scholarly journals Algorithms for Weighted Independent Transversals and Strong Colouring

2022 ◽  
Vol 18 (1) ◽  
pp. 1-16
Author(s):  
Alessandra Graf ◽  
David G. Harris ◽  
Penny Haxell

An independent transversal (IT) in a graph with a given vertex partition is an independent set consisting of one vertex in each partition class. Several sufficient conditions are known for the existence of an IT in a given graph and vertex partition, which have been used over the years to solve many combinatorial problems. Some of these IT existence theorems have algorithmic proofs, but there remains a gap between the best existential bounds and the bounds obtainable by efficient algorithms. Recently, Graf and Haxell (2018) described a new (deterministic) algorithm that asymptotically closes this gap, but there are limitations on its applicability. In this article, we develop a randomized algorithm that is much more widely applicable, and demonstrate its use by giving efficient algorithms for two problems concerning the strong chromatic number of graphs.

Author(s):  
Kai Han ◽  
Shuang Cui ◽  
Tianshuai Zhu ◽  
Enpei Zhang ◽  
Benwei Wu ◽  
...  

Data summarization, i.e., selecting representative subsets of manageable size out of massive data, is often modeled as a submodular optimization problem. Although there exist extensive algorithms for submodular optimization, many of them incur large computational overheads and hence are not suitable for mining big data. In this work, we consider the fundamental problem of (non-monotone) submodular function maximization with a knapsack constraint, and propose simple yet effective and efficient algorithms for it. Specifically, we propose a deterministic algorithm with approximation ratio 6 and a randomized algorithm with approximation ratio 4, and show that both of them can be accelerated to achieve nearly linear running time at the cost of weakening the approximation ratio by an additive factor of ε. We then consider a more restrictive setting without full access to the whole dataset, and propose streaming algorithms with approximation ratios of 8+ε and 6+ε that make one pass and two passes over the data stream, respectively. As a by-product, we also propose a two-pass streaming algorithm with an approximation ratio of 2+ε when the considered submodular function is monotone. To the best of our knowledge, our algorithms achieve the best performance bounds compared to the state-of-the-art approximation algorithms with efficient implementation for the same problem. Finally, we evaluate our algorithms in two concrete submodular data summarization applications for revenue maximization in social networks and image summarization, and the empirical results show that our algorithms outperform the existing ones in terms of both effectiveness and efficiency.


2002 ◽  
Vol 65 (2) ◽  
pp. 277-288 ◽  
Author(s):  
Gil Kaplan ◽  
Arieh Lev

Let G be a transitive permutation group acting on a finite set of order n. We discuss certain types of transversals for a point stabiliser A in G: free transversals and global transversals. We give sufficient conditions for the existence of such transversals, and show the connection between these transversals and combinatorial problems of decomposing the complete directed graph into edge disjoint cycles. In particular, we classify all the inner-transitive Oberwolfach factorisations of the complete directed graph. We mention also a connection to Frobenius theorem.


2021 ◽  
Vol 1 (1) ◽  
pp. 59-77
Author(s):  
Russell Lee ◽  
Jessica Maghakian ◽  
Mohammad Hajiesmaili ◽  
Jian Li ◽  
Ramesh Sitaraman ◽  
...  

This paper studies the online energy scheduling problem in a hybrid model where the cost of energy is proportional to both the volume and peak usage, and where energy can be either locally generated or drawn from the grid. Inspired by recent advances in online algorithms with Machine Learned (ML) advice, we develop parameterized deterministic and randomized algorithms for this problem such that the level of reliance on the advice can be adjusted by a trust parameter. We then analyze the performance of the proposed algorithms using two performance metrics: robustness that measures the competitive ratio as a function of the trust parameter when the advice is inaccurate, and consistency for competitive ratio when the advice is accurate. Since the competitive ratio is analyzed in two different regimes, we further investigate the Pareto optimality of the proposed algorithms. Our results show that the proposed deterministic algorithm is Pareto-optimal, in the sense that no other online deterministic algorithms can dominate the robustness and consistency of our algorithm. Furthermore, we show that the proposed randomized algorithm dominates the Pareto-optimal deterministic algorithm. Our large-scale empirical evaluations using real traces of energy demand, energy prices, and renewable energy generations highlight that the proposed algorithms outperform worst-case optimized algorithms and fully data-driven algorithms.


Algorithmica ◽  
2020 ◽  
Author(s):  
Stefano Leonardi ◽  
Gianpiero Monaco ◽  
Piotr Sankowski ◽  
Qiang Zhang

AbstractMotivated by many practical applications, in this paper we study budget feasible mechanisms with the goal of procuring an independent set of a matroid. More specifically, we are given a matroid $${\mathcal {M}}=(E,{\mathcal {I}})$$ M = ( E , I ) . Each element of the ground set E is controlled by a selfish agent and the cost of the element is private information of the agent itself. A budget limited buyer has additive valuations over the elements of E. The goal is to design an incentive compatible budget feasible mechanism which procures an independent set of the matroid of largest possible value. We also consider the more general case of the pair $${\mathcal {M}}=(E,{\mathcal {I}})$$ M = ( E , I ) satisfying only the hereditary property. This includes matroids as well as matroid intersection. We show that, given a polynomial time deterministic algorithm that returns an $$\alpha $$ α -approximation to the problem of finding a maximum-value independent set in $${\mathcal {M}}$$ M , there exists an individually rational, truthful and budget feasible mechanism which is $$(3\alpha +1)$$ ( 3 α + 1 ) -approximated and runs in polynomial time, thus yielding also a 4-approximation for the special case of matroids.


2000 ◽  
Vol 25 (4) ◽  
pp. 417-436 ◽  
Author(s):  
Todd C. Headrick ◽  
Shlomo S. Sawilowsky

The power methods are simple and efficient algorithms used to generate either univariate or multivariate nonnormal distributions with specified values of (marginal) mean, standard deviation, skew, and kurtosis. The power methods are bounded as are other transformation techniques. Given an exogenous value of skew, there is an associated lower bound of kurtosis. Previous approximations of the boundary for the power methods are either incorrect or inadequate. Data sets from education and psychology can be found to lie within, near, or outside tile boundary of the power methods. In view of this, we derived necessary and sufficient conditions using the Lagrange multiplier method to determine the boundary of the power methods. The conditions for locating and classifying modes for distributions on the boundary were also derived. Self-contained interactive Fortran programs using a Weighted Simplex Procedure were employed to generate tabled values of minimum kurtosis for a given value of skew and power constants for various (non)normal distributions.


2005 ◽  
Vol 1 (1) ◽  
pp. 11-14 ◽  
Author(s):  
Sanguthevar Rajasekaran

Given a weighted graph G(V;E), a minimum spanning tree for G can be obtained in linear time using a randomized algorithm or nearly linear time using a deterministic algorithm. Given n points in the plane, we can construct a graph with these points as nodes and an edge between every pair of nodes. The weight on any edge is the Euclidean distance between the two points. Finding a minimum spanning tree for this graph is known as the Euclidean minimum spanning tree problem (EMSTP). The minimum spanning tree algorithms alluded to before will run in time O(n2) (or nearly O(n2)) on this graph. In this note we point out that it is possible to devise simple algorithms for EMSTP in k- dimensions (for any constant k) whose expected run time is O(n), under the assumption that the points are uniformly distributed in the space of interest.CR Categories: F2.2 Nonnumerical Algorithms and Problems; G.3 Probabilistic Algorithms


2013 ◽  
Vol 2013 ◽  
pp. 1-8
Author(s):  
Kasamsuk Ungchittrakool

The aim of this paper is to provide some existence theorems of a strict pseudocontraction by the way of a hybrid shrinking projection method, involving some necessary and sufficient conditions. The method allows us to obtain a strong convergence iteration for finding some fixed points of a strict pseudocontraction in the framework of real Hilbert spaces. In addition, we also provide certain applications of the main theorems to confirm the existence of the zeros of an inverse strongly monotone operator along with its convergent results.


2014 ◽  
Vol 24 (2) ◽  
pp. 407-437 ◽  
Author(s):  
DOMINGOS DELLAMONICA ◽  
SUBRAHMANYAM KALYANASUNDARAM ◽  
DANIEL M. MARTIN ◽  
VOJTĚCH RÖDL ◽  
ASAF SHAPIRA

In this paper we prove that two local conditions involving the degrees and co-degrees in a graph can be used to determine whether a given vertex partition is Frieze–Kannan regular. With a more refined version of these two local conditions we provide a deterministic algorithm that obtains a Frieze–Kannan regular partition of any graphGin timeO(|V(G)|2).


Sign in / Sign up

Export Citation Format

Share Document