GRAPH THEORY LECTURE 4: TREES

Size: px
Start display at page:

Transcription

1 GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection between labeled trees and numeric strings. 3.8 showns how binary trees can be counted by the Catalan recursion. Outline 3.1 Characterizations and Properties of Trees 3.2 Rooted Trees, Ordered Trees, and Binary Trees 3.7 Counting Labeled Trees: Prüfer Encoding 3.8 Counting Binary Trees: Catalan Recursion 1

2 2 GRAPH THEORY LECTURE 4: TREES 1. Characterizations of Trees Review from 1.5 tree = connected graph with no cycles. Def 1.1. In an undirected tree, a leaf is a vertex of degree Basic Properties of Trees. Proposition 1.1. Every tree with at least one edge has at least two leaves. Proof. Let P = v 1, v 2,..., v m be a path of maximum length in a tree T. Etc. v 3 v 1 v 2 v m w v 1 v 2 v 3 w v m Figure 1.1: The two cases in the proof of Prop 1.1.

3 GRAPH THEORY LECTURE 4: TREES 3 Corollary 1.2. If the minimum degree of a graph is at least 2, then that graph must contain a cycle. Proposition 1.3. Every tree on n vertices has exactly n 1 edges. Proof. By induction using Prop 1.1. Review from 2.3 An acyclic graph is called a forest. Review from 2.4 The number of components of a graph G is denoted c(g). Corollary 1.4. A forest G on n vertices has n c(g) edges. Proof. Apply Prop 1.3 to each of the components of G. Corollary 1.5. Any graph G on n vertices has at least n c(g) edges.

4 4 GRAPH THEORY LECTURE 4: TREES Six Different Characterizations of a Tree Trees have many possible characterizations, and each contributes to the structural understanding of graphs in a different way. The following theorem establishes some of the most useful characterizations. Theorem 1.8. Let T be a graph with n vertices. Then the following statements are equivalent. (1) T is a tree. (2) T contains no cycles and has n 1 edges. (3) T is connected and has n 1 edges. (4) T is connected, and every edge is a cut-edge. (5) Any two vertices of T are connected by exactly one path. (6) T contains no cycles, and for any new edge e, the graph T + e has exactly one cycle. Proof. See text.

5 The Center of a Tree Review from 1.4 and 2.3 GRAPH THEORY LECTURE 4: TREES 5 The eccentricity of a vertex v in a graph G, denoted ecc(v), is the distance from v to a vertex farthest from v. That is, ecc(v) = max x V G {d(v, x)} A central vertex of a graph is a vertex with minimum eccentricity. The center of a graph G, denoted Z(G), is the subgraph induced on the set of central vertices of G. In an arbitrary graph G, the center Z(G) can be anything from a single vertex to all of G.

6 6 GRAPH THEORY LECTURE 4: TREES However, C. Jordan showed in 1869 that the center of a tree has only two possible cases. We begin with some preliminary results concerning the eccentricity of vertices in a tree. Lemma 1.9. Let T be a tree with at least three vertices. (a) If v is a leaf of T and w is its neighbor, then ecc(w) = ecc(v) 1 (b) If u is a central vertex of T, then deg(u) 2 Proof. (a) Since T has at least three vertices, deg(w) 2 Then there exists a vertex z v such that d(w, z) = ecc(w) v w z Figure 1.-2: But z is also a vertex farthest from v, and hence ecc(v) = d(v, z) = d(w, z) + 1 = ecc(w) + 1 (b) By Part (a), a vertex of degree 1 cannot have minimum eccentricity in tree T, and hence, cannot be a central vertex of T.

7 GRAPH THEORY LECTURE 4: TREES 7 Lemma Let v and w be two vertices in a tree T such that w is of maximum distance from v (i.e., ecc(v) = d(v, w)). Then w is a leaf. Proof. Let P be the unique v-w path in tree T. If deg(w) 2, then w would have a neighbor z whose distance from v would equal d(v, w) + 1, contradicting the premise that w is at maximum distance. T P v w z Figure 1.-3:

8 8 GRAPH THEORY LECTURE 4: TREES Lemma Let T be a tree with at least three vertices, and let T be the subtree of T obtained by deleting from T all its leaves. If v is a vertex of T, then ecc T (v) = ecc T (v) + 1 Proof. Let w be a vertex of T such that ecc T (v) = d(v, w) By Lemma 1.10, vertex w is a leaf of tree T and hence, w V T (as illustrated in Figure 1.3). It follows that the neighbor of w, say z, is a vertex of T that is farthest from v among all vertices in T, that is, ecc T (v) = d(v, z). Thus, ecc T (v) = d(v, w) = d(v, z) + 1 = ecc T (v) + 1 w z T* T v Figure 1.3:

9 GRAPH THEORY LECTURE 4: TREES 9 Proposition Let T be a tree with at least three vertices, and let T be the subtree of T obtained by deleting from T all its leaves. Then Z(T ) = Z(T ) Proof. From the two preceding lemmas, we see that deleting all the leaves decreases the eccentricity of every remaining vertex by 1. It follows that the resulting tree has the same center. Corollary 1.13 (Jordan, 1869). Let T be an n-vertex tree. Then the center Z(G) is either a single vertex or a single edge. Proof. The assertion is trivially true for n = 1 and n = 2. The result follows by induction, using Proposition 1.12.

10 10 GRAPH THEORY LECTURE 4: TREES Tree Isomorphisms and Automorphisms Example 1.1. The two graphs in Fig 1.4 have the same degree sequence, but they can be readily seen to be non-isom in several ways. For instance, the center of the left graph is a single vertex, but the center of the right graph is a single edge. Also, the two graphs have unequal diameters. Figure 1.4: Why are these trees non-isomorphic?

11 GRAPH THEORY LECTURE 4: TREES 11 Example 1.2. The graph shown in Figure 1.5 below does not have a nontrivial automorphism because the three leaves are all different distances from the center, and hence, an automorphism must map each of them to itself. Figure 1.5: A tree that has no non-trivial automorphisms. Remark 1.1. There is a linear-time algorithm for testing the isomorphism of two trees (see [AhHoUl74, p84]).

12 12 GRAPH THEORY LECTURE 4: TREES Rooted Trees 2. Rooted, Ordered, Binary Trees Def 2.1. A directed tree is a directed graph whose underlying graph is a tree. Def 2.2. A rooted tree is a tree with a designated vertex called the root. Each edge is implicitly directed away from the root. r r Figure 2.1: Two common ways of drawing a rooted tree.

13 Rooted Tree Terminology GRAPH THEORY LECTURE 4: TREES 13 Designating a root imposes a hierarchy on the vertices of a rooted tree, according to their distance from that root. Def 2.3. In a rooted tree, the depth or level of a vertex v is its distance from the root, i.e., the length of the unique path from the root to v. Thus, the root has depth 0. Def 2.4. The height of a rooted tree is the length of a longest path from the root (or the greatest depth in the tree). Def 2.5. If vertex v immediately precedes vertex w on the path from the root to w, then v is parent of w and w is child of v. Def 2.6. Vertices having the same parent are called siblings. Def 2.7. A vertex w is called a descendant of a vertex v (and v is called an ancestor of w), if v is on the unique path from the root to w. If, in addition, w v, then w is a proper descendant of v (and v is a proper ancestor of w).

14 14 GRAPH THEORY LECTURE 4: TREES Def 2.8. A leaf in a rooted tree is any vertex having no children. Def 2.9. An internal vertex in a rooted tree is any vertex that has at least one child. The root is internal, unless the tree is trivial (i.e., a single vertex). Example 2.2. The height of this tree is 3. Also, r, a, b, c, and d are the internal vertices; vertices e, f, g, h, i, and j are the leaves; vertices g, h, and i are siblings; vertex a is an ancestor of j; and j is a descendant of a. r a b c d e f g h i j Figure 2.6:

15 GRAPH THEORY LECTURE 4: TREES 15 Many applications impose an upper bound on the number of children that a given vertex can have. Def An m-ary tree (m 2) is a rooted tree in which every vertex has m or fewer children. Def A complete m-ary tree is an m-ary tree in which every internal vertex has exactly m children and all leaves have the same depth. Example 2.3. Fig 2.7 shows two ternary (3-ary) trees; the one on the left is complete; the other one is not. r r Figure 2.7: Two 3-ary trees: one complete, one incomplete.

16 16 GRAPH THEORY LECTURE 4: TREES Isomorphism of Rooted Trees Def Two rooted trees are said to be isomorphic as rooted trees if there is a graph isomorphism between them that maps root to root. Example 2.4. There are more isomorphism types of rooted trees than there are of trees. Figure 2.8: Isom trees need not be isom as rooted trees.

17 Ordered Trees GRAPH THEORY LECTURE 4: TREES 17 Def An ordered tree is a rooted tree in which the children of each vertex are assigned a fixed ordering. Def In a standard plane drawing of an ordered tree, the root is at the top, the vertices at each level are horizontally aligned, and the left-to-right order of the vertices agrees with their prescribed order. Remark 2.1. In an ordered tree, the prescribed local ordering of the children of each vertex extends to several possible global orderings of the vertices of the tree. One of them, the level order, is equivalent to reading the vertex names top-to-bottom, left-to-right in a standard plane drawing. Level order and three other global orderings, pre-order, post-order, and in-order, are explored in 3.3. Example 2.6. The ordered tree on the left stores the expression a b c, whereas the one on the right stores c a b. - - * c c * a b a b Figure 2.10: Two trees: isom as rooted, not as ordered.

18 18 GRAPH THEORY LECTURE 4: TREES Binary Trees Def A binary tree is an ordered 2-ary tree in which each child is designated either a left-child or a right-child. Figure 2.11: A binary tree of height 4. Def The left (right) subtree of a vertex v in a binary tree is the binary subtree spanning the left (right)-child of v and all of its descendants.

19 GRAPH THEORY LECTURE 4: TREES 19 The mandatory designation of left-child or right-child means that two different binary trees may be indistinguishable when regarded as ordered trees. Figure 2.12: One ordered tree yielding four binary trees. Theorem 2.1. The complete binary tree of height h has 2 h+1 1 vertices. Corollary 2.2. Every binary tree of height h has at most 2 h+1 1 vertices. Figure 2.13: Complete binary tree of ht 3 has 15 vertices.

20 20 GRAPH THEORY LECTURE 4: TREES 7. Counting Labeled Trees The number of n-vertex labeled trees is n n 2, for n 2, and is known as Cayley s Formula Figure 7.1: Two different labeled trees, isom as unlabeled. Sometimes, labeled graphs are merely graphs with labels. At other times, they are a class of graph objects whose isomorphisms must preserve the labels. Cayley s formula counts the number of classes of n-vertex trees under the equivalence relation of label-preserving isomorphism.

21 GRAPH THEORY LECTURE 4: TREES 21 SUPPLEMENT: EXAMPLES OF COUNTING TREES WITH CAYLEY S FORMULA EXAMPLE: T 3 = 3 3!2 = EXAMPLE: T 4 = 4 4!2 = =16 EXAMPLE: T 5 = 5 5!2 = =125

22 22 GRAPH THEORY LECTURE 4: TREES Prüfer Encoding Def 7.1. A Prüfer sequence of length n 2, for n 2, is any sequence of integers between 1 and n, with repetitions allowed. Table 7.1: Prüfer Encoding Algorithm: Prüfer Encoding Input: an n-vertex tree with std 1-based vertex-labels. Output: a Prüfer sequence of length n 2. Initialize T to be the given tree. For i = 1 to n 2 Let v be the 1-valent vertex with the smallest label. Let s i be the label of the only neighbor of v. T := T v. Return sequence s 1, s 2,..., s n 2.

23 Example 7.1. GRAPH THEORY LECTURE 4: TREES 23 Figure 7.2: A labeled tree, to be encoded into a Prüfer sequence S. S = (7, S = (7, 4, Figure 7.3: First two iterations of the Prüfer encoding. S = (7, 4, 4, S = (7, 4, 4, 7, S = (7, 4, 4, 7, 5) Figure 7.4: Last three iterations of the Prüfer encoding.

24 24 GRAPH THEORY LECTURE 4: TREES Notice for the above example that the degree of each vertex is one more than the number of times that its label appears in the Prüfer sequence. The next result shows this is true in general. In the proof, l(u) denotes the label on vertex u. Proposition 7.1. Let d k be the # occurrences of the label k in a Prüfer encoding sequence for a labeled tree T. Then the degree of vertex k in the tree T equals d k + 1. Proof. See text. Prüfer Decoding Table 7.2: Prüfer Decoding Algorithm: Prüfer Decoding Input: a Prüfer sequence of length n 2. Output: an n-vertex tree with std 1-based vertex-labels. Initialize list P as the Prüfer input sequence. Initialize list L as 1,..., n. Initialize forest F as n isolated vertices, labeled 1 to n. For i = 1 to n 2 Let k be the smallest # in list L that is not in list P. Let j be the first number in list P. Add an edge joining the vertices labeled k and j. Remove k from list L. Remove the first occurrence of j from list P. Add an edge joining the vertices labeled with the two numbers in list L. Return F with its vertex-labeling. remaining

25 GRAPH THEORY LECTURE 4: TREES 25 Example 7.2. Decoding for the input seq 7, 4, 4, 7, 5. L = 1, 2, 3, 4, 5, 6, 7 P = 7, 4, 4, 7, 5 L = 2, 3, 4, 5, 6, 7 P = 4, 4, 7, 5 L = 3, 4, 5, 6, 7 P = 4, 7, 5 L = 4, 5, 6, 7 P = 7, 5

26 26 GRAPH THEORY LECTURE 4: TREES L = 5, 6, 7 P = 5 L = 5, 7 Theorem 7.4 (Cayley s Tree Formula). The number of different trees on n labeled vertices is n n 2. Proof. Details in text. Remark 7.1. A slightly different view of Cayley s Tree Formula is that it gives us the number of different spanning trees of the complete graph K n. The next chapter is devoted to spanning trees.

27 GRAPH THEORY LECTURE 4: TREES Counting Binary Trees Let b n denote the number of binary trees on n vertices. Then b n = b 0 b n 1 + b 1 b n b n 1 b 0 This recurrence relation is known as the Catalan recursion, and the quantity b n is called the n th Catalan number. Example 8.1. Applying the Catalan recursion to the cases n = 2 and n = 3 yields b 2 = 2 and b 3 = 5. Figure 8.1 shows the five different binary trees on 3 vertices. Figure 8.1: The five different binary trees on 3 vertices. With the aid of generating functions, it is possible to derive the following closed formula for b n. Theorem 8.1. The number b n of different binary trees on n vertices is given by b n = 1 ( ) 2n n + 1 n

28 28 GRAPH THEORY LECTURE 4: TREES 9. Supplementary Exercises Exercise 3 What are the minimum and maximum number of vertex orbits in an n-vertex tree? Exercise 16 Exercise 17 Prove that there is no 5-vertex rigid tree. Prove that there is no 6-vertex rigid tree.

Outline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1

GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept

Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

1 Definitions. Supplementary Material for: Digraphs. Concept graphs

Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

Full and Complete Binary Trees

Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

A Turán Type Problem Concerning the Powers of the Degrees of a Graph

A Turán Type Problem Concerning the Powers of the Degrees of a Graph Yair Caro and Raphael Yuster Department of Mathematics University of Haifa-ORANIM, Tivon 36006, Israel. AMS Subject Classification:

Network File Storage with Graceful Performance Degradation

Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

Binary Search Trees CMPSC 122

Binary Search Trees CMPSC 122 Note: This notes packet has significant overlap with the first set of trees notes I do in CMPSC 360, but goes into much greater depth on turning BSTs into pseudocode than

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

Mathematical Induction. Lecture 10-11

Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach

Graph Theory Problems and Solutions

raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

Analysis of Algorithms I: Binary Search Trees

Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

Code No: R05220502 Set No. 1 1. (a) Describe the performance analysis in detail. (b) Show that f 1 (n)+f 2 (n) = 0(max(g 1 (n), g 2 (n)) where f 1 (n) = 0(g 1 (n)) and f 2 (n) = 0(g 2 (n)). [8+8] 2. (a)

The chromatic spectrum of mixed hypergraphs

The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex

On Some Vertex Degree Based Graph Invariants

MATCH Communications in Mathematical and in Computer Chemistry MATCH Commun. Math. Comput. Chem. 65 (20) 723-730 ISSN 0340-6253 On Some Vertex Degree Based Graph Invariants Batmend Horoldagva a and Ivan

An algorithmic classification of open surfaces

An algorithmic classification of open surfaces Sylvain Maillot January 8, 2013 Abstract We propose a formulation for the homeomorphism problem for open n-dimensional manifolds and use the Kerekjarto classification

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs

MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set

The positive minimum degree game on sparse graphs

The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA jobal@math.uiuc.edu András Pluhár Department of Computer Science University

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

root node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain

inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each

Ordered Lists and Binary Trees

Data Structures and Algorithms Ordered Lists and Binary Trees Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/62 6-0:

Cycles and clique-minors in expanders

Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor

Any two nodes which are connected by an edge in a graph are called adjacent node.

. iscuss following. Graph graph G consist of a non empty set V called the set of nodes (points, vertices) of the graph, a set which is the set of edges and a mapping from the set of edges to a set of pairs

On Pebbling Graphs by their Blocks

On Pebbling Graphs by their Blocks Dawn Curtis, Taylor Hines, Glenn Hurlbert, Tatiana Moyer Department of Mathematics and Statistics Arizona State University, Tempe, AZ 85287-1804 November 19, 2008 dawn.curtis@asu.edu

6.852: Distributed Algorithms Fall, 2009. Class 2

.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

Large induced subgraphs with all degrees odd

Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

Midterm Practice Problems

6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005

Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable

Analysis of Algorithms, I

Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

Mathematics for Algorithm and System Analysis

Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface

Binary Search Trees (BST)

Binary Search Trees (BST) 1. Hierarchical data structure with a single reference to node 2. Each node has at most two child nodes (a left and a right child) 3. Nodes are organized by the Binary Search

Connectivity and cuts

Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every

Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees

Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph

Tree-representation of set families and applications to combinatorial decompositions

Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. buixuan@ii.uib.no

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

From Last Time: Remove (Delete) Operation

CSE 32 Lecture : More on Search Trees Today s Topics: Lazy Operations Run Time Analysis of Binary Search Tree Operations Balanced Search Trees AVL Trees and Rotations Covered in Chapter of the text From

Data Structures Fibonacci Heaps, Amortized Analysis

Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:

Finding and counting given length cycles

Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected

Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy

Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety

Product irregularity strength of certain graphs

Also available at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 7 (014) 3 9 Product irregularity strength of certain graphs Marcin Anholcer

Solutions to Homework 6

Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt

A binary search tree is a binary tree with a special property called the BST-property, which is given as follows:

Chapter 12: Binary Search Trees A binary search tree is a binary tree with a special property called the BST-property, which is given as follows: For all nodes x and y, if y belongs to the left subtree

Total colorings of planar graphs with small maximum degree

Total colorings of planar graphs with small maximum degree Bing Wang 1,, Jian-Liang Wu, Si-Feng Tian 1 Department of Mathematics, Zaozhuang University, Shandong, 77160, China School of Mathematics, Shandong

On the k-path cover problem for cacti

On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

A New Marketing Channel Management Strategy Based on Frequent Subtree Mining

A New Marketing Channel Management Strategy Based on Frequent Subtree Mining Daoping Wang Peng Gao School of Economics and Management University of Science and Technology Beijing ABSTRACT For most manufacturers,

Balloons, Cut-Edges, Matchings, and Total Domination in Regular Graphs of Odd Degree

Balloons, Cut-Edges, Matchings, and Total Domination in Regular Graphs of Odd Degree Suil O, Douglas B. West November 9, 2008; revised June 2, 2009 Abstract A balloon in a graph G is a maximal 2-edge-connected

Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R

Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

Exam study sheet for CS2711. List of topics

Exam study sheet for CS2711 Here is the list of topics you need to know for the final exam. For each data structure listed below, make sure you can do the following: 1. Give an example of this data structure

Odd induced subgraphs in graphs of maximum degree three

Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.

7 Catalan Numbers Thomas A. Dowling, Department of Mathematics, Ohio State Uni- Author: versity. Prerequisites: The prerequisites for this chapter are recursive definitions, basic counting principles,

3. Eulerian and Hamiltonian Graphs

3. Eulerian and Hamiltonian Graphs There are many games and puzzles which can be analysed by graph theoretic concepts. In fact, the two early discoveries which led to the existence of graphs arose from

Lecture 17 : Equivalence and Order Relations DRAFT

CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion

DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY

DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY BARBARA F. CSIMA, JOHANNA N. Y. FRANKLIN, AND RICHARD A. SHORE Abstract. We study arithmetic and hyperarithmetic degrees of categoricity. We extend

Data Structures and Algorithms

Data Structures and Algorithms CS245-2016S-06 Binary Search Trees David Galles Department of Computer Science University of San Francisco 06-0: Ordered List ADT Operations: Insert an element in the list

BOUNDARY EDGE DOMINATION IN GRAPHS

BULLETIN OF THE INTERNATIONAL MATHEMATICAL VIRTUAL INSTITUTE ISSN (p) 0-4874, ISSN (o) 0-4955 www.imvibl.org /JOURNALS / BULLETIN Vol. 5(015), 197-04 Former BULLETIN OF THE SOCIETY OF MATHEMATICIANS BANJA

Generalized Induced Factor Problems

Egerváry Research Group on Combinatorial Optimization Technical reports TR-2002-07. Published by the Egrerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis. Contents. Introduction. Maarten van Steen. Version: April 28, 2014

Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R.0, steen@cs.vu.nl Chapter 0: Version: April 8, 0 / Contents Chapter Description 0: Introduction

Discrete Mathematics Problems

Discrete Mathematics Problems William F. Klostermeyer School of Computing University of North Florida Jacksonville, FL 32224 E-mail: wkloster@unf.edu Contents 0 Preface 3 1 Logic 5 1.1 Basics...............................

Graph Theory and Complex Networks: An Introduction. Chapter 06: Network analysis

Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.0, steen@cs.vu.nl Chapter 06: Network analysis Version: April 8, 04 / 3 Contents Chapter

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,

Helvetic Coding Contest 2016

Helvetic Coding Contest 6 Solution Sketches July, 6 A Collective Mindsets Author: Christian Kauth A Strategy: In a bottom-up approach, we can determine how many brains a zombie of a given rank N needs

Introduction to Graph Theory

Introduction to Graph Theory Allen Dickson October 2006 1 The Königsberg Bridge Problem The city of Königsberg was located on the Pregel river in Prussia. The river divided the city into four separate

Shortest Inspection-Path. Queries in Simple Polygons

Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,

Approximation Algorithms

Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb

Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations

Automated Plausibility Analysis of Large Phylogenies

Automated Plausibility Analysis of Large Phylogenies Bachelor Thesis of David Dao At the Department of Informatics Institute of Theoretical Computer Science Reviewers: Advisors: Prof. Dr. Alexandros Stamatakis

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

Best Monotone Degree Bounds for Various Graph Parameters

Best Monotone Degree Bounds for Various Graph Parameters D. Bauer Department of Mathematical Sciences Stevens Institute of Technology Hoboken, NJ 07030 S. L. Hakimi Department of Electrical and Computer

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

3. Mathematical Induction

3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

Social Media Mining. Graph Essentials

Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

Combinatorial 5/6-approximation of Max Cut in graphs of maximum degree 3

Combinatorial 5/6-approximation of Max Cut in graphs of maximum degree 3 Cristina Bazgan a and Zsolt Tuza b,c,d a LAMSADE, Université Paris-Dauphine, Place du Marechal de Lattre de Tassigny, F-75775 Paris

On the Number of Planar Orientations with Prescribed Degrees

On the Number of Planar Orientations with Prescribed Degrees Stefan Felsner Florian Zickfeld Technische Universität Berlin, Fachbereich Mathematik Straße des 7. Juni 6, 06 Berlin, Germany {felsner,zickfeld}@math.tu-berlin.de

SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH

CHAPTER 3 SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH ABSTRACT This chapter begins with the notion of block distances in graphs. Using block distance we defined the central tendencies of a block, like B-radius

6.2 Permutations continued

6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

Classification/Decision Trees (II)

Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).

8.1 Min Degree Spanning Tree

CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

Binary Trees and Huffman Encoding Binary Search Trees

Binary Trees and Huffman Encoding Binary Search Trees Computer Science E119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Motivation: Maintaining a Sorted Collection of Data A data dictionary

Even Faster Algorithm for Set Splitting!

Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

Lecture 22: November 10

CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

Algorithms and Data Structures

Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2