10,716 research outputs found
Evaluating the Tutte Polynomial for Graphs of Bounded Tree-Width
It is known that evaluating the Tutte polynomial, , of a graph, , is P-hard at all but eight specific points and one specific curve of the -plane. In contrast we show that if is a fixed constant then for graphs of tree-width at most there is an algorithm that will evaluate the polynomial at any point using only a linear number of multiplications and additions
Evaluating a weighted graph polynomial for graphs of bounded tree-width
We show that for any there is a polynomial time algorithm to evaluate the weighted graph polynomial of any graph with tree-width at most at any point. For a graph with vertices, the algorithm requires arithmetical operations, where depends only on
Fast Evaluation of Interlace Polynomials on Graphs of Bounded Treewidth
We consider the multivariate interlace polynomial introduced by Courcelle
(2008), which generalizes several interlace polynomials defined by Arratia,
Bollobas, and Sorkin (2004) and by Aigner and van der Holst (2004). We present
an algorithm to evaluate the multivariate interlace polynomial of a graph with
n vertices given a tree decomposition of the graph of width k. The best
previously known result (Courcelle 2008) employs a general logical framework
and leads to an algorithm with running time f(k)*n, where f(k) is doubly
exponential in k. Analyzing the GF(2)-rank of adjacency matrices in the context
of tree decompositions, we give a faster and more direct algorithm. Our
algorithm uses 2^{3k^2+O(k)}*n arithmetic operations and can be efficiently
implemented in parallel.Comment: v4: Minor error in Lemma 5.5 fixed, Section 6.6 added, minor
improvements. 44 pages, 14 figure
An Efficient Algorithm for Computing Network Reliability in Small Treewidth
We consider the classic problem of Network Reliability. A network is given
together with a source vertex, one or more target vertices, and probabilities
assigned to each of the edges. Each edge appears in the network with its
associated probability and the problem is to determine the probability of
having at least one source-to-target path. This problem is known to be NP-hard.
We present a linear-time fixed-parameter algorithm based on a parameter
called treewidth, which is a measure of tree-likeness of graphs. Network
Reliability was already known to be solvable in polynomial time for bounded
treewidth, but there were no concrete algorithms and the known methods used
complicated structures and were not easy to implement. We provide a
significantly simpler and more intuitive algorithm that is much easier to
implement.
We also report on an implementation of our algorithm and establish the
applicability of our approach by providing experimental results on the graphs
of subway and transit systems of several major cities, such as London and
Tokyo. To the best of our knowledge, this is the first exact algorithm for
Network Reliability that can scale to handle real-world instances of the
problem.Comment: 14 page
Hitting and Harvesting Pumpkins
The "c-pumpkin" is the graph with two vertices linked by c>0 parallel edges.
A c-pumpkin-model in a graph G is a pair A,B of disjoint subsets of vertices of
G, each inducing a connected subgraph of G, such that there are at least c
edges in G between A and B. We focus on covering and packing c-pumpkin-models
in a given graph: On the one hand, we provide an FPT algorithm running in time
2^O(k) n^O(1) deciding, for any fixed c>0, whether all c-pumpkin-models can be
covered by at most k vertices. This generalizes known single-exponential FPT
algorithms for Vertex Cover and Feedback Vertex Set, which correspond to the
cases c=1,2 respectively. On the other hand, we present a O(log
n)-approximation algorithm for both the problems of covering all
c-pumpkin-models with a smallest number of vertices, and packing a maximum
number of vertex-disjoint c-pumpkin-models.Comment: v2: several minor change
Simulating quantum computation by contracting tensor networks
The treewidth of a graph is a useful combinatorial measure of how close the
graph is to a tree. We prove that a quantum circuit with gates whose
underlying graph has treewidth can be simulated deterministically in
time, which, in particular, is polynomial in if
. Among many implications, we show efficient simulations for
log-depth circuits whose gates apply to nearby qubits only, a natural
constraint satisfied by most physical implementations. We also show that
one-way quantum computation of Raussendorf and Briegel (Physical Review
Letters, 86:5188--5191, 2001), a universal quantum computation scheme with
promising physical implementations, can be efficiently simulated by a
randomized algorithm if its quantum resource is derived from a small-treewidth
graph.Comment: 7 figure
Counting Euler Tours in Undirected Bounded Treewidth Graphs
We show that counting Euler tours in undirected bounded tree-width graphs is
tractable even in parallel - by proving a upper bound. This is in
stark contrast to #P-completeness of the same problem in general graphs.
Our main technical contribution is to show how (an instance of) dynamic
programming on bounded \emph{clique-width} graphs can be performed efficiently
in parallel. Thus we show that the sequential result of Espelage, Gurski and
Wanke for efficiently computing Hamiltonian paths in bounded clique-width
graphs can be adapted in the parallel setting to count the number of
Hamiltonian paths which in turn is a tool for counting the number of Euler
tours in bounded tree-width graphs. Our technique also yields parallel
algorithms for counting longest paths and bipartite perfect matchings in
bounded-clique width graphs.
While establishing that counting Euler tours in bounded tree-width graphs can
be computed by non-uniform monotone arithmetic circuits of polynomial degree
(which characterize ) is relatively easy, establishing a uniform
bound needs a careful use of polynomial interpolation.Comment: 17 pages; There was an error in the proof of the GapL upper bound
claimed in the previous version which has been subsequently remove
Hitting forbidden minors: Approximation and Kernelization
We study a general class of problems called F-deletion problems. In an
F-deletion problem, we are asked whether a subset of at most vertices can
be deleted from a graph such that the resulting graph does not contain as a
minor any graph from the family F of forbidden minors.
We obtain a number of algorithmic results on the F-deletion problem when F
contains a planar graph. We give (1) a linear vertex kernel on graphs excluding
-claw , the star with leves, as an induced subgraph, where
is a fixed integer. (2) an approximation algorithm achieving an approximation
ratio of , where is the size of an optimal solution on
general undirected graphs. Finally, we obtain polynomial kernels for the case
when F contains graph as a minor for a fixed integer . The graph
consists of two vertices connected by parallel edges. Even
though this may appear to be a very restricted class of problems it already
encompasses well-studied problems such as {\sc Vertex Cover}, {\sc Feedback
Vertex Set} and Diamond Hitting Set. The generic kernelization algorithm is
based on a non-trivial application of protrusion techniques, previously used
only for problems on topological graph classes
- …