Almost All Steiner Triple Systems Are Almost Resolvable
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Practical Parallel Hypergraph Algorithms
Practical Parallel Hypergraph Algorithms Julian Shun [email protected] MIT CSAIL Abstract v While there has been signicant work on parallel graph pro- 0 cessing, there has been very surprisingly little work on high- e0 performance hypergraph processing. This paper presents v0 v1 v1 a collection of ecient parallel algorithms for hypergraph processing, including algorithms for betweenness central- e1 ity, maximal independent set, k-core decomposition, hyper- v2 trees, hyperpaths, connected components, PageRank, and v2 v3 e single-source shortest paths. For these problems, we either 2 provide new parallel algorithms or more ecient implemen- v3 tations than prior work. Furthermore, our algorithms are theoretically-ecient in terms of work and depth. To imple- (a) Hypergraph (b) Bipartite representation ment our algorithms, we extend the Ligra graph processing Figure 1. An example hypergraph representing the groups framework to support hypergraphs, and our implementa- , , , , , , and , , and its bipartite repre- { 0 1 2} { 1 2 3} { 0 3} tions benet from graph optimizations including switching sentation. between sparse and dense traversals based on the frontier size, edge-aware parallelization, using buckets to prioritize processing of vertices, and compression. Our experiments represented as hyperedges, can contain an arbitrary number on a 72-core machine and show that our algorithms obtain of vertices. Hyperedges correspond to group relationships excellent parallel speedups, and are signicantly faster than among vertices (e.g., a community in a social network). An algorithms in existing hypergraph processing frameworks. example of a hypergraph is shown in Figure 1a. CCS Concepts • Computing methodologies → Paral- Hypergraphs have been shown to enable richer analy- lel algorithms; Shared memory algorithms. -
Zero-One Laws
1 THE LOGIC IN COMPUTER SCIENCE COLUMN by 2 Yuri GUREVICH Electrical Engineering and Computer Science UniversityofMichigan, Ann Arb or, MI 48109-2122, USA [email protected] Zero-One Laws Quisani: I heard you talking on nite mo del theory the other day.Itisinteresting indeed that all those famous theorems ab out rst-order logic fail in the case when only nite structures are allowed. I can understand that for those, likeyou, educated in the tradition of mathematical logic it seems very imp ortantto ndoutwhichof the classical theorems can b e rescued. But nite structures are to o imp ortant all by themselves. There's got to b e deep nite mo del theory that has nothing to do with in nite structures. Author: \Nothing to do" sounds a little extremist to me. Sometimes in nite ob jects are go o d approximations of nite ob jects. Q: I do not understand this. Usually, nite ob jects approximate in nite ones. A: It may happ en that the in nite case is cleaner and easier to deal with. For example, a long nite sum may b e replaced with a simpler integral. Returning to your question, there is indeed meaningful, inherently nite, mo del theory. One exciting issue is zero- one laws. Consider, say, undirected graphs and let be a propertyofsuch graphs. For example, may b e connectivity. What fraction of n-vertex graphs have the prop erty ? It turns out that, for many natural prop erties , this fraction converges to 0 or 1asn grows to in nity. If the fraction converges to 1, the prop erty is called almost sure. -
The Fact of Modern Mathematics: Geometry, Logic, and Concept Formation in Kant and Cassirer
THE FACT OF MODERN MATHEMATICS: GEOMETRY, LOGIC, AND CONCEPT FORMATION IN KANT AND CASSIRER by Jeremy Heis B.A., Michigan State University, 1999 Submitted to the Graduate Faculty of Arts and Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2007 UNIVERSITY OF PITTSBURGH COLLEGE OF ARTS AND SCIENCES This dissertation was presented by Jeremy Heis It was defended on September 5, 2007 and approved by Jeremy Avigad, Associate Professor, Philosophy, Carnegie Mellon University Stephen Engstrom, Associate Professor, Philosophy, University of Pittsburgh Anil Gupta, Distinguished Professor, Philosophy, University of Pittsburgh Kenneth Manders, Associate Professor, Philosophy, University of Pittsburgh Thomas Ricketts, Professor, Philosophy, University of Pittsburgh Dissertation Advisor: Mark Wilson, Professor, Philosophy, University of Pittsburgh ii Copyright © by Jeremy Heis 2007 iii THE FACT OF MODERN MATHEMATICS: GEOMETRY, LOGIC, AND CONCEPT FORMATION IN KANT AND CASSIRER Jeremy Heis, PhD University of Pittsburgh, 2007 It is now commonly accepted that any adequate history of late nineteenth and early twentieth century philosophy—and thus of the origins of analytic philosophy—must take seriously the role of Neo-Kantianism and Kant interpretation in the period. This dissertation is a contribution to our understanding of this interesting but poorly understood stage in the history of philosophy. Kant’s theory of the concepts, postulates, and proofs of geometry was informed by philosophical reflection on diagram-based geometry in the Greek synthetic tradition. However, even before the widespread acceptance of non-Euclidean geometry, the projective revolution in nineteenth century geometry eliminated diagrams from proofs and introduced “ideal” elements that could not be given a straightforward interpretation in empirical space. -
Multilevel Hypergraph Partitioning with Vertex Weights Revisited
Multilevel Hypergraph Partitioning with Vertex Weights Revisited Tobias Heuer ! Karlsruhe Institute of Technology, Karlsruhe, Germany Nikolai Maas ! Karlsruhe Institute of Technology, Karlsruhe, Germany Sebastian Schlag ! Karlsruhe Institute of Technology, Karlsruhe, Germany Abstract The balanced hypergraph partitioning problem (HGP) is to partition the vertex set of a hypergraph into k disjoint blocks of bounded weight, while minimizing an objective function defined on the hyperedges. Whereas real-world applications often use vertex and edge weights to accurately model the underlying problem, the HGP research community commonly works with unweighted instances. In this paper, we argue that, in the presence of vertex weights, current balance constraint definitions either yield infeasible partitioning problems or allow unnecessarily large imbalances and propose a new definition that overcomes these problems. We show that state-of-the-art hypergraph partitioners often struggle considerably with weighted instances and tight balance constraints (even with our new balance definition). Thus, we present a recursive-bipartitioning technique that isable to reliably compute balanced (and hence feasible) solutions. The proposed method balances the partition by pre-assigning a small subset of the heaviest vertices to the two blocks of each bipartition (using an algorithm originally developed for the job scheduling problem) and optimizes the actual partitioning objective on the remaining vertices. We integrate our algorithm into the multilevel hypergraph -
On Decomposing a Hypergraph Into K Connected Sub-Hypergraphs
Egervary´ Research Group on Combinatorial Optimization Technical reportS TR-2001-02. Published by the Egrerv´aryResearch Group, P´azm´any P. s´et´any 1/C, H{1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres . ISSN 1587{4451. On decomposing a hypergraph into k connected sub-hypergraphs Andr´asFrank, Tam´asKir´aly,and Matthias Kriesell February 2001 Revised July 2001 EGRES Technical Report No. 2001-02 1 On decomposing a hypergraph into k connected sub-hypergraphs Andr´asFrank?, Tam´asKir´aly??, and Matthias Kriesell??? Abstract By applying the matroid partition theorem of J. Edmonds [1] to a hyper- graphic generalization of graphic matroids, due to M. Lorea [3], we obtain a gen- eralization of Tutte's disjoint trees theorem for hypergraphs. As a corollary, we prove for positive integers k and q that every (kq)-edge-connected hypergraph of rank q can be decomposed into k connected sub-hypergraphs, a well-known result for q = 2. Another by-product is a connectivity-type sufficient condition for the existence of k edge-disjoint Steiner trees in a bipartite graph. Keywords: Hypergraph; Matroid; Steiner tree 1 Introduction An undirected graph G = (V; E) is called connected if there is an edge connecting X and V X for every nonempty, proper subset X of V . Connectivity of a graph is equivalent− to the existence of a spanning tree. As a connected graph on t nodes contains at least t 1 edges, one has the following alternative characterization of connectivity. − Proposition 1.1. A graph G = (V; E) is connected if and only if the number of edges connecting distinct classes of is at least t 1 for every partition := V1;V2;:::;Vt of V into non-empty subsets.P − P f g ?Department of Operations Research, E¨otv¨osUniversity, Kecskem´etiu. -
Hypergraph Packing and Sparse Bipartite Ramsey Numbers
Hypergraph packing and sparse bipartite Ramsey numbers David Conlon ∗ Abstract We prove that there exists a constant c such that, for any integer ∆, the Ramsey number of a bipartite graph on n vertices with maximum degree ∆ is less than 2c∆n. A probabilistic argument due to Graham, R¨odland Ruci´nskiimplies that this result is essentially sharp, up to the constant c in the exponent. Our proof hinges upon a quantitative form of a hypergraph packing result of R¨odl,Ruci´nskiand Taraz. 1 Introduction For a graph G, the Ramsey number r(G) is defined to be the smallest natural number n such that, in any two-colouring of the edges of Kn, there exists a monochromatic copy of G. That these numbers exist was proven by Ramsey [19] and rediscovered independently by Erd}osand Szekeres [10]. Whereas the original focus was on finding the Ramsey numbers of complete graphs, in which case it is known that t t p2 r(Kt) 4 ; ≤ ≤ the field has broadened considerably over the years. One of the most famous results in the area to date is the theorem, due to Chvat´al,R¨odl,Szemer´ediand Trotter [7], that if a graph G, on n vertices, has maximum degree ∆, then r(G) c(∆)n; ≤ where c(∆) is just some appropriate constant depending only on ∆. Their proof makes use of the regularity lemma and because of this the bound it gives on the constant c(∆) is (and is necessarily [11]) very bad. The situation was improved somewhat by Eaton [8], who proved, by using a variant of the regularity lemma, that the function c(∆) may be taken to be of the form 22c∆ . -
Hypernetwork Science: from Multidimensional Networks to Computational Topology∗
Hypernetwork Science: From Multidimensional Networks to Computational Topology∗ Cliff A. Joslyn,y Sinan Aksoy,z Tiffany J. Callahan,x Lawrence E. Hunter,x Brett Jefferson,z Brenda Praggastis,y Emilie A.H. Purvine,y Ignacio J. Tripodix March, 2020 Abstract cations, and physical infrastructure often afford a rep- resentation as such a set of entities with binary rela- As data structures and mathematical objects used tionships, and hence may be analyzed utilizing graph for complex systems modeling, hypergraphs sit nicely theoretical methods. poised between on the one hand the world of net- Graph models benefit from simplicity and a degree of work models, and on the other that of higher-order universality. But as abstract mathematical objects, mathematical abstractions from algebra, lattice the- graphs are limited to representing pairwise relation- ory, and topology. They are able to represent com- ships between entities, while real-world phenomena plex systems interactions more faithfully than graphs in these systems can be rich in multi-way relation- and networks, while also being some of the simplest ships involving interactions among more than two classes of systems representing topological structures entities, dependencies between more than two vari- as collections of multidimensional objects connected ables, or properties of collections of more than two in a particular pattern. In this paper we discuss objects. Representing group interactions is not possi- the role of (undirected) hypergraphs in the science ble in graphs natively, but rather requires either more of complex networks, and provide a mathematical complex mathematical objects, or coding schemes like overview of the core concepts needed for hypernet- “reification” or semantic labeling in bipartite graphs. -
On the Normality of Numbers
ON THE NORMALITY OF NUMBERS Adrian Belshaw B. Sc., University of British Columbia, 1973 M. A., Princeton University, 1976 A THESIS SUBMITTED 'IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in the Department of Mathematics @ Adrian Belshaw 2005 SIMON FRASER UNIVERSITY Fall 2005 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. APPROVAL Name: Adrian Belshaw Degree: Master of Science Title of Thesis: On the Normality of Numbers Examining Committee: Dr. Ladislav Stacho Chair Dr. Peter Borwein Senior Supervisor Professor of Mathematics Simon Fraser University Dr. Stephen Choi Supervisor Assistant Professor of Mathematics Simon Fraser University Dr. Jason Bell Internal Examiner Assistant Professor of Mathematics Simon Fraser University Date Approved: December 5. 2005 SIMON FRASER ' u~~~snrllbrary DECLARATION OF PARTIAL COPYRIGHT LICENCE The author, whose copyright is declared on the title page of this work, has granted to Simon Fraser University the right to lend this thesis, project or extended essay to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. The author has further granted permission to Simon Fraser University to keep or make a digital copy for use in its circulating collection, and, without changing the content, to translate the thesislproject or extended essays, if technically possible, to any medium or format for the purpose of preservation of the digital work. -
Diophantine Approximation and Transcendental Numbers
Diophantine Approximation and Transcendental Numbers Connor Goldstick June 6, 2017 Contents 1 Introduction 1 2 Continued Fractions 2 3 Rational Approximations 3 4 Transcendental Numbers 6 5 Irrationality Measure 7 6 The continued fraction for e 8 6.1 e's Irrationality measure . 10 7 Conclusion 11 A The Lambert Continued Fraction 11 1 Introduction Suppose we have an irrational number, α, that we want to approximate with a rational number, p=q. This question of approximating an irrational number is the primary concern of Diophantine approximation. In other words, we want jα−p=qj < . However, this method of trying to approximate α is boring, as it is possible to get an arbitrary amount of precision by making q large. To remedy this problem, it makes sense to vary with q. The problem we are really trying to solve is finding p and q such that p 1 1 jα − j < which is equivalent to jqα − pj < (1) q q2 q Solutions to this problem have applications in both number theory and in more applied fields. For example, in signal processing many of the quickest approximation algorithms are given by solutions to Diophantine approximation problems. Diophantine approximations also give many important results like the continued fraction expansion of e. One of the most interesting aspects of Diophantine approximations are its relationship with transcendental 1 numbers (a number that cannot be expressed of the root of a polynomial with rational coefficients). One of the key characteristics of a transcendental number is that it is easy to approximate with rational numbers. This paper is separated into two categories. -
Geometry of the Mathieu Groups and Golay Codes
Proc. Indian Acad. Sci. (Math. Sci.), Vol. 98, Nos 2 and 3, December 1988, pp. 153-177. 9 Printed in India. Geometry of the Mathieu groups and Golay codes ERIC A LORD Centre for Theoretical Studies and Department of Applied Mathematics, Indian Institute of Science, Bangalore 560012, India MS received 11 January 1988 Abstraet. A brief review is given of the linear fractional subgroups of the Mathieu groups. The main part of the paper then deals with the proj~x-~tiveinterpretation of the Golay codes; these codes are shown to describe Coxeter's configuration in PG(5, 3) and Todd's configuration in PG(11, 2) when interpreted projectively. We obtain two twelve-dimensional representations of M24. One is obtained as the coUineation group that permutes the twelve special points in PC,(11, 2); the other arises by interpreting geometrically the automorphism group of the binary Golay code. Both representations are reducible to eleven-dimensional representations of M24. Keywords. Geometry; Mathieu groups; Golay codes; Coxeter's configuration; hemi- icosahedron; octastigms; dodecastigms. 1. Introduction We shall first review some of the known properties of the Mathieu groups and their linear fractional subgroups. This is mainly a brief resum6 of the first two of Conway's 'Three Lectures on Exceptional Groups' [3] and will serve to establish the notation and underlying concepts of the subsequent sections. The six points of the projective line PL(5) can be labelled by the marks of GF(5) together with a sixth symbol oo defined to be the inverse of 0. The symbol set is f~ = {0 1 2 3 4 oo}. -
Network Intrusion Detection with Xgboost and Deep Learning Algorithms: an Evaluation Study
2020 International Conference on Computational Science and Computational Intelligence (CSCI) Network Intrusion Detection with XGBoost and Deep Learning Algorithms: An Evaluation Study Amr Attia Miad Faezipour Abdelshakour Abuzneid Computer Science & Engineering Computer Science & Engineering Computer Science & Engineering University of Bridgeport, CT 06604, USA University of Bridgeport, CT 06604, USA University of Bridgeport, CT 06604, USA [email protected] [email protected] [email protected] Abstract— This paper introduces an effective Network Intrusion In the KitNET model introduced in [2], an unsupervised Detection Systems (NIDS) framework that deploys incremental technique is introduced for anomaly-based intrusion statistical damping features of the packets along with state-of- detection. Incremental statistical feature extraction of the the-art machine/deep learning algorithms to detect malicious packets is passed through ensembles of autoencoders with a patterns. A comprehensive evaluation study is conducted predefined threshold. The model calculates the Root Mean between eXtreme Gradient Boosting (XGBoost) and Artificial Neural Networks (ANN) where feature selection and/or feature Square (RMS) error to detect anomaly behavior. The higher dimensionality reduction techniques such as Principal the calculated RMS at the output, the higher probability of Component Analysis (PCA) and Linear Discriminant Analysis suspicious activity. (LDA) are also integrated into the models to decrease the system Supervised learning has achieved very decent results with complexity for achieving fast responses. Several experimental algorithms such as Random Forest, ZeroR, J48, AdaBoost, runs confirm how powerful machine/deep learning algorithms Logit Boost, and Multilayer Perceptron [3]. Machine/deep are for intrusion detection on known attacks when combined learning-based algorithms for NIDS have been extensively with the appropriate features extracted. -
Spanning Sets and Scattering Sets in Steiner Triple Systems
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector JOURNAL OF COMBINATORIAL THEORY, %XieS A 57, 4659 (1991) Spanning Sets and Scattering Sets in Steiner Triple Systems CHARLESJ. COLBOURN Department of Combinatorics and Optimization, University of Waterloo, Waterloo. Ontario, N2L 3G1, Canada JEFFREYH. DMTZ Department of Mathematics, University of Vermont, Burlington, Vermont 05405 AND DOUGLASR. STINSON Department of Computer Science, University of Manitoba, Winnipeg, Manitoba, R3T 2N2, Canada Communicated by the Managing Editors Received August 15, 1988 A spanning set in a Steiner triple system is a set of elements for which each element not in the spanning set appears in at least one triple with a pair of elements from the spanning set. A scattering set is a set of elements that is independent, and for which each element not in the scattering set is in at most one triple with a pair of elements from the scattering set. For each v = 1,3 (mod 6), we exhibit a Steiner triple system with a spanning set of minimum cardinality, and a Steiner triple system with a scattering set of maximum cardinality. In the process, we establish the existence of Steiner triple systems with complete arcs of the minimum possible cardinality. 0 1991 Academic Press, Inc. 1. BACKGROUND A Steiner triple system of order u, or STS(u), is a v-element set V, and a set g of 3-element subsets of V called triples, for which each pair of elements from V appears in precisely one triple of 9% For XG V, the spannedsetV(X)istheset {~EV\X:{~,~,~)E~,~,~EX}.A~~~XEV 46 0097-3165/91 $3.00 Copyright 0 1991 by Academic Press, Inc.