University of Alberta
|
|
|
- Aileen Liliana Fletcher
- 10 years ago
- Views:
Transcription
1 TheGraphIsomorphismProblem University of Alberta ScottFortin by TechnicalReportTR96{20 July1996 DEPARTMENT OF COMPUTING SCIENCE The University of Alberta Edmonton, Alberta, Canada
2 theory,canbebroughttobearontheproblem,andyetonlyforspecial piesararepositionintheworldofcomplexitytheory,itisclearlyinnp butisnotknowntobeinpanditisnotknowntobenp-complete. Manysub-disciplinesofmathematics,suchastopologytheoryandgroup graphsthatlookdierentlyareactuallythesame.theproblemoccu- classesofgraphshavepolynomial-timealgorithmsbeendiscovered.incongruently,thisproblemseemsveryeasyinpractice.itisalmostalways Abstract Thegraphisomorphismproblemcanbeeasilystated:checktoseeiftwo Thispaperismostlyasurveyofrelatedworkinthegraphisomorphism implementationsexistsforapplicationdomainssuchasimageprocessing. trivialtochecktworandomgraphsforisomorphism,andfasthardware eld.weexaminetheproblemfrommanyangles,mirroringthemultifacetednatureoftheliterature.wesurveycomplexityresultsforthe haveconstantsthataresolargeastonegatetheirusefulnessinactual whichhaveknownpolynomial-timealgorithms.manyofthesealgorithms graphisomorphismproblem,anddiscusssomeoftheclassesofgraphs 1Introduction somegraphswhichare\hard"forpracticalalgorithms,andpresentexperimentalresultswhichdemonstrateaclassofgraphsonwhichpractical applications.thusanumberofpracticaltechniques,whichdonothavea algorithmsrunintodiculty. polynomialworstcase,arealsoexamined.weendthepaperbydiscussing doesthereexista1-to-1mappingoftheverticesinonegraphtotheverticesof theothersuchthatadjacencyispreserved?insymbols,giveng1andg2,does GraphIsomorphismDisease"[29].Workhascontinuedunabatedonthegraph isomorphismproblemhowever,duetothemanypracticalapplicationsofthe subject,somuchinfactthatin1977readandcorneilchristenedit\the problem,anditsuniquecomplexityproperties. Thegraphisomorphismproblemhasalonghistoryintheeldsofmathematics, thereexistanfsuchthat8a;b2v1;(a;b)2e1()(f(a);f(b))2e2.the chemistry,andcomputingscience.muchresearchhasbeendevotedtothis graphsinfigure1areexamplesofisomorphicgraphs. Thegraphisomorphismproblemcanbesimplystated:giventwographs, withintheconventionalcomplexityclasses,hasledtomanyresearchpapers;in FactoringisanotherproblemwhichisnotthoughttobeinPorNP-complete, isomorphism.thisambiguity,abouttheexactlocationofgraphisomorphism Section2wesurveysomeoftheseresults. howeverfactoringisknowntobeinco-np,whichisnotthecasewithgraph problemisknowntobeinnp,butisnotknowntobeinpornp-complete. knowinwhichcomplexityclasstheproblemlies.somewhatsurprisingly,the Asarstattemptatunderstandinggraphisomorphism,wemaywishto 1
3 isomorphismdiscusshowtobuildfast,practical,isomorphismcheckers.some systemtoquicklygiveeachgraphauniquename.thusmanypapersongraph routinelydealwithgraphswhichrepresentmolecularlinks,andwouldlikesome tionswhichdesireafastisomorphismalgorithm.forexample,organicchemists enoughtojustifyitsstudy,itturnsoutthattherearemanypracticalapplica- Whilethepositionofgraphisomorphismincomplexityanalysisismorethan Figure1:Isomorphicgraphs ofverticesanedgewithxedprobabilityp,arealmostalwayseasytosolveby Findinggraphswhichare\hard"forthestrongestpracticalalgorithmsisa non-trivialtask.graphswhicharerandomlygenerated,bymakingeachpair provablypolynomialworstcase,thesignicanceofthisfactisnotentirelyclear. asimplebacktrackroutinewithaverynaiveheuristic[16].insection4we worstcase.insection3weexamineindetailsomeofthepracticalresults. classofgraphs,butmostpracticalalgorithmsdonothaveapolynomialtime oftheseroutinescomefromspecialpolynomial-timealgorithmsforarestricted discusstheproblemofndinghardgraphsfortheisomorphismproblem,and giveexperimentalresultswhichdemonstrateaclassofdicultgraphs. Althoughnopracticalalgorithmwhichcanbeappliedtoallgraphshasa f(a)=aforalla2v.anautomorphismpartitionofagraphgisasequence theoreticconceptscannotbeavoided,andwegiveabriefsummaryhere.an ofdisjointsubsetsv1;:::;vk,suchthatforallpairsofverticesa;b2vithere copiesofg;i.e.itisamappingfbetweenpairsofverticessuchthat(a;b)2 existsanautomorphismwheref(a)=b1.thustheautomorphismpartition E()(f(a);f(b))2E.Atrivialautomorphismisanautomorphismwhere automorphismofagraphgcanbedenedasanisomorphismbetweentwo theorythatunderliesmanygraphisomorphismresults.however,somegroup Forthemostpart,wetrytohidethereaderfromthecomplicatedgroup dividesvintosetsconsistingofalltheverticesthatcanbemappedontoone another. 1Alternatively,wecouldsaythatViistheorbitofaintheautomorphismgroupofG. 2
4 notknowntobeineitherpornp-complete;further,giisnotknowntobein 2ComplexityResults worldofcomplexityanalysis.itisoneofthefewproblemswhichisinnpbutis atelyexponentialalgorithmforsolvingtheproblem[3].moderatelyexponen- tialmeansthatonaproblemofsizen,therunningtimetobeystherelation: problems. co-np.itiswellknownthatifp6=npthenthereexistsproblemswhichareof Thegraphisomorphismproblem(GI)occupiesanimportantpositioninthe nk<t<an,wherek;a>1arearbitraryrealnumbers.typicallythismeansthe intermediatestatus,andithasbeenhypothesizedthatgimaybeoneofthese exponentintherunningtimeisafunctionofnwhichgrowsslowerthann.for example,theoneupperboundforgeneralgraphisomorphismisexp(n1=2+o(1)) [24]Ḃabia,Erdos,andSelkowsshowedthatforalmostallgraphsX,isomorphism toanyothergraphycouldbecomputedinquadratictime[5].aswell,ithas OneearlyresultonthecomplexityofGIshowedthatthereisamoder- theoryproblems,namelyrandomgraphs,theisomorphismproblemisnotvery dicult. isomorphism[6].theseresultsshowthatunderametricappliedtoothergraph beenshownthatthereisalinearexpectedtimealgorithmforsolvinggraph determineclassesofgraphssuchthattheisomorphismproblemisinpwhen locationofgiinthesenewcomplexityclasses.athirdapproachistotryto eralizethenotionofnpintomoreesotericnotionsofcomplexity,andstudythe restrictedtographsofthattype. proachistodeneitasbeingitsowncomplexityclass,isomorphism-complete, andseewhichotherproblemsfallwithinitsclass.anotherapproachistogensearchershavetakenotherapproachestodeterminingitscomplexity.oneap- SinceGIhasresistedeortstoclassifyitineitherPorNP-complete,re- ofisomorphismsbetweentwographsisisomorphism-complete.thisresultis togi.mostsignicantly,heshowedthattheproblemofcountingthenumber 2.1IsomorphismComplete Mathon[25]showedthatanumberofproblemsarepolynomiallyequivalent problems.indeedevenforsomeproblemsinp,thecountingversionis(conjecturedtobe)muchharderthanthedecisionproblem. theproblemofdeterminingtheautomorphismpartitionofagraph.thegraph automorphismdecisionproblem(ga),whichasksifthereexistsanon-trivial numberofnon-trivialautomorphismsofagraph,whichisinturnequivalentto problems.heshowedthatgiisequivalenttotheproblemofcountingthe MathonalsodemonstratedtheclosetiesbetweenGIandautomorphism versionsofnp-completeproblemsaremuchharderthantheirrelateddecision furtherevidencethatgiisnotnp-complete,sinceitseemsthatthecounting 3
5 graphs,transitivelyorientablegraphs[10],andregulargraphs[9].theseresultsarenotterriblysurprisingsincemanyofthesegraphclassesexhibitalarge reductionintheotherdirectionisknowntoexist. phismproblemconnedtoanyofthefollowingtypesofgraphsisisomorphism- allyequivalenttogi.wesimplylist,withoutproof,thatthegraphisomor- Thetermequalityproblemwasalsoshowntobeisomorphism-completeby Manyrestrictedisomorphismproblemsarealsoknowntobepolynomicomplete:bipartitegraphs,linegraphs,rootedacyclicdigraphs[2],chordal automorphism,isaninterestingexception;whilegaisreducibletogi,nosuch dicult(seesection4). amountofregularity,whichisoneofthefactorsthatmakesgraphisomorphism Basin[7].Inthisproblem,wearegiventwotermswhichcanhavefunctions whichareassociative,commutative,orboth,andcanhavecommutativevariable itdoesnotoccurnaturallyasagraphtheoreticproblem.itlendscredenceto thenotionofisomorphism-completeasaseparateandusefulcomplexityclass. 2.2GeneralizationsofNP NPistypicallycharacterizedasthoseproblemswherethereisapolynomially problemisdierentfromthepreviousisomorphism-completeproblems,inthat bindingoperators.wethenmustdecideifthetwotermsareequal;aspecial checkableproofcerticate.itcanalsobethoughtofasaninteractionbetween caseofthisproblemisdecidingiftwopredicatecalculustermsareequal.this twoparticipants,anall-powerfulproverandaverier.theproverlooksatthe putstheverieracceptspositiveinstanceswithprobability3/4,andaccepts input,andcomputesaproofcerticatewhichhesendstotheverier;theverier thenchecksthecerticateinpolynomialtimeandeitheracceptsorrejectsthe input.pcanbethoughtofasthoseproblemswherethereisnocommunication accesstoastreamofprivaterandomnumbersandonlyrequirethatoverallin- betweentheproverandtheverier.aswell,welettheproverandverierhave negativeinstanceswithprobability1/4.ipisknowntobeequaltopspace, andisthusnotveryinteresting.howeverifwerestrictthenumberofmessages sages(forp)or1message(fornp),weallowapolynomialnumberofmessages toaconstantk,wegettheclassip(k),whichisknowntobeequaltoip(2)for allk>1andisnotknown(andbelievednot)tobeequaltopspace.inthis TheclassIPisageneralizationoftheabovescenario.Insteadofnomes- Goldwasser,Micali,andRacko[19]thatthegraphnon-isomorphismproblem isinip(1)andhencegiisinip(2).muchmoresurprisingistheresultof acceptingnegativeinstances0. wheretheprobabilityofacceptingpostiveinstancesis1andtheprobabilityof IP(2).NotethatPandNParespecialcasesofIP(0)andIP(1)respectively, notationwethushavethreeclasseswhichmaynotbeequal,ip(0),ip(1),and Comingbacktographisomorphism,wehavethatsinceGIisinNP,GI 4
6 proofthatgi2ip(2) anddemonstratesthebasicideaofaninteractiveproof: (whichisnotknowntobeinnp)isinip(2).thealgorithmisquitesimple, 3.I 6.ifa=iandb=jtheverieraccepts,otherwiseitrejects 5.theproverreturns2numbersi;jsuchthatGiisisomorphictoI, 4.theveriersendsI;Jtotheproverinparallel 2.theverierpicks(atrandom)a;b2f1;2g 1.lettheinputgraphsbeG1andG2 alwaysaccept.iftheyareisomorphic,theproverhasnowayto knowwhichgraphiwasderivedfrom,andsowithprobability1/2 IfG1andG2arenotisomorphic,thenclearlytheverierwill andgjisisomorphictoj someisomorphismofga,j someisomorphismofgb complete,givesacomplexitydiagramlikethatoffigure2.thissignicance ofthisclassicationisnotsolelytheincreasedperspectiveitgivesonthegi problem,butithasalsobeenusedtogivestrongevidencethatgiisnotnpcomplete. Thisresult,combinedwiththelackofresultsplacingGIinPorNP- probability1/2thatj6=b.thusifg1andg2areisomorphic,the itwillreturnisuchthati6=a.similarlyforgraphj,thereis verieracceptswithprobability1=4.2 IP[2] PSPACE PH1PH2:::,basedonexistentialquantiers,universalquantiers,and Thepolynomialhierarchy(PH)isahierarchyofcomplexityclassesPH0 Figure2:ComplexityofGIandGI 5 NP-complete co-np co-np-complete NP P
7 andzachos[11]andschoning[31]prove(indierentways)thismainresultof graphisomorphismstructuralcomplexity: andph1=np.wewillnotdiscussthedetailsofph,excepttosaythatitis generallybelievedtobeaproperhierarchy[23].thatistosay,itisbelieved theredoesnotexistanisuchthatforji,phi=phj.boppana,hastad polynomialtimealgorithms.ittooisageneralizationofnp,i.e.ph0=p IfthegraphisomorphismproblemisNP-complete,thepolynomial inagraphwithaspeciallabelededge.ahighleveldescriptionofthealgorithm thepaper,giisreducedtotheproblemofndingthenumberofautomorphisms 2.3GraphswhereGIisinP TherstmajorresultinthiseldwasapaperbyLuksin1978[24].Heshowed thatforgraphswhichhaveboundeddegree(i.e.themaximumdegreesome constantk),thereexistsapolynomialtimealgorithmtocheckisomorphism.in hierarchycollapsestoph2=ip(2) intox1;:::;xn?1wherexiistheinducedsubgraphonthoseverticeswhich proceedsinthreesteps.firstanedgeeischosen,andthegraphispartitioned andluksclaimsthatusingmoresophisticatedtechniquestherunningtimeis stepisalwayspossibleandrunsinpolynomialtime.thealgorithmpresented inthepaperwasnotmeanttogiveatightupperboundontherunningtime, ino(ncklogk),wherec>1isaconstantandkisthemaximumdegree.itis forallgroups.usingpowerfulideasfromgrouptheory,luksprovedthateach itssetofneighboursinxi+1,andverticeswiththesamemappingaregrouped together.finallyeachofthesegroupsisdecomposedintoprimitivegroups wherethenumberofautomorphismsisknown,andthesenumbersaresummed areistepsorfewerawayfrome.next,ineveryxi,eachvertexismappedto clearthatevenifthemaximumdegreeisonly10,thistechniquedoesnotyield apracticalalgorithm. inpolynomialtime.thisalgorithmisnotverypractical,asitsrunningtimeis phism,onesuchpropertyisthegenusofagraph.ifwewishtodraw(more isdenedasasequenceofnumbersg1;g2;:::suchthatgiisthenumberofways wexk,thenthosegraphswhichhavegk>0canbecheckedforisomorphism commonlyembed)agraphonsomesurfacesuchthatnotwolinescross,wemay todrawagraphonasurfaceofgenusi.filottiandmayer[18]showthatif needasurfacewithafairlycomplicatedstructure.thegenusisameasureof howcomplicatedsuchasurfacemustbe;andthegenusdistributionofagraph Othergraphpropertieshavebeenstudiedwithrespecttographisomor- constantinthisalgorithmis(512k3)!whichisverylargenomatterwhatthe O(nck)wherec>300isaconstant.Chenobtainsabetterresult[13],showing thatifyoutaketheaverageofthegi's,andrequirethattobeboundedbya valueofk.planargraphsareinsomesenseaspecialcaseofthisresult,asthey constantk,thenthereisalineartimeisomorphismtest.however,thehidden 6
8 isomorphisminlineartime,althoughtheiralgorithmalsohasalargeconstant whichmakesitunsuitableinpractice. rstshownbyhopcroftandwong[20]thatplanargraphscouldbecheckedfor canbedrawnonaplane(orasphere)andhencehavegk>0forallk1.itwas thesegraphs,wheremisthenumberofedges,andnisthenumberofvertices. Thisresultisinterestinginthatitdoesnotrequiresomeexplicitparameterto beconstant,andseemstoapplytoalargeandpracticalgroupofgraphs. Hsu[21]hasshownthatthereisaO(mn)algorithmfortestingisomorphismof andjoiningtwoverticesiftheirarcsoverlap;asubclassofcirculararcgraphs createdbydrawinganumberofarcsonacircle,creatingavertexforeacharc, istheintervalgraphs,whereour\arcs"areconnedtotherealnumberline. circular-arcgraphs[21].circulararcgraphsarethosegraphswhichcanbe AnotherlargeclassofgraphsoverwhichGIcanbesolvedecientlyisthe phismcanbesolvedinpolynomialtime.forexample,cogisandguinaldo isomorphismproblemswhichareinp. permutationgraphs[15],chordal(6,3)graphs[4]andpartialk-trees[8]allhave techniqueforknowledgerepresentation.othergraphclassessuchastrees[2], [14]showthatisomorphismforconceptualgraphswhichhavealinearorderingfunctioncanbesolvedinpolynomialtime.Thisisparticularlyofinterest tothearticialintelligencecommunity,whereconceptualgraphsareusedasa Theseresultstakentogetherprovideaninterestingcounterpointtothediscussionofrandomgraphs.Itseemsthattheisomorphismproblemiseasyfor graphswhicharenotrelatedinanyway(randomgraphs)andforgraphswhich exploredmorefullyinsection4. 3PracticalIsomorphismAlgorithms Oneofthefactorscontributingtothelargeamountofworkonthegraphisomor- approachistotakethetwographswhicharetobecompared,andtrytodi- considered. rectlyndanisomorphismbetweenthem.thishastheadvantagethatifthere phismproblemisundoubtablythemanypracticalapplicationsofthetechnique. Therearetwobroadapproachestosolvingtheisomorphismproblem.Therst tionc(g)whichreturnsacanonicallabel;whereacanonicallabelmeansthat aremanyisomorphismsbetweentwographs,thenonlytherstoneneedbe theisomorphismproblem,butispossiblyofindependentinterest.forexample, C(G)=C(H)iGandHareisomorphic.Suchalabelingnotonlysolves organicchemiststypicallydealwith\graphs"suchastheoneiffigure3.itisa fundamentalproblemintheworldofchemicaldocumentationtogiveeachsuch structureauniquename. ThesecondapproachistotakeasinglegraphGandcomputesomefunc- Thereareseveralotherrestrictedclassesofgraphsforwhichgraphisomor- arestructurallyrelated(circulararcgraphsforexample).thisnotionwillbe 7
9 H H O werepresentgraphsbyanadjacencymatrixm,wheremij=1if(i;j)isan Figure3:Atypicalorganicchemistrygraph C C H C C C C C C H inpractice. edge,and0otherwise.wecanconstructalabelforgbyconcatenatingthe isisomorphism-complete,sothismethodhastobeslightlymodiedtobeused labelforgbylookingatthelabel(asdenedabove)ofeveryautomorphismof G,andreturningthesmallestone.OfcoursendingeveryautomorphismofG rowsofmtoformannbinarynumber.wecanthencomputeacanonical Itisnothardtodescribeanaivecanonicallabelingsystem.Supposethat C C O vertexinvariantswhichareanimportantpracticaltoolinsolvingisomorphism traditionalandspecialcaseapproachestographisomorphism.wethenlookat Therestofthissectionisorganizedasfollows.Werstbrieylookatnon- H H 3.1Non-traditionalApproachestoGI Therehasbeensomeworkonnon-traditionalapproachestothegraphisomorphism.McGregor[26]discussesusingarcandpathconsistencyalgorithmson problems,andnallywelookatalgorithmsforsolvingthegraphisomorphism problemusingeachofthetwoapproachesoutlinedabove. isomorphismproblemcouldverypossiblybeinp.theresultsofthepaper previous(relativelysimple)backtrackingalgorithms. seemtottheintuitivenotions,whereonlyaslightincreasewasobservedover astheconstraintsatisfactionproblemisknowntobenp-hard,andthegraph tunedconstraintalgorithms.thisapproachdoesnotseemintuitivelyinviting, phismproblemintoaconstraintsatisfactionproblem,andthenusesspecially theisomorphismproblem.thealgorithminthepaperconvertsagraphisomor- Agusa,Fujita,Yamashita,andAe[1]presentaHopeldnetworkforsolving 8
10 ting.thereasonforthisisthefactthatthemodelrestrictsthemaximum numberofverticesallowedinagraphto12.clearlythispaperprovesthat howeverthisapproachcertainlycannotbeusedunmodiedinapracticalset- neuralnetworksolutionstotheisomorphismproblems(forsmallgraphs)do exist,althoughitseemstodolittletoadvancethetheoryorpracticeofgraph result.inpractice,wemaybewillingtolivewithasmalldegreeofuncertainty, isomorphismproblems.itisuncleartowhatproblemdomainthistypeofsolutionissuited.theoretically,thisapproachcannotproveapolynomialworst case,sinceitisnotpossibletoguaranteethatitwillalwaysreturnthecorrect isomorphism. bydemarchi,masera,andpiccinin[17],whoimplementedplanarisomorphism bygivingafast,parallelplanarisomorphismalgorithm[22].giventhereal timeconstraintsofimageprocessing,thisalgorithmwastakenonestepfurther AswediscussedinSection2,HopcroftandWongshowedplanarisomorphism checkingcanbesolvedinlineartime[20].jajaandkosarajuextendthisresult planargraphswhichrepresenttheinterrelationshipsbetweenobjectsinascene. checkinginavlsiprocessorarray.whiletheseresultshavelittlebearing isomorphismchecking.thegraphswhichariseinthisapplicationdomainare Imageprocessingrankswithchemistryasalargeapplicationdomainfor ontheisomorphismproblemasawhole,theydoshowthatsomepractical implementationshavebecomeveryecient. 3.2VertexInvariants someisomorphism,thencertainlytheymusthavethesamedegree.notethat Oneverypracticaltechnique,whichisindependentofthealgorithmusedto notnecessarilyanisomorphismwhichmapsthetwoverticesontooneanother. avertexinvariantisthedegreeofavertex:ifvandv0maptoeachotherunder theconversedoesnothold,iftwoverticeshavethesamedegree,thenthereis Infact,ifthereisapolynomiallycomputablevertexinvariantforwhichthe someisomorphismthatmapsvontov0theni(v)=i(v0).thetypicalexampleof actuallysolvetheisomorphismproblem,istheuseofvertexinvariants.a problem. vertexinvariantissomenumberi(v)assignedtoavertexsuchthatifthereis conversedoeshold,thenthereisapolynomialtimesolutiontotheisomorphism adjacencytriangles Belowwelistsomeinvariantswhicharepresentinanisomorphismprogram twopaths callednauty[27]. Therearemanyvertexinvariantswhichhavebeenproposedintheliterature. 2assignanumbertovbasedonthesizeofthecommonneighbourhoodof assignanumbertovbasedontheverticesreachablealongapathoflength 9
11 k-cliques independentk-sets thoseneighboursofvwhoareadjacent distances assignanumbertovbasedonthenumberofdierentcliquesofsizek ofsizekthatcontainv assignanumbertovbasedonthenumberofdierentindependentssets space.morepractically,vertexinvariantsaretypicallyusedbycombiningthe showthatusingvertexinvariantsmaynotresultinanydecreaseofthesearch resultsofmanyinvariants.forexample,ifavertexhasdegree3,isin2cliquesof size4,andcanreach9verticesonpathsoflength2,thenacompositeinvariant mightbe329.infact,thisabilitytocomposeinvariantshasledtothecase Theuseofinvariantsissomethingofablackart.CorneilandKirkpatrick[16] assignanumbertovbasedonthenumberofverticesateachdistance wherepracticalalgorithmsalwaysusedegreeasthe\base"invariant,andother 1;:::;nfromv thebestforaparticulargraph.instead,whatistypicallydoneistoleavethe decisionofifandwhentouseavertexinvariantuptotheuser(exceptfordegree variantsgetappendedtothebase.theseotherinvariants,whiletheycanbe invariants[27],anditisverydiculttodeterminewhich(ifany)invariantis whichisalwaysused).thisassumesthatiftheuserhappenstocomeacross computedinpolynomialtime2,canbequiteexpensivetocalculate,compared degreeinvariantissucientformostgraphsencounteredinpractice,andthe anumberofveryhardgraphs,hewouldthentakethetimetoexperimentally determinewhatinvarianttouse.anotherwayofjustifyingthis,isthatthe canbedirectlysolvedinlesstimethanittakestocalculatethemorepowerful tothetotalexecutiontime.itturnsoutthatmanyisomorphismproblems Perhapsthemostnaturalwaytotryandsolvethegraphisomorphismproblem istotryanddirectlydiscoveramappingbetweentheverticesoftwographsg1 3.3SolvingtheIsomorphismProblemDirectly useronlyhastointerveneifthegraphhasaveryregularstructure. areclearlynotofpracticaluse [30].WestartbydeningG1(k)asthesubgraphofG1inducedonthevertices andg2.thealgorithmpresentedinthissectionisanadaptationoftheonein 1;:::;k.ThebasicideaistobuildanisomorphismfromG1(k)toasubgraph anunusedvertexofg2. ofg2,andattempttoextendthistoanisomorphismong1(k+1)byadding 2Actuallyinvariantshavebeenproposedwhichdonotruninpolynomiallytime,butthey 10
12 Themainroutineofthealgorithmlookssomethinglike: ProcedureMain: Output:arrayfsuchthati!fiisanisomorphismbetweenG1andG2, Input:graphsG1andG2 fori ornoneifnosuchfexists inv1i 1;:::;ndo elsereturnnone ifisomorph(emptyset,1,f)then reordertheverticesofg1(andreorderinv1aswell) endfor ifinv1sortedinascendingorder6=inv2sortedinascendingorder returnf inv2i somevertexinvariantonthei-thvertexofg1 somevertexinvariantonthei-thvertexofg2 optimizationistoreordertheverticesofg1,withthehopethattherewillnotbe methodsmaybeused,forexampletheverticesing1maybesimplysorted used.thecalculationofinv1andinv2allowsustorejectmanynon-isomorphic manyverticesing2thatcanmaptotherstfewverticesg1.severalordering graphs,providingourchosenvertexinvariantispowerfulenough.thesecond basedonthenumberofverticeswhichshareacommoninvariantvalue(the ischosenandadepth-rstsearchrootedatthatvertexisusedtore-orderthe invariantmultiplicity),orperhapsavertexwithminimuminvariantmultiplicity Wecanseethatthisisoneoftheplacesinthealgorithmwhereheuristicsare vertices.thesimplesortensuresusthatasweenlargetheisomorphismthere ofg2inducedbyscanbeextendedtoacompleteisomorphismong1andg2. depthrstsearchapproachisattractiveinthatadjacentverticesareplacednear input.itreturnstrueiftheisomorphismbetweeng1(k?1)andthesubgraph isaminimumnumberofcandidatestoextendthesolutionateachstep.the oneanother,andthuswewouldhopethatifwemakinganincorrectmapping decision,wewouldquicklygetacontradiction. TheISOMORPHproceduretakesasetS,andnumberk,andanarrayfas ProcedureISOMORPH: Input:setS,integerk,andanarrayf Output:TRUEiffcanbeextendedtotheentireinputgraphs ifk=n+1thenreturntrue foreachj2(v2=s) ifisomorph(k+1;s[fjg)then if(inv1k6=inv2j)_:canmatch(k;j;f) gotonextloopiteration j 11
13 therealreadyexistsanisomorphismbetweentherstkverticesofg1and theunmappedverticesing2andtriestomapthemtothenextvertexing1.it theverticesins.ifithasalreadymappedallpossibleverticesitimmediately returnstrue,andanisomorphismfhasbeenfound.otherwise,itlooksatall Itisnottoohardtoseewhatthisroutineisdoing.Whenitiscalled, endfor returnfalse returntrue usesthevertexinvariantheuristicsothatitwillnevertryamappingwherethe invariants,inwhichcasewecouldusethepartialmappingftohelpuscreate shownasacachedvalueonthisexample,itispossibletodynamicallycalculate invariantisdierent.thisisthemeansbywhichmuchofthesearchtreecanbe amorediscriminatinginvariant. pruned,providedwehaveagoodinvariant.notethatalthoughthisinvariantis Inthissectionwepresentacanonicallabelingalgorithm,whichisactuallyahigh secondone. 3.4DeterminingaCanonicalLabeling andcheckingthe(i;k)isanedgeoftherstgraphi(fi;j)isanedgeinthe simplyscanningtheisomorphismalreadydiscovered(whichiscontainedinf) thegivenmappingwouldnotconictwithpreviousmappings.thisworksby TheonlyfunctionlefttodescribeisCANMATCH,whichreturnstrueif leveldescriptionofthealgorithmpresentedbymckaycallednauty[28,27]. Thisisaverypowerfulalgorithm,andiscurrentlythepreferredmethodfor solvingthegraphisomorphismproblem.thereasonthismethodoutperforms (ingeneral)thealgorithmintheprevioussection,isthatbyconcentratingon broughttobearontheproblem,signicantlydecreasingtherunningtime.as onegraphatatime,powerfulideasfromtherealmofgrouptheorycanbe well,thisalgorithmprovidesmoreinformationthanthepreviousalgorithm, Centraltotheoperationofnautyistheideaofanorderedpartition.Apartition listing(forexample)alloftheautomorphismsofagraph. dividestheverticesofagraphintonon-empty,disjointsubsetsofv(called readerto[28]formoredetails. Partitions reader.insteadwewillconcentrateonthemainideas,andrefertheinterested itwouldrequirealargeamountofgrouptheorybackgroundonthepartofthe Wewillnotgiveasdetailedanalgorithmasthatintheprevioussection,as theirroleasleavesofthesearchtree cells):v1;v2;:::;vm.apartitionwithonlysingletonsets,willbecalleda leafpartition3.akeypointisthatwhenwendaleafpartition,itdenesa 3Innautythesearereferredtoasdiscretepartitions,howeverthetermleafpartitionhilights 12
14 relabelingofthegraphwherethevertexincellvigetsrelabeledtoi. b a c a b c c a b a c a c b c a b aregivenfortheverticesinthegraph,andassociatedwitheachpartitionis b a theadjacentmatrixwheretheorderoftheverticesintherowsandcolumns c b correspondstotheorderoftheverticesinthepartitions.automorphismsare recognizedbyndingtwodistinctleafpartitionswhich(afterrelabeling)give andthusdeneanautomorphism. risetothesamegraph.intheexamplejcjajbjandjajcjbjgivethesamematrices Forexample,considerthegraphinFigure4.Threedierentleafpartitions Figure4:Discoveringanautomorphismbycomparingleafpartitions a c b discovered automorphism c -> a, a -> c, b -> b a a c b invariantscanbeused.theinvariantiscomputedforeachvertexovertheentire partitionandgeneratingthechildrenofapartition.renementiswherevertex c graphtocreateaninitialpartition,andthentheinvariantrestrictedtothecells Therearetwomajoroperationsthatnautyperformsonpartitions,reninga b returnsthenumberofneighboursofvthatareinthesets.wecouldthen ofthepartitiontotrytofurtherdistinguishthem.forexampleassumed(v;s) denearenementoperationas: 1) 2)selectaVi2suchthatVihasmorethanoneelement 3)foreachv2Vi,computeasequenceav=(d(v;V1);:::;d(v;Vm)) theinitialpartitionv1;:::;vmwhereforallverticesx;y2vi wehaved(x;v)=d(y;v) 13
15 Inactuality,wedonotjustselectasingleVibutstartingatV1weloopthrough allthevi(includingonescreatedafterasplit)untilwecannotsplitanymore partitionwhichisv1;:::;vi?1;fvg;vi=fvg;vi+1;:::;vm.thatistosay,we hasmorethanonemember,andthenforeachvertexv2viwecreateachild cellsẇegeneratethechildrenofapartitionbychoosingtherstcellviwhich 4)splitViintoanumberofsubsets,sotheverticesineachsubsethave createanewchildforvertexvbysplittingthecellviintotwocells,onewhich thesamevalueforav eachpartitionbeforeexpandingitschildren. rstsearchofthespaceofpartitions,withtheaddedoptimizationthatwerene operations,whichwewilltalkaboutinthenextsection.itisbasicallyadepth BasicAlgorithm Hereisthebasicalgorithmusedbynauty.Wehaveomittedsomeofthepruning containsonlyvandonewhichisviwithoutv. Output:acanonicalgraphC Input:agraphG while(sisnotempty) S thepartitioncontainingasinglecellv stackcontaining endwhile returnc if(xisaleafpartition) elserene(x) endifappendthechildrenofxtos x popthetopofthestacks update(c;x) CanonicalLabeling Conceptually,nautyexamineseveryautomorphismofagraphandcomputes willhashtodierentvalues. acanonicallabel.thislabelissimplytheadjacencymatrixofthe\smallest" automorphism.theschemeusedtodenethesmallestautomorphismanextensionoftheschemewediscussedpreviously,wheregraphsareorderedbasedon thebinarynumberthatiscreatingbyconcatenatingtherowsoftheadjacency input,andcomputesahashfunctioninthehopethatdierentautomorphism matrix.themainadditionisanindicatorfunction,whichtakesapartitionas 14
16 xbystartingattherootofthesearchtreeandtransversingdowntox,at eachpointtheresultoftheindicatorfunctionisusedtodeneamemberof thesequence.thusaleafpartitionisdenedassmallerthanif<4, andtheequivalentbinarynumberofeachautomorphismisusedtobreakties. McKayprovesthatacanonicallabelingdenedinthisfashionisthesamefor anytwoisomorphicgraphs[28]. posewehavesomepartitionxwhichisthesmallestpartitiondiscoveredsofar. Thusifwereachaleafpartitionxinoursearchtree,wedeneasequence Thenwecancomparesomenodevtox,andifvisbiggerwecanprunev. Bydeningtheindicatorfunctionoverallancestorsofx,wemaybeableto prunenodeswhicharenotleafnodes,sincetheymaybebiggerthantheancestorsofx.notethatifwesimplyorderautomorphismsbasedontheirbinary representation,thenwecanonlyprunenodeswhichareleafpartitions. Itiseasytoseehowthisinformationcouldbeusedtoprunethetree.Sup- iftwodierentleafpartitionresultinthesameadjacencymatrixafterrelabeling thevertices.nautystorestwographs,whichitusestocheckforautomorphisms. Thereisonlyonelastmaintechniqueemployedbynauty,therecognitionand UsingAutomorphisms Onegraphcorrespondstothe\smallest"graphfoundsofar,asdenedabove, useofautomorphisms.asmentionedearlier,nautyrecognizesanautomorphism graphiscomparedtothestoredcopies,andiftheyhaveexactlythesame andwilleventuallybecomethecanonicallabel;theothergraphcorrespondsto therstleafnodediscovered.whenanewleafnodeisreached,itsrelabeled adjacencymatrix,thenanautomorphismhasbeenfound.atthesametime, ifnautydiscoversthenewgraphissmallerthansmallestsofar,thenthenew graphbecomesthenewcanonicalgraph.notethatthiswillnotdiscoverall isatradeo morestoredgraphsmeansmorematches,butitalsomeansthe timetocheckeachgraphisincreased.inadditiontotheseautomorphisms,an automorphismcansometimebeinferredbythestructureofapartition;however automorphisms,sinceweareonlystoringtwographstocompareagainst.there thistechniqueislessimportantandwedonotdiscussitfurther. searchspace.oneusefulresultisthatifthereisanautomorphismbetweenaleaf partitionandsomestoredpartition,thennautycanjumpallthewayback another.thusisanapproximationoftheautomorphismpartition,andgets updatedwheneveranewautomorphismisfound.thesignicanceofcomes inifnautyhasdiscoveredsomeautomorphismwhichmapsthetwoontoone totherstcommonancestorofandandcontinuefromthere.additionally, nautymaintainsaspecialpartition,wheretwoverticesareinthesamecell intoplaywhenwegeneratethechildrenofsomepartition.recallthatthis Oncenautyhasfoundanautomorphism,itputsittoworktotrytoprunethe wordsareordered 4Thetwosequencesarecomparedinlexographicorder,i.e.inthesamemannerasEnglish 15
17 isdonebychoosingacellw2,andgeneratinganewchildforeveryelement ofw.given,wenowonlycreateachildforeachelementofwwhichisina uniquecellof.thusaswendmoreandmoreautomorphisms,lessandless childrengetexpandedfromeachnode.theproofthatthesepruningsarevalid dependsonsomefurtherideasaboutpartitionsandgrouptheory,whichwewill morphism.afundamentalweaknessoftheseapproachesisthefactthatonce grouptheoryideastohelpprunethesearchspace.insomesense,thesemantics theproblemistransformedintothatparadigm,itisnolongerpossibletouse 3.5Discussion Practicalexperienceseemstoindicatethatothergeneralparadigms,suchas constraintsatisfactionandneuralnetworks,arenotveryusefulforgraphiso- notdevelophere.theinterestedreadercansee[28]. ofthedataisbeinglostinthetranslation. itisnotdiculttospeculatewhynautydoesbetter.bothprogramsmakeuse directapproachtoisomorphism.thedierencesherearenotasconclusive,but ofvertexinvariants,nautyusestheminitsrenementprocess,andthedirectalgorithmusesthemwhendecidingwhethertoextendanisomorphism.themain dierencebetweenthetwotechniquesseemstobetheiruseofpartialresults. towork,pruningawaysectionsofthesearchtree.thuswhennautyexplores Whenevernautyndsanautomorphism,itimmediatelyputstheautomorphism aportionofthesearchtree,italwaysattemptstousetheseresults.contrast Anotherinterestingnoteisthesuccessofaprogramlikenauty,overamore thiswiththedirectscheme.supposewehaveextendedtheisomorphismtoall inthe\almostisomorphism"toprunesubsequentattempts,andthusweare isanumberoflevelsback.thereisnoattempttousetheinformationgained essentiallydiscardingtheknowledgewelearnedinthatportionofthesearch. butonevertex,andthenrealizethatwehavetobacktracktoapointwhich 4HardGraphs inrealtime.thelistofpropertiesthatour\hard"graphscannothavegoeson wonderifthishasanypracticalsignicance.putanotherway,wemaywishto knowifthereareanyreally\hard"graphs,andifthereare,getsomehandleon whatmakesthemdicult. WhilethegraphisomorphismproblemisnotknowntobeinP,onemight andon,andevenifourgraphdoesnothaveoneofthoseproperties,practical weconneourselvestorandomgraphs,thentheisomorphismproblemisalmost alwaysveryeasy.ifweinsteadfocusonplanargraphs,thereexistsaparallel hardwareimplementationthatwillndtheisomorphismsofverylargegraphs Thesearchforhardgraphsisnotatrivialone.Aswehavealreadyseen,if 16
18 rithmforaspecialsubclassofgraphs,itisoftennon-trivialtodetermineifan inputgraphbelongstosuchasubclass.finally,thearrayofheuristicsavailable forthealgorithmtodecideifandwhentoapplyeachone. topracticalalgorithmsisindeedlarge,butthatalsoservestomakeitnon-trivial thatmakethemprohibitiveforactualuse.further,evenifthereisafastalgo- theisomorphismproblem. rithmsthatsolveacertainclassofgraphsinpolynomialtimehaveconstants algorithmshaveadazzlingarrayofheuristicsthatcanbeusedtoquicklysolve section,andattempttondgraphswhicharediculttoprocess.ourapproach Inthissectionwelookatthenautyprogramintroducedintheprevious Practicalalgorithmsdonotgetothateasilyhowever.Manyofthealgo- asameanstopruneoutobviousnon-isomorphisms(ornon-automorphismsin isnottodirectlyconstructthesehardgraphs,butinsteadtotransformtypes nauty'scase).thustherstdecisionwecanmakeistorestrictourselvesto wheretolookforhardgraphs.aswenoted,allpracticalalgorithmsusedegree Ourpreviousdiscussionoftheisomorphismalgorithmsgivesussomehintsasto thepowerandlimitationsofpracticalgraphisomorphism. 4.1FindingHardGraphs of\easy"graphsintohardones.indoingsowegainabetterunderstandingof wishtoincreasethisnotionofregularity,byrequiringthatrangeinsizesofthe commonneighbourhoodofanytwoverticesbeverysmall. regulargraphs.agraphisregularifeveryvertexhasthesamedegree.wemay thereisnoknownalgorithmtouniformlygeneraterandomgraphswiththe withourdesiredregularityproperties. aboveproperties.instead,wehavetotrytond\naturallyoccurring"graphs lentgraphs.thesegraphsaregeneratedbycreatingmany(conceptually,in- nitelymany)ringsofregularp-gons,anddeningafunctionwhichmapsthese polygonsontooneanother{forexample,startatanyvertexandmapthethree polygonswhichshareittothethreepolygonsthatsharethevertexthatis14 Onesuchsourceofregulargraphsisthep-regularmapembeddingsoftriva- Unfortunately,oncewemakethesedecisionswereachapracticaldiculty; verticestotheright.afterperformingthismapping,eithertheringsofpolygonsremaininnite(oratleastbeyondthesizethatcanbehandledbythe computer'smemory),orallpolygonsaremappedtothesinglepolygonatthe center,orthereissomenitemapofpolygonswhichisproduced.theinterested nautycanassignthemacanonicallabel.itturnsoutthesegraphsareinsome sensetooregular,thenumberofautomorphismsisverylarge,whichcanbe readerisreferredto[12]formoredetailsonthisclassofgraphs.thelatercase exploitedtoprunethesearchspace.thekeyideainmakingthesegraphshard Oncewehavethesegraphsinhand,wecantesthoweasilyprogramslike isofparticularinteresttous,sinceitgeneratesahighlysymmetricp-regular graph. 17
19 theirendpoints.theedgesarechosenatrandom,butareconstrainedsothat istodecreasetheamountofself-similaritybychoosingtwoedgesandswapping whentheyareswapped,thedegreeofeachvertexdoesnotchange.asthe experimentalresultsinthenextsectionshow,doingonlyoneoftheseswapscan 4.2ExperimentalResults Fourgraphswerechosentoexaminetheeectofrandomswapsonthediculty maketheproblemseveralhundredtimesharderfornauty. ofthegraphthatresults.thegraphsareentitledv190,v348,v486,and v864,wherethenumberineachcaserepresentsthenumberofvertices.all programwrittenbyjoeculberson[12]basedontheconstructionmentionedin graphswereregulargraphswithdegree8,andwerecreatedusingagenerator theprevioussection. time vs number of swaps 3 v measurement,excepttomentionthattheywereverylowinallbutonecase, 1 whichwewilldiscussshortly. timeofnautyoverthosegraphs.wedonotexplicitlylistthevariancesforeach 10graphswiththerequirednumberofswaps,andthenaveragingtherunning 12,16,and32randomswaps.Eachmeasurementwasobtainedbycreating Figures5through8showauniformpictureoftheeectofrandomswaps. Foreachgraphwemademeasurementsfor0,1,2,3,4,5,6,7,8,10, Figure5:Resultsforv time in seconds
20 time vs number of swaps 30 v Ineachcasenautywasveryfastiftherewasnorandomswaps,andthenmuch slowerwhenrandomswapswereintroduced.further,asmoreswapswereintroduced,nautybegantodecreaseitsrunningtime mayexplainthelargeincreaseintimebetween0and1swaps,isthenumberof automorphismsintheresultinggraph.whentherewerenoswaps,thenumbers Figure6:Resultsforv348 ofautomorphismsofv190,v348,v486,andv864were3420,6144,7776,and respectively.Basedonourpreviousanalysisofthenautyalgorithm,it isnothardtoimaginethattheselargegroupsizeshelpnautytoaggressively 0 prunethesearchspace.afterdoing1ormorerandomswaps,thenumberof Thereareafewplausibleexplanationsforthisbehaviour.Onefactorwhich automorphismswasalmostalways1;outof520graphsthatcontainedrandom number random swaps automorphismgroupofsize2,andthesewereabletocompleteinapproximate oftheonemeasurementwithlargevariance:itcontainedtwographswithan swaps,only5hadanautomorphismgroupofsize2.infactthisisthecause 2/3theamountoftimeastheotherruns.Clearlyinthegraphswithrandom swaps,nautycannotuseautomorphismstohelpprunethesearchtree. increased,asallofthesegraphshadtheapproximatelythesamenumberof eectively.witheachrandomswapweessentially\break"thestructureofthe thegraphswithmanyswapsbecauseitisusingitsrenementproceduremore automorphisms(1or2).intuitivelywecanarguethatnautyisspeedingupon Thisdoesnotexplainthefactthetimedecreasedasthenumberofswaps 19 time in seconds
21 time in seconds time vs number of swaps v486 Figure7:Resultsforv number of random swaps time in seconds time vs number of swaps 600 v Figure8:Resultsforv number of random swaps
22 manyconclusionscanbemadeabouttheseresults,excepttosaythatmore graph,andthuswithmanyswapsthenumberofbreaksincrease,andhence asitrelatedtographsize.foreachgraphweplottheblowupratior=(time withoneswap)/(timewithnoswaps).forthistestweincludedanumberof byinterlockinglatinsquaresofsize10.theresultsareshownintable1.not workisnecessarytodiscoverhowtopredicttheseratios. test.aswellweincludeagraphv900whichisa900vertexgraphgenerated graphsofvarioussize,generatedinasimilarfashionasthoseintheprevious nautyismorelikelytondandexploitoneofthose\breaks". Onenaltestweperformedwastotryandmeasuretheamountofincrease, ndegreenoswaps(sec)oneswap(sec)blowupratio Table1:Theeectofgraphparametersettingsontheblowupratio Conclusion ThetheoryofNP-completenesshasallowedresearcherstoconcludethatmany timesolution,ortobecontentwithalgorithmsthatmayhaveverybadworstcasebehaviour.asthelargeamountofresearchonthecomplexityofgraph seemtoguidetheresearcher.oneisunsureofwhethertosearchforapolynomial problemsareeitherpolynomiallysolvable,orareprobablyintractable.graph isomorphismshows,researchersaretryingtoremedythatproblem,believing isomorphismisoneofthefewproblemsforwhichnp-completenessdoesnot tobecompletelydetermined.insteadalargebodyofworkhasconcentrated generalproblemveryfastonaverage.whenthegraphsbeingaveragedover tionsthatthecomputingcommunityisnotcontenttowaitforitscomplexity onsolvingrestrictedversionsofgraphisomorphismveryquickly,orsolvingthe largerrealmofcomplexityanalysis. thatadeeperunderstandingofgraphisomorphismwillyieldinsightsintothe However,thegraphisomorphismproblemhassomanyinterestingapplica- 21
23 Howeverpracticalalgorithmsareveryfastwhenaveragedoverthenebulous aregeneratedinacompletelyrandomfashion,itistrivialtobefastonaverage. plausiblethattheymightariseinanapplicationwhereveryregulargraphsare generated,whichmighthaveasmallamountofnoise.onepointtonoteisthat rithmsndhard.grantedthatthesegraphswererathercontrived,butitseems thesearchspace. notionofrealworldgraphs,byusingpowerfulgrouptheorytoolstohelpprune evenfor\hard"instances,1000vertexgraphsweresolvedinlessthan10minutes.thisisquiteacontrastwithproblemslikegraphcoloring,were10minutes ona1000nodeproblemwouldnotbeconsideredalongtime,andmaybea furtherindicationofthe\almostpolynomial"natureofthegraphisomorphism problem. Asweshowed,itisnottoodiculttocreategraphswhichcurrentalgo- References [1]K.Agusa,S.Fujita,M.Yamashita,andT.AE.Onneuralnetworksfor graphisomorphismproblem.inthernns/ieeeconferenceonneuroinformaticsandneurocomputers,pages1142{1148,rostov-on-don,russia, [4]L.Babel.Isomorphismofchordal(6,3)graphs.Computing,54:303{306, [3]L.Babai.Moderatelyexponentialboundforgraphisomorphism.Proceed- [2]A.Aho,J.Hopcroft,andJ.Ullman.TheDesignandAnalysisofComputer ingscience117,pages34{50,1981. ingsofthefundamentalsofcomputingscience,lecturenotesincomput- Algorithms.Addison-Wesley,Reading,1974. October1992. [6]L.BabiaandL.Kucera.Canonicallabelingofgraphsinlinearaveragetime. [7]D.Basin.Atermequalityproblemequivalenttographisomorphism.InformationProcessingLetters,51:61{66,1994. [5]L.Babia,P.Erdos,andS.Selkows.Randomgraphisomorphism.SIAM InProceedingsofthe20thIEEESymposiumonFoundationsofComputing Science,pages39{46,1979. JournalofComputing,9(3):628{635,August [9]K.Booth.Problemspolynomiallyequivbalenttographisomorphism.TechnicalReportCS-77-04,UniverisityofWaterloo,1979maticindexonpartialk-trees.JournalofAlgorithms,11:631{643,1990. [8]H.Bodlaender.Polynomialalgorithmsforgraphisomorphismandchro- 22
24 [11]R.Boppana,J.Hastad,andS.Zachos.Doesco-nphaveshortinteractive [10]K.BoothandG.Lueker.Linearalgorithmstorecognizeintervalgraphs andtestforconsectuativeonesproperty.inproceedingsofthe7thannual ACMSymposiumontheTheoryofComputing,pages255{265,May1975. [14]O.CogisandO.Guinaldo.Alineardescriptorforconceptualgraphsand [12]I.Bouwer.TheFosterCensus:R.M.Foster'sCensusofTrivalentGraphs. [13]J.Chen.Alineartimealgorithmforisomorphismofgraphswithbounded proofs?informationprocessingletters,25:27{32,1987. nationalconferenceonconceptualstructures,pages263{277,santacruz, aclassforpolynomialisomorphismtest.inproceedingsofthe3rdinter- TheoreticConceptsinComputerScience,pages103{113,1992. averagegenus.proceedingsofthe18thinternationworkshopongraph- BabbageReaserchCompany,Winnipeg,1988. [16]D.CorneilandD.Kirkpatrick.Atheoreticalanalysisofvariousheuristics [15]G.Colbourn.Ontestingisomorphismofpermutationgraphs.Networks, 11:13{21,1981. USA,August1995. [18]I.FillottiandJ.Mayer.Apolynomial-timealgorithmfordeterminingthe [17]D.Damarchi,G.Masera,andG.Piccinini.AVLSIprocessorarrayfor isomorphismofgraphsofxedgenus.inproceddingsofthe12thacm ,May1980. graphisomorphism.internationaljournalofelectronics,76(4):655{679, forthegraphisomorphismproblem.siamjournalofcomputing,9(2):281{ [21]W.Hsu.O(MN)algorithmsfortherecognitionandisomorphismprobelm [20]J.HopcroftandJ.Wonk.Alineartimealgorithmforisomorphismofplanar [19]S.Goldwasser,S.micali,andC.Racko.Theknowledgecomplexityof Computing,pages172{184,1974. graphs.proceeedingsofthe6thannualacmsymposiumonthetheoryof interactiveproofsystems.siamjournaloncomputing,18:186{208,1989. SymposiumonTheoryofComputing,pages235{243,1980. [22]J.JaJaandS.Kosaraju.Parallelalgorithmsforplanargraphisomorphism oncircular-arcgraphs.siamjournalofcomputing,24(3):411{439,june andrealtedproblems.ieeetransactionsoncircuitsandsystems,35:304{ 311,
25 [26]J.McGregor.Relationalconsistencyalgorithmsandtheirapplicationin [25]R.Mathon.Anoteonthegraphisomorphismcountingproblem.InformationProcessingLetters,8:131{132,1979. ndingsubgraphandgraphisomorphism.informationsciences,19:229{ ItsStructuralComplexity.Birkhauser,Boston,1993. [24]E.Luks.Isomorphismofgraphsofboundedvalencecanbetestesinpolynomialtime.JournalofComputerandSystemSciences,25:42{65,1982. [23]J.Kobler,U.Schoning,andJ.Toran.TheGraphIsomorphismProblem: [28]B.McKay.Practicalgraphisomorphism.CongressusNumerantium,30:45{ [27]B.McKay.NautyUser'sGuide(version1.5).ComputerScienceDepartment,AustrialianNationalUniversity. 250,1979. [31]U.Schoning.Graphisomorphismisinthelowhierarchy.JournalofComputerandSystemSciences,37:312{323,1988. andpractice.prentice-hall,newjersey, ,1981. Theory,1:339{363,1977. [29]R.ReadandD.Corneil.Thegraphisomorphismdisease.JournalofGraph [30]E.Reingold,J.Nievergelt,andN.Deo.CombinatorialAlgorithms:Theory 24
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Tetris is Hard: An Introduction to P vs NP
Tetris is Hard: An Introduction to P vs NP Based on Tetris is Hard, Even to Approximate in COCOON 2003 by Erik D. Demaine (MIT) Susan Hohenberger (JHU) David Liben-Nowell (Carleton) What s Your Problem?
Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
CoNP and Function Problems
CoNP and Function Problems conp By definition, conp is the class of problems whose complement is in NP. NP is the class of problems that have succinct certificates. conp is therefore the class of problems
Lecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
Computational complexity theory
Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
Tutorial 8. NP-Complete Problems
Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem
NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics
NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course
Reductions & NP-completeness as part of Foundations of Computer Science undergraduate course Alex Angelopoulos, NTUA January 22, 2015 Outline Alex Angelopoulos (NTUA) FoCS: Reductions & NP-completeness-
Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro
Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: [email protected] office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html
P versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook
Overview: The Public Administration industry 1 in Alberta includes federal, provincial and local government services such as: defence services; police, judicial, correctional and other protective services;
Guessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)
Network Algorithms for Homeland Security
Network Algorithms for Homeland Security Mark Goldberg and Malik Magdon-Ismail Rensselaer Polytechnic Institute September 27, 2004. Collaborators J. Baumes, M. Krishmamoorthy, N. Preston, W. Wallace. Partially
! X is a set of strings. ! Instance: string s. ! Algorithm A solves problem X: A(s) = yes iff s! X.
Decision Problems 8.2 Definition of NP Decision problem. X is a set of strings. Instance: string s. Algorithm A solves problem X: A(s) = yes iff s X. Polynomial time. Algorithm A runs in polytime if for
Performance Analysis of a Telephone System with both Patient and Impatient Customers
Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9
CAD Algorithms. P and NP
CAD Algorithms The Classes P and NP Mohammad Tehranipoor ECE Department 6 September 2010 1 P and NP P and NP are two families of problems. P is a class which contains all of the problems we solve using
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
Motion. Complete Table 1. Record all data to three decimal places (e.g., 4.000 or 6.325 or 0.000). Do not include units in your answer.
Labs for College Physics: Mechanics Worksheet Experiment 2-1 Motion As you work through the steps in the lab procedure, record your experimental values and the results on this worksheet. Use the exact
Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms
CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard [email protected] CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes
Page 1/.. USA / Canada - South Africa Schedule No. 4 / 2011-Jan-24
USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 1/.. USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 2/.. USA / Canada South Africa Schedule No. 4 / 2011Jan24 Page 3/.. USA / Canada
A Performance Comparison of Five Algorithms for Graph Isomorphism
A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,
The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/
The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Theory vs. Practice In theory, there is no difference between theory and practice.
NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with
Introduced by Stuart Kauffman (ca. 1986) as a tunable family of fitness landscapes.
68 Part II. Combinatorial Models can require a number of spin flips that is exponential in N (A. Haken et al. ca. 1989), and that one can in fact embed arbitrary computations in the dynamics (Orponen 1995).
On Network Tools for Network Motif Finding: A Survey Study
On Network Tools for Network Motif Finding: A Survey Study Elisabeth A. Wong 1,2, Brittany Baur 1,3 1 2010 NSF Bio-Grid REU Research Fellows at Univ of Connecticut 2 Bowdoin College 3 Manhattanville College
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Quantum Monte Carlo and the negative sign problem
Quantum Monte Carlo and the negative sign problem or how to earn one million dollar Matthias Troyer, ETH Zürich Uwe-Jens Wiese, Universität Bern Complexity of many particle problems Classical 1 particle:
Data Integration. Lectures 16 & 17. ECS289A, WQ03, Filkov
Data Integration Lectures 16 & 17 Lectures Outline Goals for Data Integration Homogeneous data integration time series data (Filkov et al. 2002) Heterogeneous data integration microarray + sequence microarray
Complexity Classes P and NP
Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer
On Matroid Representability and Minor Problems
On Matroid Representability and Minor Problems Petr Hliněný Faculty of Informatics, Masaryk University in Brno, Botanická 68a, 602 00 Brno, Czech Republic and Department of Computer Science, VŠB Technical
Statistical Databases and Registers with some datamining
Unsupervised learning - Statistical Databases and Registers with some datamining a course in Survey Methodology and O cial Statistics Pages in the book: 501-528 Department of Statistics Stockholm University
Model Selection. Introduction. Model Selection
Model Selection Introduction This user guide provides information about the Partek Model Selection tool. Topics covered include using a Down syndrome data set to demonstrate the usage of the Partek Model
A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data
A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data Bin Zhou School of Computing Science Simon Fraser University, Canada [email protected] Jian Pei School
Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer
Community Detection Proseminar - Elementary Data Mining Techniques by Simon Grätzer 1 Content What is Community Detection? Motivation Defining a community Methods to find communities Overlapping communities
Calculator Notes for the TI-Nspire and TI-Nspire CAS
CHAPTER 7 Calculator Notes for the Note 7A: Free Fall You will need a CBR2 motion sensor. Press c and choose New Document. Connect the CBR2 to the handheld. Choose Lists & Spreadsheet, and press a. a.
Form B Confirmation of Registration-Reinstatement of Interest Free Status for Alberta Student Loans
Complete this form only if you are returning to school as a or as a and are not receiving new Alberta The cannot exceed 12 calendar months. M Y but not beyond the. Section 3 - Mailing Address for EDULINX
The Health Information Act. Use and Disclosure of Health Information for Research
The Health Information Act Use and Disclosure of Health Information for Research The Health Information Act (HIA) sets out rules respecting the use and disclosure of health information for research purposes
Cryptography and Network Security Number Theory
Cryptography and Network Security Number Theory Xiang-Yang Li Introduction to Number Theory Divisors b a if a=mb for an integer m b a and c b then c a b g and b h then b (mg+nh) for any int. m,n Prime
timeout StoR!msg0 RtoS?ack0
c1997kluweracademicpublishers,boston.manufacturedinthenetherlands. FormalMethodsinSystemDesign,,?{??(1997) SymbolicVericationofCommunication ProtocolswithInniteStateSpacesusingQDDs queues.itiswell-knownthatmostinterestingvericationproblems,suchasdeadlockdetection,
Complex Networks Analysis: Clustering Methods
Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich [email protected] 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Overview: Section A: Business Environment. 1. 2014 Employment and Unemployment Numbers and Rates. 2. Industry s Growth. 3. Facts, Trends and Outlook
1 Overview: The Finance, Insurance, Real Estate and Leasing industry 1 in Alberta includes establishments and professionals such as: consumer lending companies (i.e. banks, credit unions, credit card,
Random Testing: The Best Coverage Technique - An Empirical Proof
, pp. 115-122 http://dx.doi.org/10.14257/ijseia.2015.9.12.10 Random Testing: The Best Coverage Technique - An Empirical Proof K Koteswara Rao 1 and Prof GSVP Raju 2 1 Asst prof, (PhD) @JNTUK, CSE Department,
How To Get A Computer Science Degree At Appalachian State
118 Master of Science in Computer Science Department of Computer Science College of Arts and Sciences James T. Wilkes, Chair and Professor Ph.D., Duke University [email protected] http://www.cs.appstate.edu/
Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05
Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05 At the end of this chapter the successful student will be able to Describe the main hardware
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902
Graph Theory Lecture 3: Sum of Degrees Formulas, Planar Graphs, and Euler s Theorem Spring 2014 Morgan Schreffler Office: POT 902 http://www.ms.uky.edu/~mschreffler Different Graphs, Similar Properties
Updating Action Domain Descriptions
Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at
Atlantic Provinces 71 COMMUNITIES
NATIONAL STUDY OF AUTOMOBILE INSURANCE RATES Third Release Atlantic Provinces 71 COMMUNITIES vs. British Columbia, Alberta Saskatchewan, Manitoba & Ontario 3,985,162 Auto Insurance Rates Compared October
Mining Social-Network Graphs
342 Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network is
Going Big in Data Dimensionality:
LUDWIG- MAXIMILIANS- UNIVERSITY MUNICH DEPARTMENT INSTITUTE FOR INFORMATICS DATABASE Going Big in Data Dimensionality: Challenges and Solutions for Mining High Dimensional Data Peer Kröger Lehrstuhl für
Social Network Mining
Social Network Mining Data Mining November 11, 2013 Frank Takes ([email protected]) LIACS, Universiteit Leiden Overview Social Network Analysis Graph Mining Online Social Networks Friendship Graph Semantics
Data Integration: A Theoretical Perspective
Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy [email protected] ABSTRACT
MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/
The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Why this Max-Flow Talk? The result: O(min(n 2/3, m 1/2 )mlog(n 2 /m)log(u))
Cloud Computing is NP-Complete
Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,
Private Approximation of Clustering and Vertex Cover
Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search
Sandy Campbell, Diane Clark, and Allison Sivak University of Alberta Libraries Edmonton, Alberta, Canada
http://conference.ifla.org/ifla77 Date submitted: May 26, 2011 An Association-Based Continuing Education Certification Program: The Library Association of Alberta Pilot Program Sandy Campbell, Diane Clark,
A Partition-Based Efficient Algorithm for Large Scale. Multiple-Strings Matching
A Partition-Based Efficient Algorithm for Large Scale Multiple-Strings Matching Ping Liu Jianlong Tan, Yanbing Liu Software Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing,
Sample Questions for Mastery #5
Name: Class: Date: Sample Questions for Mastery #5 Multiple Choice Identify the choice that best completes the statement or answers the question.. For which of the following binomial experiments could
Destination Marketing Program Overview
Destination Marketing Program Overview 2011 Business Retention and Enhancement Tourism, Arts, Culture and Heritage Program: Enhanced Event Marketing and Media: BC Shellfish Festival; increased media outreach
Proofs that Yield Nothing But Their Validity All Languages in NP Have Zero-Knowledge Proof Systems
Proofs that Yield Nothing But Their Validity All Languages in NP Have Zero-Knowledge Proof Systems or ODED GOLDREICH Technion, Haifa, Israel SILVIO MICALI Massachusetts Institute of Technology, Catnbridge,
Outline. Introduction Linear Search. Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques
Searching (Unit 6) Outline Introduction Linear Search Ordered linear search Unordered linear search Transpose sequential search Interpolation search Binary search Fibonacci search Other search techniques
Sample Questions Csci 1112 A. Bellaachia
Sample Questions Csci 1112 A. Bellaachia Important Series : o S( N) 1 2 N N i N(1 N) / 2 i 1 o Sum of squares: N 2 N( N 1)(2N 1) N i for large N i 1 6 o Sum of exponents: N k 1 k N i for large N and k
The Assignment Problem and the Hungarian Method
The Assignment Problem and the Hungarian Method 1 Example 1: You work as a sales manager for a toy manufacturer, and you currently have three salespeople on the road meeting buyers. Your salespeople are
Pennies and Blood. Mike Bomar
Pennies and Blood Mike Bomar In partial fulfillment of the requirements for the Master of Arts in Teaching with a Specialization in the Teaching of Middle Level Mathematics in the Department of Mathematics.
DESIGN AND ANALYSIS OF ALGORITHMS
CPS 3 DESIGN AND ANALYSIS OF ALGORITHMS Fall 8 Instructor: Herbert Edelsbrunner Teaching Assistant: Zhiqiang Gu CPS 3 Fall Semester of 8 Table of Contents Introduction 3 I DESIGN TECHNIQUES Divide-and-Conquer
Peter Godor MN, NP ICU NP Royal Alexandra Hospital, Edmonton, AB. DYNAMICS 2010: Edmonton, AB September, 2010
Peter Godor MN, NP ICU NP Royal Alexandra Hospital, Edmonton, AB DYNAMICS 2010: Edmonton, AB September, 2010 Nurse Practitioners in Alberta Protected title under the Health Professions Act (HPA) One of
SOLUTIONS: 4.1 Probability Distributions and 4.2 Binomial Distributions
SOLUTIONS: 4.1 Probability Distributions and 4.2 Binomial Distributions 1. The following table contains a probability distribution for a random variable X. a. Find the expected value (mean) of X. x 1 2
VIC Delegate Registration. An Invitation to Alberta Visitor Information Providers (AVIPs)
Spring Training & Showcase 2015 1 of 8 Conference Details What Spring Training & Showcase 2016 When Tuesday, May 3 to Wednesday, May 4, 2016 (Welcome Reception Monday, May 2, 2016) Where Ramada Edmonton
THE P VERSUS NP PROBLEM
THE P VERSUS NP PROBLEM STEPHEN COOK 1. Statement of the Problem The P versus NP problem is to determine whether every language accepted by some nondeterministic algorithm in polynomial time is also accepted
OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012
276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the
A Working Knowledge of Computational Complexity for an Optimizer
A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational
Now we begin our discussion of exploratory data analysis.
Now we begin our discussion of exploratory data analysis. 1 Remember to keep in mind where we are in the big picture. For now, we will assume that the data we are given is a representative sample from
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Characteristics of Binomial Distributions
Lesson2 Characteristics of Binomial Distributions In the last lesson, you constructed several binomial distributions, observed their shapes, and estimated their means and standard deviations. In Investigation
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
2015 Budget Engagement. Building Awareness. Overview
2015 Budget Engagement Overview The City of Edmonton engaged members of the public in the fall and early winter of 2014 on the proposed 2015 Operating Budget, 2015 18 Capital Budget and 2015 Utilities
Cycles and clique-minors in expanders
Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor
A Survey of Zero-Knowledge Proofs with Applications to Cryptography
A Survey of Zero-Knowledge Proofs with Applications to Cryptography Austin Mohr Southern Illinois University at Carbondale Carbondale, IL 62901 E-mail: [email protected] Abstract Zero-knowledge proofs
4 Role Classification
Role Classification of Hosts within Enterprise Networks Based on Connection Patterns Godfrey Tan MIT [email protected] Massimiliano Poletto Mazu Networks [email protected] John Guttag and Frans Kaashoek
Identifying Audience Preferences in Legal and Social Domains
Identifying Audience Preferences in Legal and Social Domains Paul E. Dunne and Trevor Bench-Capon Dept. of Computer Science University of Liverpool Liverpool L69 7ZF, United Kingdom ped,tbc @csc.liv.ac.uk
Out-of-Scope Health Care Spending Account (HCSA)
Out-of-Scope Health Care Spending Account (HCSA) The Supplementary Health Care and Dental Plans provided through your employment with the City of Edmonton offers you and your family considerable protection
Reducing Natural Hazard Risks in New Residential Developments
Reducing Natural Hazard Risks in New Residential Developments Dan Sandink, MA, MScPl Manager, Resilient Communities & Research Institute for Catastrophic Loss Reduction CHBA Urban Council Ottawa Oct. 24,
