21,697 research outputs found
Provenance Circuits for Trees and Treelike Instances (Extended Version)
Query evaluation in monadic second-order logic (MSO) is tractable on trees
and treelike instances, even though it is hard for arbitrary instances. This
tractability result has been extended to several tasks related to query
evaluation, such as counting query results [3] or performing query evaluation
on probabilistic trees [10]. These are two examples of the more general problem
of computing augmented query output, that is referred to as provenance. This
article presents a provenance framework for trees and treelike instances, by
describing a linear-time construction of a circuit provenance representation
for MSO queries. We show how this provenance can be connected to the usual
definitions of semiring provenance on relational instances [20], even though we
compute it in an unusual way, using tree automata; we do so via intrinsic
definitions of provenance for general semirings, independent of the operational
details of query evaluation. We show applications of this provenance to capture
existing counting and probabilistic results on trees and treelike instances,
and give novel consequences for probability evaluation.Comment: 48 pages. Presented at ICALP'1
Structurally Parameterized d-Scattered Set
In -Scattered Set we are given an (edge-weighted) graph and are asked to
select at least vertices, so that the distance between any pair is at least
, thus generalizing Independent Set. We provide upper and lower bounds on
the complexity of this problem with respect to various standard graph
parameters. In particular, we show the following:
- For any , an -time algorithm, where
is the treewidth of the input graph.
- A tight SETH-based lower bound matching this algorithm's performance. These
generalize known results for Independent Set.
- -Scattered Set is W[1]-hard parameterized by vertex cover (for
edge-weighted graphs), or feedback vertex set (for unweighted graphs), even if
is an additional parameter.
- A single-exponential algorithm parameterized by vertex cover for unweighted
graphs, complementing the above-mentioned hardness.
- A -time algorithm parameterized by tree-depth
(), as well as a matching ETH-based lower bound, both for
unweighted graphs.
We complement these mostly negative results by providing an FPT approximation
scheme parameterized by treewidth. In particular, we give an algorithm which,
for any error parameter , runs in time
and returns a
-scattered set of size , if a -scattered set of the same
size exists
Edge Shear Flows and Particle Transport near the Density Limit in the HL-2A Tokamak
Edge shear flow and its effect on regulating turbulent transport have long
been suspected to play an important role in plasmas operating near the
Greenwald density limit . In this study, equilibrium profiles as well as
the turbulent particle flux and Reynolds stress across the separatrix in the
HL-2A tokamak are examined as is approached in ohmic L-mode discharges.
As the normalized line-averaged density is raised, the
shearing rate of the mean poloidal flow drops, and the
turbulent drive for the low-frequency zonal flow (the Reynolds power ) collapses. Correspondingly, the turbulent particle
transport increases drastically with increasing collision rates. The geodesic
acoustic modes (GAMs) gain more energy from the ambient turbulence at higher
densities, but have smaller shearing rate than low-frequency zonal flows. The
increased density also introduces decreased adiabaticity which not only
enhances the particle transport but is also related to a reduction in the
eddy-tilting and the Reynolds power. Both effects may lead to the cooling of
edge plasmas and therefore the onset of MHD instabilities that limit the plasma
density
An FPT 2-Approximation for Tree-Cut Decomposition
The tree-cut width of a graph is a graph parameter defined by Wollan [J.
Comb. Theory, Ser. B, 110:47-66, 2015] with the help of tree-cut
decompositions. In certain cases, tree-cut width appears to be more adequate
than treewidth as an invariant that, when bounded, can accelerate the
resolution of intractable problems. While designing algorithms for problems
with bounded tree-cut width, it is important to have a parametrically tractable
way to compute the exact value of this parameter or, at least, some constant
approximation of it. In this paper we give a parameterized 2-approximation
algorithm for the computation of tree-cut width; for an input -vertex graph
and an integer , our algorithm either confirms that the tree-cut width
of is more than or returns a tree-cut decomposition of certifying
that its tree-cut width is at most , in time .
Prior to this work, no constructive parameterized algorithms, even approximated
ones, existed for computing the tree-cut width of a graph. As a consequence of
the Graph Minors series by Robertson and Seymour, only the existence of a
decision algorithm was known.Comment: 17 pages, 3 figure
Recommended from our members
Definition of the cellular interactome of the highly pathogenic avian influenza H5N1 virus: identification of human cellular regulators of viral entry, assembly, and egress.
This study was supported by the Research Fund for the Control of Infectious Diseases, Food and Health Bureau, Hong Kong SAR Government (#09080892), University Grants Committee Area of Excellence Scheme (AoE/M-12/-06), French Ministry of Health, RESPARI Pasteur network, and the Li Ka Shing Foundation
Algorithms for outerplanar graph roots and graph roots of pathwidth at most 2
Deciding whether a given graph has a square root is a classical problem that
has been studied extensively both from graph theoretic and from algorithmic
perspectives. The problem is NP-complete in general, and consequently
substantial effort has been dedicated to deciding whether a given graph has a
square root that belongs to a particular graph class. There are both
polynomial-time solvable and NP-complete cases, depending on the graph class.
We contribute with new results in this direction. Given an arbitrary input
graph G, we give polynomial-time algorithms to decide whether G has an
outerplanar square root, and whether G has a square root that is of pathwidth
at most 2
Are infestations of Cymomelanodactylus killing Acropora cytherea in the Chagos archipelago?
Associations between branching corals and infaunal crabs are well
known, mostly due to the beneficial effects of Trapezia and Tetralia
crabs in protecting host corals from crown-of-thorns starfish (e.g.,
Pratchett et al. 2000) and/or sedimentation (Stewart et al. 2006).
These crabs are obligate associates of live corals and highly prevalent
across suitable coral hosts, with 1–2 individuals per colony
(Patton 1994). Cymo melanodactylus (Fig. 1) are also prevalent in
branching corals, mostly Acropora, and are known to feed on live
coral tissue, but are generally found in low abundance (<3 per
colony) and do not significantly affect their host corals (e.g., Patton
1994). In the Chagos archipelago, however, infestations of Cymo
melanodactylus were found on recently dead and dying colonies of
Acropora cytherea
Solving Problems on Graphs of High Rank-Width
A modulator of a graph G to a specified graph class H is a set of vertices
whose deletion puts G into H. The cardinality of a modulator to various
tractable graph classes has long been used as a structural parameter which can
be exploited to obtain FPT algorithms for a range of hard problems. Here we
investigate what happens when a graph contains a modulator which is large but
"well-structured" (in the sense of having bounded rank-width). Can such
modulators still be exploited to obtain efficient algorithms? And is it even
possible to find such modulators efficiently?
We first show that the parameters derived from such well-structured
modulators are strictly more general than the cardinality of modulators and
rank-width itself. Then, we develop an FPT algorithm for finding such
well-structured modulators to any graph class which can be characterized by a
finite set of forbidden induced subgraphs. We proceed by showing how
well-structured modulators can be used to obtain efficient parameterized
algorithms for Minimum Vertex Cover and Maximum Clique. Finally, we use
well-structured modulators to develop an algorithmic meta-theorem for deciding
problems expressible in Monadic Second Order (MSO) logic, and prove that this
result is tight in the sense that it cannot be generalized to LinEMSO problems.Comment: Accepted at WADS 201
A realistic assessment of methods for extracting gene/protein interactions from free text
Background: The automated extraction of gene and/or protein interactions from the literature is one of the most important targets of biomedical text mining research. In this paper we present a realistic evaluation of gene/protein interaction mining relevant to potential non-specialist users. Hence we have specifically avoided methods that are complex to install or require reimplementation, and we coupled our chosen extraction methods with a state-of-the-art biomedical named entity tagger. Results: Our results show: that performance across different evaluation corpora is extremely variable; that the use of tagged (as opposed to gold standard) gene and protein names has a significant impact on performance, with a drop in F-score of over 20 percentage points being commonplace; and that a simple keyword-based benchmark algorithm when coupled with a named entity tagger outperforms two of the tools most widely used to extract gene/protein interactions. Conclusion: In terms of availability, ease of use and performance, the potential non-specialist user community interested in automatically extracting gene and/or protein interactions from free text is poorly served by current tools and systems. The public release of extraction tools that are easy to install and use, and that achieve state-of-art levels of performance should be treated as a high priority by the biomedical text mining community
- …