Trémaux tree

In graph theory, a Trémaux tree of an undirected graph G is a spanning tree of G, rooted at one of its vertices, with the property that every two adjacent vertices in G are related to each other as an ancestor and descendant in the tree. All depth-first search trees and all Hamiltonian paths are Trémaux trees. Trémaux trees are named after Charles Pierre Trémaux, a 19th-century French author who used a form of depth-first search as a strategy for solving mazes.[1][2] They have also been called normal spanning trees, especially in the context of infinite graphs.[3]

In finite graphs, although depth-first search itself is inherently sequential, Trémaux trees can be constructed by a randomized parallel algorithm in the complexity class RNC. They can be used to define the tree-depth of a graph, and as part of the left-right planarity test for testing whether a graph is a planar graph. A characterization of Trémaux trees in the monadic second-order logic of graphs allows graph properties involving orientations to be recognized efficiently for graphs of bounded treewidth using Courcelle's theorem.

Not every infinite connected graph has a Trémaux tree, and the graphs that do have them can be characterized by their forbidden minors. A Trémaux tree exists in every connected graph with countably many vertices, even when an infinite form of depth-first search would not succeed in exploring every vertex of the graph. In an infinite graph, a Trémaux tree must have exactly one infinite path for each end of the graph, and the existence of a Trémaux tree characterizes the graphs whose topological completions, formed by adding a point at infinity for each end, are metric spaces.

Example

In the graph shown below, the tree with edges 1–3, 2–3, and 3–4 is a Trémaux tree when it is rooted at vertex 1 or vertex 2: every edge of the graph belongs to the tree except for the edge 1–2, which (for these choices of root) connects an ancestor-descendant pair.

However, rooting the same tree at vertex 3 or vertex 4 produces a rooted tree that is not a Trémaux tree, because with this root 1 and 2 are no longer an ancestor and descendant of each other.

In finite graphs

Existence

Every finite connected undirected graph has at least one Trémaux tree. One can construct such a tree by performing a depth-first search and connecting each vertex (other than the starting vertex of the search) to the earlier vertex from which it was discovered. The tree constructed in this way is known as a depth-first search tree. If uv is an arbitrary edge in the graph, and u is the earlier of the two vertices to be reached by the search, then v must belong to the subtree descending from u in the depth-first search tree, because the search will necessarily discover v while it is exploring this subtree, either from one of the other vertices in the subtree or, failing that, from u directly. Every finite Trémaux tree can be generated as a depth-first search tree: If T is a Trémaux tree of a finite graph, and a depth-first search explores the children in T of each vertex prior to exploring any other vertices, it will necessarily generate T as its depth-first search tree.

Parallel construction

Unsolved problem in computer science:
Is there a deterministic parallel NC algorithm for constructing Trémaux trees?
(more unsolved problems in computer science)

It is P-complete to find the Trémaux tree that would be found by a sequential depth-first search algorithm, in which the neighbors of each vertex are searched in order by their identities.[4] Nevertheless it is possible to find a different Trémaux tree by a randomized parallel algorithm, showing that the construction of Trémaux trees belongs to the complexity class RNC.[5] As of 1997, it remained unknown whether Trémaux tree construction could be performed by a deterministic parallel algorithm, in the complexity class NC.[6]

Logical expression

It is possible to express the property that a set T of edges with a choice of root vertex r forms a Trémaux tree, in the monadic second-order logic of graphs, and more specifically in the form of this logic called MSO2, which allows quantification over both vertex and edge sets. This property can be expressed as the conjunction of the following properties:

  • The graph is connected by the edges in T. This can be expressed logically as the statement that, for every non-empty proper subset of the graph's vertices, there exists an edge in T with exactly one endpoint in the given subset.
  • T is acyclic. This can be expressed logically as the statement that there does not exist a nonempty subset C of T for which each vertex is incident to either zero or two edges of C.
  • Every edge e not in T connects an ancestor-descendant pair of vertices in T. This is true when both endpoints of e belong to a path in T. It can be expressed logically as the statement that, for all edges e, there exists a subset P of T such that exactly two vertices, one of them r, are incident to a single edge of P, and such that both endpoints of e are incident to at least one edge of P.

Once a Trémaux tree has been identified in this way, one can describe an orientation of the given graph, also in monadic second-order logic, by specifying the set of edges whose orientation is from the ancestral endpoint to the descendant endpoint. The remaining edges outside this set must be oriented in the other direction. This technique allows graph properties involving orientations to be specified in monadic second order logic, allowing these properties to be tested efficiently on graphs of bounded treewidth using Courcelle's theorem.[7]

If a graph has a Hamiltonian path, then that path (rooted at one of its endpoints) is also a Trémaux tree. The undirected graphs for which every Trémaux tree has this form are the cycle graphs, complete graphs, and balanced complete bipartite graphs.[8]

Trémaux trees are closely related to the concept of tree-depth. The tree-depth of a graph G can be defined as the smallest number d such that G can be embedded as a subgraph of a graph H that has a Trémaux tree T of depth d. Bounded tree-depth, in a family of graphs, is equivalent to the existence of a path that cannot occur as a graph minor of the graphs in the family. Many hard computational problems on graphs have algorithms that are fixed-parameter tractable when parameterized by the tree-depth of their inputs.[9]

Trémaux trees also play a key role in the Fraysseix–Rosenstiehl planarity criterion for testing whether a given graph is planar. According to this criterion, a graph G is planar if, for a given Trémaux tree T of G, the remaining edges can be placed in a consistent way to the left or the right of the tree, subject to constraints that prevent edges with the same placement from crossing each other.[10]

In infinite graphs

Existence

Not every infinite graph has a normal spanning tree. For instance, a complete graph on an uncountable set of vertices does not have one: a normal spanning tree in a complete graph can only be a path, but a path has only a countable number of vertices. However, every graph on a countable set of vertices does have a normal spanning tree.[3]

Even in countable graphs, a depth-first search might not succeed in eventually exploring the entire graph,[3] and not every normal spanning tree can be generated by a depth-first search: to be a depth-first search tree, a countable normal spanning tree must have only one infinite path or one node with infinitely many children (and not both).

Minors

If an infinite graph G has a normal spanning tree, so does every connected graph minor of G. It follows from this that the graphs that have normal spanning trees have a characterization by forbidden minors. One of the two classes of forbidden minors consists of bipartite graphs in which one side of the bipartition is countable, the other side is uncountable, and every vertex has infinite degree. The other class of forbidden minors consists of certain graphs derived from Aronszajn trees.[11]

The details of this characterization depend on the choice of set-theoretic axiomatization used to formalize mathematics. In particular, in models of set theory for which Martin's axiom is true and the continuum hypothesis is false, the class of bipartite graphs in this characterization can be replaced by a single forbidden minor. However, for models in which the continuum hypothesis is true, this class contains graphs which are incomparable with each other in the minor ordering.[12]

Ends and metrizability

Normal spanning trees are also closely related to the ends of an infinite graph, equivalence classes of infinite paths that, intuitively, go to infinity in the same direction. If a graph has a normal spanning tree, this tree must have exactly one infinite path for each of the graph's ends.[13]

An infinite graph can be used to form a topological space by viewing the graph itself as a simplicial complex and adding a point at infinity for each end of the graph. With this topology, a graph has a normal spanning tree if and only if its set of vertices can be decomposed into a countable union of closed sets. Additionally, this topological space can be represented by a metric space if and only if the graph has a normal spanning tree.[13]

gollark: <@!139859208592949248> You are trapped in a labyrinth. There are some doors. One of them leads out. One of them leads into a lethal cryoapiary.There are two gollarks in front of the doors. One gollark speaks the truth, one gollark always lies. You suddenly notice other gollarks appearing. The other gollark tells the truth or lies at random. The other² gollark is truthful iff your question does not refer to itself or other gollarks. The other³ gollark calls in orbital laser strikes against those it perceives as asking tricky questions. The other⁴ gollark is truthful iff it predicts (with 99.6% historical accuracy) that you will consider it (one of) the falsehood-telling gollark(s). A subset of the gollarks will say "bee" and "apioform" instead of "true" or "false", but you do not know which or which words "bee" and "apioform" correspond to. The other⁴ gollark just tells you the first bit of the SHA256 hash of your question in UTF-8. Another gollark appears to be randomly materializing doors. The other⁵ gollark will cooperate with you iff you cooperate with CooperateBot/angel. Yet another gollark will tell the truth iff you know what iff means. The final gollark appears to be fiddling with the orbital mind control laser making you know this.What do you do?
gollark: It has port 9999 forwarded now.
gollark: On my raspberry pi.
gollark: Well, yes, but I don't know how to use it without awful merge conflicts and it isn't very realtime.
gollark: We could, accursedly, use sshfs to the HNode™.

References

  1. Even, Shimon (2011), Graph Algorithms (2nd ed.), Cambridge University Press, pp. 46–48, ISBN 978-0-521-73653-4.
  2. Sedgewick, Robert (2002), Algorithms in C++: Graph Algorithms (3rd ed.), Pearson Education, pp. 149–157, ISBN 978-0-201-36118-6.
  3. Soukup, Lajos (2008), "Infinite combinatorics: from finite to infinite", Horizons of combinatorics, Bolyai Soc. Math. Stud., 17, Berlin: Springer, pp. 189–213, doi:10.1007/978-3-540-77200-2_10, ISBN 978-3-540-77199-9, MR 2432534. See in particular Theorem 3, p. 193.
  4. Reif, John H. (1985), "Depth-first search is inherently sequential", Information Processing Letters, 20 (5): 229–234, doi:10.1016/0020-0190(85)90024-9, MR 0801987.
  5. Aggarwal, A.; Anderson, R. J. (1988), "A random NC algorithm for depth first search", Combinatorica, 8 (1): 1–12, doi:10.1007/BF02122548, MR 0951989.
  6. Karger, David R.; Motwani, Rajeev (1997), "An NC algorithm for minimum cuts", SIAM Journal on Computing, 26 (1): 255–272, doi:10.1137/S0097539794273083, MR 1431256.
  7. Courcelle, Bruno (1996), "On the expression of graph properties in some fragments of monadic second-order logic" (PDF), in Immerman, Neil; Kolaitis, Phokion G. (eds.), Proc. Descr. Complex. Finite Models, DIMACS, 31, Amer. Math. Soc., pp. 33–62, MR 1451381.
  8. Chartrand, Gary; Kronk, Hudson V. (1968), "Randomly traceable graphs", SIAM Journal on Applied Mathematics, 16 (4): 696–700, doi:10.1137/0116056, MR 0234852.
  9. Nešetřil, Jaroslav; Ossona de Mendez, Patrice (2012), "Chapter 6. Bounded height trees and tree-depth", Sparsity: Graphs, Structures, and Algorithms, Algorithms and Combinatorics, 28, Heidelberg: Springer, pp. 115–144, doi:10.1007/978-3-642-27875-4, ISBN 978-3-642-27874-7, MR 2920058.
  10. de Fraysseix, Hubert; Rosenstiehl, Pierre (1982), "A depth-first-search characterization of planarity", Graph theory (Cambridge, 1981), Ann. Discrete Math., 13, Amsterdam: North-Holland, pp. 75–80, MR 0671906; de Fraysseix, Hubert; Ossona de Mendez, Patrice; Rosenstiehl, Pierre (2006), "Trémaux trees and planarity", International Journal of Foundations of Computer Science, 17 (5): 1017–1029, arXiv:math/0610935, doi:10.1142/S0129054106004248, MR 2270949.
  11. Diestel, Reinhard; Leader, Imre (2001), "Normal spanning trees, Aronszajn trees and excluded minors" (PDF), Journal of the London Mathematical Society, Second Series, 63 (1): 16–32, doi:10.1112/S0024610700001708, MR 1801714.
  12. Bowler, Nathan; Geschke, Stefan; Pitz, Max (2016), Minimal obstructions for normal spanning trees, arXiv:1609.01042, Bibcode:2016arXiv160901042B
  13. Diestel, Reinhard (2006), "End spaces and spanning trees", Journal of Combinatorial Theory, Series B, 96 (6): 846–854, doi:10.1016/j.jctb.2006.02.010, MR 2274079.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.