4,396 research outputs found
On clique‐inverse graphs of graphs with bounded clique number
The clique graph K(G) of G is the intersection graph of the family of maximal cliques of G. For a family F of graphs, the family of clique-inverse graphs of F, denoted by K−1(F), is defined as K−1(F) = {H|K(H) ∈ F}. Let F p be the family of Kp-free graphs, that is, graphs with clique number at most p − 1, for an integer constant p ≥ 2. Deciding whether a graph H is a clique-inverse graph of F p can be done in polynomial time; in addition, for p ∈ {2, 3, 4}, K − 1 (Fp) can be characterized by a finite family of forbidden induced subgraphs. In Protti and Szwarcfiter, the authors propose to extend such characterizations to higher values of p. Then a natural question arises: Is there a characterization of K − 1 (Fp) by means of a finite family of forbidden induced subgraphs, for any p ≥ 2? In this note we give a positive answer to this question. We present upper bounds for the order, the clique number, and the stability number of every forbidden induced subgraph for K − 1 (Fp) in terms of p.Facultad de Ciencias Exacta
The 0-1 inverse maximum stable set problem
Given an instance of a weighted combinatorial optimization problem and its feasible solution, the usual inverse problem is to modify as little as possible (with respect to a fixed norm) the given weight system to make the giiven feasible solution optimal. We focus on its 0-1 version, which is to modify as little as possible the structure of the given instance so that the fixed solution becomes optimal in the new instance. In this paper, we consider the 0-1 inverse maximum stable set problem against a specific (optimal or not) algorithm, which is to delete as few vertices as possible so that the fixed stable set S* can be returned as a solution by the given algorithm in the new instance. Firstly, we study the hardness and approximation results of the 0-1 inverse maximum stable set problem against the algorithms. Greedy and 2-opt. Secondly, we identify classes of graphs for which the 0-1 inverse maximum stable set problem can be polynomially solvable. We prove the tractability of the problem for several classes of perfect graphs such as comparability graphs and chordal graphs.Combinatorial inverse optimization, maximum stable set problem, NP-hardness, performance ratio, perfect graphs.
Fly-automata for checking MSO 2 graph properties
A more descriptive but too long title would be : Constructing fly-automata to
check properties of graphs of bounded tree-width expressed by monadic
second-order formulas written with edge quantifications. Such properties are
called MSO2 in short. Fly-automata (FA) run bottom-up on terms denoting graphs
and compute "on the fly" the necessary states and transitions instead of
looking into huge, actually unimplementable tables. In previous works, we have
constructed FA that process terms denoting graphs of bounded clique-width, in
order to check their monadic second-order (MSO) properties (expressed by
formulas without edge quan-tifications). Here, we adapt these FA to incidence
graphs, so that they can check MSO2 properties of graphs of bounded tree-width.
This is possible because: (1) an MSO2 property of a graph is nothing but an MSO
property of its incidence graph and (2) the clique-width of the incidence graph
of a graph is linearly bounded in terms of its tree-width. Our constructions
are actually implementable and usable. We detail concrete constructions of
automata in this perspective.Comment: Submitted for publication in December 201
Algorithmic Complexity of Power Law Networks
It was experimentally observed that the majority of real-world networks
follow power law degree distribution. The aim of this paper is to study the
algorithmic complexity of such "typical" networks. The contribution of this
work is twofold.
First, we define a deterministic condition for checking whether a graph has a
power law degree distribution and experimentally validate it on real-world
networks. This definition allows us to derive interesting properties of power
law networks. We observe that for exponents of the degree distribution in the
range such networks exhibit double power law phenomenon that was
observed for several real-world networks. Our observation indicates that this
phenomenon could be explained by just pure graph theoretical properties.
The second aim of our work is to give a novel theoretical explanation why
many algorithms run faster on real-world data than what is predicted by
algorithmic worst-case analysis. We show how to exploit the power law degree
distribution to design faster algorithms for a number of classical P-time
problems including transitive closure, maximum matching, determinant, PageRank
and matrix inverse. Moreover, we deal with the problems of counting triangles
and finding maximum clique. Previously, it has been only shown that these
problems can be solved very efficiently on power law graphs when these graphs
are random, e.g., drawn at random from some distribution. However, it is
unclear how to relate such a theoretical analysis to real-world graphs, which
are fixed. Instead of that, we show that the randomness assumption can be
replaced with a simple condition on the degrees of adjacent vertices, which can
be used to obtain similar results. As a result, in some range of power law
exponents, we are able to solve the maximum clique problem in polynomial time,
although in general power law networks the problem is NP-complete
Computations by fly-automata beyond monadic second-order logic
We present logically based methods for constructing XP and FPT graph
algorithms, parametrized by tree-width or clique-width. We will use
fly-automata introduced in a previous article. They make possible to check
properties that are not monadic second-order expressible because their states
may include counters, so that their sets of states may be infinite. We equip
these automata with output functions, so that they can compute values
associated with terms or graphs. Rather than new algorithmic results we present
tools for constructing easily certain dynamic programming algorithms by
combining predefined automata for basic functions and properties.Comment: Accepted for publication in Theoretical Computer Scienc
Structure estimation for discrete graphical models: Generalized covariance matrices and their inverses
We investigate the relationship between the structure of a discrete graphical
model and the support of the inverse of a generalized covariance matrix. We
show that for certain graph structures, the support of the inverse covariance
matrix of indicator variables on the vertices of a graph reflects the
conditional independence structure of the graph. Our work extends results that
have previously been established only in the context of multivariate Gaussian
graphical models, thereby addressing an open question about the significance of
the inverse covariance matrix of a non-Gaussian distribution. The proof
exploits a combination of ideas from the geometry of exponential families,
junction tree theory and convex analysis. These population-level results have
various consequences for graph selection methods, both known and novel,
including a novel method for structure estimation for missing or corrupted
observations. We provide nonasymptotic guarantees for such methods and
illustrate the sharpness of these predictions via simulations.Comment: Published in at http://dx.doi.org/10.1214/13-AOS1162 the Annals of
Statistics (http://www.imstat.org/aos/) by the Institute of Mathematical
Statistics (http://www.imstat.org
- …