7,889 research outputs found
Solving the undirected feedback vertex set problem by local search
An undirected graph consists of a set of vertices and a set of undirected
edges between vertices. Such a graph may contain an abundant number of cycles,
then a feedback vertex set (FVS) is a set of vertices intersecting with each of
these cycles. Constructing a FVS of cardinality approaching the global minimum
value is a optimization problem in the nondeterministic polynomial-complete
complexity class, therefore it might be extremely difficult for some large
graph instances. In this paper we develop a simulated annealing local search
algorithm for the undirected FVS problem. By defining an order for the vertices
outside the FVS, we replace the global cycle constraints by a set of local
vertex constraints on this order. Under these local constraints the cardinality
of the focal FVS is then gradually reduced by the simulated annealing dynamical
process. We test this heuristic algorithm on large instances of Er\"odos-Renyi
random graph and regular random graph, and find that this algorithm is
comparable in performance to the belief propagation-guided decimation
algorithm.Comment: 6 page
A vizing-type theorem for matching forests
A well known Theorem of Vizing states that one can colour the edges of a graph by colours, such that edges of the same colour form a matching. Here, denotes the maximum degree of a vertex, and the maximum multiplicity of an edge in the graph. An analogue of this Theorem for directed graphs was proved by Frank. It states that one can colour the arcs of a digraph by colours, such that arcs of the same colour form a branching. For a digraph, denotes the maximum indegree of a vertex, and the maximum multiplicity of an arc
Approximating Minimum Cost Connectivity Orientation and Augmentation
We investigate problems addressing combined connectivity augmentation and
orientations settings. We give a polynomial-time 6-approximation algorithm for
finding a minimum cost subgraph of an undirected graph that admits an
orientation covering a nonnegative crossing -supermodular demand function,
as defined by Frank. An important example is -edge-connectivity, a
common generalization of global and rooted edge-connectivity.
Our algorithm is based on a non-standard application of the iterative
rounding method. We observe that the standard linear program with cut
constraints is not amenable and use an alternative linear program with
partition and co-partition constraints instead. The proof requires a new type
of uncrossing technique on partitions and co-partitions.
We also consider the problem setting when the cost of an edge can be
different for the two possible orientations. The problem becomes substantially
more difficult already for the simpler requirement of -edge-connectivity.
Khanna, Naor, and Shepherd showed that the integrality gap of the natural
linear program is at most when and conjectured that it is constant
for all fixed . We disprove this conjecture by showing an
integrality gap even when
Solving Connectivity Problems Parameterized by Treedepth in Single-Exponential Time and Polynomial Space
A breakthrough result of Cygan et al. (FOCS 2011) showed that connectivity problems parameterized by treewidth can be solved much faster than the previously best known time ?^*(2^{?(twlog tw)}). Using their inspired Cut&Count technique, they obtained ?^*(?^tw) time algorithms for many such problems. Moreover, they proved these running times to be optimal assuming the Strong Exponential-Time Hypothesis. Unfortunately, like other dynamic programming algorithms on tree decompositions, these algorithms also require exponential space, and this is widely believed to be unavoidable. In contrast, for the slightly larger parameter called treedepth, there are already several examples of matching the time bounds obtained for treewidth, but using only polynomial space. Nevertheless, this has remained open for connectivity problems.
In the present work, we close this knowledge gap by applying the Cut&Count technique to graphs of small treedepth. While the general idea is unchanged, we have to design novel procedures for counting consistently cut solution candidates using only polynomial space. Concretely, we obtain time ?^*(3^d) and polynomial space for Connected Vertex Cover, Feedback Vertex Set, and Steiner Tree on graphs of treedepth d. Similarly, we obtain time ?^*(4^d) and polynomial space for Connected Dominating Set and Connected Odd Cycle Transversal
Securing Databases from Probabilistic Inference
Databases can leak confidential information when users combine query results
with probabilistic data dependencies and prior knowledge. Current research
offers mechanisms that either handle a limited class of dependencies or lack
tractable enforcement algorithms. We propose a foundation for Database
Inference Control based on ProbLog, a probabilistic logic programming language.
We leverage this foundation to develop Angerona, a provably secure enforcement
mechanism that prevents information leakage in the presence of probabilistic
dependencies. We then provide a tractable inference algorithm for a practically
relevant fragment of ProbLog. We empirically evaluate Angerona's performance
showing that it scales to relevant security-critical problems.Comment: A short version of this paper has been accepted at the 30th IEEE
Computer Security Foundations Symposium (CSF 2017
Reconstructing pedigrees: some identifiability questions for a recombination-mutation model
Pedigrees are directed acyclic graphs that represent ancestral relationships
between individuals in a population. Based on a schematic recombination
process, we describe two simple Markov models for sequences evolving on
pedigrees - Model R (recombinations without mutations) and Model RM
(recombinations with mutations). For these models, we ask an identifiability
question: is it possible to construct a pedigree from the joint probability
distribution of extant sequences? We present partial identifiability results
for general pedigrees: we show that when the crossover probabilities are
sufficiently small, certain spanning subgraph sequences can be counted from the
joint distribution of extant sequences. We demonstrate how pedigrees that
earlier seemed difficult to distinguish are distinguished by counting their
spanning subgraph sequences.Comment: 40 pages, 9 figure
- …