9,071 research outputs found
Structure of conflict graphs in constraint alignment problems and algorithms
We consider the constrained graph alignment problem which has applications in
biological network analysis. Given two input graphs , a pair of vertex mappings induces an {\it edge conservation} if
the vertex pairs are adjacent in their respective graphs. %In general terms The
goal is to provide a one-to-one mapping between the vertices of the input
graphs in order to maximize edge conservation. However the allowed mappings are
restricted since each vertex from (resp. ) is allowed to be mapped
to at most (resp. ) specified vertices in (resp. ). Most
of results in this paper deal with the case which attracted most
attention in the related literature. We formulate the problem as a maximum
independent set problem in a related {\em conflict graph} and investigate
structural properties of this graph in terms of forbidden subgraphs. We are
interested, in particular, in excluding certain wheals, fans, cliques or claws
(all terms are defined in the paper), which corresponds in excluding certain
cycles, paths, cliques or independent sets in the neighborhood of each vertex.
Then, we investigate algorithmic consequences of some of these properties,
which illustrates the potential of this approach and raises new horizons for
further works. In particular this approach allows us to reinterpret a known
polynomial case in terms of conflict graph and to improve known approximation
and fixed-parameter tractability results through efficiently solving the
maximum independent set problem in conflict graphs. Some of our new
approximation results involve approximation ratios that are function of the
optimal value, in particular its square root; this kind of results cannot be
achieved for maximum independent set in general graphs.Comment: 22 pages, 6 figure
TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite
The main result of this work is that an orthogonal access scheme such as TDMA
achieves the all-unicast degrees of freedom (DoF) region of the topological
interference management (TIM) problem if and only if the network topology graph
is chordal bipartite, i.e., every cycle that can contain a chord, does contain
a chord. The all-unicast DoF region includes the DoF region for any arbitrary
choice of a unicast message set, so e.g., the results of Maleki and Jafar on
the optimality of orthogonal access for the sum-DoF of one-dimensional convex
networks are recovered as a special case. The result is also established for
the corresponding topological representation of the index coding problem
When Does an Ensemble of Matrices with Randomly Scaled Rows Lose Rank?
We consider the problem of determining rank loss conditions for a
concatenation of full-rank matrices, such that each row of the composing
matrices is scaled by a random coefficient. This problem has applications in
wireless interference management and recommendation systems. We determine
necessary and sufficient conditions for the design of each matrix, such that
the random ensemble will almost surely lose rank by a certain amount. The
result is proved by converting the problem to determining rank loss conditions
for the union of some specific matroids, and then using tools from matroid and
graph theories to derive the necessary and sufficient conditions. As an
application, we discuss how this result can be applied to the problem of
topological interference management, and characterize the linear symmetric
degrees of freedom for a class of network topologies.Comment: submitted to IEEE Transactions on Information Theory; shorter version
to appear at IEEE International Symposium on Information Theory (ISIT 2015
Modularity and community structure in networks
Many networks of interest in the sciences, including a variety of social and
biological networks, are found to divide naturally into communities or modules.
The problem of detecting and characterizing this community structure has
attracted considerable recent attention. One of the most sensitive detection
methods is optimization of the quality function known as "modularity" over the
possible divisions of a network, but direct application of this method using,
for instance, simulated annealing is computationally costly. Here we show that
the modularity can be reformulated in terms of the eigenvectors of a new
characteristic matrix for the network, which we call the modularity matrix, and
that this reformulation leads to a spectral algorithm for community detection
that returns results of better quality than competing methods in noticeably
shorter running times. We demonstrate the algorithm with applications to
several network data sets.Comment: 7 pages, 3 figure
Taming Numbers and Durations in the Model Checking Integrated Planning System
The Model Checking Integrated Planning System (MIPS) is a temporal least
commitment heuristic search planner based on a flexible object-oriented
workbench architecture. Its design clearly separates explicit and symbolic
directed exploration algorithms from the set of on-line and off-line computed
estimates and associated data structures. MIPS has shown distinguished
performance in the last two international planning competitions. In the last
event the description language was extended from pure propositional planning to
include numerical state variables, action durations, and plan quality objective
functions. Plans were no longer sequences of actions but time-stamped
schedules. As a participant of the fully automated track of the competition,
MIPS has proven to be a general system; in each track and every benchmark
domain it efficiently computed plans of remarkable quality. This article
introduces and analyzes the most important algorithmic novelties that were
necessary to tackle the new layers of expressiveness in the benchmark problems
and to achieve a high level of performance. The extensions include critical
path analysis of sequentially generated plans to generate corresponding optimal
parallel plans. The linear time algorithm to compute the parallel plan bypasses
known NP hardness results for partial ordering by scheduling plans with respect
to the set of actions and the imposed precedence relations. The efficiency of
this algorithm also allows us to improve the exploration guidance: for each
encountered planning state the corresponding approximate sequential plan is
scheduled. One major strength of MIPS is its static analysis phase that grounds
and simplifies parameterized predicates, functions and operators, that infers
knowledge to minimize the state description length, and that detects domain
object symmetries. The latter aspect is analyzed in detail. MIPS has been
developed to serve as a complete and optimal state space planner, with
admissible estimates, exploration engines and branching cuts. In the
competition version, however, certain performance compromises had to be made,
including floating point arithmetic, weighted heuristic search exploration
according to an inadmissible estimate and parameterized optimization
Inapproximability of maximal strip recovery
In comparative genomic, the first step of sequence analysis is usually to
decompose two or more genomes into syntenic blocks that are segments of
homologous chromosomes. For the reliable recovery of syntenic blocks, noise and
ambiguities in the genomic maps need to be removed first. Maximal Strip
Recovery (MSR) is an optimization problem proposed by Zheng, Zhu, and Sankoff
for reliably recovering syntenic blocks from genomic maps in the midst of noise
and ambiguities. Given genomic maps as sequences of gene markers, the
objective of \msr{d} is to find subsequences, one subsequence of each
genomic map, such that the total length of syntenic blocks in these
subsequences is maximized. For any constant , a polynomial-time
2d-approximation for \msr{d} was previously known. In this paper, we show that
for any , \msr{d} is APX-hard, even for the most basic version of the
problem in which all gene markers are distinct and appear in positive
orientation in each genomic map. Moreover, we provide the first explicit lower
bounds on approximating \msr{d} for all . In particular, we show that
\msr{d} is NP-hard to approximate within . From the other
direction, we show that the previous 2d-approximation for \msr{d} can be
optimized into a polynomial-time algorithm even if is not a constant but is
part of the input. We then extend our inapproximability results to several
related problems including \cmsr{d}, \gapmsr{\delta}{d}, and
\gapcmsr{\delta}{d}.Comment: A preliminary version of this paper appeared in two parts in the
Proceedings of the 20th International Symposium on Algorithms and Computation
(ISAAC 2009) and the Proceedings of the 4th International Frontiers of
Algorithmics Workshop (FAW 2010
- …