Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-540-75225-7_24guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Learning and Verifying Graphs Using Queries with a Focus on Edge Counting

Published: 01 October 2007 Publication History

Abstract

We consider the problem of learning and verifying hidden graphs and their properties given query access to the graphs. We analyze various queries (edge detection, edge counting, shortest path), but we focus mainly on edge counting queries. We give an algorithm for learning graph partitions using O ( n log n ) edge counting queries. We introduce a problem that has not been considered: verifying graphs with edge counting queries, and give a randomized algorithm with error ï for graph verification using O (log(1/ ï )) edge counting queries. We examine the current state of the art and add some original results for edge detection and shortest path queries to give a more complete picture of the relative power of these queries to learn various graph classes. Finally, we relate our work to Freivalds' `fingerprinting technique' --- a probabilistic method for verifying that two matrices are equal by multiplying them by random vectors.

References

[1]
Alon, N., Asodi, V.: Learning a hidden subgraph. SIAM J. Discrete Math. 18(4), 697-712 (2005).
[2]
Alon, N., Beigel, R., Kasif, S., Rudich, S., Sudakov, B.: Learning a hidden matching. SIAM J. Comput. 33(2), 487-501 (2004).
[3]
Angluin, D., Chen, J.: Learning a hidden graph using O (log n ) queries per edge. In: COLT, pp. 210-223 (2004).
[4]
Angluin, D., Chen, J.: Learning a hidden hypergraph. Journal of Machine Learning Research 7, 2215-2236 (2006).
[5]
Beerliova, Z., Eberhard, F., Erlebach, T., Hall, A., Hoffmann, M., Mihalák, M., Ram, L.S.: Network discovery and verification. In: Kratsch, D. (ed.) WG 2005. LNCS, vol. 3787, pp. 127-138. Springer, Heidelberg (2005).
[6]
Bouvel, M., Grebinski, V., Kucherov, G.: Combinatorial search on graphs motivated by bioinformatics applications: A brief survey. In: Kratsch, D. (ed.) WG 2005. LNCS, vol. 3787, pp. 16-27. Springer, Heidelberg (2005).
[7]
de Bruijn, N.G.: Asymptotic Methods in Analysis. Dover, Mineola, NY (1981).
[8]
Freivalds, R.: Probabilistic machines can use less running time. In: IFIP Congress, pp. 839-842 (1977).
[9]
Goldreich, O., Goldwasser, S., Ron, D.: Property testing and its connection to learning and approximation. J. ACM 45(4), 653-750 (1998).
[10]
Grebinski, V., Kucherov, G.: Reconstructing a hamiltonian cycle by querying the graph: Application to dna physical mapping. Discrete Applied Mathematics 88(1- 3), 147-165 (1998).
[11]
Grebinski, V., Kucherov, G.: Optimal reconstruction of graphs under the additive model. Algorithmica 28(1), 104-124 (2000).
[12]
Hein, J.J.: An optimal algorithm to reconstruct trees from additive distance data. Bulletin of Mathematical Biology 51(5), 597-603 (1989).
[13]
King, V., Zhang, L., Zhou, Y.: On the complexity of distance-based evolutionary tree reconstruction. In: SODA '03. Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, pp. 444-453 (2003).
[14]
Reyzin, L., Srivastava, N.: On the longest path algorithm for reconstructing trees from distance matrices. Inf. Process. Lett. 101(3), 98-100 (2007).

Cited By

View all
  • (2022)A divide-and-conquer approach for reconstruction of {C ≥5}-free graphs via betweenness queriesTheoretical Computer Science10.1016/j.tcs.2022.03.008917:C(1-11)Online publication date: 25-May-2022
  • (2020)Edge Estimation with Independent Set OraclesACM Transactions on Algorithms10.1145/340486716:4(1-27)Online publication date: 16-Sep-2020
  • (2019)Reconstructing a Bounded-Degree Directed Tree Using Path Queries2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/ALLERTON.2019.8919924(506-513)Online publication date: 24-Sep-2019
  • Show More Cited By

Index Terms

  1. Learning and Verifying Graphs Using Queries with a Focus on Edge Counting
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ALT '07: Proceedings of the 18th international conference on Algorithmic Learning Theory
      October 2007
      402 pages
      ISBN:9783540752240
      • Editors:
      • Marcus Hutter,
      • Rocco A. Servedio,
      • Eiji Takimoto

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 01 October 2007

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)A divide-and-conquer approach for reconstruction of {C ≥5}-free graphs via betweenness queriesTheoretical Computer Science10.1016/j.tcs.2022.03.008917:C(1-11)Online publication date: 25-May-2022
      • (2020)Edge Estimation with Independent Set OraclesACM Transactions on Algorithms10.1145/340486716:4(1-27)Online publication date: 16-Sep-2020
      • (2019)Reconstructing a Bounded-Degree Directed Tree Using Path Queries2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)10.1109/ALLERTON.2019.8919924(506-513)Online publication date: 24-Sep-2019
      • (2018)Graph Reconstruction and VerificationACM Transactions on Algorithms10.1145/319960614:4(1-30)Online publication date: 9-Aug-2018
      • (2016)Reconstructing Markov processes from independent and anonymous experimentsDiscrete Applied Mathematics10.1016/j.dam.2015.06.035200:C(108-122)Online publication date: 19-Feb-2016
      • (2015)Network construction with subgraph connectivity constraintsJournal of Combinatorial Optimization10.1007/s10878-013-9603-229:2(418-432)Online publication date: 1-Feb-2015
      • (2015)Non-adaptive Learning of a Hidden HypergraphProceedings of the 26th International Conference on Algorithmic Learning Theory - Volume 935510.1007/978-3-319-24486-0_6(89-101)Online publication date: 4-Oct-2015
      • (2015)Linear Time Constructions of Some $$d$$-Restriction ProblemsProceedings of the 9th International Conference on Algorithms and Complexity - Volume 907910.1007/978-3-319-18173-8_5(74-88)Online publication date: 20-May-2015
      • (2014)Network verification via routing table queriesJournal of Computer and System Sciences10.1016/j.jcss.2014.06.00381:1(234-248)Online publication date: 1-Oct-2014
      • (2011)On parity check (0, 1)-matrix over ZProceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms10.5555/2133036.2133142(1383-1394)Online publication date: 23-Jan-2011
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media