SlideShare a Scribd company logo
1 of 27
Download to read offline
Testing Forest-Isomorphism
in the Adjacency List Model
Mitsuru Kusumoto†, Yuichi Yoshida†*
† : Preferred Infrastructure, Inc.
* : National Institute of Informatics.
1
Overview
Given two forests G and H, determine if G ≅ H or G and H are
far from being so by looking at very small parts of G and H.
Outline
 Introduction
Property testing
Problem setting
 Our algorithms
≅
?
2 / 21
Introduction
3
Property Testing
We want to solve decision problem as efficiently as possible!!
 Example : Graph connectivity
 Standard setting : BFS is enough. → Θ(n) time.
 Property testing : Check if G is connected or G is far from
being connected. → O(1) time!?
Connected Not connected
4 / 21
Property Testing
Property testing algorithm is a (randomized) algorithm that
checks if input satisfies property P or is far from P with high
probability (e.g., ≥ 2/3) with sublinear query or time complexity.
Main Interest
 What kinds of properties are testable efficiently?
Connected Not connected
We want to
distinguish them
Far from being
connected
Close to being
connected
5 / 21
Graph Property Testing - Review
The efficiency of property testing algorithms depends on the
input models.
Adjacency matrix model
[01010]
[10110]
G = [01001]
[11001]
[00110]
Adjacency list model
v
A
B
C
1
2
3
O(v, 1) = A
O(v, 2) = B
O(v, 3) = C
• Input model for dense graphs. [GGR’98]
• Many properties are testable.
(e.g., connectivity, △-freeness, ... .)
• Necessity & sufficiency for constant-
time testability are known. [Alon+’09]
• Input model for sparse graphs. [GR’02]
[KKR’04]
• Many properties are testable.
(e.g., connectivity, H-minor-freeness.)
• But many results assume bounded-
degree condition: degrees of vertices
must be bounded by some constant.
6 / 21
Graph Property Testing - Review
 Only a few efficient algorithms.
 Many hardness results: △-freeness, k-colorability, etc.,
requires Ω(√n) queries. [A+08, B+08, K+04]
Question : Is it possible to obtain efficient algorithms for
fundamental problems without bounded-degree condition?
Adjacency list model
v
A
B
C
1
2
3
O(v, 1) = A
O(v, 2) = B
O(v, 3) = C
• Input model for sparse graphs. [GR’02]
[KKR’04]
• Many properties are testable.
(e.g., connectivity, H-minor-freeness.)
• But many results assume bounded-
degree condition: degrees of vertices
must be bounded by some constant.
What happens if we do not assume
the bounded-degree condition?
7 / 21
Forest-Isomorphism
We focus on forest-isomorphism in adjacency list model.
Input : Two forests G and H represented by adjacency lists
and proximity parameter ε > 0.
Query Model : We can access to G and H via following queries:
 deg(v): returns the degree of vertex v.
 adj(v, i): returns a vertex adjacent to v by i-th edge.
 random(): returns a randomly chosen vertex.
≅
?
8 / 21
Forest-Isomorphism
We focus on forest-isomorphism in adjacency list model.
Input : Two forests G and H represented by adjacency lists
and proximity parameter ε > 0.
ε-Farness : d(G, H) := # of edge-(additions / deletions) to
transform G to H. (Graph edit distance)
For ε>0, (G, H) are ε-far from being isomorphic ⇔ d(G, H) ≥ εn.
Objective: Determine G≅H or d(G, H) ≥ εn.
≅
?
9 / 21
Forest-Isomorphism
We focus on forest-isomorphism in adjacency list model.
Motivation
 Problem is fundamental: Forest is simple structure and
isomorphism is a theoretically important problem.
 Isomorphism was sometimes considered in property testing
literature. [AS’05, AS’08, NS’11]
≅
?
10 / 21
Forest-Isomorphism
We focus on forest-isomorphism in adjacency list model.
Related Work
 If there is no restriction on input, graph isomorphism testing
in the adjacency list model requires Ω(√n) queries. [FM’08]
Good motivation for our focus on forests.
 If input is a bounded-degree hyperfinite graph, then graph
isomorphism is constant-time testable. [NS’11]
But if there is no degree bound, testability was unknown.
≅
?
11 / 21
Our Contribution
Furthermore, we obtained more general result:
 If the input is a forest, every graph property is testable in
poly(log n) queries in the adjacency list model.
 We use a similar technique with [Newman and Sohler’11].
Query complexity
Upper bound poly(log n)
Lower bound Ω(√log n)
12 / 21
Overview of Our Algorithm
13
Overview of Our Method
1. Partitioning oracle:
We define a procedure that removes
small fractions of edges to partition
the graph into several parts with
“good” properties.
G
The Partitioning Oracle
H
2. We check if each corresponding
part in G and H is isomorphic or far
from so.
If G, H are far from being isomorphic,
there is at least one corresponding part
in G, H that is also far from being
isomorphic.
14 / 21
Partitioning Oracle
Partitioning Oracle: Given ε>0 and access to G, there exists
integer s=s(ε) and subgraph G’⊆ G s.t.,
 |E(G) – E(G’)| ≤ εn / 3
 Each connected component of G’ is either
s-bounded-degree-tree or s-rooted-tree.
s-rooted tree:
A tree where there exists v ∈ V(T) s.t.
deg(v) ≥ s and (size of each sub-tree) < s.
(We call the vertex v a root.)
s-bounded-degree-tree:
A tree where
(degree of each vertex) < s.
v
15 / 21
Partitioning Oracle
Partitioning Oracle: Given ε>0 and access to G, there exists
integer s=s(ε) and subgraph G’⊆ G s.t.,
 |E(G) – E(G’)| ≤ εn / 3
 Each connected component of G’ is either
s-bounded-degree-tree or s-rooted-tree.
We can provide query access to G’.
Alive Edge Query: Check if edge (v, i) still exists in G’.
 The subgraph G’ is chosen deterministically.
 If G ≅ H, then G’ ≅ H’.
v
A
B
C
1
2
3
(v, 1) : not alive
(v, 2) : not alive
(v, 3) : alive
16 / 21
Partitioning Oracle
Partitioning Oracle: Given ε>0 and access to G, there exists
integer s=s(ε) and subgraph G’⊆ G s.t.,
 |E(G) – E(G’)| ≤ εn / 3
 Each connected component of G’ is either
s-bounded-degree-tree or s-rooted-tree.
So…
 If d(G, H) = 0 ⇒ d(G’, H’) = 0
G’ and H’ are chosen deterministically.
 If d(G, H) ≥ εn ⇒ d(G’, H’) ≥ εn / 3
We remove at most εn / 3 edges from G and H.
Thus, it is enough to consider the partitioned graphs G’ and H’.
17 / 21
Graph Partition
Suppose that G is obtained through the partitioning oracle.
We split G into the following parts for some constants α,γ>1.
 G[0] := s-bounded degree trees in G
 G[1] := s-rooted trees in G with root degrees in [s, αγ)
 G[2] := s-rooted trees in G with root degrees in [αγ, αγ2)
 G[3] := s-rooted trees in G with root degrees in [αγ2, αγ3)
 ...
O(log n) parts
G[0] G[1]
G[2] ......
18 / 21
Isomorphism between Each Partitions
Graph partition is useful in the following sense.
Lemma. d(G, H) ≤ Σi d(G[i], H[i]).
Proof. Transformation from G[i] to H[i] for each i would transform
G to H. □
Corollary. If d(G, H) ≥ εn, then for βi > 0 with Σ βi = ε,
∃i s.t. d(G[i], H[i]) ≥ βin. □
Thus, it suffices to check the isomorphism between G[i] and H[i]
for each i=0,1,2,….
We set β0=ε/2, β1=β2=…=O(ε / log n).
19 / 21
Isomorphism between Each Partitions
Testing G[i]≅H[i]
 For i=0 : We can use a tester for the bounded-degree model
[NS’11].
 For i≥1 : We develop a new algorithm.
Sketch : We randomly sample root vertices.
For each root vertex, we randomly sample its subtrees and
create a histogram of subtrees.
After this, we compute the minimum matching between
the histograms in G and H.
This minimum matching turns out to be a good
approximation to d(G, H).
:2
:2
:1
… 20 / 21
Conclusion
 If the input is a forest, every graph property is testable in
poly(log n) queries.
Future Work?
Can we obtain similar results for larger graph class than forests?
Outerplanar graphs, Bounded-tree width graphs,
Scale-free graphs, …
Query complexity
Upper bound poly(log n)
Lower bound Ω(√log n)
Actually O(log^2^poly(1/ε)(n))
21 / 21
Appendix : Lower bound
22
Lower bound - Overview
1. We construct two distributions of input, D1, D2.
∀(G, H) ∈ D1, G ≅ H
∀(G, H) ∈ D2, d(G, H) ≥ n/8
2. We reduce the isomorphism testing to checking if two
probabilistic distributions are the same or not. This requires
Ω(√N) queries.
≅
?
≅
?
23 / 21
Lower bound
Let Fk := (n / (2klogn)) copies of a star graph with 2k vertices
(Remark that |Fi| = n / logn)
F3
F2
F1
F0
…
Flogn 24 / 21
Lower bound
Construct two distributions D1, D2 :
D1 : G=H
D2 : randomly assign Fk to
either G or H so that
|V(G)| = |V(H)|.
G = F0 ∪ F1 ∪ … Flogn
H = F0 ∪ F1 ∪ … Flogn
G = ................................
H = ...............................
F0 F1 … Flogn
25 / 21
Lower bound
Because we can perform only “random-sampling” and
(degree/neighbor)-query, checking if G ≅ H is equivalent to
checking two probabilistic distributions are the same.
Lemma. We need Ω(√logn) queries to distinguish D1 and D2.
proba. to observe by
random-sampling
F0 F1 F2 Flogn
G
H
G=H
26 / 21
Lower bound
Lemma. ∀(G, H) ∈ D2, d(G, H) ≥ n/8
Proof.
Let Φ:V(G)→V(H) be a bijection achieves minimum graph edit
distance. It holds that
d(G, H) ≥ Σv∈V(G) |deg(v) – deg(Φ(v))| / 2.
If we restrict v in the sum to the root of stars, we obtain
d(G, H) ≥ Σk=2,3,4,... (n / (2k logn)) ∙ 2k-1/2 ≥ n/8. □
Thus, Ω(logn) lower bound holds.
Φ
27 / 21

More Related Content

What's hot

Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6njit-ronbrown
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
 
Paper Introduction: Combinatorial Model and Bounds for Target Set Selection
Paper Introduction: Combinatorial Model and Bounds for Target Set SelectionPaper Introduction: Combinatorial Model and Bounds for Target Set Selection
Paper Introduction: Combinatorial Model and Bounds for Target Set SelectionYu Liu
 
Important Cuts
Important CutsImportant Cuts
Important CutsASPAK2014
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
 
Clustering in Hilbert simplex geometry
Clustering in Hilbert simplex geometryClustering in Hilbert simplex geometry
Clustering in Hilbert simplex geometryFrank Nielsen
 
Specific function examples
Specific function examplesSpecific function examples
Specific function examplesLeo Crisologo
 
Tailored Bregman Ball Trees for Effective Nearest Neighbors
Tailored Bregman Ball Trees for Effective Nearest NeighborsTailored Bregman Ball Trees for Effective Nearest Neighbors
Tailored Bregman Ball Trees for Effective Nearest NeighborsFrank Nielsen
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow AnalysisMiller Lee
 
Clustering in Hilbert geometry for machine learning
Clustering in Hilbert geometry for machine learningClustering in Hilbert geometry for machine learning
Clustering in Hilbert geometry for machine learningFrank Nielsen
 
Slides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingSlides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingFrank Nielsen
 
01 knapsack using backtracking
01 knapsack using backtracking01 knapsack using backtracking
01 knapsack using backtrackingmandlapure
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithmSrikrishnan Suresh
 
Analytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesAnalytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesmmasdeu
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and ApplicationsASPAK2014
 

What's hot (20)

Lecture 9 dim & rank - 4-5 & 4-6
Lecture 9   dim & rank -  4-5 & 4-6Lecture 9   dim & rank -  4-5 & 4-6
Lecture 9 dim & rank - 4-5 & 4-6
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
 
Paper Introduction: Combinatorial Model and Bounds for Target Set Selection
Paper Introduction: Combinatorial Model and Bounds for Target Set SelectionPaper Introduction: Combinatorial Model and Bounds for Target Set Selection
Paper Introduction: Combinatorial Model and Bounds for Target Set Selection
 
JC Vectors summary
JC Vectors summaryJC Vectors summary
JC Vectors summary
 
Important Cuts
Important CutsImportant Cuts
Important Cuts
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
Clustering in Hilbert simplex geometry
Clustering in Hilbert simplex geometryClustering in Hilbert simplex geometry
Clustering in Hilbert simplex geometry
 
Specific function examples
Specific function examplesSpecific function examples
Specific function examples
 
Tailored Bregman Ball Trees for Effective Nearest Neighbors
Tailored Bregman Ball Trees for Effective Nearest NeighborsTailored Bregman Ball Trees for Effective Nearest Neighbors
Tailored Bregman Ball Trees for Effective Nearest Neighbors
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
Clustering in Hilbert geometry for machine learning
Clustering in Hilbert geometry for machine learningClustering in Hilbert geometry for machine learning
Clustering in Hilbert geometry for machine learning
 
Slides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processingSlides: A glance at information-geometric signal processing
Slides: A glance at information-geometric signal processing
 
Chap4
Chap4Chap4
Chap4
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
01 knapsack using backtracking
01 knapsack using backtracking01 knapsack using backtracking
01 knapsack using backtracking
 
All pairs shortest path algorithm
All pairs shortest path algorithmAll pairs shortest path algorithm
All pairs shortest path algorithm
 
Analytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curvesAnalytic construction of points on modular elliptic curves
Analytic construction of points on modular elliptic curves
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
 

Similar to Testing Forest-Isomorphism in the Adjacency List Model

Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphsMahesh Gadhwal
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graphjosephjonse
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphijngnjournal
 
Minimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsMinimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsLuis Galárraga
 
Bidimensionality
BidimensionalityBidimensionality
BidimensionalityASPAK2014
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
 
On Convolution of Graph Signals and Deep Learning on Graph Domains
On Convolution of Graph Signals and Deep Learning on Graph DomainsOn Convolution of Graph Signals and Deep Learning on Graph Domains
On Convolution of Graph Signals and Deep Learning on Graph DomainsJean-Charles Vialatte
 
Randomized algorithms all pairs shortest path
Randomized algorithms  all pairs shortest pathRandomized algorithms  all pairs shortest path
Randomized algorithms all pairs shortest pathMohammad Akbarizadeh
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsMathieu Dutour Sikiric
 
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESTHE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESgraphhoc
 
Threshold network models
Threshold network modelsThreshold network models
Threshold network modelsNaoki Masuda
 
Complex analysis notes
Complex analysis notesComplex analysis notes
Complex analysis notesPrakash Dabhi
 
Graph theory concepts complex networks presents-rouhollah nabati
Graph theory concepts   complex networks presents-rouhollah nabatiGraph theory concepts   complex networks presents-rouhollah nabati
Graph theory concepts complex networks presents-rouhollah nabatinabati
 
Graphical Model Selection for Big Data
Graphical Model Selection for Big DataGraphical Model Selection for Big Data
Graphical Model Selection for Big DataAlexander Jung
 
Reconstructing Textual Documents from n-grams
Reconstructing Textual Documents from n-gramsReconstructing Textual Documents from n-grams
Reconstructing Textual Documents from n-gramsmatthigalle
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04Computer Science Club
 

Similar to Testing Forest-Isomorphism in the Adjacency List Model (20)

Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphs
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graph
 
Minimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applicationsMinimizing cost in distributed multiquery processing applications
Minimizing cost in distributed multiquery processing applications
 
Bidimensionality
BidimensionalityBidimensionality
Bidimensionality
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
On Convolution of Graph Signals and Deep Learning on Graph Domains
On Convolution of Graph Signals and Deep Learning on Graph DomainsOn Convolution of Graph Signals and Deep Learning on Graph Domains
On Convolution of Graph Signals and Deep Learning on Graph Domains
 
10.1.1.226.4381
10.1.1.226.438110.1.1.226.4381
10.1.1.226.4381
 
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Model Selection in the...
 
Randomized algorithms all pairs shortest path
Randomized algorithms  all pairs shortest pathRandomized algorithms  all pairs shortest path
Randomized algorithms all pairs shortest path
 
Bs32440443
Bs32440443Bs32440443
Bs32440443
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawings
 
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSESTHE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES
 
Threshold network models
Threshold network modelsThreshold network models
Threshold network models
 
Complex analysis notes
Complex analysis notesComplex analysis notes
Complex analysis notes
 
Graph theory concepts complex networks presents-rouhollah nabati
Graph theory concepts   complex networks presents-rouhollah nabatiGraph theory concepts   complex networks presents-rouhollah nabati
Graph theory concepts complex networks presents-rouhollah nabati
 
Graphical Model Selection for Big Data
Graphical Model Selection for Big DataGraphical Model Selection for Big Data
Graphical Model Selection for Big Data
 
CLIM Fall 2017 Course: Statistics for Climate Research, Nonstationary Covaria...
CLIM Fall 2017 Course: Statistics for Climate Research, Nonstationary Covaria...CLIM Fall 2017 Course: Statistics for Climate Research, Nonstationary Covaria...
CLIM Fall 2017 Course: Statistics for Climate Research, Nonstationary Covaria...
 
Reconstructing Textual Documents from n-grams
Reconstructing Textual Documents from n-gramsReconstructing Textual Documents from n-grams
Reconstructing Textual Documents from n-grams
 
20110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-0420110319 parameterized algorithms_fomin_lecture03-04
20110319 parameterized algorithms_fomin_lecture03-04
 

More from irrrrr

ICPC 2015, Tsukuba : Unofficial Commentary
ICPC 2015, Tsukuba: Unofficial CommentaryICPC 2015, Tsukuba: Unofficial Commentary
ICPC 2015, Tsukuba : Unofficial Commentaryirrrrr
 
ICML2015読み会:Optimal and Adaptive Algorithms for Online Boosting
ICML2015読み会:Optimal and Adaptive Algorithms for Online BoostingICML2015読み会:Optimal and Adaptive Algorithms for Online Boosting
ICML2015読み会:Optimal and Adaptive Algorithms for Online Boostingirrrrr
 
機械学習とその理論 (情報オリンピック2015春合宿講義資料)
機械学習とその理論 (情報オリンピック2015春合宿講義資料)機械学習とその理論 (情報オリンピック2015春合宿講義資料)
機械学習とその理論 (情報オリンピック2015春合宿講義資料)irrrrr
 
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidthirrrrr
 
ICPC Asia::Tokyo 2014 Problem K – L∞ Jumps
ICPC Asia::Tokyo 2014 Problem K – L∞ JumpsICPC Asia::Tokyo 2014 Problem K – L∞ Jumps
ICPC Asia::Tokyo 2014 Problem K – L∞ Jumpsirrrrr
 
ICPC Asia::Tokyo 2014 Problem J – Exhibition
ICPC Asia::Tokyo 2014 Problem J – ExhibitionICPC Asia::Tokyo 2014 Problem J – Exhibition
ICPC Asia::Tokyo 2014 Problem J – Exhibitionirrrrr
 
ICALP 2014 参加記
ICALP 2014 参加記ICALP 2014 参加記
ICALP 2014 参加記irrrrr
 
スペクトラルグラフ理論入門
スペクトラルグラフ理論入門スペクトラルグラフ理論入門
スペクトラルグラフ理論入門irrrrr
 
Soul Gem Game
Soul Gem GameSoul Gem Game
Soul Gem Gameirrrrr
 

More from irrrrr (9)

ICPC 2015, Tsukuba : Unofficial Commentary
ICPC 2015, Tsukuba: Unofficial CommentaryICPC 2015, Tsukuba: Unofficial Commentary
ICPC 2015, Tsukuba : Unofficial Commentary
 
ICML2015読み会:Optimal and Adaptive Algorithms for Online Boosting
ICML2015読み会:Optimal and Adaptive Algorithms for Online BoostingICML2015読み会:Optimal and Adaptive Algorithms for Online Boosting
ICML2015読み会:Optimal and Adaptive Algorithms for Online Boosting
 
機械学習とその理論 (情報オリンピック2015春合宿講義資料)
機械学習とその理論 (情報オリンピック2015春合宿講義資料)機械学習とその理論 (情報オリンピック2015春合宿講義資料)
機械学習とその理論 (情報オリンピック2015春合宿講義資料)
 
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth
論文紹介 Advances in Learning Bayesian Networks of Bounded Treewidth
 
ICPC Asia::Tokyo 2014 Problem K – L∞ Jumps
ICPC Asia::Tokyo 2014 Problem K – L∞ JumpsICPC Asia::Tokyo 2014 Problem K – L∞ Jumps
ICPC Asia::Tokyo 2014 Problem K – L∞ Jumps
 
ICPC Asia::Tokyo 2014 Problem J – Exhibition
ICPC Asia::Tokyo 2014 Problem J – ExhibitionICPC Asia::Tokyo 2014 Problem J – Exhibition
ICPC Asia::Tokyo 2014 Problem J – Exhibition
 
ICALP 2014 参加記
ICALP 2014 参加記ICALP 2014 参加記
ICALP 2014 参加記
 
スペクトラルグラフ理論入門
スペクトラルグラフ理論入門スペクトラルグラフ理論入門
スペクトラルグラフ理論入門
 
Soul Gem Game
Soul Gem GameSoul Gem Game
Soul Gem Game
 

Recently uploaded

The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)itwameryclare
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationColumbia Weather Systems
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024innovationoecd
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 

Recently uploaded (20)

The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)
 
Volatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -IVolatile Oils Pharmacognosy And Phytochemistry -I
Volatile Oils Pharmacognosy And Phytochemistry -I
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
User Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather StationUser Guide: Capricorn FLX™ Weather Station
User Guide: Capricorn FLX™ Weather Station
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024OECD bibliometric indicators: Selected highlights, April 2024
OECD bibliometric indicators: Selected highlights, April 2024
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 

Testing Forest-Isomorphism in the Adjacency List Model

  • 1. Testing Forest-Isomorphism in the Adjacency List Model Mitsuru Kusumoto†, Yuichi Yoshida†* † : Preferred Infrastructure, Inc. * : National Institute of Informatics. 1
  • 2. Overview Given two forests G and H, determine if G ≅ H or G and H are far from being so by looking at very small parts of G and H. Outline  Introduction Property testing Problem setting  Our algorithms ≅ ? 2 / 21
  • 4. Property Testing We want to solve decision problem as efficiently as possible!!  Example : Graph connectivity  Standard setting : BFS is enough. → Θ(n) time.  Property testing : Check if G is connected or G is far from being connected. → O(1) time!? Connected Not connected 4 / 21
  • 5. Property Testing Property testing algorithm is a (randomized) algorithm that checks if input satisfies property P or is far from P with high probability (e.g., ≥ 2/3) with sublinear query or time complexity. Main Interest  What kinds of properties are testable efficiently? Connected Not connected We want to distinguish them Far from being connected Close to being connected 5 / 21
  • 6. Graph Property Testing - Review The efficiency of property testing algorithms depends on the input models. Adjacency matrix model [01010] [10110] G = [01001] [11001] [00110] Adjacency list model v A B C 1 2 3 O(v, 1) = A O(v, 2) = B O(v, 3) = C • Input model for dense graphs. [GGR’98] • Many properties are testable. (e.g., connectivity, △-freeness, ... .) • Necessity & sufficiency for constant- time testability are known. [Alon+’09] • Input model for sparse graphs. [GR’02] [KKR’04] • Many properties are testable. (e.g., connectivity, H-minor-freeness.) • But many results assume bounded- degree condition: degrees of vertices must be bounded by some constant. 6 / 21
  • 7. Graph Property Testing - Review  Only a few efficient algorithms.  Many hardness results: △-freeness, k-colorability, etc., requires Ω(√n) queries. [A+08, B+08, K+04] Question : Is it possible to obtain efficient algorithms for fundamental problems without bounded-degree condition? Adjacency list model v A B C 1 2 3 O(v, 1) = A O(v, 2) = B O(v, 3) = C • Input model for sparse graphs. [GR’02] [KKR’04] • Many properties are testable. (e.g., connectivity, H-minor-freeness.) • But many results assume bounded- degree condition: degrees of vertices must be bounded by some constant. What happens if we do not assume the bounded-degree condition? 7 / 21
  • 8. Forest-Isomorphism We focus on forest-isomorphism in adjacency list model. Input : Two forests G and H represented by adjacency lists and proximity parameter ε > 0. Query Model : We can access to G and H via following queries:  deg(v): returns the degree of vertex v.  adj(v, i): returns a vertex adjacent to v by i-th edge.  random(): returns a randomly chosen vertex. ≅ ? 8 / 21
  • 9. Forest-Isomorphism We focus on forest-isomorphism in adjacency list model. Input : Two forests G and H represented by adjacency lists and proximity parameter ε > 0. ε-Farness : d(G, H) := # of edge-(additions / deletions) to transform G to H. (Graph edit distance) For ε>0, (G, H) are ε-far from being isomorphic ⇔ d(G, H) ≥ εn. Objective: Determine G≅H or d(G, H) ≥ εn. ≅ ? 9 / 21
  • 10. Forest-Isomorphism We focus on forest-isomorphism in adjacency list model. Motivation  Problem is fundamental: Forest is simple structure and isomorphism is a theoretically important problem.  Isomorphism was sometimes considered in property testing literature. [AS’05, AS’08, NS’11] ≅ ? 10 / 21
  • 11. Forest-Isomorphism We focus on forest-isomorphism in adjacency list model. Related Work  If there is no restriction on input, graph isomorphism testing in the adjacency list model requires Ω(√n) queries. [FM’08] Good motivation for our focus on forests.  If input is a bounded-degree hyperfinite graph, then graph isomorphism is constant-time testable. [NS’11] But if there is no degree bound, testability was unknown. ≅ ? 11 / 21
  • 12. Our Contribution Furthermore, we obtained more general result:  If the input is a forest, every graph property is testable in poly(log n) queries in the adjacency list model.  We use a similar technique with [Newman and Sohler’11]. Query complexity Upper bound poly(log n) Lower bound Ω(√log n) 12 / 21
  • 13. Overview of Our Algorithm 13
  • 14. Overview of Our Method 1. Partitioning oracle: We define a procedure that removes small fractions of edges to partition the graph into several parts with “good” properties. G The Partitioning Oracle H 2. We check if each corresponding part in G and H is isomorphic or far from so. If G, H are far from being isomorphic, there is at least one corresponding part in G, H that is also far from being isomorphic. 14 / 21
  • 15. Partitioning Oracle Partitioning Oracle: Given ε>0 and access to G, there exists integer s=s(ε) and subgraph G’⊆ G s.t.,  |E(G) – E(G’)| ≤ εn / 3  Each connected component of G’ is either s-bounded-degree-tree or s-rooted-tree. s-rooted tree: A tree where there exists v ∈ V(T) s.t. deg(v) ≥ s and (size of each sub-tree) < s. (We call the vertex v a root.) s-bounded-degree-tree: A tree where (degree of each vertex) < s. v 15 / 21
  • 16. Partitioning Oracle Partitioning Oracle: Given ε>0 and access to G, there exists integer s=s(ε) and subgraph G’⊆ G s.t.,  |E(G) – E(G’)| ≤ εn / 3  Each connected component of G’ is either s-bounded-degree-tree or s-rooted-tree. We can provide query access to G’. Alive Edge Query: Check if edge (v, i) still exists in G’.  The subgraph G’ is chosen deterministically.  If G ≅ H, then G’ ≅ H’. v A B C 1 2 3 (v, 1) : not alive (v, 2) : not alive (v, 3) : alive 16 / 21
  • 17. Partitioning Oracle Partitioning Oracle: Given ε>0 and access to G, there exists integer s=s(ε) and subgraph G’⊆ G s.t.,  |E(G) – E(G’)| ≤ εn / 3  Each connected component of G’ is either s-bounded-degree-tree or s-rooted-tree. So…  If d(G, H) = 0 ⇒ d(G’, H’) = 0 G’ and H’ are chosen deterministically.  If d(G, H) ≥ εn ⇒ d(G’, H’) ≥ εn / 3 We remove at most εn / 3 edges from G and H. Thus, it is enough to consider the partitioned graphs G’ and H’. 17 / 21
  • 18. Graph Partition Suppose that G is obtained through the partitioning oracle. We split G into the following parts for some constants α,γ>1.  G[0] := s-bounded degree trees in G  G[1] := s-rooted trees in G with root degrees in [s, αγ)  G[2] := s-rooted trees in G with root degrees in [αγ, αγ2)  G[3] := s-rooted trees in G with root degrees in [αγ2, αγ3)  ... O(log n) parts G[0] G[1] G[2] ...... 18 / 21
  • 19. Isomorphism between Each Partitions Graph partition is useful in the following sense. Lemma. d(G, H) ≤ Σi d(G[i], H[i]). Proof. Transformation from G[i] to H[i] for each i would transform G to H. □ Corollary. If d(G, H) ≥ εn, then for βi > 0 with Σ βi = ε, ∃i s.t. d(G[i], H[i]) ≥ βin. □ Thus, it suffices to check the isomorphism between G[i] and H[i] for each i=0,1,2,…. We set β0=ε/2, β1=β2=…=O(ε / log n). 19 / 21
  • 20. Isomorphism between Each Partitions Testing G[i]≅H[i]  For i=0 : We can use a tester for the bounded-degree model [NS’11].  For i≥1 : We develop a new algorithm. Sketch : We randomly sample root vertices. For each root vertex, we randomly sample its subtrees and create a histogram of subtrees. After this, we compute the minimum matching between the histograms in G and H. This minimum matching turns out to be a good approximation to d(G, H). :2 :2 :1 … 20 / 21
  • 21. Conclusion  If the input is a forest, every graph property is testable in poly(log n) queries. Future Work? Can we obtain similar results for larger graph class than forests? Outerplanar graphs, Bounded-tree width graphs, Scale-free graphs, … Query complexity Upper bound poly(log n) Lower bound Ω(√log n) Actually O(log^2^poly(1/ε)(n)) 21 / 21
  • 22. Appendix : Lower bound 22
  • 23. Lower bound - Overview 1. We construct two distributions of input, D1, D2. ∀(G, H) ∈ D1, G ≅ H ∀(G, H) ∈ D2, d(G, H) ≥ n/8 2. We reduce the isomorphism testing to checking if two probabilistic distributions are the same or not. This requires Ω(√N) queries. ≅ ? ≅ ? 23 / 21
  • 24. Lower bound Let Fk := (n / (2klogn)) copies of a star graph with 2k vertices (Remark that |Fi| = n / logn) F3 F2 F1 F0 … Flogn 24 / 21
  • 25. Lower bound Construct two distributions D1, D2 : D1 : G=H D2 : randomly assign Fk to either G or H so that |V(G)| = |V(H)|. G = F0 ∪ F1 ∪ … Flogn H = F0 ∪ F1 ∪ … Flogn G = ................................ H = ............................... F0 F1 … Flogn 25 / 21
  • 26. Lower bound Because we can perform only “random-sampling” and (degree/neighbor)-query, checking if G ≅ H is equivalent to checking two probabilistic distributions are the same. Lemma. We need Ω(√logn) queries to distinguish D1 and D2. proba. to observe by random-sampling F0 F1 F2 Flogn G H G=H 26 / 21
  • 27. Lower bound Lemma. ∀(G, H) ∈ D2, d(G, H) ≥ n/8 Proof. Let Φ:V(G)→V(H) be a bijection achieves minimum graph edit distance. It holds that d(G, H) ≥ Σv∈V(G) |deg(v) – deg(Φ(v))| / 2. If we restrict v in the sum to the root of stars, we obtain d(G, H) ≥ Σk=2,3,4,... (n / (2k logn)) ∙ 2k-1/2 ≥ n/8. □ Thus, Ω(logn) lower bound holds. Φ 27 / 21