Skip to main content

Showing 1–50 of 60 results for author: Kim, E J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.17204  [pdf, other

    cs.DS cs.CC

    Bandwidth Parameterized by Cluster Vertex Deletion Number

    Authors: Tatsuya Gima, Eun Jung Kim, Noleen Köhler, Nikolaos Melissinos, Manolis Vasilakis

    Abstract: Given a graph $G$ and an integer $b$, Bandwidth asks whether there exists a bijection $π$ from $V(G)$ to $\{1, \ldots, |V(G)|\}$ such that $\max_{\{u, v \} \in E(G)} | π(u) - π(v) | \leq b$. This is a classical NP-complete problem, known to remain NP-complete even on very restricted classes of graphs, such as trees of maximum degree 3 and caterpillars of hair length 3. In the realm of parameterize… ▽ More

    Submitted 2 October, 2023; v1 submitted 29 September, 2023; originally announced September 2023.

    Comments: An extended abstract of this article was presented at IPEC 2023

  2. On weighted graph separation problems and flow-augmentation

    Authors: Eun Jung Kim, Tomáš Masařík, Marcin Pilipczuk, Roohani Sharma, Magnus Wahlström

    Abstract: One of the first application of the recently introduced technique of \emph{flow-augmentation} [Kim et al., STOC 2022] is a fixed-parameter algorithm for the weighted version of \textsc{Directed Feedback Vertex Set}, a landmark problem in parameterized complexity. In this note we explore applicability of flow-augmentation to other weighted graph separation problems parameterized by the size of the… ▽ More

    Submitted 2 September, 2022; v1 submitted 31 August, 2022; originally announced August 2022.

    Comments: 17 pages, 1 figure

    MSC Class: 68Q27; 68Q25 ACM Class: F.2

    Journal ref: SIAM Journal on Discrete Mathematics 38(1), 170-189, 2024

  3. arXiv:2207.07422  [pdf, other

    cs.CC cs.DS

    Flow-augmentation III: Complexity dichotomy for Boolean CSPs parameterized by the number of unsatisfied constraints

    Authors: Eun Jung Kim, Stefan Kratsch, Marcin Pilipczuk, Magnus Wahlström

    Abstract: We study the parameterized problem of satisfying ``almost all'' constraints of a given formula $F$ over a fixed, finite Boolean constraint language $Γ$, with or without weights. More precisely, for each finite Boolean constraint language $Γ$, we consider the following two problems. In Min SAT$(Γ)$, the input is a formula $F$ over $Γ$ and an integer $k$, and the task is to find an assignment… ▽ More

    Submitted 15 February, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

    Comments: v2. Major update to all three flow-augmentation papers

  4. arXiv:2206.00752  [pdf, ps, other

    cs.DS

    Algorithmic Applications of Tree-Cut Width

    Authors: Robert Ganian, Eun Jung Kim, Stefan Szeider

    Abstract: The recently introduced graph parameter tree-cut width plays a similar role with respect to immersions as the graph parameter treewidth plays with respect to minors. In this paper, we provide the first algorithmic applications of tree-cut width to hard combinatorial problems. Tree-cut width is known to be lower-bounded by a function of treewidth, but it can be much larger and hence has the potenti… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

    Comments: Full version to appear in the Siam Journal on Discrete Mathematics

  5. arXiv:2204.00722  [pdf, other

    cs.DS cs.DM cs.LO math.CO

    Twin-width VIII: delineation and win-wins

    Authors: Édouard Bonnet, Dibyayan Chakraborty, Eun Jung Kim, Noleen Köhler, Raul Lopes, Stéphan Thomassé

    Abstract: We introduce the notion of delineation. A graph class $\mathcal C$ is said delineated if for every hereditary closure $\mathcal D$ of a subclass of $\mathcal C$, it holds that $\mathcal D$ has bounded twin-width if and only if $\mathcal D$ is monadically dependent. An effective strengthening of delineation for a class $\mathcal C$ implies that tractable FO model checking on $\mathcal C$ is perfect… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 51 pages, 19 figures

    MSC Class: 05C85; 05C75 ACM Class: F.2.2

  6. arXiv:2201.01443  [pdf, other

    eess.IV cs.CV physics.med-ph

    Neural KEM: A Kernel Method with Deep Coefficient Prior for PET Image Reconstruction

    Authors: Siqi Li, Kuang Gong, Ramsey D. Badawi, Edward J. Kim, **yi Qi, Guobao Wang

    Abstract: Image reconstruction of low-count positron emission tomography (PET) data is challenging. Kernel methods address the challenge by incorporating image prior information in the forward model of iterative PET image reconstruction. The kernelized expectation-maximization (KEM) algorithm has been developed and demonstrated to be effective and easy to implement. A common approach for a further improveme… ▽ More

    Submitted 24 October, 2022; v1 submitted 4 January, 2022; originally announced January 2022.

    Comments: arXiv admin note: text overlap with arXiv:2110.01174

  7. Attack of the Knights: A Non Uniform Cache Side-Channel Attack

    Authors: Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Chia-Che Tsai, Eun Jung Kim, Abdullah Muzahid

    Abstract: For a distributed last-level cache (LLC) in a large multicore chip, the access time to one LLC bank can significantly differ from that to another due to the difference in physical distance. In this paper, we successfully demonstrated a new distance-based side-channel attack by timing the AES decryption operation and extracting part of an AES secret key on an Intel Knights Landing CPU. We introduce… ▽ More

    Submitted 31 May, 2023; v1 submitted 18 December, 2021; originally announced December 2021.

    Journal ref: Annual Computer Security Applications Conference ACSAC 2023

  8. arXiv:2111.03450  [pdf, other

    cs.DS cs.DM

    Flow-augmentation I: Directed graphs

    Authors: Eun Jung Kim, Stefan Kratsch, Marcin Pilipczuk, Magnus Wahlström

    Abstract: We show a flow-augmentation algorithm in directed graphs: There exists a randomized polynomial-time algorithm that, given a directed graph $G$, two vertices $s,t \in V(G)$, and an integer $k$, adds (randomly) to $G$ a number of arcs such that for every minimal $st$-cut $Z$ in $G$ of size at most $k$, with probability $2^{-\mathrm{poly}(k)}$ the set $Z$ becomes a minimum $st$-cut in the resulting g… ▽ More

    Submitted 15 February, 2023; v1 submitted 5 November, 2021; originally announced November 2021.

    Comments: v2. Major update of three flow-augmentation papers. Includes a deterministic version. Weighted Almost 2-SAT algorithm has been removed, as it is superseded by a more general algorithm of Flow-Augmentation III (arXiv:2207.07422)

  9. arXiv:2111.00282  [pdf, other

    cs.DS cs.DM cs.LO math.CO

    Twin-width VI: the lens of contraction sequences

    Authors: Édouard Bonnet, Eun Jung Kim, Amadeus Reinald, Stéphan Thomassé

    Abstract: A contraction sequence of a graph consists of iteratively merging two of its vertices until only one vertex remains. The recently introduced twin-width graph invariant is based on contraction sequences. More precisely, if one puts red edges between two vertices representing non-homogeneous subsets, the twin-width is the minimum integer $d$ such that a contraction sequence keeps red degree at most… ▽ More

    Submitted 31 May, 2022; v1 submitted 30 October, 2021; originally announced November 2021.

    Comments: 27 pages, 3 figures

    MSC Class: 68R10; 05C85 ACM Class: F.2.2

  10. arXiv:2110.15419  [pdf, other

    cs.DS cs.CC cs.CG

    EPTAS and Subexponential Algorithm for Maximum Clique on Disk and Unit Ball Graphs

    Authors: Marthe Bonamy, Édouard Bonnet, Nicolas Bousquet, Pierre Charbit, Panos Giannopoulos, Eun Jung Kim, Paweł Rzążewski, Florian Sikora, Stéphan Thomassé

    Abstract: A (unit) disk graph is the intersection graph of closed (unit) disks in the plane. Almost three decades ago, an elegant polynomial-time algorithm was found for \textsc{Maximum Clique} on unit disk graphs [Clark, Colbourn, Johnson; Discrete Mathematics '90]. Since then, it has been an intriguing open question whether or not tractability can be extended to general disk graphs. We show that the disjo… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1712.05010, arXiv:1803.01822

    Journal ref: J. ACM 68(2): 9:1-9:38 (2021)

  11. arXiv:2107.02882  [pdf, other

    cs.DS cs.CC cs.DM math.CO

    Twin-width and polynomial kernels

    Authors: Édouard Bonnet, Eun Jung Kim, Amadeus Reinald, Stéphan Thomassé, Rémi Watrigant

    Abstract: We study the existence of polynomial kernels, for parameterized problems without a polynomial kernel on general graphs, when restricted to graphs of bounded twin-width. Our main result is that a polynomial kernel for $k$-Dominating Set on graphs of twin-width at most 4 would contradict a standard complexity-theoretic assumption. The reduction is quite involved, especially to get the twin-width upp… ▽ More

    Submitted 14 September, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

    Comments: 32 pages, 11 figures

    MSC Class: 05C85 ACM Class: F.2.2

  12. arXiv:2105.00857  [pdf, other

    cs.DS

    A Constant-factor Approximation for Weighted Bond Cover

    Authors: Eun Jung Kim, Euiwoong Lee, Dimitrios M. Thilikos

    Abstract: The {\sc Weighted} $\mathcal{F}$-\textsc{Vertex Deletion} for a class ${\cal F}$ of graphs asks, weighted graph $G$, for a minimum weight vertex set $S$ such that $G-S\in{\cal F}.$ The case when ${\cal F}$ is minor-closed and excludes some graph as a minor has received particular attention but a constant-factor approximation remained elusive for \textsc{Weighted} $\mathcal{F}$-{\sc Vertex Deletion… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    MSC Class: 05C35; 05C83; 05C85; 68R10; 68W25 ACM Class: F.2.2; G.2.2

  13. arXiv:2104.13671  [pdf, other

    cs.AR cs.LG cs.NI cs.OS

    Continual Learning Approach for Improving the Data and Computation Map** in Near-Memory Processing System

    Authors: Pritam Majumder, Jiayi Huang, Sungkeun Kim, Abdullah Muzahid, Dylan Siegers, Chia-Che Tsai, Eun Jung Kim

    Abstract: The resurgence of near-memory processing (NMP) with the advent of big data has shifted the computation paradigm from processor-centric to memory-centric computing. To meet the bandwidth and capacity demands of memory-centric computing, 3D memory has been adopted to form a scalable memory-cube network. Along with NMP and memory system development, the map** for placing data and guiding computatio… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

  14. arXiv:2009.00809  [pdf, other

    cs.DS cs.DM math.CO

    Towards constant-factor approximation for chordal / distance-hereditary vertex deletion

    Authors: Jungho Ahn, Eun Jung Kim, Euiwoong Lee

    Abstract: For a family of graphs $\mathcal{F}$, Weighted $\mathcal{F}$-Deletion is the problem for which the input is a vertex weighted graph $G=(V,E)$ and the goal is to delete $S\subseteq V$ with minimum weight such that $G\setminus S\in\mathcal{F}$. Designing a constant-factor approximation algorithm for large subclasses of perfect graphs has been an interesting research direction. Block graphs, 3-leaf p… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: 27 pages, 2 figures

  15. Grundy Distinguishes Treewidth from Pathwidth

    Authors: Rémy Belmonte, Eun Jung Kim, Michael Lampis, Valia Mitsou, Yota Otachi

    Abstract: Structural graph parameters, such as treewidth, pathwidth, and clique-width, are a central topic of study in parameterized complexity. A main aim of research in this area is to understand the "price of generality" of these widths: as we transition from more restrictive to more general notions, which are the problems that see their complexity status deteriorate from fixed-parameter tractable to int… ▽ More

    Submitted 18 April, 2022; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: Conference version appeared in ESA 2020. This is the full version which has been accepted for publication at SIDMA

  16. arXiv:2008.05504  [pdf, other

    cs.DM cs.DS math.CO

    On the tree-width of even-hole-free graphs

    Authors: Pierre Aboulker, Isolde Adler, Eun Jung Kim, Ni Luh Dewi Sintiari, Nicolas Trotignon

    Abstract: The class of all even-hole-free graphs has unbounded tree-width, as it contains all complete graphs. Recently, a class of (even-hole, $K_4$)-free graphs was constructed, that still has unbounded tree-width [Sintiari and Trotignon, 2019]. The class has unbounded degree and contains arbitrarily large clique-minors. We ask whether this is necessary. We prove that for every graph $G$, if $G$ exclude… ▽ More

    Submitted 12 August, 2020; originally announced August 2020.

    Journal ref: European Journal of Combinatorics, Volume 98, 2021, 103394

  17. arXiv:2007.14161  [pdf, other

    cs.DS cs.CC cs.DM math.CO

    Twin-width III: Max Independent Set, Min Dominating Set, and Coloring

    Authors: Édouard Bonnet, Colin Geniet, Eun Jung Kim, Stéphan Thomassé, Rémi Watrigant

    Abstract: We recently introduced the graph invariant twin-width, and showed that first-order model checking can be solved in time $f(d,k)n$ for $n$-vertex graphs given with a witness that the twin-width is at most $d$, called $d$-contraction sequence or $d$-sequence, and formulas of size $k$ [Bonnet et al., FOCS '20]. The inevitable price to pay for such a general result is that $f$ is a tower of exponentia… ▽ More

    Submitted 12 February, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

    Comments: 38 pages, 6 figures. This version contains more results, notably the approximation for Min Dominating Set, and the title has been edited accordingly

    MSC Class: 05C85 ACM Class: F.2.2

  18. arXiv:2007.09018  [pdf, other

    cs.DS

    Flow-augmentation II: Undirected graphs

    Authors: Eun Jung Kim, Stefan Kratsch, Marcin Pilipczuk, Magnus Wahlström

    Abstract: We present an undirected version of the recently introduced flow-augmentation technique: Given an undirected multigraph $G$ with distinguished vertices $s,t \in V(G)$ and an integer $k$, one can in randomized $k^{O(1)} \cdot (|V(G)| + |E(G)|)$ time sample a set $A \subseteq \binom{V(G)}{2}$ such that the following holds: for every inclusion-wise minimal $st$-cut $Z$ in $G$ of cardinality at most… ▽ More

    Submitted 15 February, 2023; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: v2. Major update of all three flow-augmentation papers. The partial dichotomy part has been removed from this work, as it is superseded by the full dichotomy of Flow-Augmentation III (arXiv:2207.07422)

  19. arXiv:2006.09877  [pdf, other

    cs.DM cs.DS cs.LO math.CO

    Twin-width II: small classes

    Authors: Édouard Bonnet, Colin Geniet, Eun Jung Kim, Stéphan Thomassé, Rémi Watrigant

    Abstract: The twin-width of a graph $G$ is the minimum integer $d$ such that $G$ has a $d$-contraction sequence, that is, a sequence of $|V(G)|-1$ iterated vertex identifications for which the overall maximum number of red edges incident to a single vertex is at most $d$, where a red edge appears between two sets of identified vertices if they are not homogeneous in $G$. We show that if a graph admits a… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

    Comments: 37 pages, 9 figures

    MSC Class: 68R10; 05C30; 05C48 ACM Class: G.2.2

  20. arXiv:2004.14789  [pdf, other

    cs.DS cs.DM cs.LO

    Twin-width I: tractable FO model checking

    Authors: Édouard Bonnet, Eun Jung Kim, Stéphan Thomassé, Rémi Watrigant

    Abstract: Inspired by a width invariant defined on permutations by Guillemot and Marx [SODA '14], we introduce the notion of twin-width on graphs and on matrices. Proper minor-closed classes, bounded rank-width graphs, map graphs, $K_t$-free unit $d$-dimensional ball graphs, posets with antichains of bounded size, and proper subclasses of dimension-2 posets all have bounded twin-width. On all these classes… ▽ More

    Submitted 25 October, 2021; v1 submitted 30 April, 2020; originally announced April 2020.

    Comments: 49 pages, 9 figures

    MSC Class: 68Q25 ACM Class: F.2.2

  21. arXiv:2001.03794  [pdf, other

    cs.CC cs.DM cs.DS math.CO

    Grundy Coloring & friends, Half-Graphs, Bicliques

    Authors: Pierre Aboulker, Édouard Bonnet, Eun Jung Kim, Florian Sikora

    Abstract: The first-fit coloring is a heuristic that assigns to each vertex, arriving in a specified order $σ$, the smallest available color. The problem Grundy Coloring asks how many colors are needed for the most adversarial vertex ordering $σ$, i.e., the maximum number of colors that the first-fit coloring requires over all possible vertex orderings. Since its inception by Grundy in 1939, Grundy Coloring… ▽ More

    Submitted 11 January, 2020; originally announced January 2020.

    Comments: 25 pages, 5 figures

    MSC Class: 68W05 ACM Class: F.2.2

  22. arXiv:1910.14056  [pdf, other

    cs.LG stat.ML

    Unsupervised Star Galaxy Classification with Cascade Variational Auto-Encoder

    Authors: Hao Sun, Jiadong Guo, Edward J. Kim, Robert J. Brunner

    Abstract: The increasing amount of data in astronomy provides great challenges for machine learning research. Previously, supervised learning methods achieved satisfactory recognition accuracy for the star-galaxy classification task, based on manually labeled data set. In this work, we propose a novel unsupervised approach for the star-galaxy recognition task, namely Cascade Variational Auto-Encoder (CasVAE… ▽ More

    Submitted 30 October, 2019; originally announced October 2019.

  23. arXiv:1910.04882  [pdf, other

    cs.AR cs.NI

    Remote Control: A Simple Deadlock Avoidance Scheme for Modular System on Chip

    Authors: Pritam Majumder, Sungkeun Kim, Jiayi Huang, Ki Hwan Yum, Eun Jung Kim

    Abstract: The increase in design cost and complexity have motivated designers to adopt modular design of System on Chip (SoC) by integrating independently designed small chiplets. However, it introduces new challenges for correctness validation, increasing chances of forming deadlock in the system involving multiple chiplets. Although there have been many solutions available for deadlock freedom in flat net… ▽ More

    Submitted 10 October, 2019; originally announced October 2019.

  24. New Results on Directed Edge Dominating Set

    Authors: Rémy Belmonte, Tesshu Hanaka, Ioannis Katsikarelis, Eun Jung Kim, Michael Lampis

    Abstract: We study a family of generalizations of Edge Dominating Set on directed graphs called Directed $(p,q)$-Edge Dominating Set. In this problem an arc $(u,v)$ is said to dominate itself, as well as all arcs which are at distance at most $q$ from $v$, or at distance at most $p$ to $u$. First, we give significantly improved FPT algorithms for the two most important cases of the problem, $(0,1)$-dEDS a… ▽ More

    Submitted 3 March, 2023; v1 submitted 13 February, 2019; originally announced February 2019.

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 25:1 (March 10, 2023) dmtcs:5378

  25. arXiv:1809.08160  [pdf, ps, other

    cs.DS math.CO

    Data-compression for Parametrized Counting Problems on Sparse graphs

    Authors: Eun Jung Kim, Maria Serna, Dimitrios M. Thilikos

    Abstract: We study the concept of \emph{compactor}, which may be seen as a counting-analogue of kernelization in counting parameterized complexity. For a function $F:Σ^*\to \Bbb{N}$ and a parameterization $κ: Σ^*\to \Bbb{N}$, a compactor $({\sf P},{\sf M})$ consists of a polynomial-time computable function ${\sf P}$, called \emph{condenser}, and a computable function ${\sf M}$, called \emph{extractor}, such… ▽ More

    Submitted 25 September, 2018; v1 submitted 21 September, 2018; originally announced September 2018.

    Comments: An extended abstract of this paper was accepted to ISAAC 2018

    MSC Class: 68R10; 68W01 ACM Class: G.2.2; F.2.2

  26. arXiv:1807.05322  [pdf, other

    cs.DS

    Token Sliding on Split Graphs

    Authors: Rémy Belmonte, Eun Jung Kim, Michael Lampis, Valia Mitsou, Yota Otachi, Florian Sikora

    Abstract: We consider the complexity of the Independent Set Reconfiguration problem under the Token Sliding rule. In this problem we are given two independent sets of a graph and are asked if we can transform one to the other by repeatedly exchanging a vertex that is currently in the set with one of its neighbors, while maintaining the set independent. Our main result is to show that this problem is PSPACE-… ▽ More

    Submitted 27 January, 2019; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: 17 pages, 1 figure. STACS 2019

  27. arXiv:1712.05010  [pdf, other

    cs.CG cs.DS

    QPTAS and Subexponential Algorithm for Maximum Clique on Disk Graphs

    Authors: Édouard Bonnet, Panos Giannopoulos, Eun Jung Kim, Paweł Rzążewski, Florian Sikora

    Abstract: A (unit) disk graph is the intersection graph of closed (unit) disks in the plane. Almost three decades ago, an elegant polynomial-time algorithm was found for \textsc{Maximum Clique} on unit disk graphs [Clark, Colbourn, Johnson; Discrete Mathematics '90]. Since then, it has been an intriguing open question whether or not tractability can be extended to general disk graphs. We show the rather sur… ▽ More

    Submitted 28 February, 2018; v1 submitted 13 December, 2017; originally announced December 2017.

    Comments: 20 pages, 12 figures, to appear at SoCG 2018. This is the full version

    ACM Class: F.2.2; G.2.2

  28. arXiv:1711.01381  [pdf, ps, other

    cs.DM math.CO

    Finding branch-decompositions of matroids, hypergraphs, and more

    Authors: Jisu Jeong, Eun Jung Kim, Sang-il Oum

    Abstract: Given $n$ subspaces of a finite-dimensional vector space over a fixed finite field $\mathbb F$, we wish to find a "branch-decomposition" of these subspaces of width at most $k$ that is a subcubic tree $T$ with $n$ leaves mapped bijectively to the subspaces such that for every edge $e$ of $T$, the sum of subspaces associated to the leaves in one component of $T-e$ and the sum of subspaces associate… ▽ More

    Submitted 27 October, 2021; v1 submitted 3 November, 2017; originally announced November 2017.

    Comments: 79 pages, 15 figures; Fix a few English issues. To appear in SIAM J. Discrete Math

    MSC Class: 05C85; 05C78; 68R05; 05B35

    Journal ref: SIAM J. Discrete Math., 35(4):2544-2617, November 2021

  29. arXiv:1711.00667  [pdf, ps, other

    math.CO cs.DS

    Erdős-Pósa property of chordless cycles and its applications

    Authors: Eun Jung Kim, O-joung Kwon

    Abstract: A chordless cycle, or equivalently a hole, in a graph $G$ is an induced subgraph of $G$ which is a cycle of length at least $4$. We prove that the Erdős-Pósa property holds for chordless cycles, which resolves the major open question concerning the Erdős-Pósa property. Our proof for chordless cycles is constructive: in polynomial time, one can find either $k+1$ vertex-disjoint chordless cycles, or… ▽ More

    Submitted 7 May, 2020; v1 submitted 2 November, 2017; originally announced November 2017.

    Comments: 35 pages, 11 figures, accepted to JCTB

  30. arXiv:1610.07229  [pdf, other

    cs.DS

    A Polynomial Kernel for Distance-Hereditary Vertex Deletion

    Authors: Eun Jung Kim, O-joung Kwon

    Abstract: A graph is distance-hereditary if for any pair of vertices, their distance in every connected induced subgraph containing both vertices is the same as their distance in the original graph. The Distance-Hereditary Vertex Deletion problem asks, given a graph $G$ on $n$ vertices and an integer $k$, whether there is a set $S$ of at most $k$ vertices in $G$ such that $G-S$ is distance-hereditary. This… ▽ More

    Submitted 20 February, 2017; v1 submitted 23 October, 2016; originally announced October 2016.

    Comments: 37 pages, 6 figures; improved previous kernel size to O(k^{30} polylogk)

  31. arXiv:1608.04369  [pdf, other

    astro-ph.IM astro-ph.CO astro-ph.GA cs.CV

    Star-galaxy Classification Using Deep Convolutional Neural Networks

    Authors: Edward J. Kim, Robert J. Brunner

    Abstract: Most existing star-galaxy classifiers use the reduced summary information from catalogs, requiring careful feature extraction and selection. The latest advances in machine learning that use deep convolutional neural networks allow a machine to automatically learn the features directly from data, minimizing the need for input from human experts. We present a star-galaxy classification framework tha… ▽ More

    Submitted 13 October, 2016; v1 submitted 15 August, 2016; originally announced August 2016.

    Comments: 13 page, 13 figures. Accepted for publication in the MNRAS. Code available at https://github.com/EdwardJKim/dl4astro

  32. arXiv:1604.07397  [pdf, other

    stat.OT cs.CY physics.ed-ph

    Teaching Data Science

    Authors: Robert J. Brunner, Edward J. Kim

    Abstract: We describe an introductory data science course, entitled Introduction to Data Science, offered at the University of Illinois at Urbana-Champaign. The course introduced general programming concepts by using the Python programming language with an emphasis on data preparation, processing, and presentation. The course had no prerequisites, and students were not expected to have any programming exper… ▽ More

    Submitted 25 April, 2016; originally announced April 2016.

    Comments: 10 pages, 4 figures, International Conference on Computational Science (ICCS 2016)

  33. Complexity and Approximability of Parameterized MAX-CSPs

    Authors: Holger Dell, Eun Jung Kim, Michael Lampis, Valia Mitsou, Tobias Mömke

    Abstract: We study the optimization version of constraint satisfaction problems (Max-CSPs) in the framework of parameterized complexity; the goal is to compute the maximum fraction of constraints that can be satisfied simultaneously. In standard CSPs, we want to decide whether this fraction equals one. The parameters we investigate are structural measures, such as the treewidth or the clique-width of the va… ▽ More

    Submitted 23 January, 2017; v1 submitted 17 November, 2015; originally announced November 2015.

    Comments: Appeared in IPEC 2015

    Journal ref: Algorithmica 79(1): 230-250 (2017)

  34. arXiv:1507.02184  [pdf, other

    cs.DS cs.CC cs.DM math.CO

    The "art of trellis decoding" is fixed-parameter tractable

    Authors: Jisu Jeong, Eun Jung Kim, Sang-il Oum

    Abstract: Given n subspaces of a finite-dimensional vector space over a fixed finite field $\mathbb F$, we wish to find a linear layout $V_1,V_2,\ldots,V_n$ of the subspaces such that $\dim((V_1+V_2+\cdots+V_i) \cap (V_{i+1}+\cdots+V_n))\le k$ for all i, such a linear layout is said to have width at most k. When restricted to 1-dimensional subspaces, this problem is equivalent to computing the trellis-width… ▽ More

    Submitted 1 March, 2017; v1 submitted 8 July, 2015; originally announced July 2015.

    Comments: 50 pages. Accepted to SODA 2016 under the title "constructive algorithms for path-width of matroids". We added several figures to improve its presentation. We found a mistake in the proof of Lemma 3.24 of the previous version. In order to fix it, we changed some definitions in Section 3 and were able to recover our theorem

    Journal ref: IEEE Trans. Inform. Theory, 63(11)(November 2017), pp. 7178-7205

  35. arXiv:1506.08477  [pdf, ps, other

    cs.DS cs.DM

    A polynomial kernel for Block Graph Deletion

    Authors: Eun Jung Kim, O-joung Kwon

    Abstract: In the Block Graph Deletion problem, we are given a graph $G$ on $n$ vertices and a positive integer $k$, and the objective is to check whether it is possible to delete at most $k$ vertices from $G$ to make it a block graph, i.e., a graph in which each block is a clique. In this paper, we obtain a kernel with $\mathcal{O}(k^{6})$ vertices for the Block Graph Deletion problem. This is a first step… ▽ More

    Submitted 14 January, 2016; v1 submitted 28 June, 2015; originally announced June 2015.

    Comments: 22 pages, 2 figures, An extended abstract appeared in IPEC2015

  36. arXiv:1504.05905  [pdf, other

    cs.DS

    An FPT algorithm and a polynomial kernel for Linear Rankwidth-1 Vertex Deletion

    Authors: Mamadou Moustapha Kanté, Eun Jung Kim, O-joung Kwon, Christophe Paul

    Abstract: Linear rankwidth is a linearized variant of rankwidth, introduced by Oum and Seymour [Approximating clique-width and branch-width. J. Combin. Theory Ser. B, 96(4):514--528, 2006]. Motivated from recent development on graph modification problems regarding classes of graphs of bounded treewidth or pathwidth, we study the Linear Rankwidth-1 Vertex Deletion problem (shortly, LRW1-Vertex Deletion). In… ▽ More

    Submitted 11 January, 2016; v1 submitted 22 April, 2015; originally announced April 2015.

    Comments: 29 pages, 9 figures, An extended abstract appeared in IPEC2015

    MSC Class: 05C85 ACM Class: G.2.2

  37. arXiv:1503.01098  [pdf, ps, other

    cs.DS

    Recognizing k-equistable graphs in FPT time

    Authors: Eun Jung Kim, Martin Milanic, Oliver Schaudt

    Abstract: A graph $G = (V,E)$ is called equistable if there exist a positive integer $t$ and a weight function $w : V \to \mathbb{N}$ such that $S \subseteq V$ is a maximal stable set of $G$ if and only if $w(S) = t$. Such a function $w$ is called an equistable function of $G$. For a positive integer $k$, a graph $G = (V,E)$ is said to be $k$-equistable if it admits an equistable function which is bounded b… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

  38. arXiv:1407.5336  [pdf, ps, other

    cs.DS cs.DM math.CO

    Complexity of Grundy coloring and its variants

    Authors: Edouard Bonnet, Florent Foucaud, Eun Jung Kim, Florian Sikora

    Abstract: The Grundy number of a graph is the maximum number of colors used by the greedy coloring algorithm over all vertex orderings. In this paper, we study the computational complexity of GRUNDY COLORING, the problem of determining whether a given graph has Grundy number at least $k$. We also study the variants WEAK GRUNDY COLORING (where the coloring is not necessarily proper) and CONNECTED GRUNDY COLO… ▽ More

    Submitted 30 October, 2015; v1 submitted 20 July, 2014; originally announced July 2014.

    Comments: 24 pages, 7 figures. This version contains some new results and improvements. A short paper based on version v2 appeared in COCOON'15

  39. arXiv:1403.5702  [pdf, other

    cs.DS cs.DM math.CO

    A Polynomial-time Algorithm for Outerplanar Diameter Improvement

    Authors: Nathann Cohen, Daniel Gonçalves, Eun Jung Kim, Christophe Paul, Ignasi Sau, Dimitrios M. Thilikos, Mathias Weller

    Abstract: The Outerplanar Diameter Improvement problem asks, given a graph $G$ and an integer $D$, whether it is possible to add edges to $G$ in a way that the resulting graph is outerplanar and has diameter at most $D$. We provide a dynamic programming algorithm that solves this problem in polynomial time. Outerplanar Diameter Improvement demonstrates several structural analogues to the celebrated and chal… ▽ More

    Submitted 23 May, 2014; v1 submitted 22 March, 2014; originally announced March 2014.

    Comments: 24 pages

    ACM Class: G.2.2; F.2.2

  40. arXiv:1402.6109  [pdf, ps, other

    cs.DS cs.AI

    The Complexity of Repairing, Adjusting, and Aggregating of Extensions in Abstract Argumentation

    Authors: Eun Jung Kim, Sebastian Ordyniak, Stefan Szeider

    Abstract: We study the computational complexity of problems that arise in abstract argumentation in the context of dynamic argumentation, minimal change, and aggregation. In particular, we consider the following problems where always an argumentation framework F and a small positive integer k are given. - The Repair problem asks whether a given set of arguments can be modified into an extension by at most… ▽ More

    Submitted 25 February, 2014; originally announced February 2014.

    Journal ref: Proc. TAFA 2013, pp. 158-175, Springer LNCS

  41. arXiv:1208.1688  [pdf, ps, other

    cs.DS

    Don't Be Strict in Local Search!

    Authors: Serge Gaspers, Eun Jung Kim, Sebastian Ordyniak, Saket Saurabh, Stefan Szeider

    Abstract: Local Search is one of the fundamental approaches to combinatorial optimization and it is used throughout AI. Several local search algorithms are based on searching the k-exchange neighborhood. This is the set of solutions that can be obtained from the current solution by exchanging at most k elements. As a rule of thumb, the larger k is, the better are the chances of finding an improved solution.… ▽ More

    Submitted 17 August, 2012; v1 submitted 8 August, 2012; originally announced August 2012.

    Comments: (author's self-archived copy)

    Journal ref: Proc. AAAI'12, pp. 486-492 (AAAI Press 2012)

  42. arXiv:1207.0835  [pdf, other

    cs.DS cs.DM math.CO

    Linear kernels and single-exponential algorithms via protrusion decompositions

    Authors: Eun Jung Kim, Alexander Langer, Christophe Paul, Felix Reidl, Peter Rossmanith, Ignasi Sau, Somnath Sikdar

    Abstract: A \emph{$t$-treewidth-modulator} of a graph $G$ is a set $X \subseteq V(G)$ such that the treewidth of $G-X$ is at most some constant $t-1$. In this paper, we present a novel algorithm to compute a decomposition scheme for graphs $G$ that come equipped with a $t$-treewidth-modulator. This decomposition, called a \emph{protrusion decomposition}, is the cornerstone in obtaining the following two mai… ▽ More

    Submitted 31 July, 2012; v1 submitted 3 July, 2012; originally announced July 2012.

    Comments: We would like to point out that this article replaces and extends the results of [CoRR, abs/1201.2780, 2012]

    MSC Class: 05C85 ACM Class: G.2.2

  43. arXiv:1204.1417  [pdf, other

    cs.DS cs.CC cs.DM

    A single-exponential FPT algorithm for the $K_4$-minor cover problem

    Authors: Eun Jung Kim, Christophe Paul, Geevarghese Philip

    Abstract: Given an input graph G and an integer k, the parameterized K_4-minor cover problem asks whether there is a set S of at most k vertices whose deletion results in a K_4-minor-free graph, or equivalently in a graph of treewidth at most 2. This problem is inspired by two well-studied parameterized vertex deletion problems, Vertex Cover and Feedback Vertex Set, which can also be expressed as Treewidth-… ▽ More

    Submitted 6 April, 2012; originally announced April 2012.

  44. arXiv:1203.2801  [pdf, ps, other

    cs.CC cs.DS

    On Exact Algorithms for Permutation CSP

    Authors: Eun Jung Kim, Daniel Goncalves

    Abstract: In the Permutation Constraint Satisfaction Problem (Permutation CSP) we are given a set of variables $V$ and a set of constraints C, in which constraints are tuples of elements of V. The goal is to find a total ordering of the variables, $π : V \rightarrow [1,...,|V|]$, which satisfies as many constraints as possible. A constraint $(v_1,v_2,...,v_k)$ is satisfied by an ordering $π$ when… ▽ More

    Submitted 13 March, 2012; originally announced March 2012.

  45. arXiv:1106.3527  [pdf, ps, other

    cs.DS cs.DM

    Parameterized Complexity Results for General Factors in Bipartite Graphs with an Application to Constraint Programming

    Authors: Gregory Gutin, Eun Jung Kim, Arezou Soleimanfallah, Stefan Szeider, Anders Yeo

    Abstract: The NP-hard general factor problem asks, given a graph and for each vertex a list of integers, whether the graph has a spanning subgraph where each vertex has a degree that belongs to its assigned list. The problem remains NP-hard even if the given graph is bipartite with partition U+V, and each vertex in U is assigned the list {1}; this subproblem appears in the context of constraint programming… ▽ More

    Submitted 17 June, 2011; originally announced June 2011.

    Comments: Full version of a paper that appeared in preliminary form in the proceedings of IPEC'10

  46. Algorithms and Complexity Results for Persuasive Argumentation

    Authors: Eun Jung Kim, Sebastian Ordyniak, Stefan Szeider

    Abstract: The study of arguments as abstract entities and their interaction as introduced by Dung (Artificial Intelligence 177, 1995) has become one of the most active research branches within Artificial Intelligence and Reasoning. A main issue for abstract argumentation systems is the selection of acceptable sets of arguments. Value-based argumentation, as introduced by Bench-Capon (J. Logic Comput. 13, 20… ▽ More

    Submitted 21 April, 2011; originally announced April 2011.

    Journal ref: Artificial Intelligence 175 (2011) pp. 1722-1736

  47. arXiv:1008.0213  [pdf, ps, other

    cs.DS cs.CC

    Improved Parameterized Algorithms for Constraint Satisfaction

    Authors: Eun Jung Kim, Ryan Williams

    Abstract: For many constraint satisfaction problems, the algorithm which chooses a random assignment achieves the best possible approximation ratio. For instance, a simple random assignment for {\sc Max-E3-Sat} allows 7/8-approximation and for every $\eps >0$ there is no polynomial-time ($7/8+\eps$)-approximation unless P=NP. Another example is the {\sc Permutation CSP} of bounded arity. Given the expected… ▽ More

    Submitted 14 October, 2011; v1 submitted 1 August, 2010; originally announced August 2010.

    Comments: A preliminary version of this paper has been accepted for IPEC 2011

  48. Systems of Linear Equations over $\mathbb{F}_2$ and Problems Parameterized Above Average

    Authors: R. Crowston, G. Gutin, M. Jones, E. J. Kim, I. Z. Ruzsa

    Abstract: In the problem Max Lin, we are given a system $Az=b$ of $m$ linear equations with $n$ variables over $\mathbb{F}_2$ in which each equation is assigned a positive weight and we wish to find an assignment of values to the variables that maximizes the excess, which is the total weight of satisfied equations minus the total weight of falsified equations. Using an algebraic approach, we obtain a lowe… ▽ More

    Submitted 23 February, 2010; v1 submitted 1 February, 2010; originally announced February 2010.

  49. arXiv:0907.5427  [pdf, ps, other

    cs.DS cs.CC

    Betweenness Parameterized Above Tight Lower Bound

    Authors: Gregory Gutin, Eun Jung Kim, Matthias Mnich, Anders Yeo

    Abstract: We study ordinal embedding relaxations in the realm of parameterized complexity. We prove the existence of a quadratic kernel for the {\sc Betweenness} problem parameterized above its tight lower bound, which is stated as follows. For a set $V$ of variables and set $\mathcal C$ of constraints "$v_i$ \mbox{is between} $v_j$ \mbox{and} $v_k$", decide whether there is a bijection from $V$ to the set… ▽ More

    Submitted 22 June, 2013; v1 submitted 30 July, 2009; originally announced July 2009.

  50. arXiv:0907.4573  [pdf, ps, other

    cs.DS cs.CC

    Solving MAX-r-SAT Above a Tight Lower Bound

    Authors: Noga Alon, Gregory Gutin, Eun Jung Kim, Stefan Szeider, Anders Yeo

    Abstract: We present an exact algorithm that decides, for every fixed $r \geq 2$ in time $O(m) + 2^{O(k^2)}$ whether a given multiset of $m$ clauses of size $r$ admits a truth assignment that satisfies at least $((2^r-1)m+k)/2^r$ clauses. Thus \textsc{Max-$r$-Sat} is fixed-parameter tractable when parameterized by the number of satisfied clauses above the tight lower bound $(1-2^{-r})m$. This solves an open… ▽ More

    Submitted 22 August, 2011; v1 submitted 27 July, 2009; originally announced July 2009.