19 research outputs found

    Elusive properties of infinite graphs

    Get PDF
    A graph property is said to be elusive ( evasive) if every algorithm testing this property by asking questions of the form "is there an edge between vertices x and y" requires, in the worst case, to ask about all pairs of vertices. The unsettled Aanderaa-Karp-Rosenberg conjecture is that every monotone graph property is elusive for finite vertex sets. We show that the situation is completely different for infinite vertex sets: the monotone graph properties "every vertex has degree at least n" and "every connected components has size at least n" where n is a natural number, are not elusive for infinite vertex sets, but the monotone graph property "the graph contains a cycle" is elusive for arbitrary vertex sets. On the other hand, we also prove that every algorithm testing some natural monotone graph properties, e.g "every vertex has degree at least n" or "connected" on the vertex set omega should check "lots of edges", more precisely, all the edges of an infinite complete subgraph

    Quantum Algorithms for the Triangle Problem

    Full text link
    We present two new quantum algorithms that either find a triangle (a copy of K3K_{3}) in an undirected graph GG on nn nodes, or reject if GG is triangle free. The first algorithm uses combinatorial ideas with Grover Search and makes O~(n10/7)\tilde{O}(n^{10/7}) queries. The second algorithm uses O~(n13/10)\tilde{O}(n^{13/10}) queries, and it is based on a design concept of Ambainis~\cite{amb04} that incorporates the benefits of quantum walks into Grover search~\cite{gro96}. The first algorithm uses only O(logn)O(\log n) qubits in its quantum subroutines, whereas the second one uses O(n) qubits. The Triangle Problem was first treated in~\cite{bdhhmsw01}, where an algorithm with O(n+nm)O(n+\sqrt{nm}) query complexity was presented, where mm is the number of edges of GG.Comment: Several typos are fixed, and full proofs are included. Full version of the paper accepted to SODA'0

    Quantum query complexity of minor-closed graph properties

    Get PDF
    We study the quantum query complexity of minor-closed graph properties, which include such problems as determining whether an nn-vertex graph is planar, is a forest, or does not contain a path of a given length. We show that most minor-closed properties---those that cannot be characterized by a finite set of forbidden subgraphs---have quantum query complexity \Theta(n^{3/2}). To establish this, we prove an adversary lower bound using a detailed analysis of the structure of minor-closed properties with respect to forbidden topological minors and forbidden subgraphs. On the other hand, we show that minor-closed properties (and more generally, sparse graph properties) that can be characterized by finitely many forbidden subgraphs can be solved strictly faster, in o(n^{3/2}) queries. Our algorithms are a novel application of the quantum walk search framework and give improved upper bounds for several subgraph-finding problems.Comment: v1: 25 pages, 2 figures. v2: 26 page

    Quantum Query Complexity of Subgraph Isomorphism and Homomorphism

    Get PDF
    Let HH be a fixed graph on nn vertices. Let fH(G)=1f_H(G) = 1 iff the input graph GG on nn vertices contains HH as a (not necessarily induced) subgraph. Let αH\alpha_H denote the cardinality of a maximum independent set of HH. In this paper we show: Q(fH)=Ω(αHn),Q(f_H) = \Omega\left(\sqrt{\alpha_H \cdot n}\right), where Q(fH)Q(f_H) denotes the quantum query complexity of fHf_H. As a consequence we obtain a lower bounds for Q(fH)Q(f_H) in terms of several other parameters of HH such as the average degree, minimum vertex cover, chromatic number, and the critical probability. We also use the above bound to show that Q(fH)=Ω(n3/4)Q(f_H) = \Omega(n^{3/4}) for any HH, improving on the previously best known bound of Ω(n2/3)\Omega(n^{2/3}). Until very recently, it was believed that the quantum query complexity is at least square root of the randomized one. Our Ω(n3/4)\Omega(n^{3/4}) bound for Q(fH)Q(f_H) matches the square root of the current best known bound for the randomized query complexity of fHf_H, which is Ω(n3/2)\Omega(n^{3/2}) due to Gr\"oger. Interestingly, the randomized bound of Ω(αHn)\Omega(\alpha_H \cdot n) for fHf_H still remains open. We also study the Subgraph Homomorphism Problem, denoted by f[H]f_{[H]}, and show that Q(f[H])=Ω(n)Q(f_{[H]}) = \Omega(n). Finally we extend our results to the 33-uniform hypergraphs. In particular, we show an Ω(n4/5)\Omega(n^{4/5}) bound for quantum query complexity of the Subgraph Isomorphism, improving on the previously known Ω(n3/4)\Omega(n^{3/4}) bound. For the Subgraph Homomorphism, we obtain an Ω(n3/2)\Omega(n^{3/2}) bound for the same.Comment: 16 pages, 2 figure

    Graph Properties in Node-Query Setting: Effect of Breaking Symmetry

    Get PDF
    The query complexity of graph properties is well-studied when queries are on the edges. We investigate the same when queries are on the nodes. In this setting a graph G = (V,E) on n vertices and a property P are given. A black-box access to an unknown subset S of V is provided via queries of the form "Does i belong to S?". We are interested in the minimum number of queries needed in the worst case in order to determine whether G[S] - the subgraph of G induced on S - satisfies P. Our primary motivation to study this model comes from the fact that it allows us to initiate a systematic study of breaking symmetry in the context of query complexity of graph properties. In particular, we focus on the hereditary graph properties - properties that are closed under deletion of vertices as well as edges. The famous Evasiveness Conjecture asserts that even with a minimal symmetry assumption on G, namely that of vertex-transitivity, the query complexity for any hereditary graph property in our setting is the worst possible, i.e., n. We show that in the absence of any symmetry on G it can fall as low as O(n^{1/(d + 1)}) where d denotes the minimum possible degree of a minimal forbidden sub-graph for P. In particular, every hereditary property benefits at least quadratically. The main question left open is: Can it go exponentially low for some hereditary property? We show that the answer is no for any hereditary property with finitely many forbidden subgraphs by exhibiting a bound of Omega(n^{1/k}) for a constant k depending only on the property. For general ones we rule out the possibility of the query complexity falling down to constant by showing Omega(log(n)*log(log(n))) bound. Interestingly, our lower bound proofs rely on the famous Sunflower Lemma due to Erdos and Rado

    Evasiveness of Graph Properties and Topological Fixed-Point Theorems

    Full text link
    Many graph properties (e.g., connectedness, containing a complete subgraph) are known to be difficult to check. In a decision-tree model, the cost of an algorithm is measured by the number of edges in the graph that it queries. R. Karp conjectured in the early 1970s that all monotone graph properties are evasive -- that is, any algorithm which computes a monotone graph property must check all edges in the worst case. This conjecture is unproven, but a lot of progress has been made. Starting with the work of Kahn, Saks, and Sturtevant in 1984, topological methods have been applied to prove partial results on the Karp conjecture. This text is a tutorial on these topological methods. I give a fully self-contained account of the central proofs from the paper of Kahn, Saks, and Sturtevant, with no prior knowledge of topology assumed. I also briefly survey some of the more recent results on evasiveness.Comment: Book version, 92 page

    Topics in algorithmic, enumerative and geometric combinatorics

    Get PDF
    This thesis presents five papers, studying enumerative and extremal problems on combinatorial structures. The first paper studies Forman's discrete Morse theory in the case where a group acts on the underlying complex. We generalize the notion of a Morse matching, and obtain a theory that can be used to simplify the description of the G-homotopy type of a simplicial complex. As an application, we determine the S_2xS_{n-2}-homotopy type of the complex of non-connected graphs on n nodes. In the introduction, connections are drawn between the first paper and the evasiveness conjecture for monotone graph properties. In the second paper, we investigate Hansen polytopes of split graphs. By applying a partitioning technique, the number of nonempty faces is counted, and in particular we confirm Kalai's 3^d-conjecture for such polytopes. Furthermore, a characterization of exactly which Hansen polytopes are also Hanner polytopes is given. We end by constructing an interesting class of Hansen polytopes having very few faces and yet not being Hanner. The third paper studies the problem of packing a pattern as densely as possible into compositions. We are able to find the packing density for some classes of generalized patterns, including all the three letter patterns. In the fourth paper, we present combinatorial proofs of the enumeration of derangements with descents in prescribed positions. To this end, we consider fixed point lambda-coloured permutations, which are easily enumerated. Several formulae regarding these numbers are given, as well as a generalisation of Euler's difference tables. We also prove that except in a trivial special case, the event that pi has descents in a set S of positions is positively correlated with the event that pi is a derangement, if pi is chosen uniformly in S_n. The fifth paper solves a partially ordered generalization of the famous secretary problem. The elements of a finite nonempty partially ordered set are exposed in uniform random order to a selector who, at any given time, can see the relative order of the exposed elements. The selector's task is to choose online a maximal element. We describe a strategy for the general problem that achieves success probability at least 1/e for an arbitrary partial order, thus proving that the linearly ordered set is at least as difficult as any other instance of the problem. To this end, we define a probability measure on the maximal elements of an arbitrary partially ordered set, that may be interesting in its own right

    Randomized and quantum query complexities of finding a king in a tournament

    Full text link
    A tournament is a complete directed graph. It is well known that every tournament contains at least one vertex v such that every other vertex is reachable from v by a path of length at most 2. All such vertices v are called *kings* of the underlying tournament. Despite active recent research in the area, the best-known upper and lower bounds on the deterministic query complexity (with query access to directions of edges) of finding a king in a tournament on n vertices are from over 20 years ago, and the bounds do not match: the best-known lower bound is Omega(n^{4/3}) and the best-known upper bound is O(n^{3/2}) [Shen, Sheng, Wu, SICOMP'03]. Our contribution is to show essentially *tight* bounds (up to logarithmic factors) of Theta(n) and Theta(sqrt{n}) in the *randomized* and *quantum* query models, respectively. We also study the randomized and quantum query complexities of finding a maximum out-degree vertex in a tournament

    Real-time multipushdown and multicounter automata networks and hierarchies

    Get PDF
    Ph.D.William I. Grosk

    On the Decision Tree Complexity of String Matching

    Get PDF
    String matching is one of the most fundamental problems in computer science. A natural problem is to determine the number of characters that need to be queried (i.e. the decision tree complexity) in a string in order to decide whether this string contains a certain pattern. Rivest showed that for every pattern p, in the worst case any deterministic algorithm needs to query at least n-|p|+1 characters, where n is the length of the string and |p| is the length of the pattern. He further conjectured that this bound is tight. By using the adversary method, Tuza disproved this conjecture and showed that more than one half of binary patterns are evasive, i.e. any algorithm needs to query all the characters (see Section 1.1 for more details). In this paper, we give a query algorithm which settles the decision tree complexity of string matching except for a negligible fraction of patterns. Our algorithm shows that Tuza\u27s criteria of evasive patterns are almost complete. Using the algebraic approach of Rivest and Vuillemin, we also give a new sufficient condition for the evasiveness of patterns, which is beyond Tuza\u27s criteria. In addition, our result reveals an interesting connection to Skolem\u27s Problem in mathematics
    corecore