SlideShare une entreprise Scribd logo
1  sur  18
Improved  dynamic  reachability algorithms for  directed  graphs Liam Roditty   and   Uri Zwick Tel Aviv University
Dynamic reachability Transitive closure matrix The dynamic graph Operations Delete (1,5) (4,1) Insert (5,1) (5,2) (5,4) Reach? (1,4) Delete (2,3) (6,7) (8,5) 1 1 1 1 8 1 1 1 1 7 1 1 1 1 6 1 1 1 1 5 1 1 1 1 1 1 1 1 4 1 1 1 1 1 1 1 1 3 1 1 1 1 1 1 1 1 2 1 1 1 1 1 1 1 1 1 8 7 6 5 4 3 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7
Decremental reachability - Results Baswana Hariharan Sen ’02 mn 4/3 1 Monte Carlo General RZ ’02 mn 1 Las Vegas General Demetrescu Italiano ’00 n 3 1 Deterministic General La Poutré van Leeuwen ’87 FMNZ ’01  m 2 1 Deterministic General Henzinger King ’95 mn   log 2   n n   log   n Monte Carlo General Italiano ’88 mn 1 Deterministic DAGs Authors Total  update time Query time Algorithm Graphs
Fully dynamic reachability - Results Roditty ’03 n 2 1 Deterministic General Demetrescu Italiano ’00 n 2 1 Deterministic General King ’99 n 2  log n 1 Deterministic General Authors Amortized  update time Query time Algorithm Graphs
Fully dynamic reachability - Results Demetrescu, Italiano ’00 n 1.58 n 0.58 Monte Carlo DAGs m 0.58 n m 0.43 Monte Carlo General RZ ’02 mn 1/2 n 1/2 Deterministic General m 0.58 n n   log   n Monte Carlo General Henzinger King ’95 mn 1/2   log 2   n n   log   n Monte Carlo General RZ ’02 m n   log   n Deterministic DAGs Authors Amortized update time Query time Algorithm Graphs
Decremental  maintenance of a reachability tree in a  DAG  –  Italiano ’s algorithm Every edge is only examined once! Total complexity is O(m) per tree.
Decremental  maintenance of a reachability tree in a general graph     Frigioni, Miller, Nanni and Zaroliagis  ’01 The graph induced on the  Strongly Connected Components   (SCCs)   of a graph is a DAG. Maintain a reachability tree of SCCs ! If a deleted edge connects two different SCCs, use Italiano’s algorithm. If a deleted edge is in a SCC, and the SCC remains strongly connected, do nothing.
When a SCC decomposes
How do we maintain the SCCs? ,[object Object],[object Object],[object Object]
Decremental  maintenance of a BFS tree in a general graph     Even, Shiloach ’81 / Henzinger, King ’95 Every edge is only examined once per level! Total complexity is O(mn).
Detecting the decomposition of a SCC ,[object Object],[object Object],[object Object],w
When a SCC decomposes w w w 4 w 2 w 1 w 3 Total cost: mn + m 1 n 1 +m 2 n 2 +m 3 n 3 +m 4 n 4 + … = O(mn) ???
Choice of representatives w Choose a  RANDOM   representative !!! Expected running time is then O(mn) !!! w w
Decremental SCCs - Analysis Let  be the  expected  total running time.
Decremental SCCs - Analysis
Fully dynamic reachability (after Henzinger-King ’95) G Decremental data structure … v 1 v 2 v t Initialize a decremental data structure O(mn) time Insert(E v ) – build/rebuild In(v) and Out(v). O(m) time. Reach?(u,v) – Query the decremental data structure and  each  pair of trees. O(t) time Delete(E’) – Update the decremental data structure and  rebuild  all trees. O(mt) time. When t=n 1/2 , restart. Amortized cost per update – O(mn 1/2 ) Worst-case query time – O(n 1/2 )
Decremental reachability –  Open problems ,[object Object],[object Object],[object Object],[object Object]
Fully dynamic reachability –  Open problems ,[object Object],[object Object]

Contenu connexe

En vedette

lecture 20
lecture 20lecture 20
lecture 20sajinsc
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSSRachel Andrew
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaChris Lema
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsShelly Sanchez Terrell
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 

En vedette (8)

lecture 20
lecture 20lecture 20
lecture 20
 
20 Single Source Shorthest Path
20 Single Source Shorthest Path20 Single Source Shorthest Path
20 Single Source Shorthest Path
 
Graphs
GraphsGraphs
Graphs
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similaire à Dynamic uri

Geohydrology ii (3)
Geohydrology ii (3)Geohydrology ii (3)
Geohydrology ii (3)Amro Elfeki
 
Applications of Wavelet Transform
Applications of Wavelet TransformApplications of Wavelet Transform
Applications of Wavelet Transformijtsrd
 
Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...eSAT Publishing House
 
Multiuser detection new
Multiuser detection newMultiuser detection new
Multiuser detection newNebiye Slmn
 
A multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modesA multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modesASQ Reliability Division
 
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Thoma Itoh
 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-iKrish_ver2
 
Node Unique Label Cover
Node Unique Label CoverNode Unique Label Cover
Node Unique Label Covermsramanujan
 
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...Anis Nasir
 
Modal Analysis Basic Theory
Modal Analysis Basic TheoryModal Analysis Basic Theory
Modal Analysis Basic TheoryYuanCheng38
 
Fuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueFuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueIRJET Journal
 
Canino d2016stag slides
Canino d2016stag slidesCanino d2016stag slides
Canino d2016stag slidesDavid Canino
 
Mining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsMining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsDr.MAYA NAYAK
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentMd Mahbubur Rahman
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns basedVLSICS Design
 
Teletraffic engineering handbook
Teletraffic engineering handbookTeletraffic engineering handbook
Teletraffic engineering handbookDeepak Singh
 
A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
 
Hybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay SystemHybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay Systemijaia
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationIvan Kitov
 

Similaire à Dynamic uri (20)

Geohydrology ii (3)
Geohydrology ii (3)Geohydrology ii (3)
Geohydrology ii (3)
 
Applications of Wavelet Transform
Applications of Wavelet TransformApplications of Wavelet Transform
Applications of Wavelet Transform
 
Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...
 
Multiuser detection new
Multiuser detection newMultiuser detection new
Multiuser detection new
 
A multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modesA multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modes
 
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-i
 
Node Unique Label Cover
Node Unique Label CoverNode Unique Label Cover
Node Unique Label Cover
 
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
 
Modal Analysis Basic Theory
Modal Analysis Basic TheoryModal Analysis Basic Theory
Modal Analysis Basic Theory
 
Fuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueFuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS technique
 
Canino d2016stag slides
Canino d2016stag slidesCanino d2016stag slides
Canino d2016stag slides
 
Mining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsMining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systems
 
Recurrent Instance Segmentation (UPC Reading Group)
Recurrent Instance Segmentation (UPC Reading Group)Recurrent Instance Segmentation (UPC Reading Group)
Recurrent Instance Segmentation (UPC Reading Group)
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environment
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
Teletraffic engineering handbook
Teletraffic engineering handbookTeletraffic engineering handbook
Teletraffic engineering handbook
 
A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...
 
Hybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay SystemHybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay System
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Dynamic uri

  • 1. Improved dynamic reachability algorithms for directed graphs Liam Roditty and Uri Zwick Tel Aviv University
  • 2. Dynamic reachability Transitive closure matrix The dynamic graph Operations Delete (1,5) (4,1) Insert (5,1) (5,2) (5,4) Reach? (1,4) Delete (2,3) (6,7) (8,5) 1 1 1 1 8 1 1 1 1 7 1 1 1 1 6 1 1 1 1 5 1 1 1 1 1 1 1 1 4 1 1 1 1 1 1 1 1 3 1 1 1 1 1 1 1 1 2 1 1 1 1 1 1 1 1 1 8 7 6 5 4 3 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7
  • 3. Decremental reachability - Results Baswana Hariharan Sen ’02 mn 4/3 1 Monte Carlo General RZ ’02 mn 1 Las Vegas General Demetrescu Italiano ’00 n 3 1 Deterministic General La Poutré van Leeuwen ’87 FMNZ ’01 m 2 1 Deterministic General Henzinger King ’95 mn log 2 n n log n Monte Carlo General Italiano ’88 mn 1 Deterministic DAGs Authors Total update time Query time Algorithm Graphs
  • 4. Fully dynamic reachability - Results Roditty ’03 n 2 1 Deterministic General Demetrescu Italiano ’00 n 2 1 Deterministic General King ’99 n 2 log n 1 Deterministic General Authors Amortized update time Query time Algorithm Graphs
  • 5. Fully dynamic reachability - Results Demetrescu, Italiano ’00 n 1.58 n 0.58 Monte Carlo DAGs m 0.58 n m 0.43 Monte Carlo General RZ ’02 mn 1/2 n 1/2 Deterministic General m 0.58 n n log n Monte Carlo General Henzinger King ’95 mn 1/2 log 2 n n log n Monte Carlo General RZ ’02 m n log n Deterministic DAGs Authors Amortized update time Query time Algorithm Graphs
  • 6. Decremental maintenance of a reachability tree in a DAG – Italiano ’s algorithm Every edge is only examined once! Total complexity is O(m) per tree.
  • 7. Decremental maintenance of a reachability tree in a general graph Frigioni, Miller, Nanni and Zaroliagis ’01 The graph induced on the Strongly Connected Components (SCCs) of a graph is a DAG. Maintain a reachability tree of SCCs ! If a deleted edge connects two different SCCs, use Italiano’s algorithm. If a deleted edge is in a SCC, and the SCC remains strongly connected, do nothing.
  • 8. When a SCC decomposes
  • 9.
  • 10. Decremental maintenance of a BFS tree in a general graph Even, Shiloach ’81 / Henzinger, King ’95 Every edge is only examined once per level! Total complexity is O(mn).
  • 11.
  • 12. When a SCC decomposes w w w 4 w 2 w 1 w 3 Total cost: mn + m 1 n 1 +m 2 n 2 +m 3 n 3 +m 4 n 4 + … = O(mn) ???
  • 13. Choice of representatives w Choose a RANDOM representative !!! Expected running time is then O(mn) !!! w w
  • 14. Decremental SCCs - Analysis Let be the expected total running time.
  • 15. Decremental SCCs - Analysis
  • 16. Fully dynamic reachability (after Henzinger-King ’95) G Decremental data structure … v 1 v 2 v t Initialize a decremental data structure O(mn) time Insert(E v ) – build/rebuild In(v) and Out(v). O(m) time. Reach?(u,v) – Query the decremental data structure and each pair of trees. O(t) time Delete(E’) – Update the decremental data structure and rebuild all trees. O(mt) time. When t=n 1/2 , restart. Amortized cost per update – O(mn 1/2 ) Worst-case query time – O(n 1/2 )
  • 17.
  • 18.