To appear in Groups and Computation II The complexity of McKay’s canonical labeling algorithm
نویسنده
چکیده
We study the time complexity of McKay’s algorithm to compute canonical forms and automorphism groups of graphs. The algorithm is based on a type of backtrack search, and it performs pruning by discovered automorphisms and by hashing partial information of vertex labelings. In practice, the algorithm is implemented in the nauty package. We obtain colorings of Fürer’s graphs that allow the algorithm to compute their canonical forms in polynomial time. We then prove an exponential lower bound of the algorithm for connected 3-regular graphs of color-class size 4 using Fürer’s construction. We conducted experiments with nauty for these graphs. Our experimental results also indicate the same exponential lower bound.
منابع مشابه
McKay’s Canonical Graph Labeling Algorithm
The problem of deciding whether two graphs are isomorphic is fundamental in graph theory. Moreover, the flexibility with which other combinatorial objects can be modeled by graphs has meant that efficient programs for deciding whether graphs are isomorphic have also been used to study a variety of other combinatorial structures. Not only is the graph isomorphism problem a very practical one, it...
متن کاملNew Algorithm For Computing Secondary Invariants of Invariant Rings of Monomial Groups
In this paper, a new algorithm for computing secondary invariants of invariant rings of monomial groups is presented. The main idea is to compute simultaneously a truncated SAGBI-G basis and the standard invariants of the ideal generated by the set of primary invariants. The advantage of the presented algorithm lies in the fact that it is well-suited to complexity analysis and very easy to i...
متن کاملطراحی محدودة بهینه نهایی در معادن روباز با روشهای اصلاح شدة مخروط شناور دو
With the advent and wide spread use of computers a number of algorithms have been developed to determine the optimum ultimate pit limits in open pit mining. The main objective of these algorithms is to find groups of blocks that should be removed to yield the maximum overall mining profit under specified economic conditions and technological constraints. The most common methods are: Lerchs and ...
متن کاملSweep Line Algorithm for Convex Hull Revisited
Convex hull of some given points is the intersection of all convex sets containing them. It is used as primary structure in many other problems in computational geometry and other areas like image processing, model identification, geographical data systems, and triangular computation of a set of points and so on. Computing the convex hull of a set of point is one of the most fundamental and imp...
متن کاملGraphs of Bounded Treewidth can be Canonized in AC
In recent results the complexity of isomorphism testing on graphs of bounded treewidth is improved to TC [GV06] and further to LogCFL [DTW10]. The computation of canonical forms or a canonical labeling provides more information than isomorphism testing. Whether canonization is in NC or even TC was stated as an open question in [Köb06]. Köbler and Verbitsky [KV08] give a TC canonical labeling al...
متن کامل