536,792 research outputs found
Perfect 1-factorisations of circulants with small degree
A 1-factorisation of a graph G is a decomposition of G into edge-disjoint 1-factors (perfect matchings), and a perfect 1-factorisation is a 1-factorisation in which the union of any two of the 1-factors is a Hamilton cycle. We consider the problem of the existence of perfect 1-factorisations of even order circulant graphs with small degree. In particular, we characterise the 3-regular circulant graphs that admit a perfect 1-factorisation and we solve the existence problem for a large family of 4-regular circulants. Results of computer searches for perfect 1-factorisations of 4-regular circulant graphs of orders up to 30 are provided and some problems are posed
Epidemic Spreading with External Agents
We study epidemic spreading processes in large networks, when the spread is
assisted by a small number of external agents: infection sources with bounded
spreading power, but whose movement is unrestricted vis-\`a-vis the underlying
network topology. For networks which are `spatially constrained', we show that
the spread of infection can be significantly speeded up even by a few such
external agents infecting randomly. Moreover, for general networks, we derive
upper-bounds on the order of the spreading time achieved by certain simple
(random/greedy) external-spreading policies. Conversely, for certain common
classes of networks such as line graphs, grids and random geometric graphs, we
also derive lower bounds on the order of the spreading time over all
(potentially network-state aware and adversarial) external-spreading policies;
these adversarial lower bounds match (up to logarithmic factors) the spreading
time achieved by an external agent with a random spreading policy. This
demonstrates that random, state-oblivious infection-spreading by an external
agent is in fact order-wise optimal for spreading in such spatially constrained
networks
Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs
Consider the following problem. A seller has infinite copies of products
represented by nodes in a graph. There are consumers, each has a budget and
wants to buy two products. Consumers are represented by weighted edges. Given
the prices of products, each consumer will buy both products she wants, at the
given price, if she can afford to. Our objective is to help the seller price
the products to maximize her profit.
This problem is called {\em graph vertex pricing} ({\sf GVP}) problem and has
resisted several recent attempts despite its current simple solution. This
motivates the study of this problem on special classes of graphs. In this
paper, we study this problem on a large class of graphs such as graphs with
bounded treewidth, bounded genus and -partite graphs.
We show that there exists an {\sf FPTAS} for {\sf GVP} on graphs with bounded
treewidth. This result is also extended to an {\sf FPTAS} for the more general
{\em single-minded pricing} problem. On bounded genus graphs we present a {\sf
PTAS} and show that {\sf GVP} is {\sf NP}-hard even on planar graphs.
We study the Sherali-Adams hierarchy applied to a natural Integer Program
formulation that -approximates the optimal solution of {\sf GVP}.
Sherali-Adams hierarchy has gained much interest recently as a possible
approach to develop new approximation algorithms. We show that, when the input
graph has bounded treewidth or bounded genus, applying a constant number of
rounds of Sherali-Adams hierarchy makes the integrality gap of this natural
{\sf LP} arbitrarily small, thus giving a -approximate solution
to the original {\sf GVP} instance.
On -partite graphs, we present a constant-factor approximation algorithm.
We further improve the approximation factors for paths, cycles and graphs with
degree at most three.Comment: Preprint of the paper to appear in Chicago Journal of Theoretical
Computer Scienc
Adversarially Robust Submodular Maximization under Knapsack Constraints
We propose the first adversarially robust algorithm for monotone submodular
maximization under single and multiple knapsack constraints with scalable
implementations in distributed and streaming settings. For a single knapsack
constraint, our algorithm outputs a robust summary of almost optimal (up to
polylogarithmic factors) size, from which a constant-factor approximation to
the optimal solution can be constructed. For multiple knapsack constraints, our
approximation is within a constant-factor of the best known non-robust
solution.
We evaluate the performance of our algorithms by comparison to natural
robustifications of existing non-robust algorithms under two objectives: 1)
dominating set for large social network graphs from Facebook and Twitter
collected by the Stanford Network Analysis Project (SNAP), 2) movie
recommendations on a dataset from MovieLens. Experimental results show that our
algorithms give the best objective for a majority of the inputs and show strong
performance even compared to offline algorithms that are given the set of
removals in advance.Comment: To appear in KDD 201
Graphs and Number Theory.
In the 1930\u27s, L. Redei and H. Reichardt used certain matrices to aid in the determination of the structure of ideal class groups of quadratic number fields. This is a classical number theoretic problem which in general presents diffculties. Ideal class groups are finite abelian groups, and it is a result of Gauss that allows us to determine their 2-rank, in other words the number of cyclic factors of even order. Redei and Reichardt worked on determining the 4-rank, the number of factors of order divisible by 4. Later, the classical study of circulant graphs was utilized to further help this determination. In particular, if we relate a certain circulant graph G to a quadratic number field, then the number of Eulerian Vertex Decompositions of G is closely related to the 4-rank of the ideal class group of the quadratic number field. Circulant graphs however become large rather quickly. Recently, P. E. Conner and J. Hurrelbrink developed the concept of quotient graphs. These are significantly smaller graphs, yet by analyzing their structure, one can determine much of the same number theoretic information, including the 4-rank of the ideal class group of the related quadratic number field, as one can from the underlying circulant graph. Formal quotient graphs are a generalization of quotient graphs and are a useful tool in determining how many graphs on a given number of vertices can be realized as quotient graphs. In Chapter 1, we develop the background information on circulant graphs and explore their structure. We then utilize circulant graphs in Chapter 2 with the development of quotient graphs. In this chapter we determine exactly which graphs on 2, 3, 4, 5 and 7 vertices are quotient graphs. Finally in Chapter 3, we develop the concept of formal quotient graphs as a generalization of quotient graphs. By analyzing the general situation, we are able to count how many formal quotient graphs there are on 11, 13, 17 and 19 vertices and realize many of these graphs as actual quotient graphs
On the push&pull protocol for rumour spreading
The asynchronous push&pull protocol, a randomized distributed algorithm for
spreading a rumour in a graph , works as follows. Independent Poisson clocks
of rate 1 are associated with the vertices of . Initially, one vertex of
knows the rumour. Whenever the clock of a vertex rings, it calls a random
neighbour : if knows the rumour and does not, then tells the
rumour (a push operation), and if does not know the rumour and knows
it, tells the rumour (a pull operation). The average spread time of
is the expected time it takes for all vertices to know the rumour, and the
guaranteed spread time of is the smallest time such that with
probability at least , after time all vertices know the rumour. The
synchronous variant of this protocol, in which each clock rings precisely at
times , has been studied extensively. We prove the following results
for any -vertex graph: In either version, the average spread time is at most
linear even if only the pull operation is used, and the guaranteed spread time
is within a logarithmic factor of the average spread time, so it is . In the asynchronous version, both the average and guaranteed spread times
are . We give examples of graphs illustrating that these bounds
are best possible up to constant factors. We also prove theoretical
relationships between the guaranteed spread times in the two versions. Firstly,
in all graphs the guaranteed spread time in the asynchronous version is within
an factor of that in the synchronous version, and this is tight.
Next, we find examples of graphs whose asynchronous spread times are
logarithmic, but the synchronous versions are polynomially large. Finally, we
show for any graph that the ratio of the synchronous spread time to the
asynchronous spread time is .Comment: 25 page
Suboptimality of local algorithms for a class of max-cut problems
We show that in random K -uniform hypergraphs of constant average degree, for even K ≥ 4 , local algorithms defined as factors of i.i.d. can not find nearly maximal cuts, when the average degree is sufficiently large. These algorithms have been used frequently to obtain lower bounds for the max-cut problem on random graphs, but it was not known whether they could be successful in finding nearly maximal cuts. This result follows from the fact that the overlap of any two nearly maximal cuts in such hypergraphs does not take values in a certain nontrivial interval—a phenomenon referred to as the overlap gap property—which is proved by comparing diluted models with large average degree with appropriate fully connected spin glass models and showing the overlap gap property in the latter setting
- …