-
Practical Computation of Graph VC-Dimension
Authors:
David Coudert,
Mónika Csikós,
Guillaume Ducoffe,
Laurent Viennot
Abstract:
For any set system $H=(V,R), \ R \subseteq 2^V$, a subset $S \subseteq V$ is called \emph{shattered} if every $S' \subseteq S$ results from the intersection of $S$ with some set in $\R$. The \emph{VC-dimension} of $H$ is the size of a largest shattered set in $V$. In this paper, we focus on the problem of computing the VC-dimension of graphs. In particular, given a graph $G=(V,E)$, the VC-dimensio…
▽ More
For any set system $H=(V,R), \ R \subseteq 2^V$, a subset $S \subseteq V$ is called \emph{shattered} if every $S' \subseteq S$ results from the intersection of $S$ with some set in $\R$. The \emph{VC-dimension} of $H$ is the size of a largest shattered set in $V$. In this paper, we focus on the problem of computing the VC-dimension of graphs. In particular, given a graph $G=(V,E)$, the VC-dimension of $G$ is defined as the VC-dimension of $(V, \mathcal N)$, where $\mathcal N$ contains each subset of $V$ that can be obtained as the closed neighborhood of some vertex $v \in V$ in $G$. Our main contribution is an algorithm for computing the VC-dimension of any graph, whose effectiveness is shown through experiments on various types of practical graphs, including graphs with millions of vertices. A key aspect of its efficiency resides in the fact that practical graphs have small VC-dimension, up to 8 in our experiments. As a side-product, we present several new bounds relating the graph VC-dimension to other classical graph theoretical notions. We also establish the $W[1]$-hardness of the graph VC-dimension problem by extending a previous result for arbitrary set systems.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
$α_i$-Metric Graphs: Hyperbolicity
Authors:
Feodor F. Dragan,
Guillaume Ducoffe
Abstract:
A graph is called $α_i$-metric ($i \in {\cal N}$) if it satisfies the following $α_i$-metric property for every vertices $u, w, v$ and $x$: if a shortest path between $u$ and $w$ and a shortest path between $x$ and $v$ share a terminal edge $vw$, then $d(u,x) \ge d(u,v) + d(v,x) - i$. The latter is a discrete relaxation of the property that in Euclidean spaces the union of two geodesics sharing a…
▽ More
A graph is called $α_i$-metric ($i \in {\cal N}$) if it satisfies the following $α_i$-metric property for every vertices $u, w, v$ and $x$: if a shortest path between $u$ and $w$ and a shortest path between $x$ and $v$ share a terminal edge $vw$, then $d(u,x) \ge d(u,v) + d(v,x) - i$. The latter is a discrete relaxation of the property that in Euclidean spaces the union of two geodesics sharing a terminal segment must be also a geodesic. Recently in (Dragan & Ducoffe, WG'23) we initiated the study of the algorithmic applications of $α_i$-metric graphs. Our results in this prior work were very similar to those established in (Chepoi et al., SoCG'08) and (Chepoi et al., COCOA'18) for graphs with bounded hyperbolicity. The latter is a heavily studied metric tree-likeness parameter first introduced by Gromov. In this paper, we clarify the relationship between hyperbolicity and the $α_i$-metric property, proving that $α_i$-metric graphs are $f(i)$-hyperbolic for some function $f$ linear in $i$. We give different proofs of this result, using various equivalent definitions to graph hyperbolicity. By contrast, we give simple constructions of $1$-hyperbolic graphs that are not $α_i$-metric for any constant $i$. Finally, in the special case of $i=1$, we prove that $α_1$-metric graphs are $1$-hyperbolic, and the bound is sharp. By doing so, we can answer some questions left open in (Dragan & Ducoffe, WG'23).
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
$α_i$-Metric Graphs: Radius, Diameter and all Eccentricities
Authors:
Feodor F. Dragan,
Guillaume Ducoffe
Abstract:
We extend known results on chordal graphs and distance-hereditary graphs to much larger graph classes by using only a common metric property of these graphs. Specifically, a graph is called $α_i$-metric ($i\in \mathcal{N}$) if it satisfies the following $α_i$-metric property for every vertices $u,w,v$ and $x$: if a shortest path between $u$ and $w$ and a shortest path between $x$ and $v$ share a t…
▽ More
We extend known results on chordal graphs and distance-hereditary graphs to much larger graph classes by using only a common metric property of these graphs. Specifically, a graph is called $α_i$-metric ($i\in \mathcal{N}$) if it satisfies the following $α_i$-metric property for every vertices $u,w,v$ and $x$: if a shortest path between $u$ and $w$ and a shortest path between $x$ and $v$ share a terminal edge $vw$, then $d(u,x)\geq d(u,v) + d(v,x)-i$. Roughly, gluing together any two shortest paths along a common terminal edge may not necessarily result in a shortest path but yields a ``near-shortest'' path with defect at most $i$. It is known that $α_0$-metric graphs are exactly ptolemaic graphs, and that chordal graphs and distance-hereditary graphs are $α_i$-metric for $i=1$ and $i=2$, respectively. We show that an additive $O(i)$-approximation of the radius, of the diameter, and in fact of all vertex eccentricities of an $α_i$-metric graph can be computed in total linear time. Our strongest results are obtained for $α_1$-metric graphs, for which we prove that a central vertex can be computed in subquadratic time, and even better in linear time for so-called $(α_1,Δ)$-metric graphs (a superclass of chordal graphs and of plane triangulations with inner vertices of degree at least $7$). The latter answers a question raised in (Dragan, IPL, 2020). Our algorithms follow from new results on centers and metric intervals of $α_i$-metric graphs. In particular, we prove that the diameter of the center is at most $3i+2$ (at most $3$, if $i=1$). The latter partly answers a question raised in (Yushmanov & Chepoi, Mathematical Problems in Cybernetics, 1991).
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Pattern detection in ordered graphs
Authors:
Guillaume Ducoffe,
Laurent Feuilloley,
Michel Habib,
François Pitois
Abstract:
A popular way to define or characterize graph classes is via forbidden subgraphs or forbidden minors. These characterizations play a key role in graph theory, but they rarely lead to efficient algorithms to recognize these classes. In contrast, many essential graph classes can be recognized efficiently thanks to characterizations of the following form: there must exist an ordering of the vertices…
▽ More
A popular way to define or characterize graph classes is via forbidden subgraphs or forbidden minors. These characterizations play a key role in graph theory, but they rarely lead to efficient algorithms to recognize these classes. In contrast, many essential graph classes can be recognized efficiently thanks to characterizations of the following form: there must exist an ordering of the vertices such that some ordered pattern does not appear, where a pattern is basically an ordered subgraph. These pattern characterizations have been studied for decades, but there have been recent efforts to better understand them systematically. In this paper, we focus on a simple problem at the core of this topic: given an ordered graph of size $n$, how fast can we detect whether a fixed pattern of size $k$ is present?
Following the literature on graph classes recognition, we first look for patterns that can be detected in linear time. We prove, among other results, that almost all patterns on three vertices (which capture many interesting classes, such as interval, chordal, split, bipartite, and comparability graphs) fall in this category. Then, in a finer-grained complexity perspective, we prove conditional lower bounds for this problem. In particular we show that for a large family of patterns on four vertices it is unlikely that subquadratic algorithm exist. Finally, we define a parameter for patterns, the merge-width, and prove that for patterns of merge-width $t$, one can solve the problem in $O(n^{ct})$ for some constant~$c$. As a corollary, we get that detecting outerplanar patterns and other classes of patterns can be done in time independent of the size of the pattern.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Balancing graph Voronoi diagrams with one more vertex
Authors:
Guillaume Ducoffe
Abstract:
Let $G=(V,E)$ be a graph with unit-length edges and nonnegative costs assigned to its vertices. Being given a list of pairwise different vertices $S=(s_1,s_2,\ldots,s_p)$, the {\em prioritized Voronoi diagram} of $G$ with respect to $S$ is the partition of $G$ in $p$ subsets $V_1,V_2,\ldots,V_p$ so that, for every $i$ with $1 \leq i \leq p$, a vertex $v$ is in $V_i$ if and only if $s_i$ is a close…
▽ More
Let $G=(V,E)$ be a graph with unit-length edges and nonnegative costs assigned to its vertices. Being given a list of pairwise different vertices $S=(s_1,s_2,\ldots,s_p)$, the {\em prioritized Voronoi diagram} of $G$ with respect to $S$ is the partition of $G$ in $p$ subsets $V_1,V_2,\ldots,V_p$ so that, for every $i$ with $1 \leq i \leq p$, a vertex $v$ is in $V_i$ if and only if $s_i$ is a closest vertex to $v$ in $S$ and there is no closest vertex to $v$ in $S$ within the subset $\{s_1,s_2,\ldots,s_{i-1}\}$. For every $i$ with $1 \leq i \leq p$, the {\em load} of vertex $s_i$ equals the sum of the costs of all vertices in $V_i$. The load of $S$ equals the maximum load of a vertex in $S$. We study the problem of adding one more vertex $v$ at the end of $S$ in order to minimize the load. This problem occurs in the context of optimally locating a new service facility ({\it e.g.}, a school or a hospital) while taking into account already existing facilities, and with the goal of minimizing the maximum congestion at a site. There is a brute-force algorithm for solving this problem in ${\cal O}(nm)$ time on $n$-vertex $m$-edge graphs. We prove a matching time lower bound for the special case where $m=n^{1+o(1)}$ and $p=1$, assuming the so called Hitting Set Conjecture of Abboud et al. On the positive side, we present simple linear-time algorithms for this problem on cliques, paths and cycles, and almost linear-time algorithms for trees, proper interval graphs and (assuming $p$ to be a constant) bounded-treewidth graphs.
△ Less
Submitted 6 November, 2022;
originally announced November 2022.
-
Obstructions to faster diameter computation: Asteroidal sets
Authors:
Guillaume Ducoffe
Abstract:
An extremity is a vertex such that the removal of its closed neighbourhood does not increase the number of connected components. Let $Ext_α$ be the class of all connected graphs whose quotient graph obtained from modular decomposition contains no more than $α$ pairwise nonadjacent extremities. Our main contributions are as follows. First, we prove that the diameter of every $m$-edge graph in…
▽ More
An extremity is a vertex such that the removal of its closed neighbourhood does not increase the number of connected components. Let $Ext_α$ be the class of all connected graphs whose quotient graph obtained from modular decomposition contains no more than $α$ pairwise nonadjacent extremities. Our main contributions are as follows. First, we prove that the diameter of every $m$-edge graph in $Ext_α$ can be computed in deterministic ${\cal O}(α^3 m^{3/2})$ time. We then improve the runtime to linear for all graphs with bounded clique-number. Furthermore, we can compute an additive $+1$-approximation of all vertex eccentricities in deterministic ${\cal O}(α^2 m)$ time. This is in sharp contrast with general $m$-edge graphs for which, under the Strong Exponential Time Hypothesis (SETH), one cannot compute the diameter in ${\cal O}(m^{2-ε})$ time for any $ε> 0$.
As important special cases of our main result, we derive an ${\cal O}(m^{3/2})$-time algorithm for exact diameter computation within dominating pair graphs of diameter at least six, and an ${\cal O}(k^3m^{3/2})$-time algorithm for this problem on graphs of asteroidal number at most $k$. We end up presenting an improved algorithm for chordal graphs of bounded asteroidal number, and a partial extension of our results to the larger class of all graphs with a dominating target of bounded cardinality. Our time upper bounds in the paper are shown to be essentially optimal under plausible complexity assumptions.
△ Less
Submitted 27 February, 2023; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Subquadratic-time algorithm for the diameter and all eccentricities on median graphs
Authors:
Pierre Bergé,
Guillaume Ducoffe,
Michel Habib
Abstract:
On sparse graphs, Roditty and Williams [2013] proved that no $O(n^{2-\varepsilon})$-time algorithm achieves an approximation factor smaller than $\frac{3}{2}$ for the diameter problem unless SETH fails. In this article, we solve an open question formulated in the literature: can we use the structural properties of median graphs to break this global quadratic barrier?
We propose the first combina…
▽ More
On sparse graphs, Roditty and Williams [2013] proved that no $O(n^{2-\varepsilon})$-time algorithm achieves an approximation factor smaller than $\frac{3}{2}$ for the diameter problem unless SETH fails. In this article, we solve an open question formulated in the literature: can we use the structural properties of median graphs to break this global quadratic barrier?
We propose the first combinatiorial algorithm computing exactly all eccentricities of a median graph in truly subquadratic time. Median graphs constitute the family of graphs which is the most studied in metric graph theory because their structure represents many other discrete and geometric concepts, such as CAT(0) cube complexes. Our result generalizes a recent one, stating that there is a linear-time algorithm for all eccentricities in median graphs with bounded dimension $d$, i.e. the dimension of the largest induced hypercube. This prerequisite on $d$ is not necessarily anymore to determine all eccentricities in subquadratic time. The execution time of our algorithm is $O(n^{1.6408}\log^{O(1)} n)$.
We provide also some satellite outcomes related to this general result. In particular, restricted to simplex graphs, this algorithm enumerates all eccentricities with a quasilinear running time. Moreover, an algorithm is proposed to compute exactly all reach centralities in time $O(2^{3d}n\log^{O(1)}n)$.
△ Less
Submitted 23 January, 2023; v1 submitted 6 October, 2021;
originally announced October 2021.
-
Fast deterministic algorithms for computing all eccentricities in (hyperbolic) Helly graphs
Authors:
Feodor F. Dragan,
Guillaume Ducoffe,
Heather M. Guarnera
Abstract:
A graph is Helly if every family of pairwise intersecting balls has a nonempty common intersection. The class of Helly graphs is the discrete analogue of the class of hyperconvex metric spaces. It is also known that every graph isometrically embeds into a Helly graph, making the latter an important class of graphs in Metric Graph Theory. We study diameter, radius and all eccentricity computations…
▽ More
A graph is Helly if every family of pairwise intersecting balls has a nonempty common intersection. The class of Helly graphs is the discrete analogue of the class of hyperconvex metric spaces. It is also known that every graph isometrically embeds into a Helly graph, making the latter an important class of graphs in Metric Graph Theory. We study diameter, radius and all eccentricity computations within the Helly graphs. Under plausible complexity assumptions, neither the diameter nor the radius can be computed in truly subquadratic time on general graphs. In contrast to these negative results, it was recently shown that the radius and the diameter of an $n$-vertex $m$-edge Helly graph $G$ can be computed with high probability in $\tilde{\mathcal O}(m\sqrt{n})$ time (i.e., subquadratic in $n+m$). In this paper, we improve that result by presenting a deterministic ${\mathcal O}(m\sqrt{n})$ time algorithm which computes not only the radius and the diameter but also all vertex eccentricities in a Helly graph. Furthermore, we give a parameterized linear-time algorithm for this problem on Helly graphs, with the parameter being the Gromov hyperbolicity $δ$. More specifically, we show that the radius and a central vertex of an $m$-edge $δ$-hyperbolic Helly graph $G$ can be computed in $\mathcal O(δm)$ time and that all vertex eccentricities in $G$ can be computed in $\mathcal O(δ^2 m)$ time. To show this more general result, we heavily use our new structural properties obtained for Helly graphs.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Beyond Helly graphs: the diameter problem on absolute retracts
Authors:
Guillaume Ducoffe
Abstract:
Characterizing the graph classes such that, on $n$-vertex $m$-edge graphs in the class, we can compute the diameter faster than in ${\cal O}(nm)$ time is an important research problem both in theory and in practice. We here make a new step in this direction, for some metrically defined graph classes. Specifically, a subgraph $H$ of a graph $G$ is called a retract of $G$ if it is the image of some…
▽ More
Characterizing the graph classes such that, on $n$-vertex $m$-edge graphs in the class, we can compute the diameter faster than in ${\cal O}(nm)$ time is an important research problem both in theory and in practice. We here make a new step in this direction, for some metrically defined graph classes. Specifically, a subgraph $H$ of a graph $G$ is called a retract of $G$ if it is the image of some idempotent endomorphism of $G$. Two necessary conditions for $H$ being a retract of $G$ is to have $H$ is an isometric and isochromatic subgraph of $G$. We say that $H$ is an absolute retract of some graph class ${\cal C}$ if it is a retract of any $G \in {\cal C}$ of which it is an isochromatic and isometric subgraph. In this paper, we study the complexity of computing the diameter within the absolute retracts of various hereditary graph classes. First, we show how to compute the diameter within absolute retracts of bipartite graphs in randomized $\tilde{\cal O}(m\sqrt{n})$ time. For the special case of chordal bipartite graphs, it can be improved to linear time, and the algorithm even computes all the eccentricities. Then, we generalize these results to the absolute retracts of $k$-chromatic graphs, for every fixed $k \geq 3$. Finally, we study the diameter problem within the absolute retracts of planar graphs and split graphs, respectively.
△ Less
Submitted 10 January, 2021;
originally announced January 2021.
-
Optimal diameter computation within bounded clique-width graphs
Authors:
Guillaume Ducoffe
Abstract:
Coudert et al. (SODA'18) proved that under the Strong Exponential-Time Hypothesis, for any $ε>0$, there is no ${\cal O}(2^{o(k)}n^{2-ε})$-time algorithm for computing the diameter within the $n$-vertex cubic graphs of clique-width at most $k$. We present an algorithm which given an $n$-vertex $m$-edge graph $G$ and a $k$-expression, computes all the eccentricities in…
▽ More
Coudert et al. (SODA'18) proved that under the Strong Exponential-Time Hypothesis, for any $ε>0$, there is no ${\cal O}(2^{o(k)}n^{2-ε})$-time algorithm for computing the diameter within the $n$-vertex cubic graphs of clique-width at most $k$. We present an algorithm which given an $n$-vertex $m$-edge graph $G$ and a $k$-expression, computes all the eccentricities in ${\cal O}(2^{{\cal O}(k)}(n+m)^{1+o(1)})$ time, thus matching their conditional lower bound. It can be modified in order to compute the Wiener index and the median set of $G$ within the same amount of time. On our way, we get a distance-labeling scheme for $n$-vertex $m$-edge graphs of clique-width at most $k$, using ${\cal O}(k\log^2{n})$ bits per vertex and constructible in ${\cal O}(k(n+m)\log{n})$ time from a given $k$-expression. Doing so, we match the label size obtained by Courcelle and Vanicat (DAM 2016), while we considerably improve the dependency on $k$ in their scheme. As a corollary, we get an ${\cal O}(kn^2\log{n})$-time algorithm for computing All-Pairs Shortest-Paths on $n$-vertex graphs of clique-width at most $k$. This partially answers an open question of Kratsch and Nelles (STACS'20).
△ Less
Submitted 17 November, 2020;
originally announced November 2020.
-
Distance problems within Helly graphs and $k$-Helly graphs
Authors:
Guillaume Ducoffe
Abstract:
The ball hypergraph of a graph $G$ is the family of balls of all possible centers and radii in $G$. It has Helly number at most $k$ if every subfamily of $k$-wise intersecting balls has a nonempty common intersection. A graph is $k$-Helly (or Helly, if $k=2$) if its ball hypergraph has Helly number at most $k$. We prove that a central vertex and all the medians in an $n$-vertex $m$-edge Helly grap…
▽ More
The ball hypergraph of a graph $G$ is the family of balls of all possible centers and radii in $G$. It has Helly number at most $k$ if every subfamily of $k$-wise intersecting balls has a nonempty common intersection. A graph is $k$-Helly (or Helly, if $k=2$) if its ball hypergraph has Helly number at most $k$. We prove that a central vertex and all the medians in an $n$-vertex $m$-edge Helly graph can be computed w.h.p. in $\tilde{\cal O}(m\sqrt{n})$ time. Both results extend to a broader setting where we define a non-negative cost function over the vertex-set. For any fixed $k$, we also present an $\tilde{\cal O}(m\sqrt{kn})$-time randomized algorithm for radius computation within $k$-Helly graphs. If we relax the definition of Helly number (for what is sometimes called an "almost Helly-type" property in the literature), then our approach leads to an approximation algorithm for computing the radius with an additive one-sided error of at most some constant.
△ Less
Submitted 30 October, 2020;
originally announced November 2020.
-
Around the diameter of AT-free graphs
Authors:
Guillaume Ducoffe
Abstract:
A graph algorithm is truly subquadratic if it runs in ${\cal O}(m^b)$ time on connected $m$-edge graphs, for some positive $b < 2$. Roditty and Vassilevska Williams (STOC'13) proved that under plausible complexity assumptions, there is no truly subquadratic algorithm for computing the diameter of general graphs. In this work, we present positive and negative results on the existence of such algori…
▽ More
A graph algorithm is truly subquadratic if it runs in ${\cal O}(m^b)$ time on connected $m$-edge graphs, for some positive $b < 2$. Roditty and Vassilevska Williams (STOC'13) proved that under plausible complexity assumptions, there is no truly subquadratic algorithm for computing the diameter of general graphs. In this work, we present positive and negative results on the existence of such algorithms for computing the diameter on some special graph classes. Specifically, three vertices in a graph form an asteroidal triple (AT) if between any two of them there exists a path that avoids the closed neighbourhood of the third one. We call a graph AT-free if it does not contain an AT. We first prove that for all $m$-edge AT-free graphs, one can compute all the eccentricities in truly subquadratic ${\cal O}(m^{3/2})$ time. Then, we extend our study to several subclasses of chordal graphs -- all of them generalizing interval graphs in various ways --, as an attempt to understand which of the properties of AT-free graphs, or natural generalizations of the latter, can help in the design of fast algorithms for the diameter problem on broader graph classes. For instance, for all chordal graphs with a dominating shortest path, there is a linear-time algorithm for computing a diametral pair if the diameter is at least four. However, already for split graphs with a dominating edge, under plausible complexity assumptions, there is no truly subquadratic algorithm for deciding whether the diameter is either $2$ or $3$.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Isometric embeddings in trees and their use in the diameter problem
Authors:
Guillaume Ducoffe
Abstract:
We prove that given a discrete space with $n$ points which is either embedded in a system of $k$ trees, or the Cartesian product of $k$ trees, we can compute all eccentricities in ${\cal O}(2^{{\cal O}(k\log{k})}(N+n)^{1+o(1)})$ time, where $N$ is the cumulative total order over all these $k$ trees. This is near optimal under the Strong Exponential-Time Hypothesis, even in the very special case of…
▽ More
We prove that given a discrete space with $n$ points which is either embedded in a system of $k$ trees, or the Cartesian product of $k$ trees, we can compute all eccentricities in ${\cal O}(2^{{\cal O}(k\log{k})}(N+n)^{1+o(1)})$ time, where $N$ is the cumulative total order over all these $k$ trees. This is near optimal under the Strong Exponential-Time Hypothesis, even in the very special case of an $n$-vertex graph embedded in a system of $ω(\log{n})$ spanning trees. However, given such an embedding in the strong product of $k$ trees, there is a much faster ${\cal O}(N + kn)$-time algorithm for this problem. All our positive results can be turned into approximation algorithms for the graphs and finite spaces with a quasi isometric embedding in trees, if such embedding is given as input, where the approximation factor (resp., the approximation constant) depends on the distortion of the embedding (resp., of its stretch). The existence of embeddings in the Cartesian product of finitely many trees has been thoroughly investigated for cube-free median graphs. We give the first-known quasi linear-time algorithm for computing the diameter within this graph class. It does not require an embedding in a product of trees to be given as part of the input. On our way, being given an $n$-node tree $T$, we propose a data structure with ${\cal O}(n\log{n})$ pre-processing time in order to compute in ${\cal O}(k\log^2{n})$ time the eccentricity of any subset of $k$ nodes. We combine the latter technical contribution, of independent interest, with a recent distance-labeling scheme that was designed for cube-free median graphs.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Eccentricity queries and beyond using Hub Labels
Authors:
Guillaume Ducoffe
Abstract:
Hub labeling schemes are popular methods for computing distances on road networks and other large complex networks, often answering to a query within a few microseconds for graphs with millions of edges. In this work, we study their algorithmic applications beyond distance queries. We focus on eccentricity queries and distance-sum queries, for several versions of these problems on directed weighte…
▽ More
Hub labeling schemes are popular methods for computing distances on road networks and other large complex networks, often answering to a query within a few microseconds for graphs with millions of edges. In this work, we study their algorithmic applications beyond distance queries. We focus on eccentricity queries and distance-sum queries, for several versions of these problems on directed weighted graphs, that is in part motivated by their importance in facility location problems. On the negative side, we show conditional lower bounds for these above problems on unweighted undirected sparse graphs, via standard constructions from "Fine-grained" complexity. However, things take a different turn when the hub labels have a sublogarithmic size. Indeed, given a hub labeling of maximum label size $\leq k$, after pre-processing the labels in total $2^{{O}(k)} \cdot |V|^{1+o(1)}$ time, we can compute both the eccentricity and the distance-sum of any vertex in $2^{{O}(k)} \cdot |V|^{o(1)}$ time. It can also be applied to the fast global computation of some topological indices. Finally, as a by-product of our approach, on any fixed class of unweighted graphs with bounded expansion, we can decide whether the diameter of an $n$-vertex graph in the class is at most $k$ in $f(k) \cdot n^{1+o(1)}$ time, for some "explicit" function $f$.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
A story of diameter, radius and Helly property
Authors:
Feodor F. Dragan,
Guillaume Ducoffe
Abstract:
A graph is Helly if every family of pairwise intersecting balls has a nonempty common intersection. Motivated by previous work on dually chordal graphs and graphs of bounded distance VC-dimension we prove several new results on the complexity of computing the diameter and the radius on Helly graphs and related graph classes.
* First, we present algorithms which given an $n$-vertex $m$-edge Helly…
▽ More
A graph is Helly if every family of pairwise intersecting balls has a nonempty common intersection. Motivated by previous work on dually chordal graphs and graphs of bounded distance VC-dimension we prove several new results on the complexity of computing the diameter and the radius on Helly graphs and related graph classes.
* First, we present algorithms which given an $n$-vertex $m$-edge Helly graph $G$ as input, compute w.h.p. its radius and its diameter in time $\tilde{\cal O}(m\sqrt{n})$. Our algorithms are based on the Helly property and on several implications of the unimodality of the eccentricity function in Helly graphs: every vertex of locally minimum eccentricity is a central vertex.
* Then, we focus on $C_4$-free Helly graphs, which include, amongst other subclasses, bridged Helly graphs and so, chordal Helly graphs and hereditary Helly graphs. For the $C_4$-free Helly graphs, we present linear-time algorithms for computing the eccentricity of all vertices. Doing so, we generalize previous results on strongly chordal graphs to a much larger subclass.
* Finally, we derive from our findings on chordal Helly graphs a more general one-to-many reduction from diameter computation on chordal graphs to either diameter computation on split graphs or the {\sc Disjoint Set} problem. Therefore, split graphs are in some sense the {\em only} hard instances for diameter computation on chordal graphs. As a byproduct of our reduction the eccentricity of all vertices in a chordal graph can be approximated in ${\cal O}(m\log{n})$ time with an additive one-sided error of at most one, and on any subclass of chordal graphs with constant VC-dimension the diameter can be computed in truly subquadratic time.
These above results are a new step toward better understanding the role of abstract geometric properties in the fast computation of metric graph invariants.
△ Less
Submitted 11 November, 2019; v1 submitted 23 October, 2019;
originally announced October 2019.
-
Fast Diameter Computation within Split Graphs
Authors:
Guillaume Ducoffe,
Michel Habib,
Laurent Viennot
Abstract:
When can we compute the diameter of a graph in quasi linear time? We address this question for the class of {\em split graphs}, that we observe to be the hardest instances for deciding whether the diameter is at most two. We stress that although the diameter of a non-complete split graph can only be either $2$ or $3$, under the Strong Exponential-Time Hypothesis (SETH) we cannot compute the…
▽ More
When can we compute the diameter of a graph in quasi linear time? We address this question for the class of {\em split graphs}, that we observe to be the hardest instances for deciding whether the diameter is at most two. We stress that although the diameter of a non-complete split graph can only be either $2$ or $3$, under the Strong Exponential-Time Hypothesis (SETH) we cannot compute the diameter of an $n$-vertex $m$-edge split graph in less than quadratic time -- in the size $n+m$ of the input. Therefore it is worth to study the complexity of diameter computation on {\em subclasses} of split graphs, in order to better understand the complexity border. Specifically, we consider the split graphs with bounded {\em clique-interval number} and their complements, with the former being a natural variation of the concept of interval number for split graphs that we introduce in this paper. We first discuss the relations between the clique-interval number and other graph invariants such as the classic interval number of graphs, the treewidth, the {\em VC-dimension} and the {\em stabbing number} of a related hypergraph. Then, in part based on these above relations, we almost completely settle the complexity of diameter computation on these subclasses of split graphs: - For the $k$-clique-interval split graphs, we can compute their diameter in truly subquadratic time if $k={\cal O}(1)$, and even in quasi linear time if $k=o(\log{n})$ and in addition a corresponding ordering of the vertices in the clique is given. However, under SETH this cannot be done in truly subquadratic time for any $k = ω(\log{n})$. - For the {\em complements} of $k$-clique-interval split graphs, we can compute their diameter in truly subquadratic time if $k={\cal O}(1)$, and even in time ${\cal O}(km)$ if a corresponding ordering of the vertices in the stable set is given. Again this latter result is optimal under SETH up to polylogarithmic factors. Our findings raise the question whether a $k$-clique interval ordering can always be computed in quasi linear time. We prove that it is the case for $k=1$ and for some subclasses such as bounded-treewidth split graphs, threshold graphs and comparability split graphs. Finally, we prove that some important subclasses of split graphs -- including the ones mentioned above -- have a bounded clique-interval number.
△ Less
Submitted 2 November, 2021; v1 submitted 8 October, 2019;
originally announced October 2019.
-
Diameter computation on $H$-minor free graphs and graphs of bounded (distance) VC-dimension
Authors:
Guillaume Ducoffe,
Michel Habib,
Laurent Viennot
Abstract:
We propose to study unweighted graphs of constant distance VC-dimension as a broad generalization of many graph classes for which we can compute the diameter in truly subquadratic-time. In particular for any fixed $H$, the class of $H$-minor free graphs has distance VC-dimension at most $|V(H)|-1$. Our first main result is that on graphs of distance VC-dimension at most $d$, for any fixed $k$ we c…
▽ More
We propose to study unweighted graphs of constant distance VC-dimension as a broad generalization of many graph classes for which we can compute the diameter in truly subquadratic-time. In particular for any fixed $H$, the class of $H$-minor free graphs has distance VC-dimension at most $|V(H)|-1$. Our first main result is that on graphs of distance VC-dimension at most $d$, for any fixed $k$ we can either compute the diameter or conclude that it is larger than $k$ in time $\tilde{\cal O}(k\cdot mn^{1-\varepsilon_d})$, where $\varepsilon_d \in (0;1)$ only depends on $d$. Then as a byproduct of our approach, we get the first truly subquadratic-time algorithm for constant diameter computation on all the nowhere dense graph classes. Finally, we show how to remove the dependency on $k$ for any graph class that excludes a fixed graph $H$ as a minor. More generally, our techniques apply to any graph with constant distance VC-dimension and polynomial expansion. As a result for all such graphs one obtains a truly subquadratic-time algorithm for computing their diameter. Our approach is based on the work of Chazelle and Welzl who proved the existence of spanning paths with strongly sublinear stabbing number for every hypergraph of constant VC-dimension. We show how to compute such paths efficiently by combining the best known approximation algorithms for the stabbing number problem with a clever use of $\varepsilon$-nets, region decomposition and other partition techniques.
△ Less
Submitted 30 October, 2019; v1 submitted 9 July, 2019;
originally announced July 2019.
-
Faster approximation algorithms for computing shortest cycles on weighted graphs
Authors:
Guillaume Ducoffe
Abstract:
Given an $n$-vertex $m$-edge graph $G$ with non negative edge-weights, the girth of $G$ is the weight of a shortest cycle in $G$. For any graph $G$ with polynomially bounded integer weights, we present a deterministic algorithm that computes, in $\tilde{\cal O}(n^{5/3}+m)$-time, a cycle of weight at most twice the girth of $G$. Our approach combines some new insights on the previous approximation…
▽ More
Given an $n$-vertex $m$-edge graph $G$ with non negative edge-weights, the girth of $G$ is the weight of a shortest cycle in $G$. For any graph $G$ with polynomially bounded integer weights, we present a deterministic algorithm that computes, in $\tilde{\cal O}(n^{5/3}+m)$-time, a cycle of weight at most twice the girth of $G$. Our approach combines some new insights on the previous approximation algorithms for this problem (Lingas and Lundell, IPL'09; Roditty and Tov, TALG'13) with Hitting Set based methods that are used for approximate distance oracles and date back from (Thorup and Zwick, JACM'05). Then, we turn our algorithm into a deterministic $(2+\varepsilon)$-approximation for graphs with arbitrary non negative edge-weights, at the price of a slightly worse running-time in $\tilde{\cal O}(n^{5/3}\log^{{\cal O}(1)}{(1/\varepsilon)}+m)$. Finally, if we insist in removing the dependency in the number $m$ of edges, we can transform our algorithms into an $\tilde{\cal O}(n^{5/3})$-time randomized $4$-approximation for the graphs with non negative edge-weights -- assuming the adjacency lists are sorted. Combined with the aforementioned Hitting Set based methods, this algorithm can be derandomized, thereby yielding an $\tilde{\cal O}(n^{5/3})$-time deterministic $4$-approximation for the graphs with polynomially bounded integer weights, and an $\tilde{\cal O}(n^{5/3}\log^{{\cal O}(1)}{(1/\varepsilon)})$-time deterministic $(4+\varepsilon)$-approximation for the graphs with non negative edge-weights. To the best of our knowledge, these are the first known subquadratic-time approximation algorithms for computing the girth of weighted graphs.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
Polynomial-time Recognition of 4-Steiner Powers
Authors:
Guillaume Ducoffe
Abstract:
The $k^{th}$-power of a given graph $G=(V,E)$ is obtained from $G$ by adding an edge between every two distinct vertices at a distance at most $k$ in $G$. We call $G$ a $k$-Steiner power if it is an induced subgraph of the $k^{th}$-power of some tree. Our main contribution is a polynomial-time recognition algorithm of $4$-Steiner powers, thereby extending the decade-year-old results of (Lin, Kearn…
▽ More
The $k^{th}$-power of a given graph $G=(V,E)$ is obtained from $G$ by adding an edge between every two distinct vertices at a distance at most $k$ in $G$. We call $G$ a $k$-Steiner power if it is an induced subgraph of the $k^{th}$-power of some tree. Our main contribution is a polynomial-time recognition algorithm of $4$-Steiner powers, thereby extending the decade-year-old results of (Lin, Kearney and Jiang, ISAAC'00) for $k=1,2$ and (Chang and Ko, WG'07) for $k=3$.
A graph $G$ is termed $k$-leaf power if there is some tree $T$ such that: all vertices in $V(G)$ are leaf-nodes of $T$, and $G$ is an induced subgraph of the $k^{th}$-power of $T$. As a byproduct of our main result, we give the first known polynomial-time recognition algorithm for $6$-leaf powers.
△ Less
Submitted 3 February, 2019; v1 submitted 4 October, 2018;
originally announced October 2018.
-
Equivalence between pathbreadth and strong pathbreadth
Authors:
Guillaume Ducoffe,
Arne Leitert
Abstract:
We say that a given graph $G = (V, E)$ has \emph{pathbreadth} at most $ρ$, denoted $\pb(G) \leq ρ$, if there exists a Roberston and Seymour's path decomposition where every bag is contained in the $ρ$-neighbourhood of some vertex. Similarly, we say that $G$ has \emph{strong pathbreadth} at most $ρ$, denoted $\spb(G) \leq ρ$, if there exists a Roberston and Seymour's path decomposition where every…
▽ More
We say that a given graph $G = (V, E)$ has \emph{pathbreadth} at most $ρ$, denoted $\pb(G) \leq ρ$, if there exists a Roberston and Seymour's path decomposition where every bag is contained in the $ρ$-neighbourhood of some vertex. Similarly, we say that $G$ has \emph{strong pathbreadth} at most $ρ$, denoted $\spb(G) \leq ρ$, if there exists a Roberston and Seymour's path decomposition where every bag is the complete $ρ$-neighbourhood of some vertex. It is straightforward that $\pb(G) \leq \spb(G)$ for any graph $G$. Inspired from a close conjecture in [Leitert and Dragan, COCOA'16], we prove in this note that $\spb(G) \leq 4 \cdot \pb(G)$.
△ Less
Submitted 17 September, 2018;
originally announced September 2018.
-
The use of a pruned modular decomposition for Maximum Matching algorithms on some graph classes
Authors:
Guillaume Ducoffe,
Alexandru Popa
Abstract:
We address the following general question: given a graph class C on which we can solve Maximum Matching in (quasi) linear time, does the same hold true for the class of graphs that can be modularly decomposed into C ? A major difficulty in this task is that the Maximum Matching problem is not preserved by quotient, thereby making difficult to exploit the structural properties of the quotient subgr…
▽ More
We address the following general question: given a graph class C on which we can solve Maximum Matching in (quasi) linear time, does the same hold true for the class of graphs that can be modularly decomposed into C ? A major difficulty in this task is that the Maximum Matching problem is not preserved by quotient, thereby making difficult to exploit the structural properties of the quotient subgraphs of the modular decomposition. So far, we are only aware of a recent framework in [Coudert et al., SODA'18] that only applies when the quotient subgraphs have bounded order and/or under additional assumptions on the nontriv-ial modules in the graph. As a first attempt toward improving this framework we study the combined effect of modular decomposition with a pruning process over the quotient subgraphs. More precisely, we remove sequentially from all such subgraphs their so-called one-vertex extensions (i.e., pendant, anti-pendant, twin, universal and isolated vertices). Doing so, we obtain a "pruned modular decomposition", that can be computed in O(m log n)-time. Our main result is that if all the pruned quotient subgraphs have bounded order then a maximum matching can be computed in linear time. This result is mostly based on two pruning rules on pendant and anti-pendant modules -- that are adjacent, respectively, to one or all but one other modules in the graph. Furthermore, these two latter rules are surprisingly intricate and we consider them as our main technical contribution in the paper. We stress that the class of graphs that can be totally decomposed by the pruned modular decomposition contains all the distance-hereditary graphs, and so, it is larger than cographs. In particular, as a byproduct of our approach we also obtain the first known linear-time algorithms for Maximum Matching on distance-hereditary graphs and graphs with modular-treewidth at most one. Finally, we can use an extended version of our framework in order to compute a maximum matching, in linear-time, for all graph classes that can be modularly decomposed into cycles. Our work is the first to explain why the existence of some nice ordering over the modules of a graph, instead of just over its vertices, can help to speed up the computation of maximum matchings on some graph classes.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
A quasi linear-time b-Matching algorithm on distance-hereditary graphs and bounded split-width graphs
Authors:
Guillaume Ducoffe,
Alexandru Popa
Abstract:
We present a quasi linear-time algorithm for Maximum Matching on distance-hereditary graphs and some of their generalizations. This improves on [Dragan, WG'97], who proposed such an algorithm for the subclass of (tent,hexahedron)-free distance-hereditary graphs. Furthermore, our result is derived from a more general one that is obtained for b-Matching. In the (unit cost) b-Matching problem, we are…
▽ More
We present a quasi linear-time algorithm for Maximum Matching on distance-hereditary graphs and some of their generalizations. This improves on [Dragan, WG'97], who proposed such an algorithm for the subclass of (tent,hexahedron)-free distance-hereditary graphs. Furthermore, our result is derived from a more general one that is obtained for b-Matching. In the (unit cost) b-Matching problem, we are given a graph G = (V, E) together with a nonnegative integer capacity b v for every vertex v $\in$ V. The objective is to assign nonnegative integer weights (x e) e$\in$E so that: for every v $\in$ V the sum of the weights of its incident edges does not exceed b v , and e$\in$E x e is maximized. We present the first algorithm for solving b-Matching on cographs, distance-hereditary graphs and some of their generalizations in quasi linear time. For that, we use a decomposition algorithm that outputs for any graph G a collection of subgraphs of G with no edge-cutsets inducing a complete bipartite subgraph (a.k.a., splits). The latter collection is sometimes called a split decomposition of G. Furthermore, there exists a generic method in order to design graph algorithms based on split decomposition [Rao, DAM'08]. However, this technique only applies to "localized" problems: for which a "best" partial solution for any given subgraph in a split decomposition can be computed almost independently from the remaining of the graph. Such framework does not apply to matching problems since an augmenting path may cross the subgraphs arbitrarily. We introduce a new technique that somehow captures all the partial solutions for a given union of subgraphs in a split decomposition, in a compact and amenable way for algorithms - assuming some piecewise linear assumption holds on the value of such solutions. The latter assumption is shown to hold for b-Matching. Doing so, we prove that solving b-Matching on any pair G, b can be reduced in quasi linear-time to solving this problem on a collection of smaller graphs: that are obtained from the subgraphs in any split decomposition of G by replacing every vertex with a constant-size module. In particular, if G has a split decomposition where all subgraphs have order at most a fixed k, then we can solve b-Matching for G, b in O((k log 2 k)$\times$(m+n)$\times$log ||b|| 1)-time. This answers an open question of [Coudert et al., SODA'18].
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
Fast approximation and exact computation of negative curvature parameters of graphs
Authors:
Jérémie Chalopin,
Victor Chepoi,
Feodor F. Dragan,
Guillaume Ducoffe,
Abdulhakeem Mohammed,
Yann Vaxès
Abstract:
In this paper, we study Gromov hyperbolicity and related parameters, that represent how close (locally) a metric space is to a tree from a metric point of view. The study of Gromov hyperbolicity for geodesic metric spaces can be reduced to the study of graph hyperbolicity. The main contribution of this paper is a new characterization of the hyperbolicity of graphs. This characterization has algori…
▽ More
In this paper, we study Gromov hyperbolicity and related parameters, that represent how close (locally) a metric space is to a tree from a metric point of view. The study of Gromov hyperbolicity for geodesic metric spaces can be reduced to the study of graph hyperbolicity. The main contribution of this paper is a new characterization of the hyperbolicity of graphs. This characterization has algorithmic implications in the field of large-scale network analysis. A sharp estimate of graph hyperbolicity is useful, e.g., in embedding an undirected graph into hyperbolic space with minimum distortion [Verbeek and Suri, SoCG'14]. The hyperbolicity of a graph can be computed in polynomial-time, however it is unlikely that it can be done in subcubic time. This makes this parameter difficult to compute or to approximate on large graphs. Using our new characterization of graph hyperbolicity, we provide a simple factor 8 approximation algorithm for computing the hyperbolicity of an $n$-vertex graph $G=(V,E)$ in optimal time $O(n^2)$ (assuming that the input is the distance matrix of the graph). This algorithm leads to constant factor approximations of other graph-parameters related to hyperbolicity (thinness, slimness, and insize). We also present the first efficient algorithms for exact computation of these parameters. All of our algorithms can be used to approximate the hyperbolicity of a geodesic metric space.
We also show that a similar characterization of hyperbolicity holds for all geodesic metric spaces endowed with a geodesic spanning tree. Along the way, we prove that any complete geodesic metric space $(X,d)$ has such a geodesic spanning tree. We hope that this fundamental result can be useful in other contexts.
△ Less
Submitted 3 June, 2019; v1 submitted 16 March, 2018;
originally announced March 2018.
-
Fully polynomial FPT algorithms for some classes of bounded clique-width graphs
Authors:
David Coudert,
Guillaume Ducoffe,
Alexandru Popa
Abstract:
Parameterized complexity theory has enabled a refined classification of the difficulty of NP-hard optimization problems on graphs with respect to key structural properties, and so to a better understanding of their true difficulties. More recently, hardness results for problems in P were achieved using reasonable complexity theoretic assumptions such as: Strong Exponential Time Hypothesis (SETH),…
▽ More
Parameterized complexity theory has enabled a refined classification of the difficulty of NP-hard optimization problems on graphs with respect to key structural properties, and so to a better understanding of their true difficulties. More recently, hardness results for problems in P were achieved using reasonable complexity theoretic assumptions such as: Strong Exponential Time Hypothesis (SETH), 3SUM and All-Pairs Shortest-Paths (APSP). According to these assumptions, many graph theoretic problems do not admit truly subquadratic algorithms, nor even truly subcubic algorithms (Williams and Williams, FOCS 2010 and Abboud, Grandoni, Williams, SODA 2015). A central technique used to tackle the difficulty of the above mentioned problems is fixed-parameter algorithms for polynomial-time problems with polynomial dependency in the fixed parameter (P-FPT). This technique was introduced by Abboud, Williams and Wang in SODA 2016 and continued by Husfeldt (IPEC 2016) and Fomin et al. (SODA 2017), using the treewidth as a parameter. Applying this technique to clique-width, another important graph parameter, remained to be done. In this paper we study several graph theoretic problems for which hardness results exist such as cycle problems (triangle detection, triangle counting, girth, diameter), distance problems (diameter, eccentricities, Gromov hyperbolicity, betweenness centrality) and maximum matching. We provide hardness results and fully polynomial FPT algorithms, using clique-width and some of its upper-bounds as parameters (split-width, modular-width and $P\_4$-sparseness). We believe that our most important result is an ${\cal O}(k^4 \cdot n + m)$-time algorithm for computing a maximum matching where $k$ is either the modular-width or the $P\_4$-sparseness. The latter generalizes many algorithms that have been introduced so far for specific subclasses such as cographs, $P\_4$-lite graphs, $P\_4$-extendible graphs and $P\_4$-tidy graphs. Our algorithms are based on preprocessing methods using modular decomposition, split decomposition and primeval decomposition. Thus they can also be generalized to some graph classes with unbounded clique-width.
△ Less
Submitted 18 October, 2017; v1 submitted 17 July, 2017;
originally announced July 2017.
-
On computing tree and path decompositions with metric constraints on the bags
Authors:
Guillaume Ducoffe,
Sylvain Legay,
Nicolas Nisse
Abstract:
We here investigate on the complexity of computing the \emph{tree-length} and the \emph{tree-breadth} of any graph $G$, that are respectively the best possible upper-bounds on the diameter and the radius of the bags in a tree decomposition of $G$. \emph{Path-length} and \emph{path-breadth} are similarly defined and studied for path decompositions.
So far, it was already known that tree-length is…
▽ More
We here investigate on the complexity of computing the \emph{tree-length} and the \emph{tree-breadth} of any graph $G$, that are respectively the best possible upper-bounds on the diameter and the radius of the bags in a tree decomposition of $G$. \emph{Path-length} and \emph{path-breadth} are similarly defined and studied for path decompositions.
So far, it was already known that tree-length is NP-hard to compute. We here prove it is also the case for tree-breadth, path-length and path-breadth. Furthermore, we provide a more detailed analysis on the complexity of computing the tree-breadth. In particular, we show that graphs with tree-breadth one are in some sense the hardest instances for the problem of computing the tree-breadth. We give new properties of graphs with tree-breadth one. Then we use these properties in order to recognize in polynomial-time all graphs with tree-breadth one that are planar or bipartite graphs. On the way, we relate tree-breadth with the notion of \emph{$k$-good} tree decompositions (for $k=1$), that have been introduced in former work for routing. As a byproduct of the above relation, we prove that deciding on the existence of a $k$-good tree decomposition is NP-complete (even if $k=1$). All this answers open questions from the literature.
△ Less
Submitted 8 January, 2016;
originally announced January 2016.
-
XRay: Enhancing the Web's Transparency with Differential Correlation
Authors:
Mathias Lecuyer,
Guillaume Ducoffe,
Francis Lan,
Andrei Papancea,
Theofilos Petsios,
Riley Spahn,
Augustin Chaintreau,
Roxana Geambasu
Abstract:
Today's Web services - such as Google, Amazon, and Facebook - leverage user data for varied purposes, including personalizing recommendations, targeting advertisements, and adjusting prices. At present, users have little insight into how their data is being used. Hence, they cannot make informed choices about the services they choose. To increase transparency, we developed XRay, the first fine-gra…
▽ More
Today's Web services - such as Google, Amazon, and Facebook - leverage user data for varied purposes, including personalizing recommendations, targeting advertisements, and adjusting prices. At present, users have little insight into how their data is being used. Hence, they cannot make informed choices about the services they choose. To increase transparency, we developed XRay, the first fine-grained, robust, and scalable personal data tracking system for the Web. XRay predicts which data in an arbitrary Web account (such as emails, searches, or viewed products) is being used to target which outputs (such as ads, recommended products, or prices). XRay's core functions are service agnostic and easy to instantiate for new services, and they can track data within and across services. To make predictions independent of the audited service, XRay relies on the following insight: by comparing outputs from different accounts with similar, but not identical, subsets of data, one can pinpoint targeting through correlation. We show both theoretically, and through experiments on Gmail, Amazon, and YouTube, that XRay achieves high precision and recall by correlating data from a surprisingly small number of extra accounts.
△ Less
Submitted 7 October, 2014; v1 submitted 8 July, 2014;
originally announced July 2014.
-
Can Selfish Groups be Self-Enforcing?
Authors:
Guillaume Ducoffe,
Dorian Mazauric,
Augustin Chaintreau
Abstract:
Algorithmic graph theory has thoroughly analyzed how, given a network describing constraints between various nodes, groups can be formed among these so that the resulting configuration optimizes a \emph{global} metric. In contrast, for various social and economic networks, groups are formed \emph{de facto} by the choices of selfish players. A fundamental problem in this setting is the existence an…
▽ More
Algorithmic graph theory has thoroughly analyzed how, given a network describing constraints between various nodes, groups can be formed among these so that the resulting configuration optimizes a \emph{global} metric. In contrast, for various social and economic networks, groups are formed \emph{de facto} by the choices of selfish players. A fundamental problem in this setting is the existence and convergence to a \emph{self-enforcing} configuration: assignment of players into groups such that no player has an incentive to move into another group than hers. Motivated by information sharing on social networks -- and the difficult tradeoff between its benefits and the associated privacy risk -- we study the possible emergence of such stable configurations in a general selfish group formation game.
Our paper considers this general game for the first time, and it completes its analysis. We show that convergence critically depends on the level of \emph{collusions} among the players -- which allow multiple players to move simultaneously as long as \emph{all of them} benefit. Solving a previously open problem we exactly show when, depending on collusions, convergence occurs within polynomial time, non-polynomial time, and when it never occurs. We also prove that previously known bounds on convergence time are all loose: by a novel combinatorial analysis of the evolution of this game we are able to provide the first \emph{asymptotically exact} formula on its convergence. Moreover, we extend these results by providing a complete analysis when groups may \emph{overlap}, and for general utility functions representing \emph{multi-modal} interactions. Finally, we prove that collusions have a significant and \emph{positive} effect on the \emph{efficiency} of the equilibrium that is attained.
△ Less
Submitted 12 February, 2014; v1 submitted 16 December, 2012;
originally announced December 2012.