104 research outputs found

    Searching and sweeping graphs: a brief survey

    Get PDF
    This papers surveys some of the work done on trying to capture an intruder in a graph. If the intruder may be located only at vertices, the term searching is employed. If the intruder may be located at vertices or along edges, the term sweeping is employed. There are a wide variety of applications for searching and sweeping. Old results, new results and active research directions are discussed

    Sweeping Graphs and Digraphs

    Get PDF
    Searching a network for an intruder is an interesting and difficult problem. Sweeping is one such search model, in which we "sweep" for intruders along edges. The minimum number of sweepers needed to clear a graph G is known as the sweep number sw(G). The sweep number can be restricted by insisting the sweep be monotonic (once an edge is cleared, it must stay cleared) and connected (new clear edges must be incident with already cleared edges). We will examine several lower bounds for sweep number, among them minimum degree, clique number, chromatic number, and girth. We will make use of several of these bounds to calculate sweep numbers for several infinite families of graphs. In particular, these families will answer some open problems regarding the relationships between the monotonic sweep number, connected sweep number, and monotonic connected sweep number. While sweeping originated in simple graphs, the idea may be easily extended to directed graphs, which allow for four different sweep models. We will examine some interesting non-intuitive sweep numbers and look at relations between these models. We also look at bounds on these sweep numbers on digraphs and tournaments

    Fast Computation of Supertrees for Compatible Phylogenies with Nested Taxa

    Get PDF
    Typically, supertree methods combine a collection of source trees in which just the leaves are labeled by taxa. In such methods the resulting supertree is also leaf labeled. An underlying assumption in these methods is that across all trees in the collection, no two of the taxa are nested; for example, "buttercups" and "plants" are nested taxa. Motivated by Page, the first supertree algorithm for allowing the source trees to collectively have nested taxa is called AncestralBuild. Here, in addition to taxa labeling the leaves, the source trees may have taxa labeling some of their interior nodes. Taxa-labeling interior nodes are at a higher taxonomic level than that of their descendants (for example, genera versus species). Analogous to the supertree method Build for deciding the compatibility of a collection of source trees in which just the leaves are labeled, AncestralBuild is a polynomial-time algorithm for deciding the compatibility of a collection of source trees in which some of the interior nodes are also labeled by taxa. Although a more general method, in this paper we show that the original description of AncestralBuild can be modified so that the running time is as fast as the current fastest running time for Build. Fast computation for deciding compatibility is essential if one is to make use of phylogenetic databases that contain thousands of trees on tens of thousands of taxa. This is particularly so as AncestralBuild is incorporated as a basic tool inside more general supertree methods (that is, methods that always output a tree regardless of the compatibility of the source trees). We apply the method to propose a comprehensive phylogeny of the strepsirrhines, a major group of the primates

    Project scheduling with modular project completion on a bottleneck resource.

    Get PDF
    In this paper, we model a research-and-development project as consisting of several modules, with each module containing one or more activities. We examine how to schedule the activities of such a project in order to maximize the expected profit when the activities have a probability of failure and when an activity’s failure can cause its module and thereby the overall project to fail. A module succeeds when at least one of its constituent activities is successfully executed. All activities are scheduled on a scarce resource that is modeled as a single machine. We describe various policy classes, establish the relationship between the classes, develop exact algorithms to optimize over two different classes (one dynamic program and one branch-and-bound algorithm), and examine the computational performance of the algorithms on two randomly generated instance sets.Scheduling; Uncertainty; Research and development; Activity failures; Modular precedence network;

    Network analysis as applied to a group of AIDS patients linked by sexual contact

    Get PDF
    Thesis (B.S.) in Psychology -- University of Illinois at Urbana-Champaign, 1989.Includes bibliographical references (leaves 51-56).Microfiche of typescript. [Urbana, Ill.]: Photographic Services, University of Illinois, U of I Library, [1989]. 2 microfiches (83 frames): negative.s 1989 ilu n

    Basic Neutrosophic Algebraic Structures and their Application to Fuzzy and Neutrosophic Models

    Get PDF
    The involvement of uncertainty of varying degrees when the total of the membership degree exceeds one or less than one, then the newer mathematical paradigm shift, Fuzzy Theory proves appropriate. For the past two or more decades, Fuzzy Theory has become the potent tool to study and analyze uncertainty involved in all problems. But, many real-world problems also abound with the concept of indeterminacy. In this book, the new, powerful tool of neutrosophy that deals with indeterminacy is utilized. Innovative neutrosophic models are described. The theory of neutrosophic graphs is introduced and applied to fuzzy and neutrosophic models. This book is organized into four chapters. In Chapter One we introduce some of the basic neutrosophic algebraic structures essential for the further development of the other chapters. Chapter Two recalls basic graph theory definitions and results which has interested us and for which we give the neutrosophic analogues. In this chapter we give the application of graphs in fuzzy models. An entire section is devoted for this purpose. Chapter Three introduces many new neutrosophic concepts in graphs and applies it to the case of neutrosophic cognitive maps and neutrosophic relational maps. The last section of this chapter clearly illustrates how the neutrosophic graphs are utilized in the neutrosophic models. The final chapter gives some problems about neutrosophic graphs which will make one understand this new subject.Comment: 149 pages, 130 figure

    The Discrete Acyclic Digraph Markov Model in Data Mining

    Get PDF
    Graphical Markov models are a powerful tool for the description of complex interactions between the variables of a domain. They provide a succinct description of the joint distribution of the variables. This feature has led to the most successful application of graphical Markov models, that is as the core component of probabilistic expert systems. The fascinating theory behind this type of models arises from three different disciplines, viz., Statistics, Graph Theory and Artificial Intelligence. This interdisciplinary origin has given rich insight from different perspectives. There are two main ways to find the qualitative structure of graphical Markov models. Either the structure is specified by a domain expert or ``structural learning'' is applied, i.e., the structure is automatically recovered from data. For structural learning, one has to compare how well different models describe the data. This is easy for, e.g., acyclic digraph Markov models. However, structural learning is still a hard problem because the number of possible models grows exponentially with the number of variables. The main contributions of this thesis are as follows. Firstly, a new class of graphical Markov models, called TCI models, is introduced. These models can be represented by labeled trees and form the intersection of two previously well-known classes. Secondly, the inclusion order of graphical Markov models is studied. From this study, two new learning algorithms are derived. One for heuristic search and the other for the Markov Chain Monte Carlo Method. Both algorithms improve the results of previous approaches without compromising the computational cost of the learning process. Finally, new diagnostics for convergence assessment of the Markov Chain Monte Carlo Method in structural learning are introduced. The results of this thesis are illustrated using both synthetic and real world datasets

    Space-Efficient Algorithms and Verification Schemes for Graph Streams

    Get PDF
    Structured data-sets are often easy to represent using graphs. The prevalence of massive data-sets in the modern world gives rise to big graphs such as web graphs, social networks, biological networks, and citation graphs. Most of these graphs keep growing continuously and pose two major challenges in their processing: (a) it is infeasible to store them entirely in the memory of a regular server, and (b) even if stored entirely, it is incredibly inefficient to reread the whole graph every time a new query appears. Thus, a natural approach for efficiently processing and analyzing such graphs is reading them as a stream of edge insertions and deletions and maintaining a summary that can be (a) stored in affordable memory (significantly smaller than the input size) and (b) used to detect properties of the original graph. In this thesis, we explore the strengths and limitations of such graph streaming algorithms under three main paradigms: classical or standard streaming, adversarially robust streaming, and streaming verification. In the classical streaming model, an algorithm needs to process an adversarially chosen input stream using space sublinear in the input size and return a desired output at the end of the stream. Here, we study a collection of fundamental directed graph problems like reachability, acyclicity testing, and topological sorting. Our investigation reveals that while most problems are provably hard for general digraphs, they admit efficient algorithms for the special and widely-studied subclass of tournament graphs. Further, we exhibit certain problems that become drastically easier when the stream elements arrive in random order rather than adversarial order, as well as problems that do not get much easier even under this relaxation. Furthermore, we study the graph coloring problem in this model and design color-efficient algorithms using novel parameterizations and establish complexity separations between different versions of the problem. The classical streaming setting assumes that the entire input stream is fixed by an adversary before the algorithm reads it. Many randomized algorithms in this setting, however, fail when the stream is extended by an adaptive adversary based on past outputs received. This is the so-called adversarially robust streaming model. We show that graph coloring is significantly harder in the robust setting than in the classical setting, thus establishing the first such separation for a ``natural\u27\u27 problem. We also design a class of efficient robust coloring algorithms using novel techniques. In classical streaming, many important problems turn out to be ``intractable\u27\u27, i.e., provably impossible to solve in sublinear space. It is then natural to consider an enhanced streaming setting where a space-bounded client outsources the computation to a space-unbounded but untrusted cloud service, who replies with the solution and a supporting ``proof\u27\u27 that the client needs to verify. This is called streaming verification or the annotated streaming model. It allows algorithms or verification schemes for the otherwise intractable problems using both space and proof length sublinear in the input size. We devise efficient schemes that improve upon the state of the art for a variety of fundamental graph problems including triangle counting, maximum matching, topological sorting, maximal independent set, graph connectivity, and shortest paths, as well as for computing frequency-based functions such as distinct items and maximum frequency, which have broad applications in graph streaming. Some of our schemes were conjectured to be impossible, while some others attain smooth and optimal tradeoffs between space and communication costs

    36th International Symposium on Theoretical Aspects of Computer Science: STACS 2019, March 13-16, 2019, Berlin, Germany

    Get PDF
    corecore