Generalized Pseudoforest Deletion: Algorithms and Uniform Kernel

Total Page:16

File Type:pdf, Size:1020Kb

Generalized Pseudoforest Deletion: Algorithms and Uniform Kernel Generalized Pseudoforest Deletion: Algorithms and Uniform Kernel Geevarghese Philip1, Ashutosh Rai2, Saket Saurabh2? 1 Max-Planck-Institut f¨urInformatik (MPII), Germany. [email protected] 2 The Institute of Mathematical Sciences, Chennai, India. fashutosh|[email protected] Abstract. Feedback Vertex Set (FVS) is one of the most well stud- ied problems in the realm of parameterized complexity. In this problem we are given a graph G and a positive integer k and the objective is to test whether there exists S ⊆ V (G) of size at most k such that G − S is a forest. Thus, FVS is about deleting as few vertices as possible to get a forest. The main goal of this paper is to study the following in- teresting problem: How can we generalize the family of forests such that the nice structural properties of forests and the interesting algorithmic properties of FVS can be extended to problems on this class? Towards this we define a graph class, Fl, that contains all graphs where each connected component can transformed into forest by deleting at most l edges. The class F1 is known as pseudoforest in the literature and we call Fl as l-pseudoforest. We study the problem of deleting k-vertices to get into Fl, l-pseudoforest Deletion, in the realm of parameterized com- plexity. We show that l-pseudoforest Deletion admits an algorithm k O(1) 2 with running time cl n and admits a kernel of size f(l)k . Thus, for every fixed l we have a kernel of size O(k2). That is, we get a uniform polynomial kernel for l-pseudoforest Deletion. For the special case of l = 1, we design an algorithm with running time 7:5618knO(1). Our al- gorithms and uniform kernels combine iterative compression, expansion lemma and protrusion machinery. 1 Introduction In the field of graph algorithms, vertex deletion problems constitute a consid- erable fraction. In these problems we need to delete a small number of vertices such that the resulting graph satisfies certain properties. Many well known prob- lems like Vertex Cover and Feedback Vertex Set (given a graph G and a positive integer k, does there exists S ⊆ V (G) of size at most k such that G − S is a forest) fall under this category. Most of these problems are NP-complete due to a classic result by Lewis and Yannakakis [10]. These problems are one of the most well studied problems in all those algorithmic paradigms that are meant for ? The research leading to these results has received funding from the European Research Council under the European Union's Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement no. 306992. coping with NP-hardness, such as approximation algorithms and parameterized complexity. The topic of this paper is a generalization of Feedback Vertex Set in the realm of parameterized complexity. The field of parameterized complexity tries to provide efficient algorithms for NP-complete problems by going from the classical view of single-variate measure of the running time to a multi-variate one. It aims at getting algorithms of run- ning time f(k)nO(1), where k is an integer measuring some aspect of the problem. These algorithms are called fixed parameter tractable (FPT) algorithms and the integer k is called the parameter. In most of the cases, the solution size is taken to be the parameter, which means that this approach gives faster algorithms when the solution is of small size. It is known that a decidable problem is FPT if and only if it is kernelizable: a kernelization algorithm for a problem Q takes an instance (x; k) and in time polynomial in jxj + k produces an equivalent in- stance (x0; k0) (i.e., (x; k) 2 Q iff (x0; k0) 2 Q) such that jx0j + k0 ≤ g(k) for some computable function g. The function g is the size of the kernel, and if it is poly- nomial, we say that Q admits a polynomial kernel. The study of kernelization is a major research frontier of parameterized complexity and many important re- cent advances in the area are on kernelization. For more background, the reader is referred to the monographs [3,11]. The Feedback Vertex Set problem has been widely studied in the field of parameterized algorithms. A series of results have improved the running times to O∗(3:619k) in deterministic setting [9] and O∗(3k) in randomized setting [2], where the O∗ notation hides the polynomial factors. The main goal of this paper is to study the following interesting problem: How can we generalize the family of forests such that the nice structural properties of forests and the interesting algorithmic properties of FVS can be extended to problems on this class? There are two ways of quantitatively generalizing forests: given a positive integer l we define graph classes Gl and Fl. The graph class Gl is defined as those graphs that can be made forest by deleting at most l edges. On the other hand the graph class, Fl contains all graphs where each connected component can be made forest by deleting at most l edges. Graphs in Gl are called almost l-forest. The class F1 is known as pseudoforest in the literature and we call Fl as l- pseudoforest. In this paper we study the problem of deleting k-vertices to get into Fl, l-pseudoforest Deletion, in the realm of parameterized complexity. Recently, a subset of authors [12] looked at a generalization of the Feedback Vertex Set problem in terms of Gl. In particular they studied the problem of deleting k-vertices to get into Gl, Almost Forest Deletion, parameterized by k + l. They obtained a 2O(l+k)nO(1) algorithm and a kernel of size O(kl(k + l)). One property of almost-l-forests which is crucial in the design of FPT and kernelization algorithms of [12] is that any almost-l-forests on n vertices can have at most n + l − 1 edges. The same can not be said about l-pseudoforests and they can turn out to be significantly more dense. So while the techniques used for arriving at FPT and kernelization results for Feedback Vertex Set give similar results for Almost Forest Deletion, they break down when applied directly to l-pseudoforest Deletion. So we had to get into the theory of 2 protrusions. Protrusions of a graph are subgraphs which have small boundary and a small treewidth. A protrusion replacer is an algorithm which identifies large protrusions and replaces them with smaller ones. Fomin et al. [6] use protrusion- replacer to arrive at FPT and kernelization results for Planar-F Deletion. We first apply the techniques used in [6] to get an FPT algorithm for l- pseudoforest Deletion. To that end, we have to show that l-pseudoforest Deletion has a protrusion replacer, which we do by showing that the property of being an l-pseudoforest is strongly monotone and minor-closed. We arrive at a ∗ k running time of O (cl ) for l-pseudoforest Deletion where cl is a function of l alone. If we try to apply the machinery of [6] to get a kernelization algorithm for l-pseudoforest Deletion, it only gives a kernel of size kc where the constant c depends on l. We use the similarity of this problem with Feedback Vertex set and apply Gallai's theorem and Expansion Lemma to decrease the maximum degree of the graph. This, when combined with techniques used in [6], gives us a kernel of size ck2, where the constant c depends on l. These kind of kernels are more desired as it gives O(k2) kernel for every fixed l, while the non-uniform kernelization does give a polynomial kernel for every fixed l, but the exponent's dependency on l makes the size of the kernel grow very quickly when compared to uniform-kernelization case. This result is one of the main contributions of the paper and should be viewed as another result similar to the one obtained recently by Giannopoulou et al. [8]. We also looked at a special case for of l-pseudoforest Deletion, namely Pseudoforest Deletion, where we ask whether we can delete at most k vertices to get to a pseudoforest. A pseudoforest is special case of l-pseudoforest for l = 1, i.e. in a pseudoforest, each connected component is just one edge away from being a tree. In other words, it is a class of graphs where every connected component has at most one cycle. We apply the well known technique of iterative compression along with a non-trivial measure and an interesting base case to arrive at an O∗(7:5618k) algorithm for this problem. We also give an explicit kernel with O(k2) vertices for the problem. 2 Preliminaries In this section, we first give the notations and definitions which are used in the paper. Then we state some basic properties about l-pseudoforests and some known results which will be used. Notations and Definitions: For a graph G, we denote the set of vertices of the graph by V (G) and the set of edges of the graph by E(G). We denote jV (G)j and jE(G)j by n and m respectively, where the graph is clear from context. For a set S ⊆ V (G), the subgraph of G induced by S is denoted by G[S] and it is defined as the subgraph of G with vertex set S and edge set f(u; v) 2 E(G): u; v 2 Sg and the subgraph obtained after deleting S is denoted as G − S.
Recommended publications
  • Forbidden Subgraph Characterization of Quasi-Line Graphs Medha Dhurandhar [email protected]
    Forbidden Subgraph Characterization of Quasi-line Graphs Medha Dhurandhar [email protected] Abstract: Here in particular, we give a characterization of Quasi-line Graphs in terms of forbidden induced subgraphs. In general, we prove a necessary and sufficient condition for a graph to be a union of two cliques. 1. Introduction: A graph is a quasi-line graph if for every vertex v, the set of neighbours of v is expressible as the union of two cliques. Such graphs are more general than line graphs, but less general than claw-free graphs. In [2] Chudnovsky and Seymour gave a constructive characterization of quasi-line graphs. An alternative characterization of quasi-line graphs is given in [3] stating that a graph has a fuzzy reconstruction iff it is a quasi-line graph and also in [4] using the concept of sums of Hoffman graphs. Here we characterize quasi-line graphs in terms of the forbidden induced subgraphs like line graphs. We consider in this paper only finite, simple, connected, undirected graphs. The vertex set of G is denoted by V(G), the edge set by E(G), the maximum degree of vertices in G by Δ(G), the maximum clique size by (G) and the chromatic number by G). N(u) denotes the neighbourhood of u and N(u) = N(u) + u. For further notation please refer to Harary [3]. 2. Main Result: Before proving the main result we prove some lemmas, which will be used later. Lemma 1: If G is {3K1, C5}-free, then either 1) G ~ K|V(G)| or 2) If v, w V(G) are s.t.
    [Show full text]
  • Infinitely Many Minimal Classes of Graphs of Unbounded Clique-Width∗
    Infinitely many minimal classes of graphs of unbounded clique-width∗ A. Collins, J. Foniok†, N. Korpelainen, V. Lozin, V. Zamaraev Abstract The celebrated theorem of Robertson and Seymour states that in the family of minor-closed graph classes, there is a unique minimal class of graphs of unbounded tree-width, namely, the class of planar graphs. In the case of tree-width, the restriction to minor-closed classes is justified by the fact that the tree-width of a graph is never smaller than the tree-width of any of its minors. This, however, is not the case with respect to clique-width, as the clique-width of a graph can be (much) smaller than the clique-width of its minor. On the other hand, the clique-width of a graph is never smaller than the clique-width of any of its induced subgraphs, which allows us to be restricted to hereditary classes (that is, classes closed under taking induced subgraphs), when we study clique-width. Up to date, only finitely many minimal hereditary classes of graphs of unbounded clique-width have been discovered in the literature. In the present paper, we prove that the family of such classes is infinite. Moreover, we show that the same is true with respect to linear clique-width. Keywords: clique-width, linear clique-width, hereditary class 1 Introduction Clique-width is a graph parameter which is important in theoretical computer science, because many algorithmic problems that are generally NP-hard become polynomial-time solvable when restricted to graphs of bounded clique-width [4].
    [Show full text]
  • Graph Varieties Axiomatized by Semimedial, Medial, and Some Other Groupoid Identities
    Discussiones Mathematicae General Algebra and Applications 40 (2020) 143–157 doi:10.7151/dmgaa.1344 GRAPH VARIETIES AXIOMATIZED BY SEMIMEDIAL, MEDIAL, AND SOME OTHER GROUPOID IDENTITIES Erkko Lehtonen Technische Universit¨at Dresden Institut f¨ur Algebra 01062 Dresden, Germany e-mail: [email protected] and Chaowat Manyuen Department of Mathematics, Faculty of Science Khon Kaen University Khon Kaen 40002, Thailand e-mail: [email protected] Abstract Directed graphs without multiple edges can be represented as algebras of type (2, 0), so-called graph algebras. A graph is said to satisfy an identity if the corresponding graph algebra does, and the set of all graphs satisfying a set of identities is called a graph variety. We describe the graph varieties axiomatized by certain groupoid identities (medial, semimedial, autodis- tributive, commutative, idempotent, unipotent, zeropotent, alternative). Keywords: graph algebra, groupoid, identities, semimediality, mediality. 2010 Mathematics Subject Classification: 05C25, 03C05. 1. Introduction Graph algebras were introduced by Shallon [10] in 1979 with the purpose of providing examples of nonfinitely based finite algebras. Let us briefly recall this concept. Given a directed graph G = (V, E) without multiple edges, the graph algebra associated with G is the algebra A(G) = (V ∪ {∞}, ◦, ∞) of type (2, 0), 144 E. Lehtonen and C. Manyuen where ∞ is an element not belonging to V and the binary operation ◦ is defined by the rule u, if (u, v) ∈ E, u ◦ v := (∞, otherwise, for all u, v ∈ V ∪ {∞}. We will denote the product u ◦ v simply by juxtaposition uv. Using this representation, we may view any algebraic property of a graph algebra as a property of the graph with which it is associated.
    [Show full text]
  • Networkx: Network Analysis with Python
    NetworkX: Network Analysis with Python Salvatore Scellato Full tutorial presented at the XXX SunBelt Conference “NetworkX introduction: Hacking social networks using the Python programming language” by Aric Hagberg & Drew Conway Outline 1. Introduction to NetworkX 2. Getting started with Python and NetworkX 3. Basic network analysis 4. Writing your own code 5. You are ready for your project! 1. Introduction to NetworkX. Introduction to NetworkX - network analysis Vast amounts of network data are being generated and collected • Sociology: web pages, mobile phones, social networks • Technology: Internet routers, vehicular flows, power grids How can we analyze this networks? Introduction to NetworkX - Python awesomeness Introduction to NetworkX “Python package for the creation, manipulation and study of the structure, dynamics and functions of complex networks.” • Data structures for representing many types of networks, or graphs • Nodes can be any (hashable) Python object, edges can contain arbitrary data • Flexibility ideal for representing networks found in many different fields • Easy to install on multiple platforms • Online up-to-date documentation • First public release in April 2005 Introduction to NetworkX - design requirements • Tool to study the structure and dynamics of social, biological, and infrastructure networks • Ease-of-use and rapid development in a collaborative, multidisciplinary environment • Easy to learn, easy to teach • Open-source tool base that can easily grow in a multidisciplinary environment with non-expert users
    [Show full text]
  • Counting Independent Sets in Graphs with Bounded Bipartite Pathwidth∗
    Counting independent sets in graphs with bounded bipartite pathwidth∗ Martin Dyery Catherine Greenhillz School of Computing School of Mathematics and Statistics University of Leeds UNSW Sydney, NSW 2052 Leeds LS2 9JT, UK Australia [email protected] [email protected] Haiko M¨uller∗ School of Computing University of Leeds Leeds LS2 9JT, UK [email protected] 7 August 2019 Abstract We show that a simple Markov chain, the Glauber dynamics, can efficiently sample independent sets almost uniformly at random in polynomial time for graphs in a certain class. The class is determined by boundedness of a new graph parameter called bipartite pathwidth. This result, which we prove for the more general hardcore distribution with fugacity λ, can be viewed as a strong generalisation of Jerrum and Sinclair's work on approximately counting matchings, that is, independent sets in line graphs. The class of graphs with bounded bipartite pathwidth includes claw-free graphs, which generalise line graphs. We consider two further generalisations of claw-free graphs and prove that these classes have bounded bipartite pathwidth. We also show how to extend all our results to polynomially-bounded vertex weights. 1 Introduction There is a well-known bijection between matchings of a graph G and independent sets in the line graph of G. We will show that we can approximate the number of independent sets ∗A preliminary version of this paper appeared as [19]. yResearch supported by EPSRC grant EP/S016562/1 \Sampling in hereditary classes". zResearch supported by Australian Research Council grant DP190100977. 1 in graphs for which all bipartite induced subgraphs are well structured, in a sense that we will define precisely.
    [Show full text]
  • 1 Hamiltonian Path
    6.S078 Fine-Grained Algorithms and Complexity MIT Lecture 17: Algorithms for Finding Long Paths (Part 1) November 2, 2020 In this lecture and the next, we will introduce a number of algorithmic techniques used in exponential-time and FPT algorithms, through the lens of one parametric problem: Definition 0.1 (k-Path) Given a directed graph G = (V; E) and parameter k, is there a simple path1 in G of length ≥ k? Already for this simple-to-state problem, there are quite a few radically different approaches to solving it faster; we will show you some of them. We’ll see algorithms for the case of k = n (Hamiltonian Path) and then we’ll turn to “parameterizing” these algorithms so they work for all k. A number of papers in bioinformatics have used quick algorithms for k-Path and related problems to analyze various networks that arise in biology (some references are [SIKS05, ADH+08, YLRS+09]). In the following, we always denote the number of vertices jV j in our given graph G = (V; E) by n, and the number of edges jEj by m. We often associate the set of vertices V with the set [n] := f1; : : : ; ng. 1 Hamiltonian Path Before discussing k-Path, it will be useful to first discuss algorithms for the famous NP-complete Hamiltonian path problem, which is the special case where k = n. Essentially all algorithms we discuss here can be adapted to obtain algorithms for k-Path! The naive algorithm for Hamiltonian Path takes time about n! = 2Θ(n log n) to try all possible permutations of the nodes (which can also be adapted to get an O?(k!)-time algorithm for k-Path, as we’ll see).
    [Show full text]
  • General Approach to Line Graphs of Graphs 1
    DEMONSTRATIO MATHEMATICA Vol. XVII! No 2 1985 Antoni Marczyk, Zdzislaw Skupien GENERAL APPROACH TO LINE GRAPHS OF GRAPHS 1. Introduction A unified approach to the notion of a line graph of general graphs is adopted and proofs of theorems announced in [6] are presented. Those theorems characterize five different types of line graphs. Both Krausz-type and forbidden induced sub- graph characterizations are provided. So far other authors introduced and dealt with single spe- cial notions of a line graph of graphs possibly belonging to a special subclass of graphs. In particular, the notion of a simple line graph of a simple graph is implied by a paper of Whitney (1932). Since then it has been repeatedly introduc- ed, rediscovered and generalized by many authors, among them are Krausz (1943), Izbicki (1960$ a special line graph of a general graph), Sabidussi (1961) a simple line graph of a loop-free graph), Menon (1967} adjoint graph of a general graph) and Schwartz (1969; interchange graph which coincides with our line graph defined below). In this paper we follow another way, originated in our previous work [6]. Namely, we distinguish special subclasses of general graphs and consider five different types of line graphs each of which is defined in a natural way. Note that a similar approach to the notion of a line graph of hypergraphs can be adopted. We consider here the following line graphsi line graphs, loop-free line graphs, simple line graphs, as well as augmented line graphs and augmented loop-free line graphs. - 447 - 2 A. Marczyk, Z.
    [Show full text]
  • Network Analysis of the Multimodal Freight Transportation System in New York City
    Network Analysis of the Multimodal Freight Transportation System in New York City Project Number: 15 – 2.1b Year: 2015 FINAL REPORT June 2018 Principal Investigator Qian Wang Researcher Shuai Tang MetroFreight Center of Excellence University at Buffalo Buffalo, NY 14260-4300 Network Analysis of the Multimodal Freight Transportation System in New York City ABSTRACT The research is aimed at examining the multimodal freight transportation network in the New York metropolitan region to identify critical links, nodes and terminals that affect last-mile deliveries. Two types of analysis were conducted to gain a big picture of the region’s freight transportation network. First, three categories of network measures were generated for the highway network that carries the majority of last-mile deliveries. They are the descriptive measures that demonstrate the basic characteristics of the highway network, the network structure measures that quantify the connectivity of nodes and links, and the accessibility indices that measure the ease to access freight demand, services and activities. Second, 71 multimodal freight terminals were selected and evaluated in terms of their accessibility to major multimodal freight demand generators such as warehousing establishments. As found, the most important highways nodes that are critical in terms of connectivity and accessibility are those in and around Manhattan, particularly the bridges and tunnels connecting Manhattan to neighboring areas. Major multimodal freight demand generators, such as warehousing establishments, have better accessibility to railroad and marine port terminals than air and truck terminals in general. The network measures and findings in the research can be used to understand the inventory of the freight network in the system and to conduct freight travel demand forecasting analysis.
    [Show full text]
  • K-Path Centrality: a New Centrality Measure in Social Networks
    Centrality Metrics in Social Network Analysis K-path: A New Centrality Metric Experiments Summary K-Path Centrality: A New Centrality Measure in Social Networks Adriana Iamnitchi University of South Florida joint work with Tharaka Alahakoon, Rahul Tripathi, Nicolas Kourtellis and Ramanuja Simha Adriana Iamnitchi K-Path Centrality: A New Centrality Measure in Social Networks 1 of 23 Centrality Metrics in Social Network Analysis Centrality Metrics Overview K-path: A New Centrality Metric Betweenness Centrality Experiments Applications Summary Computing Betweenness Centrality Centrality Metrics in Social Network Analysis Betweenness Centrality - how much a node controls the flow between any other two nodes Closeness Centrality - the extent a node is near all other nodes Degree Centrality - the number of ties to other nodes Eigenvector Centrality - the relative importance of a node Adriana Iamnitchi K-Path Centrality: A New Centrality Measure in Social Networks 2 of 23 Centrality Metrics in Social Network Analysis Centrality Metrics Overview K-path: A New Centrality Metric Betweenness Centrality Experiments Applications Summary Computing Betweenness Centrality Betweenness Centrality measures the extent to which a node lies on the shortest path between two other nodes betweennes CB (v) of a vertex v is the summation over all pairs of nodes of the fractional shortest paths going through v. Definition (Betweenness Centrality) For every vertex v 2 V of a weighted graph G(V ; E), the betweenness centrality CB (v) of v is defined by X X σst (v) CB
    [Show full text]
  • The Strong Perfect Graph Theorem
    Annals of Mathematics, 164 (2006), 51–229 The strong perfect graph theorem ∗ ∗ By Maria Chudnovsky, Neil Robertson, Paul Seymour, * ∗∗∗ and Robin Thomas Abstract A graph G is perfect if for every induced subgraph H, the chromatic number of H equals the size of the largest complete subgraph of H, and G is Berge if no induced subgraph of G is an odd cycle of length at least five or the complement of one. The “strong perfect graph conjecture” (Berge, 1961) asserts that a graph is perfect if and only if it is Berge. A stronger conjecture was made recently by Conforti, Cornu´ejols and Vuˇskovi´c — that every Berge graph either falls into one of a few basic classes, or admits one of a few kinds of separation (designed so that a minimum counterexample to Berge’s conjecture cannot have either of these properties). In this paper we prove both of these conjectures. 1. Introduction We begin with definitions of some of our terms which may be nonstandard. All graphs in this paper are finite and simple. The complement G of a graph G has the same vertex set as G, and distinct vertices u, v are adjacent in G just when they are not adjacent in G.Ahole of G is an induced subgraph of G which is a cycle of length at least 4. An antihole of G is an induced subgraph of G whose complement is a hole in G. A graph G is Berge if every hole and antihole of G has even length. A clique in G is a subset X of V (G) such that every two members of X are adjacent.
    [Show full text]
  • Maximum and Minimum Degree in Iterated Line Graphs by Manu
    Maximum and minimum degree in iterated line graphs by Manu Aggarwal A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Master of Science Auburn, Alabama August 3, 2013 Keywords: iterated line graphs, maximum degree, minimum degree Approved by Dean Hoffman, Professor of Mathematics Chris Rodger, Professor of Mathematics Andras Bezdek, Professor of Mathematics Narendra Govil, Professor of Mathematics Abstract In this thesis we analyze two papers, both by Dr.Stephen G. Hartke and Dr.Aparna W. Higginson, on maximum [2] and minimum [3] degrees of a graph G under iterated line graph operations. Let ∆k and δk denote the minimum and the maximum degrees, respectively, of the kth iterated line graph Lk(G). It is shown that if G is not a path, then, there exist integers A and B such that for all k > A, ∆k+1 = 2∆k − 2 and for all k > B, δk+1 = 2δk − 2. ii Table of Contents Abstract . ii List of Figures . iv 1 Introduction . .1 2 An elementary result . .3 3 Maximum degree growth in iterated line graphs . 10 4 Minimum degree growth in iterated line graphs . 26 5 A puzzle . 45 Bibliography . 46 iii List of Figures 1.1 ............................................1 2.1 ............................................4 2.2 : Disappearing vertex of degree two . .5 2.3 : Disappearing leaf . .7 3.1 ............................................ 11 3.2 ............................................ 12 3.3 ............................................ 13 3.4 ............................................ 14 3.5 ............................................ 15 3.6 : When CD is not a single vertex . 17 3.7 : When CD is a single vertex . 18 4.1 ...........................................
    [Show full text]
  • Degrees & Isomorphism: Chapter 11.1 – 11.4
    “mcs” — 2015/5/18 — 1:43 — page 393 — #401 11 Simple Graphs Simple graphs model relationships that are symmetric, meaning that the relationship is mutual. Examples of such mutual relationships are being married, speaking the same language, not speaking the same language, occurring during overlapping time intervals, or being connected by a conducting wire. They come up in all sorts of applications, including scheduling, constraint satisfaction, computer graphics, and communications, but we’ll start with an application designed to get your attention: we are going to make a professional inquiry into sexual behavior. Specifically, we’ll look at some data about who, on average, has more opposite-gender partners: men or women. Sexual demographics have been the subject of many studies. In one of the largest, researchers from the University of Chicago interviewed a random sample of 2500 people over several years to try to get an answer to this question. Their study, published in 1994 and entitled The Social Organization of Sexuality, found that men have on average 74% more opposite-gender partners than women. Other studies have found that the disparity is even larger. In particular, ABC News claimed that the average man has 20 partners over his lifetime, and the av- erage woman has 6, for a percentage disparity of 233%. The ABC News study, aired on Primetime Live in 2004, purported to be one of the most scientific ever done, with only a 2.5% margin of error. It was called “American Sex Survey: A peek between the sheets”—raising some questions about the seriousness of their reporting.
    [Show full text]