1 chapter 5-3 greedy algorithms slides by kevin wayne. copyright © 2005 pearson-addison wesley. all...

36
1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.

Upload: ethan-neal

Post on 08-Jan-2018

223 views

Category:

Documents


0 download

DESCRIPTION

3 Minimum Spanning Tree Minimum spanning tree. Given a connected graph G = (V, E) with real- valued edge weights c e, an MST is a subset of the edges T  E such that T is a spanning tree whose sum of edge weights is minimized. Cayley's Theorem. There are n n-2 spanning trees of K n G = (V, E) T,  e  T c e = 50 can't solve by brute force

TRANSCRIPT

Page 1: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

1

Chapter 5-3Greedy Algorithms

Slides by Kevin Wayne.Copyright © 2005 Pearson-Addison Wesley.All rights reserved.

Page 2: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

4.5 Minimum Spanning Tree

Page 3: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

3

Minimum Spanning Tree

Minimum spanning tree. Given a connected graph G = (V, E) with real-valued edge weights ce, an MST is a subset of the edges T E such that T is a spanning tree whose sum of edge weights is minimized.

Cayley's Theorem. There are nn-2 spanning trees of Kn.

5

23

10 21

14

24

16

6

4

189

711

8 5

6

4

9

711

8

G = (V, E) T, eT ce = 50

can't solve by brute force

Page 4: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

4

Applications

MST is fundamental problem with diverse applications.

Network design.– telephone, electrical, hydraulic, TV cable, computer, road

Approximation algorithms for NP-hard problems.– traveling salesperson problem, Steiner tree

Indirect applications.– max bottleneck paths– LDPC codes for error correction– image registration with Renyi entropy– learning salient features for real-time face verification– reducing data storage in sequencing amino acids in a protein– model locality of particle interactions in turbulent fluid flows– autoconfig protocol for Ethernet bridging to avoid cycles in a network

Cluster analysis.

Page 5: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

5

Greedy Algorithms

Kruskal's algorithm. Start with T = . Consider edges in ascending order of cost. Insert edge e in T unless doing so would create a cycle.

Reverse-Delete algorithm. Start with T = E. Consider edges in descending order of cost. Delete edge e from T unless doing so would disconnect T.

Prim's algorithm. Start with some root node s and greedily grow a tree T from s outward. At each step, add the cheapest edge e to T that has exactly one endpoint in T.

Remark. All three algorithms produce an MST.

Page 6: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

6

Greedy Algorithms

Simplifying assumption. All edge costs ce are distinct.

Cut property. Let S be any subset of nodes, and let e be the min cost edge with exactly one endpoint in S. Then the MST contains e.

Cycle property. Let C be any cycle, and let f be the max cost edge belonging to C. Then the MST does not contain f.

f C

S

e is in the MST

e

f is not in the MST

Page 7: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

7

Cycles and Cuts

Cycle. Set of edges the form a-b, b-c, c-d, …, y-z, z-a.

Cutset. A cut is a subset of nodes S. The corresponding cutset D is the subset of edges with exactly one endpoint in S.

Cycle C = 1-2, 2-3, 3-4, 4-5, 5-6, 6-1

13

8

2

6

7

4

5

Cut S = { 4, 5, 8 }Cutset D = 5-6, 5-7, 3-4, 3-5, 7-8

13

8

2

6

7

4

5

Page 8: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

8

Cycle-Cut Intersection

Claim. A cycle and a cutset intersect in an even number of edges.

Pf. (by picture)

13

8

2

6

7

4

5

S

V - S

C

Cycle C = 1-2, 2-3, 3-4, 4-5, 5-6, 6-1Cutset D = 3-4, 3-5, 5-6, 5-7, 7-8 Intersection = 3-4, 5-6

Page 9: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

9

Greedy Algorithms

Simplifying assumption. All edge costs ce are distinct.

Cut property. Let S be any subset of nodes, and let e be the min cost edge with exactly one endpoint in S. Then the MST T* contains e.

Pf. (exchange argument) Suppose e does not belong to T*, and let's see what happens. Adding e to T* creates a cycle C in T*. Edge e is both in the cycle C and in the cutset D corresponding

to S there exists another edge, say f, that is in both C and D.

T' = T* { e } - { f } is also a spanning tree. Since ce < cf, cost(T') < cost(T*). This is a contradiction. ▪

f

T*e

S

Page 10: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

10

Greedy Algorithms

Simplifying assumption. All edge costs ce are distinct.

Cycle property. Let C be any cycle in G, and let f be the max cost edge belonging to C. Then the MST T* does not contain f.

Pf. (exchange argument) Suppose f belongs to T*, and let's see what happens. Deleting f from T* creates a cut S in T*. Edge f is both in the cycle C and in the cutset D corresponding

to S there exists another edge, say e, that is in both C and D.

T' = T* { e } - { f } is also a spanning tree. Since ce < cf, cost(T') < cost(T*). This is a contradiction. ▪ f

T*e

S

Page 11: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

11

Prim's Algorithm: Proof of Correctness

Prim's algorithm. [Jarník 1930, Dijkstra 1957, Prim 1959] Initialize S = any node. Apply cut property to S. Add min cost edge in cutset corresponding to S to T, and add

one new explored node u to S.

S

Page 12: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

12

Implementation: Prim's Algorithm

Prim(G, c) { foreach (v V) a[v] Initialize an empty priority queue Q foreach (v V) insert v onto Q Initialize set of explored nodes S

while (Q is not empty) { u delete min element from Q S S { u } foreach (edge e = (u, v) incident to u) if ((v S) and (ce < a[v])) decrease priority a[v] to ce

}

Implementation. Use a priority queue ala Dijkstra. Maintain set of explored nodes S. For each unexplored node v, maintain attachment cost a[v] =

cost of cheapest edge v to a node in S. O(n2) with an array; O(m log n) with a binary heap.

Page 13: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

13

Kruskal's Algorithm: Proof of Correctness

Kruskal's algorithm. [Kruskal, 1956] Consider edges in ascending order of weight. Case 1: If adding e to T creates a cycle, discard e according

to cycle property. Case 2: Otherwise, insert e = (u, v) into T according to cut

property where S = set of nodes in u's connected component.

Case 1

v

u

Case 2

e

e S

Page 14: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

14

Implementation: Kruskal's Algorithm

Kruskal(G, c) { Sort edges weights so that c1 c2 ... cm. T

foreach (u V) make a set containing singleton u

for i = 1 to m (u,v) = ei

if (u and v are in different sets) { T T {ei} merge the sets containing u and v } return T}

Implementation. Use the union-find data structure. Build set T of edges in the MST. Maintain set for each connected component. O(m log n) for sorting and O(m (m, n)) for union-find.

are u and v in different connected components?

merge two components

m n2 log m is O(log n) essentially a constant

Page 15: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

15

Lexicographic Tiebreaking

To remove the assumption that all edge costs are distinct: perturb all edge costs by tiny amounts to break any ties.

Impact. Kruskal and Prim only interact with costs via pairwise comparisons. If perturbations are sufficiently small, MST with perturbed costs is MST with original costs.

Implementation. Can handle arbitrarily small perturbations implicitly by breaking ties lexicographically, according to index.

boolean less(i, j) { if (cost(ei) < cost(ej)) return true else if (cost(ei) > cost(ej)) return false else if (i < j) return true else return false}

e.g., if all edge costs are integers,perturbing cost of edge ei by i / n2

Page 16: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

4.7 Clustering

Outbreak of cholera deaths in London in 1850s.Reference: Nina Mishra, HP Labs

Page 17: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

17

Clustering

Clustering. Given a set U of n objects labeled p1, …, pn, classify into coherent groups.

Distance function. Numeric value specifying "closeness" of two objects.

Fundamental problem. Divide into clusters so that points in different clusters are far apart.

Routing in mobile ad hoc networks. Identify patterns in gene expression. Document categorization for web search. Similarity searching in medical image databases Skycat: cluster 109 sky objects into stars, quasars, galaxies.

photos, documents. micro-organisms

number of corresponding pixels whoseintensities differ by some threshold

Page 18: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

18

Clustering of Maximum Spacing

k-clustering. Divide objects into k non-empty groups.

Distance function. Assume it satisfies several natural properties. d(pi, pj) = 0 iff pi = pj (identity of indiscernibles) d(pi, pj) 0 (nonnegativity) d(pi, pj) = d(pj, pi) (symmetry)

Spacing. Min distance between any pair of points in different clusters.

Clustering of maximum spacing. Given an integer k, find a k-clustering of maximum spacing.

spacing

k = 4

Page 19: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

19

Greedy Clustering Algorithm

Single-link k-clustering algorithm. Form a graph on the vertex set U, corresponding to n clusters. Find the closest pair of objects such that each object is in a

different cluster, and add an edge between them. Repeat n-k times until there are exactly k clusters.

Key observation. This procedure is precisely Kruskal's algorithm(except we stop when there are k connected components).

Remark. Equivalent to finding an MST and deleting the k-1 most expensive edges.

Page 20: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

20

Greedy Clustering Algorithm: Analysis

Theorem. Let C* denote the clustering C*1, …, C*k formed by deleting thek-1 most expensive edges of a MST. C* is a k-clustering of max spacing.

Pf. Let C denote some other clustering C1, …, Ck. The spacing of C* is the length d* of the (k-1)st most expensive

edge. Let pi, pj be in the same cluster in C*, say C*r, but different

clusters in C, say Cs and Ct. Some edge (p, q) on pi-pj path in C*r spans two different clusters

in C. All edges on pi-pj path have length d*

since Kruskal chose them. Spacing of C is d* since p and q

are in different clusters. ▪p qpi pj

Cs Ct

C*r

Page 21: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

4.9 Minimum-Cost Arborescences

Page 22: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

22

Minimum-Cost Arborescences - Definitions

Given a directed graph G=(V, E) and one node r є V as root,an arborescence w.r.t. r is essentially a directed spanning tree rooted at r.

It is a subgraph T=(V, F) such that T is a spanning tree of G if we ignore the direction of edges and there is a path in T from r to each other node v є V if we take the direction of edges into account.

Page 23: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

23

Example Arborescences

Page 24: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

24

Characterizing Arborescences

Claim 1: A subgraph T=(V, F) of G is an arborescence wrt root r iff T has no cycles, and for each node v ≠ r, there is exactly one edge in F that enters v.Proof: (If):T is an arborescence with root r, then by definition (spanning tree) has no cycles and also for each node v ≠ r, there is exactly one edge in F entering it (on the unique r-v path).(Only if): if no cycles and each node v ≠ r has exactly one edge entering, then we need to show that there is a directed path from r to each other node. Take any node v ≠ r and repeatedly follow edges in the backward direction. Since no cycles, the process must terminate. But r is the only node without an incoming edge. Thus the sequence of nodes visited forms a path in the reverse direction from r to v.Claim 2: A directed graph G has an arborescence rooted at r iff there is a directed path from r to each other node.Proof: Perform a BFS constructing the BFS tree rooted at r.

Page 25: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

25

Minimum-Cost Arborescence

Definition: Given a directed graph G=(V, E) with a distinguished node r and with a non-negative cost ce ≥ 0 on each edge, compute an arborescence rooted at r of minimum total cost.

Ex: choose cheapest edgesas in MST.

Try it out for edge with cost 1.

Our myopic rule needs to be a bitmore involved in this case.

Page 26: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

26

Minimum-Cost Arborescence

Initial Strategy: For all vєV-{r}, select the cheapest edge entering v and let F* be this set of n-1 edges.Claim 3: If (V, F*) is an arborescence, then it is minimum-cost.

What if (V, F*) is not an arborescence. By Claim 1, it must contain a cycle which does not include the root r. (Why?)Observation: Every arborescence contains exactly one edge entering each node v≠r. So, if we pick some node v and subtract a uniform quantity from the cost of every edge entering v, then the total cost of every arborescence changes by exactly the same amount. This means, essentially, that the actual cost of the cheapest edge entering v is not important; what matters is the cost of others entering v relative to the cheapest.

Let yv = min cost edge e=(u, v) ce ≥ 0 entering v and define ce’ = ce – yv for all the edges entering v.

Page 27: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

27

Minimum-Cost Arborescence

yv = min cost edge e=(u, v) ce ≥ 0 entering v, andce’ = ce – yv for all the edges entering v

Claim 4: T is an optimal arborescence in G subject to costs {ce} iff it is an optimal arborescence subject to {ce’ }.Proof: Consider an arbitrary arborescence T. The difference between its cost with edge costs {ce} and {ce’ } is exactly Σce- Σce’ for e є T.Σce- Σce’ = Σyv for v ≠ r.

Now, consider the problem in terms of {ce’ }. All the edges in F* have cost 0. And if there is a cycle C in (V, F*), all edges in C have cost 0. This suggests that we can use as many edges from C as possible as we want, since no raise in cost is ever introduced.

Page 28: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

28

Minimum-Cost Arborescence AlgorithmContract C into a single supernode, obtaining G’=(V’, E’), V’ = V –C U c* and E’ is obtained by transforming each edge e in E to e’ by replacing each end of e that belongs to C with c*. So G’ can have parallel edges and self-loops. Delete self-loops. Then, recursively, find an optimal arborescence in G’ subject to {ce’ }. Given the solution for G’ returned by the recursive call, modify it to obtain the solution for G by including all but one edge on C.

Page 29: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

29

Analyze the Algorithm - I

To prove that algorithm finds optimal, we must prove G has an optimal arborescence with exactly one edge entering C.Claim 5: Let C be a cycle in G consisting of edges of cost 0, such that r is not in C. Then there is an optimal arborescence rooted at r that has exactly one edge entering C.Proof: Consider an optimal arborescence T in G. Since r has a path in T to every node, there is at least one edge of T that enters C. If T enters C exactly once, then we are done. Otherwise, suppose that T enters C more than once. Consider how we can modify it to an arborescence of no greater cost that enters C exactly once:Let e=(a, b) be an edge entering C on as short a path as possible from r (No edges from r to a can enter C. Why?).

Delete all edges of T that enter C except for e . Add all edges of C except one entering b. Let T ’ denote the resulting subgraph of G.

Page 30: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

30

Analyze the Algorithm - II

Proof (Claim 5) continued: We claim that T ’ is also an arborescence. Note first that cost(T ’) ≤ cost(T) since the only edges that are added have cost 0.T ’ has exactly one edge entering each v ≠ r, and no edge to r.

So, T ’ has exactly n-1 edges; hence if we can show there is an r-v path in T ’ for each v, then T ’ must be connected in an undirected sense, and hence a tree.

Consider any v ≠ r. There are 2 cases to consider:i. if v є C, then go to e=(a,b) and follow edges in C.ii. if v not in C, then let P denote r-v path in T. There are 2

cases again:a. if P did not touch C, then it still exists in T ’.b. if P touches C, let w be the last node in P C and let P ’

be the subpath of P from w to v. All the edges in P’ still exist in T ‘ and w is reachable from r by (i).

Page 31: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

Minimum-Cost Arborescence Optimality

Claim 6: The Algorithm finds an optimal arborescence rooted at r in G.Proof: The proof is by induction on the number of nodes in G.

base: Clearly true for any G having one node.hypothesis: assume true for G when |V|≤ ninduction: for n+1 nodes.Apply algorithm.

if F* form an arborescence, we are done otherwise consider the problem with {ce’ }

– after contracting a 0-cost cycle C to obtain a smaller graph G’, the algorithm produces an optimal solution by the inductive hypothesis.

– And there is an optimal arborescence in G corresponding to the optimal computed for G’.

31

Page 32: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

Extra Slides

Page 33: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

33

MST Algorithms: Theory

Deterministic comparison based algorithms. O(m log n) [Jarník, Prim, Dijkstra, Kruskal, Boruvka] O(m log log n). [Cheriton-Tarjan 1976, Yao 1975] O(m (m, n)). [Fredman-Tarjan 1987] O(m log (m, n)). [Gabow-Galil-Spencer-Tarjan 1986] O(m (m, n)). [Chazelle 2000]

Holy grail. O(m).

Notable. O(m) randomized. [Karger-Klein-Tarjan 1995] O(m) verification. [Dixon-Rauch-Tarjan 1992]

Euclidean. 2-d: O(n log n).compute MST of edges in Delaunay k-d: O(k n2). dense Prim

Page 34: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

34

Dendrogram

Dendrogram. Scientific visualization of hypothetical sequence of evolutionary events.

Leaves = genes. Internal nodes = hypothetical ancestors.

Reference: http://www.biostat.wisc.edu/bmi576/fall-2003/lecture13.pdf

Page 35: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

35

Dendrogram of Cancers in Human

Tumors in similar tissues cluster together.

Reference: Botstein & Brown group

Gene 1

Gene n

gene expressedgene not expressed

Page 36: 1 Chapter 5-3 Greedy Algorithms Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved

HOMEWORK (Chapter 5)

12-a97102332