The problems of recognizing series-parallel graphs, outerplanar graphs, and generalized series-parallel graphs have been studied separately in the past. Efficient algorithms have been presented. However, none of the a...
详细信息
The problems of recognizing series-parallel graphs, outerplanar graphs, and generalized series-parallel graphs have been studied separately in the past. Efficient algorithms have been presented. However, none of the algorithms are certifying. A certifying algorithm generates, in addition to its answer, a certificate that can be used by a checker (a separate algorithm) to verify the correctness of the answer. The certificate is positive if the answer is 'yes', and is negative if the answer is 'no'. In this paper, an O(|E| + |V |)-time certifying algorithm that simultaneously determines if a graph G = (V, E) is series- parallel, outerplanar, or generalized series-parallel is presented. The positive certificates are a construction sequence for constructing G if G is series-parallel, a generalized construction sequence for constructing G if G is generalized series-parallel but not series-parallel, and the edge set of the exterior boundary of an outerplanar embedding of G if G is outerplanar. The negative certificates are forbidden subgraphs or forbidden structures of G. All these certificates are generated by making only one pass over G after a preprocessing step decomposing G into its biconnected components.(c) 2022 Elsevier B.V. All rights reserved.
In this paper, we discuss a certifying version of the Lifting algorithm for Horn constraint systems. Recall that a Horn constraint system (HCS) is a specialized polyhedral system that finds application in a number of ...
详细信息
ISBN:
(纸本)9783031712937;9783031712944
In this paper, we discuss a certifying version of the Lifting algorithm for Horn constraint systems. Recall that a Horn constraint system (HCS) is a specialized polyhedral system that finds application in a number of domains such as program verification (abstract interpretation) and operations research. HCSs are closely related to Leontief substitution systems. In previous work, it was established that the problem of checking if a Horn polytope is non-empty is polynomial time solvable. However, that algorithm is not certifying in that if the input HCS is infeasible, it does not provide a certificate which attests to the infeasibility of the HCS. Consequently, the output provided by an implementation of the algorithm is not trustworthy. Trustworthiness is an integral aspect of AI systems. The current paper rectifies this issue by modifying the lifting algorithm to make it certifying. In particular, both "yes" - instances and "no"-instances of input HCSs will be certified through appropriate Farkas' variables. However, the increased trustworthiness of the algorithm comes at a cost;the new algorithm is less efficient than its non-certifying counterpart.
A linear-time certifying algorithm for 3-edge-connectivity is presented. Given a connected undirected graph G, if G is 3-edge-connected, the algorithm generates a construction sequence as a positive certificate for G....
详细信息
A linear-time certifying algorithm for 3-edge-connectivity is presented. Given a connected undirected graph G, if G is 3-edge-connected, the algorithm generates a construction sequence as a positive certificate for G. Otherwise, the algorithm decomposes G into its 3-edge-connected components and generates a construction sequence for each of them as well as the bridges and a cactus representation of the cut-pairs in G as negative certificates. All of these are done by making only one pass over G using an innovative graph contraction technique. Moreover, the graph needs not be 2-edge-connected. The currently best-known algorithm is more complicated as it makes multiple passes over G and uses involved reduction and perturbation techniques rather than just basic graph-theoretic techniques.(c) 2023 Elsevier B.V. All rights reserved.
We present a dynamic algorithm for the recognition of proper circular-arc (PCA) graphs, that supports the insertion and removal of vertices (together with its incident edges). The main feature of the algorithm is that...
详细信息
We present a dynamic algorithm for the recognition of proper circular-arc (PCA) graphs, that supports the insertion and removal of vertices (together with its incident edges). The main feature of the algorithm is that it outputs a minimally non-PCA induced subgraph when the insertion of a vertex fails. Each operation cost O(log n + d) time, where nis the number vertices and dis the degree of the modified vertex. When removals are disallowed, each insertion is processed in O(d) time. The algorithm also provides two constant-time operations to query if the dynamic graph is proper Helly (PHCA) or proper interval (PIG). When the dynamic graph is not PHCA (resp. PIG), a minimally non-PHCA (resp. non-PIG) induced subgraph is obtained. (C) 2021 Elsevier B.V. All rights reserved.
A circular-arc graph is the intersection graph of arcs of a circle. It is a well-studied graph model with numerous natural applications. A certifying algorithm is an algorithm that outputs a certificate, along with it...
详细信息
ISBN:
(纸本)9781510813311
A circular-arc graph is the intersection graph of arcs of a circle. It is a well-studied graph model with numerous natural applications. A certifying algorithm is an algorithm that outputs a certificate, along with its answer (be it positive or negative), where the certificate can be used to easily justify the given answer. While the recognition of circular-arc graphs has been known to be polynomial since the 1980s, no polynomialtime certifying recognition algorithm is known to date, despite such algorithms being found for many subclasses of circular-arc graphs. This is largely due to the fact that a forbidden structure characterization of circulararc graphs is not known, even though the problem has been intensely studied since the seminal work of Klee in the 1960s. In this contribution, we settle this problem. We present the first forbidden structure characterization of circular-arc graphs. Our obstruction has the form of mutually avoiding walks in the graph. It naturally extends a similar obstruction that characterizes interval graphs. As a consequence, we give the first polynomialtime certifying algorithm for the recognition of circulararc graphs.
We give two new linear-time algorithms, one for recognizing proper circular-arc graphs and the other for recognizing unit circular-arc graphs. Both algorithms provide either a model for the input graph, or a certifica...
详细信息
We give two new linear-time algorithms, one for recognizing proper circular-arc graphs and the other for recognizing unit circular-arc graphs. Both algorithms provide either a model for the input graph, or a certificate that proves that such a model does not exist and can be authenticated in O(n) time. No other previous algorithm for each of these two graph classes provides a certificate for its result. (C) 2009 Elsevier B.V. All rights reserved.
Asequence (d(1), d(2),....d(n)) of non-negative integers isgraphical if it is the degree sequence of some graph, that is, there exists a graph G on n vertices whose ith vertex has degree d(i), for 1 . Graphical sequen...
详细信息
Asequence (d(1), d(2),....d(n)) of non-negative integers isgraphical if it is the degree sequence of some graph, that is, there exists a graph G on n vertices whose ith vertex has degree d(i), for 1 <= i <= n. The notion of a graphical sequence has a natural reformulation and generalization in terms of factors of complete graphs. If H = (V, E) is a graph and g and f are integer-valued functions on the vertex set V, then a (g, f)-factor of H is a subgraph G = (V, F) of H whose degree at each vertex nu is an element of V lies in the interval vertical bar g(v),f (v)vertical bar. Thus, a (0,1)-factor is just a matching of H and a (1, I)-factor is a perfect matching of H. If H is complete then a (g,f)-factor realizes a degree sequence that is consistent with the sequence of intervals . Graphical sequences have been extensively studied and admit several elegant characterizations. We are interested in extending these characterizations to non-graphical sequences by introducing a natural measure of "near-graphical". We do this in the context of minimally deficient (g,f)-factors of complete graphs. Our main result is a simple lineartime greedy algorithm for constructing minimally deficient (g,f)-factors in complete graphs that generalizes the method of Hakimi and Havel (for constructing (f,f)-factors in complete graphs, when possible). It has the added advantage of producing a certificate of minimum deficiency (through a generalization of the Erdos-Gallai characterization of (f,f)-factors in complete graphs) at no additional cost. (C) 2008 Elsevier B.V. All rights reserved.
A (2, 1)-colouring of a graph is a partition of its vertex set into two independent sets and a clique (any of which may be empty). We present forbidden induced subgraph characterizations for some hereditary graph clas...
详细信息
A (2, 1)-colouring of a graph is a partition of its vertex set into two independent sets and a clique (any of which may be empty). We present forbidden induced subgraph characterizations for some hereditary graph classes obtained from (2, 1)-colouring by adding restrictions between its parts (e.g., there are no edges between the clique and one of the independent sets). The obtained characterizations yield certifying algorithms to recognize these graph classes, which run in time O(|V| + |E|). All the algorithms presented are straightforward to implement using basic data structures. (C) 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (https://***/licenses/by-nc-nd/4.0)
A (2, 1)-colouring of a graph is a partition of its vertex set into two independent sets and a clique (any of which may be empty). We present forbidden induced subgraph characterizations for some hereditary graph clas...
详细信息
A (2, 1)-colouring of a graph is a partition of its vertex set into two independent sets and a clique (any of which may be empty). We present forbidden induced subgraph characterizations for some hereditary graph classes obtained from (2, 1)-colouring by adding restrictions between its parts (e.g., there are no edges between the clique and one of the independent sets). The obtained characterizations yield certifying algorithms to recognize these graph classes, which run in time O (| V | + | E |). All the algorithms presented are straightforward to implement using basic data structures.
In this paper, we discuss certifying algorithms for zero-clairvoyant scheduling (ZCS) problems. ZCS problems are a class of real-time scheduling problems defined in the scheduling framework [Subramani, K. (2005) A com...
详细信息
In this paper, we discuss certifying algorithms for zero-clairvoyant scheduling (ZCS) problems. ZCS problems are a class of real-time scheduling problems defined in the scheduling framework [Subramani, K. (2005) A comprehensive framework for specifying clairvoyance, constraints and periodicity in real-time scheduling. Comput. J., 48, 259-272]. In ZCS, the dispatcher has no knowledge of the execution time of a given job, even after the job has finished executing. A polynomial-time algorithm for ZCS was proposed in previous work of the first author [Subramani, K. (2007) A polynomial time algorithm for zero-clairvoyant scheduling. J. Appl. Logic, 5, 667-680]. However, the algorithm proposed therein is not certifying. The algorithm that we propose in this paper is certifying, in that it provides a structure that certifies the 'yes'-instances and another structure that certifies the 'no'-instances of ZCS problems. These structures make the discovery of implementation errors straightforward and greatly simplify the software development cycle. Moreover, the certifying algorithm has the same running time (asymptotically) as its non-certifying counterpart. We also show that the proposed certifying technique can be used to certify a class of mathematical programs called E-Quantified Polyhedral programs (E-QPPs). However, for E-QPPs, the proposed certifying algorithm has a higher asymptotic running time than its non-certifying counterpart.
暂无评论