19 research outputs found
Elusive properties of infinite graphs
A graph property is said to be elusive ( evasive) if every algorithm testing this property by asking questions of the form "is there an edge between vertices x and y" requires, in the worst case, to ask about all pairs of vertices.
The unsettled Aanderaa-Karp-Rosenberg conjecture is that every monotone graph property is elusive for finite vertex sets.
We show that the situation is completely different for infinite vertex sets: the monotone graph properties "every vertex has degree at least n" and "every connected components has size at least n" where n is a natural number, are not elusive for infinite vertex sets, but the monotone graph property "the graph contains a cycle" is elusive for arbitrary vertex sets. On the other hand, we also prove that every algorithm testing some natural monotone graph properties, e.g "every vertex has degree at least n" or "connected" on the vertex set omega should check "lots of edges", more precisely, all the edges of an infinite complete subgraph
Quantum Algorithms for the Triangle Problem
We present two new quantum algorithms that either find a triangle (a copy of
) in an undirected graph on nodes, or reject if is triangle
free. The first algorithm uses combinatorial ideas with Grover Search and makes
queries. The second algorithm uses
queries, and it is based on a design concept of Ambainis~\cite{amb04} that
incorporates the benefits of quantum walks into Grover search~\cite{gro96}. The
first algorithm uses only qubits in its quantum subroutines,
whereas the second one uses O(n) qubits. The Triangle Problem was first treated
in~\cite{bdhhmsw01}, where an algorithm with query complexity
was presented, where is the number of edges of .Comment: Several typos are fixed, and full proofs are included. Full version
of the paper accepted to SODA'0
Quantum query complexity of minor-closed graph properties
We study the quantum query complexity of minor-closed graph properties, which
include such problems as determining whether an -vertex graph is planar, is
a forest, or does not contain a path of a given length. We show that most
minor-closed properties---those that cannot be characterized by a finite set of
forbidden subgraphs---have quantum query complexity \Theta(n^{3/2}). To
establish this, we prove an adversary lower bound using a detailed analysis of
the structure of minor-closed properties with respect to forbidden topological
minors and forbidden subgraphs. On the other hand, we show that minor-closed
properties (and more generally, sparse graph properties) that can be
characterized by finitely many forbidden subgraphs can be solved strictly
faster, in o(n^{3/2}) queries. Our algorithms are a novel application of the
quantum walk search framework and give improved upper bounds for several
subgraph-finding problems.Comment: v1: 25 pages, 2 figures. v2: 26 page
Quantum Query Complexity of Subgraph Isomorphism and Homomorphism
Let be a fixed graph on vertices. Let iff the input
graph on vertices contains as a (not necessarily induced) subgraph.
Let denote the cardinality of a maximum independent set of . In
this paper we show:
where
denotes the quantum query complexity of .
As a consequence we obtain a lower bounds for in terms of several
other parameters of such as the average degree, minimum vertex cover,
chromatic number, and the critical probability.
We also use the above bound to show that for any
, improving on the previously best known bound of . Until
very recently, it was believed that the quantum query complexity is at least
square root of the randomized one. Our bound for
matches the square root of the current best known bound for the randomized
query complexity of , which is due to Gr\"oger.
Interestingly, the randomized bound of for
still remains open.
We also study the Subgraph Homomorphism Problem, denoted by , and
show that .
Finally we extend our results to the -uniform hypergraphs. In particular,
we show an bound for quantum query complexity of the Subgraph
Isomorphism, improving on the previously known bound. For the
Subgraph Homomorphism, we obtain an bound for the same.Comment: 16 pages, 2 figure
Graph Properties in Node-Query Setting: Effect of Breaking Symmetry
The query complexity of graph properties is well-studied when queries are on the edges. We investigate the same when queries are on the nodes. In this setting a graph G = (V,E) on n vertices and a property P are given. A black-box access to an unknown subset S of V is provided via queries of the form "Does i belong to S?". We are interested in the minimum number of queries needed in the worst case in order to determine whether G[S] - the subgraph of G induced on S - satisfies P.
Our primary motivation to study this model comes from the fact that it allows us to initiate a systematic study of breaking symmetry in the context of query complexity of graph properties. In particular, we focus on the hereditary graph properties - properties that are closed under deletion of vertices as well as edges. The famous Evasiveness Conjecture asserts that even with a minimal symmetry assumption on G, namely that of vertex-transitivity, the query complexity for any hereditary graph property in our setting is the worst possible, i.e., n.
We show that in the absence of any symmetry on G it can fall as low as O(n^{1/(d + 1)}) where d denotes the minimum possible degree of a minimal forbidden sub-graph for P. In particular, every hereditary property benefits at least quadratically. The main question left open is: Can it go exponentially low for some hereditary property? We show that the answer is no for any hereditary property with finitely many forbidden subgraphs by exhibiting a bound of Omega(n^{1/k}) for a constant k depending only on the property. For general ones we rule out the possibility of the query complexity falling down to constant by showing Omega(log(n)*log(log(n))) bound. Interestingly, our lower bound proofs rely on the famous Sunflower Lemma due to Erdos and Rado
Evasiveness of Graph Properties and Topological Fixed-Point Theorems
Many graph properties (e.g., connectedness, containing a complete subgraph)
are known to be difficult to check. In a decision-tree model, the cost of an
algorithm is measured by the number of edges in the graph that it queries. R.
Karp conjectured in the early 1970s that all monotone graph properties are
evasive -- that is, any algorithm which computes a monotone graph property must
check all edges in the worst case. This conjecture is unproven, but a lot of
progress has been made. Starting with the work of Kahn, Saks, and Sturtevant in
1984, topological methods have been applied to prove partial results on the
Karp conjecture. This text is a tutorial on these topological methods. I give a
fully self-contained account of the central proofs from the paper of Kahn,
Saks, and Sturtevant, with no prior knowledge of topology assumed. I also
briefly survey some of the more recent results on evasiveness.Comment: Book version, 92 page
Topics in algorithmic, enumerative and geometric combinatorics
This thesis presents five papers, studying enumerative and
extremal problems on combinatorial structures.
The first paper studies Forman's discrete Morse theory in the case where a group acts on the underlying complex. We generalize the notion of a Morse matching, and obtain a theory that can be used to simplify the description of the G-homotopy type of a simplicial complex. As an application, we determine the S_2xS_{n-2}-homotopy type of the complex of non-connected graphs on n nodes. In the introduction, connections are drawn between the first paper and the evasiveness conjecture for monotone graph properties.
In the second paper, we investigate Hansen polytopes of split graphs. By applying a partitioning
technique, the number of nonempty faces is counted, and in particular we confirm
Kalai's 3^d-conjecture for such polytopes. Furthermore, a characterization of
exactly which Hansen polytopes are also Hanner polytopes is given. We end by
constructing an interesting class of Hansen polytopes having very few faces and
yet not being Hanner.
The third paper studies the problem of packing a pattern as densely as possible into compositions. We are able to find the
packing density for some classes of generalized patterns, including all the three letter patterns.
In the fourth paper, we present combinatorial proofs of the enumeration of derangements with descents in prescribed positions. To this end, we
consider fixed point lambda-coloured permutations, which are easily
enumerated. Several formulae regarding these numbers are given, as
well as a generalisation of Euler's difference tables. We also prove that except in a trivial special case, the event that pi has descents in a set S of positions is positively correlated with the event that pi is a derangement, if pi is chosen uniformly in S_n.
The fifth paper solves a partially ordered generalization of the famous secretary problem. The elements of a finite nonempty partially ordered set are exposed in uniform random order to a selector who, at any given time, can see the relative order of the exposed elements. The selector's task is to choose online a maximal element. We describe a strategy for the general problem that achieves success probability at least 1/e for an arbitrary partial order, thus proving that the linearly ordered set is at least as difficult as any other instance of the problem. To this end, we define a probability measure on the maximal elements of an arbitrary partially ordered set, that may be interesting in its own right
Randomized and quantum query complexities of finding a king in a tournament
A tournament is a complete directed graph. It is well known that every
tournament contains at least one vertex v such that every other vertex is
reachable from v by a path of length at most 2. All such vertices v are called
*kings* of the underlying tournament. Despite active recent research in the
area, the best-known upper and lower bounds on the deterministic query
complexity (with query access to directions of edges) of finding a king in a
tournament on n vertices are from over 20 years ago, and the bounds do not
match: the best-known lower bound is Omega(n^{4/3}) and the best-known upper
bound is O(n^{3/2}) [Shen, Sheng, Wu, SICOMP'03]. Our contribution is to show
essentially *tight* bounds (up to logarithmic factors) of Theta(n) and
Theta(sqrt{n}) in the *randomized* and *quantum* query models, respectively. We
also study the randomized and quantum query complexities of finding a maximum
out-degree vertex in a tournament
Real-time multipushdown and multicounter automata networks and hierarchies
Ph.D.William I. Grosk
On the Decision Tree Complexity of String Matching
String matching is one of the most fundamental problems in computer science. A natural problem is to determine the number of characters that need to be queried (i.e. the decision tree complexity) in a string in order to decide whether this string contains a certain pattern. Rivest showed that for every pattern p, in the worst case any deterministic algorithm needs to query at least n-|p|+1 characters, where n is the length of the string and |p| is the length of the pattern. He further conjectured that this bound is tight. By using the adversary method, Tuza disproved this conjecture and showed that more than one half of binary patterns are evasive, i.e. any algorithm needs to query all the characters (see Section 1.1 for more details).
In this paper, we give a query algorithm which settles the decision tree complexity of string matching except for a negligible fraction of patterns. Our algorithm shows that Tuza\u27s criteria of evasive patterns are almost complete. Using the algebraic approach of Rivest and Vuillemin, we also give a new sufficient condition for the evasiveness of patterns, which is beyond Tuza\u27s criteria. In addition, our result reveals an interesting connection to Skolem\u27s Problem in mathematics