study a discrete problem of scheduling activities of several types under the constraint that at most a single
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationThe Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method
The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method Robert M. Freund February, 004 004 Massachusetts Institute of Technology. 1 1 The Algorithm The problem
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationAll trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
More informationInner product. Definition of inner product
Math 20F Linear Algebra Lecture 25 1 Inner product Review: Definition of inner product. Slide 1 Norm and distance. Orthogonal vectors. Orthogonal complement. Orthogonal basis. Definition of inner product
More informationMATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
More informationSection 6.1 - Inner Products and Norms
Section 6.1 - Inner Products and Norms Definition. Let V be a vector space over F {R, C}. An inner product on V is a function that assigns, to every ordered pair of vectors x and y in V, a scalar in F,
More informationDuality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
More informationChapter 6. Orthogonality
6.3 Orthogonal Matrices 1 Chapter 6. Orthogonality 6.3 Orthogonal Matrices Definition 6.4. An n n matrix A is orthogonal if A T A = I. Note. We will see that the columns of an orthogonal matrix must be
More informationLecture Notes on Polynomials
Lecture Notes on Polynomials Arne Jensen Department of Mathematical Sciences Aalborg University c 008 Introduction These lecture notes give a very short introduction to polynomials with real and complex
More informationn 2 + 4n + 3. The answer in decimal form (for the Blitz): 0, 75. Solution. (n + 1)(n + 3) = n + 3 2 lim m 2 1
. Calculate the sum of the series Answer: 3 4. n 2 + 4n + 3. The answer in decimal form (for the Blitz):, 75. Solution. n 2 + 4n + 3 = (n + )(n + 3) = (n + 3) (n + ) = 2 (n + )(n + 3) ( 2 n + ) = m ( n
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
More informationLecture 2: August 29. Linear Programming (part I)
10-725: Convex Optimization Fall 2013 Lecture 2: August 29 Lecturer: Barnabás Póczos Scribes: Samrachana Adhikari, Mattia Ciollaro, Fabrizio Lecci Note: LaTeX template courtesy of UC Berkeley EECS dept.
More informationTriangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
More informationSEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov
Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices
More informationMinimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationGraph theoretic techniques in the analysis of uniquely localizable sensor networks
Graph theoretic techniques in the analysis of uniquely localizable sensor networks Bill Jackson 1 and Tibor Jordán 2 ABSTRACT In the network localization problem the goal is to determine the location of
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More informationMA107 Precalculus Algebra Exam 2 Review Solutions
MA107 Precalculus Algebra Exam 2 Review Solutions February 24, 2008 1. The following demand equation models the number of units sold, x, of a product as a function of price, p. x = 4p + 200 a. Please write
More informationCacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationA 2-factor in which each cycle has long length in claw-free graphs
A -factor in which each cycle has long length in claw-free graphs Roman Čada Shuya Chiba Kiyoshi Yoshimoto 3 Department of Mathematics University of West Bohemia and Institute of Theoretical Computer Science
More information