24,573 research outputs found
On the Size and the Approximability of Minimum Temporally Connected Subgraphs
We consider temporal graphs with discrete time labels and investigate the
size and the approximability of minimum temporally connected spanning
subgraphs. We present a family of minimally connected temporal graphs with
vertices and edges, thus resolving an open question of (Kempe,
Kleinberg, Kumar, JCSS 64, 2002) about the existence of sparse temporal
connectivity certificates. Next, we consider the problem of computing a minimum
weight subset of temporal edges that preserve connectivity of a given temporal
graph either from a given vertex r (r-MTC problem) or among all vertex pairs
(MTC problem). We show that the approximability of r-MTC is closely related to
the approximability of Directed Steiner Tree and that r-MTC can be solved in
polynomial time if the underlying graph has bounded treewidth. We also show
that the best approximation ratio for MTC is at least and at most , for
any constant , where is the number of temporal edges and
is the maximum degree of the underlying graph. Furthermore, we prove
that the unweighted version of MTC is APX-hard and that MTC is efficiently
solvable in trees and -approximable in cycles
Critical Ising model and spanning trees partition functions
We prove that the squared partition function of the two-dimensional critical
Ising model defined on a finite, isoradial graph , is equal to
times the partition function of spanning trees of the graph
, where is the graph extended along the boundary; edges
of are assigned Kenyon's [Ken02] critical weights, and boundary edges of
have specific weights. The proof is an explicit construction,
providing a new relation on the level of configurations between two classical,
critical models of statistical mechanics.Comment: 38 pages, 26 figure
Max-Leaves Spanning Tree is APX-hard for Cubic Graphs
We consider the problem of finding a spanning tree with maximum number of
leaves (MaxLeaf). A 2-approximation algorithm is known for this problem, and a
3/2-approximation algorithm when restricted to graphs where every vertex has
degree 3 (cubic graphs). MaxLeaf is known to be APX-hard in general, and
NP-hard for cubic graphs. We show that the problem is also APX-hard for cubic
graphs. The APX-hardness of the related problem Minimum Connected Dominating
Set for cubic graphs follows
Deterministically Isolating a Perfect Matching in Bipartite Planar Graphs
We present a deterministic way of assigning small (log bit) weights to the
edges of a bipartite planar graph so that the minimum weight perfect matching
becomes unique. The isolation lemma as described in (Mulmuley et al. 1987)
achieves the same for general graphs using a randomized weighting scheme,
whereas we can do it deterministically when restricted to bipartite planar
graphs. As a consequence, we reduce both decision and construction versions of
the matching problem to testing whether a matrix is singular, under the promise
that its determinant is 0 or 1, thus obtaining a highly parallel SPL algorithm
for bipartite planar graphs. This improves the earlier known bounds of
non-uniform SPL by (Allender et al. 1999) and by (Miller and Naor 1995,
Mahajan and Varadarajan 2000). It also rekindles the hope of obtaining a
deterministic parallel algorithm for constructing a perfect matching in
non-bipartite planar graphs, which has been open for a long time. Our
techniques are elementary and simple
Extended Dijkstra algorithm and Moore-Bellman-Ford algorithm
Study the general single-source shortest path problem. Firstly, define a path
function on a set of some path with same source on a graph, and develop a kind
of general single-source shortest path problem (GSSSP) on the defined path
function. Secondly, following respectively the approaches of the well known
Dijkstra's algorithm and Moore-Bellman-Ford algorithm, design an extended
Dijkstra's algorithm (EDA) and an extended Moore-Bellman-Ford algorithm (EMBFA)
to solve the problem GSSSP under certain given conditions. Thirdly, introduce a
few concepts, such as order-preserving in last road (OPLR) of path function,
and so on. And under the assumption that the value of related path function for
any path can be obtained in time, prove respectively the algorithm EDA
solving the problem GSSSP in time and the algorithm EMBFA solving
the problem GSSSP in time. Finally, some applications of the
designed algorithms are shown with a few examples. What we done can improve
both the researchers and the applications of the shortest path theory.Comment: 25 page
Trees and Matchings
In this article, Temperley's bijection between spanning trees of the square
grid on the one hand, and perfect matchings (also known as dimer coverings) of
the square grid on the other, is extended to the setting of general planar
directed (and undirected) graphs, where edges carry nonnegative weights that
induce a weighting on the set of spanning trees. We show that the weighted,
directed spanning trees (often called arborescences) of any planar graph G can
be put into a one-to-one weight-preserving correspondence with the perfect
matchings of a related planar graph H.
One special case of this result is a bijection between perfect matchings of
the hexagonal honeycomb lattice and directed spanning trees of a triangular
lattice. Another special case gives a correspondence between perfect matchings
of the ``square-octagon'' lattice and directed weighted spanning trees on a
directed weighted version of the cartesian lattice.
In conjunction with results of Kenyon, our main theorem allows us to compute
the measures of all cylinder events for random spanning trees on any (directed,
weighted) planar graph. Conversely, in cases where the perfect matching model
arises from a tree model, Wilson's algorithm allows us to quickly generate
random samples of perfect matchings.Comment: 32 pages, 19 figures (minor revisions from version 1
Data-Oblivious Graph Algorithms in Outsourced External Memory
Motivated by privacy preservation for outsourced data, data-oblivious
external memory is a computational framework where a client performs
computations on data stored at a semi-trusted server in a way that does not
reveal her data to the server. This approach facilitates collaboration and
reliability over traditional frameworks, and it provides privacy protection,
even though the server has full access to the data and he can monitor how it is
accessed by the client. The challenge is that even if data is encrypted, the
server can learn information based on the client data access pattern; hence,
access patterns must also be obfuscated. We investigate privacy-preserving
algorithms for outsourced external memory that are based on the use of
data-oblivious algorithms, that is, algorithms where each possible sequence of
data accesses is independent of the data values. We give new efficient
data-oblivious algorithms in the outsourced external memory model for a number
of fundamental graph problems. Our results include new data-oblivious
external-memory methods for constructing minimum spanning trees, performing
various traversals on rooted trees, answering least common ancestor queries on
trees, computing biconnected components, and forming open ear decompositions.
None of our algorithms make use of constant-time random oracles.Comment: 20 page
Secluded Connectivity Problems
Consider a setting where possibly sensitive information sent over a path in a
network is visible to every {neighbor} of the path, i.e., every neighbor of
some node on the path, thus including the nodes on the path itself. The
exposure of a path can be measured as the number of nodes adjacent to it,
denoted by . A path is said to be secluded if its exposure is small. A
similar measure can be applied to other connected subgraphs, such as Steiner
trees connecting a given set of terminals. Such subgraphs may be relevant due
to considerations of privacy, security or revenue maximization. This paper
considers problems related to minimum exposure connectivity structures such as
paths and Steiner trees. It is shown that on unweighted undirected -node
graphs, the problem of finding the minimum exposure path connecting a given
pair of vertices is strongly inapproximable, i.e., hard to approximate within a
factor of for any (under an
appropriate complexity assumption), but is approximable with ratio
, where is the maximum degree in the graph. One of
our main results concerns the class of bounded-degree graphs, which is shown to
exhibit the following interesting dichotomy. On the one hand, the minimum
exposure path problem is NP-hard on node-weighted or directed bounded-degree
graphs (even when the maximum degree is 4). On the other hand, we present a
polynomial algorithm (based on a nontrivial dynamic program) for the problem on
unweighted undirected bounded-degree graphs. Likewise, the problem is shown to
be polynomial also for the class of (weighted or unweighted) bounded-treewidth
graphs
- …