Graph Triangulation by Dmitry Pidan Based on the paper “A sufficiently fast algorithm for finding close to optimal junction tree” by Ann Becker and Dan.

Slides:



Advertisements
Similar presentations
The Primal-Dual Method: Steiner Forest TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A AA A A A AA A A.
Advertisements

Connectivity - Menger’s Theorem Graphs & Algorithms Lecture 3.
Graph Partitioning Problems Lecture 18: March 14 s1 s3 s4 s2 T1 T4 T2 T3 s1 s4 s2 s3 t3 t1 t2 t4 A region R1 R2 C1 C2.
Approximation Algoirthms: Graph Partitioning Problems Lecture 17: March 16 s1 s3 s4 s2 T1 T4 T2 T3.
EMIS 8374 Vertex Connectivity Updated 20 March 2008.
1 A Faster Approximation Algorithm For The Steiner Problem In Graphs Kurt Mehlhorn. Information Processing Letters, 27(3):125–128, 高等演算法二
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
A polylogarithmic approximation of the minimum bisection Robert Krauthgamer The Hebrew University Joint work with Uri Feige.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
Rajat K. Pal. Chapter 3 Emran Chowdhury # P Presented by.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Graph Clustering. Why graph clustering is useful? Distance matrices are graphs  as useful as any other clustering Identification of communities in social.
Graph Clustering. Why graph clustering is useful? Distance matrices are graphs  as useful as any other clustering Identification of communities in social.
Recent Development on Elimination Ordering Group 1.
A general approximation technique for constrained forest problems Michael X. Goemans & David P. Williamson Presented by: Yonatan Elhanani & Yuval Cohen.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Greedy Algorithms Reading Material: Chapter 8 (Except Section 8.5)
A 2-Approximation algorithm for finding an optimum 3-Vertex-Connected Spanning Subgraph.
1 Separator Theorems for Planar Graphs Presented by Shira Zucker.
Greedy Algorithms Like dynamic programming algorithms, greedy algorithms are usually designed to solve optimization problems Unlike dynamic programming.
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
Using Homogeneous Weights for Approximating the Partial Cover Problem
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
The Art Gallery Problem
The Art Gallery Problem
TECH Computer Science Graph Optimization Problems and Greedy Algorithms Greedy Algorithms  // Make the best choice now! Optimization Problems  Minimizing.
Introduction to Graph Theory
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Simple and Improved Parameterized Algorithms for Multiterminal Cuts Mingyu Xiao The Chinese University of Hong Kong Hong Kong SAR, CHINA CSR 2008 Presentation,
APPROXIMATION ALGORITHMS VERTEX COVER – MAX CUT PROBLEMS
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
1 Treewidth, partial k-tree and chordal graphs Delpensum INF 334 Institutt fo informatikk Pinar Heggernes Speaker:
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
Approximation Algorithms
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
NP-Complete problems.
WK15. Vertex Cover and Approximation Algorithm By Lin, Jr-Shiun Choi, Jae Sung.
Computing Branchwidth via Efficient Triangulations and Blocks Authors: F.V. Fomin, F. Mazoit, I. Todinca Presented by: Elif Kolotoglu, ISE, Texas A&M University.
1/29/15CMPS 3130/6130 Computational Geometry1 CMPS 3130/6130 Computational Geometry Spring 2015 Triangulations and Guarding Art Galleries Carola Wenk.
Vasilis Syrgkanis Cornell University
Algorithms for hard problems Parameterized complexity Bounded tree width approaches Juris Viksna, 2015.
A linear-time algorithm to compute a MAD tree of an interval graph Elias Dahlhaus, Peter Dankelmann, R.Ravi.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
The Set-covering Problem Problem statement –given a finite set X and a family F of subsets where every element of X is contained in one of the subsets.
Mathematical Foundations of AI
Computing Connected Components on Parallel Computers
Minimum Spanning Tree 8/7/2018 4:26 AM
Parameterized complexity Bounded tree width approaches
Lecture 12 Algorithm Analysis
Computability and Complexity
Planarity Testing.
CS200: Algorithm Analysis
Connected Components Minimum Spanning Tree
Randomized Algorithms CS648
Approximation and Kernelization for Chordal Vertex Deletion
CS 583 Analysis of Algorithms
REDUCESEARCH Polynomial Kernels for Hitting Forbidden Minors under Structural Parameterizations Bart M. P. Jansen Astrid Pieterse ESA 2018 August.
Lecture 12 Algorithm Analysis
Richard Anderson Lecture 21 Network Flow
Problem Solving 4.
Tree -decomposition * 竹内 和樹 * 藤井 勲.
A Fundamental Bi-partition Algorithm of Kernighan-Lin
Lecture 21 Network Flow, Part 1
Simple Graphs: Connectedness, Trees
Lecture 12 Algorithm Analysis
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

Graph Triangulation by Dmitry Pidan Based on the paper “A sufficiently fast algorithm for finding close to optimal junction tree” by Ann Becker and Dan Geiger

Definition: junction tree

The natural approach

Example ==>

The natural approach X is called a “minimum vertex cut” The main disadvantage – there is no guarantee on the size of the maximal clique in an output triangulated graph

Graph decomposition

Graph decomposition (cont.)

Example a bcde

Properties of decomposition - Lemma 1

Properties of decomposition - Lemma 2

Triangulation algorithm

Example (one-level recursive call) a b c d e f g h i j k

Trialgulation algorithm - intuition 1. We use a set W as a “balance factor” between the decomposition sets A, B and C – we are interested that a largest set will be as small as possible. 2. At every iteration a produced clique is kept small (due to the guarantees of the decomposition)

Triangulation algorithm (cont.)

Proof of correctness 1. Termination 2. Validity of the failure statement – follows immediately from Lemma 2 3. An output in the case of success is a triangulated graph 4. Cliquewidth in the case of success is as guaranteed

Proof of correctness (cont.)

Finding a decomposition

Finding a decomposition (cont.) The existence of W-decomposition is checked as follows: 1. First, a decomposition of graph into disconnected components is found, using approximation algorithm for weighted minimal vertex cut problem 2. Next, A, B and C components of the decomposition are constructed by unifying the components that contain an appropriate subsets of W

Finding a decomposition (cont.) 3. Finally, X is constructed from an initial common subset of W and X unified with the vertex cut found. If X stands for the size requirements then the decomposition is a required one. 4. More formally – in the next 3 slides

The 3-way vertex cut problem Definition: given a weighted undirected graph and three vertices, find a set of vertices of minimum weight whose removal leaves each of the three vertices disconnected from other two. Known to be NP-hard Polynomial approximation algorithms: A simple 2-approximation algorithm 4/3-approximation algorithm Garg N. et al, “Multiway cuts in directed and node-weigthed graphs”

Finding a decomposition: Procedure I

Finding a decomposition: Procedure II

Complexity

Backup slides – proofs and some formalism

Proof of Lemma 1

Proof of Lemma 1 (cont.)

Proof of Lemma 2

Proof of Lemma 2 (cont.)

Theorem 1 (formal definition of algorithm correctness)

Finding a decomposition - proof of correctness

Finding a decomposition - proof of correctness (cont.)