The Graph Isomorphism problem is one of the few problems in NP, but not expected to be NP complete and not known to be in P.In this talk I will review some of the attempts that have been made in order to provide a better classification of the problem in terms of complexity classes reviewing upper and lower bounds and illustrating in this way the utility of several complexity classes.
This document discusses different geometric structures and distances that can be used for clustering probability distributions that live on the probability simplex. It reviews four main geometries: Fisher-Rao Riemannian geometry based on the Fisher information metric, information geometry based on Kullback-Leibler divergence, total variation distance and l1-norm geometry, and Hilbert projective geometry based on the Hilbert metric. It compares how k-means clustering performs using distances derived from these different geometries on the probability simplex.
Clustering in Hilbert geometry for machine learningFrank Nielsen
- The document discusses different geometric approaches for clustering multinomial distributions, including total variation distance, Fisher-Rao distance, Kullback-Leibler divergence, and Hilbert cross-ratio metric.
- It benchmarks k-means clustering using these four geometries on the probability simplex, finding that Hilbert geometry clustering yields good performance with theoretical guarantees.
- The Hilbert cross-ratio metric defines a non-Riemannian Hilbert geometry on the simplex with polytopal balls, and satisfies information monotonicity properties desirable for clustering distributions.
A T(1)-type theorem for entangled multilinear Calderon-Zygmund operatorsVjekoslavKovac1
This document summarizes a talk given by Vjekoslav Kovač at a joint mathematics conference. The talk concerned establishing T(1)-type theorems for entangled multilinear Calderón-Zygmund operators. Specifically, Kovač discussed studying multilinear singular integral forms where the functions partially share variables, known as an "entangled structure." He outlined establishing generalized modulation invariance and Lp estimates for such operators. The talk motivated further studying related problems involving bilinear ergodic averages and forms with more complex graph structures. Kovač specialized his techniques to bipartite graphs, multilinear Calderón-Zygmund kernels, and "perfect" dyadic models.
Computational Information Geometry: A quick review (ICMS)Frank Nielsen
From the workshop
Computational information geometry for image and signal processing
Sep 21, 2015 - Sep 25, 2015
ICMS, 15 South College Street, Edinburgh
http://www.icms.org.uk/workshop.php?id=343
This document discusses context-free grammars and their normal forms. It defines a context-free grammar and provides an example. It also discusses BNF notation, leftmost and rightmost derivations, ambiguity in CFGs, and various normal forms for CFGs including Chomsky normal form and Greibach normal form. Algorithms are provided for removing useless symbols, unit productions, null productions, and converting a CFG to these normal forms. Examples are included to demonstrate solving problems related to these topics.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
This document discusses different geometric structures and distances that can be used for clustering probability distributions that live on the probability simplex. It reviews four main geometries: Fisher-Rao Riemannian geometry based on the Fisher information metric, information geometry based on Kullback-Leibler divergence, total variation distance and l1-norm geometry, and Hilbert projective geometry based on the Hilbert metric. It compares how k-means clustering performs using distances derived from these different geometries on the probability simplex.
Clustering in Hilbert geometry for machine learningFrank Nielsen
- The document discusses different geometric approaches for clustering multinomial distributions, including total variation distance, Fisher-Rao distance, Kullback-Leibler divergence, and Hilbert cross-ratio metric.
- It benchmarks k-means clustering using these four geometries on the probability simplex, finding that Hilbert geometry clustering yields good performance with theoretical guarantees.
- The Hilbert cross-ratio metric defines a non-Riemannian Hilbert geometry on the simplex with polytopal balls, and satisfies information monotonicity properties desirable for clustering distributions.
A T(1)-type theorem for entangled multilinear Calderon-Zygmund operatorsVjekoslavKovac1
This document summarizes a talk given by Vjekoslav Kovač at a joint mathematics conference. The talk concerned establishing T(1)-type theorems for entangled multilinear Calderón-Zygmund operators. Specifically, Kovač discussed studying multilinear singular integral forms where the functions partially share variables, known as an "entangled structure." He outlined establishing generalized modulation invariance and Lp estimates for such operators. The talk motivated further studying related problems involving bilinear ergodic averages and forms with more complex graph structures. Kovač specialized his techniques to bipartite graphs, multilinear Calderón-Zygmund kernels, and "perfect" dyadic models.
Computational Information Geometry: A quick review (ICMS)Frank Nielsen
From the workshop
Computational information geometry for image and signal processing
Sep 21, 2015 - Sep 25, 2015
ICMS, 15 South College Street, Edinburgh
http://www.icms.org.uk/workshop.php?id=343
This document discusses context-free grammars and their normal forms. It defines a context-free grammar and provides an example. It also discusses BNF notation, leftmost and rightmost derivations, ambiguity in CFGs, and various normal forms for CFGs including Chomsky normal form and Greibach normal form. Algorithms are provided for removing useless symbols, unit productions, null productions, and converting a CFG to these normal forms. Examples are included to demonstrate solving problems related to these topics.
This document summarizes research on using elliptic curve cryptography based on imaginary quadratic orders. It shows that for elliptic curves over a finite field Fq, if q satisfies certain conditions, the elliptic curve discrete logarithm problem can be reduced to the discrete logarithm problem over the finite field Fp2. This allows the elliptic curve discrete logarithm problem to potentially be solved faster. It then provides examples of how to construct "weak curves" that satisfy the necessary conditions.
This document discusses zero-one laws for random graphs G(n,p). It defines first-order graph properties and limit probabilities for G(n,p). There is a zero-one law if all first-order properties converge to 0 or 1 as n approaches infinity. The document shows that if p=n-α and α is irrational, G(n,p) obeys the zero-one law. It also discusses bounded quantifier depth properties and critical points where the zero-one law may fail for rational α values.
Total Dominating Color Transversal Number of Graphs And Graph Operationsinventionjournals
Total Dominating Color Transversal Set of a graph is a Total Dominating Set of the graph which is also Transversal of Some 휒 - Partition of the graph. Here 휒 is the Chromatic number of the graph. Total Dominating Color Transversal number of a graph is the cardinality of a Total Dominating Color Transversal Set which has minimum cardinality among all such sets that the graph admits. In this paper, we consider the well known graph operations Join, Corona, Strong product and Lexicographic product of graphs and determine Total Dominating Color Transversal number of the resultant graphs.
A labeling of graph G is a mapping that carries a set of graph elements into a set of numbers (Usually positive integers) called labels. An edge magic labeling on a graph with p vertices and q edges will be defined as a one-to-one map taking the vertices and edges onto the integers 1,2,----,
p+q with the property that the sum of the label on an edge and the labels of its end vertices is constant independent of the choice of edge.
This document discusses multilinear twisted paraproducts, which are generalizations of classical paraproduct operators to higher dimensions. It begins by reviewing classical paraproducts on the real line and their generalization to higher dimensions using dyadic squares. It then discusses complications that arise, such as twisted paraproducts. The document presents a unified framework for studying such operators using bipartite graphs and selections of vertices. It proves a main boundedness result and discusses special cases like classical dyadic paraproducts and dyadic twisted paraproducts. It introduces tools like Bellman functions and calculus of finite differences to analyze estimates for paraproduct-like operators on finite trees of dyadic squares.
The document presents algorithms for finding the largest induced q-colorable subgraph of a given graph G. It first describes a randomized algorithm that runs in time proportional to enumerating maximal independent sets and a polynomial in n and q. For perfect graphs, where maximum independent sets can be found efficiently, it gives a deterministic algorithm running in similar time. It also shows that the problem does not admit a polynomial kernel when parameterized by the solution size for split and perfect graphs under standard assumptions.
We study QPT (quasi-polynomial tractability) in the worst case setting of linear tensor product problems defined over Hilbert spaces. We prove QPT for algorithms that use only function values under three assumptions'
1. the minimal errors for the univariate case decay polynomially fast to zero,
2. the largest singular value for the univariate case is simple,
3. the eigenfunction corresponding to the largest singular value is a multiple of the function value at some point.
The first two assumptions are necessary for QPT. The third assumption is necessary for QPT for some Hilbert spaces.
Joint work with Erich Novak
On Convolution of Graph Signals and Deep Learning on Graph DomainsJean-Charles Vialatte
This document provides an outline and definitions for a thesis on convolution of graph signals and deep learning on graph domains. It discusses motivations, related work, definitions of graph signals and convolution, and different approaches to extending convolution operations to non-Euclidean graph domains. Specifically, it covers spectral approaches that define convolution in the graph spectral domain, vertex-domain approaches that define it as a sum over neighborhoods, and characterizes convolutional operators by their equivariance properties. It also discusses applications to deep learning on graphs and different notions of graph convolution.
Kernelization algorithms for graph and other structure modification problemsAnthony Perez
The document discusses kernelization algorithms for graph modification problems. It begins by introducing graph modification problems, which take as input a graph and property and output the minimum number of modifications to the graph to satisfy the property. It then discusses using parameterized complexity to more efficiently solve NP-hard graph modification problems. In particular, it covers the concept of kernels, which are polynomial-time algorithms that reduce an instance to an equivalent instance of size bounded by a function of the parameter. The document provides an overview of generic reduction rules and the concept of branches that can be applied to graph modification problems. It also introduces the specific problem of proper interval completion and known results about its parameterized complexity.
We propose a way to unify two approaches of non-cloning in quantum lambda-calculi. The first approach is to forbid duplicating variables, while the second is to consider all lambda-terms as algebraic-linear functions. We illustrate this idea by defining a quantum extension of first-order simply-typed lambda-calculus, where the type is linear on superposition, while allows cloning base vectors. In addition, we provide an interpretation of the calculus where superposed types are interpreted as vector spaces and non-superposed types as their basis.
Slides of LNCS 10687:281-293 paper (TPNC 2017). Full paper: https://doi.org/10.1007/978-3-319-71069-3_22
The document discusses exponential decay of solutions to a second-order linear differential equation involving a self-adjoint positive operator A and an accretive damping operator D. Several theorems establish conditions under which the associated operator semigroup or pencil generates exponential decay. If D is accretive and satisfies certain positivity conditions, the semigroup will decay exponentially. Explicit bounds on the rate of decay and estimates of the spectrum are provided depending on properties of A and D.
Optimal order a posteriori error bounds for semilinear parabolic equations are derived by using discontinuous Galerkin method in time and continuous (conforming) finite element in space. Our main tools in this analysis the reconstruction in time and elliptic reconstruction in space with Gronwall’s lemma and continuation argument.
Numerical approach for Hamilton-Jacobi equations on a network: application to...Guillaume Costeseque
This document presents a numerical scheme for solving Hamilton-Jacobi equations on networks to model traffic flow. It describes applying a Godunov-type scheme using finite differences on networks consisting of branches connected at junctions. The scheme computes numerical solutions of the Hamilton-Jacobi equations on each branch and couples them at junctions using maximum operations. Gradient estimates, existence and uniqueness, and convergence properties of the numerical solutions are proven. The document also interprets the numerical solutions in terms of discrete car densities on the branches and shows the scheme is consistent with classical macroscopic traffic models.
To describe the dynamics taking place in networks that structurally change over time, we propose an approach to search for attributes whose value changes impact the topology of the graph. In several applications, it appears that the variations of a group of attributes are often followed by some structural changes in the graph that one may assume they generate. We formalize the triggering pattern discovery problem as a method jointly rooted in sequence mining and graph analysis. We apply our approach on three real-world dynamic graphs of different natures - a co-authoring network, an airline network, and a social bookmarking system - assessing the relevancy of the triggering pattern mining approach.
The document presents duality theory for composite geometric programs (CGPs), which include exponential GPs (EGPs) as a special case. An EGP allows some posynomial terms in the objective function to be multiplied by an exponential factor of another posynomial term. The key results are:
1) EGP problems can be formulated as convex programs by a change of variables.
2) The dual problem of an EGP is a posynomial program.
3) Strong duality holds between primal and dual EGP programs, and optimal solutions can be recovered from each other using extremality conditions.
4) Motivating examples like maximum likelihood estimation of Poisson and exponential parameters can be solved as
Gentle Introduction to Dirichlet ProcessesYap Wooi Hen
This document provides an introduction to Dirichlet processes. It begins by motivating the need for nonparametric clustering when the number of clusters in the data is unknown. It then provides an overview of Dirichlet processes and discusses them from multiple perspectives, including samples from a Dirichlet process, the Chinese restaurant process representation, stick breaking construction, and formal definition. It also covers Dirichlet process mixtures and common inference techniques like Markov chain Monte Carlo and variational inference.
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESgraphhoc
This document summarizes research on calculating the Grundy number of fat-extended P4-laden graphs. It begins by introducing the Grundy number and discussing that it is NP-complete to calculate for general graphs. It then presents previous work that has found polynomial time algorithms to calculate the Grundy number for certain graph classes. The main results are that the document proves that the Grundy number can be calculated in polynomial time, specifically O(n3) time, for fat-extended P4-laden graphs by traversing their modular decomposition tree. This implies the Grundy number can also be calculated efficiently for several related graph classes that are contained within fat-extended P4-laden graphs.
The document is a research paper that presents new results on odd harmonious graphs. It introduces the concepts of m-shadow graphs and m-splitting graphs. The paper proves that m-shadow graphs of paths and complete bipartite graphs are odd harmonious for all m ≥ 1. It also proves that n-splitting graphs of paths, stars and symmetric products of paths and null graphs are odd harmonious for all n ≥ 1. Additional families of graphs, including m-shadow graphs of stars and various graph constructions using paths, stars and their splitting graphs, are shown to admit odd harmonious labeling.
This document provides an introduction to graph theory concepts. It defines graphs as mathematical objects consisting of nodes and edges. Both directed and undirected graphs are discussed. Key graph properties like paths, cycles, degrees, and connectivity are defined. Classic graph problems introduced include Eulerian circuits, Hamiltonian circuits, spanning trees, and graph coloring. Graph theory is a fundamental area of mathematics with applications in artificial intelligence.
Graph isomorphism is the problem of determining whether two graphs are topologically identical. It is in NP but not known to be NP-complete. The refinement heuristic iteratively partitions vertices into equivalence classes to reduce possible mappings between graphs. For trees, there is a linear-time algorithm that labels vertices based on subtree structure to test rooted and unrooted tree isomorphism.
This document discusses zero-one laws for random graphs G(n,p). It defines first-order graph properties and limit probabilities for G(n,p). There is a zero-one law if all first-order properties converge to 0 or 1 as n approaches infinity. The document shows that if p=n-α and α is irrational, G(n,p) obeys the zero-one law. It also discusses bounded quantifier depth properties and critical points where the zero-one law may fail for rational α values.
Total Dominating Color Transversal Number of Graphs And Graph Operationsinventionjournals
Total Dominating Color Transversal Set of a graph is a Total Dominating Set of the graph which is also Transversal of Some 휒 - Partition of the graph. Here 휒 is the Chromatic number of the graph. Total Dominating Color Transversal number of a graph is the cardinality of a Total Dominating Color Transversal Set which has minimum cardinality among all such sets that the graph admits. In this paper, we consider the well known graph operations Join, Corona, Strong product and Lexicographic product of graphs and determine Total Dominating Color Transversal number of the resultant graphs.
A labeling of graph G is a mapping that carries a set of graph elements into a set of numbers (Usually positive integers) called labels. An edge magic labeling on a graph with p vertices and q edges will be defined as a one-to-one map taking the vertices and edges onto the integers 1,2,----,
p+q with the property that the sum of the label on an edge and the labels of its end vertices is constant independent of the choice of edge.
This document discusses multilinear twisted paraproducts, which are generalizations of classical paraproduct operators to higher dimensions. It begins by reviewing classical paraproducts on the real line and their generalization to higher dimensions using dyadic squares. It then discusses complications that arise, such as twisted paraproducts. The document presents a unified framework for studying such operators using bipartite graphs and selections of vertices. It proves a main boundedness result and discusses special cases like classical dyadic paraproducts and dyadic twisted paraproducts. It introduces tools like Bellman functions and calculus of finite differences to analyze estimates for paraproduct-like operators on finite trees of dyadic squares.
The document presents algorithms for finding the largest induced q-colorable subgraph of a given graph G. It first describes a randomized algorithm that runs in time proportional to enumerating maximal independent sets and a polynomial in n and q. For perfect graphs, where maximum independent sets can be found efficiently, it gives a deterministic algorithm running in similar time. It also shows that the problem does not admit a polynomial kernel when parameterized by the solution size for split and perfect graphs under standard assumptions.
We study QPT (quasi-polynomial tractability) in the worst case setting of linear tensor product problems defined over Hilbert spaces. We prove QPT for algorithms that use only function values under three assumptions'
1. the minimal errors for the univariate case decay polynomially fast to zero,
2. the largest singular value for the univariate case is simple,
3. the eigenfunction corresponding to the largest singular value is a multiple of the function value at some point.
The first two assumptions are necessary for QPT. The third assumption is necessary for QPT for some Hilbert spaces.
Joint work with Erich Novak
On Convolution of Graph Signals and Deep Learning on Graph DomainsJean-Charles Vialatte
This document provides an outline and definitions for a thesis on convolution of graph signals and deep learning on graph domains. It discusses motivations, related work, definitions of graph signals and convolution, and different approaches to extending convolution operations to non-Euclidean graph domains. Specifically, it covers spectral approaches that define convolution in the graph spectral domain, vertex-domain approaches that define it as a sum over neighborhoods, and characterizes convolutional operators by their equivariance properties. It also discusses applications to deep learning on graphs and different notions of graph convolution.
Kernelization algorithms for graph and other structure modification problemsAnthony Perez
The document discusses kernelization algorithms for graph modification problems. It begins by introducing graph modification problems, which take as input a graph and property and output the minimum number of modifications to the graph to satisfy the property. It then discusses using parameterized complexity to more efficiently solve NP-hard graph modification problems. In particular, it covers the concept of kernels, which are polynomial-time algorithms that reduce an instance to an equivalent instance of size bounded by a function of the parameter. The document provides an overview of generic reduction rules and the concept of branches that can be applied to graph modification problems. It also introduces the specific problem of proper interval completion and known results about its parameterized complexity.
We propose a way to unify two approaches of non-cloning in quantum lambda-calculi. The first approach is to forbid duplicating variables, while the second is to consider all lambda-terms as algebraic-linear functions. We illustrate this idea by defining a quantum extension of first-order simply-typed lambda-calculus, where the type is linear on superposition, while allows cloning base vectors. In addition, we provide an interpretation of the calculus where superposed types are interpreted as vector spaces and non-superposed types as their basis.
Slides of LNCS 10687:281-293 paper (TPNC 2017). Full paper: https://doi.org/10.1007/978-3-319-71069-3_22
The document discusses exponential decay of solutions to a second-order linear differential equation involving a self-adjoint positive operator A and an accretive damping operator D. Several theorems establish conditions under which the associated operator semigroup or pencil generates exponential decay. If D is accretive and satisfies certain positivity conditions, the semigroup will decay exponentially. Explicit bounds on the rate of decay and estimates of the spectrum are provided depending on properties of A and D.
Optimal order a posteriori error bounds for semilinear parabolic equations are derived by using discontinuous Galerkin method in time and continuous (conforming) finite element in space. Our main tools in this analysis the reconstruction in time and elliptic reconstruction in space with Gronwall’s lemma and continuation argument.
Numerical approach for Hamilton-Jacobi equations on a network: application to...Guillaume Costeseque
This document presents a numerical scheme for solving Hamilton-Jacobi equations on networks to model traffic flow. It describes applying a Godunov-type scheme using finite differences on networks consisting of branches connected at junctions. The scheme computes numerical solutions of the Hamilton-Jacobi equations on each branch and couples them at junctions using maximum operations. Gradient estimates, existence and uniqueness, and convergence properties of the numerical solutions are proven. The document also interprets the numerical solutions in terms of discrete car densities on the branches and shows the scheme is consistent with classical macroscopic traffic models.
To describe the dynamics taking place in networks that structurally change over time, we propose an approach to search for attributes whose value changes impact the topology of the graph. In several applications, it appears that the variations of a group of attributes are often followed by some structural changes in the graph that one may assume they generate. We formalize the triggering pattern discovery problem as a method jointly rooted in sequence mining and graph analysis. We apply our approach on three real-world dynamic graphs of different natures - a co-authoring network, an airline network, and a social bookmarking system - assessing the relevancy of the triggering pattern mining approach.
The document presents duality theory for composite geometric programs (CGPs), which include exponential GPs (EGPs) as a special case. An EGP allows some posynomial terms in the objective function to be multiplied by an exponential factor of another posynomial term. The key results are:
1) EGP problems can be formulated as convex programs by a change of variables.
2) The dual problem of an EGP is a posynomial program.
3) Strong duality holds between primal and dual EGP programs, and optimal solutions can be recovered from each other using extremality conditions.
4) Motivating examples like maximum likelihood estimation of Poisson and exponential parameters can be solved as
Gentle Introduction to Dirichlet ProcessesYap Wooi Hen
This document provides an introduction to Dirichlet processes. It begins by motivating the need for nonparametric clustering when the number of clusters in the data is unknown. It then provides an overview of Dirichlet processes and discusses them from multiple perspectives, including samples from a Dirichlet process, the Chinese restaurant process representation, stick breaking construction, and formal definition. It also covers Dirichlet process mixtures and common inference techniques like Markov chain Monte Carlo and variational inference.
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESgraphhoc
This document summarizes research on calculating the Grundy number of fat-extended P4-laden graphs. It begins by introducing the Grundy number and discussing that it is NP-complete to calculate for general graphs. It then presents previous work that has found polynomial time algorithms to calculate the Grundy number for certain graph classes. The main results are that the document proves that the Grundy number can be calculated in polynomial time, specifically O(n3) time, for fat-extended P4-laden graphs by traversing their modular decomposition tree. This implies the Grundy number can also be calculated efficiently for several related graph classes that are contained within fat-extended P4-laden graphs.
The document is a research paper that presents new results on odd harmonious graphs. It introduces the concepts of m-shadow graphs and m-splitting graphs. The paper proves that m-shadow graphs of paths and complete bipartite graphs are odd harmonious for all m ≥ 1. It also proves that n-splitting graphs of paths, stars and symmetric products of paths and null graphs are odd harmonious for all n ≥ 1. Additional families of graphs, including m-shadow graphs of stars and various graph constructions using paths, stars and their splitting graphs, are shown to admit odd harmonious labeling.
This document provides an introduction to graph theory concepts. It defines graphs as mathematical objects consisting of nodes and edges. Both directed and undirected graphs are discussed. Key graph properties like paths, cycles, degrees, and connectivity are defined. Classic graph problems introduced include Eulerian circuits, Hamiltonian circuits, spanning trees, and graph coloring. Graph theory is a fundamental area of mathematics with applications in artificial intelligence.
Graph isomorphism is the problem of determining whether two graphs are topologically identical. It is in NP but not known to be NP-complete. The refinement heuristic iteratively partitions vertices into equivalence classes to reduce possible mappings between graphs. For trees, there is a linear-time algorithm that labels vertices based on subtree structure to test rooted and unrooted tree isomorphism.
This document provides an introduction to fundamental concepts in graph theory. It defines what a graph is composed of and different graph types including simple graphs, directed graphs, bipartite graphs, and complete graphs. It discusses graph terminology such as vertices, edges, paths, cycles, components, and subgraphs. It also covers graph properties like connectivity, degrees, isomorphism, and graph coloring. Examples are provided to illustrate key graph concepts and theorems are stated about properties of graphs like the Petersen graph and graph components.
This document provides an overview of graph theory concepts including:
- The basics of graphs including definitions of vertices, edges, paths, cycles, and graph representations like adjacency matrices.
- Minimum spanning tree algorithms like Kruskal's and Prim's which find a spanning tree with minimum total edge weight.
- Graph coloring problems and their applications to scheduling problems.
- Other graph concepts covered include degree, Eulerian paths, planar graphs and graph isomorphism.
This document provides definitions and theorems related to graph theory. It begins with definitions of simple graphs, vertices, edges, degree, and the handshaking lemma. It then covers definitions and properties of paths, cycles, adjacency matrices, connectedness, Euler paths and circuits. The document also discusses Hamilton paths, planar graphs, trees, and other special types of graphs like complete graphs and bipartite graphs. It provides examples and proofs of many graph theory concepts and results.
The document provides notes on group theory. It discusses the definition of groups and examples of groups such as (Z, +), (Q, ×), and Sn. Properties of groups like Lagrange's theorem and criteria for subgroups are also covered. The notes then discuss symmetry groups, defining isometries of R2 and showing that the set of isometries forms a group. Symmetry groups G(Π) of objects Π in R2 are introduced and shown to be subgroups. Specific examples of symmetry groups like those of triangles, squares, regular n-gons, and infinite strips are analyzed. Finally, the concept of group isomorphism is defined and examples are given to illustrate isomorphic groups.
On the equality of the grundy numbers of a graphijngnjournal
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked(affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. Thus the problem of stability of the network ad hoc which corresponds to a problem of allocation of frequency amounts to a problem of allocation of colors in the vertex of graph. we present use a parameter of coloring " the number of Grundy”. The Grundy number of a graph G, denoted by Γ(G), is the largest k such that G has a greedy k-coloring, that is a coloring with colours obtained by applying the greedy algorithm according to some ordering of the vertices of G. In this paper, we study the Grundy number of the lexicographic, Cartesian and direct products of two graphs in terms of the Grundy numbers of these graphs.
On the Equality of the Grundy Numbers of a Graphjosephjonse
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked(affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. Thus the problem of stability of the network ad hoc which corresponds to a problem of allocation of frequency amounts to a problem of allocation of colors in the vertex of graph. we present use a parameter of coloring " the number of Grundy”. The Grundy number of a graph G, denoted by Γ(G), is the largest k such that G has a greedy k-coloring, that is a coloring with colours obtained by applying the greedy algorithm according to some ordering of the vertices of G. In this paper, we study the Grundy number of the lexicographic, Cartesian and direct products of two graphs in terms of the Grundy numbers of these graphs.
This document provides lecture notes on complex analysis covering four units of content:
1) The index of a close curve, Cauchy's theorem, and entire functions.
2) Counting zeroes, meromorphic functions, and maximum principle.
3) Spaces of continuous and analytic functions, and behavior of functions.
4) Comparison of entire functions, analytic continuation, and harmonic functions.
It also provides definitions and theorems regarding integrals over rectifiable curves, winding numbers, and Cauchy's theorem. Exercises and proofs are included.
On the-approximate-solution-of-a-nonlinear-singular-integral-equationCemal Ardil
This document summarizes a study on finding approximate solutions to nonlinear singular integral equations. The study proves the existence and uniqueness of solutions to such equations defined on bounded regions of the complex plane. It then presents a method for finding approximate solutions using an iterative fixed-point principle approach. Nonlinear singular integral equations have many applications in fields like elasticity, fluid mechanics, and mathematical physics. The study contributes to improving methods for solving these important types of equations.
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
This document presents a common fixed point theorem for two self-mappings S and T on a G-metric space X that satisfies a contractive condition of integral type. It begins with definitions related to G-metric spaces and contractive conditions. It then states Theorem 1.1, which proves that if S and T satisfy the given integral type contractive condition, along with other listed conditions, then S and T have a unique point of coincidence in X. If S and T are also weakly compatible, then they have a unique common fixed point. The proof of Theorem 1.1 is then provided.
A crystallographic group is a group acting on R^n that contains a translation subgroup Z^n as a finite index subgroup. Here we consider which Coxeter groups are crystallographic groups. We also expose the enumeration in dimension 2 and 3. Then we shortly give the principle under which the enumeration of N dimensional crystallographic groups is done.
This document defines and describes concepts related to fuzzy graphs and fuzzy digraphs. Key points include:
- A fuzzy graph is defined by two functions that assign membership values to vertices and edges.
- A fuzzy subgraph has lower or equal membership values for vertices and edges compared to the original graph.
- Effective edges and effective paths only include edges/paths where the membership equals the minimum vertex membership.
- Various graph measures are generalized to fuzzy graphs, such as vertex degree, order, size, and domination number.
- Fuzzy digraphs are defined similarly but with directed edges. Concepts like paths, independence, and domination are extended to fuzzy digraphs.
IRJET- Independent Middle Domination Number in Jump GraphIRJET Journal
This document discusses independent middle domination number (iM(J(G))) in jump graphs. It defines iM(J(G)) as the minimum cardinality of an independent dominating set of the middle graph M(J(G)). The paper obtains several bounds on iM(J(G)) in terms of the vertices, edges, and other parameters of J(G). It also establishes relationships between iM(J(G)) and other domination parameters such as domination number, strong split domination number, and edge domination number. Exact values of iM(J(G)) are determined for some standard jump graphs like paths, cycles, stars, and wheels.
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)Yandex
We study asymptotical behavior of the probabilities of first-order properties for Erdős-Rényi random graphs G(n,p(n)) with p(n)=n-α, α ∈ (0,1). The following zero-one law was proved in 1988 by S. Shelah and J.H. Spencer [1]: if α is irrational then for any first-order property L either the random graph satisfies the property L asymptotically almost surely or it doesn't satisfy (in such cases the random graph is said to obey zero-one law. When α ∈ (0,1) is rational the zero-one law for these graphs doesn't hold.
Let k be a positive integer. Denote by Lk the class of the first-order properties of graphs defined by formulae with quantifier depth bounded by the number k (the sentences are of a finite length). Let us say that the random graph obeys zero-one k-law, if for any first-order property L ∈ Lk either the random graph satisfies the property L almost surely or it doesn't satisfy. Since 2010 we prove several zero-one $k$-laws for rational α from Ik=(0, 1/(k-2)] ∪ [1-1/(2k-1), 1). For some points from Ik we disprove the law. In particular, for α ∈ (0, 1/(k-2)) ∪ (1-1/2k-2, 1) zero-one k-law holds. If α ∈ {1/(k-2), 1-1/(2k-2)}, then zero-one law does not hold (in such cases we call the number α k-critical).
We also disprove the law for some α ∈ [2/(k-1), k/(k+1)]. From our results it follows that zero-one 3-law holds for any α ∈ (0,1). Therefore, there are no 3-critical points in (0,1). Zero-one 4-law holds when α ∈ (0,1/2) ∪ (13/14,1). Numbers 1/2 and 13/14 are 4-critical. Moreover, we know some rational 4-critical and not 4-critical numbers in [7/8,13/14). The number 2/3 is 4-critical. Recently we obtain new results concerning zero-one 4-laws for the neighborhood of the number 2/3.
References
[1] S. Shelah, J.H. Spencer, Zero-one laws for sparse random graphs, J. Amer. Math. Soc.
1: 97–115, 1988.
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSTahia ZERIZER
In this article, we study boundary value problems of a large
class of non-linear discrete systems at two-time-scales. Algorithms are given to implement asymptotic solutions for any order of approximation.
This document provides definitions and theorems related to domination and strong domination of graphs. It begins with introductions to graph theory concepts like vertex degree. It then defines different types of domination like dominating sets, connected dominating sets, and k-dominating sets. Further definitions include total domination, strong domination, and dominating cycles. Theorems are provided that relate strong domination number to independence number and domination number. The document concludes by discussing applications of domination in fields like communication networks and distributing computer resources.
A Szemeredi-type theorem for subsets of the unit cubeVjekoslavKovac1
This document summarizes a talk on gaps between arithmetic progressions in subsets of the unit cube. It presents three key propositions:
1) For subsets A of positive measure, structured progressions contribute a lower bound depending on the measure of A and the best known bounds for Szemerédi's theorem.
2) Estimating errors by pigeonholing scales, the difference between smooth and sharp progressions over various scales is bounded above by a sublinear function of scales.
3) For sufficiently nice subsets, the difference between measure and smoothed measure is arbitrarily small by choosing a small smoothing parameter.
Combining these propositions shows that for sufficiently nice subsets, gaps between progressions contain an interval
Mean Absolute Percentage Error for regression models, presentation of the paper published in Neurocomputing, 2016.
http://www.sciencedirect.com/science/article/pii/S0925231216003325
This document summarizes the work of Raffaele Rainone on deriving bounds on the dimension of fixed point spaces for actions of classical algebraic groups. It begins by introducing algebraic groups and their actions on varieties. It then discusses conjugacy classes and computing dimensions of centralizers for elements of classical groups. The main results provide global and local bounds on the dimension of fixed point spaces for elements of prime order when the group is a classical group and the variety consists of cosets for certain geometric subgroups. Several open problems are posed regarding improving these bounds.
A Szemerédi-type theorem for subsets of the unit cubeVjekoslavKovac1
This document summarizes a talk on establishing a Szemerédi-type theorem for subsets of the unit cube. It discusses using a "largeness/smoothness multiscale approach" to control three key quantities: the structured part using known bounds on Szemerédi's theorem, the error part involving multilinear singular integrals, and the uniform part using Gowers uniformity norms. The proof strategy is to show the existence of progression gaps in subsets of positive measure by bounding the sum of these quantities below a threshold. An open problem is establishing a stronger property for subsets of positive upper Banach density.
Cryptography and Data Security often relies on number theory concepts. This document reviews several key number theory topics used in cryptography, including: 1) integers modulo n and Euler's totient function; 2) Euler's theorem and Fermat's theorem; 3) the greatest common divisor and Euclid's algorithm; and 4) polynomials and finite fields. Finite fields play an important role in cryptography by allowing the representation of data as field elements.
Similar to Complexity Classes and the Graph Isomorphism Problem (20)
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...cseiitgn
The document summarizes a talk on obtaining subexponential time algorithms for NP-hard problems on planar graphs. It discusses using treewidth and tree decompositions to solve problems like 3-coloring in 2O(√n) time on n-vertex planar graphs. It also discusses the exponential time hypothesis and how it implies lower bounds, showing these algorithms are optimal up to constant factors in the exponent. The document outlines several chapters, including using grid minors and bidimensionality to obtain 2O(√k) algorithms for problems like k-path, even for some W[1]-hard problems parameterized by k.
Much of the early work on parameterized complexity considered the solution size as the parameter when parameterizing optimization problems, with a possible exception of treewidth. This talk will survey results and open problems on *alternate parameterizations*, where the parameter is typically some structure of the input or the distance of the output size from a guarantee.
Dynamic Parameterized Problems - Algorithms and Complexitycseiitgn
In this talk, we will discuss the parameterized complexity of various classical graph-theoretic problems in the dynamic framework where the input graph is being updated by a sequence of edge additions and deletions. We will describe fixed-parameter tractable algorithms and lower bounds on the running time of algorithms for these problems.
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphscseiitgn
We present a Logspace Approximation Scheme (LSAS), i.e. an approximation algorithm for maximum matching in planar graphs (not necessarily bipartite) that achieves an approximation ratio arbitrarily close to one, in Logspace This deviates from the well known Baker’s approach for approximation in planar graphs by avoiding the use of distance computation - which is not known to be in Logspace. Our algorithm actually works for any “recursively sparse” graph class which contains a linear size matching.The scheme is based on an LSAS in bounded degree graphs which are not known to be amenable to Baker’s method. We solve the bounded degree case by parallel augmentation of short augmenting paths. Finding a large number of such disjoint paths can, in turn, be reduced to finding a large independent set in a bounded degree graph. This is joint work with Samir Datta and Raghav Kulkarni.
A multiple choice problem consists of a set of color classes P = {C1 , C2 , . . . , Cn }. Each color class Ci consists of a pair of objects typically a pair of points. Objective of such a problem, is to select one object from each color class such that certain optimality criteria is satisfied. One example of such problem is rainbow minmax gap problem(RMGP). In RMGP, given P, the objective is to select exactly one point from each color class, such that the maximum distance between a pair of consecutive selected points is minimized. This problem was studied by Consuegra and Narasimhan. We show that the problem is NP-hard. For our proof we also describe an auxiliary result on satisfiability. A 3-SAT formula is an LSAT formula if each clause (viewed as a set of literals) intersects at most one other clause, and, moreover, if two clauses intersect, then they have exactly one literal in common. We show that the problem of deciding whether an LSAT formula is satisfiable or not is NP-complete. We also briefly describe some approximation results of some multiple choice problems.
The Chasm at Depth Four, and Tensor Rank : Old results, new insightscseiitgn
Agrawal and Vinay [FOCS 2008] showed how any polynomial size arithmetic circuit can be thought of as a depth four arithmetic circuit of subexponential size. The resulting circuit size in this simulation was more carefully analyzed by Koiran [TCS 2012] and subsequently by Tavenas [MFCS 2013]. We provide a simple proof of this chain of results. We then abstract the main ingredient to apply it to formulas and constant depth circuits, and show more structured depth reductions for them.In an apriori surprising result, Raz [STOC 2010] showed that for any $n$ and $d$, such that $\omega(1) \leq d \leq O(logn/loglogn)$, constructing explicit tensors $T: [n] \rightarrow F$ of high enough rank would imply superpolynomial lower bounds for arithmetic formulas over the field F. Using the additional structure we obtain from our proof of the depth reduction for arithmetic formulas, we give a new and arguably simpler proof of this connection. We also extend this result for homogeneous formulas to show that, in fact, the connection holds for any d such that $\omega(1) \leq d \leq n^{o(1)}$. Joint work with Mrinal Kumar, Ramprasad Saptharishi and V Vinay.
Isolation Lemma for Directed Reachability and NL vs. Lcseiitgn
We discuss versions of isolation lemma for problems in NP and NL. We then show that improving the success probability of the isolation lemma is equivalent to some complexity theoretic collapses such as NP is in P/poly and NL is in L/poly. Basic familiarity with complexity classes such as NP, P/poly, NL will be assumed. All the other notions used in the talk will be introduced during the talk.
Unbounded Error Communication Complexity of XOR Functionscseiitgn
The document discusses unbounded error communication complexity of XOR functions. It presents a main theorem that for any MODm function, where m is expressed as j2k with j odd or 4, the unbounded error protocol complexity of MODm ∘ XOR is Ω(n/jm). The proof outline involves relating complexity to the spectral norm of the communication matrix using Fourier analysis of MODm functions for odd m. An upper bound is also presented along with prior work on characterizing complexity of symmetric XOR functions.
Narrow sieves, representative sets and divide-and-color are three breakthrough techniques related to color coding, which led to the design of extremely fast parameterized algorithms. In this talk, I will discuss the power and limitations of these techniques. I will also briefly address some recent developments related to these techniques, including general schemes for mixing them.
Solving connectivity problems via basic Linear Algebracseiitgn
Directed reachability and undirected connectivity are well studied problems in Complexity Theory. Reachability/Connectivity between distinct pairs of vertices through disjoint paths are well known but hard variations. We talk about recent algorithms to solve variants and restrictions of these problems in the static and dynamic settings by reductions to the determinant.
We study communication cost of computing functions when inputs are distributed among k processors, each of which is located at one vertex of a network/graph called a terminal. Every other node of the network also has a processor, with no input. The communication is point-to-point and the cost is the total number of bits exchanged by the protocol, in the worst case, on all edges. Our results show the effect of topology of the network on the total communication cost. We prove tight bounds for simple functions like Element-Distinctness (ED), which depend on the 1-median of the graph. On the other hand, we show that for a large class of natural functions like Set-Disjointness the communication cost is essentially n times the cost of the optimal Steiner tree connecting the terminals. Further, we show for natural composed functions like ED∘XOR and XOR∘ED, the naive protocols suggested by their definition is optimal for general networks. Interestingly, the bounds for these functions depend on more involved topological parameters that are a combination of Steiner tree and 1-median costs. To obtain our results, we use some tools like metric embeddings and linear programming whose use in the context of communication complexity is novel as far as we know. (Based on joint works with Jaikumar Radhakrishnan and Atri Rudra)
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphscseiitgn
This document describes a space efficient approximation scheme for maximum matching in sparse graphs. It begins with an introduction to matching problems and Baker's algorithm for approximating problems on planar graphs. It notes that computing distances is difficult in logspace for planar graphs. The document then outlines previous work on matching algorithms and complexity, and states that the goal is to obtain an approximation scheme for maximum matching that runs in logspace.
Efficiently decoding Reed-Muller codes from random errorscseiitgn
"Consider the following setting. Suppose we are given as input a ""corrupted"" truth-table of a polynomial f(x1,..,xm) of degree r = o(√m), with a random set of 1/2 - o(1) fraction of the evaluations flipped. Can the polynomial f be recovered? Turns out we can, and we can do it efficiently! The above question is a demonstration of the reliability of Reed-Muller codes under the random error model. For Reed-Muller codes over F_2, the message is thought of as an m-variate polynomial of degree r, and its encoding is just the evaluation over all of F_2^m.
In this talk, we shall study the resilience of RM codes in the *random error* model. We shall see that under random errors, RM codes can efficiently decode many more errors than its minimum distance. (For example, in the above toy example, minimum distance is about 1/2^{√m} but we can correct close to 1/2-fraction of random errors). This builds on a recent work of [Abbe-Shpilka-Wigderson-2015] who established strong connections between decoding erasures and decoding errors. The main result in this talk would be constructive versions of those connections that yield efficient decoding algorithms. This is joint work with Amir Shpilka and Ben Lee Volk."
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Complexity Classes and the Graph Isomorphism Problem
1. Complexity Classes and the Graph Isomorphism problem
Jacobo Tor´an
University of Ulm
NMI Complexity and Cryptography Workshop,
IIT Gandhinagar, November 2016
1
3. Upper Bounds
G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
P
NP
GI
GA
3
4. Upper Bounds
G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
Time(2logO(1)
n)
[Babai 15]
P
NP
GI
GA
4
5. G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
Time(2logO(1)
n)
P
NP
GI
GA
coAM
5
6. G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
Time(2logO(1)
n)
P
NP
GI
GA
coAM
⊕P
6
7. G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
Time(2logO(1)
n)
P
NP
GI
GA
coAM
⊕P
SPP
7
8. G, H graphs
GI: are G and H isomorphic?
GA: does G have a non-trivial automorphism?
Time(2logO(1)
n)
P
NP
GI
GA
coAM
⊕P
SPP
UAP
8
9. Linear Programing:
NP ∩ coNP [Gale, Kuhn Tucker 48]
P [Khachiyan 79]
Primes:
NP ∩ coNP [Pratt 75]
coRP [Solovay, Strassen 77]
nO(log log n) [Adleman, Pomerance, Rumely 81]
RP [Adleman, Huang 87]
UP ∩ coUP [Fellows, Koblitz 92]
P [Agrawal, Kayal, Saxena 02]
9
10. Let A and B be two groups, with B ≤ A and ϕ ∈ A.
Bϕ = {πϕ : π ∈ B}
is a subset of A called a right coset of B in A.
Two right cosets Bϕ1, Bϕ2 are either disjoint or equal.
A = Bϕ1 + Bϕ2 + · · · + Bϕk.
The set {ϕ1, . . . , ϕk} is called a complete right transversal for B in A.
10
11. Let G1 and G2 be two graphs.
Fact: If G1 and G2 are isomorphic then, Iso(G1, G2) is a right coset of
Aut(G1), and thus |Iso(G1, G2)| = |Aut(G1)|.
11
12. Permutation groups
Let A ≤ Sn. For i ∈ {1, . . . , n} the orbit of i in A is the set
{j : ∃ϕ ∈ A, ϕ(i) = j}.
A[i→j], is the set of all permutations in A which map i to j.
For X ⊆ {1, . . . , n} i ∈ {1, . . . , n} the pointwise stabilizer of X in A.
A[X] is the set of permutations
A[X] = {ϕ ∈ A : ∀x ∈ X, ϕ(x) = x}.
A[i] = A[{i}] = {ϕ ∈ A : ϕ(i) = i}.
12
13. Graph G = (V, E), X ⊆ V ,
Aut(G)[X] = Aut(G[X]).
G
X
G[X]
G[1,...,i] := G(i)
13
14. Pointwise stabilizers play an important role in group theoretic algorithms.
One can construct a “tower” of stabilizers in the following way: let
Xi = {1, . . . , i} and denote A[Xi] by A(i), then
{id} = A(n)
≤ A(n−1)
≤ · · · ≤ A(1)
≤ A(0)
= A.
14
15. Lemma:
Let i ∈ {1, . . . n} and A = A[i]π1 + A[i]π2 + · · · + A[i]πd.
Then d is the size of the orbit of i in A, and for all ψ ∈ A[i]π,
π(i) = ψ(i).
If {j1, . . . , jd} is the orbit of i in A, then
A is partitioned into d sets of equal cardinality:
|A[i→j1]| = · · · = |A[i→jd]|.
Thus, |A| = d ∗ |A[i]|, and for every j ∈ {1, . . . , n}, the number of
permutations in A which map i to j is either 0 or |A[i]|.
15
16. Corollary:
Let di be the size of the orbit of i in A(i−1), 1 ≤ i ≤ n.
|A| =
n
i=1
di
.
16
17. j is in the orbit of i in G(i−1) iff the graphs are isomorphic
j
[i − 1]
i i
[i − 1]
j
Corollary: [Mathon 79] #Aut(G) and #Iso(G1, G2) can be computed
with non-adaptive queries to GI.
17
18. Theorem: [Sims 70], [Furst,Hopcroft,Luks 80]
Let Ti be a complete right transversal for A(i) in A(i−1), 1 ≤ i ≤ n, and
let K0 = n
i=1 Ti, then
1. every element π ∈ A can be expressed uniquely as a product
π = ϕ1ϕ2 . . . ϕn with ϕi ∈ Ti,
2. from K0 membership in A can be tested in O(n2) steps,
3. the order of A can be determined in O(n2) steps.
K0 is called a strong generator set for A.
18
19. Complexity classes
Counting classes
For a nondeterministic poly-time machine M and x ∈ Σ∗,
accM (x) is the number of accepting computation paths of M on input x.
(accA
M (x) for an oracle set A.)
rejM (x) is the number of rejecting computation paths of M on input x.
gapM (x) = accM (x) − rejM (x)
19
20. Class of all languages L for which there exists a nondeterministic
polynomial-time machine M such that, for all x,
NP x ∈ L =⇒ accM (x) > 0,
x ∈ L =⇒ accM (x) = 0.
UP x ∈ L =⇒ accM (x) = 1,
x ∈ L =⇒ accM (x) = 0.
ModkP x ∈ L =⇒ accM (x) ≡ 1mod k,
x ∈ L =⇒ accM (x) ≡ 1 mod k.
20
21. Tournament GI is in Mod2P [Goldschlager, Parberry 86]
If G is tournament graph, id is the only automorphism π ∈ Aut(G) that
is self-inverse (π = π−1).
If π = id, then for some i, π(i) = i. But π(π(i)) = i and this implies
(i, π(i)) ∈ E ⇔ (π(i), i) ∈ E.
All nontrivial automorphisms of a tournament graph G can be grouped into
pairs (πi, π−1
i ) and |Aut(G)| is odd.
#GI(G, H) =
#GA(G), G ≡ H
0, G ≡ H
21
22. A function f : Σ∗ → N is in #P if there is a nondeterministic
polynomial-time machine M such that for every x in Σ∗,
f(x) = accM (x).
A function f : Σ∗ → Z is in Gap-P if there is a nondeterministic
polynomial-time machine M such that for every x in Σ∗,
f(x) = gapM (x).
⇐⇒ ∃f1, f2 ∈ #P, ∀x ∈ Σ∗, f(x) = f1(x) − f2(x).
22
23. Class of all languages L for which there exists a nondeterministic
polynomial-time machine M such that, for all x,
C=P x ∈ L =⇒ gapM (x) = 0,
x ∈ L =⇒ gapM (x) > 0.
SPP x ∈ L =⇒ gapM (x) = 1,
x ∈ L =⇒ gapM (x) = 0.
23
24. GA ∈ SPP [K¨obler,Sch¨oning,T. 92]
Let G = (V, E), |V | = n. Consider the function
f(G) =
1≤i<j≤n
(|Aut(G)[i]| − |Aut(G)[i→j]|).
f ∈ Gap-P.
If G ∈ GA then there is a non-trivial automorphism π ∈ Aut(G) such
that π(i) = j for some i, j, i < j.
π ∈ Aut(G)[i→j] and |Aut(G)[i]| = |Aut(G)[i→j]|.
At least one of the factors of f(G) and f(G) = 0.
If G ∈ GA, then ∀i, j, i < j, |Aut(G)[i→j]| = 0. and
Aut(G)[i] = {id}.
All the factors of f(G) have value 1 and f(G) = 1.
24
25. Theorem: Let L ⊆ Σ⋆. If L can be computed in polynomial time by
asking only such queries y to an oracle set A ∈ NP for which
accMA
(y) ∈ {0, 1} (UP like queries), then L ∈ SPP.
MA nondeterministic poly-time machine computing A.
25
26. Theorem: [K¨obler,Sch¨oning,T. 92]
GI can be computed in polynomial time by asking only such queries y to
an oracle set A ∈ NP for which accMA
(y) ∈ {0, n!}.
MA nondeterministic poly-time machine computing A.
A = {(G1, G2, m) | G1 ≡ G2, m ∈ N}
MA on input (G1, G2, m) guesses x, y and accepts iff x is an
isomorphism and 1 ≤ y ≤ m.
accMA
(G1, G2, m) = m · #GI(G1, G2),
26
27. input (G, H);
d := 1; /∗ d is used to count the number of automorphisms of G ∗/
for i := n downto 1 do
di := 1; /∗ di determines the size of the orbit of i in Aut(G)(i−1) ∗/
for j := i + 1 to n do
/∗ test whether j lies in the orbit of i in Aut(G)(i−1) ∗/
G1 := G
(i−1)
[i] ; G2 := G
(i−1)
[j] ;
if (G1, G2, n!/d) ∈ A then di := di + 1 end;
end;
d := d ∗ di; /∗ now d = #GA(G(i−1)) ∗/
end
if (G, H, n!/d) ∈ A then accept else reject end;
27
28. The queries (G1, G2, m) are of the form (G
(i−1)
[i] , G
(i−1)
[j] , n!/d).
There are either 0 or #GA(G(i)) many automorphisms in Aut(G(i−1))
such that ϕ(i) = j.
Since d = #GA(G(i)), it follows that #GI(G1, G2) ∈ {0, d} and
accMA
(G1, G2, n!/d) ∈ {0, n!}.
28
29. GI ∈ SPP [Arvind, Kurur 02]
Theorem: There is a poly-time algorithm that on input a generator set for
B ≤ Sn and π ∈ Sn computes the lexicographically least element of
Bπ.
Theorem: GI can be computed in polynomial time by asking only such
queries y to an oracle set A ∈ NP for which accMA
(y) ∈ {0, 1}.
MA nondeterministic poly-time machine computing A.
29
30. A = {(S, i, j, π) | S ⊆ Aut(G(i)
) and π is a partial permutation
that fixes [i − 1] and π(i) = j
and there is a ϕ ∈ Aut(G(i−1)
) such that
ϕ extends π and ϕ = lex − least( S ϕ)}
A ∈ NP
If S = Aut(G(i−1)) then there is at most one such extension ϕ of π.
30
31. Games with unique winning strategies
Alternating generalization of UP
Def: [Niedermeier Rossmanith 98] An alternating Turing machine is
unambiguous if every accepting existential configuration has exactly one
move to an accepting configuration, and every rejecting universal
configuration has exactly one move to a rejecting configuration. The class
UAP contists of all languages accepted by polynomial-time unambiguous
alternating machines.
UAP ⊆ SPP
31
32. Theorem: [Crasmaru, Glaßer, Regan, Sangupta 04]
The class of problems that can be computed in polynomial time with
“UP-like” queries to an oracle set in NP is contained in UAP.
Corollary: GI ∈ UAP.
32
33. Complexity classes
Probabilistic classes
Def: L ∈ NP if there is a set D ∈ P and a polynomial p, for all x,
x ∈ L ⇔ [∃y, |y| = p(|x|) : x, y ∈ D]
Def: [Babai 85] L ∈ AM if there is a set D ∈ P and polynomial p such
that for all x,
x ∈ L ⇒ Probw∈Σp(|x|) [∃y, |y| = p(|x|) : x, y, w ∈ D] ≥ 3
4 ,
x ∈ L ⇒ Probw∈Σp(|x|) [∃y, |y| = p(|x|) : x, y, w ∈ D] ≤ 1
4 ,
AM = BP·NP
33
34. Standard AM method for isomorphims problems
Given two structures A, B
1) Define a set S(A, B) in NP and a function f ∈ FP s.t.
A ≡ B ⇒ ||S(A, B)|| ≥ 2f(n).
A ≡ B ⇒ ||S(A, B)|| ≤ f(n).
2) Estimate the size of ||S(A, B)|| using randomized hashing.
34
35. Given graphs G1, G2 on n vertices, consider the set
N(G1, G2) = {(H, ϕ) | (H ≡ G1 or H ≡ G2) and ϕ ∈ Aut(H)}
= {(H, ϕ) | H ≡ G1 and ϕ ∈ Aut(H)} ∪
{(H, ϕ) | H ≡ G2 and ϕ ∈ Aut(H)}
|N(G1, G2)| =
n! if G1 ≡ G2
2 · n! if G1 ≡ G2
35
36. Derandomization of AM protocols
Hardness hypothesis imply AM = NP
Hardness hypothesis:
[Arvind K¨obler 97] ∀ǫ > 0 there is a language L in NE ∩ coNE so that
any nondeterministic circuit of of size 2ǫn agrees with Ln on at most
1/2 + 2−ǫn inputs.
Open: Is there a better way for derandomizing the AM protocol for Graph
non-Iso than derandomizing the whole class AM?
36
37. The Minimum Circuit Size Problem (MCSP)
MCSP: [Yablonski 59] Given s ∈ N and a Boolean function f on n
variables, represented by its truth table of size 2n , determine if f has a
circuit of size s.
MCSP ∈ NP.
Not known to be NP-complete.
If MCSP is NP-complete (under logspace reductions) then P = PSPACE
[Murray, Williams 15]
GI is randomly reducible to MCSP [Allender, Das 14]
37
39. Lower Bounds
Is GI hard for some complexity class?
What problems can be reduced to GI?
Hard instances of GI
(bench marks, concrete algorithms, proof systems ...)
39
40. Undirected Graph (non)Reachability is reducible to GI
s t
G
Is t reachable from s?
s1 t1
G′
s2 t2
There is no path from s to t in G ⇐⇒
there is some automorphism mapping s1 to s2 in G′
40
41. there is some automorphism mapping s1 to s2 in G′ ⇐⇒
G′′ is isomorphic to H′′.
s1 t1
G′′
s2 t2
s3 t3
H′′
s4 t4
⇒ GI is hard for LOGSPACE
41
44. Simulation of an addition gate in Z2
y
x
z
⊕
x0
x1
y0
y1
u1,1
u1,0
u0,1
u0,0
z0
z1
44
45. Automorphisms of the gadget
Case 1: A Abelian group
Element a ∈ A is encoded as the mapping i → a · i in the corresponding
vertices.
Level 1:
i → x · i on the subgraph from input x.
j → y · j on the subgraph from input y.
Level 2:
(i, j) → (x · i, y · j) on the middle vertices.
Level 3:
k = i · j → x · i · y · j = x · y · i · j = x · y · k
45
46. Simulation of a circuit with gates over A
⊕
⊕
⊕
⊕
⊕
1
0
1
1
1 ·
·
··
·
·G2
·
·
··
·
·G2
G2
·
·
·
·G2
G2·· ··
46
47. CFI-graphs [Cai, F¨urer, Immerman 92] are constructed following this
principle.
The evaluation of circuits over Abelian groups is as hard as DET, the class
of problems reducible to the Determinant.
GI is hard for DET [T 04].
AC0 ⊆ NC1 ⊆ L ⊆ NL ⊆ DET ⊆ NC2 ⊆. . . P
47
48. Automorphisms of the gadget
Case 2: A non-Abelian
y
x
z
⊙
x1
xi
. . .
xm
y1
yj
. . .
ym
um,m
ui,j
u1,1
. . .
. . .
z1·1 = z1
zi·j
zm
. . .
. . .
48
49. Automorphisms of the gadget
Case 2: A non-Abelian
Representation of the group elements:
We associate each element k ∈ A with the set of pairs (i, j) satisfying
k = i · j.
Element k ∈ A is encoded as the mapping i → l · i · r for a pair (l, r)
with l · r = k in the corresponding vertices. Many encodings for a are
possible.
L R
Res
⊙
49
50. Lemma: For every pair of elements l, r ∈ A, the automorphisms that
map each vertex k in a Res subgraph to l · k · r are those that for some
element t map each vertex i in subgraph L to l · i · t, and maps each
vertex j in subgraph R to t−1 · j · r.
(The elements encoded in subgraphs L and R are respectively l · t and
t−1 · r.)
(l, t) (t−1, r)
(l, r)
⊙
50
51. Tree-Evaluation
Let A be a finite group. Given a binary tree T with a group element a ∈ A
in each leaf, is the product of the elements equal to id?
51
52. For every finite (quasi) group, the Tree-Evaluation Problem is reducible to
GI.
(l, r)
(t−1, r)(l, t)
a b
a · b = l · r
a = l · t
⇒ t−1
· r = a−1
· l · r = b
52
53. Tree Evaluation is in NC1
Tree Evaluation over S5 is NC1-complete
Circuit Evaluation over S5 is P-complete
53