Independent Sets Versus Perfect Matchings*
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Towards Maximum Independent Sets on Massive Graphs
Towards Maximum Independent Sets on Massive Graphs Yu Liuy Jiaheng Lu x Hua Yangy Xiaokui Xiaoz Zhewei Weiy yDEKE, MOE and School of Information, Renmin University of China x Department of Computer Science, University of Helsinki, Finland zSchool of Computer Engineering, Nanyang Technological University, Singapore ABSTRACT Maximum independent set (MIS) is a fundamental problem in graph theory and it has important applications in many areas such as so- cial network analysis, graphical information systems and coding theory. The problem is NP-hard, and there has been numerous s- tudies on its approximate solutions. While successful to a certain degree, the existing methods require memory space at least linear in the size of the input graph. This has become a serious concern in !"#$!%&'!(#&)*+,+)*+)-#.+- /"#$!%&'0'#&)*+,+)*+)-#.+- view of the massive volume of today’s fast-growing graphs. Figure 1: An example to illustrate that fv , v g is a maximal inde- In this paper, we study the MIS problem under the semi-external 1 2 pendent set, but fv , v , v , v g is a maximum independent set. setting, which assumes that the main memory can accommodate 2 3 4 5 all vertices of the graph but not all edges. We present a greedy algorithm and a general vertex-swap framework, which swaps ver- duced subgraphs, minimum vertex covers, graph coloring, and tices to incrementally increase the size of independent sets. Our maximum common edge subgraphs, etc. Its significance is not solutions require only few sequential scans of graphs on the disk just limited to graph theory but also in numerous real-world ap- file, thus enabling in-memory computation without costly random plications, such as indexing techniques for shortest path and dis- disk accesses. -
Lecture 4 1 the Permanent of a Matrix
Grafy a poˇcty - NDMI078 April 2009 Lecture 4 M. Loebl J.-S. Sereni 1 The permanent of a matrix 1.1 Minc's conjecture The set of permutations of f1; : : : ; ng is Sn. Let A = (ai;j)1≤i;j≤n be a square matrix with real non-negative entries. The permanent of the matrix A is n X Y perm(A) := ai,σ(i) : σ2Sn i=1 In 1973, Br`egman[4] proved M´ınc’sconjecture [18]. n×n Pn Theorem 1 (Br`egman,1973). Let A = (ai;j)1≤i;j≤n 2 f0; 1g . Set ri := j=1 ai;j. Then, n Y 1=ri perm(A) ≤ (ri!) : i=1 Further, if ri > 0 for every i 2 f1; 2; : : : ; ng, then there is equality if and only if up to permutations of rows and columns, A is a block-diagonal matrix, each block being a square matrix with all entries equal to 1. Several proofs of this result are known, the original being combinatorial. In 1978, Schrijver [22] found a neat and short proof. A probabilistic description of this proof is presented in the book of Alon and Spencer [3, Chapter 2]. The one we will see in Lecture 5 uses the concept of entropy, and was found by Radhakrishnan [20] in the late nineties. It is a nice illustration of the use of entropy to count combinatorial objects. 1.2 The van der Waerden conjecture A square matrix M = (mij)1≤i;j≤n of non-negative real numbers is doubly stochastic if the sum of the entries of every line is equal to 1, and the same holds for the sum of the entries of each column. -
Lecture 12 – the Permanent and the Determinant
Lecture 12 { The permanent and the determinant Uriel Feige Department of Computer Science and Applied Mathematics The Weizman Institute Rehovot 76100, Israel [email protected] June 23, 2014 1 Introduction Given an order n matrix A, its permanent is X Yn per(A) = aiσ(i) σ i=1 where σ ranges over all permutations on n elements. Its determinant is X Yn σ det(A) = (−1) aiσ(i) σ i=1 where (−1)σ is +1 for even permutations and −1 for odd permutations. A permutation is even if it can be obtained from the identity permutation using an even number of transpo- sitions (where a transposition is a swap of two elements), and odd otherwise. For those more familiar with the inductive definition of the determinant, obtained by developing the determinant by the first row of the matrix, observe that the inductive defini- tion if spelled out leads exactly to the formula above. The same inductive definition applies to the permanent, but without the alternating sign rule. The determinant can be computed in polynomial time by Gaussian elimination, and in time n! by fast matrix multiplication. On the other hand, there is no polynomial time algorithm known for computing the permanent. In fact, Valiant showed that the permanent is complete for the complexity class #P , which makes computing it as difficult as computing the number of solutions of NP-complete problems (such as SAT, Valiant's reduction was from Hamiltonicity). For 0/1 matrices, the matrix A can be thought of as the adjacency matrix of a bipartite graph (we refer to it as a bipartite adjacency matrix { technically, A is an off-diagonal block of the usual adjacency matrix), and then the permanent counts the number of perfect matchings. -
3.1 Matchings and Factors: Matchings and Covers
1 3.1 Matchings and Factors: Matchings and Covers This copyrighted material is taken from Introduction to Graph Theory, 2nd Ed., by Doug West; and is not for further distribution beyond this course. These slides will be stored in a limited-access location on an IIT server and are not for distribution or use beyond Math 454/553. 2 Matchings 3.1.1 Definition A matching in a graph G is a set of non-loop edges with no shared endpoints. The vertices incident to the edges of a matching M are saturated by M (M-saturated); the others are unsaturated (M-unsaturated). A perfect matching in a graph is a matching that saturates every vertex. perfect matching M-unsaturated M-saturated M Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 3 Perfect Matchings in Complete Bipartite Graphs a 1 The perfect matchings in a complete b 2 X,Y-bigraph with |X|=|Y| exactly c 3 correspond to the bijections d 4 f: X -> Y e 5 Therefore Kn,n has n! perfect f 6 matchings. g 7 Kn,n The complete graph Kn has a perfect matching iff… Contains copyrighted material from Introduction to Graph Theory by Doug West, 2nd Ed. Not for distribution beyond IIT’s Math 454/553. 4 Perfect Matchings in Complete Graphs The complete graph Kn has a perfect matching iff n is even. So instead of Kn consider K2n. We count the perfect matchings in K2n by: (1) Selecting a vertex v (e.g., with the highest label) one choice u v (2) Selecting a vertex u to match to v K2n-2 2n-1 choices (3) Selecting a perfect matching on the rest of the vertices. -
Matchgates Revisited
THEORY OF COMPUTING, Volume 10 (7), 2014, pp. 167–197 www.theoryofcomputing.org RESEARCH SURVEY Matchgates Revisited Jin-Yi Cai∗ Aaron Gorenstein Received May 17, 2013; Revised December 17, 2013; Published August 12, 2014 Abstract: We study a collection of concepts and theorems that laid the foundation of matchgate computation. This includes the signature theory of planar matchgates, and the parallel theory of characters of not necessarily planar matchgates. Our aim is to present a unified and, whenever possible, simplified account of this challenging theory. Our results include: (1) A direct proof that the Matchgate Identities (MGI) are necessary and sufficient conditions for matchgate signatures. This proof is self-contained and does not go through the character theory. (2) A proof that the MGI already imply the Parity Condition. (3) A simplified construction of a crossover gadget. This is used in the proof of sufficiency of the MGI for matchgate signatures. This is also used to give a proof of equivalence between the signature theory and the character theory which permits omittable nodes. (4) A direct construction of matchgates realizing all matchgate-realizable symmetric signatures. ACM Classification: F.1.3, F.2.2, G.2.1, G.2.2 AMS Classification: 03D15, 05C70, 68R10 Key words and phrases: complexity theory, matchgates, Pfaffian orientation 1 Introduction Leslie Valiant introduced matchgates in a seminal paper [24]. In that paper he presented a way to encode computation via the Pfaffian and Pfaffian Sum, and showed that a non-trivial, though restricted, fragment of quantum computation can be simulated in classical polynomial time. Underlying this magic is a way to encode certain quantum states by a classical computation of perfect matchings, and to simulate certain ∗Supported by NSF CCF-0914969 and NSF CCF-1217549. -
Matroids You Have Known
26 MATHEMATICS MAGAZINE Matroids You Have Known DAVID L. NEEL Seattle University Seattle, Washington 98122 [email protected] NANCY ANN NEUDAUER Pacific University Forest Grove, Oregon 97116 nancy@pacificu.edu Anyone who has worked with matroids has come away with the conviction that matroids are one of the richest and most useful ideas of our day. —Gian Carlo Rota [10] Why matroids? Have you noticed hidden connections between seemingly unrelated mathematical ideas? Strange that finding roots of polynomials can tell us important things about how to solve certain ordinary differential equations, or that computing a determinant would have anything to do with finding solutions to a linear system of equations. But this is one of the charming features of mathematics—that disparate objects share similar traits. Properties like independence appear in many contexts. Do you find independence everywhere you look? In 1933, three Harvard Junior Fellows unified this recurring theme in mathematics by defining a new mathematical object that they dubbed matroid [4]. Matroids are everywhere, if only we knew how to look. What led those junior-fellows to matroids? The same thing that will lead us: Ma- troids arise from shared behaviors of vector spaces and graphs. We explore this natural motivation for the matroid through two examples and consider how properties of in- dependence surface. We first consider the two matroids arising from these examples, and later introduce three more that are probably less familiar. Delving deeper, we can find matroids in arrangements of hyperplanes, configurations of points, and geometric lattices, if your tastes run in that direction. -
The Geometry of Dimer Models
THE GEOMETRY OF DIMER MODELS DAVID CIMASONI Abstract. This is an expanded version of a three-hour minicourse given at the winterschool Winterbraids IV held in Dijon in February 2014. The aim of these lectures was to present some aspects of the dimer model to a geometri- cally minded audience. We spoke neither of braids nor of knots, but tried to show how several geometrical tools that we know and love (e.g. (co)homology, spin structures, real algebraic curves) can be applied to very natural problems in combinatorics and statistical physics. These lecture notes do not contain any new results, but give a (relatively original) account of the works of Kaste- leyn [14], Cimasoni-Reshetikhin [4] and Kenyon-Okounkov-Sheffield [16]. Contents Foreword 1 1. Introduction 1 2. Dimers and Pfaffians 2 3. Kasteleyn’s theorem 4 4. Homology, quadratic forms and spin structures 7 5. The partition function for general graphs 8 6. Special Harnack curves 11 7. Bipartite graphs on the torus 12 References 15 Foreword These lecture notes were originally not intended to be published, and the lectures were definitely not prepared with this aim in mind. In particular, I would like to arXiv:1409.4631v2 [math-ph] 2 Nov 2015 stress the fact that they do not contain any new results, but only an exposition of well-known results in the field. Also, I do not claim this treatement of the geometry of dimer models to be complete in any way. The reader should rather take these notes as a personal account by the author of some selected chapters where the words geometry and dimer models are not completely irrelevant, chapters chosen and organized in order for the resulting story to be almost self-contained, to have a natural beginning, and a happy ending. -
Lectures 4 and 6 Lecturer: Michel X
18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the matching problem. Our goal is to derive an algebraic test for deciding if a graph G = (V; E) has a perfect matching. We may assume that the number of vertices is even since this is a necessary condition for having a perfect matching. First, we will define a few basic needed notations. Definition 1 A skew-symmetric matrix A is a square matrix which satisfies AT = −A, i.e. if A = (aij) we have aij = −aji for all i; j. For a graph G = (V; E) with jV j = n and jEj = m, we construct a n × n skew-symmetric matrix A = (aij) with an entry aij = −aji for each edge (i; j) 2 E and aij = 0 if (i; j) is not an edge; the values aij for the edges will be specified later. Recall: Definition 2 The determinant of matrix A is n X Y det(A) = sgn(σ) aiσ(i) σ2Sn i=1 where Sn is the set of all permutations of n elements and the sgn(σ) is defined to be 1 if the number of inversions in σ is even and −1 otherwise. Note that for a skew-symmetric matrix A, det(A) = det(−AT ) = (−1)n det(A). So if n is odd we have det(A) = 0. Consider K4, the complete graph on 4 vertices, and thus 0 1 0 a12 a13 a14 B−a12 0 a23 a24C A = B C : @−a13 −a23 0 a34A −a14 −a24 −a34 0 By computing its determinant one observes that 2 det(A) = (a12a34 − a13a24 + a14a23) : First, it is the square of a polynomial q(a) in the entries of A, and moreover this polynomial has a monomial precisely for each perfect matching of K4. -
Greedy Sequential Maximal Independent Set and Matching Are Parallel on Average
Greedy Sequential Maximal Independent Set and Matching are Parallel on Average Guy E. Blelloch Jeremy T. Fineman Julian Shun Carnegie Mellon University Georgetown University Carnegie Mellon University [email protected] jfi[email protected] [email protected] ABSTRACT edge represents the constraint that two tasks cannot run in parallel, the MIS finds a maximal set of tasks to run in parallel. Parallel al- The greedy sequential algorithm for maximal independent set (MIS) gorithms for the problem have been well studied [16, 17, 1, 12, 9, loops over the vertices in an arbitrary order adding a vertex to the 11, 10, 7, 4]. Luby’s randomized algorithm [17], for example, runs resulting set if and only if no previous neighboring vertex has been in O(log jV j) time on O(jEj) processors of a CRCW PRAM and added. In this loop, as in many sequential loops, each iterate will can be converted to run in linear work. The problem, however, is only depend on a subset of the previous iterates (i.e. knowing that that on a modest number of processors it is very hard for these par- any one of a vertex’s previous neighbors is in the MIS, or know- allel algorithms to outperform the very simple and fast sequential ing that it has no previous neighbors, is sufficient to decide its fate greedy algorithm. Furthermore the parallel algorithms give differ- one way or the other). This leads to a dependence structure among ent results than the sequential algorithm. This can be undesirable in the iterates. -
Fully Dynamic Maximal Independent Set with Polylogarithmic Update Time
2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS) Fully Dynamic Maximal Independent Set in Polylogarithmic Update Time Soheil Behnezhad∗, Mahsa Derakhshan∗, MohammadTaghi Hajiaghayi∗, Cliff Stein† and Madhu Sudan‡ ∗University of Maryland {soheil,mahsa,hajiagha}@cs.umd.edu †Columbia University [email protected] ‡Harvard University [email protected] Abstract— We present the first algorithm for maintaining a time. As such, one can trivially maintain MIS by recomput- maximal independent set (MIS) of a fully dynamic graph—which ing it from scratch after each update, in O(m) time. In a undergoes both edge insertions and deletions—in polylogarith- pioneering work, Censor-Hillel, Haramaty, and Karnin [15] mic time. Our algorithm is randomized and, per update, takes 2 2 O(log Δ · log n) expected time. Furthermore, the algorithm presented a round-efficient randomized algorithm for MIS in 2 4 can be adjusted to have O(log Δ · log n) worst-case update- dynamic distributed networks. Implementing the algorithm time with high probability. Here, n denotes the number of of [15] in the sequential setting—the focus of this paper— vertices and Δ is the maximum degree in the graph. requires Ω(Δ) update-time (see [15, Section 6]) where Δ The MIS problem in fully dynamic graphs has attracted sig- is the maximum-degree in the graph which can be as large nificant attention after a breakthrough result of Assadi, Onak, as Ω(n) or even Ω(m) for sparse graphs. Improving this Schieber, and Solomon [STOC’18] who presented an algorithm bound was one of the major problems the authors left 3/4 with O(m ) update-time (and thus broke the natural Ω(m) open. -
A Short Course on Matching Theory, ECNU Shanghai, July 2011
A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 1 Fundamental definitions and theorems. 1.1. Outline of Lecture • Definitions • Hall's theorem • Tutte's Matching theorem 1.2. Basic definitions. A matching in a graph G is a set of edges M such that no two edges share a common end. A vertex v is said to be saturated or matched by a matching M if v is an end of an edge in M. Otherwise, v is unsaturated or unmatched. The matching number ν(G) of G is the maximum number of edges in a matching in G. A matching M is perfect if every vertex of G is saturated. We will be primarily interested in perfect matchings. We will denote by M(G) the set of all perfect matchings of a graph G and by m(G) := jM(G)j the number of perfect matchings. The main goal of this course is to demonstrate classical and new results related to computing or estimating the quantity m(G). Example 1. The graph K4 is the complete graph on 4 vertices. Let V (K4) = f1; 2; 3; 4g. Then f12; 34g; f13; 24g; f14; 23g are all perfect matchings of K4, i.e. all the elements of the set M(G). We have jm(G)j = 3. Every edge of K4 belongs to exactly one perfect matching. 1 2 SERGEY NORIN, MATCHING THEORY Figure 1. A graph with no perfect matching. Computation of m(G) is of interest for the following reasons. If G is a graph representing connections between the atoms in a molecule, then m(G) encodes some stability and thermodynamic properties of the molecule. -
Arxiv:2108.12879V1 [Cs.CC] 29 Aug 2021
Parameterizing the Permanent: Hardness for K8-minor-free graphs Radu Curticapean∗ Mingji Xia† Abstract In the 1960s, statistical physicists discovered a fascinating algorithm for counting perfect matchings in planar graphs. Valiant later showed that the same problem is #P-hard for general graphs. Since then, the algorithm for planar graphs was extended to bounded-genus graphs, to graphs excluding K3;3 or K5, and more generally, to any graph class excluding a fixed minor H that can be drawn in the plane with a single crossing. This stirred up hopes that counting perfect matchings might be polynomial-time solvable for graph classes excluding any fixed minor H. Alas, in this paper, we show #P-hardness for K8-minor-free graphs by a simple and self-contained argument. 1 Introduction A perfect matching in a graph G is an edge-subset M ⊆ E(G) such that every vertex of G has exactly one incident edge in M. Counting perfect matchings is a central and very well-studied problem in counting complexity. It already starred in Valiant’s seminal paper [23] that introduced the complexity class #P, where it was shown that counting perfect matchings is #P-complete. The problem has driven progress in approximate counting and underlies the so-called holographic algorithms [24, 6, 4, 5]. It also occurs outside of counting complexity, e.g., in statistical physics, via the partition function of the dimer model [21, 16, 17]. In algebraic complexity theory, the matrix permanent is a very well-studied algebraic variant of the problem of counting perfect matchings [1].