Treewidth Theory and Applications to Computer Science
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Lecture 20 — March 20, 2013 1 the Maximum Cut Problem 2 a Spectral
UBC CPSC 536N: Sparse Approximations Winter 2013 Lecture 20 | March 20, 2013 Prof. Nick Harvey Scribe: Alexandre Fr´echette We study the Maximum Cut Problem with approximation in mind, and naturally we provide a spectral graph theoretic approach. 1 The Maximum Cut Problem Definition 1.1. Given a (undirected) graph G = (V; E), the maximum cut δ(U) for U ⊆ V is the cut with maximal value jδ(U)j. The Maximum Cut Problem consists of finding a maximal cut. We let MaxCut(G) = maxfjδ(U)j : U ⊆ V g be the value of the maximum cut in G, and 0 MaxCut(G) MaxCut = jEj be the normalized version (note that both normalized and unnormalized maximum cut values are induced by the same set of nodes | so we can interchange them in our search for an actual maximum cut). The Maximum Cut Problem is NP-hard. For a long time, the randomized algorithm 1 1 consisting of uniformly choosing a cut was state-of-the-art with its 2 -approximation factor The simplicity of the algorithm and our inability to find a better solution were unsettling. Linear pro- gramming unfortunately didn't seem to help. However, a (novel) technique called semi-definite programming provided a 0:878-approximation algorithm [Goemans-Williamson '94], which is optimal assuming the Unique Games Conjecture. 2 A Spectral Approximation Algorithm Today, we study a result of [Trevison '09] giving a spectral approach to the Maximum Cut Problem with a 0:531-approximation factor. We will present a slightly simplified result with 0:5292-approximation factor. -
Tight Integrality Gaps for Lovasz-Schrijver LP Relaxations of Vertex Cover and Max Cut
Tight Integrality Gaps for Lovasz-Schrijver LP Relaxations of Vertex Cover and Max Cut Grant Schoenebeck∗ Luca Trevisany Madhur Tulsianiz Abstract We study linear programming relaxations of Vertex Cover and Max Cut arising from repeated applications of the \lift-and-project" method of Lovasz and Schrijver starting from the standard linear programming relaxation. For Vertex Cover, Arora, Bollobas, Lovasz and Tourlakis prove that the integrality gap remains at least 2 − " after Ω"(log n) rounds, where n is the number of vertices, and Tourlakis proves that integrality gap remains at least 1:5 − " after Ω((log n)2) rounds. Fernandez de la 1 Vega and Kenyon prove that the integrality gap of Max Cut is at most 2 + " after any constant number of rounds. (Their result also applies to the more powerful Sherali-Adams method.) We prove that the integrality gap of Vertex Cover remains at least 2 − " after Ω"(n) rounds, and that the integrality gap of Max Cut remains at most 1=2 + " after Ω"(n) rounds. 1 Introduction Lovasz and Schrijver [LS91] describe a method, referred to as LS, to tighten a linear programming relaxation of a 0/1 integer program. The method adds auxiliary variables and valid inequalities, and it can be applied several times sequentially, yielding a sequence (a \hierarchy") of tighter and tighter relaxations. The method is interesting because it produces relaxations that are both tightly constrained and efficiently solvable. For a linear programming relaxation K, denote by N(K) the relaxation obtained by the application of the LS method, and by N k(K) the relaxation obtained by applying the LS method k times. -
COMP 761: Lecture 9 – Graph Theory I
COMP 761: Lecture 9 – Graph Theory I David Rolnick September 23, 2020 David Rolnick COMP 761: Graph Theory I Sep 23, 2020 1 / 27 Problem In Königsberg (now called Kaliningrad) there are some bridges (shown below). Is it possible to cross over all of them in some order, without crossing any bridge more than once? (Please don’t post your ideas in the chat just yet, we’ll discuss the problem soon in class.) David Rolnick COMP 761: Graph Theory I Sep 23, 2020 2 / 27 Problem Set 2 will be due on Oct. 9 Vincent’s optional list of practice problems available soon on Slack (we can give feedback on your solutions, but they will not count towards a grade) Course Announcements David Rolnick COMP 761: Graph Theory I Sep 23, 2020 3 / 27 Vincent’s optional list of practice problems available soon on Slack (we can give feedback on your solutions, but they will not count towards a grade) Course Announcements Problem Set 2 will be due on Oct. 9 David Rolnick COMP 761: Graph Theory I Sep 23, 2020 3 / 27 Course Announcements Problem Set 2 will be due on Oct. 9 Vincent’s optional list of practice problems available soon on Slack (we can give feedback on your solutions, but they will not count towards a grade) David Rolnick COMP 761: Graph Theory I Sep 23, 2020 3 / 27 A graph G is defined by a set V of vertices and a set E of edges, where the edges are (unordered) pairs of vertices fv; wg. -
Optimal Inapproximability Results for MAX-CUT and Other 2-Variable Csps?
Electronic Colloquium on Computational Complexity, Report No. 101 (2005) Optimal Inapproximability Results for MAX-CUT and Other 2-Variable CSPs? Subhash Khot∗ Guy Kindlery Elchanan Mosselz College of Computing Theory Group Department of Statistics Georgia Tech Microsoft Research U.C. Berkeley [email protected] [email protected] [email protected] Ryan O'Donnell∗ Theory Group Microsoft Research [email protected] September 19, 2005 Abstract In this paper we show a reduction from the Unique Games problem to the problem of approximating MAX-CUT to within a factor of αGW + , for all > 0; here αGW :878567 denotes the approxima- tion ratio achieved by the Goemans-Williamson algorithm [25]. This≈implies that if the Unique Games Conjecture of Khot [36] holds then the Goemans-Williamson approximation algorithm is optimal. Our result indicates that the geometric nature of the Goemans-Williamson algorithm might be intrinsic to the MAX-CUT problem. Our reduction relies on a theorem we call Majority Is Stablest. This was introduced as a conjecture in the original version of this paper, and was subsequently confirmed in [42]. A stronger version of this conjecture called Plurality Is Stablest is still open, although [42] contains a proof of an asymptotic version of it. Our techniques extend to several other two-variable constraint satisfaction problems. In particular, subject to the Unique Games Conjecture, we show tight or nearly tight hardness results for MAX-2SAT, MAX-q-CUT, and MAX-2LIN(q). For MAX-2SAT we show approximation hardness up to a factor of roughly :943. This nearly matches the :940 approximation algorithm of Lewin, Livnat, and Zwick [40]. -
Clay Mathematics Institute 2005 James A
Contents Clay Mathematics Institute 2005 James A. Carlson Letter from the President 2 The Prize Problems The Millennium Prize Problems 3 Recognizing Achievement 2005 Clay Research Awards 4 CMI Researchers Summary of 2005 6 Workshops & Conferences CMI Programs & Research Activities Student Programs Collected Works James Arthur Archive 9 Raoul Bott Library CMI Profile Interview with Research Fellow 10 Maria Chudnovsky Feature Article Can Biology Lead to New Theorems? 13 by Bernd Sturmfels CMI Summer Schools Summary 14 Ricci Flow, 3–Manifolds, and Geometry 15 at MSRI Program Overview CMI Senior Scholars Program 17 Institute News Euclid and His Heritage Meeting 18 Appointments & Honors 20 CMI Publications Selected Articles by Research Fellows 27 Books & Videos 28 About CMI Profile of Bow Street Staff 30 CMI Activities 2006 Institute Calendar 32 2005 Euclid: www.claymath.org/euclid James Arthur Collected Works: www.claymath.org/cw/arthur Hanoi Institute of Mathematics: www.math.ac.vn Ramanujan Society: www.ramanujanmathsociety.org $.* $MBZ.BUIFNBUJDT*OTUJUVUF ".4 "NFSJDBO.BUIFNBUJDBM4PDJFUZ In addition to major,0O"VHVTU BUUIFTFDPOE*OUFSOBUJPOBM$POHSFTTPG.BUIFNBUJDJBOT ongoing activities such as JO1BSJT %BWJE)JMCFSUEFMJWFSFEIJTGBNPVTMFDUVSFJOXIJDIIFEFTDSJCFE the summer schools,UXFOUZUISFFQSPCMFNTUIBUXFSFUPQMBZBOJOnVFOUJBMSPMFJONBUIFNBUJDBM the Institute undertakes a 5IF.JMMFOOJVN1SJ[F1SPCMFNT SFTFBSDI"DFOUVSZMBUFS PO.BZ BUBNFFUJOHBUUIF$PMMÒHFEF number of smaller'SBODF UIF$MBZ.BUIFNBUJDT*OTUJUVUF $.* BOOPVODFEUIFDSFBUJPOPGB special projects -
Treewidth-Erickson.Pdf
Computational Topology (Jeff Erickson) Treewidth Or il y avait des graines terribles sur la planète du petit prince . c’étaient les graines de baobabs. Le sol de la planète en était infesté. Or un baobab, si l’on s’y prend trop tard, on ne peut jamais plus s’en débarrasser. Il encombre toute la planète. Il la perfore de ses racines. Et si la planète est trop petite, et si les baobabs sont trop nombreux, ils la font éclater. [Now there were some terrible seeds on the planet that was the home of the little prince; and these were the seeds of the baobab. The soil of that planet was infested with them. A baobab is something you will never, never be able to get rid of if you attend to it too late. It spreads over the entire planet. It bores clear through it with its roots. And if the planet is too small, and the baobabs are too many, they split it in pieces.] — Antoine de Saint-Exupéry (translated by Katherine Woods) Le Petit Prince [The Little Prince] (1943) 11 Treewidth In this lecture, I will introduce a graph parameter called treewidth, that generalizes the property of having small separators. Intuitively, a graph has small treewidth if it can be recursively decomposed into small subgraphs that have small overlap, or even more intuitively, if the graph resembles a ‘fat tree’. Many problems that are NP-hard for general graphs can be solved in polynomial time for graphs with small treewidth. Graphs embedded on surfaces of small genus do not necessarily have small treewidth, but they can be covered by a small number of subgraphs, each with small treewidth. -
Lecture 16: Constraint Satisfaction Problems 1 Max-Cut SDP
A Theorist's Toolkit (CMU 18-859T, Fall 2013) Lecture 16: Constraint Satisfaction Problems 10/30/2013 Lecturer: Ryan O'Donnell Scribe: Neal Barcelo 1 Max-Cut SDP Approximation Recall the Max-Cut problem from last lecture. We are given a graph G = (V; E) and our goal is to find a function F : V ! {−1; 1g that maximizes Pr(i;j)∼E[F (vi) 6= F (vj)]. As we saw before, this is NP-hard to do optimally, but we had the following SDP relaxation. 1 1 max avg(i;j)2Ef 2 − 2 yijg s.t. yvv = 1 8v Y = (yij) is symmetric and PSD Note that the second condition is a relaxation of the constraint \9xi s.t. yij = xixj" which is the constraint needed to exactly model the max-cut problem. Further, recall that a matrix being Positive Semi Definitie (PSD) is equivalent to the following characterizations. 1. Y 2 Rn×m is PSD. 2. There exists a U 2 Rm×n such that Y = U T U. 3. There exists joint random variables X1;::: Xn such that yuv = E[XuXv]. ~ ~ ~ ~ 4. There exists vectors U1;:::; Un such that yvw = hUv; Uwi. Using the last characterization, we can rewrite our SDP relaxation as follows 1 1 max avg(i;j)2Ef 2 − 2 h~vi; ~vjig 2 s.t. k~vik2 = 1 Vector ~vi for each vi 2 V First let's make sure this is actually a relaxation of our original problem. To see this, ∗ ∗ consider an optimal cut F : V ! f1; −1g. Then, if we let ~vi = (F (vi); 0;:::; 0), all of the constraints are satisfied and the objective value remains the same. -
A Complete Anytime Algorithm for Treewidth
UAI 2004 GOGATE & DECHTER 201 A Complete Anytime Algorithm for Treewidth Vibhav Gogate and Rina Dechter School of Information and Computer Science, University of California, Irvine, CA 92967 fvgogate,[email protected] Abstract many algorithms that solve NP-hard problems in Arti¯cial Intelligence, Operations Research, In this paper, we present a Branch and Bound Circuit Design etc. are exponential only in the algorithm called QuickBB for computing the treewidth. Examples of such algorithm are Bucket treewidth of an undirected graph. This al- elimination [Dechter, 1999] and junction-tree elimina- gorithm performs a search in the space of tion [Lauritzen and Spiegelhalter, 1988] for Bayesian perfect elimination ordering of vertices of Networks and Constraint Networks. These algo- the graph. The algorithm uses novel prun- rithms operate in two steps: (1) constructing a ing and propagation techniques which are good tree-decomposition and (2) solving the prob- derived from the theory of graph minors lem on this tree-decomposition, with the second and graph isomorphism. We present a new step generally exponential in the treewidth of the algorithm called minor-min-width for com- tree-decomposition computed in step 1. In this puting a lower bound on treewidth that is paper, we present a complete anytime algorithm used within the branch and bound algo- called QuickBB for computing a tree-decomposition rithm and which improves over earlier avail- of a graph that can feed into any algorithm like able lower bounds. Empirical evaluation of Bucket elimination [Dechter, 1999] that requires a QuickBB on randomly generated graphs and tree-decomposition. benchmarks in Graph Coloring and Bayesian The majority of recent literature on Networks shows that it is consistently bet- the treewidth problem is devoted to ¯nd- ter than complete algorithms like Quick- ing constant factor approximation algo- Tree [Shoikhet and Geiger, 1997] in terms of rithms [Amir, 2001, Becker and Geiger, 2001]. -
Greedy Algorithms for the Maximum Satisfiability Problem: Simple Algorithms and Inapproximability Bounds∗
SIAM J. COMPUT. c 2017 Society for Industrial and Applied Mathematics Vol. 46, No. 3, pp. 1029–1061 GREEDY ALGORITHMS FOR THE MAXIMUM SATISFIABILITY PROBLEM: SIMPLE ALGORITHMS AND INAPPROXIMABILITY BOUNDS∗ MATTHIAS POLOCZEK†, GEORG SCHNITGER‡ , DAVID P. WILLIAMSON† , AND ANKE VAN ZUYLEN§ Abstract. We give a simple, randomized greedy algorithm for the maximum satisfiability 3 problem (MAX SAT) that obtains a 4 -approximation in expectation. In contrast to previously 3 known 4 -approximation algorithms, our algorithm does not use flows or linear programming. Hence we provide a positive answer to a question posed by Williamson in 1998 on whether such an algorithm 3 exists. Moreover, we show that Johnson’s greedy algorithm cannot guarantee a 4 -approximation, even if the variables are processed in a random order. Thereby we partially solve a problem posed by Chen, Friesen, and Zheng in 1999. In order to explore the limitations of the greedy paradigm, we use the model of priority algorithms of Borodin, Nielsen, and Rackoff. Since our greedy algorithm works in an online scenario where the variables arrive with their set of undecided clauses, we wonder if a better approximation ratio can be obtained by further fine-tuning its random decisions. For a particular information model we show that no priority algorithm can approximate Online MAX SAT 3 ε ε> within 4 + (for any 0). We further investigate the strength of deterministic greedy algorithms that may choose the variable ordering. Here we show that no adaptive priority algorithm can achieve 3 approximation ratio 4 . We propose two ways in which this inapproximability result can be bypassed. -
Chicago Journal of Theoretical Computer Science the MIT Press
Chicago Journal of Theoretical Computer Science The MIT Press Volume 1997, Article 2 3 June 1997 ISSN 1073–0486. MIT Press Journals, Five Cambridge Center, Cambridge, MA 02142-1493 USA; (617)253-2889; [email protected], [email protected]. Published one article at a time in LATEX source form on the Internet. Pag- ination varies from copy to copy. For more information and other articles see: http://www-mitpress.mit.edu/jrnls-catalog/chicago.html • http://www.cs.uchicago.edu/publications/cjtcs/ • ftp://mitpress.mit.edu/pub/CJTCS • ftp://cs.uchicago.edu/pub/publications/cjtcs • Kann et al. Hardness of Approximating Max k-Cut (Info) The Chicago Journal of Theoretical Computer Science is abstracted or in- R R R dexed in Research Alert, SciSearch, Current Contents /Engineering Com- R puting & Technology, and CompuMath Citation Index. c 1997 The Massachusetts Institute of Technology. Subscribers are licensed to use journal articles in a variety of ways, limited only as required to insure fair attribution to authors and the journal, and to prohibit use in a competing commercial product. See the journal’s World Wide Web site for further details. Address inquiries to the Subsidiary Rights Manager, MIT Press Journals; (617)253-2864; [email protected]. The Chicago Journal of Theoretical Computer Science is a peer-reviewed scholarly journal in theoretical computer science. The journal is committed to providing a forum for significant results on theoretical aspects of all topics in computer science. Editor in chief: Janos Simon Consulting -
Tree-Decomposition Graph Minor Theory and Algorithmic Implications
DIPLOMARBEIT Tree-Decomposition Graph Minor Theory and Algorithmic Implications Ausgeführt am Institut für Diskrete Mathematik und Geometrie der Technischen Universität Wien unter Anleitung von Univ.Prof. Dipl.-Ing. Dr.techn. Michael Drmota durch Miriam Heinz, B.Sc. Matrikelnummer: 0625661 Baumgartenstraße 53 1140 Wien Datum Unterschrift Preface The focus of this thesis is the concept of tree-decomposition. A tree-decomposition of a graph G is a representation of G in a tree-like structure. From this structure it is possible to deduce certain connectivity properties of G. Such information can be used to construct efficient algorithms to solve problems on G. Sometimes problems which are NP-hard in general are solvable in polynomial or even linear time when restricted to trees. Employing the tree-like structure of tree-decompositions these algorithms for trees can be adapted to graphs of bounded tree-width. This results in many important algorithmic applications of tree-decomposition. The concept of tree-decomposition also proves to be useful in the study of fundamental questions in graph theory. It was used extensively by Robertson and Seymour in their seminal work on Wagner’s conjecture. Their Graph Minors series of papers spans more than 500 pages and results in a proof of the graph minor theorem, settling Wagner’s conjecture in 2004. However, it is not only the proof of this deep and powerful theorem which merits mention. Also the concepts and tools developed for the proof have had a major impact on the field of graph theory. Tree-decomposition is one of these spin-offs. Therefore, we will study both its use in the context of graph minor theory and its several algorithmic implications. -
A Polynomial Excluded-Minor Approximation of Treedepth
A Polynomial Excluded-Minor Approximation of Treedepth Ken-ichi Kawarabayashi∗ Benjamin Rossmany National Institute of Informatics University of Toronto k [email protected] [email protected] November 1, 2017 Abstract Treedepth is a well-studied graph invariant in the family of \width measures" that includes treewidth and pathwidth. Understanding these invariants in terms of excluded minors has been an active area of research. The recent Grid Minor Theorem of Chekuri and Chuzhoy [12] establishes that treewidth is polynomially approximated by the largest k × k grid minor. In this paper, we give a similar polynomial excluded-minor approximation for treedepth in terms of three basic obstructions: grids, tree, and paths. Specifically, we show that there is a constant c such that every graph of treedepth ≥ kc contains one of the following minors (each of treedepth ≥ k): • the k × k grid, • the complete binary tree of height k, • the path of order 2k. Let us point out that we cannot drop any of the above graphs for our purpose. Moreover, given a graph G we can, in randomized polynomial time, find either an embedding of one of these minors or conclude that treedepth of G is at most kc. This result has potential applications in a variety of settings where bounded treedepth plays a role. In addition to some graph structural applications, we describe a surprising application in circuit complexity and finite model theory from recent work of the second author [28]. 1 Introduction Treedepth is a well-studied graph invariant with several equivalent definitions. It appears in the literature under various names including vertex ranking number [30], ordered chromatic number [17], and minimum elimination tree height [23], before being systematically studied under the name treedepth by Ossona de Mendes and Neˇsetˇril[20].