University of Alberta

Size: px
Start display at page:

Download "University of Alberta"

Transcription

1 TheGraphIsomorphismProblem University of Alberta ScottFortin by TechnicalReportTR96{20 July1996 DEPARTMENT OF COMPUTING SCIENCE The University of Alberta Edmonton, Alberta, Canada

2 theory,canbebroughttobearontheproblem,andyetonlyforspecial piesararepositionintheworldofcomplexitytheory,itisclearlyinnp butisnotknowntobeinpanditisnotknowntobenp-complete. Manysub-disciplinesofmathematics,suchastopologytheoryandgroup graphsthatlookdierentlyareactuallythesame.theproblemoccu- classesofgraphshavepolynomial-timealgorithmsbeendiscovered.incongruently,thisproblemseemsveryeasyinpractice.itisalmostalways Abstract Thegraphisomorphismproblemcanbeeasilystated:checktoseeiftwo Thispaperismostlyasurveyofrelatedworkinthegraphisomorphism implementationsexistsforapplicationdomainssuchasimageprocessing. trivialtochecktworandomgraphsforisomorphism,andfasthardware eld.weexaminetheproblemfrommanyangles,mirroringthemultifacetednatureoftheliterature.wesurveycomplexityresultsforthe haveconstantsthataresolargeastonegatetheirusefulnessinactual whichhaveknownpolynomial-timealgorithms.manyofthesealgorithms graphisomorphismproblem,anddiscusssomeoftheclassesofgraphs 1Introduction somegraphswhichare\hard"forpracticalalgorithms,andpresentexperimentalresultswhichdemonstrateaclassofgraphsonwhichpractical applications.thusanumberofpracticaltechniques,whichdonothavea algorithmsrunintodiculty. polynomialworstcase,arealsoexamined.weendthepaperbydiscussing doesthereexista1-to-1mappingoftheverticesinonegraphtotheverticesof theothersuchthatadjacencyispreserved?insymbols,giveng1andg2,does GraphIsomorphismDisease"[29].Workhascontinuedunabatedonthegraph isomorphismproblemhowever,duetothemanypracticalapplicationsofthe subject,somuchinfactthatin1977readandcorneilchristenedit\the problem,anditsuniquecomplexityproperties. Thegraphisomorphismproblemhasalonghistoryintheeldsofmathematics, thereexistanfsuchthat8a;b2v1;(a;b)2e1()(f(a);f(b))2e2.the chemistry,andcomputingscience.muchresearchhasbeendevotedtothis graphsinfigure1areexamplesofisomorphicgraphs. Thegraphisomorphismproblemcanbesimplystated:giventwographs, withintheconventionalcomplexityclasses,hasledtomanyresearchpapers;in FactoringisanotherproblemwhichisnotthoughttobeinPorNP-complete, isomorphism.thisambiguity,abouttheexactlocationofgraphisomorphism Section2wesurveysomeoftheseresults. howeverfactoringisknowntobeinco-np,whichisnotthecasewithgraph problemisknowntobeinnp,butisnotknowntobeinpornp-complete. knowinwhichcomplexityclasstheproblemlies.somewhatsurprisingly,the Asarstattemptatunderstandinggraphisomorphism,wemaywishto 1

3 isomorphismdiscusshowtobuildfast,practical,isomorphismcheckers.some systemtoquicklygiveeachgraphauniquename.thusmanypapersongraph routinelydealwithgraphswhichrepresentmolecularlinks,andwouldlikesome tionswhichdesireafastisomorphismalgorithm.forexample,organicchemists enoughtojustifyitsstudy,itturnsoutthattherearemanypracticalapplica- Whilethepositionofgraphisomorphismincomplexityanalysisismorethan Figure1:Isomorphicgraphs ofverticesanedgewithxedprobabilityp,arealmostalwayseasytosolveby Findinggraphswhichare\hard"forthestrongestpracticalalgorithmsisa non-trivialtask.graphswhicharerandomlygenerated,bymakingeachpair provablypolynomialworstcase,thesignicanceofthisfactisnotentirelyclear. asimplebacktrackroutinewithaverynaiveheuristic[16].insection4we worstcase.insection3weexamineindetailsomeofthepracticalresults. classofgraphs,butmostpracticalalgorithmsdonothaveapolynomialtime oftheseroutinescomefromspecialpolynomial-timealgorithmsforarestricted discusstheproblemofndinghardgraphsfortheisomorphismproblem,and giveexperimentalresultswhichdemonstrateaclassofdicultgraphs. Althoughnopracticalalgorithmwhichcanbeappliedtoallgraphshasa f(a)=aforalla2v.anautomorphismpartitionofagraphgisasequence theoreticconceptscannotbeavoided,andwegiveabriefsummaryhere.an ofdisjointsubsetsv1;:::;vk,suchthatforallpairsofverticesa;b2vithere copiesofg;i.e.itisamappingfbetweenpairsofverticessuchthat(a;b)2 existsanautomorphismwheref(a)=b1.thustheautomorphismpartition E()(f(a);f(b))2E.Atrivialautomorphismisanautomorphismwhere automorphismofagraphgcanbedenedasanisomorphismbetweentwo theorythatunderliesmanygraphisomorphismresults.however,somegroup Forthemostpart,wetrytohidethereaderfromthecomplicatedgroup dividesvintosetsconsistingofalltheverticesthatcanbemappedontoone another. 1Alternatively,wecouldsaythatViistheorbitofaintheautomorphismgroupofG. 2

4 notknowntobeineitherpornp-complete;further,giisnotknowntobein 2ComplexityResults worldofcomplexityanalysis.itisoneofthefewproblemswhichisinnpbutis atelyexponentialalgorithmforsolvingtheproblem[3].moderatelyexponen- tialmeansthatonaproblemofsizen,therunningtimetobeystherelation: problems. co-np.itiswellknownthatifp6=npthenthereexistsproblemswhichareof Thegraphisomorphismproblem(GI)occupiesanimportantpositioninthe nk<t<an,wherek;a>1arearbitraryrealnumbers.typicallythismeansthe intermediatestatus,andithasbeenhypothesizedthatgimaybeoneofthese exponentintherunningtimeisafunctionofnwhichgrowsslowerthann.for example,theoneupperboundforgeneralgraphisomorphismisexp(n1=2+o(1)) [24]Ḃabia,Erdos,andSelkowsshowedthatforalmostallgraphsX,isomorphism toanyothergraphycouldbecomputedinquadratictime[5].aswell,ithas OneearlyresultonthecomplexityofGIshowedthatthereisamoder- theoryproblems,namelyrandomgraphs,theisomorphismproblemisnotvery dicult. isomorphism[6].theseresultsshowthatunderametricappliedtoothergraph beenshownthatthereisalinearexpectedtimealgorithmforsolvinggraph determineclassesofgraphssuchthattheisomorphismproblemisinpwhen locationofgiinthesenewcomplexityclasses.athirdapproachistotryto eralizethenotionofnpintomoreesotericnotionsofcomplexity,andstudythe restrictedtographsofthattype. proachistodeneitasbeingitsowncomplexityclass,isomorphism-complete, andseewhichotherproblemsfallwithinitsclass.anotherapproachistogensearchershavetakenotherapproachestodeterminingitscomplexity.oneap- SinceGIhasresistedeortstoclassifyitineitherPorNP-complete,re- ofisomorphismsbetweentwographsisisomorphism-complete.thisresultis togi.mostsignicantly,heshowedthattheproblemofcountingthenumber 2.1IsomorphismComplete Mathon[25]showedthatanumberofproblemsarepolynomiallyequivalent problems.indeedevenforsomeproblemsinp,thecountingversionis(conjecturedtobe)muchharderthanthedecisionproblem. theproblemofdeterminingtheautomorphismpartitionofagraph.thegraph automorphismdecisionproblem(ga),whichasksifthereexistsanon-trivial numberofnon-trivialautomorphismsofagraph,whichisinturnequivalentto problems.heshowedthatgiisequivalenttotheproblemofcountingthe MathonalsodemonstratedtheclosetiesbetweenGIandautomorphism versionsofnp-completeproblemsaremuchharderthantheirrelateddecision furtherevidencethatgiisnotnp-complete,sinceitseemsthatthecounting 3

5 graphs,transitivelyorientablegraphs[10],andregulargraphs[9].theseresultsarenotterriblysurprisingsincemanyofthesegraphclassesexhibitalarge reductionintheotherdirectionisknowntoexist. phismproblemconnedtoanyofthefollowingtypesofgraphsisisomorphism- allyequivalenttogi.wesimplylist,withoutproof,thatthegraphisomor- Thetermequalityproblemwasalsoshowntobeisomorphism-completeby Manyrestrictedisomorphismproblemsarealsoknowntobepolynomicomplete:bipartitegraphs,linegraphs,rootedacyclicdigraphs[2],chordal automorphism,isaninterestingexception;whilegaisreducibletogi,nosuch dicult(seesection4). amountofregularity,whichisoneofthefactorsthatmakesgraphisomorphism Basin[7].Inthisproblem,wearegiventwotermswhichcanhavefunctions whichareassociative,commutative,orboth,andcanhavecommutativevariable itdoesnotoccurnaturallyasagraphtheoreticproblem.itlendscredenceto thenotionofisomorphism-completeasaseparateandusefulcomplexityclass. 2.2GeneralizationsofNP NPistypicallycharacterizedasthoseproblemswherethereisapolynomially problemisdierentfromthepreviousisomorphism-completeproblems,inthat bindingoperators.wethenmustdecideifthetwotermsareequal;aspecial checkableproofcerticate.itcanalsobethoughtofasaninteractionbetween caseofthisproblemisdecidingiftwopredicatecalculustermsareequal.this twoparticipants,anall-powerfulproverandaverier.theproverlooksatthe putstheverieracceptspositiveinstanceswithprobability3/4,andaccepts input,andcomputesaproofcerticatewhichhesendstotheverier;theverier thenchecksthecerticateinpolynomialtimeandeitheracceptsorrejectsthe input.pcanbethoughtofasthoseproblemswherethereisnocommunication accesstoastreamofprivaterandomnumbersandonlyrequirethatoverallin- betweentheproverandtheverier.aswell,welettheproverandverierhave negativeinstanceswithprobability1/4.ipisknowntobeequaltopspace, andisthusnotveryinteresting.howeverifwerestrictthenumberofmessages sages(forp)or1message(fornp),weallowapolynomialnumberofmessages toaconstantk,wegettheclassip(k),whichisknowntobeequaltoip(2)for allk>1andisnotknown(andbelievednot)tobeequaltopspace.inthis TheclassIPisageneralizationoftheabovescenario.Insteadofnomes- Goldwasser,Micali,andRacko[19]thatthegraphnon-isomorphismproblem isinip(1)andhencegiisinip(2).muchmoresurprisingistheresultof acceptingnegativeinstances0. wheretheprobabilityofacceptingpostiveinstancesis1andtheprobabilityof IP(2).NotethatPandNParespecialcasesofIP(0)andIP(1)respectively, notationwethushavethreeclasseswhichmaynotbeequal,ip(0),ip(1),and Comingbacktographisomorphism,wehavethatsinceGIisinNP,GI 4

6 proofthatgi2ip(2) anddemonstratesthebasicideaofaninteractiveproof: (whichisnotknowntobeinnp)isinip(2).thealgorithmisquitesimple, 3.I 6.ifa=iandb=jtheverieraccepts,otherwiseitrejects 5.theproverreturns2numbersi;jsuchthatGiisisomorphictoI, 4.theveriersendsI;Jtotheproverinparallel 2.theverierpicks(atrandom)a;b2f1;2g 1.lettheinputgraphsbeG1andG2 alwaysaccept.iftheyareisomorphic,theproverhasnowayto knowwhichgraphiwasderivedfrom,andsowithprobability1/2 IfG1andG2arenotisomorphic,thenclearlytheverierwill andgjisisomorphictoj someisomorphismofga,j someisomorphismofgb complete,givesacomplexitydiagramlikethatoffigure2.thissignicance ofthisclassicationisnotsolelytheincreasedperspectiveitgivesonthegi problem,butithasalsobeenusedtogivestrongevidencethatgiisnotnpcomplete. Thisresult,combinedwiththelackofresultsplacingGIinPorNP- probability1/2thatj6=b.thusifg1andg2areisomorphic,the itwillreturnisuchthati6=a.similarlyforgraphj,thereis verieracceptswithprobability1=4.2 IP[2] PSPACE PH1PH2:::,basedonexistentialquantiers,universalquantiers,and Thepolynomialhierarchy(PH)isahierarchyofcomplexityclassesPH0 Figure2:ComplexityofGIandGI 5 NP-complete co-np co-np-complete NP P

7 andzachos[11]andschoning[31]prove(indierentways)thismainresultof graphisomorphismstructuralcomplexity: andph1=np.wewillnotdiscussthedetailsofph,excepttosaythatitis generallybelievedtobeaproperhierarchy[23].thatistosay,itisbelieved theredoesnotexistanisuchthatforji,phi=phj.boppana,hastad polynomialtimealgorithms.ittooisageneralizationofnp,i.e.ph0=p IfthegraphisomorphismproblemisNP-complete,thepolynomial inagraphwithaspeciallabelededge.ahighleveldescriptionofthealgorithm thepaper,giisreducedtotheproblemofndingthenumberofautomorphisms 2.3GraphswhereGIisinP TherstmajorresultinthiseldwasapaperbyLuksin1978[24].Heshowed thatforgraphswhichhaveboundeddegree(i.e.themaximumdegreesome constantk),thereexistsapolynomialtimealgorithmtocheckisomorphism.in hierarchycollapsestoph2=ip(2) intox1;:::;xn?1wherexiistheinducedsubgraphonthoseverticeswhich proceedsinthreesteps.firstanedgeeischosen,andthegraphispartitioned andluksclaimsthatusingmoresophisticatedtechniquestherunningtimeis stepisalwayspossibleandrunsinpolynomialtime.thealgorithmpresented inthepaperwasnotmeanttogiveatightupperboundontherunningtime, ino(ncklogk),wherec>1isaconstantandkisthemaximumdegree.itis forallgroups.usingpowerfulideasfromgrouptheory,luksprovedthateach itssetofneighboursinxi+1,andverticeswiththesamemappingaregrouped together.finallyeachofthesegroupsisdecomposedintoprimitivegroups wherethenumberofautomorphismsisknown,andthesenumbersaresummed areistepsorfewerawayfrome.next,ineveryxi,eachvertexismappedto clearthatevenifthemaximumdegreeisonly10,thistechniquedoesnotyield apracticalalgorithm. inpolynomialtime.thisalgorithmisnotverypractical,asitsrunningtimeis phism,onesuchpropertyisthegenusofagraph.ifwewishtodraw(more isdenedasasequenceofnumbersg1;g2;:::suchthatgiisthenumberofways wexk,thenthosegraphswhichhavegk>0canbecheckedforisomorphism commonlyembed)agraphonsomesurfacesuchthatnotwolinescross,wemay todrawagraphonasurfaceofgenusi.filottiandmayer[18]showthatif needasurfacewithafairlycomplicatedstructure.thegenusisameasureof howcomplicatedsuchasurfacemustbe;andthegenusdistributionofagraph Othergraphpropertieshavebeenstudiedwithrespecttographisomor- constantinthisalgorithmis(512k3)!whichisverylargenomatterwhatthe O(nck)wherec>300isaconstant.Chenobtainsabetterresult[13],showing thatifyoutaketheaverageofthegi's,andrequirethattobeboundedbya valueofk.planargraphsareinsomesenseaspecialcaseofthisresult,asthey constantk,thenthereisalineartimeisomorphismtest.however,thehidden 6

8 isomorphisminlineartime,althoughtheiralgorithmalsohasalargeconstant whichmakesitunsuitableinpractice. rstshownbyhopcroftandwong[20]thatplanargraphscouldbecheckedfor canbedrawnonaplane(orasphere)andhencehavegk>0forallk1.itwas thesegraphs,wheremisthenumberofedges,andnisthenumberofvertices. Thisresultisinterestinginthatitdoesnotrequiresomeexplicitparameterto beconstant,andseemstoapplytoalargeandpracticalgroupofgraphs. Hsu[21]hasshownthatthereisaO(mn)algorithmfortestingisomorphismof andjoiningtwoverticesiftheirarcsoverlap;asubclassofcirculararcgraphs createdbydrawinganumberofarcsonacircle,creatingavertexforeacharc, istheintervalgraphs,whereour\arcs"areconnedtotherealnumberline. circular-arcgraphs[21].circulararcgraphsarethosegraphswhichcanbe AnotherlargeclassofgraphsoverwhichGIcanbesolvedecientlyisthe phismcanbesolvedinpolynomialtime.forexample,cogisandguinaldo isomorphismproblemswhichareinp. permutationgraphs[15],chordal(6,3)graphs[4]andpartialk-trees[8]allhave techniqueforknowledgerepresentation.othergraphclassessuchastrees[2], [14]showthatisomorphismforconceptualgraphswhichhavealinearorderingfunctioncanbesolvedinpolynomialtime.Thisisparticularlyofinterest tothearticialintelligencecommunity,whereconceptualgraphsareusedasa Theseresultstakentogetherprovideaninterestingcounterpointtothediscussionofrandomgraphs.Itseemsthattheisomorphismproblemiseasyfor graphswhicharenotrelatedinanyway(randomgraphs)andforgraphswhich exploredmorefullyinsection4. 3PracticalIsomorphismAlgorithms Oneofthefactorscontributingtothelargeamountofworkonthegraphisomor- approachistotakethetwographswhicharetobecompared,andtrytodi- considered. rectlyndanisomorphismbetweenthem.thishastheadvantagethatifthere phismproblemisundoubtablythemanypracticalapplicationsofthetechnique. Therearetwobroadapproachestosolvingtheisomorphismproblem.Therst tionc(g)whichreturnsacanonicallabel;whereacanonicallabelmeansthat aremanyisomorphismsbetweentwographs,thenonlytherstoneneedbe theisomorphismproblem,butispossiblyofindependentinterest.forexample, C(G)=C(H)iGandHareisomorphic.Suchalabelingnotonlysolves organicchemiststypicallydealwith\graphs"suchastheoneiffigure3.itisa fundamentalproblemintheworldofchemicaldocumentationtogiveeachsuch structureauniquename. ThesecondapproachistotakeasinglegraphGandcomputesomefunc- Thereareseveralotherrestrictedclassesofgraphsforwhichgraphisomor- arestructurallyrelated(circulararcgraphsforexample).thisnotionwillbe 7

9 H H O werepresentgraphsbyanadjacencymatrixm,wheremij=1if(i;j)isan Figure3:Atypicalorganicchemistrygraph C C H C C C C C C H inpractice. edge,and0otherwise.wecanconstructalabelforgbyconcatenatingthe isisomorphism-complete,sothismethodhastobeslightlymodiedtobeused labelforgbylookingatthelabel(asdenedabove)ofeveryautomorphismof G,andreturningthesmallestone.OfcoursendingeveryautomorphismofG rowsofmtoformannbinarynumber.wecanthencomputeacanonical Itisnothardtodescribeanaivecanonicallabelingsystem.Supposethat C C O vertexinvariantswhichareanimportantpracticaltoolinsolvingisomorphism traditionalandspecialcaseapproachestographisomorphism.wethenlookat Therestofthissectionisorganizedasfollows.Werstbrieylookatnon- H H 3.1Non-traditionalApproachestoGI Therehasbeensomeworkonnon-traditionalapproachestothegraphisomorphism.McGregor[26]discussesusingarcandpathconsistencyalgorithmson problems,andnallywelookatalgorithmsforsolvingthegraphisomorphism problemusingeachofthetwoapproachesoutlinedabove. isomorphismproblemcouldverypossiblybeinp.theresultsofthepaper previous(relativelysimple)backtrackingalgorithms. seemtottheintuitivenotions,whereonlyaslightincreasewasobservedover astheconstraintsatisfactionproblemisknowntobenp-hard,andthegraph tunedconstraintalgorithms.thisapproachdoesnotseemintuitivelyinviting, phismproblemintoaconstraintsatisfactionproblem,andthenusesspecially theisomorphismproblem.thealgorithminthepaperconvertsagraphisomor- Agusa,Fujita,Yamashita,andAe[1]presentaHopeldnetworkforsolving 8

10 ting.thereasonforthisisthefactthatthemodelrestrictsthemaximum numberofverticesallowedinagraphto12.clearlythispaperprovesthat howeverthisapproachcertainlycannotbeusedunmodiedinapracticalset- neuralnetworksolutionstotheisomorphismproblems(forsmallgraphs)do exist,althoughitseemstodolittletoadvancethetheoryorpracticeofgraph result.inpractice,wemaybewillingtolivewithasmalldegreeofuncertainty, isomorphismproblems.itisuncleartowhatproblemdomainthistypeofsolutionissuited.theoretically,thisapproachcannotproveapolynomialworst case,sinceitisnotpossibletoguaranteethatitwillalwaysreturnthecorrect isomorphism. bydemarchi,masera,andpiccinin[17],whoimplementedplanarisomorphism bygivingafast,parallelplanarisomorphismalgorithm[22].giventhereal timeconstraintsofimageprocessing,thisalgorithmwastakenonestepfurther AswediscussedinSection2,HopcroftandWongshowedplanarisomorphism checkingcanbesolvedinlineartime[20].jajaandkosarajuextendthisresult planargraphswhichrepresenttheinterrelationshipsbetweenobjectsinascene. checkinginavlsiprocessorarray.whiletheseresultshavelittlebearing isomorphismchecking.thegraphswhichariseinthisapplicationdomainare Imageprocessingrankswithchemistryasalargeapplicationdomainfor ontheisomorphismproblemasawhole,theydoshowthatsomepractical implementationshavebecomeveryecient. 3.2VertexInvariants someisomorphism,thencertainlytheymusthavethesamedegree.notethat Oneverypracticaltechnique,whichisindependentofthealgorithmusedto notnecessarilyanisomorphismwhichmapsthetwoverticesontooneanother. avertexinvariantisthedegreeofavertex:ifvandv0maptoeachotherunder theconversedoesnothold,iftwoverticeshavethesamedegree,thenthereis Infact,ifthereisapolynomiallycomputablevertexinvariantforwhichthe someisomorphismthatmapsvontov0theni(v)=i(v0).thetypicalexampleof actuallysolvetheisomorphismproblem,istheuseofvertexinvariants.a problem. vertexinvariantissomenumberi(v)assignedtoavertexsuchthatifthereis conversedoeshold,thenthereisapolynomialtimesolutiontotheisomorphism adjacencytriangles Belowwelistsomeinvariantswhicharepresentinanisomorphismprogram twopaths callednauty[27]. Therearemanyvertexinvariantswhichhavebeenproposedintheliterature. 2assignanumbertovbasedonthesizeofthecommonneighbourhoodof assignanumbertovbasedontheverticesreachablealongapathoflength 9

11 k-cliques independentk-sets thoseneighboursofvwhoareadjacent distances assignanumbertovbasedonthenumberofdierentcliquesofsizek ofsizekthatcontainv assignanumbertovbasedonthenumberofdierentindependentssets space.morepractically,vertexinvariantsaretypicallyusedbycombiningthe showthatusingvertexinvariantsmaynotresultinanydecreaseofthesearch resultsofmanyinvariants.forexample,ifavertexhasdegree3,isin2cliquesof size4,andcanreach9verticesonpathsoflength2,thenacompositeinvariant mightbe329.infact,thisabilitytocomposeinvariantshasledtothecase Theuseofinvariantsissomethingofablackart.CorneilandKirkpatrick[16] assignanumbertovbasedonthenumberofverticesateachdistance wherepracticalalgorithmsalwaysusedegreeasthe\base"invariant,andother 1;:::;nfromv thebestforaparticulargraph.instead,whatistypicallydoneistoleavethe decisionofifandwhentouseavertexinvariantuptotheuser(exceptfordegree variantsgetappendedtothebase.theseotherinvariants,whiletheycanbe invariants[27],anditisverydiculttodeterminewhich(ifany)invariantis whichisalwaysused).thisassumesthatiftheuserhappenstocomeacross computedinpolynomialtime2,canbequiteexpensivetocalculate,compared degreeinvariantissucientformostgraphsencounteredinpractice,andthe anumberofveryhardgraphs,hewouldthentakethetimetoexperimentally determinewhatinvarianttouse.anotherwayofjustifyingthis,isthatthe canbedirectlysolvedinlesstimethanittakestocalculatethemorepowerful tothetotalexecutiontime.itturnsoutthatmanyisomorphismproblems Perhapsthemostnaturalwaytotryandsolvethegraphisomorphismproblem istotryanddirectlydiscoveramappingbetweentheverticesoftwographsg1 3.3SolvingtheIsomorphismProblemDirectly useronlyhastointerveneifthegraphhasaveryregularstructure. areclearlynotofpracticaluse [30].WestartbydeningG1(k)asthesubgraphofG1inducedonthevertices andg2.thealgorithmpresentedinthissectionisanadaptationoftheonein 1;:::;k.ThebasicideaistobuildanisomorphismfromG1(k)toasubgraph anunusedvertexofg2. ofg2,andattempttoextendthistoanisomorphismong1(k+1)byadding 2Actuallyinvariantshavebeenproposedwhichdonotruninpolynomiallytime,butthey 10

12 Themainroutineofthealgorithmlookssomethinglike: ProcedureMain: Output:arrayfsuchthati!fiisanisomorphismbetweenG1andG2, Input:graphsG1andG2 fori ornoneifnosuchfexists inv1i 1;:::;ndo elsereturnnone ifisomorph(emptyset,1,f)then reordertheverticesofg1(andreorderinv1aswell) endfor ifinv1sortedinascendingorder6=inv2sortedinascendingorder returnf inv2i somevertexinvariantonthei-thvertexofg1 somevertexinvariantonthei-thvertexofg2 optimizationistoreordertheverticesofg1,withthehopethattherewillnotbe methodsmaybeused,forexampletheverticesing1maybesimplysorted used.thecalculationofinv1andinv2allowsustorejectmanynon-isomorphic manyverticesing2thatcanmaptotherstfewverticesg1.severalordering graphs,providingourchosenvertexinvariantispowerfulenough.thesecond basedonthenumberofverticeswhichshareacommoninvariantvalue(the ischosenandadepth-rstsearchrootedatthatvertexisusedtore-orderthe invariantmultiplicity),orperhapsavertexwithminimuminvariantmultiplicity Wecanseethatthisisoneoftheplacesinthealgorithmwhereheuristicsare vertices.thesimplesortensuresusthatasweenlargetheisomorphismthere ofg2inducedbyscanbeextendedtoacompleteisomorphismong1andg2. depthrstsearchapproachisattractiveinthatadjacentverticesareplacednear input.itreturnstrueiftheisomorphismbetweeng1(k?1)andthesubgraph isaminimumnumberofcandidatestoextendthesolutionateachstep.the oneanother,andthuswewouldhopethatifwemakinganincorrectmapping decision,wewouldquicklygetacontradiction. TheISOMORPHproceduretakesasetS,andnumberk,andanarrayfas ProcedureISOMORPH: Input:setS,integerk,andanarrayf Output:TRUEiffcanbeextendedtotheentireinputgraphs ifk=n+1thenreturntrue foreachj2(v2=s) ifisomorph(k+1;s[fjg)then if(inv1k6=inv2j)_:canmatch(k;j;f) gotonextloopiteration j 11

13 therealreadyexistsanisomorphismbetweentherstkverticesofg1and theunmappedverticesing2andtriestomapthemtothenextvertexing1.it theverticesins.ifithasalreadymappedallpossibleverticesitimmediately returnstrue,andanisomorphismfhasbeenfound.otherwise,itlooksatall Itisnottoohardtoseewhatthisroutineisdoing.Whenitiscalled, endfor returnfalse returntrue usesthevertexinvariantheuristicsothatitwillnevertryamappingwherethe invariants,inwhichcasewecouldusethepartialmappingftohelpuscreate shownasacachedvalueonthisexample,itispossibletodynamicallycalculate invariantisdierent.thisisthemeansbywhichmuchofthesearchtreecanbe amorediscriminatinginvariant. pruned,providedwehaveagoodinvariant.notethatalthoughthisinvariantis Inthissectionwepresentacanonicallabelingalgorithm,whichisactuallyahigh secondone. 3.4DeterminingaCanonicalLabeling andcheckingthe(i;k)isanedgeoftherstgraphi(fi;j)isanedgeinthe simplyscanningtheisomorphismalreadydiscovered(whichiscontainedinf) thegivenmappingwouldnotconictwithpreviousmappings.thisworksby TheonlyfunctionlefttodescribeisCANMATCH,whichreturnstrueif leveldescriptionofthealgorithmpresentedbymckaycallednauty[28,27]. Thisisaverypowerfulalgorithm,andiscurrentlythepreferredmethodfor solvingthegraphisomorphismproblem.thereasonthismethodoutperforms (ingeneral)thealgorithmintheprevioussection,isthatbyconcentratingon broughttobearontheproblem,signicantlydecreasingtherunningtime.as onegraphatatime,powerfulideasfromtherealmofgrouptheorycanbe well,thisalgorithmprovidesmoreinformationthanthepreviousalgorithm, Centraltotheoperationofnautyistheideaofanorderedpartition.Apartition listing(forexample)alloftheautomorphismsofagraph. dividestheverticesofagraphintonon-empty,disjointsubsetsofv(called readerto[28]formoredetails. Partitions reader.insteadwewillconcentrateonthemainideas,andrefertheinterested itwouldrequirealargeamountofgrouptheorybackgroundonthepartofthe Wewillnotgiveasdetailedanalgorithmasthatintheprevioussection,as theirroleasleavesofthesearchtree cells):v1;v2;:::;vm.apartitionwithonlysingletonsets,willbecalleda leafpartition3.akeypointisthatwhenwendaleafpartition,itdenesa 3Innautythesearereferredtoasdiscretepartitions,howeverthetermleafpartitionhilights 12

14 relabelingofthegraphwherethevertexincellvigetsrelabeledtoi. b a c a b c c a b a c a c b c a b aregivenfortheverticesinthegraph,andassociatedwitheachpartitionis b a theadjacentmatrixwheretheorderoftheverticesintherowsandcolumns c b correspondstotheorderoftheverticesinthepartitions.automorphismsare recognizedbyndingtwodistinctleafpartitionswhich(afterrelabeling)give andthusdeneanautomorphism. risetothesamegraph.intheexamplejcjajbjandjajcjbjgivethesamematrices Forexample,considerthegraphinFigure4.Threedierentleafpartitions Figure4:Discoveringanautomorphismbycomparingleafpartitions a c b discovered automorphism c -> a, a -> c, b -> b a a c b invariantscanbeused.theinvariantiscomputedforeachvertexovertheentire partitionandgeneratingthechildrenofapartition.renementiswherevertex c graphtocreateaninitialpartition,andthentheinvariantrestrictedtothecells Therearetwomajoroperationsthatnautyperformsonpartitions,reninga b returnsthenumberofneighboursofvthatareinthesets.wecouldthen ofthepartitiontotrytofurtherdistinguishthem.forexampleassumed(v;s) denearenementoperationas: 1) 2)selectaVi2suchthatVihasmorethanoneelement 3)foreachv2Vi,computeasequenceav=(d(v;V1);:::;d(v;Vm)) theinitialpartitionv1;:::;vmwhereforallverticesx;y2vi wehaved(x;v)=d(y;v) 13

15 Inactuality,wedonotjustselectasingleVibutstartingatV1weloopthrough allthevi(includingonescreatedafterasplit)untilwecannotsplitanymore partitionwhichisv1;:::;vi?1;fvg;vi=fvg;vi+1;:::;vm.thatistosay,we hasmorethanonemember,andthenforeachvertexv2viwecreateachild cellsẇegeneratethechildrenofapartitionbychoosingtherstcellviwhich 4)splitViintoanumberofsubsets,sotheverticesineachsubsethave createanewchildforvertexvbysplittingthecellviintotwocells,onewhich thesamevalueforav eachpartitionbeforeexpandingitschildren. rstsearchofthespaceofpartitions,withtheaddedoptimizationthatwerene operations,whichwewilltalkaboutinthenextsection.itisbasicallyadepth BasicAlgorithm Hereisthebasicalgorithmusedbynauty.Wehaveomittedsomeofthepruning containsonlyvandonewhichisviwithoutv. Output:acanonicalgraphC Input:agraphG while(sisnotempty) S thepartitioncontainingasinglecellv stackcontaining endwhile returnc if(xisaleafpartition) elserene(x) endifappendthechildrenofxtos x popthetopofthestacks update(c;x) CanonicalLabeling Conceptually,nautyexamineseveryautomorphismofagraphandcomputes willhashtodierentvalues. acanonicallabel.thislabelissimplytheadjacencymatrixofthe\smallest" automorphism.theschemeusedtodenethesmallestautomorphismanextensionoftheschemewediscussedpreviously,wheregraphsareorderedbasedon thebinarynumberthatiscreatingbyconcatenatingtherowsoftheadjacency input,andcomputesahashfunctioninthehopethatdierentautomorphism matrix.themainadditionisanindicatorfunction,whichtakesapartitionas 14

16 xbystartingattherootofthesearchtreeandtransversingdowntox,at eachpointtheresultoftheindicatorfunctionisusedtodeneamemberof thesequence.thusaleafpartitionisdenedassmallerthanif<4, andtheequivalentbinarynumberofeachautomorphismisusedtobreakties. McKayprovesthatacanonicallabelingdenedinthisfashionisthesamefor anytwoisomorphicgraphs[28]. posewehavesomepartitionxwhichisthesmallestpartitiondiscoveredsofar. Thusifwereachaleafpartitionxinoursearchtree,wedeneasequence Thenwecancomparesomenodevtox,andifvisbiggerwecanprunev. Bydeningtheindicatorfunctionoverallancestorsofx,wemaybeableto prunenodeswhicharenotleafnodes,sincetheymaybebiggerthantheancestorsofx.notethatifwesimplyorderautomorphismsbasedontheirbinary representation,thenwecanonlyprunenodeswhichareleafpartitions. Itiseasytoseehowthisinformationcouldbeusedtoprunethetree.Sup- iftwodierentleafpartitionresultinthesameadjacencymatrixafterrelabeling thevertices.nautystorestwographs,whichitusestocheckforautomorphisms. Thereisonlyonelastmaintechniqueemployedbynauty,therecognitionand UsingAutomorphisms Onegraphcorrespondstothe\smallest"graphfoundsofar,asdenedabove, useofautomorphisms.asmentionedearlier,nautyrecognizesanautomorphism graphiscomparedtothestoredcopies,andiftheyhaveexactlythesame andwilleventuallybecomethecanonicallabel;theothergraphcorrespondsto therstleafnodediscovered.whenanewleafnodeisreached,itsrelabeled adjacencymatrix,thenanautomorphismhasbeenfound.atthesametime, ifnautydiscoversthenewgraphissmallerthansmallestsofar,thenthenew graphbecomesthenewcanonicalgraph.notethatthiswillnotdiscoverall isatradeo morestoredgraphsmeansmorematches,butitalsomeansthe timetocheckeachgraphisincreased.inadditiontotheseautomorphisms,an automorphismcansometimebeinferredbythestructureofapartition;however automorphisms,sinceweareonlystoringtwographstocompareagainst.there thistechniqueislessimportantandwedonotdiscussitfurther. searchspace.oneusefulresultisthatifthereisanautomorphismbetweenaleaf partitionandsomestoredpartition,thennautycanjumpallthewayback another.thusisanapproximationoftheautomorphismpartition,andgets updatedwheneveranewautomorphismisfound.thesignicanceofcomes inifnautyhasdiscoveredsomeautomorphismwhichmapsthetwoontoone totherstcommonancestorofandandcontinuefromthere.additionally, nautymaintainsaspecialpartition,wheretwoverticesareinthesamecell intoplaywhenwegeneratethechildrenofsomepartition.recallthatthis Oncenautyhasfoundanautomorphism,itputsittoworktotrytoprunethe wordsareordered 4Thetwosequencesarecomparedinlexographicorder,i.e.inthesamemannerasEnglish 15

17 isdonebychoosingacellw2,andgeneratinganewchildforeveryelement ofw.given,wenowonlycreateachildforeachelementofwwhichisina uniquecellof.thusaswendmoreandmoreautomorphisms,lessandless childrengetexpandedfromeachnode.theproofthatthesepruningsarevalid dependsonsomefurtherideasaboutpartitionsandgrouptheory,whichwewill morphism.afundamentalweaknessoftheseapproachesisthefactthatonce grouptheoryideastohelpprunethesearchspace.insomesense,thesemantics theproblemistransformedintothatparadigm,itisnolongerpossibletouse 3.5Discussion Practicalexperienceseemstoindicatethatothergeneralparadigms,suchas constraintsatisfactionandneuralnetworks,arenotveryusefulforgraphiso- notdevelophere.theinterestedreadercansee[28]. ofthedataisbeinglostinthetranslation. itisnotdiculttospeculatewhynautydoesbetter.bothprogramsmakeuse directapproachtoisomorphism.thedierencesherearenotasconclusive,but ofvertexinvariants,nautyusestheminitsrenementprocess,andthedirectalgorithmusesthemwhendecidingwhethertoextendanisomorphism.themain dierencebetweenthetwotechniquesseemstobetheiruseofpartialresults. towork,pruningawaysectionsofthesearchtree.thuswhennautyexplores Whenevernautyndsanautomorphism,itimmediatelyputstheautomorphism aportionofthesearchtree,italwaysattemptstousetheseresults.contrast Anotherinterestingnoteisthesuccessofaprogramlikenauty,overamore thiswiththedirectscheme.supposewehaveextendedtheisomorphismtoall inthe\almostisomorphism"toprunesubsequentattempts,andthusweare isanumberoflevelsback.thereisnoattempttousetheinformationgained essentiallydiscardingtheknowledgewelearnedinthatportionofthesearch. butonevertex,andthenrealizethatwehavetobacktracktoapointwhich 4HardGraphs inrealtime.thelistofpropertiesthatour\hard"graphscannothavegoeson wonderifthishasanypracticalsignicance.putanotherway,wemaywishto knowifthereareanyreally\hard"graphs,andifthereare,getsomehandleon whatmakesthemdicult. WhilethegraphisomorphismproblemisnotknowntobeinP,onemight andon,andevenifourgraphdoesnothaveoneofthoseproperties,practical weconneourselvestorandomgraphs,thentheisomorphismproblemisalmost alwaysveryeasy.ifweinsteadfocusonplanargraphs,thereexistsaparallel hardwareimplementationthatwillndtheisomorphismsofverylargegraphs Thesearchforhardgraphsisnotatrivialone.Aswehavealreadyseen,if 16

18 rithmforaspecialsubclassofgraphs,itisoftennon-trivialtodetermineifan inputgraphbelongstosuchasubclass.finally,thearrayofheuristicsavailable forthealgorithmtodecideifandwhentoapplyeachone. topracticalalgorithmsisindeedlarge,butthatalsoservestomakeitnon-trivial thatmakethemprohibitiveforactualuse.further,evenifthereisafastalgo- theisomorphismproblem. rithmsthatsolveacertainclassofgraphsinpolynomialtimehaveconstants algorithmshaveadazzlingarrayofheuristicsthatcanbeusedtoquicklysolve section,andattempttondgraphswhicharediculttoprocess.ourapproach Inthissectionwelookatthenautyprogramintroducedintheprevious Practicalalgorithmsdonotgetothateasilyhowever.Manyofthealgo- asameanstopruneoutobviousnon-isomorphisms(ornon-automorphismsin isnottodirectlyconstructthesehardgraphs,butinsteadtotransformtypes nauty'scase).thustherstdecisionwecanmakeistorestrictourselvesto wheretolookforhardgraphs.aswenoted,allpracticalalgorithmsusedegree Ourpreviousdiscussionoftheisomorphismalgorithmsgivesussomehintsasto thepowerandlimitationsofpracticalgraphisomorphism. 4.1FindingHardGraphs of\easy"graphsintohardones.indoingsowegainabetterunderstandingof wishtoincreasethisnotionofregularity,byrequiringthatrangeinsizesofthe commonneighbourhoodofanytwoverticesbeverysmall. regulargraphs.agraphisregularifeveryvertexhasthesamedegree.wemay thereisnoknownalgorithmtouniformlygeneraterandomgraphswiththe withourdesiredregularityproperties. aboveproperties.instead,wehavetotrytond\naturallyoccurring"graphs lentgraphs.thesegraphsaregeneratedbycreatingmany(conceptually,in- nitelymany)ringsofregularp-gons,anddeningafunctionwhichmapsthese polygonsontooneanother{forexample,startatanyvertexandmapthethree polygonswhichshareittothethreepolygonsthatsharethevertexthatis14 Onesuchsourceofregulargraphsisthep-regularmapembeddingsoftriva- Unfortunately,oncewemakethesedecisionswereachapracticaldiculty; verticestotheright.afterperformingthismapping,eithertheringsofpolygonsremaininnite(oratleastbeyondthesizethatcanbehandledbythe computer'smemory),orallpolygonsaremappedtothesinglepolygonatthe center,orthereissomenitemapofpolygonswhichisproduced.theinterested nautycanassignthemacanonicallabel.itturnsoutthesegraphsareinsome sensetooregular,thenumberofautomorphismsisverylarge,whichcanbe readerisreferredto[12]formoredetailsonthisclassofgraphs.thelatercase exploitedtoprunethesearchspace.thekeyideainmakingthesegraphshard Oncewehavethesegraphsinhand,wecantesthoweasilyprogramslike isofparticularinteresttous,sinceitgeneratesahighlysymmetricp-regular graph. 17

19 theirendpoints.theedgesarechosenatrandom,butareconstrainedsothat istodecreasetheamountofself-similaritybychoosingtwoedgesandswapping whentheyareswapped,thedegreeofeachvertexdoesnotchange.asthe experimentalresultsinthenextsectionshow,doingonlyoneoftheseswapscan 4.2ExperimentalResults Fourgraphswerechosentoexaminetheeectofrandomswapsonthediculty maketheproblemseveralhundredtimesharderfornauty. ofthegraphthatresults.thegraphsareentitledv190,v348,v486,and v864,wherethenumberineachcaserepresentsthenumberofvertices.all programwrittenbyjoeculberson[12]basedontheconstructionmentionedin graphswereregulargraphswithdegree8,andwerecreatedusingagenerator theprevioussection. time vs number of swaps 3 v measurement,excepttomentionthattheywereverylowinallbutonecase, 1 whichwewilldiscussshortly. timeofnautyoverthosegraphs.wedonotexplicitlylistthevariancesforeach 10graphswiththerequirednumberofswaps,andthenaveragingtherunning 12,16,and32randomswaps.Eachmeasurementwasobtainedbycreating Figures5through8showauniformpictureoftheeectofrandomswaps. Foreachgraphwemademeasurementsfor0,1,2,3,4,5,6,7,8,10, Figure5:Resultsforv time in seconds

20 time vs number of swaps 30 v Ineachcasenautywasveryfastiftherewasnorandomswaps,andthenmuch slowerwhenrandomswapswereintroduced.further,asmoreswapswereintroduced,nautybegantodecreaseitsrunningtime mayexplainthelargeincreaseintimebetween0and1swaps,isthenumberof automorphismsintheresultinggraph.whentherewerenoswaps,thenumbers Figure6:Resultsforv348 ofautomorphismsofv190,v348,v486,andv864were3420,6144,7776,and respectively.Basedonourpreviousanalysisofthenautyalgorithm,it isnothardtoimaginethattheselargegroupsizeshelpnautytoaggressively 0 prunethesearchspace.afterdoing1ormorerandomswaps,thenumberof Thereareafewplausibleexplanationsforthisbehaviour.Onefactorwhich automorphismswasalmostalways1;outof520graphsthatcontainedrandom number random swaps automorphismgroupofsize2,andthesewereabletocompleteinapproximate oftheonemeasurementwithlargevariance:itcontainedtwographswithan swaps,only5hadanautomorphismgroupofsize2.infactthisisthecause 2/3theamountoftimeastheotherruns.Clearlyinthegraphswithrandom swaps,nautycannotuseautomorphismstohelpprunethesearchtree. increased,asallofthesegraphshadtheapproximatelythesamenumberof eectively.witheachrandomswapweessentially\break"thestructureofthe thegraphswithmanyswapsbecauseitisusingitsrenementproceduremore automorphisms(1or2).intuitivelywecanarguethatnautyisspeedingupon Thisdoesnotexplainthefactthetimedecreasedasthenumberofswaps 19 time in seconds

21 time in seconds time vs number of swaps v486 Figure7:Resultsforv number of random swaps time in seconds time vs number of swaps 600 v Figure8:Resultsforv number of random swaps

22 manyconclusionscanbemadeabouttheseresults,excepttosaythatmore graph,andthuswithmanyswapsthenumberofbreaksincrease,andhence asitrelatedtographsize.foreachgraphweplottheblowupratior=(time withoneswap)/(timewithnoswaps).forthistestweincludedanumberof byinterlockinglatinsquaresofsize10.theresultsareshownintable1.not workisnecessarytodiscoverhowtopredicttheseratios. test.aswellweincludeagraphv900whichisa900vertexgraphgenerated graphsofvarioussize,generatedinasimilarfashionasthoseintheprevious nautyismorelikelytondandexploitoneofthose\breaks". Onenaltestweperformedwastotryandmeasuretheamountofincrease, ndegreenoswaps(sec)oneswap(sec)blowupratio Table1:Theeectofgraphparametersettingsontheblowupratio Conclusion ThetheoryofNP-completenesshasallowedresearcherstoconcludethatmany timesolution,ortobecontentwithalgorithmsthatmayhaveverybadworstcasebehaviour.asthelargeamountofresearchonthecomplexityofgraph seemtoguidetheresearcher.oneisunsureofwhethertosearchforapolynomial problemsareeitherpolynomiallysolvable,orareprobablyintractable.graph isomorphismshows,researchersaretryingtoremedythatproblem,believing isomorphismisoneofthefewproblemsforwhichnp-completenessdoesnot tobecompletelydetermined.insteadalargebodyofworkhasconcentrated generalproblemveryfastonaverage.whenthegraphsbeingaveragedover tionsthatthecomputingcommunityisnotcontenttowaitforitscomplexity onsolvingrestrictedversionsofgraphisomorphismveryquickly,orsolvingthe largerrealmofcomplexityanalysis. thatadeeperunderstandingofgraphisomorphismwillyieldinsightsintothe However,thegraphisomorphismproblemhassomanyinterestingapplica- 21

23 Howeverpracticalalgorithmsareveryfastwhenaveragedoverthenebulous aregeneratedinacompletelyrandomfashion,itistrivialtobefastonaverage. plausiblethattheymightariseinanapplicationwhereveryregulargraphsare generated,whichmighthaveasmallamountofnoise.onepointtonoteisthat rithmsndhard.grantedthatthesegraphswererathercontrived,butitseems thesearchspace. notionofrealworldgraphs,byusingpowerfulgrouptheorytoolstohelpprune evenfor\hard"instances,1000vertexgraphsweresolvedinlessthan10minutes.thisisquiteacontrastwithproblemslikegraphcoloring,were10minutes ona1000nodeproblemwouldnotbeconsideredalongtime,andmaybea furtherindicationofthe\almostpolynomial"natureofthegraphisomorphism problem. Asweshowed,itisnottoodiculttocreategraphswhichcurrentalgo- References [1]K.Agusa,S.Fujita,M.Yamashita,andT.AE.Onneuralnetworksfor graphisomorphismproblem.inthernns/ieeeconferenceonneuroinformaticsandneurocomputers,pages1142{1148,rostov-on-don,russia, [4]L.Babel.Isomorphismofchordal(6,3)graphs.Computing,54:303{306, [3]L.Babai.Moderatelyexponentialboundforgraphisomorphism.Proceed- [2]A.Aho,J.Hopcroft,andJ.Ullman.TheDesignandAnalysisofComputer ingscience117,pages34{50,1981. ingsofthefundamentalsofcomputingscience,lecturenotesincomput- Algorithms.Addison-Wesley,Reading,1974. October1992. [6]L.BabiaandL.Kucera.Canonicallabelingofgraphsinlinearaveragetime. [7]D.Basin.Atermequalityproblemequivalenttographisomorphism.InformationProcessingLetters,51:61{66,1994. [5]L.Babia,P.Erdos,andS.Selkows.Randomgraphisomorphism.SIAM InProceedingsofthe20thIEEESymposiumonFoundationsofComputing Science,pages39{46,1979. JournalofComputing,9(3):628{635,August [9]K.Booth.Problemspolynomiallyequivbalenttographisomorphism.TechnicalReportCS-77-04,UniverisityofWaterloo,1979maticindexonpartialk-trees.JournalofAlgorithms,11:631{643,1990. [8]H.Bodlaender.Polynomialalgorithmsforgraphisomorphismandchro- 22

24 [11]R.Boppana,J.Hastad,andS.Zachos.Doesco-nphaveshortinteractive [10]K.BoothandG.Lueker.Linearalgorithmstorecognizeintervalgraphs andtestforconsectuativeonesproperty.inproceedingsofthe7thannual ACMSymposiumontheTheoryofComputing,pages255{265,May1975. [14]O.CogisandO.Guinaldo.Alineardescriptorforconceptualgraphsand [12]I.Bouwer.TheFosterCensus:R.M.Foster'sCensusofTrivalentGraphs. [13]J.Chen.Alineartimealgorithmforisomorphismofgraphswithbounded proofs?informationprocessingletters,25:27{32,1987. nationalconferenceonconceptualstructures,pages263{277,santacruz, aclassforpolynomialisomorphismtest.inproceedingsofthe3rdinter- TheoreticConceptsinComputerScience,pages103{113,1992. averagegenus.proceedingsofthe18thinternationworkshopongraph- BabbageReaserchCompany,Winnipeg,1988. [16]D.CorneilandD.Kirkpatrick.Atheoreticalanalysisofvariousheuristics [15]G.Colbourn.Ontestingisomorphismofpermutationgraphs.Networks, 11:13{21,1981. USA,August1995. [18]I.FillottiandJ.Mayer.Apolynomial-timealgorithmfordeterminingthe [17]D.Damarchi,G.Masera,andG.Piccinini.AVLSIprocessorarrayfor isomorphismofgraphsofxedgenus.inproceddingsofthe12thacm ,May1980. graphisomorphism.internationaljournalofelectronics,76(4):655{679, forthegraphisomorphismproblem.siamjournalofcomputing,9(2):281{ [21]W.Hsu.O(MN)algorithmsfortherecognitionandisomorphismprobelm [20]J.HopcroftandJ.Wonk.Alineartimealgorithmforisomorphismofplanar [19]S.Goldwasser,S.micali,andC.Racko.Theknowledgecomplexityof Computing,pages172{184,1974. graphs.proceeedingsofthe6thannualacmsymposiumonthetheoryof interactiveproofsystems.siamjournaloncomputing,18:186{208,1989. SymposiumonTheoryofComputing,pages235{243,1980. [22]J.JaJaandS.Kosaraju.Parallelalgorithmsforplanargraphisomorphism oncircular-arcgraphs.siamjournalofcomputing,24(3):411{439,june andrealtedproblems.ieeetransactionsoncircuitsandsystems,35:304{ 311,

25 [26]J.McGregor.Relationalconsistencyalgorithmsandtheirapplicationin [25]R.Mathon.Anoteonthegraphisomorphismcountingproblem.InformationProcessingLetters,8:131{132,1979. ndingsubgraphandgraphisomorphism.informationsciences,19:229{ ItsStructuralComplexity.Birkhauser,Boston,1993. [24]E.Luks.Isomorphismofgraphsofboundedvalencecanbetestesinpolynomialtime.JournalofComputerandSystemSciences,25:42{65,1982. [23]J.Kobler,U.Schoning,andJ.Toran.TheGraphIsomorphismProblem: [28]B.McKay.Practicalgraphisomorphism.CongressusNumerantium,30:45{ [27]B.McKay.NautyUser'sGuide(version1.5).ComputerScienceDepartment,AustrialianNationalUniversity. 250,1979. [31]U.Schoning.Graphisomorphismisinthelowhierarchy.JournalofComputerandSystemSciences,37:312{323,1988. andpractice.prentice-hall,newjersey, ,1981. Theory,1:339{363,1977. [29]R.ReadandD.Corneil.Thegraphisomorphismdisease.JournalofGraph [30]E.Reingold,J.Nievergelt,andN.Deo.CombinatorialAlgorithms:Theory 24

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Tetris is Hard: An Introduction to P vs NP

Tetris is Hard: An Introduction to P vs NP Tetris is Hard: An Introduction to P vs NP Based on Tetris is Hard, Even to Approximate in COCOON 2003 by Erik D. Demaine (MIT) Susan Hohenberger (JHU) David Liben-Nowell (Carleton) What s Your Problem?

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

CoNP and Function Problems

CoNP and Function Problems CoNP and Function Problems conp By definition, conp is the class of problems whose complement is in NP. NP is the class of problems that have succinct certificates. conp is therefore the class of problems

More information

Lecture 2: Complexity Theory Review and Interactive Proofs

Lecture 2: Complexity Theory Review and Interactive Proofs 600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course

Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-

More information

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro

Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,

More information

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: [email protected] office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html

More information

P versus NP, and More

P versus NP, and More 1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify

More information

Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook

Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook Overview: The Public Administration industry 1 in Alberta includes federal, provincial and local government services such as: defence services; police, judicial, correctional and other protective services;

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

Network Algorithms for Homeland Security

Network Algorithms for Homeland Security Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially

More information

! X is a set of strings. ! Instance: string s. ! Algorithm A solves problem X: A(s) = yes iff s! X.

! X is a set of strings. ! Instance: string s. ! Algorithm A solves problem X: A(s) = yes iff s! X. Decision Problems 8.2 Definition of NP Decision problem. X is a set of strings. Instance: string s. Algorithm A solves problem X: A(s) = yes iff s X. Polynomial time. Algorithm A runs in polytime if for

More information

Performance Analysis of a Telephone System with both Patient and Impatient Customers

Performance Analysis of a Telephone System with both Patient and Impatient Customers Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9

More information

CAD Algorithms. P and NP

CAD Algorithms. P and NP CAD Algorithms The Classes P and NP Mohammad Tehranipoor ECE Department 6 September 2010 1 P and NP P and NP are two families of problems. P is a class which contains all of the problems we solve using

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

Motion. Complete Table 1. Record all data to three decimal places (e.g., 4.000 or 6.325 or 0.000). Do not include units in your answer.

Motion. Complete Table 1. Record all data to three decimal places (e.g., 4.000 or 6.325 or 0.000). Do not include units in your answer. Labs for College Physics: Mechanics Worksheet Experiment 2-1 Motion As you work through the steps in the lab procedure, record your experimental values and the results on this worksheet. Use the exact

More information

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes

More information

Page 1/.. USA / Canada - South Africa Schedule No. 4 / 2011-Jan-24

Page 1/.. USA / Canada - South Africa Schedule No. 4 / 2011-Jan-24 USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 1/.. USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 2/.. USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 3/.. USA / Canada

More information

A Performance Comparison of Five Algorithms for Graph Isomorphism

A Performance Comparison of Five Algorithms for Graph Isomorphism A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,

More information

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Theory vs. Practice In theory, there is no difference between theory and practice.

More information

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with

More information

Introduced by Stuart Kauffman (ca. 1986) as a tunable family of fitness landscapes.

Introduced by Stuart Kauffman (ca. 1986) as a tunable family of fitness landscapes. 68 Part II. Combinatorial Models can require a number of spin flips that is exponential in N (A. Haken et al. ca. 1989), and that one can in fact embed arbitrary computations in the dynamics (Orponen 1995).

More information

On Network Tools for Network Motif Finding: A Survey Study

On Network Tools for Network Motif Finding: A Survey Study On Network Tools for Network Motif Finding: A Survey Study Elisabeth A. Wong 1,2, Brittany Baur 1,3 1 2010 NSF Bio-Grid REU Research Fellows at Univ of Connecticut 2 Bowdoin College 3 Manhattanville College

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

Quantum Monte Carlo and the negative sign problem

Quantum Monte Carlo and the negative sign problem Quantum Monte Carlo and the negative sign problem or how to earn one million dollar Matthias Troyer, ETH Zürich Uwe-Jens Wiese, Universität Bern Complexity of many particle problems Classical 1 particle:

More information

Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov

Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov Data Integration Lectures 16 & 17 Lectures Outline Goals for Data Integration Homogeneous data integration time series data (Filkov et al. 2002) Heterogeneous data integration microarray + sequence microarray

More information

Complexity Classes P and NP

Complexity Classes P and NP Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer

More information

On Matroid Representability and Minor Problems

On Matroid Representability and Minor Problems On Matroid Representability and Minor Problems Petr Hliněný Faculty of Informatics, Masaryk University in Brno, Botanická 68a, 602 00 Brno, Czech Republic and Department of Computer Science, VŠB Technical

More information

Statistical Databases and Registers with some datamining

Statistical Databases and Registers with some datamining Unsupervised learning - Statistical Databases and Registers with some datamining a course in Survey Methodology and O cial Statistics Pages in the book: 501-528 Department of Statistics Stockholm University

More information

Model Selection. Introduction. Model Selection

Model Selection. Introduction. Model Selection Model Selection Introduction This user guide provides information about the Partek Model Selection tool. Topics covered include using a Down syndrome data set to demonstrate the usage of the Partek Model

More information

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data

A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada [email protected] Jian Pei School

More information

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer

Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities

More information

Calculator Notes for the TI-Nspire and TI-Nspire CAS

Calculator Notes for the TI-Nspire and TI-Nspire CAS CHAPTER 7 Calculator Notes for the Note 7A: Free Fall You will need a CBR2 motion sensor. Press c and choose New Document. Connect the CBR2 to the handheld. Choose Lists & Spreadsheet, and press a. a.

More information

Form B Confirmation of Registration-Reinstatement of Interest Free Status for Alberta Student Loans

Form B Confirmation of Registration-Reinstatement of Interest Free Status for Alberta Student Loans Complete this form only if you are returning to school as a or as a and are not receiving new Alberta The cannot exceed 12 calendar months. M Y but not beyond the. Section 3 - Mailing Address for EDULINX

More information

The Health Information Act. Use and Disclosure of Health Information for Research

The Health Information Act. Use and Disclosure of Health Information for Research The Health Information Act Use and Disclosure of Health Information for Research The Health Information Act (HIA) sets out rules respecting the use and disclosure of health information for research purposes

More information

Cryptography and Network Security Number Theory

Cryptography and Network Security Number Theory Cryptography and Network Security Number Theory Xiang-Yang Li Introduction to Number Theory Divisors b a if a=mb for an integer m b a and c b then c a b g and b h then b (mg+nh) for any int. m,n Prime

More information

timeout StoR!msg0 RtoS?ack0

timeout StoR!msg0 RtoS?ack0 c1997kluweracademicpublishers,boston.manufacturedinthenetherlands. FormalMethodsinSystemDesign,,?{??(1997) SymbolicVericationofCommunication ProtocolswithInniteStateSpacesusingQDDs queues.itiswell-knownthatmostinterestingvericationproblems,suchasdeadlockdetection,

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution

More information

Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook

Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook 1 Overview: The Finance, Insurance, Real Estate and Leasing industry 1 in Alberta includes establishments and professionals such as: consumer lending companies (i.e. banks, credit unions, credit card,

More information

Random Testing: The Best Coverage Technique - An Empirical Proof

Random Testing: The Best Coverage Technique - An Empirical Proof , pp. 115-122 http://dx.doi.org/10.14257/ijseia.2015.9.12.10 Random Testing: The Best Coverage Technique - An Empirical Proof K Koteswara Rao 1 and Prof GSVP Raju 2 1 Asst prof, (PhD) @JNTUK, CSE Department,

More information

How To Get A Computer Science Degree At Appalachian State

How To Get A Computer Science Degree At Appalachian State 118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University [email protected] http://www.cs.appstate.edu/

More information

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will

More information

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05 Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05 At the end of this chapter the successful student will be able to Describe the main hardware

More information

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902

Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902 Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler Different Graphs, Similar Properties

More information

Updating Action Domain Descriptions

Updating Action Domain Descriptions Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at

More information

Atlantic Provinces 71 COMMUNITIES

Atlantic Provinces 71 COMMUNITIES NATIONAL STUDY OF AUTOMOBILE INSURANCE RATES Third Release Atlantic Provinces 71 COMMUNITIES vs. British Columbia, Alberta Saskatchewan, Manitoba & Ontario 3,985,162 Auto Insurance Rates Compared October

More information

Mining Social-Network Graphs

Mining Social-Network Graphs 342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is

More information

Going Big in Data Dimensionality:

Going Big in Data Dimensionality: LUDWIG- MAXIMILIANS- UNIVERSITY MUNICH DEPARTMENT INSTITUTE FOR INFORMATICS DATABASE Going Big in Data Dimensionality: Challenges and Solutions for Mining High Dimensional Data Peer Kröger Lehrstuhl für

More information

Social Network Mining

Social Network Mining Social Network Mining Data Mining November 11, 2013 Frank Takes ([email protected]) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics

More information

Data Integration: A Theoretical Perspective

Data Integration: A Theoretical Perspective Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy [email protected] ABSTRACT

More information

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,

More information

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Why this Max-Flow Talk? The result: O(min(n 2/3, m 1/2 )mlog(n 2 /m)log(u))

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

More information

Sandy Campbell, Diane Clark, and Allison Sivak University of Alberta Libraries Edmonton, Alberta, Canada

Sandy Campbell, Diane Clark, and Allison Sivak University of Alberta Libraries Edmonton, Alberta, Canada http://conference.ifla.org/ifla77 Date submitted: May 26, 2011 An Association-Based Continuing Education Certification Program: The Library Association of Alberta Pilot Program Sandy Campbell, Diane Clark,

More information

A Partition-Based Efficient Algorithm for Large Scale. Multiple-Strings Matching

A Partition-Based Efficient Algorithm for Large Scale. Multiple-Strings Matching A Partition-Based Efficient Algorithm for Large Scale Multiple-Strings Matching Ping Liu Jianlong Tan, Yanbing Liu Software Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing,

More information

Sample Questions for Mastery #5

Sample Questions for Mastery #5 Name: Class: Date: Sample Questions for Mastery #5 Multiple Choice Identify the choice that best completes the statement or answers the question.. For which of the following binomial experiments could

More information

Destination Marketing Program Overview

Destination Marketing Program Overview Destination Marketing Program Overview 2011 Business Retention and Enhancement Tourism, Arts, Culture and Heritage Program: Enhanced Event Marketing and Media: BC Shellfish Festival; increased media outreach

More information

Proofs that Yield Nothing But Their Validity All Languages in NP Have Zero-Knowledge Proof Systems

Proofs that Yield Nothing But Their Validity All Languages in NP Have Zero-Knowledge Proof Systems Proofs that Yield Nothing But Their Validity All Languages in NP Have Zero-Knowledge Proof Systems or ODED GOLDREICH Technion, Haifa, Israel SILVIO MICALI Massachusetts Institute of Technology, Catnbridge,

More information

Outline. Introduction Linear Search. Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques

Outline. Introduction Linear Search. Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques Searching (Unit 6) Outline Introduction Linear Search Ordered linear search Unordered linear search Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques

More information

Sample Questions Csci 1112 A. Bellaachia

Sample Questions Csci 1112 A. Bellaachia Sample Questions Csci 1112 A. Bellaachia Important Series : o S( N) 1 2 N N i N(1 N) / 2 i 1 o Sum of squares: N 2 N( N 1)(2N 1) N i for large N i 1 6 o Sum of exponents: N k 1 k N i for large N and k

More information

The Assignment Problem and the Hungarian Method

The Assignment Problem and the Hungarian Method The Assignment Problem and the Hungarian Method 1 Example 1: You work as a sales manager for a toy manufacturer, and you currently have three salespeople on the road meeting buyers. Your salespeople are

More information

Pennies and Blood. Mike Bomar

Pennies and Blood. Mike Bomar Pennies and Blood Mike Bomar In partial fulfillment of the requirements for the Master of Arts in Teaching with a Specialization in the Teaching of Middle Level Mathematics in the Department of Mathematics.

More information

DESIGN AND ANALYSIS OF ALGORITHMS

DESIGN AND ANALYSIS OF ALGORITHMS CPS 3 DESIGN AND ANALYSIS OF ALGORITHMS Fall 8 Instructor: Herbert Edelsbrunner Teaching Assistant: Zhiqiang Gu CPS 3 Fall Semester of 8 Table of Contents Introduction 3 I DESIGN TECHNIQUES Divide-and-Conquer

More information

Peter Godor MN, NP ICU NP Royal Alexandra Hospital, Edmonton, AB. DYNAMICS 2010: Edmonton, AB September, 2010

Peter Godor MN, NP ICU NP Royal Alexandra Hospital, Edmonton, AB. DYNAMICS 2010: Edmonton, AB September, 2010 Peter Godor MN, NP ICU NP Royal Alexandra Hospital, Edmonton, AB DYNAMICS 2010: Edmonton, AB September, 2010 Nurse Practitioners in Alberta Protected title under the Health Professions Act (HPA) One of

More information

SOLUTIONS: 4.1 Probability Distributions and 4.2 Binomial Distributions

SOLUTIONS: 4.1 Probability Distributions and 4.2 Binomial Distributions SOLUTIONS: 4.1 Probability Distributions and 4.2 Binomial Distributions 1. The following table contains a probability distribution for a random variable X. a. Find the expected value (mean) of X. x 1 2

More information

VIC Delegate Registration. An Invitation to Alberta Visitor Information Providers (AVIPs)

VIC Delegate Registration. An Invitation to Alberta Visitor Information Providers (AVIPs) Spring Training & Showcase 2015 1 of 8 Conference Details What Spring Training & Showcase 2016 When Tuesday, May 3 to Wednesday, May 4, 2016 (Welcome Reception Monday, May 2, 2016) Where Ramada Edmonton

More information

THE P VERSUS NP PROBLEM

THE P VERSUS NP PROBLEM THE P VERSUS NP PROBLEM STEPHEN COOK 1. Statement of the Problem The P versus NP problem is to determine whether every language accepted by some nondeterministic algorithm in polynomial time is also accepted

More information

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012 276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the

More information

A Working Knowledge of Computational Complexity for an Optimizer

A Working Knowledge of Computational Complexity for an Optimizer A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational

More information

Now we begin our discussion of exploratory data analysis.

Now we begin our discussion of exploratory data analysis. Now we begin our discussion of exploratory data analysis. 1 Remember to keep in mind where we are in the big picture. For now, we will assume that the data we are given is a representative sample from

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Characteristics of Binomial Distributions

Characteristics of Binomial Distributions Lesson2 Characteristics of Binomial Distributions In the last lesson, you constructed several binomial distributions, observed their shapes, and estimated their means and standard deviations. In Investigation

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

2015 Budget Engagement. Building Awareness. Overview

2015 Budget Engagement. Building Awareness. Overview 2015 Budget Engagement Overview The City of Edmonton engaged members of the public in the fall and early winter of 2014 on the proposed 2015 Operating Budget, 2015 18 Capital Budget and 2015 Utilities

More information

Cycles and clique-minors in expanders

Cycles and clique-minors in expanders Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor

More information

A Survey of Zero-Knowledge Proofs with Applications to Cryptography

A Survey of Zero-Knowledge Proofs with Applications to Cryptography A Survey of Zero-Knowledge Proofs with Applications to Cryptography Austin Mohr Southern Illinois University at Carbondale Carbondale, IL 62901 E-mail: [email protected] Abstract Zero-knowledge proofs

More information

4 Role Classification

4 Role Classification Role Classification of Hosts within Enterprise Networks Based on Connection Patterns Godfrey Tan MIT [email protected] Massimiliano Poletto Mazu Networks [email protected] John Guttag and Frans Kaashoek

More information

Identifying Audience Preferences in Legal and Social Domains

Identifying Audience Preferences in Legal and Social Domains Identifying Audience Preferences in Legal and Social Domains Paul E. Dunne and Trevor Bench-Capon Dept. of Computer Science University of Liverpool Liverpool L69 7ZF, United Kingdom ped,tbc @csc.liv.ac.uk

More information

Out-of-Scope Health Care Spending Account (HCSA)

Out-of-Scope Health Care Spending Account (HCSA) Out-of-Scope Health Care Spending Account (HCSA) The Supplementary Health Care and Dental Plans provided through your employment with the City of Edmonton offers you and your family considerable protection

More information

Reducing Natural Hazard Risks in New Residential Developments

Reducing Natural Hazard Risks in New Residential Developments Reducing Natural Hazard Risks in New Residential Developments Dan Sandink, MA, MScPl Manager, Resilient Communities & Research Institute for Catastrophic Loss Reduction CHBA Urban Council Ottawa Oct. 24,

More information