Graph Theory) 15 3.1 Oriented Graphs
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Efficiently Mining Frequent Closed Partial Orders
Efficiently Mining Frequent Closed Partial Orders (Extended Abstract) Jian Pei1 Jian Liu2 Haixun Wang3 Ke Wang1 Philip S. Yu3 Jianyong Wang4 1 Simon Fraser Univ., Canada, fjpei, [email protected] 2 State Univ. of New York at Buffalo, USA, [email protected] 3 IBM T.J. Watson Research Center, USA, fhaixun, [email protected] 4 Tsinghua Univ., China, [email protected] 1 Introduction Account codes and explanation Account code Account type CHK Checking account Mining ordering information from sequence data is an MMK Money market important data mining task. Sequential pattern mining [1] RRSP Retirement Savings Plan can be regarded as mining frequent segments of total orders MORT Mortgage from sequence data. However, sequential patterns are often RESP Registered Education Savings Plan insufficient to concisely capture the general ordering infor- BROK Brokerage mation. Customer Records Example 1 (Motivation) Suppose MapleBank in Canada Cid Sequence of account opening wants to investigate whether there is some orders which cus- 1 CHK ! MMK ! RRSP ! MORT ! RESP ! BROK tomers often follow to open their accounts. A database DB 2 CHK ! RRSP ! MMK ! MORT ! RESP ! BROK in Table 1 about four customers’ sequences of opening ac- 3 MMK ! CHK ! BROK ! RESP ! RRSP counts in MapleBank is analyzed. 4 CHK ! MMK ! RRSP ! MORT ! BROK ! RESP Given a support threshold min sup, a sequential pattern is a sequence s which appears as subsequences of at least Table 1. A database DB of sequences of ac- min sup sequences. For example, let min sup = 3. The count opening. following four sequences are sequential patterns since they are subsequences of three sequences, 1, 2 and 4, in DB. -
Approximating Transitive Reductions for Directed Networks
Approximating Transitive Reductions for Directed Networks Piotr Berman1, Bhaskar DasGupta2, and Marek Karpinski3 1 Pennsylvania State University, University Park, PA 16802, USA [email protected] Research partially done while visiting Dept. of Computer Science, University of Bonn and supported by DFG grant Bo 56/174-1 2 University of Illinois at Chicago, Chicago, IL 60607-7053, USA [email protected] Supported by NSF grants DBI-0543365, IIS-0612044 and IIS-0346973 3 University of Bonn, 53117 Bonn, Germany [email protected] Supported in part by DFG grants, Procope grant 31022, and Hausdorff Center research grant EXC59-1 Abstract. We consider minimum equivalent digraph problem, its max- imum optimization variant and some non-trivial extensions of these two types of problems motivated by biological and social network appli- 3 cations. We provide 2 -approximation algorithms for all the minimiza- tion problems and 2-approximation algorithms for all the maximization problems using appropriate primal-dual polytopes. We also show lower bounds on the integrality gap of the polytope to provide some intuition on the final limit of such approaches. Furthermore, we provide APX- hardness result for all those problems even if the length of all simple cycles is bounded by 5. 1 Introduction Finding an equivalent digraph is a classical computational problem (cf. [13]). The statement of the basic problem is simple. For a digraph G = (V, E), we E use the notation u → v to indicate that E contains a path from u to v and E the transitive closure of E is the relation u → v over all pairs of vertices of V . -
Bijective Counting of Plane Bipolar Orientations
Bijective counting of plane bipolar orientations Eric´ Fusy ??, Dominique Poulalhon ??, and Gilles Schaeffer ?? a LIX, Ecole´ Polytechnique, 91128 Palaiseau Cedex-France b LIAFA (Universit´eParis Diderot), 2 place Jussieu 75251 Paris cedex 05 Abstract We introduce a bijection between plane bipolar orientations with fixed numbers of vertices and faces, and non-intersecting triples of upright lattice paths with some specific extremities. Writing ϑij for the number of plane bipolar orientations with (i + 1) vertices and (j + 1) faces, our bijection provides a combinatorial proof of the following formula due to Baxter: (i + j − 2)! (i + j − 1)! (i + j)! (1) ϑij = 2 . (i − 1)! i! (i + 1)! (j − 1)! j! (j + 1)! Keywords: bijection, bipolar orientations, non-intersecting paths. 1 Introduction A bipolar orientation of a graph G = (V, E) is an acyclic orientation of G such that the induced partial order on the vertex set has a unique minimum s called the source, and a unique maximum t called the sink. Alternative definitions and many interesting properties are described in [?]. Bipolar ori- entations are a powerful combinatorial structure and prove insightful to solve many algorithmic problems such as planar graph embedding [?] and geometric representations of graphs in various flavours. As a consequence, it is an inter- esting issue to have a better understanding of their combinatorial properties. This extended abstract focuses on the enumeration of bipolar orientations in the planar case. Precisely, we consider bipolar orientations on rooted planar maps, where a planar map is a connected planar graph embedded in the plane without edge-crossings and up to isotopic deformation, and rooted means with a marked oriented edge (called the root) having the outer face on its left. -
I?'!'-Comparability Graphs
Discrete Mathematics 74 (1989) 173-200 173 North-Holland I?‘!‘-COMPARABILITYGRAPHS C.T. HOANG Department of Computer Science, Rutgers University, New Brunswick, NJ 08903, U.S.A. and B.A. REED Discrete Mathematics Group, Bell Communications Research, Morristown, NJ 07950, U.S.A. In 1981, Chv&tal defined the class of perfectly orderable graphs. This class of perfect graphs contains the comparability graphs. In this paper, we introduce a new class of perfectly orderable graphs, the &comparability graphs. This class generalizes comparability graphs in a natural way. We also prove a decomposition theorem which leads to a structural characteriza- tion of &comparability graphs. Using this characterization, we develop a polynomial-time recognition algorithm and polynomial-time algorithms for the clique and colouring problems for &comparability graphs. 1. Introduction A natural way to color the vertices of a graph is to put them in some order v*cv~<” l < v, and then assign colors in the following manner: (1) Consider the vertxes sequentially (in the sequence given by the order) (2) Assign to each Vi the smallest color (positive integer) not used on any neighbor vi of Vi with j c i. We shall call this the greedy coloring algorithm. An order < of a graph G is perfect if for each subgraph H of G, the greedy algorithm applied to H, gives an optimal coloring of H. An obstruction in a ordered graph (G, <) is a set of four vertices {a, b, c, d} with edges ab, bc, cd (and no other edge) and a c b, d CC. Clearly, if < is a perfect order on G, then (G, C) contains no obstruction (because the chromatic number of an obstruction is twu, but the greedy coloring algorithm uses three colors). -
Graph Orientations and Linear Extensions
GRAPH ORIENTATIONS AND LINEAR EXTENSIONS. BENJAMIN IRIARTE Abstract. Given an underlying undirected simple graph, we consider the set of all acyclic orientations of its edges. Each of these orientations induces a par- tial order on the vertices of our graph and, therefore, we can count the number of linear extensions of these posets. We want to know which choice of orien- tation maximizes the number of linear extensions of the corresponding poset, and this problem will be solved essentially for comparability graphs and odd cycles, presenting several proofs. The corresponding enumeration problem for arbitrary simple graphs will be studied, including the case of random graphs; this will culminate in 1) new bounds for the volume of the stable polytope and 2) strong concentration results for our main statistic and for the graph entropy, which hold true a:s: for random graphs. We will then argue that our problem springs up naturally in the theory of graphical arrangements and graphical zonotopes. 1. Introduction. Linear extensions of partially ordered sets have been the object of much attention and their uses and applications remain increasing. Their number is a fundamental statistic of posets, and they relate to ever-recurring problems in computer science due to their role in sorting problems. Still, many fundamental questions about linear extensions are unsolved, including the well-known 1=3-2=3 Conjecture. Efficiently enumerating linear extensions of certain posets is difficult, and the general problem has been found to be ]P-complete in Brightwell and Winkler (1991). Directed acyclic graphs, and similarly, acyclic orientations of simple undirected graphs, are closely related to posets, and their problem-modeling values in several disciplines, including the biological sciences, needs no introduction. -
Applications of DFS
(b) acyclic (tree) iff a DFS yeilds no Back edges 2.A directed graph is acyclic iff a DFS yields no back edges, i.e., DAG (directed acyclic graph) , no back edges 3. Topological sort of a DAG { next 4. Connected components of a undirected graph (see Homework 6) 5. Strongly connected components of a drected graph (see Sec.22.5 of [CLRS,3rd ed.]) Applications of DFS 1. For a undirected graph, (a) a DFS produces only Tree and Back edges 1 / 7 2.A directed graph is acyclic iff a DFS yields no back edges, i.e., DAG (directed acyclic graph) , no back edges 3. Topological sort of a DAG { next 4. Connected components of a undirected graph (see Homework 6) 5. Strongly connected components of a drected graph (see Sec.22.5 of [CLRS,3rd ed.]) Applications of DFS 1. For a undirected graph, (a) a DFS produces only Tree and Back edges (b) acyclic (tree) iff a DFS yeilds no Back edges 1 / 7 3. Topological sort of a DAG { next 4. Connected components of a undirected graph (see Homework 6) 5. Strongly connected components of a drected graph (see Sec.22.5 of [CLRS,3rd ed.]) Applications of DFS 1. For a undirected graph, (a) a DFS produces only Tree and Back edges (b) acyclic (tree) iff a DFS yeilds no Back edges 2.A directed graph is acyclic iff a DFS yields no back edges, i.e., DAG (directed acyclic graph) , no back edges 1 / 7 4. Connected components of a undirected graph (see Homework 6) 5. -
Descriptive Graph Combinatorics
Descriptive Graph Combinatorics Alexander S. Kechris and Andrew S. Marks (Preliminary version; November 3, 2018) Introduction In this article we survey the emerging field of descriptive graph combina- torics. This area has developed in the last two decades or so at the interface of descriptive set theory and graph theory, and it has interesting connections with other areas such as ergodic theory and probability theory. Our object of study is the theory of definable graphs, usually Borel or an- alytic graphs on Polish spaces. We investigate how combinatorial concepts, such as colorings and matchings, behave under definability constraints, i.e., when they are required to be definable or perhaps well-behaved in the topo- logical or measure theoretic sense. To illustrate the new phenomena that can arise in the definable context, consider for example colorings of graphs. As usual a Y -coloring of a graph G = (X; G), where X is the set of vertices and G ⊆ X2 the edge relation, is a map c: X ! Y such that xGy =) c(x) 6= c(y). An elementary result in graph theory asserts that any acyclic graph admits a 2-coloring (i.e., a coloring as above with jY j = 2). On the other hand, consider a Borel graph G = (X; G), where X is a Polish space and G is Borel (in X2). A Borel coloring of G is a coloring c: X ! Y as above with Y a Polish space and c a Borel map. In contrast to the above basic fact, there are acyclic Borel graphs G which admit no Borel countable coloring (i.e., with jY j ≤ @0); see Example 3.14. -
Vertex Ordering Problems in Directed Graph Streams∗
Vertex Ordering Problems in Directed Graph Streams∗ Amit Chakrabartiy Prantar Ghoshz Andrew McGregorx Sofya Vorotnikova{ Abstract constant-pass algorithms for directed reachability [12]. We consider directed graph algorithms in a streaming setting, This is rather unfortunate given that many of the mas- focusing on problems concerning orderings of the vertices. sive graphs often mentioned in the context of motivating This includes such fundamental problems as topological work on graph streaming are directed, e.g., hyperlinks, sorting and acyclicity testing. We also study the related citations, and Twitter \follows" all correspond to di- problems of finding a minimum feedback arc set (edges rected edges. whose removal yields an acyclic graph), and finding a sink In this paper we consider the complexity of a variety vertex. We are interested in both adversarially-ordered and of fundamental problems related to vertex ordering in randomly-ordered streams. For arbitrary input graphs with directed graphs. For example, one basic problem that 1 edges ordered adversarially, we show that most of these motivated much of this work is as follows: given a problems have high space complexity, precluding sublinear- stream consisting of edges of an acyclic graph in an space solutions. Some lower bounds also apply when the arbitrary order, how much memory is required to return stream is randomly ordered: e.g., in our most technical result a topological ordering of the graph? In the offline we show that testing acyclicity in the p-pass random-order setting, this can be computed in O(m + n) time using model requires roughly n1+1=p space. -
Calculating Graph Algorithms for Dominance and Shortest Path*
Calculating Graph Algorithms for Dominance and Shortest Path⋆ Ilya Sergey1, Jan Midtgaard2, and Dave Clarke1 1 KU Leuven, Belgium {first.last}@cs.kuleuven.be 2 Aarhus University, Denmark [email protected] Abstract. We calculate two iterative, polynomial-time graph algorithms from the literature: a dominance algorithm and an algorithm for the single-source shortest path problem. Both algorithms are calculated di- rectly from the definition of the properties by fixed-point fusion of (1) a least fixed point expressing all finite paths through a directed graph and (2) Galois connections that capture dominance and path length. The approach illustrates that reasoning in the style of fixed-point calculus extends gracefully to the domain of graph algorithms. We thereby bridge common practice from the school of program calculation with common practice from the school of static program analysis, and build a novel view on iterative graph algorithms as instances of abstract interpretation. Keywords: graph algorithms, dominance, shortest path algorithm, fixed-point fusion, fixed-point calculus, Galois connections 1 Introduction Calculating an implementation from a specification is central to two active sub- fields of theoretical computer science, namely the calculational approach to pro- gram development [1,12,13] and the calculational approach to abstract interpre- tation [18, 22, 33, 34]. The advantage of both approaches is clear: the resulting implementations are provably correct by construction. Whereas the former is a general approach to program development, the latter approach is mainly used for developing provably sound static analyses (with notable exceptions [19,25]). Both approaches are anchored in some of the same discrete mathematical structures, namely partial orders, complete lattices, fixed points and Galois connections. -
Algorithms (Decrease-And-Conquer)
Algorithms (Decrease-and-Conquer) Pramod Ganapathi Department of Computer Science State University of New York at Stony Brook August 22, 2021 1 Contents Concepts 1. Decrease by constant Topological sorting 2. Decrease by constant factor Lighter ball Josephus problem 3. Variable size decrease Selection problem ............................................................... Problems Stooge sort 2 Contributors Ayush Sharma 3 Decrease-and-conquer Problem(n) [Step 1. Decrease] Subproblem(n0) [Step 2. Conquer] Subsolution [Step 3. Combine] Solution 4 Types of decrease-and-conquer Decrease by constant. n0 = n − c for some constant c Decrease by constant factor. n0 = n/c for some constant c Variable size decrease. n0 = n − c for some variable c 5 Decrease by constant Size of instance is reduced by the same constant in each iteration of the algorithm Decrease by 1 is common Examples: Array sum Array search Find maximum/minimum element Integer product Exponentiation Topological sorting 6 Decrease by constant factor Size of instance is reduced by the same constant factor in each iteration of the algorithm Decrease by factor 2 is common Examples: Binary search Search/insert/delete in balanced search tree Fake coin problem Josephus problem 7 Variable size decrease Size of instance is reduced by a variable in each iteration of the algorithm Examples: Selection problem Quicksort Search/insert/delete in binary search tree Interpolation search 8 Decrease by Constant HOME 9 Topological sorting Problem Topological sorting of vertices of a directed acyclic graph is an ordering of the vertices v1, v2, . , vn in such a way that there is an edge directed towards vertex vj from vertex vi, then vi comes before vj. -
Strong Subgraph Connectivity of Digraphs: a Survey
Strong Subgraph Connectivity of Digraphs: A Survey Yuefang Sun1 and Gregory Gutin2 1 Department of Mathematics, Shaoxing University Zhejiang 312000, P. R. China, [email protected] 2 School of Computer Science and Mathematics Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK, [email protected] Abstract In this survey we overview known results on the strong subgraph k- connectivity and strong subgraph k-arc-connectivity of digraphs. After an introductory section, the paper is divided into four sections: basic results, algorithms and complexity, sharp bounds for strong subgraph k-(arc-)connectivity, minimally strong subgraph (k,ℓ)-(arc-) connected digraphs. This survey contains several conjectures and open problems for further study. Keywords: Strong subgraph k-connectivity; Strong subgraph k-arc- connectivity; Subdigraph packing; Directed q-linkage; Directed weak q-linkage; Semicomplete digraphs; Symmetric digraphs; Generalized k- connectivity; Generalized k-edge-connectivity. AMS subject classification (2010): 05C20, 05C35, 05C40, 05C70, 05C75, 05C76, 05C85, 68Q25, 68R10. 1 Introduction arXiv:1808.02740v1 [cs.DM] 8 Aug 2018 The generalized k-connectivity κk(G) of a graph G = (V, E) was intro- duced by Hager [14] in 1985 (2 ≤ k ≤ |V |). For a graph G = (V, E) and a set S ⊆ V of at least two vertices, an S-Steiner tree or, simply, an S-tree is a subgraph T of G which is a tree with S ⊆ V (T ). Two S-trees T1 and T2 are said to be edge-disjoint if E(T1) ∩ E(T2)= ∅. Two edge-disjoint S-trees T1 and T2 are said to be internally disjoint if V (T1) ∩ V (T2)= S. -
Masters Thesis: an Approach to the Automatic Synthesis of Controllers with Mixed Qualitative/Quantitative Specifications
An approach to the automatic synthesis of controllers with mixed qualitative/quantitative specifications. Athanasios Tasoglou Master of Science Thesis Delft Center for Systems and Control An approach to the automatic synthesis of controllers with mixed qualitative/quantitative specifications. Master of Science Thesis For the degree of Master of Science in Embedded Systems at Delft University of Technology Athanasios Tasoglou October 11, 2013 Faculty of Electrical Engineering, Mathematics and Computer Science (EWI) · Delft University of Technology *Cover by Orestis Gartaganis Copyright c Delft Center for Systems and Control (DCSC) All rights reserved. Abstract The world of systems and control guides more of our lives than most of us realize. Most of the products we rely on today are actually systems comprised of mechanical, electrical or electronic components. Engineering these complex systems is a challenge, as their ever growing complexity has made the analysis and the design of such systems an ambitious task. This urged the need to explore new methods to mitigate the complexity and to create sim- plified models. The answer to these new challenges? Abstractions. An abstraction of the the continuous dynamics is a symbolic model, where each “symbol” corresponds to an “aggregate” of states in the continuous model. Symbolic models enable the correct-by-design synthesis of controllers and the synthesis of controllers for classes of specifications that traditionally have not been considered in the context of continuous control systems. These include qualitative specifications formalized using temporal logics, such as Linear Temporal Logic (LTL). Be- sides addressing qualitative specifications, we are also interested in synthesizing controllers with quantitative specifications, in order to solve optimal control problems.