Skip to main content
Top
Published in: Journal of Combinatorial Optimization 3/2017

06-05-2016

Efficient reassembling of graphs, part 1: the linear case

Authors: Assaf Kfoury, Saber Mirzaei

Published in: Journal of Combinatorial Optimization | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The reassembling of a simple connected graph \(G = (V,E)\) is an abstraction of a problem arising in earlier studies of network analysis. Its simplest formulation is in two steps:
(1)
We cut every edge of G into two halves, thus obtaining a collection of \(n = |\,V\,|\) one-vertex components, such that for every \(v\in V\) the one-vertex component \(\{ v \}\) has \({{degree}}_{}(v)\) half edges attached to it.
 
(2)
We splice the two halves of every edge together, not of all the edges at once, but in some ordering \(\Theta \) of the edges that minimizes two measures that depend on the edge-boundary degrees of assembled components.
 
A component A is a subset of V and its edge-boundary degree is the number of edges in G with one endpoint in A and one endpoint in \(V-A\) (which is the same as the number of half edges attached to A after all edges with both endpoints in A have been spliced together). The maximum edge-boundary degree encountered during the reassembling process is what we call the \(\varvec{\alpha }\) -measure of the reassembling, and the sum of all edge-boundary degrees is its \(\varvec{\beta }\) -measure. The \(\alpha \)-optimization (resp. \(\beta \)-optimization) of the reassembling of G is to determine an order \(\Theta \) for splicing the edges that minimizes its \(\alpha \)-measure (resp. \(\beta \)-measure). There are different forms of reassembling, depending on restrictions and variations on the ordering \(\Theta \) of the edges. We consider only cases satisfying the condition that if an edge between disjoint components A and B is spliced, then all the edges between A and B are spliced at the same time. In this report, we examine the particular case of linear reassembling, which requires that the next edge to be spliced must be adjacent to an already spliced edge. We delay other forms of reassembling to follow-up reports. We prove that \(\alpha \)-optimization of linear reassembling and minimum-cutwidth linear arrangment (\(\mathrm{CutWidth}\)) are polynomially reducible to each other, and that \(\beta \)-optimization of linear reassembling and minimum-cost linear arrangement (\(\mathrm{MinArr}\)) are polynomially reducible to each other. The known NP-hardness of \(\mathrm{CutWidth}\) and \(\mathrm{MinArr}\) imply the NP-hardness of \(\alpha \)-optimization and \(\beta \)-optimization.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
These terms (bridge, cluster, and others, later in this report) are overloaded in graph-theoretical problems. We make our own use of these terms, and state it explicitly when our meaning is somewhat at variance with that elsewhere in the literature.
 
2
Such networks are typically more complex than the capacitated directed graphs that algorithms for max-flow (and other related quantities) and its generalizations (e.g., multicommodity max-flow) operate on.
 
3
A standard definition of a binary tree T makes T a subset of the set of finite binary strings \(\{ 0,1 \}^*\) such that:
1.
T is prefix-closed, i.e., if \(t\in T\) and u is a prefix of t, then \(u\in T\).
 
2.
Every node has two children, i.e., \(t\,0\in T\) iff \(t\,1\in T\) for every \(t\in \{ 0,1 \}^*\).
 
The root node of T is the empty string \(\varepsilon \), and a leaf node of T is a string \(t\in T\) without children, i.e., both \(t\,0\not \in T\) and \(t\,1\not \in T\).
 
4
Our binary reassembling of G can be viewed as the “hierarchical clustering” of G, similar to a method of analysis in data mining, though used for a different purpose. Our binary reassembling mimicks what is called “agglomerative, or bottom-up, hierarchical clustering” in data mining.
 
5
We qualify \({\Theta }_i^{Q_3}\) with the superscript “\({Q_3}\)” because it depends on the graph \({Q_3}\). The same ordering of the edges may not be valid for a sequential reassembling of another 8-vertex graph with a set of edges different from that of \({Q_3}\). This is not the case for the binary tree \({\mathcal{B}}\) underlying the binary reassembling \((G,\mathcal{B})\) of a graph \(G = (V,E)\); that is, regardless of the placement of edges in G, the tree \({\mathcal{B}}\) over V is valid for the binary reassembling \((G,\mathcal{B})\) and again for the binary reassembling \((G',\mathcal{B})\) of every graph \(G' = (V,E')\) over the same set V of vertices.
 
6
A similar statement applies to the \(\alpha \)-measure: If we allowed \({{degree}}_{G}(w) > {{degree}}_{G}(w')\), then the new arrangement \(\varphi '\) would be such that \(\alpha (G,\varphi ') \leqslant \alpha (G,\varphi )\), but not necessarily \(\alpha (G,\varphi ') < \alpha (G,\varphi )\).
 
7
There is no known simple expression for the exponential growth of B(n) as a function of n, though there are various ways of estimating tight lower bounds and tight upper bounds on its asymptotic growth (Odlyzko 1995).
 
Literature
go back to reference Arora S, Frieze A, Kaplan H (1996) A new rounding procedure for the assignment problem with applications to dense graph arrangement problems. In: IEEE Proceedings of the 37th Annual Symposium on Foundations of Computer Science, pp 21–30 Arora S, Frieze A, Kaplan H (1996) A new rounding procedure for the assignment problem with applications to dense graph arrangement problems. In: IEEE Proceedings of the 37th Annual Symposium on Foundations of Computer Science, pp 21–30
go back to reference Assaf K (2014) The syntax and semantics of a domain-specific language for flow-network design. Sci Comput Progr 93((part A)):19–38 Assaf K (2014) The syntax and semantics of a domain-specific language for flow-network design. Sci Comput Progr 93((part A)):19–38
go back to reference Bestavros A, Kfoury A (2011) A domain-specific language for incremental and modular design of large-scale verifiably-safe flow networks. In: Proceeding of IFIP Working Conference on Domain-Specific Languages (DSL 2011), EPTCS volume 66, pp 24–47 Bestavros A, Kfoury A (2011) A domain-specific language for incremental and modular design of large-scale verifiably-safe flow networks. In: Proceeding of IFIP Working Conference on Domain-Specific Languages (DSL 2011), EPTCS volume 66, pp 24–47
go back to reference Bronner D, Ries B (2006) An introduction to treewidth. Technical Report ROSE-REPORT-2006-004, Ecole Polytechnique Fédérale de Lausanne Bronner D, Ries B (2006) An introduction to treewidth. Technical Report ROSE-REPORT-2006-004, Ecole Polytechnique Fédérale de Lausanne
go back to reference Burkhard M, Ivan Hal S (1988) Min cut is NP-complete for edge weighted trees. Theor Comput Sci 58(1–3):209–229MathSciNet Burkhard M, Ivan Hal S (1988) Min cut is NP-complete for edge weighted trees. Theor Comput Sci 58(1–3):209–229MathSciNet
go back to reference Charikar M, Hajiaghayi MT, Karloff H, Rao S (2006) \({\ell }^2_2\) Spreading metrics for vertex ordering problems. In: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms, pp 1018–1027. Society for Industrial and Applied Mathematics Charikar M, Hajiaghayi MT, Karloff H, Rao S (2006) \({\ell }^2_2\) Spreading metrics for vertex ordering problems. In: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms, pp 1018–1027. Society for Industrial and Applied Mathematics
go back to reference Deistel R (2012) Graph theory. Springer, Berlin Deistel R (2012) Graph theory. Springer, Berlin
go back to reference Garey Michael R, Johnson David S, Larry Stockmeyer (1976) Some simplied NP-complete graph problems. Theor Comput Sci 1:237–267CrossRef Garey Michael R, Johnson David S, Larry Stockmeyer (1976) Some simplied NP-complete graph problems. Theor Comput Sci 1:237–267CrossRef
go back to reference Kfoury A (2011) The denotational, operational, and static semantics of a domain-specific language for the design of flow networks. In: Proceedings of SBLP 2011: Brazilian Symposium on Programming Languages Kfoury A (2011) The denotational, operational, and static semantics of a domain-specific language for the design of flow networks. In: Proceedings of SBLP 2011: Brazilian Symposium on Programming Languages
go back to reference Kfoury A, Mirzaei S (2013) A different approach to the design and analysis of network algorithms. Technical Report BUCS-TR-2012-019, CS Dept, Boston University Kfoury A, Mirzaei S (2013) A different approach to the design and analysis of network algorithms. Technical Report BUCS-TR-2012-019, CS Dept, Boston University
go back to reference Makedon Fillia S, Papadimitriou Christos H, Hal SI (1985) Topological bandwidth. SIAM J Algebraic Discret Methods 6(3):418–444MathSciNetCrossRef Makedon Fillia S, Papadimitriou Christos H, Hal SI (1985) Topological bandwidth. SIAM J Algebraic Discret Methods 6(3):418–444MathSciNetCrossRef
go back to reference Odlyzko AM (1995) Asymptotic enumeration methods. In: Graham RL, Grotschel M, Lovast L (eds) Handbook of combinatorics, vol 2, pp 1063–1229. Cambridge, MA, MIT Press Odlyzko AM (1995) Asymptotic enumeration methods. In: Graham RL, Grotschel M, Lovast L (eds) Handbook of combinatorics, vol 2, pp 1063–1229. Cambridge, MA, MIT Press
go back to reference Rao S, Richa AW (1998) New approximation techniques for some ordering problems. In: Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete algorithms, pp 211–218. Philadelphia, PA, Society for Industrial and Applied Mathematics Rao S, Richa AW (1998) New approximation techniques for some ordering problems. In: Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete algorithms, pp 211–218. Philadelphia, PA, Society for Industrial and Applied Mathematics
go back to reference Soule N, Bestavros A, Kfoury A, Lapets A (2011) Safe compositional equation-based modeling of constrained flow networks. In: Proceedings of 4th Int’l Workshop on Equation-Based Object-Oriented Modeling Languages and Tools, Zürich Soule N, Bestavros A, Kfoury A, Lapets A (2011) Safe compositional equation-based modeling of constrained flow networks. In: Proceedings of 4th Int’l Workshop on Equation-Based Object-Oriented Modeling Languages and Tools, Zürich
go back to reference Thilikos DM, Serna MJ, Bodlaender HL (2001) A polynomial time algorithm for the cutwidth of bounded degree graphs with small treewidth. In: Meyer F, Auf der H (eds), Algorithms, ESA 2001. LNCS 2161, pp 380–390. Springer, Berlin Thilikos DM, Serna MJ, Bodlaender HL (2001) A polynomial time algorithm for the cutwidth of bounded degree graphs with small treewidth. In: Meyer F, Auf der H (eds), Algorithms, ESA 2001. LNCS 2161, pp 380–390. Springer, Berlin
go back to reference Tom L, Satish R (1999) Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. J ACM (JACM) 46(6):787–832MathSciNetCrossRefMATH Tom L, Satish R (1999) Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms. J ACM (JACM) 46(6):787–832MathSciNetCrossRefMATH
Metadata
Title
Efficient reassembling of graphs, part 1: the linear case
Authors
Assaf Kfoury
Saber Mirzaei
Publication date
06-05-2016
Publisher
Springer US
Published in
Journal of Combinatorial Optimization / Issue 3/2017
Print ISSN: 1382-6905
Electronic ISSN: 1573-2886
DOI
https://doi.org/10.1007/s10878-016-0024-x

Other articles of this Issue 3/2017

Journal of Combinatorial Optimization 3/2017 Go to the issue

Premium Partner