530 research outputs found

    Fixed-parameter tractable canonization and isomorphism test for graphs of bounded treewidth

    Get PDF
    We give a fixed-parameter tractable algorithm that, given a parameter kk and two graphs G1,G2G_1,G_2, either concludes that one of these graphs has treewidth at least kk, or determines whether G1G_1 and G2G_2 are isomorphic. The running time of the algorithm on an nn-vertex graph is 2O(k5logk)n52^{O(k^5\log k)}\cdot n^5, and this is the first fixed-parameter algorithm for Graph Isomorphism parameterized by treewidth. Our algorithm in fact solves the more general canonization problem. We namely design a procedure working in 2O(k5logk)n52^{O(k^5\log k)}\cdot n^5 time that, for a given graph GG on nn vertices, either concludes that the treewidth of GG is at least kk, or: * finds in an isomorphic-invariant way a graph c(G)\mathfrak{c}(G) that is isomorphic to GG; * finds an isomorphism-invariant construction term --- an algebraic expression that encodes GG together with a tree decomposition of GG of width O(k4)O(k^4). Hence, the isomorphism test reduces to verifying whether the computed isomorphic copies or the construction terms for G1G_1 and G2G_2 are equal.Comment: Full version of a paper presented at FOCS 201

    The Graph Isomorphism Problem and approximate categories

    Full text link
    It is unknown whether two graphs can be tested for isomorphism in polynomial time. A classical approach to the Graph Isomorphism Problem is the d-dimensional Weisfeiler-Lehman algorithm. The d-dimensional WL-algorithm can distinguish many pairs of graphs, but the pairs of non-isomorphic graphs constructed by Cai, Furer and Immerman it cannot distinguish. If d is fixed, then the WL-algorithm runs in polynomial time. We will formulate the Graph Isomorphism Problem as an Orbit Problem: Given a representation V of an algebraic group G and two elements v_1,v_2 in V, decide whether v_1 and v_2 lie in the same G-orbit. Then we attack the Orbit Problem by constructing certain approximate categories C_d(V), d=1,2,3,... whose objects include the elements of V. We show that v_1 and v_2 are not in the same orbit by showing that they are not isomorphic in the category C_d(V) for some d. For every d this gives us an algorithm for isomorphism testing. We will show that the WL-algorithms reduce to our algorithms, but that our algorithms cannot be reduced to the WL-algorithms. Unlike the Weisfeiler-Lehman algorithm, our algorithm can distinguish the Cai-Furer-Immerman graphs in polynomial time.Comment: 29 page

    Canonizing Graphs of Bounded Tree Width in Logspace

    Get PDF
    Graph canonization is the problem of computing a unique representative, a canon, from the isomorphism class of a given graph. This implies that two graphs are isomorphic exactly if their canons are equal. We show that graphs of bounded tree width can be canonized by logarithmic-space (logspace) algorithms. This implies that the isomorphism problem for graphs of bounded tree width can be decided in logspace. In the light of isomorphism for trees being hard for the complexity class logspace, this makes the ubiquitous class of graphs of bounded tree width one of the few classes of graphs for which the complexity of the isomorphism problem has been exactly determined.Comment: 26 page

    Isogeny graphs with maximal real multiplication

    Get PDF
    An isogeny graph is a graph whose vertices are principally polarized abelian varieties and whose edges are isogenies between these varieties. In his thesis, Kohel described the structure of isogeny graphs for elliptic curves and showed that one may compute the endomorphism ring of an elliptic curve defined over a finite field by using a depth first search algorithm in the graph. In dimension 2, the structure of isogeny graphs is less understood and existing algorithms for computing endomorphism rings are very expensive. Our setting considers genus 2 jacobians with complex multiplication, with the assumptions that the real multiplication subring is maximal and has class number one. We fully describe the isogeny graphs in that case. Over finite fields, we derive a depth first search algorithm for computing endomorphism rings locally at prime numbers, if the real multiplication is maximal. To the best of our knowledge, this is the first DFS-based algorithm in genus 2

    On computing Belyi maps

    Get PDF
    We survey methods to compute three-point branched covers of the projective line, also known as Belyi maps. These methods include a direct approach, involving the solution of a system of polynomial equations, as well as complex analytic methods, modular forms methods, and p-adic methods. Along the way, we pose several questions and provide numerous examples.Comment: 57 pages, 3 figures, extensive bibliography; English and French abstract; revised according to referee's suggestion

    A Canonical Form for Positive Definite Matrices

    Get PDF
    We exhibit an explicit, deterministic algorithm for finding a canonical form for a positive definite matrix under unimodular integral transformations. We use characteristic sets of short vectors and partition-backtracking graph software. The algorithm runs in a number of arithmetic operations that is exponential in the dimension nn, but it is practical and more efficient than canonical forms based on Minkowski reduction
    corecore