SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Improved  dynamic  reachability algorithms for  directed  graphs Liam Roditty   and   Uri Zwick Tel Aviv University
Dynamic reachability Transitive closure matrix The dynamic graph Operations Delete (1,5) (4,1) Insert (5,1) (5,2) (5,4) Reach? (1,4) Delete (2,3) (6,7) (8,5) 1 1 1 1 8 1 1 1 1 7 1 1 1 1 6 1 1 1 1 5 1 1 1 1 1 1 1 1 4 1 1 1 1 1 1 1 1 3 1 1 1 1 1 1 1 1 2 1 1 1 1 1 1 1 1 1 8 7 6 5 4 3 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7
Decremental reachability - Results Baswana Hariharan Sen ’02 mn 4/3 1 Monte Carlo General RZ ’02 mn 1 Las Vegas General Demetrescu Italiano ’00 n 3 1 Deterministic General La Poutré van Leeuwen ’87 FMNZ ’01  m 2 1 Deterministic General Henzinger King ’95 mn   log 2   n n   log   n Monte Carlo General Italiano ’88 mn 1 Deterministic DAGs Authors Total  update time Query time Algorithm Graphs
Fully dynamic reachability - Results Roditty ’03 n 2 1 Deterministic General Demetrescu Italiano ’00 n 2 1 Deterministic General King ’99 n 2  log n 1 Deterministic General Authors Amortized  update time Query time Algorithm Graphs
Fully dynamic reachability - Results Demetrescu, Italiano ’00 n 1.58 n 0.58 Monte Carlo DAGs m 0.58 n m 0.43 Monte Carlo General RZ ’02 mn 1/2 n 1/2 Deterministic General m 0.58 n n   log   n Monte Carlo General Henzinger King ’95 mn 1/2   log 2   n n   log   n Monte Carlo General RZ ’02 m n   log   n Deterministic DAGs Authors Amortized update time Query time Algorithm Graphs
Decremental  maintenance of a reachability tree in a  DAG  –  Italiano ’s algorithm Every edge is only examined once! Total complexity is O(m) per tree.
Decremental  maintenance of a reachability tree in a general graph     Frigioni, Miller, Nanni and Zaroliagis  ’01 The graph induced on the  Strongly Connected Components   (SCCs)   of a graph is a DAG. Maintain a reachability tree of SCCs ! If a deleted edge connects two different SCCs, use Italiano’s algorithm. If a deleted edge is in a SCC, and the SCC remains strongly connected, do nothing.
When a SCC decomposes
How do we maintain the SCCs? ,[object Object],[object Object],[object Object]
Decremental  maintenance of a BFS tree in a general graph     Even, Shiloach ’81 / Henzinger, King ’95 Every edge is only examined once per level! Total complexity is O(mn).
Detecting the decomposition of a SCC ,[object Object],[object Object],[object Object],w
When a SCC decomposes w w w 4 w 2 w 1 w 3 Total cost: mn + m 1 n 1 +m 2 n 2 +m 3 n 3 +m 4 n 4 + … = O(mn) ???
Choice of representatives w Choose a  RANDOM   representative !!! Expected running time is then O(mn) !!! w w
Decremental SCCs - Analysis Let  be the  expected  total running time.
Decremental SCCs - Analysis
Fully dynamic reachability (after Henzinger-King ’95) G Decremental data structure … v 1 v 2 v t Initialize a decremental data structure O(mn) time Insert(E v ) – build/rebuild In(v) and Out(v). O(m) time. Reach?(u,v) – Query the decremental data structure and  each  pair of trees. O(t) time Delete(E’) – Update the decremental data structure and  rebuild  all trees. O(mt) time. When t=n 1/2 , restart. Amortized cost per update – O(mn 1/2 ) Worst-case query time – O(n 1/2 )
Decremental reachability –  Open problems ,[object Object],[object Object],[object Object],[object Object]
Fully dynamic reachability –  Open problems ,[object Object],[object Object]

Weitere ähnliche Inhalte

Andere mochten auch

lecture 20
lecture 20lecture 20
lecture 20
sajinsc
 

Andere mochten auch (8)

lecture 20
lecture 20lecture 20
lecture 20
 
20 Single Source Shorthest Path
20 Single Source Shorthest Path20 Single Source Shorthest Path
20 Single Source Shorthest Path
 
Graphs
GraphsGraphs
Graphs
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Dynamic uri

When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
Anis Nasir
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environment
Md Mahbubur Rahman
 
Teletraffic engineering handbook
Teletraffic engineering handbookTeletraffic engineering handbook
Teletraffic engineering handbook
Deepak Singh
 

Ähnlich wie Dynamic uri (20)

Geohydrology ii (3)
Geohydrology ii (3)Geohydrology ii (3)
Geohydrology ii (3)
 
Applications of Wavelet Transform
Applications of Wavelet TransformApplications of Wavelet Transform
Applications of Wavelet Transform
 
Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...Bearing fault detection using acoustic emission signals analyzed by empirical...
Bearing fault detection using acoustic emission signals analyzed by empirical...
 
Multiuser detection new
Multiuser detection newMultiuser detection new
Multiuser detection new
 
A multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modesA multi phase decision on reliability growth with latent failure modes
A multi phase decision on reliability growth with latent failure modes
 
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)
 
5.3 dyn algo-i
5.3 dyn algo-i5.3 dyn algo-i
5.3 dyn algo-i
 
Node Unique Label Cover
Node Unique Label CoverNode Unique Label Cover
Node Unique Label Cover
 
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
When Two Choices Are not Enough: Balancing at Scale in Distributed Stream Pro...
 
Modal Analysis Basic Theory
Modal Analysis Basic TheoryModal Analysis Basic Theory
Modal Analysis Basic Theory
 
Fuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS techniqueFuzzy Logic based watermarking using non – blind HVS technique
Fuzzy Logic based watermarking using non – blind HVS technique
 
Canino d2016stag slides
Canino d2016stag slidesCanino d2016stag slides
Canino d2016stag slides
 
Mining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsMining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systems
 
Recurrent Instance Segmentation (UPC Reading Group)
Recurrent Instance Segmentation (UPC Reading Group)Recurrent Instance Segmentation (UPC Reading Group)
Recurrent Instance Segmentation (UPC Reading Group)
 
Efficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environmentEfficient mission planning in communication constrained environment
Efficient mission planning in communication constrained environment
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
Teletraffic engineering handbook
Teletraffic engineering handbookTeletraffic engineering handbook
Teletraffic engineering handbook
 
A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...
 
Hybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay SystemHybrid Fuzzy Sliding Mode Controller for Timedelay System
Hybrid Fuzzy Sliding Mode Controller for Timedelay System
 
Investigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlationInvestigation of repeated blasts at Aitik mine using waveform cross correlation
Investigation of repeated blasts at Aitik mine using waveform cross correlation
 

Kürzlich hochgeladen

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Kürzlich hochgeladen (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Dynamic uri

  • 1. Improved dynamic reachability algorithms for directed graphs Liam Roditty and Uri Zwick Tel Aviv University
  • 2. Dynamic reachability Transitive closure matrix The dynamic graph Operations Delete (1,5) (4,1) Insert (5,1) (5,2) (5,4) Reach? (1,4) Delete (2,3) (6,7) (8,5) 1 1 1 1 8 1 1 1 1 7 1 1 1 1 6 1 1 1 1 5 1 1 1 1 1 1 1 1 4 1 1 1 1 1 1 1 1 3 1 1 1 1 1 1 1 1 2 1 1 1 1 1 1 1 1 1 8 7 6 5 4 3 2 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7 3 4 2 1 5 6 8 7
  • 3. Decremental reachability - Results Baswana Hariharan Sen ’02 mn 4/3 1 Monte Carlo General RZ ’02 mn 1 Las Vegas General Demetrescu Italiano ’00 n 3 1 Deterministic General La Poutré van Leeuwen ’87 FMNZ ’01 m 2 1 Deterministic General Henzinger King ’95 mn log 2 n n log n Monte Carlo General Italiano ’88 mn 1 Deterministic DAGs Authors Total update time Query time Algorithm Graphs
  • 4. Fully dynamic reachability - Results Roditty ’03 n 2 1 Deterministic General Demetrescu Italiano ’00 n 2 1 Deterministic General King ’99 n 2 log n 1 Deterministic General Authors Amortized update time Query time Algorithm Graphs
  • 5. Fully dynamic reachability - Results Demetrescu, Italiano ’00 n 1.58 n 0.58 Monte Carlo DAGs m 0.58 n m 0.43 Monte Carlo General RZ ’02 mn 1/2 n 1/2 Deterministic General m 0.58 n n log n Monte Carlo General Henzinger King ’95 mn 1/2 log 2 n n log n Monte Carlo General RZ ’02 m n log n Deterministic DAGs Authors Amortized update time Query time Algorithm Graphs
  • 6. Decremental maintenance of a reachability tree in a DAG – Italiano ’s algorithm Every edge is only examined once! Total complexity is O(m) per tree.
  • 7. Decremental maintenance of a reachability tree in a general graph Frigioni, Miller, Nanni and Zaroliagis ’01 The graph induced on the Strongly Connected Components (SCCs) of a graph is a DAG. Maintain a reachability tree of SCCs ! If a deleted edge connects two different SCCs, use Italiano’s algorithm. If a deleted edge is in a SCC, and the SCC remains strongly connected, do nothing.
  • 8. When a SCC decomposes
  • 9.
  • 10. Decremental maintenance of a BFS tree in a general graph Even, Shiloach ’81 / Henzinger, King ’95 Every edge is only examined once per level! Total complexity is O(mn).
  • 11.
  • 12. When a SCC decomposes w w w 4 w 2 w 1 w 3 Total cost: mn + m 1 n 1 +m 2 n 2 +m 3 n 3 +m 4 n 4 + … = O(mn) ???
  • 13. Choice of representatives w Choose a RANDOM representative !!! Expected running time is then O(mn) !!! w w
  • 14. Decremental SCCs - Analysis Let be the expected total running time.
  • 15. Decremental SCCs - Analysis
  • 16. Fully dynamic reachability (after Henzinger-King ’95) G Decremental data structure … v 1 v 2 v t Initialize a decremental data structure O(mn) time Insert(E v ) – build/rebuild In(v) and Out(v). O(m) time. Reach?(u,v) – Query the decremental data structure and each pair of trees. O(t) time Delete(E’) – Update the decremental data structure and rebuild all trees. O(mt) time. When t=n 1/2 , restart. Amortized cost per update – O(mn 1/2 ) Worst-case query time – O(n 1/2 )
  • 17.
  • 18.