Finding Patterns in an Unknown Graph

Total Page:16

File Type:pdf, Size:1020Kb

Finding Patterns in an Unknown Graph 1 Finding Patterns in an Unknown Graph Roni Stern aMeir Kalech a and Ariel Felner a that the structure of the graph is given either explic- a Department of Information System Engineering itly, in data structures such as adjacency list or adja- Ben Gurion University of the Negev cency matrix, or implicitly, with a start state and a set Beer-Sheva, 84105, Israel of computable operators (e.g., moving a tile in a slid- E-mails: [email protected], [email protected], ing tile puzzle state). The complexity of such search [email protected] algorithms is therefore measured with respect to CPU time and memory demands. We refer to such problems AbstractSolving a problem in an unknown graph requires an as problems on known graphs. agent to iteratively explore parts of the searched graph. Ex- By contrast, there are domains that can be modeled ploring an unknown graph can be very costly, for example, as graphs, where the graph structure is not known a- when the exploration requires activating a physical sensor or priori, and exploring vertices and edges requires a dif- performing network I/O. In this paper we address the prob- ferent type of resource, that is, neither CPU nor mem- lem of searching for a given input pattern in an unknown ory. For example, a robot navigating in an unknown graph, while minimizing the number of required exploration terrain, where vertices and edges correspond to physi- actions. This problem is analyzed theoretically. Then, al- cal locations and roads, respectively. Acquiring knowl- gorithms that choose which part of the environment to ex- edge about the vertices and edges of the searched graph plore next are presented. Among these are adaptations of ex- may require activating a physical sensor and possibly isting algorithms for finding cliques in a known graph as well as a novel heuristic algorithm (Pattern∗). Addition- mobilizing the robot, incurring a cost of fuel (or any ally, we investigate how probabilistic knowledge of the exis- other energy resource). Another example is an agent tence of edges can be used to further minimize the required searching the World Wide Web, where the web sites exploration. With this additional knowledge we propose a and hypertext links represent the vertices and edges of Markov Decision Problem (MDP) formulation and a Monte- the searched graph, respectively. Since the web is ex- Carlo based algorithm (RPattern∗) which greatly reduces tremely large and dynamic, accessing vertices requires the total exploration cost. As a case study, we demonstrate sending and receiving network packets (e.g., HTTP re- how the different heuristic algorithms can be implemented quest/response). We refer to such problems as prob- for the k-clique pattern as well as for the complete bipartite lems on unknown graphs. pattern. Experimental results are provided that demonstrate Solving problems in unknown graphs (as well as in the strengths and weaknesses of the proposed approaches on any other type of graph problem) requires exploring random and scale-free graphs as well as on an online web crawler application searching in Google Scholar. In all the some parts of the graph. We define an exploration ac- experimental settings we have tried, the proposed heuristic tion for a vertex as an action that discovers all its outgo- algorithms were able to find the searched pattern with sub- ing edges and neighboring vertices. Such exploration stantially less exploration cost than random exploration. actions are associated with a cost, denoted hereafter as Keywords: Heuristic search, Unknown graphs, Subgraph iso- exploration cost. This exploration cost is often concep- morphism tually different than the traditional computational ef- fort (of CPU and memory). In the web graph domain, for example, the exploration can correspond to sending 1. Introduction an HTTP request, retrieving an HTML page and pars- ing all the hypertext links in it. The hypertext links are Many real-life problems can be modeled as prob- the outgoing edges, and the connected web sites are the lems on graphs, where one needs to find subgraphs that neighboring vertices. The associated exploration cost have a specific structure or attributes. Examples of such includes the network I/O of sending and receiving IP subgraph structures are shortest paths, any path, short- packets. For a physical domain, where a robot is nav- est traveling salesperson tours and cliques. Most classi- igating in an unknown terrain, the exploration is done cal algorithms that solve such graph problems assume by using sensors at a location to discover the near area, AI Communications ISSN 0921-7126, IOS Press. All rights reserved 2 Finding Patterns in an Unknown Graph e.g., the outgoing edges and the neighboring vertices in of exploration cost, is equal to and often much better the map. The associated exploration cost includes the than an adaptation of the state-of-the-art clique search cost of activating sensors at a vertex. In both cases the algorithm. The strengths and weaknesses of the differ- CPU and memory costs are often negligible in compar- ent heuristic algorithms are evaluated. We also imple- ison to the other exploration costs. An important task, mented and evaluated the algorithms on a web crawler which is addressed in this paper, is to solve the prob- application, where the papers that are accessible via lem while minimizing the exploration cost. This is es- Google Scholar are the vertices of the searched un- pecially important when computational CPU cost is of known graph. Results show that using Clique∗, cliques lesser importance and can be neglected as long as it is are found more often and with less exploration cost running in time that is tractable. compared to KnownDegree and random exploration. In this paper, we address the problem of searching Beyond the value of investigating such a basic prob- for a specific pattern of vertices and edges in an un- lem in the unknown graph setting, finding patterns in known graph while aiming to minimize the exploration an unknown graph has practical applications in real- cost. Starting from a single known vertex, the search is world domains. For example, finding a set of physical performed in a best-first search manner. In every step, locations forming a clique suggests the existence of a if the desired pattern does not exist in the known part of metropolitan area. Another example is a set of scien- the graph a single “best” vertex is chosen and explored. tific papers, where finding a set of papers that reference This process is repeated until the desired pattern is each other suggest resemblance in content. Therefore found or until the entire unknown graph is explored. finding such a cluster of referencing papers can be use- Several general heuristic algorithms are proposed for ful in a data mining context (complemented by a tex- choosing which vertex to explore next: KnownDegree, tual data mining approach), where the goal is to find a ∗ ∗ Pattern and RPattern . KnownDegree is a straight- set of scientific papers from a given subject. Section 8 forward adaptation of a common known graph heuris- describes experimental results of such a web crawler tic, in which the vertex with the highest degree is application where a k-clique of referencing papers is ∗ explored first. Pattern exploits the structure of the searched in Google Scholar. searched pattern by choosing to explore the vertex that This paper is organized as follows. First we for- is “closest” to being a part of the searched pattern. A mally define the problem of finding a pattern in an un- metric for “closeness” of a vertex to a pattern is pre- known graph (Section 2) and list related work (Sec- ∗ sented. With this “closeness” metric, Pattern has the tion 3). Then, a best-first search framework for solv- property of returning a tight lower bound on the num- ing this problem is described (Section 4). Several de- ber of exploration steps required to find the searched terministic heuristic algorithms are given for this best- pattern. For scenarios where probabilistic knowledge first search framework (Section 5), as well as a heuris- of the unknown graph is available, we propose the tic algorithm that can exploit probabilistic knowledge RPattern∗ RPattern∗ heuristic algorithm. is a ran- of the searched graph (Section 6). Following, we ana- domized heuristic algorithm that chooses the next ver- lyze the proposed best-first search framework theoret- tex to explore by applying a Monte-Carlo sampling ically (Section 7) and compare the described heuris- procedure in combination with Pattern∗ as a default tic algorithms experimentally (Section 8).The paper heuristic. finally concludes with a discussion and future work To demonstrate the applicability of the proposed (Section 9). heuristic algorithms, we describe how to implement A preliminary version of this paper already ap- them for two specific patterns: a k-clique and a com- peared [1] focusing on searching for the k-clique pat- plete (p-q)-bipartite graph. We develop the concept of tern in an unknown graph. In this paper we take a big a potential k-clique and a potential complete (p-q)- step beyond that work, as detailed in Section 3. bipartite graph, along with supporting corollaries that allow efficient implementation of the Pattern∗ heuris- tic algorithm for these patterns. Empirical evaluation were performed on the k-clique pattern, by applying 2. Problem Definition the proposed heuristic algorithms when searching ran- dom and scale-free graphs. Results show that the per- Following are several definitions and notations re- formance of Clique∗ and RClique∗ (the k-clique vari- quired for formally describing the problem of finding ants of Pattern∗and RPattern∗respectively), in terms a specific pattern in an unknown graph.
Recommended publications
  • On the Density of a Graph and Its Blowup
    On the Density of a Graph and its Blowup Asaf Shapira ¤ Raphael Yustery Abstract It is well-known that, of all graphs with edge-density p, the random graph G(n; p) contains the smallest density of copies of Kt;t, the complete bipartite graph of size 2t. Since Kt;t is a t-blowup of an edge, the following intriguing open question arises: Is it true that of all graphs with triangle 3 density p , the random graph G(n; p) contains close to the smallest density of Kt;t;t, which is the t-blowup of a triangle? Our main result gives an indication that the answer to the above question is positive by showing that for some blowup, the answer must be positive. More formally we prove that if G 3 has triangle density p , then there is some 2 · t · T (p) for which the density of Kt;t;t in G is at (3+o(1))t2 least p , which (up to the o(1) term) equals the density of Kt;t;t in G(n; p). We also raise several open problems related to these problems and discuss some applications to other areas. 1 Introduction One of the main family of problems studied in extremal graph theory is how does the lack and/or number of copies of one graph H in a graph G a®ect the lack and/or number of copies of another graph H0 in G. Perhaps the most well known problems of this type are Ramsey's Theorem and Tur¶an'sTheorem.
    [Show full text]
  • Closest 4-Leaf Power Is Fixed-Parameter Tractable$
    Discrete Applied Mathematics 156 (2008) 3345–3361 www.elsevier.com/locate/dam Closest 4-leaf power is fixed-parameter tractableI Michael Dom∗, Jiong Guo, Falk Huffner,¨ Rolf Niedermeier Institut fur¨ Informatik, Friedrich-Schiller-Universitat¨ Jena, Ernst-Abbe-Platz 2, D-07743 Jena, Germany Received 3 August 2006; received in revised form 18 December 2007; accepted 9 January 2008 Available online 4 March 2008 Abstract The NP-complete CLOSEST 4-LEAF POWER problem asks, given an undirected graph, whether it can be modified by at most r edge insertions or deletions such that it becomes a 4-leaf power. Herein, a 4-leaf power is a graph that can be constructed by considering an unrooted tree—the 4-leaf root—with leaves one-to-one labeled by the graph vertices, where we connect two graph vertices by an edge iff their corresponding leaves are at distance at most 4 in the tree. Complementing previous work on CLOSEST 2-LEAF POWER and CLOSEST 3-LEAF POWER, we give the first algorithmic result for CLOSEST 4-LEAF POWER, showing that CLOSEST 4-LEAF POWER is fixed-parameter tractable with respect to the parameter r. c 2008 Elsevier B.V. All rights reserved. Keywords: Fixed-parameter tractability; Graph algorithm; Graph modification; Graph power; Leaf power; Forbidden subgraph characterization 1. Introduction Graph powers form a classical concept in graph theory, and the rich literature dates back to the sixties of the previous century (see [5, Section 10.6] and [27] for surveys). The k-power of an undirected graph G D .V; E/ is the undirected graph Gk D .V; E0/ with .u; v/ 2 E0 iff there is a path of length at most k between u and v in G.
    [Show full text]
  • Graph Powers: Hardness Results, Good Characterizations and Efficient Algorithms
    Graph Powers: Hardness Results, Good Characterizations and Efficient Algorithms Dissertation zur Erlangung des akademischen Grades Doktor-Ingenieur (Dr.-Ing.) der Fakult¨at f¨ur Informatik und Elektrotechnik der Universit¨at Rostock Vorgelegt von MSc. Ngoc Tuy Nguyen Rostock, November 2009 Gutachter: Prof. Dr. Van Bang Le Universit¨at Rostock. Institut fu¨rInformatik Gutachter: Prof. Dr. Egon Wanke Heinrich- Heine- Universit¨at D¨usseldorf. Institut fu¨rInformatik Gutachter: Prof. Dr. Ekkehard K¨ohler Brandenburgische Technische Universit¨at Cottbus. Institut fu¨rMathematik Tag der ¨offentlichen Verteidigung: 30. Oktober 2009 ii Abstract Given a graph H =(VH , EH ) and a positive integer k, the k-th power of H, written Hk, is the graph obtained from H by adding new edges between any pair of vertices k at distance at most k in H; formally, H =(VH , {xy | 1 ≤ dH (x, y) ≤ k}). A graph G is the k-th power of a graph H if G = Hk, and in this case, H is a k-th root of G. For the cases of k = 2 and k = 3, we say that H2 and H3 is the square, respectively, the cube of H and H is a square root of G = H2, respectively, a cube root of G = H3. In this thesis we study the computational complexity for recognizing k-th pow- ers of general graphs as well as restricted graphs. This work provides new NP- completeness results, good characterizations and efficient algorithms for graph pow- ers. The main results are the following. • There exist reductions proving the NP-completeness for recognizing k-th pow- ers of general graphs for fixed k ≥ 2, recognizing k-th powers of bipartite graphs for fixed k ≥ 3, recognizing k-th powers of chordal graphs, and finding k-th roots of chordal graphs for all fixed k ≥ 2.
    [Show full text]
  • Recognition of C4-Free and 1/2-Hyperbolic Graphs David Coudert, Guillaume Ducoffe
    Recognition of C4-free and 1/2-hyperbolic graphs David Coudert, Guillaume Ducoffe To cite this version: David Coudert, Guillaume Ducoffe. Recognition of C4-free and 1/2-hyperbolic graphs. SIAM Journal on Discrete Mathematics, Society for Industrial and Applied Mathematics, 2014, 28 (3), pp.1601-1617. 10.1137/140954787. hal-01070768 HAL Id: hal-01070768 https://hal.inria.fr/hal-01070768 Submitted on 2 Oct 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. ∗ Recognition of C4-free and 1/2-hyperbolic graphs David Coudert†‡ Guillaume Ducoffe†‡§ October 2, 2014 Abstract The shortest-path metric d of a connected graph G is 1/2-hyperbolic if, and only if, it satisfies d(u,v) + d(x,y) ≤ max{d(u,x) + d(v,y), d(u,y) + d(v,x)} + 1, for every 4-tuple u,x,v,y of G. We show that the problem of deciding whether an unweighted graph is 1/2-hyperbolic is subcubic equivalent to the problem of determining whether there is a chordless cycle of length 4 in a graph. An improved algorithm is also given for both problems, taking advantage of fast rectangular matrix multiplication.
    [Show full text]
  • Global Discharging Methods for Coloring Problems in Graphs Marthe Bonamy
    Global discharging methods for coloring problems in graphs Marthe Bonamy To cite this version: Marthe Bonamy. Global discharging methods for coloring problems in graphs. Discrete Mathematics [cs.DM]. Université de Montpellier, 2015. English. tel-02083632 HAL Id: tel-02083632 https://tel.archives-ouvertes.fr/tel-02083632 Submitted on 29 Mar 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Délivré par l’Université Montpellier Préparée au sein de l’école doctorale I2S Et de l’unité de recherche LIRMM Spécialité: INFORMATIQUE Présentée par Marthe Bonamy Global discharging methods for coloring problems in graphs Soutenue le 9 Février 2015 devant le jury composé de Rapporteur Maria CHUDNOVSKY, Professeur, Columbia University (Absente excusée) Roland DUCOURNAU, Professeur, UM2, LIRMM Examinateur Cyril GAVOILLE, Professeur, Université de Bordeaux, LaBRI Examinateur Frédéric HAVET, Directeur de Recherche, CNRS, I3S Rapporteur Dan KRÁL’, Professeur, Warwick University Rapporteur Benjamin LÉVÊQUE, Chargé de Recherche, CNRS, LIRMM Directeur Alexandre PINLOU, Maître de Conférences, UM3, LIRMM Directeur Présidé par Frédéric HAVET. Contents Quelques mots de français 5 Introduction 10 A few words on graph coloring . 11 Global picture . 13 1 Preliminaries 15 1.1 Basic introduction to graphs and coloring .
    [Show full text]
  • Mim-Width III. Graph Powers and Generalized Distance Domination Problems∗
    Mim-Width III. Graph Powers and Generalized Distance Domination Problems∗ Lars Jaffkey1, O-joung Kwonz2,3, Torstein J. F. Strømme1, and Jan Arne Telle1 1Department of Informatics, University of Bergen, Norway. flars.jaffke, torstein.stromme, [email protected] 2Department of Mathematics, Incheon National University, South Korea. 3Discrete Mathematics Group, Institute for Basic Science (IBS), Daejeon, South Korea. [email protected] September 4, 2019 Abstract We generalize the family of (σ; ρ) problems and locally checkable vertex partition problems to their distance versions, which naturally captures well-known problems such as Distance-r Dominating Set and Distance-r Independent Set. We show that these distance problems are in XP parameterized by the structural parameter mim-width, and hence polynomial-time solvable on graph classes where mim-width is bounded and quickly computable, such as k- trapezoid graphs, Dilworth k-graphs, (circular) permutation graphs, interval graphs and their complements, convex graphs and their complements, k-polygon graphs, circular arc graphs, complements of d-degenerate graphs, and H-graphs if given an H-representation. We obtain these results by showing that taking any power of a graph never increases its mim-width by more than a factor of two. To supplement these findings, we show that many classes of (σ; ρ) problems are W[1]-hard parameterized by mim-width + solution size. We show that powers of graphs of tree-width w − 1 or path-width w and powers of graphs of clique-width w have mim-width at most w. These results provide new classes of bounded mim-width. We prove a slight strengthening of the first statement which implies that, surprisingly, Leaf Power graphs which are of importance in the field of phylogenetic studies have mim-width at most 1.
    [Show full text]
  • Parameterized Leaf Power Recognition Via Embedding Into Graph Products
    Parameterized Leaf Power Recognition via Embedding into Graph Products David Eppstein1 Computer Science Department, University of California, Irvine, USA [email protected] Elham Havvaei Computer Science Department, University of California, Irvine, USA [email protected] Abstract The k-leaf power graph G of a tree T is a graph whose vertices are the leaves of T and whose edges connect pairs of leaves at unweighted distance at most k in T . Recognition of the k-leaf power graphs for k ≥ 7 is still an open problem. In this paper, we provide two algorithms for this problem for sparse leaf power graphs. Our results shows that the problem of recognizing these graphs is fixed-parameter tractable when parameterized both by k and by the degeneracy of the given graph. To prove this, we first describe how to embed a leaf root of a leaf power graph into a product of the graph with a cycle graph. We bound the treewidth of the resulting product in terms of k and the degeneracy of G. The first presented algorithm uses methods based on monadic second-order logic (MSO2) to recognize the existence of a leaf power as a subgraph of the graph product. Using the same embedding in the graph product, the second algorithm presents a dynamic programming approach to solve the problem and provide a better dependence on the parameters. Keywords and phrases leaf power, phylogenetic tree, monadic second-order logic, Courcelle’s theorem, strong product of graphs, fixed-parameter tractability, dynamic programming, tree decomposition 1 Introduction Leaf powers are a class of graphs that were introduced in 2002 by Nishimura, Ragde and Thilikos [41], extending the notion of graph powers.
    [Show full text]
  • Arxiv:2104.06694V1 [Math.CO] 14 Apr 2021 H Rpriso Nagbacstructure Investig Algebraic Decades, an Two of Last the Examp Properties During for the (See, Enrich [25]
    LINE GRAPH CHARACTERIZATION OF POWER GRAPHS OF FINITE NILPOTENT GROUPS SUDIP BERA Abstract. This paper deals with the classification of groups G such that power graphs and proper power graphs of G are line graphs. In fact, We classify all finite nilpotent groups whose power graphs are line graphs. Also we categorize all finite nilpotent groups (except non abelian 2-groups) whose proper power graph are line graphs. Moreover, we study that the proper power graphs of generalized quaternion groups are line graphs. Besides, we derive a condition on the order of the dihedral groups for which the proper power graphs of the dihedral groups are line graphs. 1. Introduction The investigation of graph representations is one of the interesting and popular research topic in algebraic graph theory, as graphs like these enrich both algebra and graph theory. Moreover, they have important applications (see, for example, [2, 24]) and are related to automata theory [25]. During the last two decades, investigation of the interplay between the properties of an algebraic structure S and the graph-theoretic properties of Γ(S), a graph associated with S, has been an exciting topic of research. Different types of graphs, specifically zero-divisor graph of a ring [3], semiring [4], semigroup [16], poset [23], power graph of semigroup [13, 27], group [26], normal subgroup based power graph of group [7], intersection power graph of group [5], enhanced power graph of group [1, 6] etc. have been introduced to study algebraic structures using graph theory. One of the major graph representation amongst them is the power graphs of finite groups.
    [Show full text]
  • Simplicial Complexes from Graphs Towards Graph Persistence
    Alma Mater Studiorum ⋅ Universita` di Bologna SCUOLA DI SCIENZE Corso di Laurea Magistrale in Matematica SIMPLICIAL COMPLEXES FROM GRAPHS TOWARDS GRAPH PERSISTENCE Tesi di Laurea Magistrale in Topologia Algebrica Relatore: Presentata da: Prof. Massimo Ferri Lorenzo Zu Correlatore: Dott. Mattia G. Bergomi Sessione III Anno Accademico 2015/2016 Contents Introduzione 3 Introduction 5 Preliminary standard denitions 9 1 Simplicial compexes built from a graph 15 1.1 Abstract . 15 1.2 Complex of Cliques . 17 1.3 Complex of Independent sets . 19 1.4 Complex of Neighbours . 21 1.5 Acyclic subsets . 25 1.5.1 Complex of induced acyclic subgraphs . 25 1.5.2 Complex of acyclic subsets of the edge set . 25 1.5.3 Complex of removable acyclic subgraphs . 26 1.6 Complex of enclaveless sets . 28 1.6.1 Enclaveless sets implementations . 29 2 Graph persistence 33 2.1 Persistent homology: a brief introduction . 33 2.2 Persistent homologic properties for simplicial complexes from a graph 36 2.2.1 Case study: edge ltrations on K4 ................. 37 2.2.2 Filtration on edge-induced subgraphs: a simple example . 48 2.2.3 Complexes from acyclic subsets and persistent homology . 48 2.3 Other Persistent properties: blocks and edge-blocks . 51 2.3.1 e persistent block number . 52 2.3.2 e persistent edge-block number . 53 3 Other methods to build simplicial complexes 57 3.1 e complex of k-cycles Cyj,k(G) ...................... 57 3.2 e complex of connected cliques . 59 1 2 Appendix 63 Python Code . 63 Introduzione Lo scopo di questo elaborato e` di esplorare diversi metodi araverso i quali oenere complessi simpliciali a partire da un grafo, suggerendo alcuni risultati originali in tal senso.
    [Show full text]
  • Quotient Graphs for Power Graphs
    QUOTIENT GRAPHS FOR POWER GRAPHS D. BUBBOLONI, MOHAMMAD A. IRANMANESH AND S. M. SHAKER Abstract. In a previous paper of the first author a procedure was developed for counting the components of a graph through the knowledge of the components of its quotient graphs. We apply here that procedure to the proper power graph P0(G) of a finite group G, finding a formula for the number c(P0(G)) of its components which is particularly illuminative when G ≤ Sn is a fusion controlled permutation group. We make use of the e proper quotient power graph P0(G), the proper order graph O0(G) and the proper type graph T0(G). We show that all those graphs are quotient of P0(G) and demonstrate a strong link between them dealing with G = Sn. We find simultaneously c(P0(Sn)) as e well as the number of components of P0(Sn), O0(Sn) and T0(Sn). 1. Introduction and main results −−−→ Kelarev and Quinn [10] defined the directed power graph P(S) of a semigroup S as the directed graph in which the set of vertices is S and, for x, y ∈ S, there is an arc (x, y) if y = xm, for some m ∈ N. The power graph P(S) of a semigroup S, was defined by Chakrabarty, Ghosh and Sen [6] as the corresponding underlying undirected graph. They proved that for a finite group G, the power graph P(G) is complete if and only if G is a cyclic group of prime power order. In [4, 5] Cameron and Ghosh obtained interesting results about power graphs of finite groups, studying how the group of the graph automorphisms of P(G) affects the structure of the group G.
    [Show full text]
  • Square Root Finding in Graphs
    Square Root Finding In Graphs Majid Karimi, Master of Science Mathematics and Statistics Submitted in partial fulfilment of the requirements for the degree of Master of Science Faculty of Mathematics and Science, Brock University St. Catharines, Ontario c 2012 Abstract Root and root finding are concepts familiar to most branches of mathematics. In graph theory, H is a square root of G and G is the square of H if two vertices x; y have an edge in G if and only if x; y are of distance at most two in H. Graph square is a basic operation with a number of results about its properties in the literature. In this thesis, we are interested in the characterization and recognition problems of graph powers. There are algorithmic and computational approaches to answer the decision problem of whether a given graph is a certain power of any graph. On the other hand characterization of graph powers such as the work of Mukhopadhyay [24] do not provide a polynomial time algorithm for the recognition problem. One of the best known results for the problem is given by Farzad et al. [11]. They approached the problem in terms of the girth of the square root. They provided an almost dichotomy theorem for the problem. However the problem has been open in the case where the root graph has girth five. We settle, in the affirmative, the conjecture that recognition of square of graphs with girth 5 is NP-complete. We also present a polynomial time algorithm for graphs of girth five without specific dense subgraphs.
    [Show full text]
  • Robust and Approximative Algorithms on Particular Graph Classes  Dagstuhl Seminar 
    04221 Abstracts Collection Robust and Approximative Algorithms on Particular Graph Classes Dagstuhl Seminar Andreas Brandstädt1, Derek G. Corneil2, Klaus Jansen3 and Jeremy P. Spinrad4 1 Univ. Rostock, DE 2 Univ. of Toronto, CA [email protected] 3 Univ. Kiel, DE [email protected] 4 Vanderbilt Univ., Nashville TN, US [email protected] Abstract. From 23.05.04 to 28.05.04, the Dagstuhl Seminar 04221 Ro- bust and Approximative Algorithms on Particular Graph Classes was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their cur- rent research, and ongoing work and open problems were discussed. Ab- stracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The rst sec- tion describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available. Keywords. Graph structure, graph classes, graph algorithms, robust algorithms, approximation 04221 Summary Robust and Approximative Algorithms on Particular Graph Classes The aim of this seminar was to bring together experts working on robust as well as on approximative graph algorithms. Given the fast advances in various areas of graph algorithms on particular graph classes that we have witnessed in the past few years, we believe that it was very important to oer researchers in these areas a forum for the exchange of ideas in the relaxed workshop-like atmosphere that Dagstuhl always oers. There was a strong interaction and healthy exchange of ideas which resulted in successful applications of robust and approximative graph algorithms; in par- ticular, the seminar had the following aims: * discussing new graph classes where the recognition complexity of a graph class is harder than solving certain basic graph problems on the class; Dagstuhl Seminar Proceedings 04221 Robust and Approximative Algorithms on Particular Graph Classes http://drops.dagstuhl.de/opus/volltexte/2005/273 2 A.
    [Show full text]