Parametrised Enumeration

Total Page:16

File Type:pdf, Size:1020Kb

Parametrised Enumeration Parametrised Enumeration Arne Meier Februar 2020 color guide (the dark blue is the same with the Gottfried Wilhelm Leibnizuniversity Universität logo) Hannover c: 100 m: 70 Institut für y: 0 k: 0 Theoretische c: 35 m: 0 y: 10 Informatik k: 0 c: 0 m: 0 y: 0 k: 35 Fakultät für Elektrotechnik und Informatik Institut für Theoretische Informatik Fachgebiet TheoretischeWednesday, February 18, 15 Informatik Habilitationsschrift Parametrised Enumeration Arne Meier geboren am 6. Mai 1982 in Hannover Februar 2020 Gutachter Till Tantau Institut für Theoretische Informatik Universität zu Lübeck Gutachter Stefan Woltran Institut für Logic and Computation 192-02 Technische Universität Wien Arne Meier Parametrised Enumeration Habilitationsschrift, Datum der Annahme: 20.11.2019 Gutachter: Till Tantau, Stefan Woltran Gottfried Wilhelm Leibniz Universität Hannover Fachgebiet Theoretische Informatik Institut für Theoretische Informatik Fakultät für Elektrotechnik und Informatik Appelstrasse 4 30167 Hannover Dieses Werk ist lizenziert unter einer Creative Commons “Namensnennung-Nicht kommerziell 3.0 Deutschland” Lizenz. Für Julia, Jonas Heinrich und Leonie Anna. Ihr seid mein größtes Glück auf Erden. Danke für eure Geduld, euer Verständnis und eure Unterstützung. Euer Rückhalt bedeutet mir sehr viel. ♥ If I had an hour to solve a problem, I’d spend 55 minutes thinking about the problem and 5 min- “ utes thinking about solutions. ” — Albert Einstein Abstract In this thesis, we develop a framework of parametrised enumeration complexity. At first, we provide the reader with preliminary notions such as machine models and complexity classes besides proving them to be well-chosen. Then, we study the interplay and the landscape of these classes and present connections to classical enumeration classes. Afterwards, we translate the fundamental methods of kerneli- sation and self-reducibility into equivalent techniques in the setting of parametrised enumeration. Subsequently, we illustrate the introduced classes by investigating the parametrised enumeration complexity of Max-Ones-SAT and strong backdoor sets as well as sharpen the first result by presenting a dichotomy theorem for Max-Ones-SAT. After this, we extend the definitions of parametrised enumeration algorithms by allowing orders on the solution space. In this context, we study the relations “order by size” and “lexicographic order” for graph modification problems and observe a trade-off between enumeration delay and space requirements of enumeration algorithms. These results then yield an enumeration technique for generalised modi- fication problems that is illustrated by applying this method to the problems closest string, weak and strong backdoor sets, and weighted satisfiability. Eventually, we consider the enumeration of satisfying teams of formulas of poor man’s propositional dependence logic. There, we present an enumeration algorithm with FPT delay and exponential space which is one of the first enumeration complexity result of a problem in a team logic. Finally, we show how this algorithm can be modified such that only polynomial space is required, however, by increasing the delay to incremental FPT time. Keywords: Parametrised Complexity, Enumeration Complexity, Parametrised Enu- meration vi Zusammenfassung In diesem Werk begründen wir die Theorie der parametrisierten Enumeration, präsentieren die grundlegenden Definitionen und prüfen ihre Sinnhaftigkeit. Im nächsten Schritt, untersuchen wir das Zusammenspiel der eingeführten Komplex- itätsklassen und zeigen Verbindungen zur klassischen Enumerationskomplexität auf. Anschließend übertragen wir die zwei fundamentalen Techniken der Kernelisierung und Selbstreduzierbarkeit in Entsprechungen in dem Gebiet der parametrisierten Enumeration. Schließlich untersuchen wir das Problem Max-Ones-SAT und das Problem der Aufzählung starker Backdoor-Mengen als typische Probleme in diesen Klassen. Die vorherigen Resultate zu Max-Ones-SAT werden anschließend in einem Dichotomie-Satz vervollständigt. Im nächsten Abschnitt erweitern wir die neuen Def- initionen auf Ordnungen (auf dem Lösungsraum) und erforschen insbesondere die zwei Relationen „Größenordnung“ und „lexikographische Reihenfolge“ im Kontext von Graphen-Modifikationsproblemen. Hierbei scheint es, als müsste man zwischen Delay und Speicheranforderungen von Aufzählungsalgorithmen abwägen, wobei dies jedoch nicht abschließend gelöst werden kann. Aus den vorherigen Überlegungen wird schließlich ein generisches Enumerationsverfahren für allgemeine Modifika- tionsprobleme entwickelt und anhand der Probleme Closest String, schwacher und starker Backdoor-Mengen sowie gewichteter Erfüllbarkeit veranschaulicht. Im let- zten Abschnitt betrachten wir die parametrisierte Enumerationskomplexität von Erfüllbarkeitsproblemen im Bereich der Poor Man’s Propositional Dependence Logic und stellen einen Aufzählungsalgorithmus mit FPT Delay vor, der mit exponentiellem Platz arbeitet. Dies ist einer der ersten Aufzählungsalgorithmen im Bereich der Team- logiken. Abschließend zeigen wir, wie dieser Algorithmus so modifiziert werden kann, dass nur polynomieller Speicherplatz benötigt wird, bezahlen jedoch diese Einsparung mit einem Anstieg des Delays auf inkrementelle FPT Zeit (IncFPT). Schlagwörter: Parametrisierte Algorithmen, Aufzählungskomplexität, Parametri- sierte Aufzählungsalgorithmen vii Acknowledgement At first, I wish to deeply thank my family for always being sympathetic and support- ive. Secondly, I want to express my gratitude to all my coauthors of publications which have been incorporated in this thesis. In particular, I show appreciation to Nadia Creignou, Raïda Ktari, Julian-Steffen Müller, Fréderic Olive, Johannes Schmidt (thanks, Johannes, for the discussion on Theorem 3.2), and Heribert Vollmer who have been working with me at the initial steps into this exciting new field. Fur- thermore, I thank Maurice Chandoo and Anselm Haak for their valuable comments on various parts of this thesis. Particularly, I would like to thank Martin Lück for his feedback on Section 3.2, and Johannes Fichte for proof reading Chapter 1. I want to give thanks to Christian Reinbold for discussions on Chapter 6. Eventually, I appreciate Anselm’s feedback to my teaching demonstration and Fabian’s on my scientific talk. Finally, I wish to thank Stefan Woltran, and Till Tantau for reviewing this thesis. Danksagung Zuerst möchte ich meine tiefste Dankbarkeit bei meiner Familie ausdrücken. Euer Verständnis und eure Unterstützung in allen Lebenslagen sind das Fundament meiner Forschung. An zweiter Stelle bedanke ich mich bei allen meinen Mitautoren von Veröffentlichungen, die in diese Arbeit eingeflossen sind. Besonderer Dank gehört hierbei Nadia Creignou, Raïda Ktari, Julian-Steffen Müller, Fréderic Olive, Johannes Schmidt (besonderer Dank geht an Dich für die Diskussion zu Theorem 3.2) und Heribert Vollmer, die bei den wichtigen ersten Publikationen zur parametrisierten Enumeration mitgewirkt haben. Schließlich richtet sich meine Dankbarkeit an Maurice Chandoo und Anselm Haak für ihre wertvollen Rückmeldungen zu unter- schiedlichen Abschnitten dieser Arbeit. Insbesondere möchte ich Martin Lück für seine Hinweise zum Abschnitt 3.2 sowie Johannes Fichte für das Korrekturlesen von Kapitel 1 danken. Christian Reinbold bin ich für die Diskussionen zu Kapitel 6 zu Dank verpflichtet. Schließlich danke ich Anselm für seine Rückmeldung zu meiner Lehrprobe und Fabian für seine Tipps zu meinem wissenschaftlichen Vortrag. Abschließend möchte ich mich noch bei Stefan Woltran und Till Tantau für das begutachten dieser Arbeit bedanken. viii Contents 1 Introduction 1 1.1 Parametrised Complexity . 3 1.2 Enumeration . 6 1.3 Team Logics . 10 1.4 Results . 13 1.5 Publications . 13 2 Preliminaries 15 2.1 Complexity Theory . 15 2.2 Parametrised Complexity Theory . 15 2.3 Enumeration . 17 2.4 Parametrised Enumeration . 19 2.5 Orders . 21 3 Enumeration Complexity Landscape 23 3.1 Incremental FPT . 25 3.2 Connections to Classical Enumeration . 27 3.3 CardinalitySAT . 34 4 Principles of Parametrised Enumeration 37 4.1 Kernelisation . 37 4.2 Self-Reducibility and Bounded-Search-Trees . 42 4.2.1 Enumeration Complexity of Max-Ones-SAT . 42 4.2.2 Enumeration of Strong HORN-Backdoor Sets . 47 4.3 A Dichotomy for the Enumerability of Max-Ones-SAT . 48 5 Parametrised Enumeration with Orders 57 5.1 Graph Modification Problems . 57 5.1.1 Lexicographic Order . 61 5.1.2 Order by Size . 62 5.2 Generalised Modification Problems . 65 5.2.1 Closest String . 68 5.2.2 Backdoors . 69 5.2.3 Weighted Satisfiability Problems . 71 ix 6 Enumeration in Poor Man’s Propositional Dependence Logic 73 6.1 Team-based Propositional Logic . 74 6.2 Group Theory . 75 6.3 Enumeration Complexity . 76 6.3.1 The Group Action of Flipping Bits . 79 6.3.2 Limiting Memory Space . 89 7 Conclusion 95 8 Outlook 99 Bibliography 101 x Introduction 1 [::: ]; les charmes enchanteurs de cette sublime science ne se decelent dans toute leur beaute qu’a “ ceux qui ont le courage de l’approfondir. ” [::: ]; the enchanting charms of this sublime sci- ence reveal themselves in all their beauty only to those who have the courage to go deeply into it. — Carl Friedrich Gauß, 30. April 1807. [CF12] In the last decade, implicitly using modern technologies silently became a common procedure in copious areas of living. Before leaving home, we check the rain forecast on our smartphone. In the morning, we buy groceries or various other things over the internet, and they are delivered even the same day. Driving a car to a new place
Recommended publications
  • A Proof of Cantor's Theorem
    Cantor’s Theorem Joe Roussos 1 Preliminary ideas Two sets have the same number of elements (are equinumerous, or have the same cardinality) iff there is a bijection between the two sets. Mappings: A mapping, or function, is a rule that associates elements of one set with elements of another set. We write this f : X ! Y , f is called the function/mapping, the set X is called the domain, and Y is called the codomain. We specify what the rule is by writing f(x) = y or f : x 7! y. e.g. X = f1; 2; 3g;Y = f2; 4; 6g, the map f(x) = 2x associates each element x 2 X with the element in Y that is double it. A bijection is a mapping that is injective and surjective.1 • Injective (one-to-one): A function is injective if it takes each element of the do- main onto at most one element of the codomain. It never maps more than one element in the domain onto the same element in the codomain. Formally, if f is a function between set X and set Y , then f is injective iff 8a; b 2 X; f(a) = f(b) ! a = b • Surjective (onto): A function is surjective if it maps something onto every element of the codomain. It can map more than one thing onto the same element in the codomain, but it needs to hit everything in the codomain. Formally, if f is a function between set X and set Y , then f is surjective iff 8y 2 Y; 9x 2 X; f(x) = y Figure 1: Injective map.
    [Show full text]
  • Linear Transformation (Sections 1.8, 1.9) General View: Given an Input, the Transformation Produces an Output
    Linear Transformation (Sections 1.8, 1.9) General view: Given an input, the transformation produces an output. In this sense, a function is also a transformation. 1 4 3 1 3 Example. Let A = and x = 1 . Describe matrix-vector multiplication Ax 2 0 5 1 1 1 in the language of transformation. 1 4 3 1 31 5 Ax b 2 0 5 11 8 1 Vector x is transformed into vector b by left matrix multiplication Definition and terminologies. Transformation (or function or mapping) T from Rn to Rm is a rule that assigns to each vector x in Rn a vector T(x) in Rm. • Notation: T: Rn → Rm • Rn is the domain of T • Rm is the codomain of T • T(x) is the image of vector x • The set of all images T(x) is the range of T • When T(x) = Ax, A is a m×n size matrix. Range of T = Span{ column vectors of A} (HW1.8.7) See class notes for other examples. Linear Transformation --- Existence and Uniqueness Questions (Section 1.9) Definition 1: T: Rn → Rm is onto if each b in Rm is the image of at least one x in Rn. • i.e. codomain Rm = range of T • When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists at least one solution (Existence question). Definition 2: T: Rn → Rm is one-to-one if each b in Rm is the image of at most one x in Rn. • i.e. When solve T(x) = b for x (or Ax=b, A is the standard matrix), there exists either a unique solution or none at all (Uniqueness question).
    [Show full text]
  • Studies on Enumeration of Acyclic Substructures in Graphs and Hypergraphs (グラフや超グラフに含まれる非巡回部分構造の列挙に関する研究)
    CORE Metadata, citation and similar papers at core.ac.uk Provided by Hokkaido University Collection of Scholarly and Academic Papers Studies on Enumeration of Acyclic Substructures in Graphs and Hypergraphs (グラフや超グラフに含まれる非巡回部分構造の列挙に関する研究) Kunihiro Wasa February 2016 Division of Computer Science Graduate School of Information Science and Technology Hokkaido University Abstract Recently, due to the improvement of the performance of computers, we can easily ob- tain a vast amount of data defined by graphs or hypergraphs. However, it is difficult to look over all the data by mortal powers. Moreover, it is impossible for us to extract useful knowledge or regularities hidden in the data. Thus, we address to overcome this situation by using computational techniques such as data mining and machine learning for the data. However, we still confront a matter that needs to be dealt with the expo- nentially many substructures in input data. That is, we have to consider the following problem: given an input graph or hypergraph and a constraint, output all substruc- tures belonging to the input and satisfying the constraint without duplicates. In this thesis, we focus on this kind of problems and address to develop efficient enumeration algorithms for them. Since 1950's, substructure enumeration problems are widely studied. In 1975, Read and Tarjan proposed enumeration algorithms that list spanning trees, paths, and cycles for evaluating the electrical networks and studying program flow. Moreover, due to the demands from application area, enumeration algorithms for cliques, subtrees, and subpaths are applied to data mining and machine learning. In addition, enumeration problems have been focused on due to not only the viewpoint of application but also of the theoretical interest.
    [Show full text]
  • Functions and Inverses
    Functions and Inverses CS 2800: Discrete Structures, Spring 2015 Sid Chaudhuri Recap: Relations and Functions ● A relation between sets A !the domain) and B !the codomain" is a set of ordered pairs (a, b) such that a ∈ A, b ∈ B !i.e. it is a subset o# A × B" Cartesian product – The relation maps each a to the corresponding b ● Neither all possible a%s, nor all possible b%s, need be covered – Can be one-one, one&'an(, man(&one, man(&man( Alice CS 2800 Bob A Carol CS 2110 B David CS 3110 Recap: Relations and Functions ● ) function is a relation that maps each element of A to a single element of B – Can be one-one or man(&one – )ll elements o# A must be covered, though not necessaril( all elements o# B – Subset o# B covered b( the #unction is its range/image Alice Balch Bob A Carol Jameson B David Mews Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 or f : x ↦ x2 +he function f maps x to x2 Recap: Relations and Functions ● Instead of writing the #unction f as a set of pairs, e usually speci#y its domain and codomain as: f : A → B * and the mapping via a rule such as: f (Heads) = 0.5, f (Tails) = 0.5 2 or f : x ↦ x f(x) ● Note: the function is f, not f(x), – f(x) is the value assigned b( f the #unction f to input x x Recap: Injectivity ● ) function is injective (one-to-one) if every element in the domain has a unique i'age in the codomain – +hat is, f(x) = f(y) implies x = y Albany NY New York A MA Sacramento B CA Boston ..
    [Show full text]
  • Primitive Recursive Functions Are Recursively Enumerable
    AN ENUMERATION OF THE PRIMITIVE RECURSIVE FUNCTIONS WITHOUT REPETITION SHIH-CHAO LIU (Received April 15,1900) In a theorem and its corollary [1] Friedberg gave an enumeration of all the recursively enumerable sets without repetition and an enumeration of all the partial recursive functions without repetition. This note is to prove a similar theorem for the primitive recursive functions. The proof is only a classical one. We shall show that the theorem is intuitionistically unprovable in the sense of Kleene [2]. For similar reason the theorem by Friedberg is also intuitionistical- ly unprovable, which is not stated in his paper. THEOREM. There is a general recursive function ψ(n, a) such that the sequence ψ(0, a), ψ(l, α), is an enumeration of all the primitive recursive functions of one variable without repetition. PROOF. Let φ(n9 a) be an enumerating function of all the primitive recursive functions of one variable, (See [3].) We define a general recursive function v(a) as follows. v(0) = 0, v(n + 1) = μy, where μy is the least y such that for each j < n + 1, φ(y, a) =[= φ(v(j), a) for some a < n + 1. It is noted that the value v(n + 1) can be found by a constructive method, for obviously there exists some number y such that the primitive recursive function <p(y> a) takes a value greater than all the numbers φ(v(0), 0), φ(y(Ϋ), 0), , φ(v(n\ 0) f or a = 0 Put ψ(n, a) = φ{v{n), a).
    [Show full text]
  • Polya Enumeration Theorem
    Polya Enumeration Theorem Sasha Patotski Cornell University [email protected] December 11, 2015 Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 1 / 10 Cosets A left coset of H in G is gH where g 2 G (H is on the right). A right coset of H in G is Hg where g 2 G (H is on the left). Theorem If two left cosets of H in G intersect, then they coincide, and similarly for right cosets. Thus, G is a disjoint union of left cosets of H and also a disjoint union of right cosets of H. Corollary(Lagrange's theorem) If G is a finite group and H is a subgroup of G, then the order of H divides the order of G. In particular, the order of every element of G divides the order of G. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 2 / 10 Applications of Lagrange's Theorem Theorem n! For any integers n ≥ 0 and 0 ≤ m ≤ n, the number m!(n−m)! is an integer. Theorem (ab)! (ab)! For any positive integers a; b the ratios (a!)b and (a!)bb! are integers. Theorem For an integer m > 1 let '(m) be the number of invertible numbers modulo m. For m ≥ 3 the number '(m) is even. Sasha Patotski (Cornell University) Polya Enumeration Theorem December 11, 2015 3 / 10 Polya's Enumeration Theorem Theorem Suppose that a finite group G acts on a finite set X . Then the number of colorings of X in n colors inequivalent under the action of G is 1 X N(n) = nc(g) jGj g2G where c(g) is the number of cycles of g as a permutation of X .
    [Show full text]
  • Enumeration of Finite Automata 1 Z(A) = 1
    INFOI~MATION AND CONTROL 10, 499-508 (1967) Enumeration of Finite Automata 1 FRANK HARARY AND ED PALMER Department of Mathematics, University of Michigan, Ann Arbor, Michigan Harary ( 1960, 1964), in a survey of 27 unsolved problems in graphical enumeration, asked for the number of different finite automata. Re- cently, Harrison (1965) solved this problem, but without considering automata with initial and final states. With the aid of the Power Group Enumeration Theorem (Harary and Palmer, 1965, 1966) the entire problem can be handled routinely. The method involves a confrontation of several different operations on permutation groups. To set the stage, we enumerate ordered pairs of functions with respect to the product of two power groups. Finite automata are then concisely defined as certain ordered pah's of functions. We review the enumeration of automata in the natural setting of the power group, and then extend this result to enumerate automata with initial and terminal states. I. ENUMERATION THEOREM For completeness we require a number of definitions, which are now given. Let A be a permutation group of order m = ]A I and degree d acting on the set X = Ix1, x~, -.. , xa}. The cycle index of A, denoted Z(A), is defined as follows. Let jk(a) be the number of cycles of length k in the disjoint cycle decomposition of any permutation a in A. Let al, a2, ... , aa be variables. Then the cycle index, which is a poly- nomial in the variables a~, is given by d Z(A) = 1_ ~ H ~,~(°~ . (1) ~$ a EA k=l We sometimes write Z(A; al, as, ..
    [Show full text]
  • Enumeration of Maximal Cliques from an Uncertain Graph
    1 Enumeration of Maximal Cliques from an Uncertain Graph Arko Provo Mukherjee #1, Pan Xu ∗2, Srikanta Tirthapura #3 # Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA Coover Hall, Ames, IA, USA 1 [email protected] 3 [email protected] ∗ Department of Computer Science, University of Maryland A.V. Williams Building, College Park, MD, USA 2 [email protected] Abstract—We consider the enumeration of dense substructures (maximal cliques) from an uncertain graph. For parameter 0 < α < 1, we define the notion of an α-maximal clique in an uncertain graph. We present matching upper and lower bounds on the number of α-maximal cliques possible within a (uncertain) graph. We present an algorithm to enumerate α-maximal cliques whose worst-case runtime is near-optimal, and an experimental evaluation showing the practical utility of the algorithm. Index Terms—Graph Mining, Uncertain Graph, Maximal Clique, Dense Substructure F 1 INTRODUCTION of the most basic problems in graph mining, and has been applied in many settings, including in finding overlapping Large datasets often contain information that is uncertain communities from social networks [14, 17, 18, 19], finding in nature. For example, given people A and B, it may not overlapping multiple protein complexes [20], analysis of be possible to definitively assert a relation of the form “A email networks [21] and other problems in bioinformat- knows B” using available information. Our confidence in ics [22, 23, 24]. such relations are commonly quantified using probability, and we say that the relation exists with a probability of p, for While the notion of a dense substructure and methods some value p determined from the available information.
    [Show full text]
  • The Axiom of Choice and Its Implications
    THE AXIOM OF CHOICE AND ITS IMPLICATIONS KEVIN BARNUM Abstract. In this paper we will look at the Axiom of Choice and some of the various implications it has. These implications include a number of equivalent statements, and also some less accepted ideas. The proofs discussed will give us an idea of why the Axiom of Choice is so powerful, but also so controversial. Contents 1. Introduction 1 2. The Axiom of Choice and Its Equivalents 1 2.1. The Axiom of Choice and its Well-known Equivalents 1 2.2. Some Other Less Well-known Equivalents of the Axiom of Choice 3 3. Applications of the Axiom of Choice 5 3.1. Equivalence Between The Axiom of Choice and the Claim that Every Vector Space has a Basis 5 3.2. Some More Applications of the Axiom of Choice 6 4. Controversial Results 10 Acknowledgments 11 References 11 1. Introduction The Axiom of Choice states that for any family of nonempty disjoint sets, there exists a set that consists of exactly one element from each element of the family. It seems strange at first that such an innocuous sounding idea can be so powerful and controversial, but it certainly is both. To understand why, we will start by looking at some statements that are equivalent to the axiom of choice. Many of these equivalences are very useful, and we devote much time to one, namely, that every vector space has a basis. We go on from there to see a few more applications of the Axiom of Choice and its equivalents, and finish by looking at some of the reasons why the Axiom of Choice is so controversial.
    [Show full text]
  • 17 Axiom of Choice
    Math 361 Axiom of Choice 17 Axiom of Choice De¯nition 17.1. Let be a nonempty set of nonempty sets. Then a choice function for is a function f sucFh that f(S) S for all S . F 2 2 F Example 17.2. Let = (N)r . Then we can de¯ne a choice function f by F P f;g f(S) = the least element of S: Example 17.3. Let = (Z)r . Then we can de¯ne a choice function f by F P f;g f(S) = ²n where n = min z z S and, if n = 0, ² = min z= z z = n; z S . fj j j 2 g 6 f j j j j j 2 g Example 17.4. Let = (Q)r . Then we can de¯ne a choice function f as follows. F P f;g Let g : Q N be an injection. Then ! f(S) = q where g(q) = min g(r) r S . f j 2 g Example 17.5. Let = (R)r . Then it is impossible to explicitly de¯ne a choice function for . F P f;g F Axiom 17.6 (Axiom of Choice (AC)). For every set of nonempty sets, there exists a function f such that f(S) S for all S . F 2 2 F We say that f is a choice function for . F Theorem 17.7 (AC). If A; B are non-empty sets, then the following are equivalent: (a) A B ¹ (b) There exists a surjection g : B A. ! Proof. (a) (b) Suppose that A B.
    [Show full text]
  • Enumeration of Structure-Sensitive Graphical Subsets: Calculations (Graph Theory/Combinatorics) R
    Proc. Nati Acad. Sci. USA Vol. 78, No. 3, pp. 1329-1332, March 1981 Mathematics Enumeration of structure-sensitive graphical subsets: Calculations (graph theory/combinatorics) R. E. MERRIFIELD AND H. E. SIMMONS Central Research and Development Department, E. I. du Pont de Nemours and Company, Experimental Station, Wilmington, Delaware 19898 Contributed by H. E. Simmons, October 6, 1980 ABSTRACT Numerical calculations are presented, for all Table 2. Qualitative properties of subset counts connected graphs on six and fewer vertices, of the -lumbers of hidepndent sets, connected sets;point and line covers, externally Quantity Branching Cyclization stable sets, kernels, and irredundant sets. With the exception of v, xIncreases Decreases the number of kernels, the numbers of such sets are al highly p Increases Increases structure-sensitive quantities. E Variable Increases K Insensitive Insensitive The necessary mathematical machinery has recently been de- Variable Variable veloped (1) for enumeration of the following types of special cr Decreases Increases subsets of the vertices or edges of a general graph: (i) indepen- p Increases Increases dent sets, (ii) connected sets, (iii) point and line covers, (iv;' ex- X Decreases Increases ternally stable sets, (v) kernels, and (vi) irredundant sets. In e Increases Increases order to explore the sensitivity of these quantities to graphical K Insensitive Insensitive structure we have employed this machinery to calculate some Decreases Increases explicit subset counts. (Since no more efficient algorithm is known for irredundant sets, they have been enumerated by the brute-force method of testing every subset for irredundance.) 1. e and E are always odd. The 10 quantities considered in ref.
    [Show full text]
  • Matroid Enumeration for Incidence Geometry
    Discrete Comput Geom (2012) 47:17–43 DOI 10.1007/s00454-011-9388-y Matroid Enumeration for Incidence Geometry Yoshitake Matsumoto · Sonoko Moriyama · Hiroshi Imai · David Bremner Received: 30 August 2009 / Revised: 25 October 2011 / Accepted: 4 November 2011 / Published online: 30 November 2011 © Springer Science+Business Media, LLC 2011 Abstract Matroids are combinatorial abstractions for point configurations and hy- perplane arrangements, which are fundamental objects in discrete geometry. Matroids merely encode incidence information of geometric configurations such as collinear- ity or coplanarity, but they are still enough to describe many problems in discrete geometry, which are called incidence problems. We investigate two kinds of inci- dence problem, the points–lines–planes conjecture and the so-called Sylvester–Gallai type problems derived from the Sylvester–Gallai theorem, by developing a new algo- rithm for the enumeration of non-isomorphic matroids. We confirm the conjectures of Welsh–Seymour on ≤11 points in R3 and that of Motzkin on ≤12 lines in R2, extend- ing previous results. With respect to matroids, this algorithm succeeds to enumerate a complete list of the isomorph-free rank 4 matroids on 10 elements. When geometric configurations corresponding to specific matroids are of interest in some incidence problems, they should be analyzed on oriented matroids. Using an encoding of ori- ented matroid axioms as a boolean satisfiability (SAT) problem, we also enumerate oriented matroids from the matroids of rank 3 on n ≤ 12 elements and rank 4 on n ≤ 9 elements. We further list several new minimal non-orientable matroids. Y. Matsumoto · H. Imai Graduate School of Information Science and Technology, University of Tokyo, Tokyo, Japan Y.
    [Show full text]