Undirected Connectivity in Log Space - O. Reingold

Similar documents
(67902) Topics in Theory and Complexity Nov 2, Lecture 7

Midterm Practice Problems

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

5.1 Bipartite Matching

Approximation Algorithms

Class One: Degree Sequences

Analysis of Algorithms, I

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

Every tree contains a large induced subgraph with all degrees odd

CS311H. Prof: Peter Stone. Department of Computer Science The University of Texas at Austin

Notes on NP Completeness

Connectivity and cuts

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Euler Paths and Euler Circuits

The Open University s repository of research publications and other research outputs

2. (a) Explain the strassen s matrix multiplication. (b) Write deletion algorithm, of Binary search tree. [8+8]

BOUNDARY EDGE DOMINATION IN GRAPHS

SEMITOTAL AND TOTAL BLOCK-CUTVERTEX GRAPH

Social Media Mining. Graph Essentials

Part 2: Community Detection

CMPSCI611: Approximating MAX-CUT Lecture 20

Max Flow, Min Cut, and Matchings (Solution)

On Integer Additive Set-Indexers of Graphs

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

CAD Algorithms. P and NP

Introduction to Logic in Computer Science: Autumn 2006

Graphical degree sequences and realizations

Simple Graphs Degrees, Isomorphism, Paths

Small Maximal Independent Sets and Faster Exact Graph Coloring

Course on Social Network Analysis Graphs and Networks

On the Unique Games Conjecture

5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.

Product irregularity strength of certain graphs

Un survol de la domination de puissance dans les graphes

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms

Entropy Waves, The Zig-Zag Graph Product, and New Constant-Degree Expanders

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

Large induced subgraphs with all degrees odd

On the Relationship between Classes P and NP

How To Solve A K Path In Time (K)

Lecture 7: NP-Complete Problems

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

Warshall s Algorithm: Transitive Closure

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, Chapter 7: Digraphs

Algorithm Design and Analysis

arxiv: v1 [math.co] 7 Mar 2012

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

OHJ-2306 Introduction to Theoretical Computer Science, Fall

The Independence Number in Graphs of Maximum Degree Three

All trees contain a large induced subgraph having all degrees 1 (mod k)

8.1 Min Degree Spanning Tree

GRAPH THEORY LECTURE 4: TREES

Degree Hypergroupoids Associated with Hypergraphs

Minimum cost maximum flow, Minimum cost circulation, Cost/Capacity scaling

CIS 700: algorithms for Big Data

CSC 373: Algorithm Design and Analysis Lecture 16

High degree graphs contain large-star factors

Finding and counting given length cycles

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

P. Jeyanthi and N. Angel Benseera

Theoretical Computer Science (Bridging Course) Complexity

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

CS 103X: Discrete Structures Homework Assignment 3 Solutions

DATA ANALYSIS II. Matrix Algorithms

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Welcome to... Problem Analysis and Complexity Theory , 3 VU

Boolean Algebra Part 1

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

Reminder: Complexity (1) Parallel Complexity Theory. Reminder: Complexity (2) Complexity-new

Reminder: Complexity (1) Parallel Complexity Theory. Reminder: Complexity (2) Complexity-new GAP (2) Graph Accessibility Problem (GAP) (1)


! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Practical Graph Mining with R. 5. Link Analysis

5 Directed acyclic graphs

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

(LMCS, p. 317) V.1. First Order Logic. This is the most powerful, most expressive logic that we will examine.

Technology, Kolkata, INDIA,

Graphs without proper subgraphs of minimum degree 3 and short cycles

NP-Completeness I. Lecture Overview Introduction: Reduction and Expressiveness

On the Multiple Unicast Network Coding Conjecture

1 The Line vs Point Test

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

CSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) Total 92.

Cameron Liebler line classes

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Lecture 1: Course overview, circuits, and formulas

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Cycles and clique-minors in expanders

Graph Theory Problems and Solutions

ON DEGREES IN THE HASSE DIAGRAM OF THE STRONG BRUHAT ORDER

each college c i C has a capacity q i - the maximum number of students it will admit

Minimum degree condition forcing complete graph immersion

Best Monotone Degree Bounds for Various Graph Parameters

Cycle transversals in bounded degree graphs

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

Transcription:

CS 640 Course Presentation Undirected Connectivity in Log Space - O. Reingold Keerti Choudhary

Contents Background Main Idea Expander Graphs Powering Replacement Product Zig-zag Product Main Transformation Implementation Bounding the degree Rotation Map

Background

Background SL is class of problems solvable by symmetric nondeterministic TM in log space. USTCON (Undirected s-t connectivity) was shown to be complete for class SL. L SL NL. This paper proves that USTCON can be solved in log space, thus proving L=SL.

Background SL is class of problems solvable by symmetric nondeterministic TM in log space. L SL NL.

Background SL is class of problems solvable by symmetric nondeterministic TM in log space. L SL NL. USTCON (Undirected s-t connectivity) was proved to be complete for class SL.

Background SL is class of problems solvable by symmetric nondeterministic TM in log space. L SL NL. USTCON (Undirected s-t connectivity) was proved to be complete for class SL. This paper proves that USTCON can be solved in log space, thus shows L=SL.

Main Idea

Main Idea Suppose a undirected graph G has max degree bounded by D and diameter bounded by.

Main Idea Suppose a undirected graph G has max degree bounded by D and diameter bounded by. Then s-t connectivity can be solved in space.

Main Idea Suppose a undirected graph G has max degree bounded by D and diameter bounded by. Then s-t connectivity can be solved in space. So, we will convert G to a new graph satisfying degree bounded by some constant c diameter is.

Expander Graphs

Expander Graphs A D-regular graph is -expander if any set S of size less than n/2 has closed neighbourhood of size at least (1+ ) S.

Expander Graphs A D-regular graph is -expander if any set S of size less than n/2 has closed neighbourhood of size at least (1+ ) S. Diameter of such graphs is bounded by.

Expander Graphs A D-regular graph is -expander if any set S of size less than n/2 has closed neighbourhood of size at least (1+ ) S. Diameter of such graphs is bounded by. Idea is to convert G to an expander graph whose degree is also bounded.

Expander Graphs

Expander Graphs Regular graphs with small second largest eigen value ( ) of normalised adjacency matrix.

Expander Graphs Regular graphs with small second largest eigen value ( ) of normalised adjacency matrix. For every D, ( <1), there exist >0 such that all D-regular graphs with second largest eigen value bounded by are -expander.

Expander Graphs Regular graphs with small second largest eigen value ( ) of normalised adjacency matrix. For every D, ( <1), there exist >0 such that all D-regular graphs with second largest eigen value bounded by are -expander. To convert G to an expander graph we need to bound its.

Powering

Powering Squaring of the graph reduces the second largest eigen value to. As, so squaring the graph times would bound. But the cost is that degree will also be squared. Note - squaring should not affect connectivity, so before powering we add a loop on on all the vertices.

Powering Squaring of the graph reduces the second largest eigen value to. As, so squaring the graph times would bound.

Powering Squaring of the graph reduces the second largest eigen value to. As, so squaring the graph times would bound. But the cost is that degree will also be squared.

Bounding the degree

Two methods - Bounding the degree

Bounding the degree Two methods - 1. Replacement Product

Bounding the degree Two methods - 1. Replacement Product 2. Zig-zag Product

Rotation Map In graph G, iff, u v vertex in adjacency list of u is v, and vertex in adjacency list of v is u.

Replacement Product

Replacement Product Given a D-regular graph G, and a d-regular (d<<d) connected graph H on D vertices. Replace each vertex of G by H.

Replacement Product u v

Replacement Product u v

Replacement Product Given a D-regular graph G, and a d-regular (d<<d) connected graph H on D vertices. Replace each vertex of G by H. New graph is a d+1 regular.

Zig-zag Product

Zig-zag Product (a,d) is an edge in replacement product satisfying - iff a b c d is a path in

Zig-zag Product (a,d) is an edge in replacement product satisfying - iff a b c d is a path in (a,b) and (c,d) are edges in different instances of H

Zig-zag Product (a,d) is an edge in replacement product satisfying - iff a b c d is a path in (a,b) and (c,d) are edges in different instances of H (b,c) corresponds to edge of G.

Zig-zag Product (a,d) is an edge in replacement product satisfying - iff a b c d is a path in (a,b) and (c,d) are edges in different instances of H (b,c) corresponds to edge of G. a b a c d d

Zig-zag Product

Zig-zag Product So, if G is D-regular and H is d-regular than, is -regular.

Zig-zag Product So, if G is D-regular and H is d-regular than, is -regular. THEOREM - If G is an -graph and H is a aaaa -graph, then

Zig-zag Product So, if G is D-regular and H is d-regular than, is -regular. THEOREM - If G is an -graph and H is a aaaa -graph, then! Here of the new graph is bounded above.

Main Transformation

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,.

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,. Let. For i=1 to, define

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,. Let. For i=1 to, define Then,. Proof Idea : - -

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,. Let. For i=1 to, define Then,. Proof Idea : - -

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,. Let. For i=1 to, define Then,. Proof Idea : - -

Main Transformation is non-bipartite -regular graph on N vertices, H is D-regular graph on vertices. Also,. Let. For i=1 to, define Then,. Proof Idea : - -

Main Transformation Converting G to regular graph of size N= : Each vertex ( ) is replaced by a n-cycle ( ). If, then is an edge in. Multiple loops are added to each vertex in until its degree reaches. H is of constant size and can be encoded in TM.

Main Transformation Converting G to regular graph of size N= : Each vertex ( ) is replaced by a n-cycle ( ). If, then is an edge in. Multiple loops are added to each vertex in until its degree reaches. H is of constant size and can be encoded in TM.

Main Transformation Converting G to regular graph of size N= : Each vertex ( ) is replaced by a n-cycle ( ). If, then is an edge in. Multiple loops are added to each vertex in until its degree reaches. H is of constant size and can be encoded in TM.

Main Transformation Converting G to regular graph of size N= : Each vertex ( ) is replaced by a n-cycle ( ). If, then is an edge in. Multiple loops are added to each vertex in until its degree reaches. H is of constant size and can be encoded in TM.

Main Transformation Converting G to regular graph of size N= : Each vertex ( ) is replaced by a n-cycle ( ). If, then is an edge in. Multiple loops are added to each vertex in until its degree reaches. H is of constant size and can be encoded in TM.

Implementation

Simpler Case : Implementation

Implementation Simpler Case : Another copy of

Implementation Simpler Case : Another copy of Replacement product

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Another copy of Replacement product Now, we want to compute its neighbour and,

Implementation

Implementation will be of size, and any vertex

Implementation will be of size, and any vertex! We need to compute the rotation map in log space.

Main Algorithm Implementation

THANK YOU