Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
The graph isomorphism problem: its structural complexityAugust 1994
Publisher:
  • Birkhauser Verlag
  • PO Box 133 CH-4010 Basel
  • Switzerland
ISBN:978-0-8176-3680-7
Published:01 August 1994
Pages:
160
Skip Bibliometrics Section
Reflects downloads up to 10 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Somogyi F and Asztalos M (2019). Systematic review of matching techniques used in model-driven methodologies, Software and Systems Modeling (SoSyM), 19:3, (693-720), Online publication date: 1-May-2020.
  2. Dutta A, Dasgupta P and Nelson C (2019). Distributed configuration formation with modular robots using (sub)graph isomorphism-based approach, Autonomous Robots, 43:4, (837-857), Online publication date: 1-Apr-2019.
  3. Berkholz C and Grohe M Linear diophantine equations, group CSPs, and graph isomorphism Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (327-339)
  4. Berger F, Gritzmann P and de Vries S (2017). Computing cyclic invariants for molecular graphs, Networks, 70:2, (116-131), Online publication date: 1-Sep-2017.
  5. Schweitzer P (2017). Towards an Isomorphism Dichotomy for Hereditary Graph Classes, Theory of Computing Systems, 61:4, (1084-1127), Online publication date: 1-Nov-2017.
  6. Schmiedl F (2017). Computational Aspects of the Gromov---Hausdorff Distance and its Application in Non-rigid Shape Matching, Discrete & Computational Geometry, 57:4, (854-880), Online publication date: 1-Jun-2017.
  7. Fampa M, Lee J and Melo W (2016). A specialized branch-and-bound algorithm for the Euclidean Steiner tree problem in n-space, Computational Optimization and Applications, 65:1, (47-71), Online publication date: 1-Sep-2016.
  8. Nishida G, Garcia-Dorado I and Aliaga D (2016). Example-Driven Procedural Urban Roads, Computer Graphics Forum, 35:6, (5-17), Online publication date: 1-Sep-2016.
  9. ACM
    Aquino A, Bianchi F, Chen M, Denaro G and Pezzè M Reusing constraint proofs in program analysis Proceedings of the 2015 International Symposium on Software Testing and Analysis, (305-315)
  10. ACM
    Pearce D The whiley rewrite language (WyRL) Proceedings of the 2015 ACM SIGPLAN International Conference on Software Language Engineering, (161-166)
  11. ACM
    Papailiou N, Tsoumakos D, Karras P and Koziris N Graph-Aware, Workload-Adaptive SPARQL Query Caching Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (1777-1792)
  12. O'Donnell R, Wright J, Wu C and Zhou Y Hardness of robust graph isomorphism, lasserre gaps, and asymmetry of random graphs Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (1659-1677)
  13. ACM
    Ozols M, Roetteler M and Roland J (2013). Quantum rejection sampling, ACM Transactions on Computation Theory, 5:3, (1-33), Online publication date: 1-Aug-2013.
  14. Halperin A, Magnant C and Martin D (2013). On Distance Between Graphs, Graphs and Combinatorics, 29:5, (1391-1402), Online publication date: 1-Sep-2013.
  15. ACM
    Ozols M, Roetteler M and Roland J Quantum rejection sampling Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (290-308)
  16. Kratsch S and Schweitzer P Graph isomorphism for graph classes characterized by two forbidden induced subgraphs Proceedings of the 38th international conference on Graph-Theoretic Concepts in Computer Science, (34-45)
  17. ACM
    Su Y and Dunham M A graph-based fuzzy linguistic metadata schema for describing spatial relationships Proceedings of the 2011 Visual Information Communication - International Symposium, (1-10)
  18. Wang T, Dai G and Xu D (2011). A polynomial algorithm for submap isomorphism of general maps, Pattern Recognition Letters, 32:8, (1100-1107), Online publication date: 1-Jun-2011.
  19. Chen L and Fu B (2011). Linear and sublinear time algorithms for the basis of abelian groups, Theoretical Computer Science, 412:32, (4110-4122), Online publication date: 1-Jul-2011.
  20. Schweitzer P Isomorphism of (mis)labeled graphs Proceedings of the 19th European conference on Algorithms, (370-381)
  21. Costa Florêncio C and Fernau H Finding consistent categorial grammars of bounded value Proceedings of the 4th international conference on Language and Automata Theory and Applications, (202-213)
  22. Köbler J, Kuhnert S, Laubner B and Verbitsky O Interval graphs Proceedings of the 37th international colloquium conference on Automata, languages and programming, (384-395)
  23. Zhang M and Omachi S Indexing tree and subtree by using a structure network Proceedings of the 2010 joint IAPR international conference on Structural, syntactic, and statistical pattern recognition, (244-253)
  24. ACM
    Green T Containment of conjunctive queries on annotated relations Proceedings of the 12th International Conference on Database Theory, (296-309)
  25. Zanzotto F and Dell'Arciprete L Efficient kernels for sentence pair classification Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, (91-100)
  26. Chen L and Fu B Linear and Sublinear Time Algorithms for Basis of Abelian Groups Proceedings of the 20th International Symposium on Algorithms and Computation, (493-502)
  27. Sabharwal A (2009). SymChaff, Constraints, 14:4, (478-505), Online publication date: 1-Dec-2009.
  28. Uehara R and Uno Y (2009). Laminar structure of ptolemaic graphs with applications, Discrete Applied Mathematics, 157:7, (1533-1543), Online publication date: 1-Apr-2009.
  29. Chen J, Kanj I, Meng J, Xia G and Zhang F (2009). On the pseudo-achromatic number problem, Theoretical Computer Science, 410:8-10, (818-829), Online publication date: 1-Mar-2009.
  30. Nagoya T and Toda S (2009). Computational complexity of computing a partial solution for the Graph Automorphism problems, Theoretical Computer Science, 410:21-23, (2064-2071), Online publication date: 1-May-2009.
  31. Hasegawa S, Hatanaka H, Isobe S, Koizumi E and Shizuya H (2008). Making Cryptographic Primitives Harder, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (330-337), Online publication date: 1-Jan-2008.
  32. Arvind V, Das B and Köbler J A logspace algorithm for partial 2-tree canonization Proceedings of the 3rd international conference on Computer science: theory and applications, (40-51)
  33. Hayashi M, Kawachi A and Kobayashi H (2008). Quantum measurements for hidden subgroup problems with optimal sample complexity, Quantum Information & Computation, 8:3, (345-358), Online publication date: 1-Mar-2008.
  34. Bordeaux L, Cadoli M and Mancini T (2008). A unifying framework for structural properties of CSPs, Journal of Artificial Intelligence Research, 32:1, (607-629), Online publication date: 1-May-2008.
  35. Köbler J and Verbitsky O From invariants to canonization in parallel Proceedings of the 3rd international conference on Computer science: theory and applications, (216-227)
  36. Hasegawa S, Isobe S and Shizuya H (2008). NPMV-Complete Functions That Compute Discrete Logarithms and Integer Factorization, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (342-344), Online publication date: 1-Jan-2008.
  37. Soto M and Münch J Focused identification of process model changes Proceedings of the 2007 international conference on Software process, (182-194)
  38. Torán J Reductions to graph isomorphism Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science, (158-167)
  39. Ocampo A and Soto M Connecting the rationale for changes to the evolution of a process Proceedings of the 8th international conference on Product-Focused Software Process Improvement, (160-174)
  40. Soto M and Münch J Maintaining a large process model aligned with a process standard Proceedings of the 14th European conference on Software Process Improvement, (19-30)
  41. Bretto A, Faisant A and Vallée T (2006). Compatible topologies on graphs, Theoretical Computer Science, 362:1, (255-272), Online publication date: 11-Oct-2006.
  42. Köbler J On graph isomorphism for restricted graph classes Proceedings of the Second conference on Computability in Europe: logical Approaches to Computational Barriers, (241-256)
  43. Soto M and Münch J Process model difference analysis for supporting process evolution Proceedings of the 13th European conference on Software Process Improvement, (123-134)
  44. Arvind V and Kurur P (2006). Graph Isomorphism is in SPP, Information and Computation, 204:5, (835-852), Online publication date: 1-May-2006.
  45. Arvind V and Torán J The complexity of quasigroup isomorphism and the minimum generating set problem Proceedings of the 17th international conference on Algorithms and Computation, (233-242)
  46. Arvind V, Das B and Mukhopadhyay P On isomorphism and canonization of tournaments and hypertournaments Proceedings of the 17th international conference on Algorithms and Computation, (449-459)
  47. Xu D and Tao Z (2005). Complexities of homomorphism and isomorphism for definite logic programs, Journal of Computer Science and Technology, 20:6, (758-762), Online publication date: 1-Nov-2005.
  48. Kleine Büning H and Xu D (2005). The Complexity of Homomorphisms and Renamings for Minimal Unsatisfiable Formulas, Annals of Mathematics and Artificial Intelligence, 43:1-4, (113-127), Online publication date: 1-Jan-2005.
  49. Uehara R, Toda S and Nagoya T (2005). Graph isomorphism completeness for chordal bipartite graphs and strongly chordal graphs, Discrete Applied Mathematics, 145:3, (479-482), Online publication date: 30-Jan-2005.
  50. Nordh G (2005). The complexity of equivalence and isomorphism of systems of equations over finite groups, Theoretical Computer Science, 345:2-3, (406-424), Online publication date: 22-Nov-2005.
  51. Kawachi A, Koshiba T, Nishimura H and Yamakami T Computational indistinguishability between quantum states and its cryptographic application Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (268-284)
  52. Sabharwal A SymChaff Proceedings of the 20th national conference on Artificial intelligence - Volume 1, (467-474)
  53. Mancini T and Cadoli M Detecting and breaking symmetries by reasoning on problem specifications Proceedings of the 6th international conference on Abstraction, Reformulation and Approximation, (165-181)
  54. Luks E and Roy A (2004). The Complexity of Symmetry-Breaking Formulas, Annals of Mathematics and Artificial Intelligence, 41:1, (19-45), Online publication date: 1-May-2004.
  55. ACM
    Kenyon C, Rabani Y and Sinclair A Low distortion maps between point sets Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, (272-280)
  56. Ogihara M and Tantau T (2004). On the reducibility of sets inside NP to sets with low information content, Journal of Computer and System Sciences, 69:4, (499-524), Online publication date: 1-Dec-2004.
  57. Calamoneri T and Massini A (2004). Efficient algorithms for checking the equivalence of multistage interconnection networks, Journal of Parallel and Distributed Computing, 64:1, (135-150), Online publication date: 1-Jan-2004.
  58. ACM
    Aharonov D and Ta-Shma A Adiabatic quantum state generation and statistical zero knowledge Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (20-29)
  59. Jenner B, Köbler J, McKenzie P and Torán J (2003). Completeness results for graph isomorphism, Journal of Computer and System Sciences, 66:3, (549-566), Online publication date: 1-May-2003.
  60. ACM
    Grigni M, Schulman L, Vazirani M and Vazirani U Quantum mechanical algorithms for the nonabelian hidden subgroup problem Proceedings of the thirty-third annual ACM symposium on Theory of computing, (68-74)
  61. Kurfess F (2000). Neural Networks and Structured Knowledge, Applied Intelligence, 12:1-2, (7-13), Online publication date: 1-Jan-2000.
  62. ACM
    Hallgren S, Russell A and Ta-Shma A Normal subgroup reconstruction and quantum computation using group representations Proceedings of the thirty-second annual ACM symposium on Theory of computing, (627-635)
  63. Siddiqi K, Shokoufandeh A, Dickinson S and Zucker S (1999). Shock Graphs and Shape Matching, International Journal of Computer Vision, 35:1, (13-32), Online publication date: 1-Nov-1999.
  64. Schädler K and Wysotzki F (1999). Comparing Structures Using a Hopfield-Style Neural Network, Applied Intelligence, 11:1, (15-30), Online publication date: 1-Jul-1999.
  65. ACM
    Elinson A, Nau D and Regli W Feature-based similarity assessment of solid models Proceedings of the fourth ACM symposium on Solid modeling and applications, (297-310)
  66. Borchert B and Silvestri R The General Notion of a Dot-Operator Proceedings of the 12th Annual IEEE Conference on Computational Complexity
  67. Arvind V and Toran J A Nonadaptive NC Checker for Permutation Group Intersection Proceedings of the 12th Annual IEEE Conference on Computational Complexity
Contributors
  • Humboldt University of Berlin
  • Ulm University
  • Ulm University

Reviews

Douglas M. Campbell

The authors summarize recent results on the complexity of the graph isomorphism (GI) problem relative to NP and other complexity classes, and explain the aims and scope of structural complexity theory. Presuming only an elementary knowledge of complexity theory and probability theory, the book contains wonderful examples for a standard complexity theory course and makes its results accessible to a broad audience. The book is divided into four chapters. The first chapter develops reducibility, NP-completeness, and the difference between deciding a problem, solving a problem, and counting the number of solutions to a problem. The second chapter deals with the polynomial hierarchy, interactive proofs, probabilistic complexity classes, and the concept of “lowness” relative to GI. In particular, if the polynomial hierarchy does not collapse to S p 2 , then GI is not NP-complete. The third chapter studies reducing intractable problems to sets with low information content, such as sparse sets. Although it is unknown whether an NP-complete problem can be sparse, one consequence of this section is that GI is “almost” in NP ? co-NP . Finally, chapter 4 deals with counting the number of solutions to a problem. Unlike some other problems, counting the number of isomorphisms for GI is not harder than deciding whether an isomorphism exists for GI. The chapter ends by relating Ulam's classical graph re<__?__Pub Caret>construction problem to GI. The book is loaded with examples, is pleasant reading, and is excellent for a graduate seminar.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations