skip to main content
research-article
Public Access

Graph Reconstruction and Verification

Published:09 August 2018Publication History
Skip Abstract Section

Abstract

How efficiently can we find an unknown graph using distance or shortest path queries between its vertices? We assume that the unknown graph G is connected, unweighted, and has bounded degree. In the reconstruction problem, the goal is to find the graph G. In the verification problem, we are given a hypothetical graph Ĝ and want to check whether G is equal to Ĝ.

We provide a randomized algorithm for reconstruction using Õ(n3/2) distance queries, based on Voronoi cell decomposition. Next, we analyze natural greedy algorithms for reconstruction using a shortest path oracle and also for verification using either oracle, and show that their query complexity is n1+o(1). We further improve the query complexity when the graph is chordal or outerplanar. Finally, we show some lower bounds, and consider an approximate version of the reconstruction problem.

References

  1. Mikkel Abrahamsen, Greg Bodwin, Eva Rotenberg, and Morten Stöckel. 2016. Graph reconstruction with a betweenness oracle. In 33rd Symposium on Theoretical Aspects of Computer Science (STACS'16), Nicolas Ollinger and Heribert Vollmer (Eds.). Vol. 47. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik.Google ScholarGoogle Scholar
  2. Dimitris Achlioptas, Aaron Clauset, David Kempe, and Cristopher Moore. 2009. On the bias of traceroute sampling: Or, power-law degree distributions in regular graphs. J. ACM 56, 4, Article 21 (2009), 21:1--21:28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zuzana Beerliova, Felix Eberhard, Thomas Erlebach, Alexander Hall, Michael Hoffmann, Matús Mihal’ak, and L. Shankar Ram. 2006. Network discovery and verification. IEEE J. Sel. Areas Commun. 24, 12 (2006), 2168--2181. Google ScholarGoogle ScholarCross RefCross Ref
  4. Jean R. S. Blair and Barry Peyton. 1993. An introduction to chordal graphs and clique trees. In Graph Theory and Sparse Matrix Computation. Springer, 1--29.Google ScholarGoogle Scholar
  5. Rui Castro, Mark Coates, Gang Liang, Robert Nowak, and Bin Yu. 2004. Network tomography: Recent developments. Statist. Sci. 19 (2004), 499--517.Google ScholarGoogle ScholarCross RefCross Ref
  6. Gary Chartrand and Frank Harary. 1967. Planar permutation graphs. Ann. l’Institut Henri Poincaré (B) Prob. Statist. 3, 4 (1967), 433--438.Google ScholarGoogle Scholar
  7. F. Chung, M. Garrett, R. Graham, and D. Shallcross. 2001. Distance realization problems with applications to internet tomography. J. Comput. Syst. Sci. 63 (2001), 432--448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Luca Dall’Asta, Ignacio Alvarez-Hamelin, Alain Barrat, Alexei Vázquez, and Alessandro Vespignani. 2006. Exploring networks with traceroute-like probes: Theory and simulations. Theor. Comput. Sci. 355, 1 (2006), 6--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jotun J. Hein. 1989. An optimal algorithm to reconstruct trees from additive distance data. Bull. Math. Biol. 51, 5 (1989), 597--603.Google ScholarGoogle ScholarCross RefCross Ref
  10. Shinichi Honiden, Michael E. Houle, and Christian Sommer. 2009. Balancing graph voronoi diagrams. In International Symposium on Voronoi Diagrams. IEEE, 183--191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. David S. Johnson. 1974. Approximation algorithms for combinatorial problems. J. Comput. Syst. Sci. 9, 3 (1974), 256--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sampath Kannan, Claire Mathieu, and Hang Zhou. 2015. Near-linear query complexity for graph inference. In International Colloquium on Automata, Languages and Programming. Springer, 773--784.Google ScholarGoogle Scholar
  13. Valerie King, Li Zhang, and Yunhong Zhou. 2003. On the complexity of distance-based evolutionary tree reconstruction. In Symposium on Discrete Algorithms. SIAM, 444--453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Claire Mathieu and Hang Zhou. 2013. Graph reconstruction via distance oracles. In International Colloquium on Automata, Languages and Programming. Springer, 733--744. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Brendan D. McKay and Nicholas C. Wormald. 1991. Asymptotic enumeration by degree sequence of graphs with degrees . Combinatorica 11, 4 (1991), 369--382.Google ScholarGoogle ScholarCross RefCross Ref
  16. Bruce A. Reed. 2003. Algorithmic aspects of tree width. In Recent Advances in Algorithms and Combinatorics. Springer, 85--107.Google ScholarGoogle Scholar
  17. Lev Reyzin and Nikhil Srivastava. 2007. Learning and verifying graphs using queries with a focus on edge counting. In Algorithmic Learning Theory. Springer, 285--297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sandeep Sen and V. N. Muralidhara. 2010. The covert set-cover problem with application to network discovery. In International Workshop on Algorithms and Computation. Springer, 228--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fabien Tarissan, Matthieu Latapy, and Christophe Prieur. 2009. Efficient measurement of complex networks using link queries. In INFOCOM Workshops. IEEE, 254--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mikkel Thorup and Uri Zwick. 2001. Compact routing schemes. In Symposium on Parallel Algorithms and Architectures. ACM, 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Michael S. Waterman, Temple F. Smith, M. Singh, and W. A. Beyer. 1977. Additive evolutionary trees. J. Theor. Biol. 64, 2 (1977), 199--213.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Graph Reconstruction and Verification

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Algorithms
          ACM Transactions on Algorithms  Volume 14, Issue 4
          October 2018
          445 pages
          ISSN:1549-6325
          EISSN:1549-6333
          DOI:10.1145/3266298
          Issue’s Table of Contents

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 August 2018
          • Accepted: 1 March 2018
          • Revised: 1 October 2017
          • Received: 1 February 2017
          Published in talg Volume 14, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format