164 research outputs found

    Computing minimum distortion embeddings into a path for bipartite permutation graphs and threshold graphs

    Get PDF
    AbstractThe problem of computing minimum distortion embeddings of a given graph into a line (path) was introduced in 2004 and has quickly attracted significant attention with subsequent results appearing at recent stoc and soda conferences. So far, all such results concern approximation algorithms or exponential-time exact algorithms. We give the first polynomial-time algorithms for computing minimum distortion embeddings of graphs into a path when the input graphs belong to specific graph classes. In particular, we solve this problem in polynomial time for bipartite permutation graphs and threshold graphs. For both graph classes, the distortion can be arbitrarily large. The graphs that we consider are unweighted

    Line-distortion, Bandwidth and Path-length of a graph

    Full text link
    We investigate the minimum line-distortion and the minimum bandwidth problems on unweighted graphs and their relations with the minimum length of a Robertson-Seymour's path-decomposition. The length of a path-decomposition of a graph is the largest diameter of a bag in the decomposition. The path-length of a graph is the minimum length over all its path-decompositions. In particular, we show: - if a graph GG can be embedded into the line with distortion kk, then GG admits a Robertson-Seymour's path-decomposition with bags of diameter at most kk in GG; - for every class of graphs with path-length bounded by a constant, there exist an efficient constant-factor approximation algorithm for the minimum line-distortion problem and an efficient constant-factor approximation algorithm for the minimum bandwidth problem; - there is an efficient 2-approximation algorithm for computing the path-length of an arbitrary graph; - AT-free graphs and some intersection families of graphs have path-length at most 2; - for AT-free graphs, there exist a linear time 8-approximation algorithm for the minimum line-distortion problem and a linear time 4-approximation algorithm for the minimum bandwidth problem

    08431 Abstracts Collection -- Moderately Exponential Time Algorithms

    Get PDF
    From 19/10/200819/10/2008 to 24/10/200824/10/2008, the Dagstuhl Seminar 08431 ``Moderately Exponential Time Algorithms \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available

    Sublinear Distance Labeling

    Get PDF
    A distance labeling scheme labels the nn nodes of a graph with binary strings such that, given the labels of any two nodes, one can determine the distance in the graph between the two nodes by looking only at the labels. A DD-preserving distance labeling scheme only returns precise distances between pairs of nodes that are at distance at least DD from each other. In this paper we consider distance labeling schemes for the classical case of unweighted graphs with both directed and undirected edges. We present a O(nDlog2D)O(\frac{n}{D}\log^2 D) bit DD-preserving distance labeling scheme, improving the previous bound by Bollob\'as et. al. [SIAM J. Discrete Math. 2005]. We also give an almost matching lower bound of Ω(nD)\Omega(\frac{n}{D}). With our DD-preserving distance labeling scheme as a building block, we additionally achieve the following results: 1. We present the first distance labeling scheme of size o(n)o(n) for sparse graphs (and hence bounded degree graphs). This addresses an open problem by Gavoille et. al. [J. Algo. 2004], hereby separating the complexity from distance labeling in general graphs which require Ω(n)\Omega(n) bits, Moon [Proc. of Glasgow Math. Association 1965]. 2. For approximate rr-additive labeling schemes, that return distances within an additive error of rr we show a scheme of size O(nrpolylog(rlogn)logn)O\left ( \frac{n}{r} \cdot\frac{\operatorname{polylog} (r\log n)}{\log n} \right ) for r2r \ge 2. This improves on the current best bound of O(nr)O\left(\frac{n}{r}\right) by Alstrup et. al. [SODA 2016] for sub-polynomial rr, and is a generalization of a result by Gawrychowski et al. [arXiv preprint 2015] who showed this for r=2r=2.Comment: A preliminary version of this paper appeared at ESA'1

    Online Duet between Metric Embeddings and Minimum-Weight Perfect Matchings

    Full text link
    Low-distortional metric embeddings are a crucial component in the modern algorithmic toolkit. In an online metric embedding, points arrive sequentially and the goal is to embed them into a simple space irrevocably, while minimizing the distortion. Our first result is a deterministic online embedding of a general metric into Euclidean space with distortion O(logn)min{logΦ,n}O(\log n)\cdot\min\{\sqrt{\log\Phi},\sqrt{n}\} (or, O(d)min{logΦ,n}O(d)\cdot\min\{\sqrt{\log\Phi},\sqrt{n}\} if the metric has doubling dimension dd), solving a conjecture by Newman and Rabinovich (2020), and quadratically improving the dependence on the aspect ratio Φ\Phi from Indyk et al.\ (2010). Our second result is a stochastic embedding of a metric space into trees with expected distortion O(dlogΦ)O(d\cdot \log\Phi), generalizing previous results (Indyk et al.\ (2010), Bartal et al.\ (2020)). Next, we study the \emph{online minimum-weight perfect matching} problem, where a sequence of 2n2n metric points arrive in pairs, and one has to maintain a perfect matching at all times. We allow recourse (as otherwise the order of arrival determines the matching). The goal is to return a perfect matching that approximates the \emph{minimum-weight} perfect matching at all times, while minimizing the recourse. Our third result is a randomized algorithm with competitive ratio O(dlogΦ)O(d\cdot \log \Phi) and recourse O(logΦ)O(\log \Phi) against an oblivious adversary, this result is obtained via our new stochastic online embedding. Our fourth result is a deterministic algorithm against an adaptive adversary, using O(log2n)O(\log^2 n) recourse, that maintains a matching of weight at most O(logn)O(\log n) times the weight of the MST, i.e., a matching of lightness O(logn)O(\log n). We complement our upper bounds with a strategy for an oblivious adversary that, with recourse rr, establishes a lower bound of Ω(lognrlogr)\Omega(\frac{\log n}{r \log r}) for both competitive ratio and lightness.Comment: 53 pages, 8 figures, to be presented at the ACM-SIAM Symposium on Discrete Algorithms (SODA24

    Combinatorial Optimization

    Get PDF
    This report summarizes the meeting on Combinatorial Optimization where new and promising developments in the field were discussed. Th

    Learning loopy graphical models with latent variables: Efficient methods and guarantees

    Get PDF
    The problem of structure estimation in graphical models with latent variables is considered. We characterize conditions for tractable graph estimation and develop efficient methods with provable guarantees. We consider models where the underlying Markov graph is locally tree-like, and the model is in the regime of correlation decay. For the special case of the Ising model, the number of samples nn required for structural consistency of our method scales as n=Ω(θminδη(η+1)2logp)n=\Omega(\theta_{\min}^{-\delta\eta(\eta+1)-2}\log p), where p is the number of variables, θmin\theta_{\min} is the minimum edge potential, δ\delta is the depth (i.e., distance from a hidden node to the nearest observed nodes), and η\eta is a parameter which depends on the bounds on node and edge potentials in the Ising model. Necessary conditions for structural consistency under any algorithm are derived and our method nearly matches the lower bound on sample requirements. Further, the proposed method is practical to implement and provides flexibility to control the number of latent variables and the cycle lengths in the output graph.Comment: Published in at http://dx.doi.org/10.1214/12-AOS1070 the Annals of Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical Statistics (http://www.imstat.org
    corecore