536,792 research outputs found

    Perfect 1-factorisations of circulants with small degree

    Get PDF
    A 1-factorisation of a graph G is a decomposition of G into edge-disjoint 1-factors (perfect matchings), and a perfect 1-factorisation is a 1-factorisation in which the union of any two of the 1-factors is a Hamilton cycle. We consider the problem of the existence of perfect 1-factorisations of even order circulant graphs with small degree. In particular, we characterise the 3-regular circulant graphs that admit a perfect 1-factorisation and we solve the existence problem for a large family of 4-regular circulants. Results of computer searches for perfect 1-factorisations of 4-regular circulant graphs of orders up to 30 are provided and some problems are posed

    Epidemic Spreading with External Agents

    Full text link
    We study epidemic spreading processes in large networks, when the spread is assisted by a small number of external agents: infection sources with bounded spreading power, but whose movement is unrestricted vis-\`a-vis the underlying network topology. For networks which are `spatially constrained', we show that the spread of infection can be significantly speeded up even by a few such external agents infecting randomly. Moreover, for general networks, we derive upper-bounds on the order of the spreading time achieved by certain simple (random/greedy) external-spreading policies. Conversely, for certain common classes of networks such as line graphs, grids and random geometric graphs, we also derive lower bounds on the order of the spreading time over all (potentially network-state aware and adversarial) external-spreading policies; these adversarial lower bounds match (up to logarithmic factors) the spreading time achieved by an external agent with a random spreading policy. This demonstrates that random, state-oblivious infection-spreading by an external agent is in fact order-wise optimal for spreading in such spatially constrained networks

    Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs

    Full text link
    Consider the following problem. A seller has infinite copies of nn products represented by nodes in a graph. There are mm consumers, each has a budget and wants to buy two products. Consumers are represented by weighted edges. Given the prices of products, each consumer will buy both products she wants, at the given price, if she can afford to. Our objective is to help the seller price the products to maximize her profit. This problem is called {\em graph vertex pricing} ({\sf GVP}) problem and has resisted several recent attempts despite its current simple solution. This motivates the study of this problem on special classes of graphs. In this paper, we study this problem on a large class of graphs such as graphs with bounded treewidth, bounded genus and kk-partite graphs. We show that there exists an {\sf FPTAS} for {\sf GVP} on graphs with bounded treewidth. This result is also extended to an {\sf FPTAS} for the more general {\em single-minded pricing} problem. On bounded genus graphs we present a {\sf PTAS} and show that {\sf GVP} is {\sf NP}-hard even on planar graphs. We study the Sherali-Adams hierarchy applied to a natural Integer Program formulation that (1+ϵ)(1+\epsilon)-approximates the optimal solution of {\sf GVP}. Sherali-Adams hierarchy has gained much interest recently as a possible approach to develop new approximation algorithms. We show that, when the input graph has bounded treewidth or bounded genus, applying a constant number of rounds of Sherali-Adams hierarchy makes the integrality gap of this natural {\sf LP} arbitrarily small, thus giving a (1+ϵ)(1+\epsilon)-approximate solution to the original {\sf GVP} instance. On kk-partite graphs, we present a constant-factor approximation algorithm. We further improve the approximation factors for paths, cycles and graphs with degree at most three.Comment: Preprint of the paper to appear in Chicago Journal of Theoretical Computer Scienc

    Adversarially Robust Submodular Maximization under Knapsack Constraints

    Full text link
    We propose the first adversarially robust algorithm for monotone submodular maximization under single and multiple knapsack constraints with scalable implementations in distributed and streaming settings. For a single knapsack constraint, our algorithm outputs a robust summary of almost optimal (up to polylogarithmic factors) size, from which a constant-factor approximation to the optimal solution can be constructed. For multiple knapsack constraints, our approximation is within a constant-factor of the best known non-robust solution. We evaluate the performance of our algorithms by comparison to natural robustifications of existing non-robust algorithms under two objectives: 1) dominating set for large social network graphs from Facebook and Twitter collected by the Stanford Network Analysis Project (SNAP), 2) movie recommendations on a dataset from MovieLens. Experimental results show that our algorithms give the best objective for a majority of the inputs and show strong performance even compared to offline algorithms that are given the set of removals in advance.Comment: To appear in KDD 201

    Graphs and Number Theory.

    Get PDF
    In the 1930\u27s, L. Redei and H. Reichardt used certain matrices to aid in the determination of the structure of ideal class groups of quadratic number fields. This is a classical number theoretic problem which in general presents diffculties. Ideal class groups are finite abelian groups, and it is a result of Gauss that allows us to determine their 2-rank, in other words the number of cyclic factors of even order. Redei and Reichardt worked on determining the 4-rank, the number of factors of order divisible by 4. Later, the classical study of circulant graphs was utilized to further help this determination. In particular, if we relate a certain circulant graph G to a quadratic number field, then the number of Eulerian Vertex Decompositions of G is closely related to the 4-rank of the ideal class group of the quadratic number field. Circulant graphs however become large rather quickly. Recently, P. E. Conner and J. Hurrelbrink developed the concept of quotient graphs. These are significantly smaller graphs, yet by analyzing their structure, one can determine much of the same number theoretic information, including the 4-rank of the ideal class group of the related quadratic number field, as one can from the underlying circulant graph. Formal quotient graphs are a generalization of quotient graphs and are a useful tool in determining how many graphs on a given number of vertices can be realized as quotient graphs. In Chapter 1, we develop the background information on circulant graphs and explore their structure. We then utilize circulant graphs in Chapter 2 with the development of quotient graphs. In this chapter we determine exactly which graphs on 2, 3, 4, 5 and 7 vertices are quotient graphs. Finally in Chapter 3, we develop the concept of formal quotient graphs as a generalization of quotient graphs. By analyzing the general situation, we are able to count how many formal quotient graphs there are on 11, 13, 17 and 19 vertices and realize many of these graphs as actual quotient graphs

    On the push&pull protocol for rumour spreading

    Full text link
    The asynchronous push&pull protocol, a randomized distributed algorithm for spreading a rumour in a graph GG, works as follows. Independent Poisson clocks of rate 1 are associated with the vertices of GG. Initially, one vertex of GG knows the rumour. Whenever the clock of a vertex xx rings, it calls a random neighbour yy: if xx knows the rumour and yy does not, then xx tells yy the rumour (a push operation), and if xx does not know the rumour and yy knows it, yy tells xx the rumour (a pull operation). The average spread time of GG is the expected time it takes for all vertices to know the rumour, and the guaranteed spread time of GG is the smallest time tt such that with probability at least 11/n1-1/n, after time tt all vertices know the rumour. The synchronous variant of this protocol, in which each clock rings precisely at times 1,2,1,2,\dots, has been studied extensively. We prove the following results for any nn-vertex graph: In either version, the average spread time is at most linear even if only the pull operation is used, and the guaranteed spread time is within a logarithmic factor of the average spread time, so it is O(nlogn)O(n\log n). In the asynchronous version, both the average and guaranteed spread times are Ω(logn)\Omega(\log n). We give examples of graphs illustrating that these bounds are best possible up to constant factors. We also prove theoretical relationships between the guaranteed spread times in the two versions. Firstly, in all graphs the guaranteed spread time in the asynchronous version is within an O(logn)O(\log n) factor of that in the synchronous version, and this is tight. Next, we find examples of graphs whose asynchronous spread times are logarithmic, but the synchronous versions are polynomially large. Finally, we show for any graph that the ratio of the synchronous spread time to the asynchronous spread time is O(n2/3)O(n^{2/3}).Comment: 25 page

    Suboptimality of local algorithms for a class of max-cut problems

    Get PDF
    We show that in random K -uniform hypergraphs of constant average degree, for even K ≥ 4 , local algorithms defined as factors of i.i.d. can not find nearly maximal cuts, when the average degree is sufficiently large. These algorithms have been used frequently to obtain lower bounds for the max-cut problem on random graphs, but it was not known whether they could be successful in finding nearly maximal cuts. This result follows from the fact that the overlap of any two nearly maximal cuts in such hypergraphs does not take values in a certain nontrivial interval—a phenomenon referred to as the overlap gap property—which is proved by comparing diluted models with large average degree with appropriate fully connected spin glass models and showing the overlap gap property in the latter setting
    corecore