Problems of Unknown Complexity

Total Page:16

File Type:pdf, Size:1020Kb

Problems of Unknown Complexity Problems of Unknown Complexity Graph isomorphism and Ramsey theoretic numbers Dissertation zur Erlangung des Grades des Doktors der Naturwissenschaften (Dr. rer. nat.) der Naturwissenschaftlich-Technischen Fakult¨aten der Universit¨at des Saarlandes vorgelegt von Pascal Schweitzer Saarbr¨ucken 2009 Revised April 2012. Tag des Kolloquiums: 24. Juli 2009: Dekan der Naturwissenschaftlich-Technischen Fakult¨at I: Professor Dr. Joachim Weickert Berichterstatter: Professor Dr. Kurt Mehlhorn, Max-Planck-Institut f¨ur Informatik, Saarbr¨ucken Professor Dr. Markus Bl¨aser, Fachbereich Informatik der Universit¨at des Saarlandes Professor Dr. Brendan McKay, Department of Computer Science, Australian National University Mitglieder des Pr¨ufungsausschusses: Professor Dr. Joachim Weickert (Vorsitzender) Professor Dr. Kurt Mehlhorn Professor Dr. Markus Bl¨aser Professor Dr. Brendan McKay (via Videokonferenz) Dr. Nicole Megow In memory of Martin Kutz Zusammenfassung Wir entwickeln Algorithmen fur¨ drei kombinatorische Probleme unbekannter Kom- plexit¨at: Das Graphisomorphieproblem, die Berechnung von van der Waerden-Zahlen und die Berechnung von Ramsey-Zahlen. Mit theoretischen und praktischen Methoden wird ein Vergleich zu bereits existierenden Algorithmen gezogen. Der Schraubenkasten, ein zertifizierender, randomisierter Graph-nicht-Isomorphie Algorithmus, fuhrt¨ zuf¨allige Stichproben in zwei gegeben Graphen durch, und schließt durch Festellen von statistisch signifikant abweichendem Verhalten der gesammelten Daten auf Nichtisomorphie. Die Durchfuhrung¨ der Stichproben und damit die erhal- tenen Daten sowie die verwendete Methode zum Festellen statistisch abweichenden Verhaltens passen sich dabei den Eingabegraphen an. Auf isomorphen Graphen wird mit hoher Wahrscheinlichkeit ein Isomorphismus gefunden, der als Zertifikat dient. Fur¨ nichtisomorphe Eingabegraphen dienen als randomisiertes Zertifikat die Zusam- mensetzung des Schraubenkastens und die Spezifizierung eines gunstigen¨ statistischen Tests. Zur Berechnung von van der Waerden-Zahlen entwickeln wir einen Algorithmus, der durch die Verwendung von Platzhaltern ein gleichzeitiges Bearbeiten von verschiedenen Elementen des zu durchsuchenden L¨osungsraums erm¨oglicht. Mit ihm werden neue van der Waerden-Zahlen berechnet. Der Zusammenhang der ersten beiden Probleme ist durch das dritte gegeben, dessen L¨osung die anderen L¨osungen zu einem Algorithmus verknupft,¨ der Ramsey-Zahlen berechnet. 4 Abstract We consider three computational problems with unknown complexity status: The graph isomorphism problem, the problem of computing van der Waerden numbers and the problem of computing Ramsey numbers. For each of the problems, we devise an algorithm that we analyze with theoretical and practical means by a comparison with contemporary algorithms that solve the respective problems. The ScrewBox algorithm solves the graph isomorphism problem by a random sam- pling process. Given two graphs, the algorithm randomly searches an invariant that may be randomly evaluated quickly and that shows significant statistical difference on the input graphs. This invariant is gradually and adaptively constructed depending on the difficulty of the input. Isomorphism is certified by supplying an isomorphism. Non-isomorphism is certified by the ScrewBox, the invariant whose statistical behavior deviates on the input graphs, together with the appropriate statistical test. The wildcards algorithm for van der Waerden numbers solves the second problem. Its key technique is to treat colorings of integers avoiding monochromatic arithmetic progressions simultaneously by allowing ambiguity. This, together with a specific preprocessing step, forms the algorithm that is used to compute previously unknown van der Waerden numbers. The wildcards algorithm for Ramsey numbers combines the techniques and algo- rithms with which we approach the first two problems to solve the third problem. 5 Contents 1 Introduction 9 2 Graph isomorphism 15 2.1 Thegraphisomorphismproblem . 16 2.1.1 Reductions: equivalent and non-equivalent problems ...... 18 2.2 BrendanMcKay’sNauty. 22 2.3 TheWeisfeiler-Lehmanmethod . 24 2.4 The Cai-F¨urer-Immerman construction and Miyazaki graphs ..... 26 2.5 EugeneLuks’boundeddegreealgorithm . 30 2.6 TheScrewBox ............................... 31 2.6.1 Thebasicsamplingalgorithm . 33 2.6.2 Higherlevelscrews. 37 2.6.3 Cheap screws of high level . 40 2.6.4 Customizing the algorithm . 42 2.6.5 Placementofthescrews . 44 2.6.6 Capabilities provided by the screws . 47 2.6.7 Thechoiceofpattern . 48 2.7 Advanced statistical tests for equal distribution . ......... 49 2.7.1 Testingabiasedcoin. 50 2.7.2 Testing two random variables for equal distribution . ...... 54 2.7.3 Choosinganoptimalfilter . 56 2.7.4 Testing with the ScrewBox . 58 2.8 Difficultgraphinstances . 60 2.8.1 Stronglyregulargraphs . 61 2.8.2 Hadamardmatrices . 62 2.8.3 Projectiveplanes . 62 2.9 EngineeringtheScrewBox . 63 2.9.1 Random sampling without replacement . 64 2.9.2 Pairlabel matrices . 65 2.9.3 Matrix multiplication . 65 2.10 Evaluation of the ScrewBox algorithm . 67 2.10.1 Theoretical evaluation . 68 2.10.2 Practical evaluation . 70 2.10.3 The CFI-construction and the ScrewBox . 75 2.11 Certification................................. 78 2.11.1 Beyond deterministic certification . 82 7 Contents 2.11.2 Amplification of randomized certifiability . .... 85 2.12Conclusion ................................. 86 3 Van der Waerden numbers 89 3.1 VanderWaerdennumbers. 90 3.1.1 Existence of van der Waerden numbers . 91 3.2 UpperboundsforvanderWaerdennumbers. 94 3.3 Lower bounds for van der Waerden numbers . 94 3.3.1 Lov´asz’ Local Lemma in the context of van der Waerden numbers 95 3.4 KnownmixedvanderWaerdennumbers. 96 3.5 Detecting monochromatic arithmetic progressions . ........ 98 3.6 Theculpritalgorithm . .. .. .. .. .. .. .. .. 99 3.7 Kouril’sandPaul’sSATtechnique . 100 3.8 The wildcards algorithm for mixed van der Waerden numbers..... 101 3.8.1 Incorporating culprits in the wildcards algorithm . ...... 105 3.9 Preprocessingtechniques. 106 3.9.1 Preprocessingwithlatepeak . 109 3.9.2 Preprocessingfortwocolors . 110 3.10 Implementation details . 111 3.11 Certification................................. 111 3.12 Evaluation and conclusion . 112 4 Ramsey numbers 115 4.1 Ramseynumbers .............................. 116 4.1.1 ExistenceofRamseynumbers. 117 4.2 UpperboundsforRamseynumbers. 117 4.3 LowerboundsforRamseynumbers . 117 4.4 KnownRamseynumbers. 118 4.5 Computational Complexity of Ramsey numbers . 119 4.6 Previousalgorithms . .. .. .. .. .. .. .. .. 120 4.7 The wildcards algorithm for Ramsey numbers . 121 4.7.1 High level description of the wildcards algorithm . ..... 122 4.7.2 The Gluing technique for the wildcards algorithm . .... 126 4.8 Certification................................. 126 4.9 Evaluationandconclusion . 127 8 1 Introduction When we are posed the algorithmic question:“How do you compute this efficiently?” with classical computational complexity theory we produce two kinds of answers: Ei- ther we devise a provably efficient algorithm or we show, using the theoretical frame- work, that it is likely, that we will never be able to construct an efficient algorithm for the problem, no matter how hard we try. Despite the large applicability of the classical computational complexity, there are problems for which our tools have not provided either answer yet. The complexity of these problems is unknown. This thesis is concerned with three fundamental computational problems, arising from combinatorics, with unknown complexity status: 1. the graph isomorphism problem, 2. the computation of van der Waerden numbers and 3. the computation of Ramsey numbers. For decades, numerous approaches have been taken to each of the problems in order to show one of the classical alternatives. Still, the unsettled complexity status of the problems remains. Nevertheless, we desire algorithms that solve these problems as efficiently as possible. In this thesis we develop algorithmic concepts that address the problems. Using the concepts, for each problem we design an algorithm that we evaluate by means of the- oretical and practical comparison to state-of-the-art algorithms that have previously been designed. The design of such algorithms goes hand in hand with mathemati- cal insight into the combinatorial structures involved in the problems and into their complexity. The third problem is strongly connected to the first two problems and thus forms the link between the two. This becomes apparent, as the algorithms devised for the graph isomorphism problem and the problem of computing van der Waerden numbers are merged to form an algorithm that computes Ramsey numbers. We briefly describe the three problems considered. Graph isomorphism Numerous graph theoretical treatises mention Euler’s famous problem, the Seven Bridges of K¨onigsberg [39], in their introduction. In 1736 Euler asks whether it is possible to tour K¨onigsberg, using all of its bridges exactly once. The solution ab- stracts the paths within the city into a graph, consisting of vertices, the islands, and edges between them, the bridges. The graph thus models the relation between vertices 9 1 Introduction that governs whether there is an edge between them. Readily agreed by Euler and his readers, for the existence of such a tour, the names of the different islands and their geographic location is irrelevant. Mathematically this abstraction is reformulated to the fact that our solution depends only on the isomorphism type of the graph.
Recommended publications
  • On Treewidth and Graph Minors
    On Treewidth and Graph Minors Daniel John Harvey Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy February 2014 Department of Mathematics and Statistics The University of Melbourne Produced on archival quality paper ii Abstract Both treewidth and the Hadwiger number are key graph parameters in structural and al- gorithmic graph theory, especially in the theory of graph minors. For example, treewidth demarcates the two major cases of the Robertson and Seymour proof of Wagner's Con- jecture. Also, the Hadwiger number is the key measure of the structural complexity of a graph. In this thesis, we shall investigate these parameters on some interesting classes of graphs. The treewidth of a graph defines, in some sense, how \tree-like" the graph is. Treewidth is a key parameter in the algorithmic field of fixed-parameter tractability. In particular, on classes of bounded treewidth, certain NP-Hard problems can be solved in polynomial time. In structural graph theory, treewidth is of key interest due to its part in the stronger form of Robertson and Seymour's Graph Minor Structure Theorem. A key fact is that the treewidth of a graph is tied to the size of its largest grid minor. In fact, treewidth is tied to a large number of other graph structural parameters, which this thesis thoroughly investigates. In doing so, some of the tying functions between these results are improved. This thesis also determines exactly the treewidth of the line graph of a complete graph. This is a critical example in a recent paper of Marx, and improves on a recent result by Grohe and Marx.
    [Show full text]
  • Graph Varieties Axiomatized by Semimedial, Medial, and Some Other Groupoid Identities
    Discussiones Mathematicae General Algebra and Applications 40 (2020) 143–157 doi:10.7151/dmgaa.1344 GRAPH VARIETIES AXIOMATIZED BY SEMIMEDIAL, MEDIAL, AND SOME OTHER GROUPOID IDENTITIES Erkko Lehtonen Technische Universit¨at Dresden Institut f¨ur Algebra 01062 Dresden, Germany e-mail: [email protected] and Chaowat Manyuen Department of Mathematics, Faculty of Science Khon Kaen University Khon Kaen 40002, Thailand e-mail: [email protected] Abstract Directed graphs without multiple edges can be represented as algebras of type (2, 0), so-called graph algebras. A graph is said to satisfy an identity if the corresponding graph algebra does, and the set of all graphs satisfying a set of identities is called a graph variety. We describe the graph varieties axiomatized by certain groupoid identities (medial, semimedial, autodis- tributive, commutative, idempotent, unipotent, zeropotent, alternative). Keywords: graph algebra, groupoid, identities, semimediality, mediality. 2010 Mathematics Subject Classification: 05C25, 03C05. 1. Introduction Graph algebras were introduced by Shallon [10] in 1979 with the purpose of providing examples of nonfinitely based finite algebras. Let us briefly recall this concept. Given a directed graph G = (V, E) without multiple edges, the graph algebra associated with G is the algebra A(G) = (V ∪ {∞}, ◦, ∞) of type (2, 0), 144 E. Lehtonen and C. Manyuen where ∞ is an element not belonging to V and the binary operation ◦ is defined by the rule u, if (u, v) ∈ E, u ◦ v := (∞, otherwise, for all u, v ∈ V ∪ {∞}. We will denote the product u ◦ v simply by juxtaposition uv. Using this representation, we may view any algebraic property of a graph algebra as a property of the graph with which it is associated.
    [Show full text]
  • Complexity Theory Lecture 9 Co-NP Co-NP-Complete
    Complexity Theory 1 Complexity Theory 2 co-NP Complexity Theory Lecture 9 As co-NP is the collection of complements of languages in NP, and P is closed under complementation, co-NP can also be characterised as the collection of languages of the form: ′ L = x y y <p( x ) R (x, y) { |∀ | | | | → } Anuj Dawar University of Cambridge Computer Laboratory NP – the collection of languages with succinct certificates of Easter Term 2010 membership. co-NP – the collection of languages with succinct certificates of http://www.cl.cam.ac.uk/teaching/0910/Complexity/ disqualification. Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 3 Complexity Theory 4 NP co-NP co-NP-complete P VAL – the collection of Boolean expressions that are valid is co-NP-complete. Any language L that is the complement of an NP-complete language is co-NP-complete. Any of the situations is consistent with our present state of ¯ knowledge: Any reduction of a language L1 to L2 is also a reduction of L1–the complement of L1–to L¯2–the complement of L2. P = NP = co-NP • There is an easy reduction from the complement of SAT to VAL, P = NP co-NP = NP = co-NP • ∩ namely the map that takes an expression to its negation. P = NP co-NP = NP = co-NP • ∩ VAL P P = NP = co-NP ∈ ⇒ P = NP co-NP = NP = co-NP • ∩ VAL NP NP = co-NP ∈ ⇒ Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 5 Complexity Theory 6 Prime Numbers Primality Consider the decision problem PRIME: Another way of putting this is that Composite is in NP.
    [Show full text]
  • A Logical Approach to Isomorphism Testing and Constraint Satisfaction
    A logical approach to Isomorphism Testing and Constraint Satisfaction Oleg Verbitsky Humboldt University of Berlin, Germany ESSLLI 2016, 1519 August 1/21 Part 8: k with : FO# k ≥ 3 Applications to Isomorphism Testing 2/21 Outline 1 Warm-up 2 Weisfeiler-Leman algorithm 3 Bounds for particular classes of graphs 4 References 3/21 Outline 1 Warm-up 2 Weisfeiler-Leman algorithm 3 Bounds for particular classes of graphs 4 References 4/21 Closure properties of denable graphs Denition G denotes the complement graph of G: V (G) = V (G) and uv 2 E(G) () uv2 = E(G). Exercise Prove that, if is denable in k , then is also denable G FO# G in k . FO# 5/21 Closure properties of denable graphs Denition G1 + G2 denotes the vertex-disjoint union of graphs G1 and G2. Exercise Let k ≥ 3. Suppose that connected graphs G1;:::;Gm are denable in k . Prove that is also denable FO# G1 + G2 + ::: + Gm in k . FO# Hint As an example, let k = 3 and suppose that G = 5A + 4B and H = 4A + 5B for some connected A and B such that W#(A; B) ≤ 3. In the rst round, Spoiler makes a counting move in G by marking all vertices in all A-components. Duplicator is forced to mark at least one vertex v in a B-component of H. Spoiler pebbles v, and Duplicator can only pebble some vertex u in an A-component of G. From now on, Spoiler plays in the components that contain u and v using his winning strategy for the game on A and B.
    [Show full text]
  • Interval Edge-Colorings of Graphs
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2016 Interval Edge-Colorings of Graphs Austin Foster University of Central Florida Part of the Mathematics Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Masters Thesis (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Foster, Austin, "Interval Edge-Colorings of Graphs" (2016). Electronic Theses and Dissertations, 2004-2019. 5133. https://stars.library.ucf.edu/etd/5133 INTERVAL EDGE-COLORINGS OF GRAPHS by AUSTIN JAMES FOSTER B.S. University of Central Florida, 2015 A thesis submitted in partial fulfilment of the requirements for the degree of Master of Science in the Department of Mathematics in the College of Sciences at the University of Central Florida Orlando, Florida Summer Term 2016 Major Professor: Zixia Song ABSTRACT A proper edge-coloring of a graph G by positive integers is called an interval edge-coloring if the colors assigned to the edges incident to any vertex in G are consecutive (i.e., those colors form an interval of integers). The notion of interval edge-colorings was first introduced by Asratian and Kamalian in 1987, motivated by the problem of finding compact school timetables. In 1992, Hansen described another scenario using interval edge-colorings to schedule parent-teacher con- ferences so that every person’s conferences occur in consecutive slots.
    [Show full text]
  • NP-Completeness: Reductions Tue, Nov 21, 2017
    CMSC 451 Dave Mount CMSC 451: Lecture 19 NP-Completeness: Reductions Tue, Nov 21, 2017 Reading: Chapt. 8 in KT and Chapt. 8 in DPV. Some of the reductions discussed here are not in either text. Recap: We have introduced a number of concepts on the way to defining NP-completeness: Decision Problems/Language recognition: are problems for which the answer is either yes or no. These can also be thought of as language recognition problems, assuming that the input has been encoded as a string. For example: HC = fG j G has a Hamiltonian cycleg MST = f(G; c) j G has a MST of cost at most cg: P: is the class of all decision problems which can be solved in polynomial time. While MST 2 P, we do not know whether HC 2 P (but we suspect not). Certificate: is a piece of evidence that allows us to verify in polynomial time that a string is in a given language. For example, the language HC above, a certificate could be a sequence of vertices along the cycle. (If the string is not in the language, the certificate can be anything.) NP: is defined to be the class of all languages that can be verified in polynomial time. (Formally, it stands for Nondeterministic Polynomial time.) Clearly, P ⊆ NP. It is widely believed that P 6= NP. To define NP-completeness, we need to introduce the concept of a reduction. Reductions: The class of NP-complete problems consists of a set of decision problems (languages) (a subset of the class NP) that no one knows how to solve efficiently, but if there were a polynomial time solution for even a single NP-complete problem, then every problem in NP would be solvable in polynomial time.
    [Show full text]
  • David Gries, 2018 Graph Coloring A
    Graph coloring A coloring of an undirected graph is an assignment of a color to each node so that adja- cent nodes have different colors. The graph to the right, taken from Wikipedia, is known as the Petersen graph, after Julius Petersen, who discussed some of its properties in 1898. It has been colored with 3 colors. It can’t be colored with one or two. The Petersen graph has both K5 and bipartite graph K3,3, so it is not planar. That’s all you have to know about the Petersen graph. But if you are at all interested in what mathemati- cians and computer scientists do, visit the Wikipedia page for Petersen graph. This discussion on graph coloring is important not so much for what it says about the four-color theorem but what it says about proofs by computers, for the proof of the four-color theorem was just about the first one to use a computer and sparked a lot of controversy. Kempe’s flawed proof that four colors suffice to color a planar graph Thoughts about graph coloring appear to have sprung up in England around 1850 when people attempted to color maps, which can be represented by planar graphs in which the nodes are countries and adjacent countries have a directed edge between them. Francis Guthrie conjectured that four colors would suffice. In 1879, Alfred Kemp, a barrister in London, published a proof in the American Journal of Mathematics that only four colors were needed to color a planar graph. Eleven years later, P.J.
    [Show full text]
  • Computational Complexity: a Modern Approach
    i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University [email protected] Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to [email protected] — Thank You!! DRAFT ii DRAFT Chapter 9 Complexity of counting “It is an empirical fact that for many combinatorial problems the detection of the existence of a solution is easy, yet no computationally efficient method is known for counting their number.... for a variety of problems this phenomenon can be explained.” L. Valiant 1979 The class NP captures the difficulty of finding certificates. However, in many contexts, one is interested not just in a single certificate, but actually counting the number of certificates. This chapter studies #P, (pronounced “sharp p”), a complexity class that captures this notion. Counting problems arise in diverse fields, often in situations having to do with estimations of probability. Examples include statistical estimation, statistical physics, network design, and more. Counting problems are also studied in a field of mathematics called enumerative combinatorics, which tries to obtain closed-form mathematical expressions for counting problems. To give an example, in the 19th century Kirchoff showed how to count the number of spanning trees in a graph using a simple determinant computation. Results in this chapter will show that for many natural counting problems, such efficiently computable expressions are unlikely to exist.
    [Show full text]
  • NP-Completeness Part I
    NP-Completeness Part I Outline for Today ● Recap from Last Time ● Welcome back from break! Let's make sure we're all on the same page here. ● Polynomial-Time Reducibility ● Connecting problems together. ● NP-Completeness ● What are the hardest problems in NP? ● The Cook-Levin Theorem ● A concrete NP-complete problem. Recap from Last Time The Limits of Computability EQTM EQTM co-RE R RE LD LD ADD HALT ATM HALT ATM 0*1* The Limits of Efficient Computation P NP R P and NP Refresher ● The class P consists of all problems solvable in deterministic polynomial time. ● The class NP consists of all problems solvable in nondeterministic polynomial time. ● Equivalently, NP consists of all problems for which there is a deterministic, polynomial-time verifier for the problem. Reducibility Maximum Matching ● Given an undirected graph G, a matching in G is a set of edges such that no two edges share an endpoint. ● A maximum matching is a matching with the largest number of edges. AA maximummaximum matching.matching. Maximum Matching ● Jack Edmonds' paper “Paths, Trees, and Flowers” gives a polynomial-time algorithm for finding maximum matchings. ● (This is the same Edmonds as in “Cobham- Edmonds Thesis.) ● Using this fact, what other problems can we solve? Domino Tiling Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling The Setup ● To determine whether you can place at least k dominoes on a crossword grid, do the following: ● Convert the grid into a graph: each empty cell is a node, and any two adjacent empty cells have an edge between them.
    [Show full text]
  • Effective and Efficient Dynamic Graph Coloring
    Effective and Efficient Dynamic Graph Coloring Long Yuanx, Lu Qinz, Xuemin Linx, Lijun Changy, and Wenjie Zhangx x The University of New South Wales, Australia zCentre for Quantum Computation & Intelligent Systems, University of Technology, Sydney, Australia y The University of Sydney, Australia x{longyuan,lxue,zhangw}@cse.unsw.edu.au; [email protected]; [email protected] ABSTRACT (1) Nucleic Acid Sequence Design in Biochemical Networks. Given Graph coloring is a fundamental graph problem that is widely ap- a set of nucleic acids, a dependency graph is a graph in which each plied in a variety of applications. The aim of graph coloring is to vertex is a nucleotide and two vertices are connected if the two minimize the number of colors used to color the vertices in a graph nucleotides form a base pair in at least one of the nucleic acids. such that no two incident vertices have the same color. Existing The problem of finding a nucleic acid sequence that is compatible solutions for graph coloring mainly focus on computing a good col- with the set of nucleic acids can be modelled as a graph coloring oring for a static graph. However, since many real-world graphs are problem on a dependency graph [57]. highly dynamic, in this paper, we aim to incrementally maintain the (2) Air Traffic Flow Management. In air traffic flow management, graph coloring when the graph is dynamically updated. We target the air traffic flow can be considered as a graph in which each vertex on two goals: high effectiveness and high efficiency.
    [Show full text]
  • Monte-Carlo Algorithms in Graph Isomorphism Testing
    Monte-Carlo algorithms in graph isomorphism testing L´aszl´oBabai∗ E¨otv¨osUniversity, Budapest, Hungary Universit´ede Montr´eal,Canada Abstract Abstract. We present an O(V 4 log V ) coin flipping algorithm to test vertex-colored graphs with bounded color multiplicities for color-preserving isomorphism. We are also able to generate uniformly distributed ran- dom automorphisms of such graphs. A more general result finds gener- ators for the intersection of cylindric subgroups of a direct product of groups in O(n7/2 log n) time, where n is the length of the input string. This result will be applied in another paper to find a polynomial time coin flipping algorithm to test isomorphism of graphs with bounded eigenvalue multiplicities. The most general result says that if AutX is accessible by a chain G0 ≥ · · · ≥ Gk = AutX of quickly recognizable groups such that the indices |Gi−1 : Gi| are small (but unknown), the order of |G0| is known and there is a fast way of generating uniformly distributed random members of G0 then a set of generators of AutX can be found by a fast algorithm. Applications of the main result im- prove the complexity of isomorphism testing for graphs with bounded valences to exp(n1/2+o(1)) and for distributive lattices to O(n6 log log n). ∗Apart from possible typos, this is a verbatim transcript of the author’s 1979 technical report, “Monte Carlo algorithms in graph isomorphism testing” (Universit´ede Montr´eal, D.M.S. No. 79-10), with two footnotes added to correct a typo and a glaring omission in the original.
    [Show full text]
  • Arxiv:2006.06067V2 [Math.CO] 4 Jul 2021
    Treewidth versus clique number. I. Graph classes with a forbidden structure∗† Cl´ement Dallard1 Martin Milaniˇc1 Kenny Storgelˇ 2 1 FAMNIT and IAM, University of Primorska, Koper, Slovenia 2 Faculty of Information Studies, Novo mesto, Slovenia [email protected] [email protected] [email protected] Treewidth is an important graph invariant, relevant for both structural and algo- rithmic reasons. A necessary condition for a graph class to have bounded treewidth is the absence of large cliques. We study graph classes closed under taking induced subgraphs in which this condition is also sufficient, which we call (tw,ω)-bounded. Such graph classes are known to have useful algorithmic applications related to variants of the clique and k-coloring problems. We consider six well-known graph containment relations: the minor, topological minor, subgraph, induced minor, in- duced topological minor, and induced subgraph relations. For each of them, we give a complete characterization of the graphs H for which the class of graphs excluding H is (tw,ω)-bounded. Our results yield an infinite family of χ-bounded induced-minor-closed graph classes and imply that the class of 1-perfectly orientable graphs is (tw,ω)-bounded, leading to linear-time algorithms for k-coloring 1-perfectly orientable graphs for every fixed k. This answers a question of Breˇsar, Hartinger, Kos, and Milaniˇc from 2018, and one of Beisegel, Chudnovsky, Gurvich, Milaniˇc, and Servatius from 2019, respectively. We also reveal some further algorithmic implications of (tw,ω)- boundedness related to list k-coloring and clique problems. In addition, we propose a question about the complexity of the Maximum Weight Independent Set prob- lem in (tw,ω)-bounded graph classes and prove that the problem is polynomial-time solvable in every class of graphs excluding a fixed star as an induced minor.
    [Show full text]