Beyond the Shannon's Bound
نویسندگان
چکیده
Let G = (V,E) be a multigraph of maximum degree ∆. The edges of G can be colored with at most 3 2∆ colors by Shannon’s theorem. We study lower bounds on the size of subgraphs of G that can be colored with ∆ colors. Shannon’s Theorem gives a bound of ∆ ⌊ 3 2 ∆⌋ |E|. However, for ∆ = 3, Kamiński and Kowalik [7, 8] showed that there is a 3-edge-colorable subgraph of size at least 79 |E|, unless G has a connected component isomorphic to K3 + e (a K3 with an arbitrary edge doubled). Here we extend this line of research by showing that G has a ∆-edge colorable subgraph with at least ∆ ⌊ 3 2 ∆⌋−1 |E| edges, unless ∆ is even and G contains ∆ 2 K3 or ∆ is odd and G contains ∆−1 2 K3+e. Moreover, the subgraph and its coloring can be found in polynomial time. Our results have applications in approximation algorithms for the Maximum kEdge-Colorable Subgraph problem, where given a graph G (without any bound on its maximum degree or other restrictions) one has to find a k-edge-colorable subgraph with maximum number of edges. In particular, for every even k ≥ 4 we obtain a 2k+2 3k+2 -approximation and for every odd k ≥ 5 we get a 2k+1 3k -approximation. When 4 ≤ k ≤ 13 this improves over earlier algorithms due to Feige et al. [5].
منابع مشابه
The Rényi redundancy of generalized Huffman codes
If optimality is measured by average codeword length, Huffman's algorithm gives optimal codes, and the redundancy can be measured as the difference between the average codeword length and Shannon's entropy. If the objective function is replaced by an exponentially weighted average, then a simple modification of Huffman's algorithm gives optimal codes. The redundancy can now be measured as the d...
متن کاملSymmetry in Shannon's Noiseless Coding Theorem
Statements of Shannon’s Noiseless Coding Theorem by various authors, including the original, are reviewed and clarified. Traditional statements of the theorem are often unclear as to when it applies. A new notation is introduced and the domain of application is clarified. An examination of the bounds of the Theorem leads to a new symmetric restatement. It is shown that the extended upper bound ...
متن کاملThe Role of Information Theory in Cryptography
This paper reviews the relations between information theory and cryptography, from Shannon's foundation of information theory to the most recent developments in unconditionally-secure key-agreement protocols. For a long time, information theory has mainly been used in cryptography to prove lower bounds on the size of the secret key required to achieve a certain level of security in secrecy and ...
متن کاملar X iv : q ua nt - p h / 05 11 15 6 v 1 1 6 N ov 2 00 5 Experimental Heat - Bath Cooling of Spins
Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond...
متن کاملFormalization of Shannon's Theorems in SSReflect-Coq
The most fundamental results of information theory are Shannon’s theorems. These theorems express the bounds for reliable data compression and transmission over a noisy channel. Their proofs are non-trivial but rarely detailed, even in the introductory literature. This lack of formal foundations makes it all the more unfortunate that crucial results in computer security rely solely on informati...
متن کاملAN APPLICATION OF TRAJECTORIES AMBIGUITY IN TWO-STATE MARKOV CHAIN
In this paper, the ambiguity of nite state irreducible Markov chain trajectories is reminded and is obtained for two state Markov chain. I give an applicable example of this concept in President election
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1309.6069 شماره
صفحات -
تاریخ انتشار 2013