Search results for: algorithmic graph theory - Bridge of Knowledge

Search

Search results for: algorithmic graph theory

Search results for: algorithmic graph theory

  • Some variations of perfect graphs

    Publication

    - Discussiones Mathematicae Graph Theory - Year 2016

    We consider (ψk−γk−1)-perfect graphs, i.e., graphs G for which ψk(H) =γk−1(H) for any induced subgraph H of G, where ψk and γk−1 are the k -path vertex cover number and the distance (k−1)-domination number, respectively. We study (ψk−γk−1)-perfect paths, cycles and complete graphs for k≥2. Moreover, we provide a complete characterisation of (ψ2−γ1)-perfect graphs describing the set of its forbidden induced subgraphs and providing...

    Full text available to download

  • Marek Kubale prof. dr hab. inż.

     Details concerning: Qualifications, Experiences, Editorial boards, Ph.D. theses supervised, Books, and Recent articles can be found at http://eti.pg.edu.pl/katedra-algorytmow-i-modelowania-systemow/Marek_KubaleGoogle ScholarSylwetka prof. Marka Kubalego Prof. Marek Kubale pracuje na Wydziale ETI Politechniki Gdańskiej nieprzerwanie od roku 1969. W tym czasie napisał ponad 150 prac naukowych, w tym ponad 40 z listy JCR. Ponadto...

  • Joanna Raczek dr inż.

    Employment 2003 -- 2019: Faculty of Applied Physics and Mathematics, Gdańsk University of Technology. 2019 - present: Faculty of Electronic, Informatics and Telecominications, Gdańsk University of Technology. Education May 2007: Doctor of Philosophy in Mathematics, University of Gdańsk. Doctoral dissertation: "Paired domination and doubly domination in graphs". Supervisor: dr hab. Jerzy Topp. 2000 -- 2004 Bachelor of Science...

  • Optimal edge-coloring with edge rate constraints

    Publication

    - NETWORKS - Year 2013

    We consider the problem of covering the edges of a graph by a sequence of matchings subject to the constraint that each edge e appears in at least a given fraction r(e) of the matchings. Although it can be determined in polynomial time whether such a sequence of matchings exists or not [Grötschel et al., Combinatorica (1981), 169–197], we show that several questions about the length of the sequence are computationally intractable....

    Full text to download in external service

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Dynamics of S-unimodal maps used in population modeling.

    Open Research Data
    open access

    S-unimodal maps are maps of the interval with negative Schwarzian derivative and having only one turning point (such that the map is increasing to the left of the turning point and decreasing to the right of it). Theory of S-unimodal maps is now a well-developed branch of discrete dynamical systems, including famous Singer theorem which implies existence...

  • An Efficient Noisy Binary Search in Graphs via Median Approximation

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2021

    Consider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...

    Full text to download in external service

  • Planning optimised multi-tasking operations under the capability for parallel machining

    The advent of advanced multi-tasking machines (MTMs) in the metalworking industry has provided the opportunity for more efficient parallel machining as compared to traditional sequential processing. It entailed the need for developing appropriate reasoning schemes for efficient process planning to take advantage of machining capabilities inherent in these machines. This paper addresses an adequate methodical approach for a non-linear...

    Full text available to download

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • Algorithmic Human Resources Management - Perspectives and Challenges

    Theoretical background: Technology – most notably processes of digitalisation, the use of artificial intelligence, machine learning, big data and prevalence of remote work due to pandemic – changes the way organizations manage human resources. One of the increasing trends is the use of so-called “algorithmic management”. It is notably different than previous e-HRM or HRIS (human resources information systems) applications, as it...

    Full text available to download

  • EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model

    Publication

    - Year 2018

    The objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...

    Full text available to download

  • On the Characteristic Graph of a Discrete Symmetric Channel

    We present some characterizations of characteristic graphs of row and/or column symmetric channels. We also give a polynomial-time algorithm that decides whether there exists a discrete symmetric channel whose characteristic graph is equal to a given input graph. In addition, we show several applications of our results.

    Full text to download in external service

  • Brief Announcement: Energy Constrained Depth First Search

    Publication

    - Year 2018

    Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due...

    Full text to download in external service

  • Algorithmic Finance

    Journals

    ISSN: 2158-5571 , eISSN: 2157-6203

  • Influence of algorithmic management practices on workplace well-being – evidence from European organisations

    Publication

    Purpose Existing literature on algorithmic management practices –defined as autonomous data-driven decision making in people's management by adoption of self-learning algorithms and artificial intelligence – suggests complex relationships with employees' well-being in the workplace. While the use of algorithms can have positive impacts on people-related decisions, they may also adversely influence job autonomy, perceived justice...

    Full text available to download

  • On Tradeoffs Between Width- and Fill-like Graph Parameters

    In this work we consider two two-criteria optimization problems: given an input graph, the goal is to find its interval (or chordal) supergraph that minimizes the number of edges and its clique number simultaneously. For the interval supergraph, the problem can be restated as simultaneous minimization of the path width pw(G) and the profile p(G) of the input graph G. We prove that for an arbitrary graph G and an integer t ∈ {1,...

    Full text available to download

  • PROPERTIES OF PARAMETRIC ALGORITHMIC DESIGN OF RESIDENTIAL HOUSES IN URBAN CONTEXT

    Publication

    - Year 2016

    Design explorations of architectural avant-garde resulted in the development of digital techniques that allow solving very complex and demanding contemporary design challenges. In the architectural discourse the new design workshop seems to be symbolized mainly by the projects of sports facilities, cultural, administrative or multifunctional high-rise buildings. However for the quality of society life is more important to exploit...

  • Hat problem on a graph

    Publication

    The topic of our paper is the hat problem. In that problem, each of n people is randomly fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color looking at the hat colors of the other people. The team wins if at least one person guesses his hat color correctly and no one guesses his hat color wrong, otherwise the team loses. The aim is to maximize the probability of win. In this version every...

    Full text to download in external service

  • On the hat problem on a graph

    Publication

    The topic of this paper is the hat problem in which each of n players is uniformly and independently fitted with a blue or red hat. Then everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The aim is to maximize the probability of winning....

    Full text available to download

  • Zgred - Zgred Graph Editor

    Publication

    - Year 2014

    The paper presents a graph editor that was developed as a supplementary tool for the Koala graph library. We discuss its requirements, design choices and main ideas behind the implementation. The later part of the paper is meant to be a brief user manual, as we go through the functionality provided by the editor

  • Algorithmic synthesis using Python compiler

    Publication

    - Year 2015

    Full text to download in external service

  • Pawlak's flow graph extensions for video surveillance systems

    Publication

    The idea of the Pawlak's flow graphs is applicable to many problems in various fields related to decision algorithms or data mining. The flow graphs can be used also in the video surveillance systems. Especially in distributed multi-camera systems which are problematic to be handled by human operators because of their limited perception. In such systems automated video analysis needs to be implemented. Important part of this analysis...

    Full text to download in external service

  • Interpolation properties of domination parameters of a graph

    An integer-valued graph function π is an interpolating function if a set π(T(G))={π(T): T∈TT(G)} consists of consecutive integers, where TT(G) is the set of all spanning trees of a connected graph G. We consider the interpolation properties of domination related parameters.

    Full text to download in external service

  • Fast Collaborative Graph Exploration

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2013

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text to download in external service

  • Fast collaborative graph exploration

    Publication

    - INFORMATION AND COMPUTATION - Year 2015

    We study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...

    Full text to download in external service

  • Linear game non-contextuality and Bell inequalities—a graph-theoretic approach

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2016

    We study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...

    Full text available to download

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Constructing a map of an anonymous graph: applications of universal sequences

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2010

    We study the problem of mapping an unknown environmentrepresented as an unlabelled undirected graph. A robot (or automaton)starting at a single vertex of the graph G has to traverse the graph and return to its starting point building a map of the graph in the process. We are interested in the cost of achieving this task (whenever possible) in terms of the number of edge traversal made by the robot. Another optimization criteria...

    Full text to download in external service

  • Application of genetic algorithms in graph searching problem

    Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...

  • Graph Decomposition for Memoryless Periodic Exploration

    Publication

    - ALGORITHMICA - Year 2012

    We consider a general framework in which a memoryless robot periodically explores all the nodes of a connected anonymous graph by following local information available at each vertex. For each vertex v, the endpoints of all edges adjacent to v are assigned unique labels within the range 1 to deg (v) (the degree of v). The generic exploration strategy is implemented using a right-hand-rule transition function: after entering vertex...

    Full text to download in external service

  • Parallel tabu search for graph coloring problem

    Publication

    - Year 2006

    Tabu search is a simple, yet powerful meta-heuristic based on local search that has been often used to solve combinatorial optimization problems like the graph coloring problem. This paper presents current taxonomy of patallel tabu search algorithms and compares three parallelization techniques applied to Tabucol, a sequential TS algorithm for graph coloring. The experimental results are based on graphs available from the DIMACS...

  • Coronas and Domination Subdivision Number of a Graph

    Publication

    In this paper, for a graph G and a family of partitions P of vertex neighborhoods of G, we define the general corona G ◦P of G. Among several properties of this new operation, we focus on application general coronas to a new kind of characterization of trees with the domination subdivision number equal to 3.

    Full text available to download

  • Zero-visibility cops and robber and the pathwidth of a graph

    Publication

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Year 2015

    We examine the zero-visibility cops and robber graph searching model, which differs from the classical cops and robber game in one way: the robber is invisible. We show that this model is not monotonic. We show that the zero-visibility copnumber of a graph is bounded above by its pathwidth and cannot be bounded below by any nontrivial function of the pathwidth. As well, we define a monotonic version of this game and show that the...

    Full text to download in external service

  • The convex domination subdivision number of a graph

    Publication

    Let G = (V;E) be a simple graph. A set D\subset V is a dominating set of G if every vertex in V - D has at least one neighbor in D. The distance d_G(u, v) between two vertices u and v is the length of a shortest (u, v)-path in G. An (u, v)-path of length d_G(u; v) is called an (u, v)-geodesic. A set X\subset V is convex in G if vertices from all (a, b)-geodesics belong to X for any two vertices a, b \in X. A set X is a convex dominating...

    Full text available to download

  • Parallel immune system for graph coloring

    Publication

    - Year 2008

    This paper presents a parallel artificial immune system designed forgraph coloring. The algorithm is based on the clonal selection principle. Each processor operates on its own pool of antibodies and amigration mechanism is used to allow processors to exchange information. Experimental results show that migration improves the performance of the algorithm. The experiments were performed using a high performance cluster on a set...

    Full text to download in external service

  • Non-monotone graph searching models

    Graph searching encompasses a variety of different models, many of which share a property that in optimal strategies fugitive can never access once searched regions. Monotonicity, as it is called, is vital in many established results in the field however its absence significantly impedes the analysis of a given problem. This survey attempts to gather non-monotone models, that are less researched in effort of summarizing the results...

  • Multi-agent graph searching and exploration algorithms

    Publication

    - Year 2020

    A team of mobile entities, which we refer to as agents or searchers interchangeably, starting from homebases needs to complete a given task in a graph.The goal is to build a strategy, which allows agents to accomplish their task. We analyze strategies for their effectiveness (e.g., the number of used agents, the total number of performed moves by the agents or the completion time).Currently, the fields of on-line (i.e., agents...

    Full text available to download

  • A construction for the hat problem on a directed graph

    Publication

    A team of n players plays the following game. After a strategy session, each player is randomly fitted with a blue or red hat. Then, without further communication, everybody can try to guess simultaneously his own hat color by looking at the hat colors of the other players. Visibility is defined by a directed graph; that is, vertices correspond to players, and a player can see each player to whom he is connected by an arc. The...

    Full text to download in external service

  • Theory of Organisation and Management and Systems Theory

    e-Learning Courses
    • E. Wojnicka-Sycz

    Dear Students, Our classes on Theory of Orgnisation and Management (15 h lecture, 15 hours excercises) and Systems Theory (15 hours lecture) will take place in MSTeams each Wednesday since 21st of February 2024 at 9:15-12:00 am at link  https://teams.microsoft.com/l/meetup-join/19%3ameeting_YzY1NTRiOGEtYTQ3Yi00ZmFlLWI3YTYtYjhiNjBhZjZjOGI5%40thread.v2/0?context=%7b%22Tid%22%3a%22b2b950ec-1ee3-4d9d-ac5e-4dd9db5e0b73%22%2c%22Oid%22%3a%2233f97504-8676-4b87-96ad-a9394d16b3b2%22%7d Join...

  • Zero-Visibility Cops and Robber Game on a Graph

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2013

    We examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.

    Full text to download in external service

  • Theory of Elasticity and Plasticity

    e-Learning Courses
    • R. Sauer
    • I. Lubowiecka

    This course discusses the general theory of elastic and plastic material behavior of solids.

  • Theory of Organisation and Management and System's Theory

    e-Learning Courses
    • E. Wojnicka-Sycz

    We will have our lectures and classes in Theory of Organisation and Management and System's Theory on Wednesday Since 9:15 till 12:00. We will meet on MsTeams and here is the link: https://teams.microsoft.com/dl/launcher/launcher.html?url=%2F_%23%2Fl%2Fmeetup-join%2F19%3Ameeting_MTBjMTg4ZWYtY2Q2NS00YjlkLWFmZTItMWUzYTcwM2ZmNzU0%40thread.v2%2F0%3Fcontext%3D%257b%2522Tid%2522%253a%2522b2b950ec-1ee3-4d9d-ac5e-4dd9db5e0b73%2522%252c%2522Oid%2522%253a%252233f97504-8676-4b87-96ad-a9394d16b3b2%2522%257d%26anon%3Dtrue&type=meetup-join&deeplinkId=ce188d79-726a-418e-ab34-eb9f59172f62&directDl=true&msLaunch=true&enableMobilePage=true&suppressPrompt=true  

  • Characterizing the Scalability of Graph Convolutional Networks on Intel® PIUMA

    Publication
    • M. J. Adiletta
    • J. J. Tithi
    • E. Farsarakis
    • G. Gerogiannis
    • R. Adolf
    • R. Benke
    • S. Kashyap
    • S. Hsia
    • K. Lakhotia
    • F. Petrini... and 2 others

    - Year 2023

    Large-scale Graph Convolutional Network (GCN) inference on traditional CPU/GPU systems is challenging due to a large memory footprint, sparse computational patterns, and irregular memory accesses with poor locality. Intel’s Programmable Integrated Unffied Memory Architecture (PIUMA) is designed to address these challenges for graph analytics. In this paper, a detailed characterization of GCNs is presented using the Open-Graph Benchmark...

    Full text to download in external service

  • Wojciech Wojnowski dr inż.

    Ukończył V Liceum Ogólnokształcące w Gdańsku w klasie o profilu matematyczno-fizycznym z wykładowym językiem angielskim. W 2009 roku rozpoczął studia na Wydziale Chemicznym PG na kierunku technologia chemiczna, uzyskując w 2012 roku tytuł inżyniera, a w 2013 tytuł magistra. W latach 2013–2015 studiował sinologię na Uniwersytecie w Nankinie dzięki uzyskaniu Stypendium Rządu ChRL. Po powrocie do Polski w 2015 roku rozpoczął studia...

  • Weakly convex domination subdivision number of a graph

    Publication

    - FILOMAT - Year 2016

    A set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...

    Full text available to download

  • Theory of Elasticity and Plasticity 2023

    e-Learning Courses
    • R. Sauer
    • I. Lubowiecka

    This course discusses the general theory of elastic and plastic material behavior of solids.

  • Theory of Elasticity and Plasticity 2024

    e-Learning Courses
    • B. Łazorczyk
    • R. Sauer
    • M. Skowronek

    This course discusses the general theory of elastic and plastic material behavior of solids.

  • Theory of architectural design IV_ERASMUS

    e-Learning Courses
    • A. Taraszkiewicz
    • J. Borucka

    The Theory of architectural design IV ERASMUS is a course dedicated especially to Erasmus+ students and conducted on separate conditions.

  • Distributed graph searching with a sense of direction

    In this work we consider the edge searching problem for vertex-weighted graphs with arbitrarily fast and invisible fugitive. The weight function w provides for each vertex v the minimum number of searchers required to guard v, i.e., the fugitive may not pass through v without being detected only if at least w(v) searchers are present at v. This problem is a generalization of the classical edge searching problem, in which one has...

    Full text to download in external service

  • An algorithmic approach to estimating the minimal number of periodic points for smooth self-maps of simply-connected manifolds

    For a given self-map f of M, a closed smooth connected and simply-connected manifold of dimension m 4, we provide an algorithm for estimating the values of the topological invariant D^m_r [f], which equals the minimal number of r-periodic points in the smooth homotopy class of f. Our results are based on the combinatorial scheme for computing D^m_r [f] introduced by G. Graff and J. Jezierski [J. Fixed Point Theory Appl. 13 (2013),...

    Full text to download in external service