-
Spiral Spin Liquid Noise
Authors:
Hiroto Takahashi,
Chun-Chih Hsu,
Fabian Jerzembeck,
Jack Murphy,
Jonathan Ward,
Jack D. Enright,
Jan Knapp,
Pascal Puphal,
Masahiko Isobe,
Yosuke Matsumoto,
Hidenori Takagi,
J. C. Séamus Davis,
Stephen J. Blundell
Abstract:
No state of matter can be defined categorically by what it is not; yet spin liquids are often conjectured to exist based on the nonexistence of magnetic order as $T \to 0$. An emerging concept designed to circumvent this ambiguity is to categorically identify each spin liquid type by using its spectrum of spontaneous spin noise. Here we introduce such a spectroscopy to spin liquid studies by consi…
▽ More
No state of matter can be defined categorically by what it is not; yet spin liquids are often conjectured to exist based on the nonexistence of magnetic order as $T \to 0$. An emerging concept designed to circumvent this ambiguity is to categorically identify each spin liquid type by using its spectrum of spontaneous spin noise. Here we introduce such a spectroscopy to spin liquid studies by considering Ca$_{10}$Cr$_7$O$_{28}$. This is a spin liquid, but whether classical or quantum and in which specific state, are unknown. By enhancing the flux-noise spectrometry techniques introduced for magnetic monopole noise studies, here we measure the time and temperature dependence of spontaneous flux $\varPhi(t,T)$ and thus magnetization $M(t,T)$ of Ca$_{10}$Cr$_7$O$_{28}$ samples. The resulting power spectral density of magnetization noise $S_M(ω,T)$ along with its correlation function $C_M(t,T)$, reveal intense spin fluctuations spanning frequencies $0.1\ \mathrm{Hz} \leq ω/2π\leq 50\ \mathrm{kHz}$, and that $S_M(ω,T)\propto ω^{-α(T)}$ with $0.84 < α(T) < 1.04$. Predictions for quantum spin liquids yield a frequency-independent spin-noise spectrum, clearly inconsistent with this phenomenology However, when compared to Monte Carlo simulations for a 2D spiral spin liquid state that are accurately parameterized to describe Ca$_{10}$Cr$_7$O$_{28}$, comprehensive quantitative correspondence with the data including $S_M(ω,T)$, $C_M(t,T)$ and magnetization variance $σ_M^2(T)$ fingerprint the state of Ca$_{10}$Cr$_7$O$_{28}$ as a spiral spin liquid.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Reachability in temporal graphs under perturbation
Authors:
Jessica Enright,
Laura Larios-Jones,
Kitty Meeks,
William Pettersson
Abstract:
Reachability and other path-based measures on temporal graphs can be used to understand spread of infection, information, and people in modelled systems. Due to delays and errors in reporting, temporal graphs derived from data are unlikely to perfectly reflect reality, especially with respect to the precise times at which edges appear. To reflect this uncertainty, we consider a model in which some…
▽ More
Reachability and other path-based measures on temporal graphs can be used to understand spread of infection, information, and people in modelled systems. Due to delays and errors in reporting, temporal graphs derived from data are unlikely to perfectly reflect reality, especially with respect to the precise times at which edges appear. To reflect this uncertainty, we consider a model in which some number $ζ$ of edge appearances may have their timestamps perturbed by $\pmδ$ for some $δ$. Within this model, we investigate temporal reachability and consider the problem of determining the maximum number of vertices any vertex can reach under these perturbations. We show that this problem is intractable in general but is efficiently solvable when $ζ$ is sufficiently large. We also give algorithms which solve this problem in several restricted settings. We complement this with some contrasting results concerning the complexity of related temporal eccentricity problems under perturbation.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Structural Parameters for Dense Temporal Graphs
Authors:
Jessica Enright,
Samuel D. Hand,
Laura Larios-Jones,
Kitty Meeks
Abstract:
Temporal graphs provide a useful model for many real-world networks. Unfortunately the majority of algorithmic problems we might consider on such graphs are intractable. There has been recent progress in defining structural parameters which describe tractable cases by simultaneously restricting the underlying structure and the times at which edges appear in the graph. These all rely on the tempora…
▽ More
Temporal graphs provide a useful model for many real-world networks. Unfortunately the majority of algorithmic problems we might consider on such graphs are intractable. There has been recent progress in defining structural parameters which describe tractable cases by simultaneously restricting the underlying structure and the times at which edges appear in the graph. These all rely on the temporal graph being sparse in some sense. We introduce temporal analogues of three increasingly restrictive static graph parameters -- cliquewidth, modular-width and neighbourhood diversity -- which take small values for highly structured temporal graphs, even if a large number of edges are active at each timestep. The computational problems solvable efficiently when the temporal cliquewidth of the input graph is bounded form a subset of those solvable efficiently when the temporal modular-width is bounded, which is in turn a subset of problems efficiently solvable when the temporal neighbourhood diversity is bounded. By considering specific temporal graph problems, we demonstrate that (up to standard complexity theoretic assumptions) these inclusions are strict.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Cops and Robbers on Multi-Layer Graphs
Authors:
Jessica Enright,
Kitty Meeks,
William Pettersson,
John Sylvester
Abstract:
We generalise the popular cops and robbers game to multi-layer graphs, where each cop and the robber are restricted to a single layer (or set of edges). We show that initial intuition about the best way to allocate cops to layers is not always correct, and prove that the multi-layer cop number is neither bounded from above nor below by any increasing function of the cop numbers of the individual l…
▽ More
We generalise the popular cops and robbers game to multi-layer graphs, where each cop and the robber are restricted to a single layer (or set of edges). We show that initial intuition about the best way to allocate cops to layers is not always correct, and prove that the multi-layer cop number is neither bounded from above nor below by any increasing function of the cop numbers of the individual layers. We determine that it is NP-hard to decide if $k$ cops are sufficient to catch the robber, even if every cop layer is a tree and a set of isolated vertices. However, we give a polynomial time algorithm to determine if $k$ cops can win when the robber layer is a tree. Additionally, we investigate a question of worst-case divisions of a simple graph into layers: given a simple graph $G$, what is the maximum number of cops required to catch a robber over all multi-layer graphs where each edge of $G$ is in at least one layer and all layers are connected? For cliques, suitably dense random graphs, and graphs of bounded treewidth, we determine this parameter up to multiplicative constants. Lastly we consider a multi-layer variant of Meyniel's conjecture, and show the existence of an infinite family of graphs whose multi-layer cop number is bounded from below by a constant times $n / \log n$, where $n$ is the number of vertices in the graph.
△ Less
Submitted 23 November, 2023; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Bovine Tuberculosis in Britain: identifying signatures of polarisation and controversy on Twitter
Authors:
Christopher J. Banks,
Jessica Enright,
Sibylle Mohr,
Rowland R. Kao
Abstract:
Approaches to disease control are influenced by and reflected in public opinion, and the two are intrinsically entwined. Bovine tuberculosis (bTB) in British cattle and badgers is one example where there is a high degree of polarisation in opinion. Bovine viral diarrhoea (BVD), on the other hand, does not have the same controversy.
In this paper we examine how language subjectivity on Twitter di…
▽ More
Approaches to disease control are influenced by and reflected in public opinion, and the two are intrinsically entwined. Bovine tuberculosis (bTB) in British cattle and badgers is one example where there is a high degree of polarisation in opinion. Bovine viral diarrhoea (BVD), on the other hand, does not have the same controversy.
In this paper we examine how language subjectivity on Twitter differs when comparing the discourses surrounding bTB and BVD, using a combination of network analysis and language and sentiment analysis. That data used for this study was collected from the Twitter public API over a two-year period. We investigated the network structure, language content, and user profiles of tweets featuring both diseases.
While analysing network structure showed little difference between the two disease topics, elements of the structure allowed us to better investigate the language structure and profile of users. We found distinct differences between the language and sentiment used in tweets about each disease, and in the profile of the users who were doing the tweeting. We hope that this will guide further investigation and potential avenues for surveillance or the control of misinformation.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
Visualization for Epidemiological Modelling: Challenges, Solutions, Reflections & Recommendations
Authors:
Jason Dykes,
Alfie Abdul-Rahman,
Daniel Archambault,
Benjamin Bach,
Rita Borgo,
Min Chen,
Jessica Enright,
Hui Fang,
Elif E. Firat,
Euan Freeman,
Tuna Gonen,
Claire Harris,
Radu Jianu,
Nigel W. John,
Saiful Khan,
Andrew Lahiff,
Robert S. Laramee,
Louise Matthews,
Sibylle Mohr,
Phong H. Nguyen,
Alma A. M. Rahat,
Richard Reeve,
Panagiotis D. Ritsos,
Jonathan C. Roberts,
Aidan Slingsby
, et al. (8 additional authors not shown)
Abstract:
We report on an ongoing collaboration between epidemiological modellers and visualization researchers by documenting and reflecting upon knowledge constructs -- a series of ideas, approaches and methods taken from existing visualization research and practice -- deployed and developed to support modelling of the COVID-19 pandemic. Structured independent commentary on these efforts is synthesized th…
▽ More
We report on an ongoing collaboration between epidemiological modellers and visualization researchers by documenting and reflecting upon knowledge constructs -- a series of ideas, approaches and methods taken from existing visualization research and practice -- deployed and developed to support modelling of the COVID-19 pandemic. Structured independent commentary on these efforts is synthesized through iterative reflection to develop: evidence of the effectiveness and value of visualization in this context; open problems upon which the research communities may focus; guidance for future activity of this type; and recommendations to safeguard the achievements and promote, advance, secure and prepare for future collaborations of this kind. In describing and comparing a series of related projects that were undertaken in unprecedented conditions, our hope is that this unique report, and its rich interactive supplementary materials, will guide the scientific community in embracing visualization in its observation, analysis and modelling of data as well as in disseminating findings. Equally we hope to encourage the visualization community to engage with impactful science in addressing its emerging data challenges. If we are successful, this showcase of activity may stimulate mutually beneficial engagement between communities with complementary expertise to address problems of significance in epidemiology and beyond. https://ramp-vis.github.io/RAMPVIS-PhilTransA-Supplement/
△ Less
Submitted 20 June, 2022; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Making Life More Confusing for Firefighters
Authors:
Samuel Hand,
Jessica Enright,
Kitty Meeks
Abstract:
It is well known that fighting a fire is a hard task. The Firefighter problem asks how to optimally deploy firefighters to defend the vertices of a graph from a fire. This problem is NP-Complete on all but a few classes of graphs. Thankfully, firefighters do not have to work alone, and are often aided by the efforts of good natured civilians who slow the spread of a fire by maintaining firebreaks…
▽ More
It is well known that fighting a fire is a hard task. The Firefighter problem asks how to optimally deploy firefighters to defend the vertices of a graph from a fire. This problem is NP-Complete on all but a few classes of graphs. Thankfully, firefighters do not have to work alone, and are often aided by the efforts of good natured civilians who slow the spread of a fire by maintaining firebreaks when they are able. We will show that this help, although well-intentioned, unfortunately makes the optimal deployment of firefighters an even harder problem. To model this scenario we introduce the Temporal Firefighter problem, an extension of Firefighter to temporal graphs. We show that Temporal Firefighter is also NP-Complete, and remains so on all but one of the underlying classes of graphs on which Firefighter is known to have polynomial time solutions. This motivates us to explore making use of the temporal structure of the graph in our search for tractability, and we conclude by presenting an FPT algorithm for Temporal Firefighter with respect to the temporal graph parameter vertex-interval-membership-width.
△ Less
Submitted 6 April, 2022; v1 submitted 25 February, 2022;
originally announced February 2022.
-
Counting Temporal Paths
Authors:
Jessica Enright,
Kitty Meeks,
Hendrik Molter
Abstract:
The betweenness centrality of a vertex v is an important centrality measure that quantifies how many optimal paths between pairs of other vertices visit v. Computing betweenness centrality in a temporal graph, in which the edge set may change over discrete timesteps, requires us to count temporal paths that are optimal with respect to some criterion. For several natural notions of optimality, incl…
▽ More
The betweenness centrality of a vertex v is an important centrality measure that quantifies how many optimal paths between pairs of other vertices visit v. Computing betweenness centrality in a temporal graph, in which the edge set may change over discrete timesteps, requires us to count temporal paths that are optimal with respect to some criterion. For several natural notions of optimality, including foremost or fastest temporal paths, this counting problem reduces to #Temporal Path, the problem of counting all temporal paths between a fixed pair of vertices; like the problems of counting foremost and fastest temporal paths, #Temporal Path is #P-hard in general. Motivated by the many applications of this intractable problem, we initiate a systematic study of the prameterised and approximation complexity of #Temporal Path. We show that the problem presumably does not admit an FPT-algorithm for the feedback vertex number of the static underlying graph, and that it is hard to approximate in general. On the positive side, we proved several exact and approximate FPT-algorithms for special cases.
△ Less
Submitted 21 February, 2023; v1 submitted 24 February, 2022;
originally announced February 2022.
-
Recognising the overlap graphs of subtrees of restricted trees is hard
Authors:
Jessica Enright,
Martin Pergel
Abstract:
The overlap graphs of subtrees in a tree (SOGs) generalise many other graphs classes with set representation characterisations. The complexity of recognising SOGs in open. The complexities of recognising many subclasses of SOGs are known. We consider several subclasses of SOGs by restricting the underlying tree. For a fixed integer $k \geq 3$, we consider: \begin{my_itemize}
\item The overlap gr…
▽ More
The overlap graphs of subtrees in a tree (SOGs) generalise many other graphs classes with set representation characterisations. The complexity of recognising SOGs in open. The complexities of recognising many subclasses of SOGs are known. We consider several subclasses of SOGs by restricting the underlying tree. For a fixed integer $k \geq 3$, we consider: \begin{my_itemize}
\item The overlap graphs of subtrees in a tree where that tree has $k$ leaves
\item The overlap graphs of subtrees in trees that can be derived from a given input tree by subdivision and have at least 3 leaves
\item The overlap and intersection graphs of paths in a tree where that tree has maximum degree $k$ \end{my_itemize}
We show that the recognition problems of these classes are NP-complete. For all other parameters we get circle graphs, well known to be polynomially recognizable.
△ Less
Submitted 22 December, 2021;
originally announced February 2022.
-
FAIR Data Pipeline: provenance-driven data management for traceable scientific workflows
Authors:
Sonia Natalie Mitchell,
Andrew Lahiff,
Nathan Cummings,
Jonathan Hollocombe,
Bram Boskamp,
Ryan Field,
Dennis Reddyhoff,
Kristian Zarebski,
Antony Wilson,
Bruno Viola,
Martin Burke,
Blair Archibald,
Paul Bessell,
Richard Blackwell,
Lisa A Boden,
Alys Brett,
Sam Brett,
Ruth Dundas,
Jessica Enright,
Alejandra N. Gonzalez-Beltran,
Claire Harris,
Ian Hinder,
Christopher David Hughes,
Martin Knight,
Vino Mano
, et al. (13 additional authors not shown)
Abstract:
Modern epidemiological analyses to understand and combat the spread of disease depend critically on access to, and use of, data. Rapidly evolving data, such as data streams changing during a disease outbreak, are particularly challenging. Data management is further complicated by data being imprecisely identified when used. Public trust in policy decisions resulting from such analyses is easily da…
▽ More
Modern epidemiological analyses to understand and combat the spread of disease depend critically on access to, and use of, data. Rapidly evolving data, such as data streams changing during a disease outbreak, are particularly challenging. Data management is further complicated by data being imprecisely identified when used. Public trust in policy decisions resulting from such analyses is easily damaged and is often low, with cynicism arising where claims of "following the science" are made without accompanying evidence. Tracing the provenance of such decisions back through open software to primary data would clarify this evidence, enhancing the transparency of the decision-making process. Here, we demonstrate a Findable, Accessible, Interoperable and Reusable (FAIR) data pipeline developed during the COVID-19 pandemic that allows easy annotation of data as they are consumed by analyses, while tracing the provenance of scientific outputs back through the analytical source code to data sources. Such a tool provides a mechanism for the public, and fellow scientists, to better assess the trust that should be placed in scientific evidence, while allowing scientists to support policy-makers in openly justifying their decisions. We believe that tools such as this should be promoted for use across all areas of policy-facing research.
△ Less
Submitted 4 May, 2022; v1 submitted 13 October, 2021;
originally announced October 2021.
-
Tangled Paths: A Random Graph Model from Mallows Permutations
Authors:
Jessica Enright,
Kitty Meeks,
William Pettersson,
John Sylvester
Abstract:
We introduce the random graph $\mathcal{P}(n,q)$ which results from taking the union of two paths of length $n\geq 1$, where the vertices of one of the paths have been relabelled according to a Mallows permutation with parameter $0<q(n)\leq 1$. This random graph model, the tangled path, goes through an evolution: if $q$ is close to $0$ the graph bears resemblance to a path, and as $q$ tends to…
▽ More
We introduce the random graph $\mathcal{P}(n,q)$ which results from taking the union of two paths of length $n\geq 1$, where the vertices of one of the paths have been relabelled according to a Mallows permutation with parameter $0<q(n)\leq 1$. This random graph model, the tangled path, goes through an evolution: if $q$ is close to $0$ the graph bears resemblance to a path, and as $q$ tends to $1$ it becomes an expander. In an effort to understand the evolution of $\mathcal{P}(n,q)$ we determine the treewidth and cutwidth of $\mathcal{P}(n,q)$ up to log factors for all $q$. We also show that the property of having a separator of size one has a sharp threshold. In addition, we prove bounds on the diameter, and vertex isoperimetric number for specific values of $q$.
△ Less
Submitted 19 February, 2024; v1 submitted 10 August, 2021;
originally announced August 2021.
-
The Role of Cross-Silo Federated Learning in Facilitating Data Sharing in the Agri-Food Sector
Authors:
Aiden Durrant,
Milan Markovic,
David Matthews,
David May,
Jessica Enright,
Georgios Leontidis
Abstract:
Data sharing remains a major hindering factor when it comes to adopting emerging AI technologies in general, but particularly in the agri-food sector. Protectiveness of data is natural in this setting; data is a precious commodity for data owners, which if used properly can provide them with useful insights on operations and processes leading to a competitive advantage. Unfortunately, novel AI tec…
▽ More
Data sharing remains a major hindering factor when it comes to adopting emerging AI technologies in general, but particularly in the agri-food sector. Protectiveness of data is natural in this setting; data is a precious commodity for data owners, which if used properly can provide them with useful insights on operations and processes leading to a competitive advantage. Unfortunately, novel AI technologies often require large amounts of training data in order to perform well, something that in many scenarios is unrealistic. However, recent machine learning advances, e.g. federated learning and privacy-preserving technologies, can offer a solution to this issue via providing the infrastructure and underpinning technologies needed to use data from various sources to train models without ever sharing the raw data themselves. In this paper, we propose a technical solution based on federated learning that uses decentralized data, (i.e. data that are not exchanged or shared but remain with the owners) to develop a cross-silo machine learning model that facilitates data sharing across supply chains. We focus our data sharing proposition on improving production optimization through soybean yield prediction, and provide potential use-cases that such methods can assist in other problem settings. Our results demonstrate that our approach not only performs better than each of the models trained on an individual data source, but also that data sharing in the agri-food sector can be enabled via alternatives to data exchange, whilst also hel** to adopt emerging machine learning technologies to boost productivity.
△ Less
Submitted 4 May, 2023; v1 submitted 14 April, 2021;
originally announced April 2021.
-
Lifetime measurements of excited states in $^{15}$O
Authors:
B. Frentz,
A. Aprahamian,
A. M. Clark,
C. Dulal,
J. D. Enright,
R. J. deBoer,
J. Görres,
S. L. Henderson,
K. B. Howard,
R. Kelmar,
K. Lee,
L. Morales,
S. Moylan,
Z. Raman,
W. Tan,
L. E. Weghorn,
M. Wiescher
Abstract:
The CNO cycle is the main energy source in stars more massive than our sun, it defines the energy production and the cycle time that lead to the lifetime of massive stars, and it is an important tool for the determination of the age of globular clusters. One of the largest uncertainties in the CNO chain of reactions comes from the uncertainty in the $^{14}$N$(p,γ)^{15}$O reaction rate. This uncert…
▽ More
The CNO cycle is the main energy source in stars more massive than our sun, it defines the energy production and the cycle time that lead to the lifetime of massive stars, and it is an important tool for the determination of the age of globular clusters. One of the largest uncertainties in the CNO chain of reactions comes from the uncertainty in the $^{14}$N$(p,γ)^{15}$O reaction rate. This uncertainty arises predominantly from the uncertainty in the lifetime of the sub-threshold state in $^{15}$O at $E_{x}$ = 6792 keV. Previous measurements of this state's lifetime are significantly discrepant. Here, we report on a new lifetime measurement of this state, as well as the excited states in $^{15}$O at $E_{x}$ = 5181 keV and $E_{x}$ = 6172 keV, via the $^{14}$N$(p,γ)^{15}$O reaction at proton energies of $E_{p} = 1020$ keV and $E_{p} = 1570$ keV. The lifetimes have been determined with the Doppler-Shift Attenuation Method (DSAM) with three separate, nitrogen-implanted targets with Mo, Ta, and W backing. We obtained lifetimes from the weighted average of the three measurements, allowing us to account for systematic differences between the backing materials. For the 6792 keV state, we obtained a $τ= 0.6 \pm 0.4$ fs. To provide cross-validation of our method, we measured the known lifetimes of the states at 5181 keV and 6172 keV to be $τ= 7.5 \pm 3.0$ and $τ= 0.7 \pm 0.5$ fs, respectively, which are in good agreement with previous measurements.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.
-
The complexity of finding and enumerating optimal subgraphs to represent spatial correlation
Authors:
Jessica Enright,
Duncan Lee,
Kitty Meeks,
William Pettersson,
John Sylvester
Abstract:
Understanding spatial correlation is vital in many fields including epidemiology and social science. Lee, Meeks and Pettersson (Stat. Comput. 2021) recently demonstrated that improved inference for areal unit count data can be achieved by carrying out modifications to a graph representing spatial correlations; specifically, they delete edges of the planar graph derived from border-sharing between…
▽ More
Understanding spatial correlation is vital in many fields including epidemiology and social science. Lee, Meeks and Pettersson (Stat. Comput. 2021) recently demonstrated that improved inference for areal unit count data can be achieved by carrying out modifications to a graph representing spatial correlations; specifically, they delete edges of the planar graph derived from border-sharing between geographic regions in order to maximise a specific objective function. In this paper we address the computational complexity of the associated graph optimisation problem. We demonstrate that this problem cannot be solved in polynomial time unless P = NP; we further show intractability for two simpler variants of the problem. We follow these results with two parameterised algorithms that exactly solve the problem. Both of these solve not only the decision problem, but also enumerate all solutions with polynomial time precalculation, delay, and postcalculation time in respective restricted settings. For this problem, efficient enumeration allows the uncertainty in the spatial correlation to be utilised in the modelling. The first enumeration algorithm utilises dynamic programming on a tree decomposition, and has polynomial time precalculation and linear delay if both the treewidth and maximum degree are bounded. The second algorithm is restricted to problem instances with maximum degree three, as may arise from triangulations of planar surfaces, but can output all solutions with FPT precalculation time and linear delay when the maximum number of edges that can be removed is taken as the parameter.
△ Less
Submitted 14 July, 2022; v1 submitted 20 October, 2020;
originally announced October 2020.
-
The Firebreak Problem
Authors:
Kathleen D. Barnetson,
Andrea C. Burgess,
Jessica Enright,
Jared Howell,
David A. Pike,
Brady Ryan
Abstract:
Suppose we have a network that is represented by a graph $G$. Potentially a fire (or other type of contagion) might erupt at some vertex of $G$. We are able to respond to this outbreak by establishing a firebreak at $k$ other vertices of $G$, so that the fire cannot pass through these fortified vertices. The question that now arises is which $k$ vertices will result in the greatest number of verti…
▽ More
Suppose we have a network that is represented by a graph $G$. Potentially a fire (or other type of contagion) might erupt at some vertex of $G$. We are able to respond to this outbreak by establishing a firebreak at $k$ other vertices of $G$, so that the fire cannot pass through these fortified vertices. The question that now arises is which $k$ vertices will result in the greatest number of vertices being saved from the fire, assuming that the fire will spread to every vertex that is not fully behind the $k$ vertices of the firebreak. This is the essence of the {\sc Firebreak} decision problem, which is the focus of this paper. We establish that the problem is intractable on the class of split graphs as well as on the class of bipartite graphs, but can be solved in linear time when restricted to graphs having constant-bounded treewidth, or in polynomial time when restricted to intersection graphs. We also consider some closely related problems.
△ Less
Submitted 11 May, 2020; v1 submitted 23 January, 2019;
originally announced January 2019.
-
Deleting edges to restrict the size of an epidemic in temporal networks
Authors:
Jessica Enright,
Kitty Meeks,
George B. Mertzios,
Viktor Zamaraev
Abstract:
Spreading processes on graphs are a natural model for a wide variety of real-world phenomena, including information spread over social networks and biological diseases spreading over contact networks. Often, the networks over which these processes spread are dynamic in nature, and can be modeled with temporal graphs. Here, we study the problem of deleting edges from a given temporal graph in order…
▽ More
Spreading processes on graphs are a natural model for a wide variety of real-world phenomena, including information spread over social networks and biological diseases spreading over contact networks. Often, the networks over which these processes spread are dynamic in nature, and can be modeled with temporal graphs. Here, we study the problem of deleting edges from a given temporal graph in order to reduce the number of vertices (temporally) reachable from a given starting point. This could be used to control the spread of a disease, rumour, etc. in a temporal graph. In particular, our aim is to find a temporal subgraph in which a process starting at any single vertex can be transferred to only a limited number of other vertices using a temporally-feasible path. We introduce a natural edge-deletion problem for temporal graphs and provide positive and negative results on its computational complexity and approximability.
△ Less
Submitted 11 February, 2021; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Representations of Quantum Groups defined over Commutative Rings III
Authors:
Ben L. Cox,
Thomas J. Enright
Abstract:
We survey some of our old results given in [CE95] and [CE10] and present some new ones in the last three sections.We survey some of our old results given in [CE95] and [CE10] and present some new ones in the last three sections.
We survey some of our old results given in [CE95] and [CE10] and present some new ones in the last three sections.We survey some of our old results given in [CE95] and [CE10] and present some new ones in the last three sections.
△ Less
Submitted 8 April, 2018;
originally announced April 2018.
-
Assigning times to minimise reachability in temporal graphs
Authors:
Jessica Enright,
Kitty Meeks,
Fiona Skerman
Abstract:
Temporal graphs (in which edges are active at specified times) are of particular relevance for spreading processes on graphs, e.g.~the spread of disease or dissemination of information. Motivated by real-world applications, modification of static graphs to control this spread has proven a rich topic for previous research. Here, we introduce a new type of modification for temporal graphs: the numbe…
▽ More
Temporal graphs (in which edges are active at specified times) are of particular relevance for spreading processes on graphs, e.g.~the spread of disease or dissemination of information. Motivated by real-world applications, modification of static graphs to control this spread has proven a rich topic for previous research. Here, we introduce a new type of modification for temporal graphs: the number of active times for each edge is fixed, but we can change the relative order in which (sets of) edges are active. We investigate the problem of determining an ordering of edges that minimises the maximum number of vertices reachable from any single starting vertex; epidemiologically, this corresponds to the worst-case number of vertices infected in a single disease outbreak. We study two versions of this problem, both of which we show to be $\NP$-hard, and identify cases in which the problem can be solved or approximated efficiently.
△ Less
Submitted 13 August, 2020; v1 submitted 16 February, 2018;
originally announced February 2018.
-
Two dichotomies for model-checking in multi-layer structures
Authors:
Jessica Enright,
Kitty Meeks,
Jessica Ryan
Abstract:
Multi-layer graphs can capture qualitatively different types of connection between entities, and networks of this kind are prevalent in biological and social systems: for example, a social contact network typically involves both virtual and face-to-face interactions between individuals. Since each layer is likely to exhibit stronger and/or more easily identifiable structurally properties than the…
▽ More
Multi-layer graphs can capture qualitatively different types of connection between entities, and networks of this kind are prevalent in biological and social systems: for example, a social contact network typically involves both virtual and face-to-face interactions between individuals. Since each layer is likely to exhibit stronger and/or more easily identifiable structurally properties than the overall system, it is natural to ask whether we can exploit the structural properties of individual layers to solve NP-hard problems efficiently on the overall network. In this paper we provide a complete characterisation of the structural properties required in each layer to guarantee the existence of an FPT algorithm to solve problems definable in either first-order or monadic second-order logic on the overall system, subject to the assumption that the structural properties are preserved under deletion of vertices and/or edges.
△ Less
Submitted 23 July, 2020; v1 submitted 24 October, 2017;
originally announced October 2017.
-
Equivalence of the filament and overlap graphs of subtrees of limited trees
Authors:
Jessica Enright,
Lorna Stewart
Abstract:
The overlap graphs of subtrees of a tree are equivalent to subtree filament graphs, the overlap graphs of subtrees of a star are cocomparability graphs, and the overlap graphs of subtrees of a caterpillar are interval filament graphs. In this paper, we show the equivalence of many more classes of subtree overlap and subtree filament graphs, and equate them to classes of complements of cochordal-mi…
▽ More
The overlap graphs of subtrees of a tree are equivalent to subtree filament graphs, the overlap graphs of subtrees of a star are cocomparability graphs, and the overlap graphs of subtrees of a caterpillar are interval filament graphs. In this paper, we show the equivalence of many more classes of subtree overlap and subtree filament graphs, and equate them to classes of complements of cochordal-mixed graphs. Our results generalize the previously known results mentioned above.
△ Less
Submitted 14 June, 2017; v1 submitted 6 August, 2015;
originally announced August 2015.
-
Deleting edges to restrict the size of an epidemic
Authors:
Jessica Enright,
Kitty Meeks
Abstract:
Motivated by applications in network epidemiology, we consider the problem of determining whether it is possible to delete at most $k$ edges from a given input graph (of small treewidth) so that the resulting graph avoids a set $\mathcal{F}$ of forbidden subgraphs; of particular interest is the problem of determining whether it is possible to delete at most $k$ edges so that the resulting graph ha…
▽ More
Motivated by applications in network epidemiology, we consider the problem of determining whether it is possible to delete at most $k$ edges from a given input graph (of small treewidth) so that the resulting graph avoids a set $\mathcal{F}$ of forbidden subgraphs; of particular interest is the problem of determining whether it is possible to delete at most $k$ edges so that the resulting graph has no connected component of more than $h$ vertices, as this bounds the worst-case size of an epidemic. While even this special case of the problem is NP-complete in general (even when $h=3$), we provide evidence that many of the real-world networks of interest are likely to have small treewidth, and we describe an algorithm which solves the general problem in time \genruntime ~on an input graph having $n$ vertices and whose treewidth is bounded by a fixed constant $w$, if each of the subgraphs we wish to avoid has at most $r$ vertices. For the special case in which we wish only to ensure that no component has more than $h$ vertices, we improve on this to give an algorithm running in time $O((wh)^{2w}n)$, which we have implemented and tested on real datasets based on cattle movements.
△ Less
Submitted 19 April, 2017; v1 submitted 22 April, 2015;
originally announced April 2015.
-
Metric distances derived from cosine similarity and Pearson and Spearman correlations
Authors:
Stijn van Dongen,
Anton J. Enright
Abstract:
We investigate two classes of transformations of cosine similarity and Pearson and Spearman correlations into metric distances, utilising the simple tool of metric-preserving functions. The first class puts anti-correlated objects maximally far apart. Previously known transforms fall within this class. The second class collates correlated and anti-correlated objects. An example of such a transform…
▽ More
We investigate two classes of transformations of cosine similarity and Pearson and Spearman correlations into metric distances, utilising the simple tool of metric-preserving functions. The first class puts anti-correlated objects maximally far apart. Previously known transforms fall within this class. The second class collates correlated and anti-correlated objects. An example of such a transformation that yields a metric distance is the sine function when applied to centered data.
△ Less
Submitted 14 August, 2012;
originally announced August 2012.
-
On List Colouring and List Homomorphism of Permutation and Interval Graphs
Authors:
Jessica Enright,
Lorna Stewart,
Gabor Tardos
Abstract:
List colouring is an NP-complete decision problem even if the total number of colours is three. It is hard even on planar bipartite graphs. We give a polynomial-time algorithm for solving list colouring of permutation graphs with a bounded total number of colours. More generally we give a polynomial-time algorithm that solves the list-homomorphism problem to any fixed target graph for a large clas…
▽ More
List colouring is an NP-complete decision problem even if the total number of colours is three. It is hard even on planar bipartite graphs. We give a polynomial-time algorithm for solving list colouring of permutation graphs with a bounded total number of colours. More generally we give a polynomial-time algorithm that solves the list-homomorphism problem to any fixed target graph for a large class of input graphs including all permutation and interval graphs.
△ Less
Submitted 22 June, 2012;
originally announced June 2012.
-
Optimal Foraging of Renewable Resources
Authors:
John J. Enright,
Emilio Frazzoli
Abstract:
Consider a team of agents in the plane searching for and visiting target points that appear in a bounded environment according to a stochastic renewal process with a known absolutely continuous spatial distribution. Agents must detect targets with limited-range onboard sensors. It is desired to minimize the expected waiting time between the appearance of a target point, and the instant it is visit…
▽ More
Consider a team of agents in the plane searching for and visiting target points that appear in a bounded environment according to a stochastic renewal process with a known absolutely continuous spatial distribution. Agents must detect targets with limited-range onboard sensors. It is desired to minimize the expected waiting time between the appearance of a target point, and the instant it is visited. When the sensing radius is small, the system time is dominated by time spent searching, and it is shown that the optimal policy requires the agents to search a region at a relative frequency proportional to the square root of its renewal rate. On the other hand, when targets appear frequently, the system time is dominated by time spent servicing known targets, and it is shown that the optimal policy requires the agents to service a region at a relative frequency proportional to the cube root of its renewal rate. Furthermore, the presented algorithms in this case recover the optimal performance achieved by agents with full information of the environment. Simulation results verify the theoretical performance of the algorithms.
△ Less
Submitted 31 January, 2012; v1 submitted 24 September, 2011;
originally announced September 2011.
-
3-List Colouring Permutation Graphs
Authors:
Jessica Enright,
Lorna Stewart
Abstract:
3-list colouring is an NP-complete decision problem. It is hard even on planar bipartite graphs. We give a polynomial-time algorithm for solving 3-list colouring on permutation graphs.
3-list colouring is an NP-complete decision problem. It is hard even on planar bipartite graphs. We give a polynomial-time algorithm for solving 3-list colouring on permutation graphs.
△ Less
Submitted 3 May, 2011; v1 submitted 26 April, 2011;
originally announced April 2011.
-
Representations of quantum groups defined over commutative rings II
Authors:
Ben L. Cox,
Thomas J. Enright
Abstract:
In this article we study the structure of highest weight modules for quantum groups defined over a commutative ring with particular emphasis on the structure theory for invariant bilinear forms on these modules.
In this article we study the structure of highest weight modules for quantum groups defined over a commutative ring with particular emphasis on the structure theory for invariant bilinear forms on these modules.
△ Less
Submitted 19 January, 2006;
originally announced January 2006.