-
Structural Rounding: Approximation Algorithms for Graphs Near an Algorithmically Tractable Class
Authors:
Erik D. Demaine,
Timothy D. Goodrich,
Kyle Kloster,
Brian Lavallee,
Quanquan C. Liu,
Blair D. Sullivan,
Ali Vakilian,
Andrew van der Poel
Abstract:
We develop a new framework for generalizing approximation algorithms from the structural graph algorithm literature so that they apply to graphs somewhat close to that class (a scenario we expect is common when working with real-world networks) while still guaranteeing approximation ratios. The idea is to $\textit{edit}$ a given graph via vertex- or edge-deletions to put the graph into an algorith…
▽ More
We develop a new framework for generalizing approximation algorithms from the structural graph algorithm literature so that they apply to graphs somewhat close to that class (a scenario we expect is common when working with real-world networks) while still guaranteeing approximation ratios. The idea is to $\textit{edit}$ a given graph via vertex- or edge-deletions to put the graph into an algorithmically tractable class, apply known approximation algorithms for that class, and then $\textit{lift}$ the solution to apply to the original graph. We give a general characterization of when an optimization problem is amenable to this approach, and show that it includes many well-studied graph problems, such as Independent Set, Vertex Cover, Feedback Vertex Set, Minimum Maximal Matching, Chromatic Number, ($\ell$-)Dominating Set, Edge ($\ell$-)Dominating Set, and Connected Dominating Set.
To enable this framework, we develop new editing algorithms that find the approximately-fewest edits required to bring a given graph into one of several important graph classes (in some cases, also approximating the target parameter of the family). For bounded degeneracy, we obtain a bicriteria $(4,4)$-approximation which also extends to a smoother bicriteria trade-off. For bounded treewidth, we obtain a bicriteria $(O(\log^{1.5} n), O(\sqrt{\log w}))$-approximation, and for bounded pathwidth, we obtain a bicriteria $(O(\log^{1.5} n), O(\sqrt{\log w} \cdot \log n))$-approximation. For treedepth $2$ (also related to bounded expansion), we obtain a $4$-approximation. We also prove complementary hardness-of-approximation results assuming $\mathrm{P} \neq \mathrm{NP}$: in particular, these problems are all log-factor inapproximable, except the last which is not approximable below some constant factor ($2$ assuming UGC).
△ Less
Submitted 9 December, 2018; v1 submitted 7 June, 2018;
originally announced June 2018.
-
An Updated Experimental Evaluation of Graph Bipartization Methods
Authors:
Timothy D. Goodrich,
Eric Horton,
Blair D. Sullivan
Abstract:
We experimentally evaluate the practical state-of-the-art in graph bipartization (Odd Cycle Transversal), motivated by recent advances in near-term quantum computing hardware and the related embedding problems. We assemble a preprocessing suite of fast input reduction routines from the Odd Cycle Transversal (OCT) and Vertex Cover (VC) literature, and compare algorithm implementations using Quadrat…
▽ More
We experimentally evaluate the practical state-of-the-art in graph bipartization (Odd Cycle Transversal), motivated by recent advances in near-term quantum computing hardware and the related embedding problems. We assemble a preprocessing suite of fast input reduction routines from the Odd Cycle Transversal (OCT) and Vertex Cover (VC) literature, and compare algorithm implementations using Quadratic Unconstrained Binary Optimization problems from the quantum literature. We also generate a corpus of frustrated cluster loop graphs, which have previously been used to benchmark quantum annealing hardware. The diversity of these graphs leads to harder OCT instances than in existing benchmarks.
In addition to combinatorial branching algorithms for solving OCT directly, we study various reformulations into other NP-hard problems such as VC and Integer Linear Programming (ILP), enabling the use of solvers such as CPLEX. We find that for heuristic solutions with time constraints under a second, iterative compression routines jump-started with a heuristic solution perform best, after which point using a highly tuned solver like CPLEX is worthwhile. Results on exact solvers are split between using ILP formulations on CPLEX and solving VC formulations with a branch-and-reduce solver. We extend our results with a large corpus of synthetic graphs, establishing robustness and potential to generalize to other domain data. In total, over 8000 graph instances are evaluated, compared to the previous canonical corpus of 100 graphs.
Finally, we provide all code and data in an open source suite, including a Python API for accessing reduction routines and branching algorithms, along with scripts for fully replicating our results.
△ Less
Submitted 19 March, 2021; v1 submitted 2 May, 2018;
originally announced May 2018.
-
Walk entropy and walk-regularity
Authors:
Kyle Kloster,
Daniel Král',
Blair D. Sullivan
Abstract:
A graph is said to be walk-regular if, for each $\ell \geq 1$, every vertex is contained in the same number of closed walks of length $\ell$. We construct a $24$-vertex graph $H_4$ that is not walk-regular yet has maximized walk entropy, $S^V(H_4,β) = \log 24$, for some $β>0$. This graph is a counterexample to a conjecture of Benzi [Linear Algebra Appl.~443 (2014), 395--399, Conjecture 3.1]. We al…
▽ More
A graph is said to be walk-regular if, for each $\ell \geq 1$, every vertex is contained in the same number of closed walks of length $\ell$. We construct a $24$-vertex graph $H_4$ that is not walk-regular yet has maximized walk entropy, $S^V(H_4,β) = \log 24$, for some $β>0$. This graph is a counterexample to a conjecture of Benzi [Linear Algebra Appl.~443 (2014), 395--399, Conjecture 3.1]. We also show that there exist infinitely many temperatures $β_0>0$ so that $S^V(G,β_0)=\log n_G$ if and only if a graph $G$ is walk-regular.
△ Less
Submitted 7 February, 2018; v1 submitted 31 August, 2017;
originally announced August 2017.
-
On a Conjecture of Andrica and Tomescu
Authors:
Blair D. Sullivan
Abstract:
Let S(n) be the integer sequence which is the coefficient of x^{n(n+1)/4} in the expansion of (1+x)(1+x^2), ..., (1+x^n) for positive integers n congruent to 0 or 3 mod 4. We prove a conjecture of Andrica and Tomescu that S(n) is asymptotic to \sqrt{6/π} 2^n n^{-3/2} as n approaches infinity.
Let S(n) be the integer sequence which is the coefficient of x^{n(n+1)/4} in the expansion of (1+x)(1+x^2), ..., (1+x^n) for positive integers n congruent to 0 or 3 mod 4. We prove a conjecture of Andrica and Tomescu that S(n) is asymptotic to \sqrt{6/π} 2^n n^{-3/2} as n approaches infinity.
△ Less
Submitted 31 October, 2012;
originally announced October 2012.
-
Counting paths in digraphs
Authors:
Paul Seymour,
Blair D. Sullivan
Abstract:
Say a digraph is k-free if it has no directed cycles of length at most k, for positive integers k. Thomasse conjectured that the number of induced 3-vertex directed paths in a simple 2-free digraph on n vertices is at most (n-1)n(n+1)/15. We present an unpublished result of Bondy proving that there are at most 2n^3/25 such paths, and prove that for the class of circular interval digraphs, an upper…
▽ More
Say a digraph is k-free if it has no directed cycles of length at most k, for positive integers k. Thomasse conjectured that the number of induced 3-vertex directed paths in a simple 2-free digraph on n vertices is at most (n-1)n(n+1)/15. We present an unpublished result of Bondy proving that there are at most 2n^3/25 such paths, and prove that for the class of circular interval digraphs, an upper bound of n^3/16 holds. We also study the problem of bounding the number of (non-induced) 4-vertex paths in 3-free digraphs. We show an upper bound of 4n^4/75 using Bondy's result for Thomasse's conjecture.
△ Less
Submitted 31 October, 2012;
originally announced October 2012.
-
Adiabatic Quantum Programming: Minor Embedding With Hard Faults
Authors:
Christine Klymko,
Blair D. Sullivan,
Travis S. Humble
Abstract:
Adiabatic quantum programming defines the time-dependent mapping of a quantum algorithm into an underlying hardware or logical fabric. An essential step is embedding problem-specific information into the quantum logical fabric. We present algorithms for embedding arbitrary instances of the adiabatic quantum optimization algorithm into a square lattice of specialized unit cells. These methods exten…
▽ More
Adiabatic quantum programming defines the time-dependent mapping of a quantum algorithm into an underlying hardware or logical fabric. An essential step is embedding problem-specific information into the quantum logical fabric. We present algorithms for embedding arbitrary instances of the adiabatic quantum optimization algorithm into a square lattice of specialized unit cells. These methods extend with fabric growth while scaling linearly in time and quadratically in footprint. We also provide methods for handling hard faults in the logical fabric without invoking approximations to the original problem, and illustrate their versatility through numerical studies of embeddabilty versus fault rates in square lattices of complete bipartite unit cells. The studies show these algorithms are more resilient to faulty fabrics than naive embedding approaches, a feature which should prove useful in benchmarking the adiabatic quantum optimization algorithm on existing faulty hardware.
△ Less
Submitted 7 November, 2012; v1 submitted 31 October, 2012;
originally announced October 2012.
-
Heights in finite projective space, and a problem on directed graphs
Authors:
Melvyn B. Nathanson,
Blair D. Sullivan
Abstract:
Let $\F_p = \Z/p\Z$. The \emph{height} of a point $\mathbf{a}=(a_1,..., a_d) \in \F_p^d$ is $h_p(\mathbf{a}) = \min \left\{\sum_{i=1}^d (ka_i \mod p) : k=1,...,p-1\right\}.$ Explicit formulas and estimates are obtained for the values of the height function in the case $d=2,$ and these results are applied to the problem of determining the minimum number of edges the must be deleted from a finite…
▽ More
Let $\F_p = \Z/p\Z$. The \emph{height} of a point $\mathbf{a}=(a_1,..., a_d) \in \F_p^d$ is $h_p(\mathbf{a}) = \min \left\{\sum_{i=1}^d (ka_i \mod p) : k=1,...,p-1\right\}.$ Explicit formulas and estimates are obtained for the values of the height function in the case $d=2,$ and these results are applied to the problem of determining the minimum number of edges the must be deleted from a finite directed graph so that the resulting subgraph is acyclic.
△ Less
Submitted 14 March, 2007;
originally announced March 2007.
-
Cycles in dense digraphs
Authors:
Maria Chudnovsky,
Paul Seymour,
Blair D. Sullivan
Abstract:
Let G be a digraph (without parallel edges) such that every directed cycle has length at least four; let $β(G)$ denote the size of the smallest subset X in E(G) such that $G\X$ has no directed cycles, and let $γ(G)$ be the number of unordered pairs {u,v} of vertices such that u,v are nonadjacent in G. It is easy to see that if $γ(G) = 0$ then $β(G) = 0$; what can we say about $β(G)$ if $γ(G)$ is…
▽ More
Let G be a digraph (without parallel edges) such that every directed cycle has length at least four; let $β(G)$ denote the size of the smallest subset X in E(G) such that $G\X$ has no directed cycles, and let $γ(G)$ be the number of unordered pairs {u,v} of vertices such that u,v are nonadjacent in G. It is easy to see that if $γ(G) = 0$ then $β(G) = 0$; what can we say about $β(G)$ if $γ(G)$ is bounded?
We prove that in general $β(G)$ is at most $γ(G)$. We conjecture that in fact $β(G)$ is at most $γ(G)/2$ (this would be best possible if true), and prove this conjecture in two special cases:
1. when V(G) is the union of two cliques,
2. when the vertices of G can be arranged in a circle such that if distinct u,v,w are in clockwise order and uw is a (directed) edge, then so are both uv and vw.
△ Less
Submitted 6 February, 2007;
originally announced February 2007.
-
A Summary of Problems and Results related to the Caccetta-Haggkvist Conjecture
Authors:
Blair Dowling Sullivan
Abstract:
This paper is an attempt to survey the current state of our knowledge on the Caccetta-Haggkvist conjecture and related questions. In January 2006 there was a workshop hosted by the American Institute of Mathematics in Palo Alto, on the Caccetta-Haggkvist conjecture, and this paper partly originated there, as a summary of the open problems and partial results presented at the workshop. This summa…
▽ More
This paper is an attempt to survey the current state of our knowledge on the Caccetta-Haggkvist conjecture and related questions. In January 2006 there was a workshop hosted by the American Institute of Mathematics in Palo Alto, on the Caccetta-Haggkvist conjecture, and this paper partly originated there, as a summary of the open problems and partial results presented at the workshop. This summary includes results and open problems related to Caccetta-Haggkvist, Seymour's Second Neighborhood Conjecture, the k/2 Conjecture (for nonedges), and connections with algebraic number theory through Cayley graphs, along with a number of other related topics.
△ Less
Submitted 24 May, 2006;
originally announced May 2006.