Spectral Aspects of Cocliques in Graphs
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Investigations on Unit Distance Property of Clebsch Graph and Its Complement
Proceedings of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K. Investigations on Unit Distance Property of Clebsch Graph and Its Complement Pratima Panigrahi and Uma kant Sahoo ∗yz Abstract|An n-dimensional unit distance graph is on parameters (16,5,0,2) and (16,10,6,6) respectively. a simple graph which can be drawn on n-dimensional These graphs are known to be unique in the respective n Euclidean space R so that its vertices are represented parameters [2]. In this paper we give unit distance n by distinct points in R and edges are represented by representation of Clebsch graph in the 3-dimensional Eu- closed line segments of unit length. In this paper we clidean space R3. Also we show that the complement of show that the Clebsch graph is 3-dimensional unit Clebsch graph is not a 3-dimensional unit distance graph. distance graph, but its complement is not. Keywords: unit distance graph, strongly regular The Petersen graph is the strongly regular graph on graphs, Clebsch graph, Petersen graph. parameters (10,3,0,1). This graph is also unique in its parameter set. It is known that Petersen graph is 2-dimensional unit distance graph (see [1],[3],[10]). It is In this article we consider only simple graphs, i.e. also known that Petersen graph is a subgraph of Clebsch undirected, loop free and with no multiple edges. The graph, see [[5], section 10.6]. study of dimension of graphs was initiated by Erdos et.al [3]. -
Maximizing the Order of a Regular Graph of Given Valency and Second Eigenvalue∗
SIAM J. DISCRETE MATH. c 2016 Society for Industrial and Applied Mathematics Vol. 30, No. 3, pp. 1509–1525 MAXIMIZING THE ORDER OF A REGULAR GRAPH OF GIVEN VALENCY AND SECOND EIGENVALUE∗ SEBASTIAN M. CIOABA˘ †,JACKH.KOOLEN‡, HIROSHI NOZAKI§, AND JASON R. VERMETTE¶ Abstract. From Alon√ and Boppana, and Serre, we know that for any given integer k ≥ 3 and real number λ<2 k − 1, there are only finitely many k-regular graphs whose second largest eigenvalue is at most λ. In this paper, we investigate the largest number of vertices of such graphs. Key words. second eigenvalue, regular graph, expander AMS subject classifications. 05C50, 05E99, 68R10, 90C05, 90C35 DOI. 10.1137/15M1030935 1. Introduction. For a k-regular graph G on n vertices, we denote by λ1(G)= k>λ2(G) ≥ ··· ≥ λn(G)=λmin(G) the eigenvalues of the adjacency matrix of G. For a general reference on the eigenvalues of graphs, see [8, 17]. The second eigenvalue of a regular graph is a parameter of interest in the study of graph connectivity and expanders (see [1, 8, 23], for example). In this paper, we investigate the maximum order v(k, λ) of a connected k-regular graph whose second largest eigenvalue is at most some given parameter λ. As a consequence of work of Alon and Boppana and of Serre√ [1, 11, 15, 23, 24, 27, 30, 34, 35, 40], we know that v(k, λ) is finite for λ<2 k − 1. The recent result of Marcus, Spielman, and Srivastava [28] showing the existence of infinite families of√ Ramanujan graphs of any degree at least 3 implies that v(k, λ) is infinite for λ ≥ 2 k − 1. -
Lecture 4 1 the Permanent of a Matrix
Grafy a poˇcty - NDMI078 April 2009 Lecture 4 M. Loebl J.-S. Sereni 1 The permanent of a matrix 1.1 Minc's conjecture The set of permutations of f1; : : : ; ng is Sn. Let A = (ai;j)1≤i;j≤n be a square matrix with real non-negative entries. The permanent of the matrix A is n X Y perm(A) := ai,σ(i) : σ2Sn i=1 In 1973, Br`egman[4] proved M´ınc’sconjecture [18]. n×n Pn Theorem 1 (Br`egman,1973). Let A = (ai;j)1≤i;j≤n 2 f0; 1g . Set ri := j=1 ai;j. Then, n Y 1=ri perm(A) ≤ (ri!) : i=1 Further, if ri > 0 for every i 2 f1; 2; : : : ; ng, then there is equality if and only if up to permutations of rows and columns, A is a block-diagonal matrix, each block being a square matrix with all entries equal to 1. Several proofs of this result are known, the original being combinatorial. In 1978, Schrijver [22] found a neat and short proof. A probabilistic description of this proof is presented in the book of Alon and Spencer [3, Chapter 2]. The one we will see in Lecture 5 uses the concept of entropy, and was found by Radhakrishnan [20] in the late nineties. It is a nice illustration of the use of entropy to count combinatorial objects. 1.2 The van der Waerden conjecture A square matrix M = (mij)1≤i;j≤n of non-negative real numbers is doubly stochastic if the sum of the entries of every line is equal to 1, and the same holds for the sum of the entries of each column. -
Lecture 12 – the Permanent and the Determinant
Lecture 12 { The permanent and the determinant Uriel Feige Department of Computer Science and Applied Mathematics The Weizman Institute Rehovot 76100, Israel [email protected] June 23, 2014 1 Introduction Given an order n matrix A, its permanent is X Yn per(A) = aiσ(i) σ i=1 where σ ranges over all permutations on n elements. Its determinant is X Yn σ det(A) = (−1) aiσ(i) σ i=1 where (−1)σ is +1 for even permutations and −1 for odd permutations. A permutation is even if it can be obtained from the identity permutation using an even number of transpo- sitions (where a transposition is a swap of two elements), and odd otherwise. For those more familiar with the inductive definition of the determinant, obtained by developing the determinant by the first row of the matrix, observe that the inductive defini- tion if spelled out leads exactly to the formula above. The same inductive definition applies to the permanent, but without the alternating sign rule. The determinant can be computed in polynomial time by Gaussian elimination, and in time n! by fast matrix multiplication. On the other hand, there is no polynomial time algorithm known for computing the permanent. In fact, Valiant showed that the permanent is complete for the complexity class #P , which makes computing it as difficult as computing the number of solutions of NP-complete problems (such as SAT, Valiant's reduction was from Hamiltonicity). For 0/1 matrices, the matrix A can be thought of as the adjacency matrix of a bipartite graph (we refer to it as a bipartite adjacency matrix { technically, A is an off-diagonal block of the usual adjacency matrix), and then the permanent counts the number of perfect matchings. -
3.1 Matchings and Factors: Matchings and Covers
1 3.1 Matchings and Factors: Matchings and Covers This copyrighted material is taken from Introduction to Graph Theory, 2nd Ed., by Doug West; and is not for further distribution beyond this course. These slides will be stored in a limited-access location on an IIT server and are not for distribution or use beyond Math 454/553. 2 Matchings 3.1.1 Definition A matching in a graph G is a set of non-loop edges with no shared endpoints. The vertices incident to the edges of a matching M are saturated by M (M-saturated); the others are unsaturated (M-unsaturated). A perfect matching in a graph is a matching that saturates every vertex. perfect matching M-unsaturated M-saturated M Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 3 Perfect Matchings in Complete Bipartite Graphs a 1 The perfect matchings in a complete b 2 X,Y-bigraph with |X|=|Y| exactly c 3 correspond to the bijections d 4 f: X -> Y e 5 Therefore Kn,n has n! perfect f 6 matchings. g 7 Kn,n The complete graph Kn has a perfect matching iff… Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 4 Perfect Matchings in Complete Graphs The complete graph Kn has a perfect matching iff n is even. So instead of Kn consider K2n. We count the perfect matchings in K2n by: (1) Selecting a vertex v (e.g., with the highest label) one choice u v (2) Selecting a vertex u to match to v K2n-2 2n-1 choices (3) Selecting a perfect matching on the rest of the vertices. -
Matchgates Revisited
THEORY OF COMPUTING, Volume 10 (7), 2014, pp. 167–197 www.theoryofcomputing.org RESEARCH SURVEY Matchgates Revisited Jin-Yi Cai∗ Aaron Gorenstein Received May 17, 2013; Revised December 17, 2013; Published August 12, 2014 Abstract: We study a collection of concepts and theorems that laid the foundation of matchgate computation. This includes the signature theory of planar matchgates, and the parallel theory of characters of not necessarily planar matchgates. Our aim is to present a unified and, whenever possible, simplified account of this challenging theory. Our results include: (1) A direct proof that the Matchgate Identities (MGI) are necessary and sufficient conditions for matchgate signatures. This proof is self-contained and does not go through the character theory. (2) A proof that the MGI already imply the Parity Condition. (3) A simplified construction of a crossover gadget. This is used in the proof of sufficiency of the MGI for matchgate signatures. This is also used to give a proof of equivalence between the signature theory and the character theory which permits omittable nodes. (4) A direct construction of matchgates realizing all matchgate-realizable symmetric signatures. ACM Classification: F.1.3, F.2.2, G.2.1, G.2.2 AMS Classification: 03D15, 05C70, 68R10 Key words and phrases: complexity theory, matchgates, Pfaffian orientation 1 Introduction Leslie Valiant introduced matchgates in a seminal paper [24]. In that paper he presented a way to encode computation via the Pfaffian and Pfaffian Sum, and showed that a non-trivial, though restricted, fragment of quantum computation can be simulated in classical polynomial time. Underlying this magic is a way to encode certain quantum states by a classical computation of perfect matchings, and to simulate certain ∗Supported by NSF CCF-0914969 and NSF CCF-1217549. -
The Geometry of Dimer Models
THE GEOMETRY OF DIMER MODELS DAVID CIMASONI Abstract. This is an expanded version of a three-hour minicourse given at the winterschool Winterbraids IV held in Dijon in February 2014. The aim of these lectures was to present some aspects of the dimer model to a geometri- cally minded audience. We spoke neither of braids nor of knots, but tried to show how several geometrical tools that we know and love (e.g. (co)homology, spin structures, real algebraic curves) can be applied to very natural problems in combinatorics and statistical physics. These lecture notes do not contain any new results, but give a (relatively original) account of the works of Kaste- leyn [14], Cimasoni-Reshetikhin [4] and Kenyon-Okounkov-Sheffield [16]. Contents Foreword 1 1. Introduction 1 2. Dimers and Pfaffians 2 3. Kasteleyn’s theorem 4 4. Homology, quadratic forms and spin structures 7 5. The partition function for general graphs 8 6. Special Harnack curves 11 7. Bipartite graphs on the torus 12 References 15 Foreword These lecture notes were originally not intended to be published, and the lectures were definitely not prepared with this aim in mind. In particular, I would like to arXiv:1409.4631v2 [math-ph] 2 Nov 2015 stress the fact that they do not contain any new results, but only an exposition of well-known results in the field. Also, I do not claim this treatement of the geometry of dimer models to be complete in any way. The reader should rather take these notes as a personal account by the author of some selected chapters where the words geometry and dimer models are not completely irrelevant, chapters chosen and organized in order for the resulting story to be almost self-contained, to have a natural beginning, and a happy ending. -
Lectures 4 and 6 Lecturer: Michel X
18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the matching problem. Our goal is to derive an algebraic test for deciding if a graph G = (V; E) has a perfect matching. We may assume that the number of vertices is even since this is a necessary condition for having a perfect matching. First, we will define a few basic needed notations. Definition 1 A skew-symmetric matrix A is a square matrix which satisfies AT = −A, i.e. if A = (aij) we have aij = −aji for all i; j. For a graph G = (V; E) with jV j = n and jEj = m, we construct a n × n skew-symmetric matrix A = (aij) with an entry aij = −aji for each edge (i; j) 2 E and aij = 0 if (i; j) is not an edge; the values aij for the edges will be specified later. Recall: Definition 2 The determinant of matrix A is n X Y det(A) = sgn(σ) aiσ(i) σ2Sn i=1 where Sn is the set of all permutations of n elements and the sgn(σ) is defined to be 1 if the number of inversions in σ is even and −1 otherwise. Note that for a skew-symmetric matrix A, det(A) = det(−AT ) = (−1)n det(A). So if n is odd we have det(A) = 0. Consider K4, the complete graph on 4 vertices, and thus 0 1 0 a12 a13 a14 B−a12 0 a23 a24C A = B C : @−a13 −a23 0 a34A −a14 −a24 −a34 0 By computing its determinant one observes that 2 det(A) = (a12a34 − a13a24 + a14a23) : First, it is the square of a polynomial q(a) in the entries of A, and moreover this polynomial has a monomial precisely for each perfect matching of K4. -
A New Approach to the Snake-In-The-Box Problem
462 ECAI 2012 Luc De Raedt et al. (Eds.) © 2012 The Author(s). This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License. doi:10.3233/978-1-61499-098-7-462 A New Approach to the Snake-In-The-Box Problem David Kinny1 Abstract. The “Snake-In-The-Box” problem, first described more Research on the SIB problem initially focused on applications in than 50 years ago, is a hard combinatorial search problem whose coding [14]. Coils are spread-k circuit codes for k =2, in which solutions have many practical applications. Until recently, techniques n-words k or more positions apart in the code differ in at least k based on Evolutionary Computation have been considered the state- bit positions [12]. (The well-known Gray codes are spread-1 circuit of-the-art for solving this deterministic maximization problem, and codes.) Longest snakes and coils provide the maximum number of held most significant records. This paper reviews the problem and code words for a given word size (i.e., hypercube dimension). prior solution techniques, then presents a new technique, based on A related application is in encoding schemes for analogue-to- Monte-Carlo Tree Search, which finds significantly better solutions digital converters including shaft (rotation) encoders. Longest SIB than prior techniques, is considerably faster, and requires no tuning. codes provide greatest resolution, and single bit errors are either recognised as such or map to an adjacent codeword causing an off- 1 INTRODUCTION by-one error. -
Degree in Mathematics
Degree in Mathematics Title: An Experimental Study of the Minimum Linear Colouring Arrangement Problem. Author: Montserrat Brufau Vidal Advisor: Maria José Serna Iglesias Department: Computer Science Department Academic year: 2016-2017 ii An experimental study of the Minimum Linear Colouring Arrangement Problem Author: Montserrat Brufau Vidal Advisor: Maria Jos´eSerna Iglesias Facultat de Matem`atiquesi Estad´ıstica Universitat Polit`ecnicade Catalunya 26th June 2017 ii Als meus pares; a la Maria pel seu suport durant el projecte; al meu poble, Men`arguens. iii iv Abstract The Minimum Linear Colouring Arrangement problem (MinLCA) is a variation from the Min- imum Linear Arrangement problem (MinLA) and the Colouring problem. The objective of the MinLA problem is finding the best way of labelling each vertex of a graph in such a manner that the sum of the induced distances between two adjacent vertices is the minimum. In our case, instead of labelling each vertex with a different integer, we group them with the condition that two adjacent vertices cannot be in the same group, or equivalently, by allowing the vertex labelling to be a proper colouring of the graph. In this project, we undertake the task of broadening the previous studies for the MinLCA problem. The main goal is developing some exact algorithms based on backtracking and some heuristic algorithms based on a maximal independent set approach and testing them with dif- ferent instances of graph families. As a secondary goal we are interested in providing theoretical results for particular graphs. The results will be made available in a simple, open-access bench- marking platform. -
The Snake-In-The-Box Problem: a Primer
THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA (Under the Direction of Walter D. Potter) ABSTRACT This thesis is a primer designed to introduce novice and expert alike to the Snake-in-the- Box problem (SIB). Using plain language, and including explanations of prerequisite concepts necessary for understanding SIB throughout, it introduces the essential concepts of SIB, its origin, evolution, and continued relevance, as well as methods for representing, validating, and evaluating snake and coil solutions in SIB search. Finally, it is structured to serve as a convenient reference for those exploring SIB. INDEX WORDS: Snake-in-the-Box, Coil-in-the-Box, Hypercube, Snake, Coil, Graph Theory, Constraint Satisfaction, Canonical Ordering, Canonical Form, Equivalence Class, Disjunctive Normal Form, Conjunctive Normal Form, Heuristic Search, Fitness Function, Articulation Points THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA B.A., George Mason University, 1991 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2015 © 2015 Thomas E. Drapela All Rights Reserved THE SNAKE-IN-THE-BOX PROBLEM: A PRIMER by THOMAS E. DRAPELA Major Professor: Walter D. Potter Committee: Khaled Rasheed Pete Bettinger Electronic Version Approved: Julie Coffield Interim Dean of the Graduate School The University of Georgia May 2015 DEDICATION To my dearest Kristin: For loving me enough to give me a shove. iv ACKNOWLEDGEMENTS I wish to express my deepest gratitude to Dr. Potter for introducing me to the Snake-in-the-Box problem, for giving me the freedom to get lost in it, and finally, for helping me to find my way back. -
An Archive of All Submitted Project Proposals
CS 598 JGE ] Fall 2017 One-Dimensional Computational Topology Project Proposals Theory 0 Bhuvan Venkatesh: embedding graphs into hypercubes ....................... 1 Brendan Wilson: anti-Borradaile-Klein? .................................. 4 Charles Shang: vertex-disjoint paths in planar graphs ......................... 6 Hsien-Chih Chang: bichromatic triangles in pseudoline arrangements ............. 9 Sameer Manchanda: one more shortest-path tree in planar graphs ............... 11 Implementation 13 Jing Huang: evaluation of image segmentation algorithms ..................... 13 Shailpik Roy: algorithm visualization .................................... 15 Qizin (Stark) Zhu: evaluation of r-division algorithms ........................ 17 Ziwei Ba: algorithm visualization ....................................... 20 Surveys 22 Haizi Yu: topological music analysis ..................................... 22 Kevin Hong: topological data analysis .................................... 24 Philip Shih: planarity testing algorithms .................................. 26 Ross Vasko: planar graph clustering ..................................... 28 Yasha Mostofi: image processing via maximum flow .......................... 31 CS 598JGE Project Proposal Name and Netid: Bhuvan Venkatesh: bvenkat2 Introduction Embedding arbitrary graphs into Hypercubes has been the study of research for many practical implementation purposes such as interprocess communication or resource. A hypercube graph is any graph that has a set of 2d vertexes and all the vertexes are