Breadth-Depth Search is P-complete. Raymond Greenlaw. University of New Hampshire. address: Abstract
|
|
- Hollie Sims
- 7 years ago
- Views:
Transcription
1 Breadth-Depth Search is P-complete Raymond Greenlaw Department of Computer Science University of New ampshire Durham, New ampshire address: greenlawcs.unh.edu Abstract The parallel complexity of a search strategy that combines attributes of both breadth-rst search and depth-rst search is studied. The search called breadth-depth search was dened by orowitz and Sahni. The search technique has applications in branch-and-bound strategies. Kindervater and Lenstra posed the complexity of this type of search strategy as an open problem. We resolve their question by showing that a natural decision problem based on breadth-depth search is P-complete. Specically, we prove that if given a graph G = (V; E) either directed or undirected, a start vertex s 2 V, and two designated vertices u and v in V, then the problem of deciding whether u is visited before v by a breadth-depth search originating from s is P-complete. The search can be based either on vertex numbers or xed ordered adjacency lists. Our reductions dier for directed/undirected graphs and depending on whether vertex numbers/xed ordered adjacency lists are used. These results indicate breadth-depth search is highly sequential in nature and probably will not adapt to a fast parallel solution, unless N C equals P. Keywords: Breadth-depth search, breadth-rst search, depth-rst search, parallel algorithms, P-completeness. 1 Introduction Graph searching techniques like breadth-rst search (BFS) and depth-rst search (DFS) are fundamental procedures in many algorithms. Applying parallel computers to speedup graph searching has become an especially important problem as the size of the search space for many problems has grown very large. We study a search strategy called breadth-depth search (BDS) that combines features of both BFS and DFS. orowitz and Sahni dened BDS and demonstrated its applications to branch-and-bound strategies [8]. Kindervater and Lenstra posed as an open question the complexity of this type of search [9, page 182]. In this paper we classify the complexity of BDS by showing that a natural decision problem based on BDS is P-complete. Our results indicate BDS is probably inherently sequential. Table 1 summarizes research that examines the complexities of various search methods. Reif showed that computing an ordered DFS was P-complete [10]. This result led researchers to believe This research was partially funded by National Science Foundation Grants CCR and CCR
2 DFS was highly sequential. Fast parallel algorithms were found for certain restricted version of DFS for example, restricted to planar graphs [11] or to directed acyclic graphs [3, 4, 6]. Aggarwal and Anderson showed that by using randomization one could obtain a fast parallel algorithm for unordered DFS in undirected graphs [1]. Aggarwal, Anderson, and Kao showed a similar result for directed graphs [2]. It is well-known that computing BFS level numbers is in N C. We showed a natural decision problem based on an implementation of BFS using stacks was P-complete [6]. Comparing the results in this paper with those in Table 1 seems to indicate BDS is more like DFS than BFS. Table 1: A summary of results about search strategies. Search Method Complexity Reference(s) depth-rst search in planar graphs N C [11] ordered depth-rst search P-complete [10] ordered depth-rst search in DAGs N C [3, 4, 6] ordered breadth-rst search N C [3, 4, 6] stack breadth-rst search P-complete [6] unordered depth-rst search RN C [1, 2] breadth-depth search P-complete [5, 6] The remainder of this paper is organized as follows. Section 2 contains preliminary material. In Section 3 we formally dene BDS and present an algorithm for BDS. Reductions are presented in Section 4 proving decision problems based on the BDS algorithm are P-complete. Section 5 contains conclusions. 2 Preliminaries P-completeness theory has been an active research area over the last few years. An introduction to the theory as well as a comprehensive list of P-complete problems is given in [7]. We assume the reader is familiar with the basic principles of P-completeness. The theory has an important practical signicance because problems that are P-complete probably do not adapt to fast (log k n for input size n and some constant k) parallel solutions using a polynomial number of processors. That is, it is unlikely that they are in the complexity class N C. For evidence supporting this statement, the reader is referred to [7]. There are two main problems that we use to prove dierent variants of BDS are P-complete. The rst is the NOR Circuit Value Problem (NOR CVP). The problem is known to be P-complete (see [7]) and is dened below. Denition 2.1 NOR Circuit Value Problem (NOR CVP) Given: An encoding of a Boolean circuit constructed only of NOR gates, plus inputs x 1 ; : : :; x n. The gates of the circuit are numbered in topological order. The circuit is restricted to have fan-out one for circuit inputs and fan-out two for NOR gates. All inputs are restricted to being TRUE. Problem: Does on inputs x 1 ; : : :; x n output 1 2
3 The second problem we use in the reductions is the ordered DFS problem. problem below [10]. We dene the Denition 2.2 Ordered Depth-First Search (ODFS) Given: A graph G = (V; E) with xed ordered adjacency lists, a start vertex s, and two designated vertices u and v. Problem: Does vertex u get visited before vertex v in the ordered DFS of G induced by the xed ordered adjacency lists The search produced in Denition 2.2 is sometimes called a greedy DFS. Reif showed this problem was P-complete by a reduction from a variant of NOR CVP. Theorem 2.1 [10] The ordered depth-rst search problem is P-complete under log space reducibility for both directed and undirected graphs. The order depth-rst search problem remains P-complete if the search order is based on vertex numberings instead of xed ordered adjacency lists. For clarity, we formally dene this version of the problem as well. Denition 2.3 Vertex Ordered Depth-First Search (Vertex ODFS) Given: A graph G = (V; E) with a numbering on the vertices, a start vertex s, and two designated vertices u and v. Problem: Does vertex u get visited before vertex v in the ordered DFS of G induced by the vertex numbering of V It is not obvious that this version of the problem is P-complete. The following result proved in [5] shows that it is. Theorem 2.2 [5] The vertex ordered depth-rst search problem is P-complete under log space reducibility for both directed and undirected graphs. 3 Breadth-Depth Search The algorithm shown below depicts a BDS that is based on xed ordered adjacency lists. The algorithm is easily modied to work based on a vertex numbering of its input graph. The search order produced by the algorithm is dierent from a BFS in that it does not proceed level by level in visiting nodes. It is dierent from DFS in that the algorithm has a \breadth" component. Figures 3 through 6 provide examples of BDS. Breadth-Depth Search Algorithm Input: A graph G = (V; E) represented by xed ordered adjacency lists and a node s. Output: Starting from s all nodes visited are labeled with the level in which they occur and are numbered consecutively in the order in which they were visited within their level. Comment: next(v) { returns the next unlabeled vertex on v's adjacency list; unlabeled(v) { returns the total number of unvisited vertices adjacent to v; level[v] { contains v's level number; order[v] { contains v's number within a given level. begin 3
4 level[s] 0; order[s] 1; count 1; push s on stack S; while stack S 6= null do v pop S; T unlabeled(v); for i 1 to T do u next(v); order[u] count; count count + 1; level[u] level[v] + 1; push u on stack S; endfor endwhile end. We say a node has been explored if all of its adjacent vertices have been visited. The BDS algorithm operates by exploring nodes. The start vertex s is the rst node explored. The next node explored is the last one visited from s the vertex most recently popped o the stack. This process continues so that a single node at each level is fully explored each time a node on that level is popped o the stack. This diers from DFS where only a single vertex is visited from the current node. The current node in DFS is not explored unless it is at the end of a path in the DFS tree and even then it may not be fully explored next. BDS diers from BFS because in general only the nodes adjacent to a single vertex per level are explored initially. In BFS an entire level is visited before proceeding to the next level. In the next section we show that several natural decision problems based on BDS are log space reducible (see [7] for a denition) to either NOR CVP, ODFS, or vertex ODFS. Clearly, BDS can be solved in polynomial time (by running the BDS algorithm), this combined with the reductions proves the problems are P-complete. 4 Breadth-Depth Search is P-complete Our goal in this section is to prove that several decision problems based on breadth-depth search are P-complete. We dene the breadth-depth search problem below. Denition 4.1 Breadth-Depth Search Problem (BDS) Given: A graph G = (V; E) with a numbering on the vertices in V, a start vertex s, and two designated vertices u and v. Problem: Does vertex u get visited before vertex v in the BDS of G induced by the vertex numbering of V We present three groups of reductions in this section that show BDS is P-complete for either directed or undirected graphs. The reductions are based on NOR CVP, vertex ODFS, and a variant of BDS that is based on xed ordered adjacency lists. The third group of reductions was suggested by Richard Andersion (Personal communication, Richard Anderson, 1988). The rst result we present for BDS based on vertex numberings implies the theorem for xed ordered adjacency lists. Since the alternative reduction is quite simple and interesting, we present it as well. 4
5 This reduction does not work for BDS when the search is based on vertex numbering (Personal communication, Amarjit Singh, 1992). The table below summarizes the results that are proved in this section. Table 2: A summary of results concerning the variants of BDS. Search Based on Type of Graph Reduction From Theorem vertex numbers directed NOR CVP 4.1 vertex numbers undirected NOR CVP 4.1 vertex numbers directed vertex ODFS directed graph 4.2 vertex numbers undirected vertex ODFS undirected graph 4.2 xed ordered adjacency lists directed ODFS directed graph 4.3 xed ordered adjacency lists undirected ODFS undirected graph 4.3 Theorem 4.1 The breadth-depth search problem, as stated in Denition 4.1, is P-complete under log space reducibility for either directed or undirected graphs. Proof: As noted previously, the BDS algorithm can be used to solve the BDS problem in P for either directed or undirected graphs. We prove the directed case rst. The reduction is from NOR CVP. Consider an instance of NOR CVP. Let 1; : : :; m denote input numbers and m + 1; : : :; N denote NOR gate numbers. The idea behind the reduction is to construct from an instance of BDS (G = (V; E), s, u, and v) such that the search order used to explore G allows us to determine the value of the output gate of. We construct gadgets to represent NOR gates. These gadgets are linked together. By adding a SPECIAL node to the end of the string of gadgets, the search of G is such that the value of a particular gate in is TRUE if and only if a specied vertex S(i) in each gadget is visited before the SPECIAL node. We take u to be S(output gate) and v to be SPECIAL. G is described below. The circuit inputs are represented in G as shown in Figure 1. Input i connected to gate number j is labeled IN(j; i). For input i there is an associated vertex labeled ENTER(i). A single chain of inputs does not suce for this reduction because the search has a breadth component as well as a depth component. ENTER(i) 1 R ENTER(i + 1) 3 IN(j; 2 i) Figure 1: Input i's contribution to G where input i is connected to gate j. Figure 2 depicts the contribution to G from each gate. The numbers inside the nodes indicate their relative numberings within the gadget and are fully specied below. We assume, for this 5
6 numbering only, that i 1 is less than i 2. ENTER(m) is connected to ENTER(m + 1). EXIT(N) is connected to the vertex SPECIAL. For the sake of clarity, we have depicted the gadget so that EXIT(i 1) is dierent from ENTER(i). The two nodes could be combined. EXIT(i 1) $ D(i) ENTER(i) 4-1 IN(i,i 1 ) 2 IN(i,i 2 ) 3 S(i) 5 IN(j 1,i) 6 IN(j 2,i) 7 T(i) EXIT(i) R 8 9 % Figure 2: Contribution to G from NOR gate i with inputs i 1 and i 2, and outputs j 1 and j 2. We specify a numbering of the vertices in G such that the search order of G can be used to evaluate the output gate of. Number the nodes D(m + 1); : : :; D(N) with values 1; : : :; (N m), respectively. The gadgets corresponding to the input nodes are numbered next. Number ENTER(i) and IN(j; i) with values N m + 2i 1 and N m + 2i, respectively for 1 i m. The remaining vertices that have not received numbers ENTER(i), S(i), IN(j 1 ; i), IN(j 2 ; i), T(i), and EXIT(i) are numbered N + m + 6i; : : :; N + m + 6i + 5, respectively. The SPECIAL vertex is numbered 7N + m + 6. We take s in the instance of BDS to be node ENTER(1), u to be S(output gate), and v to be SPECIAL. The reduction is easily seen to be log space. We claim that evaluates to TRUE if and only if u is visited before v in the breadth-depth search of G originating from s. The lemma below shows the reduction is correct by proving a slightly stronger result. Lemma 4.1 Vertex S(i) in the gadget for gate i is visited in G by the breadth-depth search algorithm before vertex SPECIAL if and only if gate i evaluates to TRUE in. 6
7 Proof: We assume input i is connected to gate j i. From node ENTER(1) it is easy to see that the breadth-depth search algorithm will initially visit the following sequence of nodes: ENTER(1), IN(j 1 ; 1), : : :, ENTER(m), and IN(j m ; m). The IN() nodes are all unexplored and pushed on the stack, whereas, the ENTER() nodes are explored. IN() nodes that have been visited represent TRUE values and those that have not represent FALSE values. We assume for the induction hypothesis that for all i 0, where m < i 0 i N, one of the following two cases hold. 1. If g i 0 is TRUE, the search proceeded through gadget i 0 visiting ENTER(i 0 ), D(i 0 ), IN(i 0,i 0 1 ), IN(i0,i 0 2 ), S(i0 ), IN(j 1,i 0 ), IN(j 2,i 0 ), T(i 0 ), and EXIT(i 0 ). 2. If g i 0 is FALSE, the search proceeded through gadget i 0 visiting ENTER(i 0 ), D(i 0 ), (possibly IN(i 0,i 0 1 )), T(i0 ), and EXIT(i 0 ). Because of the vertex numbering and the search order, no \outputs" of a gadget are fully explored when the gadget is visited. Suppose gate g i = g i1 NOR g i2 and both inputs to g i are FALSE. By the induction hypothesis IN(i; i 1 ) and IN(i; i 2 ) have not been previously visited, so the nodes of gadget i are visited in the order as specied in CASE 1 above. If either input to g i is TRUE then by the induction hypothesis either IN(i; i 1 ) or IN(i; i 2 ) has already been visited. Upon reaching the one that has been visited, the search backtracks and the nodes of the gadget are visited as in CASE 2 above. For values of i falling into CASE 1 (CASE 2), S(i) gets visited before (after) SPECIAL. This completes the proof of Lemma 4.1. Lemma 4.1 proves the reduction for the directed case is correct. To prove the theorem in the undirected case, we make a simple modication to the gadget Figure 2 depicts. This allows us to use essentially the same proof of correctness. A new node is inserted between IN(i; i 2 ) and S(i), and S(i)'s name is changed to F(i). The new node is labeled S(i). The relative numbering of the vertices within the gadgets remains the same. F(i)'s number is between S(i)'s and IN(j 1 ; i)'s. Again, we have two cases to consider for the induction hypothesis to demonstrate the correctness of the reduction. Making the same assumptions about i 0, our induction hypothesis for this case is as follows: 1. If g i 0 is TRUE, the search proceeded through gadget i 0 visiting ENTER(i), D(i), IN(i,i 1 ), IN(i,i 2 ), S(i), F(i), IN(j 1,i), IN(j 2,i), T(i), and EXIT(i). 2. If g i 0 is FALSE, the search proceeded through gadget i 0 visiting ENTER(i), D(i), (possibly IN(i,i 1 )), T(i), F(i), and EXIT(i). 7
8 Reasoning proceeds analogously to the directed case, so an undirected version of Lemma 4.1 holds. This proves the theorem for the undirected case and completes the proof of Theorem 4.1. The next theorem shows vertex ODFS (see Denition 2.3) is log space reducible to BDS providing an alternative P-completeness proof. The reduction illustrates an interesting relationship between ODFS and BDS. Theorem 4.2 Vertex ordered depth-rst search is log space reducible to breadth-depth search. Proof: We rst present the proof for the directed case. The undirected case requires a separate reduction. Given an instance of vertex ODFS G = (V; E) with a numbering on the vertices in V and three vertices s, u, and v; we construct a new instance G 0 = (V [ V 0 ; E 0 ), s, u, and v of BDS such that u is visited before v in the instance of vertex ODFS if and only if u is visited before v in the corresponding instance of BDS. Without loss of generality, we will assume G is connected. We modify G to prove the theorem. R R R R R R (a) R R (b) R 10 6 Figure 3: An example illustrating the reduction performed in Theorem 4.2 for the directed case. The original graph with its vertex numbering is shown in part (a). Part (a) also shows the vertex ODFS. The search order is 1, 2, 4, 5, 6, and 3; whereas for the BDS shown in part (b) the search order is 1, 8, 9, 2, 16, 4, 29, 30, 5, 6, 3, 22, and 24. Thus, vertices 1{6 are visited in the same relative order. The idea behind the construction of G 0 from G is to insert a new vertex on every directed edge of G. Thus, there are jej new vertices inserted in G 0. Since each edge in E is split, there are 2jEj edges in E 0. The new edges are both directed in the same direction as the edge they split was. The numbering of the new nodes is specied below. Let b be a node in the original graph having neighbors b 1 ; : : :; b k. Suppose the b i 's are numbered in increasing order as listed. That is, number(b 1 ) < number(b 2 ) < < number(b k ). Let c 1 ; : : :; c k 8
9 be the nodes added by the reduction and splitting the edges (b; b 1 ); : : :; (b; b k ), respectively. For example, the directed edges involving c 1 are (b; c 1 ) and (c 1 ; b 1 ). The c i 's are numbered so that number(c k ) < < number(c 1 ). That is, the c i 's numbers are such that the c i 's are ordered just the reverse of the b i 's. More specically, c i receives number b jv j + b k+1i. An example illustrating the reduction is presented in Figure 3. Because of the \reversal" of the search order by BDS after a node has been fully explored, the b i 's are visited in the same relative order by the BDS algorithm as they are by the vertex ODFS algorithm. We prove this fact formally below. We show u is visited before v in an instance of ODFS if and only if u is visited before v in an instance of BDS. In fact, the following lemma shows a slightly stronger result holds. Lemma 4.2 For all w 2 V, w gets visited in the same relative order among the vertices in V by the vertex ordered depth-rst search algorithm as by the vertex number based breadth-depth search algorithm. Proof: The proof is by induction. For the base case, the start vertex s gets visited rst by each search algorithm. Suppose w k is the k-th vertex visited by each algorithm among the vertices in V. Let w k+1 be the next node visited by the vertex ODFS algorithm. We show w k+1 is also the next vertex in V visited by the BDS algorithm. We divide the argument into two cases. The rst case is that where w k+1 is a neighbor of w k. Since w k+1 is the rst vertex visited from w k, w k+1 must be the lowest numbered neighbor of w k that has not been visited yet. Suppose d 1 ; d 2 ; : : :; d r are all the neighbors of w k in G and that they are listed in increasing order of their numbers. In G 0 there are vertices d 0 1 ; d0 2 ; : : :; d0 r splitting the edges formed between w k and its neighbors in G. In the BDS of G 0, these were all visited in the order from d 0 r to d 0 immediately after 1 w k was visited. The \reversal" of the search order by the BDS algorithm means the search continues in G 0 from d 0 up to 1 d0 r, so the next vertex in V to be visited corresponds to the lowest numbered unvisited vertex that is the sole neighbor of one of the d 0 i 's. This is the vertex w k+1 that is visited in G from w k. The second case to consider is one in which w k+1 is not a neighbor of w k. That is, all neighbors of w k have been visited by the ODFS. In this case w k+1 is a neighbor of one of the vertices visited before w k in G. By employing reasoning similar to the previous case at the point where the search backed up to, it is not hard to see that w k+1 will be the next vertex in V visited by the BDS algorithm in G 0. This completes the proof of the lemma. Lemma 4.2 shows u is visited before v in an instance of ODFS if and only if u is visited before v in an instance of BDS. It is easy to verify that the reduction is a log space reduction. A dierent reduction is required for undirected graphs. We reduce the problem to vertex ODFS for undirected graphs (which is P-complete by Theorem 2.2). We only sketch the reduction. The idea is to insert two vertices on each undirected edge. For each vertex w in the original graph G, its new neighbors are used to \reverse" the search out of w. A numbering scheme similar to the one used for the directed case can be used here. Figure 4 illustrates the reduction. The theorem proved below is an immediate corollary of Theorem 4.1. We present an alternative proof suggested by Richard Anderson. Theorem 4.3 The breadth-depth search problem whose search order is based on xed ordered adjacency lists is P-complete under log space reducibility for either directed or undirected graphs. 9
10 (a) (b) Figure 4: An example illustrating the reduction performed in Theorem 4.2 for the undirected case. The original graph with its vertex numbering is shown in part (a). Note, in the vertex ODFS in part (a) the search order is 1, 2, 4, 3, 6, and 5; whereas for the BDS shown in part (b) the search order is 1, 8, 9, 16, 2, 13, 30, 4, 26, 27, 29, 22, 3, 19, 24, 40, 6, 39, 34, and 5. Thus, the vertices 1{6 are visited in the same relative order. Proof sketch: The reduction is from the ODFS problem (see Denition 2.2). We sketch the reduction for the undirected case rst. Given an instance of ODFS G = (V; E) and three vertices s, u, and v; we construct a new instance G 0 = (V [ V 0 ; E 0 ), s, u, and v of BDS such that u is visited before v in the instance of ODFS if and only if u is visited before v in the corresponding instance of the BDS problem. Without loss of generality, we assume G is connected. The idea behind the construction of G 0 from G is to insert a new vertex between every pair of connected nodes in G. Thus, there are jej new vertices inserted in G 0. Since each edge in E is split, there are 2jEj edges in E 0. The ordering of the new nodes on the adjacency lists is specied below. Let b be a node in the original graph having neighbors b 1 ; : : :; b k. Suppose the b i 's are ordered on b's adjacency list as shown. Let c 1 ; : : :; c k be the nodes added by the reduction and splitting the edges (b; b 1 ); : : :; (b; b k ), respectively. The c i 's are ordered on the adjacency lists just the reverse of the b i 's, i.e. from c k down to c 1. Let m 1 (m 2 ) be the minimum (maximum) vertex number of c i 's two neighbors. We number the c i 's by taking jv j m 1 + m 2 for c i. Because of the \reversal" of the search order by BDS after all the neighbors of a node have been visited, the b i 's are visited in the same relative order by the BDS algorithm as they are by the ordered DFS algorithm. It is easy to verify that the reduction can be done in log space. Since the BDS algorithm runs in polynomial time, the proof of the theorem is complete for undirected graphs. (An example of the reduction is presented in Figure 5 and is described further below.) A similar reduction works for directed graphs since ordered DFS is P-complete for directed graphs as well (see Theorem 2.1). (An example of the reduction is presented in Figure 6 and is described further below.) 10
11 The reduction in Theorem 4.3 for the undirected case is illustrated in Figure 5. That is, given the adjacency lists specied below the numbers outside the nodes indicate the search order for ODFS in part (a) and BDS in part (b). The adjacency lists for part (a) are 1: 2, 3; 2: 1, 4; 3: 1, 4, 6; 4: 2, 3, 5, 6; 5: 4; 6: 3, 4; and for part (b) are 1: 9, 8; 2: 16, 8; 3: 24, 22, 9; 4: 30, 29, 22, 16; 5: 29; 6: 30, 24; 8: 1, 2; 9: 1, 3; 16: 2, 4; 22: 3, 4; 24: 3, 6; 29: 4, 5; 30: 4, (a) (b) Figure 5: An example illustrating the reduction performed in Theorem 4.3 for the undirected case. The adjacency list orderings are specied in the text. Note, in the ODFS in part (a) the search order is 1, 2, 4, 3, 6, and 5; whereas for the BDS shown in part (b) the search order is 1, 9, 8, 2, 16, 4, 30, 29, 22, 3, 24, 6, and 5. Thus, the vertices 1{6 are visited in the same relative order. The reduction in Theorem 4.3 for the directed case is illustrated in Figure 6. That is, given the adjacency lists specied below the numbers outside the nodes indicate the search order for ODFS in part (a) and BDS in part (b). We use the same convention for numbering the c i 's as we did in the undirected case, where c i 's two \neighbors" are the two nodes having edges involving c i. The adjacency lists for part (a) are 1: 2, 3; 2: 4; 3: 4, 6; 4: 5, 6; 5: ; 6: ; and for part (b) are 1: 9, 8; 2: 16; 3: 24, 22; 4: 30, 29; 5: ; 6: ; 8: 2; 9: 3; 16: 4; 22: 4; 24: 6; 29: 5; and 30: 6. Note that vertices 1{6 are visited in the same relative order by both ODFS and BDS. 5 Conclusions Our proofs indicate the BDS problem is inherently sequential. Therefore, it is unlikely that the ordered version of the BDS algorithm can be parallelized eciently. It is possible that an alternative approach to BDS could lead to a fast parallel algorithm. Such algorithms have been devised for DFS [1, 2]. It would be interesting to show that a non-greedy version of BDS is in RN C or N C. 11
12 R R 3 4 R (a) R R R R R (b) R 10 6 Figure 6: An example illustrating the reduction performed in Theorem 4.3 for the directed case. The adjacency list orderings are specied in the text. Note, in the ODFS in part (a) the search order is 1, 2, 4, 5, 6, and 3; whereas for the BDS shown in part (b) the search order is 1, 9, 8, 2, 16, 4, 30, 29, 5, 6, 3, 24, and 22. Thus, the vertices 1{6 are visited in the same relative order. 6 Acknowledgements I would like to thank Richard Anderson for suggesting the problem be reduced to the ordered DFS problem, Amarjit Singh for correspondence on this problem, and the referees for several helpful suggestions. References [1] A. Aggarwal and R. J. Anderson. A random NC algorithm for depth rst search. Combinatorica, 8(1):1{12, [2] A. Aggarwal, R. J. Anderson, and M. Kao. Parallel depth-rst search in general directed graphs. SIAM Journal on Computing, 19(2):397{409, [3] P. de la Torre and C. Kruskal. Fast parallel algorithms for all sources lexicographic search and path nding problems. Technical Report CS-TR 2283, University of Maryland, [4] P. de la Torre and C. Kruskal. Fast and ecient parallel algorithms for single source lexicographic depth-rst search, breadth-rst search and topological-rst search. In International Conference on Parallel Processing, volume III, pages 286{287,
13 [5] R. Greenlaw. The Complexity of Parallel Computations: Inherently Sequential Algorithms and P -Complete Problems. PhD thesis, University of Washington, [6] R. Greenlaw. A model classifying algorithms as inherently sequential with applications to graph searching. Information and Computation, 97(2):133{149, [7] R. Greenlaw,. J. oover, and W. L. Ruzzo. Topics in Parallel Computation: A Guide to P -completeness Theory. Computing Science Series, editor Z. Galil. Oxford University Press, to appear. [8] E. orowitz and S. Sahni. Fundamentals of Computer Algorithms. Computer Science Press, Rockville, Md., [9] G.A.P Kindervater and J.K. Lenstra. An introduction to parallelism in combinatorial optimization. In J. van Leeuwen and J.K. Lenstra, editors, Parallel Computers and Computation, volume 9 of CWI Syllabus, pages 163{184. Center for Mathematics and Computer Science, Amsterdam, The Netherlands, [10] J. Reif. Depth-rst search is inherently sequential. Information Processing Letters, 20(5):229{ 234, [11] J.R. Smith. Parallel algorithms for depth rst searches I: Planar graphs. SIAM Journal of Computing, 15(3):814{830,
Lecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationTopology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
More informationOn the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we
More informationGRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationCombinatorial PCPs with ecient veriers
Combinatorial PCPs with ecient veriers Or Meir Abstract The PCP theorem asserts the existence of proofs that can be veried by a verier that reads only a very small part of the proof. The theorem was originally
More information1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
More informationFast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik vadim.stadnik@gmail.com Abstract This paper provides an introduction to the design of augmented data structures that offer
More informationLecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
More informationLecture 10 Union-Find The union-nd data structure is motivated by Kruskal's minimum spanning tree algorithm (Algorithm 2.6), in which we needed two operations on disjoint sets of vertices: determine whether
More informationData Structures and Algorithms Written Examination
Data Structures and Algorithms Written Examination 22 February 2013 FIRST NAME STUDENT NUMBER LAST NAME SIGNATURE Instructions for students: Write First Name, Last Name, Student Number and Signature where
More information1 Domain Extension for MACs
CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Reading. Lecture Notes 17: MAC Domain Extension & Digital Signatures Katz-Lindell Ÿ4.34.4 (2nd ed) and Ÿ12.0-12.3 (1st ed).
More information2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]
Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)
More informationCS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
More informationComputer Science Department. Technion - IIT, Haifa, Israel. Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
- 1 - THREE TREE-PATHS Avram Zehavi Alon Itai Computer Science Department Technion - IIT, Haifa, Israel Abstract Itai and Rodeh [IR] have proved that for any 2-connected graph G and any vertex s G there
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More information5 Directed acyclic graphs
5 Directed acyclic graphs (5.1) Introduction In many statistical studies we have prior knowledge about a temporal or causal ordering of the variables. In this chapter we will use directed graphs to incorporate
More informationHandout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More informationONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
More informationThe LCA Problem Revisited
The LA Problem Revisited Michael A. Bender Martín Farach-olton SUNY Stony Brook Rutgers University May 16, 2000 Abstract We present a very simple algorithm for the Least ommon Ancestor problem. We thus
More informationFinding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
More information8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationProblem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
More informationDiversity Coloring for Distributed Data Storage in Networks 1
Diversity Coloring for Distributed Data Storage in Networks 1 Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Pasadena, CA 9115, U.S.A. {jax, bruck}@paradise.caltech.edu Abstract
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More information1 The Line vs Point Test
6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity
More informationOffline 1-Minesweeper is NP-complete
Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.
More informationMathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationmost 4 Mirka Miller 1,2, Guillermo Pineda-Villavicencio 3, The University of Newcastle Callaghan, NSW 2308, Australia University of West Bohemia
Complete catalogue of graphs of maimum degree 3 and defect at most 4 Mirka Miller 1,2, Guillermo Pineda-Villavicencio 3, 1 School of Electrical Engineering and Computer Science The University of Newcastle
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationClass One: Degree Sequences
Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of
More informationeach college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
More informationCycles in a Graph Whose Lengths Differ by One or Two
Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS
More informationAn Eective Load Balancing Policy for
An Eective Load Balancing Policy for Geometric Decaying Algorithms Joseph Gil y Dept. of Computer Science The Technion, Israel Technion City, Haifa 32000 ISRAEL Yossi Matias z AT&T Bell Laboratories 600
More informationNan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
More informationLabeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
More informationPortable Bushy Processing Trees for Join Queries
Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationConnectivity and cuts
Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every
More informationData Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
More information1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
More informationExamination paper for MA0301 Elementær diskret matematikk
Department of Mathematical Sciences Examination paper for MA0301 Elementær diskret matematikk Academic contact during examination: Iris Marjan Smit a, Sverre Olaf Smalø b Phone: a 9285 0781, b 7359 1750
More informationCompetitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
More informationarxiv:1203.1525v1 [math.co] 7 Mar 2012
Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined
More informationNotes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
More informationFind-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
More informationA Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
More informationSolutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
More informationOn an anti-ramsey type result
On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element
More informationLecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationDetermination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
More informationNetwork File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
More informationV. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005
V. Adamchik 1 Graph Theory Victor Adamchik Fall of 2005 Plan 1. Basic Vocabulary 2. Regular graph 3. Connectivity 4. Representing Graphs Introduction A.Aho and J.Ulman acknowledge that Fundamentally, computer
More informationPolicy Analysis for Administrative Role Based Access Control without Separate Administration
Policy nalysis for dministrative Role Based ccess Control without Separate dministration Ping Yang Department of Computer Science, State University of New York at Binghamton, US Mikhail I. Gofman Department
More informationCOMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
More information4.1 Introduction - Online Learning Model
Computational Learning Foundations Fall semester, 2010 Lecture 4: November 7, 2010 Lecturer: Yishay Mansour Scribes: Elad Liebman, Yuval Rochman & Allon Wagner 1 4.1 Introduction - Online Learning Model
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationCatalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.
7 Catalan Numbers Thomas A. Dowling, Department of Mathematics, Ohio State Uni- Author: versity. Prerequisites: The prerequisites for this chapter are recursive definitions, basic counting principles,
More informationMinimizing the Eect of Clock Skew. Via Circuit Retiming 1. Technical Report 93-5-04. May, 1992
Minimizing the Eect of Clock kew Via Circuit Retiming 1 Brian Lockyear and Carl Ebeling Department of Computer cience and Engineering University of Washington eattle, Washington 98195 Technical Report
More informationCMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
More informationGraphs without proper subgraphs of minimum degree 3 and short cycles
Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract
More informationShortcut sets for plane Euclidean networks (Extended abstract) 1
Shortcut sets for plane Euclidean networks (Extended abstract) 1 J. Cáceres a D. Garijo b A. González b A. Márquez b M. L. Puertas a P. Ribeiro c a Departamento de Matemáticas, Universidad de Almería,
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More informationx 2 f 2 e 1 e 4 e 3 e 2 q f 4 x 4 f 3 x 3
Karl-Franzens-Universitat Graz & Technische Universitat Graz SPEZIALFORSCHUNGSBEREICH F 003 OPTIMIERUNG und KONTROLLE Projektbereich DISKRETE OPTIMIERUNG O. Aichholzer F. Aurenhammer R. Hainz New Results
More informationChapter 4 Multi-Stage Interconnection Networks The general concept of the multi-stage interconnection network, together with its routing properties, have been used in the preceding chapter to describe
More informationShortest Inspection-Path. Queries in Simple Polygons
Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,
More informationOutline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1
GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept
More informationPart 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
More informationIE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
More informationReminder: Complexity (1) Parallel Complexity Theory. Reminder: Complexity (2) Complexity-new
Reminder: Complexity (1) Parallel Complexity Theory Lecture 6 Number of steps or memory units required to compute some result In terms of input size Using a single processor O(1) says that regardless of
More informationReminder: Complexity (1) Parallel Complexity Theory. Reminder: Complexity (2) Complexity-new GAP (2) Graph Accessibility Problem (GAP) (1)
Reminder: Complexity (1) Parallel Complexity Theory Lecture 6 Number of steps or memory units required to compute some result In terms of input size Using a single processor O(1) says that regardless of
More informationIntroduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
More informationARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
More informationGraph Visualization U. Dogrusoz and G. Sander Tom Sawyer Software, 804 Hearst Avenue, Berkeley, CA 94710, USA info@tomsawyer.com Graph drawing, or layout, is the positioning of nodes (objects) and the
More informationGenerating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
More informationCMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
More informationOnline Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
More informationLarge induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
More informationGraphical degree sequences and realizations
swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös
More informationA Labeling Algorithm for the Maximum-Flow Network Problem
A Labeling Algorithm for the Maximum-Flow Network Problem Appendix C Network-flow problems can be solved by several methods. In Chapter 8 we introduced this topic by exploring the special structure of
More informationNP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
More informationSCORE SETS IN ORIENTED GRAPHS
Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in
More informationRegular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
More informationDiscrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
More informationExponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
More informationMathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationCpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
More informationGraph Security Testing
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 23 No. 1 (2015), pp. 29-45 Graph Security Testing Tomasz Gieniusz 1, Robert Lewoń 1, Michał Małafiejski 1 1 Gdańsk University of Technology, Poland Department of
More informationA simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
More information