THRESHOLD GRAPHS AND RELATED TOPICS
ANNALS OF DISCRETE MATHEMATICS
General Editor: Peter L. HAMMER Rutgers University, New Brunswick, NJ, USA Advisory Editors: C. BERGE, Universit6 de Paris, France R.L. GRAHAM, AT&T Bell Laboratories, NJ, USA M.A. HARRISON, University of California, Berkeley, CA, USA V. KLEE, University of Washington, Seattle, WA, USA J.H. VAN LINT, California Institute of Technology, Pasadena, CA, USA G.C. ROTA, Massachusetts Institute of Technology, Cambridge, MA, USA T. TROTTER, Arizona State University, Tempe, AZ, USA
56
THRESHOLD GRAPHS AND RELATED TOPICS
N.V.R. MAHADEV Northeastern University Boston, MA, USA
U.N. PELED University of Illinois at Chicago Chicago, IL, USA
1995 ELSEVIER AMSTERDAM
�9L A U S A N N E
�9N E W Y O R K �9O X F O R D �9S H A N N O N
�9T O K Y O
ELSEVIER SCIENCE B.V. Sara Burgerhartstraat 25 P.O. Box 211, 1000 AE Amsterdam, The Netherlands
ISBN: 0 444 89287 7 �9 1995 Elsevier Science B.V. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the publisher, Elsevier Science B.V., Copyright & Permissions Department, P.O. Box 521, 1000 A M Amsterdam, The Netherlands. Special regulations for readers in the U.S.A. - This publication has been registered with the Copyright Clearance Center Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923. Information can be obtained from the CCC about conditions under which photocopies of parts of this publication may be made in the U.S.A. All other copyright questions, including photocopying outside of the U.S.A, should be referred to the publisher. No responsibility is assumed by the publisher for any injury and~or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. This book is printed on acid-free paper. Printed in The Netherlands
Dedicated to my mother Prasuna who was my first teacher and to my father Nadimpalli V. S u b r a h m a n y a m ~ho inspired me to do m a t h e m a t i c s NVRM
Dedicated to my dear mother Malka and in m e m o r y of my father Ze'ev who gave me all that I have UNP
n~9~l In~Y)~ 17 7N~ n"~ ~'~N 7 ~
~9D 13q3-,qIN
"Pl
This Page Intentionally Left Blank
Preface Threshold graphs have a beautiful structure and possess many important mathematical properties such as being the extreme cases of certain graph properties. They also have applications in many areas such as computer science and psychology. Their many characterizations can be relaxed in different directions to obtain new and important classes of graphs. For this reason, interest in these graphs gained momentum during last 20 years. In 1980, Golumbic devoted a chapter to them in his book Algorithmic Graph Theory and Perfect Graphs [Go180]. Since then many new results related to this topic were discovered, and by now more than 100 articles have been published in various fields. Even as we started to write this book, significant results were discovered as late as this summer. We believe that this subject will continue to attract much attention and there is a need for a coherent presentation of the existing results to serve as a reference. In writing this book, we unified several scattered results and rewrote some proofs, occasionally giving new ones. Because of space considerations we could not include every result related to threshold graphs, and we had to exercise our personal bias. In particular, we cover very little from the vast fields of hypergraphs and Boolean functions. This book is self-contained, except for very few places where we use known results from the literature. However, some chapters assume general background from linear programming or complexity theory. We tried to organize the book as much as possible so that every chapter could be studied independently after Chapter 1 and in some cases Chapter 2. Occasionally, we repeated some definitions for the convenience of the reader. We included many open problems and research ideas to make the book attractive to graduate students and researchers interested in graph theory. We typeset this book using [4TEX 2e under emTEX, and we thank Eberhard Mattes for making the excellent em~-F~X system available to the general vii
viii
Preface
public. The pictures were prepared with a combination of TEXCAD and PI~These tools enabled us to produce a camera-ready copy very easily and efficiently. Several people read parts of the manuscript and gave valuable comments. They include Waleed A1-Jasem, Srinivasa Arikati, Chris Brown, Kristine Cirino, Yee-Hong Lui, Francois Margot, Thomas Raschle, Ron Shamir, Andrea Sterbini, and Julin Wu. We owe them a debt of gratitude for their help. We are grateful for the kind support of the Swiss Federal Institute of Technology in Lausanne for inviting the first author to give seminars on the topics of this book, and of the Department of Mathematics at Northeastern University and the Mathematics, Statistics, and Computer Science Department of the University of Illinois at Chicago for enabling us to spend time together to accomplish what was not possible with e-mail alone. We thank Arjen Sevenster of Elsevier Science for his help in publishing this manuscript. Special thanks are due to Peter Hammer, who introduced both of us to the subject of threshold graphs, invited us to write this book and encouraged us throughout this project. Our deepest thanks go to our wives Aparna and Ofra and our children Maya, Shilpa, Tsoni and Benny for their sacrifices and endurance through all these long years. Without their constant love and support we could not have completed this undertaking.
June 199,5
Contents Preface
vii
Basic Terminology 1
2
Threshold Graphs 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . 1.2 Basic Characterizations . . . . . . . . . . . . . . . . . . . . . . 1.3 Minimizing Integral Weights . . . . . . . . . . . . . . . . . . . 1.4 Perfect Graphs and Algorithms . . . . . . . . . . . . . . . . . 1.4.1 Perfect Graphs . . . . . . . . . . . . . . . . 1.4.2 Algorithms . . . . . . . . . . . . . . . . . . 1.5 Threshold and Split Completions . . . . . . . . . . . . . . . . 1.6 Longest Cycles and Hamiltonicity . . . . . . . . . . . . . . . . 1.6.1 Hamiltonicity . . . . . . . . . . . . . . . . . 1.7 Total Coverings and Total Matchings . . . . . . . . . . . . . . 1.7.1 Main Results . . . . . . . . . . . . . . . . . 1.7.2 Related Results . . . . . .................
. . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
7 7 8 14 17 17 19 19 22 25 27 28 31
Ferrets Digraphs and Difference Graphs
33
2.1 2.2 2.3 2.4
33 38 46 52
Introduction . . . . . . . . . . . . . Ferrets Digraphs, Characterizations T h e Ferrets Dimension . . . . . . . Difference Graphs . . . . . . . . . .
. . . . . . . . . . . . . . . ............... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3 Degree Sequences 3.1 3.2 3.3
59
Graphical Degree Sequences . . . . . . . . . . . . . . . . . . . Threshold Sequences . . . . . . . . . . . . . . . . . . . . . . . The P o l y t o p e of Degree Sequences . . . . . . . . . . . . . . . . ix
59 72 75
Contents 3.3.1
3.4
4
5
6
7
E x t r e m e Points
. . . . . . . . . . . . . . . . . . . . . .
76
3.3.2
Adjacency . . . . . . . . . . . . . . . . . . . . . . . . .
78
3.3.3
Linear D e s c r i p t i o n a n d Facets
. . . . . . . . . . . . . .
86
. . . . . . . . . . . . . . . . . . . . . . .
92
Difference Sequences
Applications
97
4.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
97
4.2
A g g r e g a t i o n of I n e q u a l i t i e s . . . . . . . . . . . . . . . . . . . .
97
4.3
Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . .
99
4.4
Cyclic S c h e d u l i n g . . . . . . . . . . . . . . . . . . . . . . . . .
105
4.5
G u t t m a n Scales . . . . . . . . . . . . . . . . . . . . . . . . . .
109
Split Graphs
111
5.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
111
5.2
Basic P r o p e r t i e s . . . . . . . . . . . . . . . . . . . . . . . . . .
111
5.3
H a m i l t o n i a n Split G r a p h s
. . . . . . . . . . . . . . . . . . . .
116
5.4
T h e S p l i t t a n c e of a G r a p h
. . . . . . . . . . . . . . . . . . . .
117
The Threshold Dimension
123
6.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
123
6.2
B o u n d s for t h e T h r e s h o l d D i m e n s i o n
. . . . . . . . . . . . . .
126
6.3
Dimensional Properties . . . . . . . . . . . . . . . . . . . . . .
128
6.4
Operations Preserving the Threshold Dimension . . . . . . . .
134
6.5
Restricted Threshold Dimension . . . . . . . . . . . . . . . . .
135
NP-Completeness
139
7.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
139
7.2
The Partial Order Dimension
7.3
7.4
7.2.1
Preliminaries
7.2.2
The Reduction
. . . . . . . . . . . . . . . . . .
139
. . . . . . . . . . . . . . . . . . . . . . .
139
. . . . . . . . . . . . . . . . . . . . . .
141
Related NP-complete Problems
. . . . . . . . . . . . . . . . .
146
. . . . . . . . . . . . . . . . . . . .
147
. . . . . . . . . . . . . . . . . . . . . . . . . .
148
7.3.3
Cubicity . . . . . . . . . . . . . . . . . . . . . . . . . .
149
7.3.4
Threshold Dimension . . . . . . . . . . . . . . . . . . .
149
7.3.1
Interval Dimension
7.3.2
Boxicity
Other Complexity Results
. . . . . . . . . . . . . . . . . . . .
150
7.4.1
Preliminaries
. . . . . . . . . . . . . . . . . . . . . . .
150
7.4.2
Largest Threshold Subgraph . . . . . . . . . . . . . . .
152
Contents
8
xi
7.4.3
Weighted 2-Threshold Partition
7.4.4
R e d u c t i o n f r o m N M T S to M O N 3 P A R T
7.4.5
r-Cyclic Scheduling and H T r H
7.5
T h e Split D i m e n s i o n
7.6
Polar Graphs
.........
.............
154 158 160
. . . . . . . . . . . . . . . . . . . . . . .
163
. . . . . . . . . . . . . . . . . . . . . . . . . . .
168
2-Threshold Graphs
175
8.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
175
P r o p e r t i e s of 2 - t h r e s h o l d G r a p h s
8.2
8.2.1
9
.............
As P e r f e c t G r a p h s
. . . . . . . . . . . . . . . .
176
. . . . . . . . . . . . . . . . . . . .
176
8.3
Bithreshold Graphs
. . . . . . . . . . . . . . . . . . . . . . . .
179
8.4
8.3.1 Decomposing Bithreshold Graphs ............ Strict 2 - T h r e s h o l d G r a p h s . . . . . . . . . . . . . . . . . . . .
179 186
8.5 8.6
Recognizing Threshold Dimension 2 ............... R e c o g n i z i n g Difference D i m e n s i o n 2 . . . . . . . . . . . . . . .
190 213
8.7
Intersection Threshold Dimension 2 ...............
224
The Dilworth N u m b e r
241
9.1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
241
9.2
G r a p h s of D i l w o r t h N u m b e r 2 . . . . . . . . . . . . . . . . . .
245
9.2.1
T h r e s h o l d Signed G r a p h s . . . . . . . . . . . . . . . . .
245
9.2.2 Forbidden Subgraphs . . . . . . . . . . . . . . . . . . . 9.3 T h e D i l w o r t h N u m b e r a n d P e r f e c t G r a p h s . . . . . . . . . . . .
250 252
10 B o x - T h r e s h o l d Graphs
257
10.1 I n t r o d u c t i o n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.2 E l e m e n t a r y P r o p e r t i e s . . . . . . . . . . . . . . . . . . . . . .
257 258
10.3 A T r a n s p o r t a t i o n M o d e l . . . . . . . . . . . . . . . . . . . . . 10.4 F r a m e s of B T G r a p h s . . . . . . . . . . . . . . . . . . . . . . .
262 265
11 Matroidal and M a t r o g e n i c Graphs
271
11.1 I n t r o d u c t i o n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 M a t r o i d a l G r a p h s . . . . . . . . . . . . . . . . . . . . . . . . . 11.2.1 11.2.2
271 272
Forbidden Configurations . . . . . . . . . . . . . . . . . P4-vertices . . . . . . . . . . . . . . . . . . . . . . . . .
272 274
11.2.3 2 K 2 - v e r t i c e s a n d C4-vertices . . . . . . . . . . . . . . . 11.2.4 T h r e s h o l d Vertices . . . . . . . . . . . . . . . . . . . .
282 284
11.2.5
292
P r o p e r t i e s of M a t r o i d a l G r a p h s
.............
xii
Contents 11.3 Matrogenic Graphs . . . . . . . . . . . . . . . . . . . . . . . . 11.4 Matrogenic Sequences . . . . . . . . . . . . . . . . . . . . . .
12 Domishold Graphs 12.1 12.2 12.3 12.4
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . Notation and Main Results . . . . . . . . . . . . . . . . . . . . Equidominating Graphs . . . . . . . . . . . . . . . . . . . . . Pseudodomishold Graphs . . . . . . . . . . . . . . . . . . . . .
13 The D e c o m p o s i t i o n M e t h o d 13.1 13.2 13.3 13.4 13.5
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Canonical Decomposition . . . . . . . . . . . . . . . . . . Domishold Graphs and Decomposition . . . . . . . . . . . . . Box-Threshold Graphs and Decomposition . . . . . . . . . . . Matroidal and Matrogenic Graphs and Decomposition . . . . .
296 303
313 313 313 320 323
327 327 328 335 341 348
14 Pseudothreshold and Equistable Graphs 14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.2 Pseudothreshold Graphs . . . . . . . . . . . . . . . . . . . . . 14.3 Equistable Graphs . . . . . . . . . . . . . . . . . . . . . . . . 14.3.1 Strongly Equistable Graphs . . . . . . . . . . . . . . . 14.3.2 Some Strongly Equistable Perfect Graphs . . . . . . . . 14.3.3 Pseudothreshold and Outerplanar Graphs . . . . . . . 14.3.4 Equistability, Strong Equistability, and Substitution . . . . . . . . . . . . . . . . . . . . .
351
15 T h r e s h o l d W e i g h t s a n d M e a s u r e s 15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15.2 Threshold Weights . . . . . . . . . . . . . . . . . . . . . . . . 15.3 Threshold Measures . . . . . . . . . . . . . . . . . . . . . . . . 15.4 Threshold and Majorization Gaps . . . . . . . . . . . . . . . . 15.4.1 The Threshold Gap . . . . . . . . . . . . . . . . . . . . 15.4.2 The Majorization Gap . . . . . . . . . . . . . . . . . .
375 375 376 386 401 403 409
16 Threshold Graphs and Order Relations 16.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.2 Biorders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.3 Bidimensions . . . . . . . . . . . . . . . . . . . . . . . . . . .
435 435 437 444
351 351 356 357 359 363 370
Contents
xiii
16.4 Relations of Bidimension 2 . . . . . . . . . . . . . . . . . . . . 16.5 Multiple Semiorders . . . . . . . . . . . . . . . . . . . . . . . .
17 E n u m e r a t i o n 17.1 I n t r o d u c t i o n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17.2 E n u m e r a t i o n of Threshold Graphs . . . . . . . . . . . . . . . . 17.3 E n u m e r a t i o n of Difference Graphs . . . . . . . . . . . . . . . .
455 460
467 467 468 477
18 E x t r e m a l P r o b l e m s 483 18.1 I n t r o d u c t i o n . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 18.2 Large Interval and Threshold Subgraphs of Dense Graphs . . . 484 18.3 Maximizing the Sum of Squares of Degrees . . . . . . . . . . . 488 19 O t h e r E x t e n s i o n s 19.1 I n t r o d u c t i o n . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.2 G e o m e t r i c E m b e d d i n g s of Graphs . . . . . . . . . . . . . . . . 19.3 Tolerance Intersection Graphs . . . . . . . . . . . . . . . . . . 19.4 Universal Threshold Graphs . . . . . . . . . . . . . . . . . . .
497 . 497 498 505 509
Bibliography
513
List of N o t a t i o n s
528
Author
530
Index
Index
533
This Page Intentionally Left Blank
Basic Terminology We present here the basic terminology and notations used t h r o u g h o u t the book. Additional definitions and notations are introduced in the book as needed. For sets A and B, A C_ B indicates t h a t A is a subset of B, whereas A C B indicates t h a t A is a proper subset of B. Let C be a collection of sets. A set A C C is maximum if I A I _ IBI for all B G C and minimum if IAI _ IBI for all B C C. The collection C is nested if for every two sets in C, one is a subset of the other.
a poset (partially ordered set) is a pair (P, _>), where P is a set and _> is a reflexive, a n t i s y m m e t r i c and transitive relation on P. If x _> Y and x -r y hold, we write x > Y. If x >_ Y or y >_ x, x and y are comparable. Otherwise, x and y are incomparable, and we denote this condition by x I] Y- A poset with no i n c o m p a r a b l e elements is said to be total. A chain is a set of m u t u a l l y c o m p a r a b l e elements, and an antichain is a set of m u t u a l l y i n c o m p a r a b l e elements. T h e Dilworth Theorem states t h a t the largest cardinality of an antichain equals the smallest cardinality of a set of chains partitioning P. An element x is maximal if there is no element Y such t h a t y > x. Similarly, x is minimal if there is no element Y such t h a t x > Y. An element x covers an e l e m e n t y i f x > y and there is no z such t h a t x > z > y. T h e Hasse diagram of a finite poset is a drawing where each element is represented by a point, and if x covers y, x is drawn above y and is joined to it by a line. a preorder is a pair (P, > ) , where P is a set and > is a reflexive, transitive relation on P. I f x > y and Y > x, we denote this condition b y x ~ y. If x > Y and y ~ x, we denote this condition by x > y. T h e terms comparable, incomparable, total, chain, antichain, and m a x i m a l and minimal element are defined for preorders as for posets, and the Dilworth T h e o r e m carries through. T h e set of real numbers is denoted by N, and we put R + - {x C R " x >
Basic Terminology
O} and R + - {x E 1 R ' x _> 0}. For a real-valued function f, we use the notation f(S) - E f(s).
sES
A function f 9 {0,1} n + {0,1} is called a Boolean function. a l , . . . , a , and t, the Boolean function f defined by
For reals
n
f ( x l , . . . ,Xn) -- 0 ~
E aixi ~ t i=1
is called a threshold function. The support of a vector ( X l , . . . , X n ) is the set {i 9 x~ r 0}. If S C_ { a l , . . . , a n } , then the characteristic vector of S is the vector ( X l , . . . , X n ) given by 1, if ai E S xi -0, otherwise. For a real x, [xJ denotes the largest integer i < x and Ix 1 denotes the smallest integer i > x. A graph G is an ordered pair (V, E), where V - V(G) is a set of elements called vertices, E - E(G) is a set of elements called edges, and each edge is an unordered pair of vertices (its ends or end-vertices or end-points). If the two ends are the same, then the edge is called a loop. Note that we do not allow parallel edges, i.e., all edges are distinct. The graph is said to be finite if V is a finite set. Unless otherwise indicated, all graphs considered from now on are finite and loopless. A graph with n vertices and e edges is referred to as an (n, e)-graph. An edge with ends a, b is denoted by ab. Two vertices a and b are adjacent (or neighbors) if ab is an edge, and non-adjacent (or non-neighbors) otherwise. In the latter case, ab is a nonedge. If a vertex is an end of an edge, then they are incident. Two edges are adjacent if they share a c o m m o n end. The adjacency matrix (aij) of a graph is defined by 1, if the i-th and j - t h vertices are adjacent
a i j - { O, otherwise.
Similarly, the edge-vertex incidence matrix (bij) is defined by 1, if the i-th edge and j - t h vertex are incident
b i j - { O, otherwise.
Basic Terminology
3
The neighborhood Na(v) of a vertex v in a graph G is the set of all neighbors of v, and its closed neighborhood is Na[v] - Na(v)U {v}. When G is understood, we omit the subscript G. For subsets A and B of V,
NA(v) - N(v) n A,
U NA(v). vEB
Similarly, N(v) denotes the set of all non-neighbors of v, and NA(V) -- N(v)N A. A vertex is isolated if its neighborhood is empty, and is dominating if its closed neighborhood is the entire set of vertices. We define a binary relation on V by a ~ b z---->,N[a] ~ N(b). This relation is a preorder and is called the vicinal preorder of G. A graph H - ( W , F ) i s a subgraph of G - (V,E) if W C_ V and F C_ E. We then say that G contains H. If W - V, then H is a spanning subgraph of G. If F is the set of all edges in E with both ends in W, then H is the subgraph of G induced by W, and is denoted by G[W]. The set of edges of G[W] is denoted by E(W). Similarly, if W is the set of all ends of edges in F, then H is the subgraph induced by F. Also, G - W - G[V - W] and
G-F-(V,E-F). Two graphs G1 - (V1,E1) and G2 - (V2, E2) are iso?rtoFphic if there is a bijection f 9 V1 --+ V2 such that for all a, b C V1 we have ab C E1 " ;" f(a)f(b) C E2; in other words, G1 and G2 are two labelings of the same graph. We denote this condition by G1 " G2. A property of graphs that is preserved under isomorphism is called a graph property. A graph property P is hereditary if, whenever a graph has property P, all its induced subgraphs also have property P. The degree of a vertex v is deg(v) - IN(v)[. The degree sequence of a graph with vertices V l , . . . , v~ is d - ( d e g ( v l ) , . . . , deg(vn)). Every graph with the degree sequence d is a realization of d. A degree sequence is unigraphic if all its realizations are isomorphic. It is strongly unigraphic if there is a unique graph (V,E) with V - { 1 , . . . , n } and deg(i) - di for all i. A graph is a unigraph if its degree sequence is unigraphic. A strong unigraph is defined similarly. For a graph property P, a degree sequence is potentially P-graphic if it has a realization with property P, and forcibly P-graphic if all its realizations have property P. The degree of an edge is the unordered pair of degrees of its ends. The terms edge-degree sequence, edge-unigraph etc. are defined similarly. For more information on degree sequences, see [TCC88a, TCC88b, TCC89, RaoSl].
4
Basic Terminology
The complement of a graph G - (V,E) is the graph G - (V,F) such that ab E F ~ ab ~ E for each pair a, b of distinct vertices. The graph G - (V, E) is edgeless if E - O. The complement of an edgeless graph is a complete graph. A subset W of V is a stable set (or an independent set) if G[W] is an edgeless graph, and is a clique if G[W] is a complete graph. A k-clique is a clique of size k. A proper coloring (or simply a coloring) of G is a partition of V into stable sets, called color classes. A clique partition of G is a partition of V into cliques. The size a(G) of a m a x i m u m stable set is the stability number of G, the size a;(G) of a m a x i m u m clique is the clique number of G, the size )~(G) of a minimum coloring is the chromatic number of (7, and the size n(G) of a minimum clique partition is the clique cover number of G. A subset W of V is a vertex cover if V - W is a stable set. The size p(G) of a minimum vertex cover is the vertex cover number of G. A path P~ is a graph of the form (V,E), where V - { 1 , . . . , n } and E - {12, 2 3 , . . . , ( n - 1)n}. We say that P~ is a path joining 1 and n. For n >_ 3, a cycle C~ is a graph of the form (V,E), where V - { 1 , . . . , n } and E - { 1 2 , 2 3 , . . . , ( n - 1)n, nl}. a graph G is connected if for every two vertices a and b, G contains a path joining a and b; G is disconnected otherwise. A maximal connected subgraph of a graph (with respect to graph containment) is a connected component. A graph G is 2-connected if every two vertices belong to a cycle of G. A maximal 2-connected subgraph is a
block. A matching in a graph is a set of mutually non-adjacent edges. A vertex is saturated by a matching if it is an end of one of its edges, and is unsaturated (or missed) otherwise. A matching is perfect if it saturates every vertex of the graph.
A bipartite graph is a 2-colorable graph. We indicate a 2-coloring of a bipartite graph by (A, B; E), where A and B are the color classes and E is the set of edges. Hall's Theorem states that a bipartite graph (A, B; E) has a matching saturating every vertex of A if and only if every subset X of A satisfies IX[ <_ [N(X)[. The union of graphs G1 - (V1, ~1) and G2 - (1/2, E2) is the graph ~1 I._J G2 - (V1 U 1/2, E~ U E2). If V1 and 89 are disjoint, we call this a disjoint union. When V1 and 1/2 are disjoint, the join of G1 and G2 is the graph G1 @ G2 - (V1 U V2, E1 U E2 U E12), where El2 is the set of all unordered pairs consisting of a vertex of V1 and a vertex of 1/2. Let H be a fixed graph. A graph is H-free if it contains no induced subgraph isomorphic to H. The disjoint union of m copies of H is denoted by
Basic Terminology
5
rnH. A cycle C~ is also called an n-cycle, and its length is n. For n - 3, 4, 5, C~ is also called a triangle, a square, and a pentagon, respectively. The length of the path P~ is defined to be n - 1. The edgeless graph and the complete graph on n vertices are denoted by S~ and K~, respectively. The complete multipartite graph K m .....p. is Spl | ... | Sp.. A star is a graph of the form KI,~, and its center is the vertex of degree n; the center of K],I is exactly one of its two vertices. A graph of the form inK2 is also called a perfect matching. A tree is a connected graph containing no cycles. It is well-known that a tree with n vertices has n - 1 edges. A Hamiltonian cycle of a graph is a cycle containing all the vertices of the graph. A regular graph is a graph all of whose vertices have equal degrees. The distance between two vertices in a connected graph is the minimum length of a path joining them. The diameter of a connected graph is the largest distance between any two vertices. A hypergraph is a pair H - (V, E), where V is a set of elements called vertices, E is a set of elements called edges, and each edge is a subset of V. The hypergraph H is an r-hypergraph when each edge has cardinality r. The chromatic number x(H) of a hypergraph H is the least cardinal X~such that the vertices of H can be partitioned into X~ classes, each one containing no edge of H of cardinality 2 or more. a digraph (or directed graph) is a pair D - (V, A), where V is the set of elements called vertices and A C_ V x V is a set of ordered pairs called arcs. An arc of the form (a, a) is a loop at a. The tail of an arc (a, b) is a and its head is b, and we say that b is an out-neighbor of a and a is an in-neighbor of b. The out-neighborhood F+(v) of a vertex v is the set of all out-neighbors of v, and the in-neighborhood F - ( v ) is the set of all in-neighbors of v. The out-degree of a vertex v is IF+(v)i and the in-degree is IF-(v)l. A vertex is in-isolated if its in-neighborhood is empty, and is out-dominating if its out-neighborhood is the entire set of vertices. A source is a vertex with empty in-neighborhood and a sink is a vertex with empty out-neighborhood. The term subdigraph is defined similarly to subgraph. A directed path is a digraph of the form (V,A), where V - { 1 , . . . , n } and A - {(1,2), ( 2 , 3 ) , . . . , (n - 1, n)}. For other terms in graph theory, see IBM76]. For standard terminology and results on linear programming, see [Chv83, SW70]. For standard treatment of complexity theory, see [GJ78].
Chapter 1 Threshold Graphs 1.1
Motivation
T h r e s h o l d g r a p h s play an important role in graph theory as well as in several applied areas such as psychology, computer science, scheduling theory, etc. In fact, these graphs were discovered independently and reported in different journals by people working in different areas. Either these graphs, or a close kin of these graphs, the difference graphs, have been used implicitly in several other articles. Most properties of threshold graphs can be easily translated to properties of difference graphs and vice versa. Chvs and Hammer [CH73, CH77] coined the name "threshold graphs" and studied these graphs for their application in set-packing problems. About the same time Henderson and Zalcstein [HZ77] discovered the same graphs and called them P V - c h u n k definable graphs. Their discovery is motivated by applications in parallel processing. More specifically they found that these graphs can be used to control the flow of information between processors, much like the traffic lights used in controlling the flow of traffic. Ordman lOrd85] found other uses for these graphs in resource allocation problems. Ecker and Zaks [EZ77] discovered these graphs independently and investigated them for their use in graph labeling as applied to open shop scheduling. Koop [Koo86] studied cyclic scheduling and manpower allocation and found that the problem can be modeled using threshold graphs and threshold hypergraphs. Doignon et al. [DDF84] investigated a special kind of order relations called biorders, that were used in the study of learning behaviors of children. These biorders, it turns out, are simply the difference
8
Threshold Graphs
graphs. Several results of these authors were discovered independently by others in graph theory. Yannakakis [Yan82] proved in 1982 an important result in complexity theory, namely that recognizing whether or not a given poset has dimension at most three is NP-complete. At the center of his proof was the class of graphs that he called chain graphs, which are nothing but difference graphs. Cogis [Cog82a] has studied the so-called F e r r e r s d i g r a p h s , which are essentially the difference graphs. Perhaps the earliest use of threshold graphs is in graph theory itself, namely in the study of degree sequences of graphs. Koren [Kor73] studied those degree sequences that are not convex combinations of other degree sequences; others have studied graphs whose degree sequences "majorize" the degree sequences of all other graphs. In both cases it turns out that the corresponding graphs are precisely the threshold graphs. All these examples show that threshold graphs have been used in various fields with different applications. We bring together the works of all these people and present a unified approach to their methods. We describe most of the applications of threshold graphs and their generalizations that are known. This book should be of interest to people from many different fields such as mathematical psychology, graph theory, parallel processing, resource allocations, scheduling theory, etc. We will not be surprised if new applications were discovered for these graphs, since they possess a rich and interesting structure. Several people worked on different generalizations and variations of threshold graphs. Most of these generalizations have their own applications as well. Almost 100 different articles have been written on topics related to threshold graphs in a relatively short period of time. This book brings together several important results related to threshold graphs that were scattered in various journals specializing in different disciplines.
1.2
Basic Characterizations
This chapter defines the threshold graphs and presents their basic properties. Threshold graphs have been defined by Chvs and Hammer [CH73, CH77] as follows.
Definition 1.2.1 A graph G - (V, E) is called a t h r e s h o l d g r a p h when there exist non-negative reals w., v E V and t such that w(U) <_ t
if and only if
U is a stable set
U C_ V,
(1.1)
1.2
Basic Characterizations
where w(U) = E~ev
~.
To paraphrase this definition, G is a threshold graph whenever one can assign vertex-weights such that a set of vertices is stable if and only if its total weight does not exceed a certain threshold (t). Yet another interpretation is that G is a threshold graph if and only if some hyperplane, called a separator, strictly separates the characteristic vectors of the stable sets of G from the characteristic vectors of the non-stable sets. In other words, the Boolean function that selects the stable sets of vertices is a threshold function [Mur79]. Figure 1.1 illustrates a threshold graph along with appropriate vertex-weights and threshold. Figure 1.1: A threshold graph with vertex-weights and threshold. 2
1~,
5
4
t-5
2 The following definitions are used in describing the structure of threshold graphs. D e f i n i t i o n 1.2.2 An a l t e r n a t i n g 4-cycle of a graph G = (V, E) is a configuration consisting of distinct vertices a, b, c, d such that ab, cd E E and ac, bd ~ E. By considering the presence or absence of edges ad and bc, we see that the vertices of an alternating ~-cycle induce a path P4, a square C4, or a matching 2K2. See Figure 1.2 In order to characterize threshold graphs, we introduce a partition of the vertices of any graph by their degrees as follows. D e f i n i t i o n 1.2.3 Let G = (V, E) be a graph whose distinct positive vertexdegrees are 51 < " " < 5m, and let 50 = 0 (even if no vertex of degree 0 ~xi~t~), ~m§ = I v L - 1. L~t D~ = {~ e V . deg(~)= ~ } fo~ i = 0 , . . . , ~ . The sequence D o , . . . , Dm is called the d e g r e e p a r t i t i o n of G.
10
Threshold Graphs
Figure 1.2: An alternating 4-cycle and the possible subgraphs it induces. A solid line indicates a present edge and a dashed line a missing edge.
a
d \
/ \
/ \
/ X
/
\
/
\
/
\
b
w
c
w
P4
C4
2K2
The basic characterizations of threshold graphs are given by the following theorem.
Theorem 1.2.4 ([CH73, CH77, EZ77, Gol80, HZ77]) For a graph G -
(V, E ) ,
the following are equivalent:
1. G is a threshold graph; 2. G does not have an alternating 4-cycle; 3. G is a split graph G ( K , S ) (i.e., its vertices can be partitioned into a clique K and a stable set S) and the neighborhoods of the vertices of S are nested; ~. G can be constructed from the one-vertex graph by repeatedly adding an isolated vertex or a dominating vertex; 5. the vicinal preorder of G is total;
1.2
Basic C h a r a c t e r i z a t i o n s
11
6. for each v E Dk, k
N(v)
-
U Dm+I_j
k-l,...,L~j
(1.2)
]C- [~J + 1 , . . . , m,
(1.3)
j=l k
N[v]
--
U DmTl-j j=l
in other words, for x E Di and y E Dj, x is adjacent to y if and only if i + j > m; Figure 1.3 illustrates this with r n - 6 and m - 7; ~igure 1.3" Illustrating the degree partition of two threshold graphs. A line between Di md Dj indicates that every vertex of Di is adjacent to every vertex of Dj. An oval ndicates that the included vertices form a clique.
m-6
m-7
.
~k+l -- (~k "-~ ] D m - k l
k-0,...,rn,
k# L~J;
(1.4)
8. there exist non-negative reals w , , v E V and t such that for distinct vertices u and v, w~ + w~ > t
if and only if
uvEE.
(1.5)
12
Threshold Graphs
Proof. 1) =~ 2): If G has an alternating 4-cycle a, b, c, d with ab, cd E E and ad, bc ~ E, then Wa + Wb > t
Wa + Wd <__t
W~ + Wd > t
Wb + W~ <__t.
These inequalities are clearly inconsistent. 2) =~ 3): Let K be a largest clique in G. If V - K contained an edge ab, then by the maximality of IKI, there exist distinct vertices c, d in K with ad, bc ~ E, creating an alternating 4-cycle on a, b, c, d, a contradiction. Thus S = V - K is a stable set and G ( K , S) is a split graph. Moreover, every two vertices of S are comparable, for otherwise there is an alternating 4-cycle. 3) =, 4): It is enough to show that G has an isolated vertex or a dominating vertex, for if such a vertex is removed, the remaining graph still satisfies Condition 3. We may then assume that S -~ 0. If G has no isolated vertex in S, then the vertex u E S with the smallest neighborhood has some neighbor v E K. Then v is a dominating vertex of G. 4) =v 1): We show by induction on the number of vertices that we can assign positive integer vertex-weights satisfying (1.1). For the one-vertex graph, let the vertex-weight and t be 1. If a graph has this property and we add a dominating vertex v, then assign v the weight t and leave the other weights and t unchanged. If a graph has this property and we add an isolated vertex v, then double the old vertex-weights, replace t by 2t + 1, and assign v the weight 1. 2) =v 5): If G has two non-comparable vertices a and d, then a has neighbor b that is not a neighbor of d, and d has a neighbor c that is not a neighbor of a, and thus there is an alternating 4-cycle a, b, c, d, contradicting Condition 2. 5) => 6): If m = 1, then D1 is a clique and Equation (1.3) is satisfied. So assume m > 1. From Condition 5 it follows that two vertices are equivalent in the vicinal preorder if and only if they are in the same set Dj. Choose representatives xj E Dj, j = 1 , . . . , m. Then X 1 ~
.."
-'~ X m .
(1.7)
It follows from (1.6) and (1.7) that X 1 is adjacent to x.~ and therefore D.~ C_ N ( x l ) and also N[xm] = D1 U . . . U D ~ and N[D~] = D1 U . . . U Din.
1.2
Basic Characterizations
13
It then follows t h a t N ( X l ) = Dm, since if Xl were adjacent to x i for some j < rn, then N[xi] would also equal to D1 U -.. U Dm and x/ would have to belong to Din, a contradiction. From this we obtain N(D1) = Din. If rn = 2 we are done. So assume rn > 2. It now follows from (1.6) and (1.7) t h a t x2 is adjacent to xm-1 and therefore Dm U Din_ 1 C N ( D 2 ) . Thus N [ D m _ I ] z D2 U . . . U D m and hence N(D2) = D~ U Din_ 1. Proceeding like this we establish Condition 6. 6) => 7): The result follows from (1.2)if k < [~J and f r o m ( 1 . 3 ) i f k > [~J. 7) => 6): From (1.4) with k - m and the value of 5m+l we have that - I D 0 1 = IDII + .-. + I D m l - 1. Since Do is the set of isolated vertices, Equation (1.3) holds for k = m. If m = 1 we are done, so assume t h a t m > 1. From (1.4) with k = 0 and the value of 50 w e have t h a t (51 --- IDm I and now E q u a t i o n (1.2) holds for k = 1. If m = 2 we are done, so assume rn > 2. Now from (1.4) with k = m - 1 w e h&ve (5m_1 = IDol + -.- + IDm[-1. Since N ( D 1 ) = Din, Equation (1.3) holds for k = r n - 1 and hence by (1.4) with k = 1 Equation (1.2) holds for k = 2. Proceeding like this we establish Condition 6. 6) ~ 8): Assign the weight j to every vertex of Dj for j = 0 , . . . , rn and let t=rn. 8) => 2): The proof is the same as 1) => 2). ,, We note that Condition 7 of the theorem does not refer to the case k = [~J. However, it follows easily from Condition 6 that =
(Sk+l -- (Sk - } - I D ~ - ~ I -
1
for
k-
Lind.
(1.8)
Exercises 1. Let d -
(dl >_ " " _> d~) be a degree sequence, and define ei-max{j'dj
>_ i }
f - max{j'dj
i-1,...,n >_ j }.
Prove t h a t d is a degree sequence of a threshold graph if and only if ei = eli-k 1 for i = 1 , . . . , f . 2. Show t h a t if eLgraph G has exactly one pair of vertices with equal degrees, then G is a threshold graph and the equal degrees are equal to both f and d / o f Exercise 1 (Ruch and Gutman[RG79]).
14
1.3
Threshold Graphs
Minimizing Integral Weights
Although we defined in Section 1.2 a threshold graph G = (V, E) as a graph having a separator with non-negative real coefficients, it is clear that we could equivalently require the separator to have non-negative integral coefficients. In that case, the vertex-weights w satisfy
w(U)
<_ t
w(U)
>_ t + 1
U c_ V stable,
(1.9)
U C_ V non-stable.
(1.10)
Orlin [Or177] proved the surprising result that for every threshold graph, if we minimize t subject only to the inequalities (1.9), (1.10) and w _> 0, then the optimum solution (w, t) is unique and integral. Moreover, it minimizes each individual w(vj) at the same time. T h e o r e m 1.3.1 (Orlin) Let G - (V, E) be a threshold graph with the vicinal preorder V 1 ~ " ' ' ~ V n o f its vertices. Consider the linear program
minimize t subject to (1.9), (1.10), w >_ O.
(1.11)
The optimum solution (w,t) of (1.11) is unique and integral, and also minimizes each w(vj). It is given by the following computation. Let s be the smallest index j such that vjvj+l C E. If no such index exists, set s - n. Then f
o,
w(vj)
_
t
-
Ei<
w(vj)
-
t + 1 - w(vf(j))
1 + gv,-~v, w(vi),
vj isolated otherwise
J <- s
(1.12) j>s,
where f ( j ) is the smallest i satisfying vivj C E. An example of the optimum solution was shown in Figure 1.1. P r o o f . We show that the constraints of the linear program (1.11) impose lower bounds on t and each w(vj), and that (1.12) gives a feasible solution that meets all these bounds, hence in particular it is an optimal solution. We note first that by definition of s and by the vicinal preorder, the set S = {Vl,...,v~} is stable and its complement K = {V~+I,...,Vn} is a clique. The setting w(vj) = 0 for isolated vj meets the lower bound of 0 imposed
1.3
Minimizing Integral Weights
15
by non-negativity in (1.11). It also follows from the vicinal preorder that each non-isolated vertex vj C S has a neighbor v E K such that vvi ~ E for all v~ -~ vj. It then follows from (1.9) and (1.10) that w ( v ) + w(vj) > t + 1 whereas w(v)+~,~.~, w(vi) <_ t. Therefore the constraints of (1.11) imply the lower bound w(vj) >_ 1 + 2~,-~, w(v~), and this lower bound is met by (1.12). Further, since S is stable, (1.9)imposes the lower bound t _> ~ < ~ w(v~), which is also met by (1.12). Again, for vj C K, (1.10) imposes the lower bound w(vj) >_ t + 1 - w(vf(j)), which is met by (1.12) (note that vf(j) C S). To see that (1.12) gives a feasible solution, note first that it satisfies 0 _< W(Vl) _< -.. _< w(v~). Every edge of G has at least one endpoint inK. For each vj C K, since w(vj) + w(vf(j)) - t + 1, it follows that w(vj) + w(v) >_ t + 1 for every neighbor v of vj. Thus (1.10) is satisfied. To verify (1.9), it is enough to consider the maximal stable sets. G has exactly n - s + 1 maximal stable sets, namely S, which satisfies (1.9) with equality, and the sets {vj, v ~ , . . . , vf(j)_~} for j > s. Since vf(j) ~- vf(j)-l, each of the other maximal stable sets also satisfies (1.9) with equality. Finally, we show the uniqueness of the optimum (1.12). Denote by (w, t) the optimal solution given by (1.12) and let (w', t) be any optimal solution. Then w _< w' as we have shown. Therefore, since S is stable, (1.9) on (w', t) implies B
<
< t,
which in turn implies that w' agrees with w on S. A similar argument involving the set {vj, V l , . . . , vf(j)_l} for j > s shows that w' agrees with w on K. 9 A variation of (1.12) is given by the following result of Ordman [Ord85] (see also Henderson and Zalcstein [HZ77])" T h e o r e m 1.3.2 For a threshold graph with a degree partition D o , . . . , Din, the optimal weights and threshold of Theorem 1.3.1 can be computed as follOWS"
w(v) - wy for each v C Dj
j - O,...,rn,
(1.13)
where the w j , j < [~] satisfy the recurrence
wi
-
o
(1.14)
-
1 + ~lD~lwi i<j
1 < j < [~]
(1.15)
+
,.~.
,_.
<
o
..
~
oo
;__,
"~-
~
9
OO ~ I
F--,s
~bl
+
~
~
+
.
~ +
~ ~"
~
~
~:~ .,.--' ~
~7',;
+
~
~
o
+
i,o
9 ~ ~
cn
9
.
II
+
~1~
..-.. +
,.., ~,,,~ A
II
+
+
0
"-"
~.
~~
~.~
~
m ~
~.
~
~
.
~
~-~
9 ~. ~ - , ~~
~
o
~'~ ' - ' ~
~ ~ ~
..
~
~ •
"~~ ~
~~.~
~~~"
~.~
~
~'~-'~
~'~~o~~~
~
~
"
i
9
~ ),, , , ~
~
o
0
X
r~
q-"~
~
B
~~
(T~
~ ' ~
~
~
0
~
~
oo-.~-
~
~8 o ~.~~
~.~~o.~
~c n"
~~
IA
IA
_-,
+
"~"
+
II
I
4-
tm
r
I
4-
II
L__._
II ,~.~.
~" IA "-"-' ~1~
. . . .
+
,, I n n ,
~.,
~~,~.
~
~
"t
t'b
IA
4-~ IA ~ .
I
~
+
II r----"
],
~1~
~j
-t-
~.
II
~.~
v
e,~
o
1.4
Perfect Graphs and Algorithms
17
and for m odd,
E ID~lw~+
l+t-l+
WF~] -
~<-L~J ID~iw~+ 1 -i- ~ ID~lw~~
1 -I- ~
1.4 1.4.1
L~J 2
II
(1 -I-ID~l).
i=1
Perfect Graphs and Algorithms Perfect Graphs
Recall that a stable set is a set of pairwise nonadjacent vertices and a clique is a set of pairwise adjacent vertices. The stability number c~(G) of a graph G is the size of a largest stable set in G and the clique number aJ(G) is the size of a largest clique in G. A coloring is a partition of the vertex set into stable sets. The chromatic number x(G) is the minimum size of a coloring and the clique cover number to(G) is the minimum size of a partition of the vertex set into cliques. Clearly for every graph G, c~(G) - w(G) _< x~(G), a graph G is called perfect if every induced subgraph G' of G satisfies ~(G') - ~(G').
Claude Berge [Ber61] made two conjectures on perfect graphs. The first conjecture, now called the Perfect Graph T h e o r e m , states that a graph is perfect if and only if its complement is perfect. This result was proven by Lovgsz [Lov72]. The second conjecture, now called the Perfect Graph Conjecture, states that a graph is perfect if and only if it contains neither induced odd cycles of length five or more nor their complements. Several classes of graphs are known to be perfect graphs. For an introduction to perfect graphs one should refer to [Go180]. A recent survey of various classes of perfect graphs can be found in [Bra91]. Recent results on perfect graphs can be found in [GLS82, BC84]. We define some of the important classes of perfect graphs below.
Definition 1.4.1 1. A graph is called a triangulated graph if it contains no induced cycle of size four or more.
18
Threshold Graphs 2. A graph G = (V, E) is called an interval g r a p h if each vertex x C V can be assigned an interval i(x) such that xy e E ~ i ( x ) N i ( y ) 7L 0 . 3. A graph is called a c o m p a r a b i l i t y g r a p h if its edges can be transitively oriented 5.e., whenever (x,y), (y,z) are directed arcs, so is ( x , z ) . ) The complement of a comparability graph is called a co c o m p a r a b i l i t y g r a p h . C o t r i a n g u l a t e d and cointerval graphs are defined similarly. ~. A graph G with vertex set V = {1, 2 , . . . , n} is called a p e r m u t a t i o n g r a p h if there exists a permutation 7c of V such that ij is an edge in G if and only if (i,j) is an inversion of 7c 5.e., ( i - j ) ( T v i - 7rj) < 0).
For a good introduction to various results on triangulated, interval, comparability and permutation graphs one should refer to Golumbic [GolS0]. For instance, one can find there the following results: 9 A graph G is an interval graph if and only if G is triangulated and G is a comparability graph. 9 A graph G is a permutati.on graph if and only if both G and G are comparability graphs [PLE71]. From Condition 2 of Theorem 1.2.4 it follows that threshold graphs are triangulated. In addition, threshold graphs are also comparability graphs since by Condition 5 of Theorem 1.2.4 the acyclic orientation in which (x, y) is an arc only if x ~- y is a transitive orientation. As the complement of a threshold graph is also a threshold graph, it follows that threshold graphs are permutation graphs as well as interval graphs. Golumbic [GolS0] characterized the permutations associated with threshold graphs. It is possible to show that the threshold graphs can be represented as interval graphs using intervals of only two lengths (Exercise). If a graph can be represented as an interval graph using intervals of a single length, then it is called a unit interval graph. The complete bipartite graph K1,3 (claw) is a threshold graph but not a unit interval graph. Given a subclass of perfect graphs, one seeks to find polynomial-time algorithms for 1) recognizing the class of graphs, and for any given graph in the class, 2) finding a maximum stable set, 3) finding a maximum clique, 4) finding a minimum coloring and 5) finding a minimum cover by cliques. There are polynomial-time algorithms for problems 2) to 5) for the entire class of perfect graphs using the ellipsoid method [GLS82]. However, one is
1.5
Threshold and Split Completions
19
still interested in finding combinatorial-type algorithms for all the five problems for various subclasses of perfect graphs. For the four classes of perfect graphs mentioned above, all the five problems can be solved in polynomial time [Go180]. It follows that problems 2) to 5) can be solved in polynomial time for threshold graphs as well. We give below direct algorithms for the first four problems for the class of threshold graphs. It is a simple e x e r c i s e to modify the algorithm to solve the fifth problem as well.
1.4.2
Algorithms
We use Condition 4 of Theorem 1.2.4 to obtain a linear-time algorithm for recognizing a threshold graph. The algorithm removes recursively any isolated or dominating vertex that exists in the current graph. The resulting graph is the empty graph if and only if the original graph is a threshold graph. By keeping track of the type of each vertex that is removed, one can construct simultaneously a maximum stable set, a maximum clique, a minimum coloring and a minimum cover by cliques. See Figure 1.4 for the algorithm. Other algorithmic problems such as Hamiltonicity, total matchings and total coverings are discussed in Sections 1.6 and 1.7. When each vertex is assigned a positive integral weight, the problems of finding a stable set with largest weight and a clique with largest weight can both be solved in polynomial time for threshold graphs. For instance one can adopt the algorithm for finding a maximum weighted clique in comparability graphs (see [Go180]) for solving these two problems on threshold graphs. A simpler way is to examine the vertices in reverse order to the order in which the algorithm removes them. Each vertex is either isolated or dominating in the graph induced by the vertices examined so far, and so can either be added to the best known stable set or replace it, and a single comparison tells which alternative is better.
1.5
T h r e s h o l d and Split C o m p l e t i o n s
Consider the following problem: given a graph G, a spanning subgraph H, and a graph property P, is there a spanning subgraph T satisfying property P and such that
E(H) c_E(T)c E(a)?
20
Threshold Graphs
Figure 1.4: A linear-time algorithm to recognize and color threshold graphs. { I n p u t : The number n of vertices and the vertex degrees in ascending order as deg(1) < d e g ( 2 ) < .-. < deg(n).} {Ini t ializat ion } IsolateDegree := 0; {original degree of the next isolated vertex} DominateDegree := n - 1; {original degree of the next dominating vertex} SmallDegIndex := 1; {smallest index of an unprocessed vertex} LargeDegIndex := n; {largest index of an unprocessed vertex} I := ~; {largest stable set} K := O; {largest clique} c := 1; {color to be assigned to next vertex} B e g i n { Main}; R e p e a t n - 1 times begin if IsolateDegree - deg(SmallDegIndex) t h e n begin I := I to {SmallDegIndex}; C(SmallDegIndex) := c; DominateDegree := D o m i n a t e D e g r e e - 1; SmallDegIndex := SmallDegIndex + 1 end else if D o m i n a t e D e g r e e - deg(LargeDegIndex) t h e n begin K := K tO {LargeDegIndex}; C(LargeDegIndex) := c; c:=c+l; IsolateDegree := IsolateDegree + 1; LargeDegIndex := L a r g e D e g I n d e x - 1 end else STOP {Not threshold} end; {At this point SmallDegIndex = LargeDegIndex.} I := I tO {SmallDegIndex}; K := K t3 {LargeDegIndex}; C(LargeDegIndex) := c e n d . {The given graph is threshold, I is a maximum stable set, K is a maximum clique, C is a minimum coloring.}
1.5
Threshold and Split Completions
21
This problem is called the P g r a p h s a n d w i c h p r o b l e m , and T is called a P c o m p l e t i o n of H in G. Many graph sandwich problems are treated by Golumbic et al. [GKS94]. An O(na)-time algorithm for the threshold sandwich problem was given by Hammer et al. [HIPS1]. Here we give a linear time algorithms for the threshold and split sandwich problems based on [GKS94]. Put H - ( V , M) (mandatory edges)and G - (V, F ) ( f o r b i d d e n edges). A closed walk alternating between M and F is called an a l t e r n a t i n g cycle of H r e l a t i v e to G, abbreviated as ALTCa(H). It may contain repeated vertices and edges of M and F. Theorem
1 5.1
1. [HIP81] Let H be a spanning subgraph of G - (V, E) . Then H has a threshold completion in G if and only if there is no ALTCa(H). 2. [GKS9d, RS95] The threshold sandwich problem can be solved in time
o(IEI + IVi). P r o o f . Let T be any completion of H in G. Assume that C is an ALTCa(H) and consider the subgraph Tc of T induced by the vertices of C. Every vertex of C has an M-neighbor in C as well as an F-neighbor in C, so it is not isolated or dominating in Tc. Therefore Tc violates Condition 4 of Theorem 1.2.4 and cannot be a threshold graph. Therefore T is not a threshold graph, which proves the "only if" part of 1. To prove the "if" part, we notice that if there is no ALTCa(H), then H or G must have an isolated vertex (for otherwise we could grow a walk alternating between M and F without stopping until an ALTCa(H) is obtained). Let v be such a vertex, and let G' and H' be obtained from G and H respectively by deleting v. Since there is no ALTCa,(H'), H' has a threshold completion T' in G' by induction. If v is isolated in H, add it as an isolated vertex to T'; if it is isolated in G, add it as a dominating vertex to T'. In both cases the resulting graph T is a completion of H in G, and T is a threshold graph by Condition 4 of Theorem 1.2.4. The proof above gives an algorithm that either finds a threshold completion of H in G or detects an ALTCG(H). It can be implemented by maintaining the set S of vertices isolated in H or G, finding and deleting v C S, and updating the degrees of its neighbors in G or H, respectively, while entering them into S if they become eligible. The update takes O(dega(v)), and therefore the total work is O(]E] + ]VI). 9
22
Threshold Graphs
Theorem 1.5.2 ([GKS94]) time O(IMI+ IFI + IVl).
The split sandwich problem can be solved in
P r o o f . A split completion of H in G exists if and only if V can be partitioned into a set K which is stable in G and a set I which is stable in H. We use a Boolean variable Xv for each vertex v, where Xv - 1 indicates that v C K and Xv - 0 indicates that v E I. Each edge uv E M introduces the constraint x~ V x. - 1 and each edge uv G F introduces the constraint x~ V x---~- 1. The conjunction of these constraints is an instance of 2-satisfiability, which can be solved in time O(IMI + If[ + [VI) by the algorithm of aspvall et al. [APT79]. 9
1.6
Longest
Cycles and Hamiltonicity
For a given graph G, we consider the largest length (number of vertices or edges) of a cycle in G. Recall that if the length of a longest cycle equals the number of vertices, then the graph is called Hamiltouiau. It is well-known that finding the length of a longest cycle and recognizing a Hamiltonian graph are NP-complete problems [G J78]. Minty, as reported in Chvs and Hammer [CH77], Golumbic [Go180, Ex. 10.6], and Harary and Peled [HP87] have characterized Hamiltonian threshold graphs. In this section, based on [MP94], we show that the length of a longest cycle of a threshold graph G is equal to the size of a largest matching in a specially structured bipartite graph obtained from G. Moreover, because of the special structure, namely nested neighborhoods, this matching can be obtained in linear time. A longest cycle of G can also be constructed from the matching in linear time. The characterization also leads to a characterization of Hamiltonian threshold graphs. We use this characterization to prove Golumbic's characterization and sharpen Minty's. Definition 1.6.1 The LCL ( L a r g e s t Cycle L e n g t h ) of a graph G is the largest length of a cycle of G. We denote the LCL by 1. Recall Definition 1.2.3 of degree partition and Theorem 1.2.4 characterizing threshold graphs. It follows from (1.2), (1.3) that for a threshold graph G - (V, E), the set V is partitioned into a stable set s-
Do u ... u Z)k j
(1.21)
1.6
Longest Cycles and Hamiltonicity
23
and a clique K-
DL~]+x u ... U Din.
(1.22)
L e m m a 1.6.2 Every split graph G ( K , S ) possessing cycles has an 1-cycle
containing all of K . P r o o f . Let C be an/-cycle. If C has no vertices of S, then C must contain K, because K is a clique and C is a longest cycle. If C has a vertex s C S, let a, b be the vertices adjacent to s in C. Since S is stable, a, b C K. If C excludes some vertices of K, drop s and add all of them between a and b, to obtain a cycle at least as large as C hence another/-cycle containing all of K. 9 In the following we always assume that G is a threshold graph with degree partition D o , . . . , D i n as in Definition 1.2.3 and S , K as in Equations (1.21), (1.22).
Definition 1.6.3 A matching M of G from S into K is called special if either M - 0 or the following holds:
9 if m is odd, M misses some vertex x C Din; 9 i f m is even, M matches some vertex y E D a2 with some vertex x C Din. L e m m a 1.6.4 If M is a special matching of a threshold graph G, then G
has a cycle of length [K I + IMI, provided 1I(21+ IM[ is at least 3. P r o o f . The result is trivial if M - ~. So let IMI - k >_ 1. Let 8 1 , . . . , 8k be the vertices of S that are saturated by M, listed in non-decreasing degrees, so that N(s~) C_ . . . C N(sk). If m is even, we may assume that sk - y. The required cycle starts from Sl along the matching edge, proceeds to s2, then along the matching edge, and so on to sk. If m is odd, it proceeds from sk along the matching edge into K, visits the remaining vertices of K in any order ending at x, and returns to Sl. If m is even, then sk - y is adjacent to every vertex of K, so the cycle proceeds from y into K, visits the remaining vertices of K in any order ending with x, and returns to Sl (thus it does not use the matching edge yx if ]K] > k and k :/- 1). 9 L e m m a 1.6.5 If C is a cycle containing all of K, then there is a special matching of size I C I - ]K[, where [C I is the length of C.
24
Threshold Graphs
P r o o f . If IC[ = IK] then M = ~ is the required matching. Now assume that ICI > rKI. Orient the edges of C along the cycle. Let M be the set of edges of C oriented from S into It'. Then M is a matching of size I C I - IKI. If M is already special, we are done, so assume it is not. To complete the proof, we obtain a special matching M* with IM*I = IMI. Since M is not special, M saturates Dm if m is odd and M has no edges from D m to Dm if m is even. We now distinguish two cases. C a s e 1: All vertices of K are saturated by M. Then C must alternate between S and K. Further, m must be even (for otherwise the vertices of Dm§ 2 cannot be saturated by M), and M saturates some vertex y E D ~ (because the vertices of D~+I can only be matched to vertices of D ~ ) . Let x be any vertex of Din. Then there is a path P in C between y and x, whose edges are alternatingly in M and not in M, that begins and ends with edges of M. This P with the edge yx of G forms an alternating cycle A. Swapping matching and non-matching edges along A, we obtain the desired special matching M*. C a s e 2: Some vertex of K is not saturated by M. If all vertices of D,n are saturated, start from any vertex of Dm and travel along C against its orientation until an unsaturated vertex of K is reached, which must happen since C visits every vertex of K. This gives an even alternating path P beginning with a matching edge at Din. Now swap matching and non-matching edges along P to obtain a matching M' such that IM'I- IMI and M' misses some v e r t e x x E Din. I f m i s e v e n , p i c k a n y v e r t e x y E D ~ , add the e d g e y x to M ~, and drop either the matching edge at y, if y is saturated by M ~, or any other edge of M ~ if it is not. The resulting matching is the required special matching M*. .. 1.6.6 For a threshold graph G having cycles and with degree partition D o , . . . , D m , the LCL equals II '1+ IMI, ~ h ~ K - DL~j+ 1 u ... u D,~ and M is a largest special matching of G.
Theorem
P r o o f . This follows from Lemmas (1.6.2), (1.6.4), (1.6.5). .. To find a largest special matching in a threshold graph, drop any one vertex x E Din, and for even m drop any one vertex y E Din__. Then find 2 a largest matching in the remaining graph using only edges between S and K. If m is even, add to the matching the edge yx. Such a matching can be easily obtained by the following greedy algorithm: Arrange the vertices of S as S l , . . . , s~ with non-decreasing degrees; for i running from 1 to r, if si has
1.6
L o n g e s t Cycles a n d H a m i l t o n i c i t y
25
an unmatched neighbor ti, add the edge 8iti to the matching and increase i. Given the (unsorted) degree sequence of G, this can be implemented in time
o(Ivl). 1.6.1
Hamiltonicity
T h e o r e m 1.6.7 A threshold graph having the degree partition D o , . . . ,Din is Hamiltonian if and only if it has a special matching of size ISI, where S-D0U .--
UDL~j.
P r o o f . This follows directly from Theorem 1.6.6. 9 We now derive Golumbic's necessary and sufficient conditions for a threshold graph to be Hamiltonian. T h e o r e m 1.6.8 ([Go180]) Let G be a threshold graph having the degree partition D o , . . . , Din. Then G is Hamiltonian if and only if
1. D o = O ; 2.
k Ej=I IDjl
k
IDm-j+l I k - 1 , . . . , L~=~j; }-~m/2 then j = l IOjl ~-E;:} ]Dm-j+ll 9
< Ej=I
3. if rn is even,
P r o o f . By Theorem 1.6.7 and Hall's Theorem, G is Hamiltonian if and only 9 for m odd, VU C S,
INK-~(U)I > IUI, where
x is any vertex of Din;
9 for m even, VU C_ S - y, INK-~(U)I >_ IuI, where x is any vertex of Dm and y is any vertex of D ~2. Conditions 1,2,3 of the Theorem are special cases of Hall's conditions with U - Do U ... U Dk, k - 0 , . . . , [-~-~], and in addition for m even with U - Do U ... U Din__ - y. On the other hand these special cases imply the 2 full Hall's conditions by the nesting of neighborhoods (Equation (1.2)). 9 Chvs [Chv72] has given a sufficient condition for a general graph to be Hamiltonian" Let dl <_ ... <_ dn be the degrees of a graph G. Then G is Hamiltonian if n
dj <_ j < -~ ---v, dn_j >_ n - j.
(1.23)
The necessity of (1.23) in the case of threshold graphs has been proved by Minty as reported in Chvs and Hammer [CH77]. We sharpen this result as follows"
26
Threshold Graphs
T h e o r e m 1.6.9 Let dl <_ ... <_ dn be the degrees of a threshold graph G. Then G is Hamiltonian if and only if there is no j with dj <_ j < ~. P r o o f . Label the vertices as 1 , . . . , n so that vertex j has degree dj. " O n l y if"" Assume that, if possible, dj _< j < ~ and there exists a special matching of size IsI. C a s e 1: j C S. If rn is even and j = y, then NK(j) = K, hence d5 - [ K I (~)IXl >__j, where (,) follows from the existence of the special matching. Hence by the assumption dj _< j, we have dj - j - I K I - rsrcontradicting j < ~. Therefore rn is odd, or rn is even and j r y. Then we have (o) dj (*-) I N K ( { 1 , . . . , j } ) I - 1 + INK_~({1,...,j})I--> 1 + j , where (,) follows from the nesting property (Equation 1.2)), and (o) follows from the existence of the special matching. This contradicts the assumption dj _<j. Case 2" j C K. Then dj _> [{j + 1 , . . . , n } l - n j > ~, contradicting the assumption dj < j < ~. "If"" This part follows from Chv/~tal's general sufficiency condition (1.23), but the proof below does not use his result. Since no special matching of size IS[ exists, Hall's conditions are violated. Therefore there exists a subset U C_ S (y ~' U in case rn is even) such that < Iu[. Let j be the largest element of U. We may extend U to { 1 , . . . , j} because this does not change NK-x(U). Thus there exists an element j E S such that ]NK_~(j)I- [NK_~({1,..-,J})l < J,
(1.24)
and therefore dj ~_ j. Choose the smallest j satisfying (1.24). We now have (,) d j - 1 - I N K _ ~ ( j ) I >_ I N K _ ~ ( j - 1)1 >_ j -
1 _> d j - 1,
where (,) follows from the minimality of j. Therefore dj - j. It remains to show t h a t j < ~. I f j >_ ~ , t h e n dj >_ ~, and since IS] >_j, IKI >_ dj, and I S ' I + I K ] - n, we h a v e j - dj - ~ - I S ] II(]. Therefore NK(j) -- K_ and j is adjacent to x. By the minimality of j, there exists a matching of
1.7
Total Coverings and Total Matchings
27
{ 1 , . . . , j - 1} into K - x, which can be augmented by the edge j x to form a special matching, a contradiction. Therefore j < ~. 9 R e m a r k . The "only if" part of the above theorem can just as easily be proved using the existence of a Hamiltonian cycle and not the special matching. We conclude with the following result" 1.6.10 Let G be a graph with LCL 1 and with no induced P4 or C4. Then G has cycles of length 3 , . . . , l .
Theorem
P r o o f . If C is a cycle of length k + 1 > 4, consider four consecutive vertices a, b, c, d along C. Then either ac or bd is an edge of G, for otherwise G has a P4 or C4. Therefore by removing b or c from C, we obtain a cycle of length k. 9 In particular, Theorem 1.6.10 applies to threshold graphs by condition 2 of Theorem 1.2.4. Thus a Hamiltonian threshold graph G = (V, E) is also pancyclic (i.e., has cycles of all lengths 3 , . . . , IVI). We note that the graphs without induced P4 or 6'4 are studied by Golumbic [Go178] under the name "trivially perfect graphs".
1.7
Total Coverings and Total Matchings
In this section we define total coverings, total matchings and related parameters and determine these parameters for threshold graphs. All the members of V(G) U E(G) are called elements of G. A vertex v of G is said to cover itself, all edges incident to v, and all vertices adjacent to v. Similarly an edge e of G covers itself, the two end-vertices of e, and all edges adjacent to e. A set At C V U E is called a total cover of G if every element of (7 is covered by some element of At, and At is minimal. Following the notation of [ABLFN77], we call the number c~2(G) - min{ I A t l ' A t is a total cover of G } the total covering number of G, and the sets achieving the minimum are called minimum total covers. Two elements in G are called independent if neither one covers the other. A set Mt C V U E is called a total matching of G if the elements of Mt are pairwise independent, and Mt is maximal. The number ~2(G) - max{ I M t l ' M t is a total matching of G }
28
Threshold Graphs
is called the total matching number of G, and the sets achieving the m a x i m u m are called maximum total matchings. In addition, two other related numbers are defined: a~(G) - max{ I & l ' A t is a total cover of G }, /3;(G) - min{ IMt['Mt is a total matching of G }. ! l We determine a2(G), ~2(G), a2(G ),/32(G ), and related parameters for a threshold graph G.
1.7.1
Main Results
We start with some results about total coverings, complete graphs, and threshold graphs. F a c t 1.7.1 ( [ A B L F N 7 7 ] ) If G is a connected graph of order n > 2, then
1 <_ as(G) <_/3;(G) <_/32(G) <_ a'2(G ) <_ n - 1,
A general o p e n p r o b l e m is to characterize the graphs for which one of the above inequalities holds with equality. L e m m a 1.7.2 Let G have an induced subgraph H with a dominating vertex.
Let A be a set of elements of G that covers H. Then a2(H) < IA[. P r o o f . Construct a set B as follows. Start w i t h / 3 = A. Remove from B the elements that do not cover any element of H. If B has any vertices of V ( G ) - V(H), remove them from B and add to B a dominating vertex of H if B does not have one already. For each edge e C B, e not in H, do the following: the edge e has exactly one end-vertex v in H; remove e from B and add v to B if it is not there already. Now B is contained in H, B covers H, and [BI _< [A[. Hence a2(H) <_ [B[ _< [A[. [] L e m m a 1.7.3 If G contains a clique K, then a2(G) >_ a2(G[K]). P r o o f . Consider any total covering At of G - (V, E). Denote by F the set of edges of At joining K to V - K, and by L the set of vertices of K covered by F. We have [LI _< IFI because every vertex of L is covered by some edges
1.7
Total Coverings and Total Matchings
29
of F, and every edge of F covers only one vertex of L. Also, F does not cover any elements of G [ K - L], and therefore A t - F covers G[K - L]. Then by Lemma 1.7.2, I A t - F[ > a 2 ( G [ K - L]). Hence IAt[ >_ [F[ + a 2 ( G [ K - L ] ) > [L[+ c~2(G[K- L ] ) > c~2(G[K]), where the last inequality is true because if C is any total covering of G [ K - L ] , then L U C covers G[K]. Therefore a2(G) >_ a2(G[K]). 9 The following fact is mentioned in [ABLFN77]. Fact 1.7.4 a 2 ( K n ) -
In~21, where Kn is the complete graph on n vertices.
P r o o f . A maximum matching of Kn, supplemented for odd n by the only uncovered vertex, or an appeal to the more general Fact 1.7.1, shows that a2(Kn) < [n/2]. To show the reverse inequality, consider any total covering At - Vt U Et of K= - (V, E). Since Vt does not cover any edges of G [ V - Vt], Et must span every vertex of V - Vt except for one vertex for odd n. Therefore ]Etl > [ I V - Vt[/2], and consequently
[ d t l - let[ + [Vt[ > L([VI + ]vt[)/2]. If vt - / o , the right-hand side is at least In~21 . If Vt - O, then Et must span every vertex of V without exception, so [Et[ >_ In/2]. 9 From Fact 1.7.4 and Lemma 1.7.3, we can strengthen the inequality 1 _< c~2(G) as follows" C o r o l l a r y 1.7.5 For every graph G, [~v(G)/2] < a2(G). Fact 1.7.6 ( T h e o r e m 1.2.4) A graph G = (V, E) is threshold if and only if there is a partition of V into disjoint sets P, Q, and an ordering U l , . . . , Uk of P, such that no two vertices in P are adjacent, every two vertices in Q are adjacent, and g(Ul) D ... _D N(uk). Fact 1.7.7 ([PS84, CH77]) For every threshold graph G, there exists a partition of V as in Fact 1.7.6 such that IQIThis partition can be constructed in time O(n2), where n is the number of vertices of G. Now we are ready to prove the main results of this section. T h e o r e m 1.7.8 If G is a connected threshold graph, then
30
Threshold
Graphs
P r o o f . By Corollary 1.7.5, it is sufficient to show that a2(G) _< [w(G)/2]. Let P, Q be the partition of V as in Fact 1.7.7. Since G is a connected threshold graph, Q has a vertex Vl adjacent to every other vertex in V. We distinguish two cases here. C a s e 1: w(G) is even. The set Q has a vertex vz without neighbors in P, for otherwise Ul could be added to Q. Put At = Vt U Et, where Vt = {Vl} and Et is a perfect matching of G[Q - {v~, v~}]. It is not hard to see that At covers G and no proper subset of At does, so At is a total cover of G with
IA, I = r~(a)/2-1. C a s e 2: w(G) is odd. Put At = Vt U Et, where Vt = {Vl } and Et is a perfect matching of G[Q-{vl}]. Then At covers G, and no proper subset of At does, so At is a total cover of G with [Atl = [w(G)/2]. In both cases we have I/,l = [~o(c)/2], so ~ ( c ) _< [~(G)/2]. Since every threshold graph consists of isolated vertices and a connected threshold subgraph, we have the following: C o r o l l a r y 1.7.9 If G is a threshold graph, then =
+
o f isolated vertices in G.
T h e o r e m 1.7.10 If G = (V, E) is a threshold graph, then
/~(a) = I V I - [~(a)/2j. P r o o f . First we show that/32(G) _> [vl- k~(G)/2J. Partition V into P, Q as in Fact 1.7.7, and construct a total matching of size I V I - Lw(G)/2J as follows: C a s e 1: w(G) is odd. As before, there is a vertex v2 C Q without neighbors in P. Put Mt = Vt U Et, where Vt = P U {v2} and Et is a perfect matching of G [ Q - {v2}]. Then Mt is a total matching of size IPI + ([Q[ + 1)/2 =
IVl- [w(a)/2]. C a s e 2: w(G) is even. Put Mt = Vt UEt, where Vt = P and Et is a perfect matching of G[Q]. Then Mt is a total matching of size ]P] + IQI/2 =
I V l - L~o(G)/2J. We now show that ~2(G) <_ I V I - Lw(G)I2J. Consider any total matching Mt of G. Let P, Q be the partition of V as Fact 1.7.7, and let EpQ be the set of edges of G between P and Q. Then IMt N (PU EPQ)I <_ Igl, for otherwise some elements of Mt cover each other. Also Mt has at most rlQI/2] elements of the clique G[Q]. Therefore IMtl <_ IPI + [IQI/2] = IVI - Lw(G)12J. "
1.7
31
Total Coverings and Total Matchings
T h e o r e m 1.7.11 If G is a threshold graph of order n with at least one edge, then a~(G) - n - 1. P r o o f . Fact 1.7.1 applied to G without its isolated vertices shows that a'2(G ) < n - l , so we only need to show a~(G) >_ n - 1 . G has a v e r t e x Vl adjacent to every other non-isolated vertex of G. Let At = V(G) - {Vl}. Obviously At covers G, but no proper subset of At covers G, so At is a total ! cover with [Atl - n 1, and a2(G ) >_ n - 1. .. T h e o r e m 1.7.12 If G is a connected threshold graph of order n >_ 2, then
Z;(a)P r o o f . By Fact 1.7.1 and Theorem 1.7.8, we have fl;(a) >_ a2(a) = [w(G)/2]. Recall the proof of Theorem 1.7.8. It is not hard to see that the total covering constructed there is a total matching of size [w(G)/2] in
a, so C o r o l l a r y 1.7.13 If G is a threshold graph, then
t 3 ; ( G ) - [w(G)/2] + number of isolated vertices of G.
1.7.2
Related
Results
By restricting the total coverings and matchings of G = (V, E) to subsets of V or E, we obtain the vertex and edge covering numbers, stability number, and m a x i m u m matching. We give below the values of these parameters. The proofs are simple and are omitted. Let
ao(G) - min{ ]At['At is a total cover of G and At C_ V ( G ) } , fl0(G) - max{ [Mtl" Mt is a total matching of G and Mt C_ V(G) }. F a c t 1.7.14 If G -
(V, E) is a threshold graph, then
ao(G) - w ( G ) - 1 + number of isolated vertices of G,
Z0(a) - I V l -
1.
32
Threshold Graphs
Let c~0(G) - max{ IAtl" At is a total cover of G and At C_ V(G) }, ) - min{ IMtl" Mt is a total matching of G and Mt C_ V(G) }.
r
F a c t 1.7.15 If G is a connected threshold graph of order n >_ 2, then !
%(G) - n - 1, ~0(G) - 1. Let Ctl(G ) /~1((~)
--
--
min{ I & l ' &
is a total cover of G and At C_ E(G)},
max{ I M t l ' M t is a total matching of G and Mt C_ E(G) }.
F a c t 1.7.16 If G is a threshold graph, then the size of a maximum matching of G is/31(G) = [(w(G) + / ) / 2 ] , where 1 is number of edges in a maximum
matching of the bipartite graph obtained by dropping the edges of a maximum clique of G. Consequently, Ol(G) - - - I V ( a ) l 1)/2J C o r o l l a r y 1.7.17 If G is a threshold graph with partition V - P U Q as in Fact 1.7.7, then G has a perfect matching if and only if IV] is even and IN(u~)] _> I P [ - i + 1 for 1 <_ i <_ ]PI. Let
fl'~(G) - min{ I M t l ' M t is a total matching of G and Mt G E(G) }, c~'1(G) - max{ ]At['At is a total cover of G and At C E(G)}. C o r o l l a r y 1.7.18 If G -
(V, E) is a connected threshold graph, then /3'a(G) - [aJ(G) / 2J,
IVl- U (G)/2J.
Chapter 2 Ferrers Digraphs and Difference Graphs 2.1
Introduction
In this chapter we examine two families closely related to threshold graphs. The first one is a family of digraphs, the Ferrers digraphs, introduced by Riguet [Rig51] and also studied by Bouchet [Bou71], Ducamp et al. [DF69], Monjardet [Mon78], Ore [Ore62], and especially Cogis [Cog82a, Cog82b, Cog80, Cog79]. The second one is a family of bipartite graphs, the difference graphs, introduced by Hammer et al. [HPS90] and also studied by Peled et al. [PS89b], Peled et al. [PS94a], and Arikati et al. [AP94]. In this section we define these families and note the elementary connections between them and other graphs. Section 2.2 characterizes Ferrers digraphs, Section 2.3 discusses the Ferrers dimension of a digraph, and Section 2.4 discusses the difference graphs. The properties of the degree sequences of these graphs are discussed in Chapter 3. Definition 2.1.1 A digraph D = (V, A) is said to be a Ferrers digraph if it does not contain vertices x, y, z, w, not necessarily distinct, satisfying xy, zw E A and xw, zy ~ A. Figure 2.1 illustrates the forbidden configuration for Ferrers digraphs, called an alternating 4-anticircuit. Note that the vertices x, Y, z, w may coincide, except that x 7~ z and y r w. 33
34
Ferrers Digraphs and Difference Graphs
Figure 2.1" An alternating 4-anticircuit- the forbidden configuration in a Ferrers digraph. The vertices are not necessarily distinct. A solid arrow represents the presence of an arc and a dashed arrow its absence. y \
/ \/ /\
/
\
X
If vertices in Figure 2.1 are identified in all possible ways, we obtain five forbidden configurations with distinct vertices that characterize Ferrers digraphs. T h e y are illustrated in Figure 2.2.
Figure 2.2: The forbidden configurations in a Ferrers digraph. All vertices in a configuration are distinct.
f
\
/
(b)
\/
(d)
/N /
\
(~)
(e)
By definition, D = (V, A) is a Ferrers digraph if and only if the outneighborhoods I'+(v) of all vertices v C V are nested (equivalently the inneighborhoods I ' - ( v ) are nested). Consider the adjacency m a t r i x M of a Ferrers graph D = (V, A): M has a row and a column for each vertex of D
2.1
Introduction
35
and 1,
Mij-
if(i,j)
C A
O, otherwise.
Reorder the rows of M so that their row-sums (the outdegrees) are nondecreasing. Then reorder the columns of M so that the column-sums (the indegrees) are non-decreasing. Because the out-neighborhoods are nested and the in-neighborhoods are nested, the l's in each row (column) appear consecutively and are left- (top-) justified. A 0/1 matrix with this structure is known as a Ferrers diagram, which explains the name "Ferrers digraph". Figure 2.3 illustrates a Ferrers digraph and its adjacency matrix in the form of a Ferrers diagram. Figure 2.3" A Ferrers digraph D and its adjacency matrix M. a
d e c
d
a
b
c
d
e
1 1 1
1 1 1
1 0 0
1 0 0
0 0 0
0 0 0 0 0 b 0 0 0 0 0
a
c
b
D
M
D e f i n i t i o n 2.1.2 For a digraph D = (V, A), the underlying undirected loopless graph is the graph U ( D ) = (V,E), where E = { u v : u,v E lS, u v, (u,v) C A }. The bipartite representation of D is the bipartite graph B ( D ) = ( V + U V - , E ) , where V + and V - are disjoint copies of V and for a + E V + and b- C V - , a +b- c E if and only if (a,b) c A. The next result follows immediately from characterization 2 of Theorem 1.2.4. T h e o r e m 2.1.3 If D is a symmetric Ferrers digraph, then its underlying undirected graph U(D) is a threshold graph. The following question naturally arises in light of Theorem 2.1.3" given a threshold graph G, what are all the symmetric Ferrers digraphs D such that U(D) - G? The answer is given by the following theorem.
36
Ferrers Digraphs and Difference Graphs
2.1.4 ( [ C o g 8 2 a ] ) Let G = (V, E) be a threshold graph with degree partition D o , . . . , Din, and D a symmetric digraph satisfying U(D) = G. Then D is a Ferrers digraph if and only if Theorem
fo . i >
w,.t x of
has a loop in D;
2. for i < F~], no vertex of Di has a loop in D; 3. i f m is odd, every vertex of in D;
Dim1 with at most
4. if m is even, every vertex of
D[~ 1 with
one exception has a loop
at most one exception has no
loop in D. Thus the number of symmetric Ferrets digraphs D satisfying U(D) = G is 1+
ID[~ 1 I
P r o o f . Since D is a symmetric digraph satisfying U(D) = G, the only freedom left in choosing it is to choose which vertices have loops, and this freedom must be used to eliminate all alternating 4-anticircuits. Assume that x C Di, y E Dj, i > j, and xy C E. Then in D we have IF+(x)I > IF+(y)I and (y, x) E A. Since the out-neighborhoods in D are nested, we have (x, x) E A, i.e., x must have a loop in D. For i > [~] and for every x C Di, there exists a y E D [ 2 ], and by Condition 6 of Theorem 1.2.4, we have xy C E. This shows that Condition 1 of the theorem is necessary. Similarly Condition 2 is necessary. If x and y are distinct vertices of D [ ~ ] , then by Condition 6 of Theorem 1.2.4, xy C E if and only if m is odd. Therefore to avoid the forbidden configurations (d) and ( e ) i n Figure 2.2, at most one of x and y can have a non-loop if m is odd, and at most one can have a loop if rn is even. This shows that Conditions 3 and 4 of the theorem are necessary. It is easy to see that these conditions are also sufficient for D to be a Ferrers digraph. " D e f i n i t i o n 2.1.5 ([Fis85]) Let :Y be a finite family of intervals on the line,
let G -
(Z, E) be the graph defined by 1112 E E
if and only if
I1 M I2 # 0,
I1,/2 G 2-
and let D = (2", A) be the digraph (binary relation) defined so that (/1,/2) C A if and only if every point of I1 is to the left of every point of I2. Then G is
2.1
Introduction
37
m
said to be an i n t e r v a l g r a p h , its complement G is said to be a c o i n t e r v a l g r a p h , and D is said to be an i n t e r v a l o r d e r . Interval graphs and interval orders were characterized by Gilmore and Hoffman, and by Fishburn" T h e o r e m 2.1.6 ( [ G H 6 4 , Fis70, Fis85]) 1. A graph G is a cointerval graph if and only if G is a comparability graph (has a transitive orientation) and has no induced subgraph isomorphic to 2K2. 2. A digraph D is an interval order if and only if D is transitive and acyclic (has no directed cycles) and does not have configuration (a) of Figure 2.2. The next result follows easily from Theorem 2.1.6 and the forbidden configurations of Figure 2.2. T h e o r e m 2.1.7 Let D be a loopless digraph. Then D is a Ferrets digraph if and only if D is an interval order. In that case U(D)is a cointerval graph. Conversely, if G is a cointerval graph, then every transitive orientation of G is a loopless Ferrers digraph. D e f i n i t i o n 2.1.8 A graph G - (V, E) is called a difference g r a p h if there exist real numbers av, v C V and T such that 1. [a~] < T
v 6 V;
2. for every pair of distinct vertices u, v C V, uv C E
if and only if
l a u - a v I > T.
It follows immediately that if V is partitioned as V - X U Y, where X { v E V ' a v >_ 0 } and Y - { v 6 V ' a v < 0 }, then X and Y are stable sets in G, i.e., that G is a bipartite graph with bipartition (X, Y). In Section 2.4 we show that for a bipartite graph G with bipartition (X, Y), G is a difference graph if and only if the vicinal preorder of G is total on X, or equivalently on Y. The following result follows therefore from Condition 3 of Theorem 1.2.4. T h e o r e m 2.1.9 A bipartite graph G with bipartition (X, Y) is a difference graph if and only if adding to G all possible edges with both ends in X yields a threshold graph.
38
Ferrers Digraphs and Difference Graphs
Another easy result connecting Ferrers digraphs and difference graphs is the following: T h e o r e m 2.1.10 A digraph D is a Ferrers digraph if and only if its bipartite representation B ( D ) is a difference graph.
Figure 2.4 illustrates the difference graph B ( D ) of the Ferrers digraph D of Figure 2.3. Figure 2.4: The difference graph B(D), where D is the Ferrers digraph of Figure 2.3.
e+ c+
- a~
b-
d+
c-
a+
d-
b+o
m e-
Ferrers Digraphs, Characterizations
2.2
In this section we present several characterizations of Ferrers digraphs, based on Cogis [Cog82a]. The development is analogous to the characterizations of threshold graphs in Section 1.2. The directed analog of the degree partition is given by the following definition. D e f i n i t i o n 2.2.1 (resp in-degrees) 5+ -- 0 (resp. 5o exists). Let D + -
Consider a digraph D whose distinct positive out-degrees are 5+ < ... < 5+ (resp 51 < "'" < 5m-)' and let -- O) (even if no vertex of in-degree 0 or out-degree 0 { v e V ' I F + ( v ) I - 5+} f o r i - 0 , . . . , m + (resp. D~ {v e v - I r - ( v ) l - 67} for i - o, ,m-) The sequence D + D+ (resp. D o , . . . , D ~ _ ) is called the o u t - d e g r e e p a r t i t i o n (resp. i n - d e g r e e p a r t i t i o n ) of D. 9
m+
.
"
.
.
.
~"
9 9 ~
m+
Ferrers Digraphs, C h a r a c t e r i z a t i o n s
2.2
39
To state the appropriate directed analog of the concept of "adding an isolated vertex to a graph", consider a digraph D - (IT, A) and the poset (P+, c_), where P+ - {F+(v), v E V} U {0, V}. Now add a new vertex z to D such that r - ( z ) - ~ and N1 C_ F+(z) C_ N2, where N2 covers N1 in P+. We then note that z has been added as an in-isolated vertex to D. Similarly, to state the directed analog of "adding a dominating vertex to a graph", consider the poset ( P - , C_), where P - - {V-(v), v E V} U { e , V}, and add a new vertex z to D such that P + ( z ) - V and N~ C_ F - ( z ) C_ N2, where N2 covers N1 in P - We then note that z has been added as an out-dominating vertex to D. T h e o r e m 2.2.2 ([Cog82a]) Let D - (V,A) be a digraph with out-degree partition and in-degree partition as in Definition 2.2.1. Then the following are equivalent: 1. D is a Ferrets digraph; 2. the out-neighborhoods F+(v), v C V are nested, or equivalently the inneighborhoods F-(v), v C V are nested; 3. D can be constructed from the empty digraph by repeatedly adding an in-isolated or an out-dominating vertex;
~o (a) m+ -- m - (= m,
ay);
(b) 5+ - 5+1 + [D~-_~+11
i - 1 , . . . m; i - 1 , . . . m;
.
(a) m + - m - (= m, say); (b) f o r x e D + and y e D 7, (x,y) e A ~ i + j > m ;
6. there exist real (equivalently non-negative integer) weights w+(v) and w - ( v ) for each v e V and a real (equivalently non-negative integer) threshold t such that
(a)
<
t,
v e
V;
(b) if X , Y C_ V and w + ( X ) , w - ( Y ) <_ t, then ( X x Y ) N A - 0 ,r
w + ( X ) + w - ( Y ) <_ t;
40
Ferrers Digraphs and Difference Graphs
7. there exist real (equivalently non-negative integer) weights w+(v) and w - ( v ) for each v C V and a real (equivalently non-negative integer) threshold t such that (x,y) C A ~
w +(x) + w - ( y ) > t
x, y C V;
8. there exist a linear order (L,<_) and two mappings f + , f such that (x, y ) C A r
f+(x) < f - ( y )
9V ~
L
x, y c V .
P r o o f . We prove the equivalence of Conditions 1 through 8 using the scheme illustrated in Figure 2.5. Figure 2.5" The logical implications used to prove Theorem 2.2.2.
1) =V 2): Clearly if the in-neighborhoods or the out-neighborhoods of D are not nested, then D has an alternating 4-anticircuit. 2) ~ 3): Let x be a vertex with largest out-degree in D. If F +(z) - V, take z = x and observe that since the in-neighborhoods of D are nested, D can be obtained by adding z as an out-dominating vertex to D - z. If r + ( x ) -r V, take any vertex of V - F +(x) as z. Then since the out-neighborhoods of D are nested, we have F - ( z ) = 0 , and D can be obtained by adding z as an in-isolated vertex to D - z. Since D - z still satisfies Condition 2, the result follows by induction. 3) =~ 1): Condition 3 is hereditary, i.e., is preserved when a vertex is deleted. But an alternating 4-anticircuit does not satisfy this condition. Therefore a digraph satisfying Condition 3 cannot contain an alternating 4-anticircuit.
2.2
Ferrers
Characterizations
Digraphs,
41
2) => 4), 5)" Observe that by Condition 2, if D has an arc from D + to DT, then it has an arc from every vertex of D + to every vertex of D~-, and moreover, for each i' >_ i and j' >_ j, D has an arc from every vertex of Di+ to every vertex of D~;. It follows that
r+(D1+) c .-. c r+(D m++ ),
(2.1)
r-(D:)
(2.2)
c .-- c V-(DT~-).
From (2.1), the nesting of the out-neighborhoods, and the definition of Do, we have P + ( D + + ) - D : v --. u D~_. Fromthis and (2.1)it follows that F+(D++_I) C_ D~- U -.. U D~_. However, F+(D++_I) ~ D~- U ... U D~_, since otherwise F - ( D 1 ) F-(D;)F+(D++), contradicting (2.2). Therefore r +(D++_I)
- D 2 U -.. U D~_.
Continuing in this way, we find m
F+ (D+) -
U
D~-
i - 1 , . . . , m +,
(2.3)
D~-
j - 1,..., m-.
(2.4)
k=m+ - i + 1
and similarly m+
F-(D)-) -
U k=m--j+l
From (2.3), it follows that for x E D + and y C D~-, (x, y) r A ~ i + j > m +. Similarly from (2.4), for x C D + and y r D 7, (x,y) C A ~ i+ j > m - . This proves part (a) of Condition 4 and Condition 5, and by taking cardinalities in (2.3) and (2.4), we obtain parts (b) and (c) of Condition 4. 4) =:v 2)" Parts (b),(c)of Condition 4 can be formulated as follows" m
C-
E
ID;I
i-O,...,m
(2.5)
ID+]
i-0,...,m.
(2.6)
k = m - i-t-1
5~-=
~ k=m-i+l
42
Ferrers
and
Digraphs
Difference
Graphs
We show by simultaneous induction on i that + x E Din_ i
m
:- 1-'+(x) -
~
D~-
i-
0,...,m
(2.7)
k=i+l m
r-(y) -
y E D~+~
U D+ k=m-i
i -
O, . . . , rn - 1
(2.8)
((2.8) is trivial for i = - 1). These equations clearly imply the desired Condition 2. By (2.5) and (2.6), both sides of the equations in (2.7) and (2.8) have the same cardinality, and therefore it is enough to show the inclusions r + ( x ) C_ Ukm__i+lD~- for (2.7) and r - ( y ) __DUk~__m_iD + for (2.8). Basis: i - 0. If x E D +, then by definition of Do, I'+(x) C_ Ukm__~D~-, which proves (2.7) for i = 0. If y E D1, then by (2.7) y E r + ( x ) , i.e., x E r - ( y ) , for each x E D +. Therefore D + C_ ['-(y), which proves (2.8)for i - 0 . I n d u c t i o n s t e p : Assume (2.7) and (2.8) hold for i = 0 , . . . , r and prove t h e m for i = r + 1. Let x E Dm-~-l. By (2.8), F - (D~-+I) - Uk~__m_iD + for i - 0 , . . . , r. By taking unions and using F - ( D o ) - e , we obtain F - (U; +1 D~-) - Uk~=m_~ D + ~ x. Hence r + ( x ) C u~n__~+2D~-, which proves (2.7) for i = r + 1. Let y E D~-+2. By (2.7) we have I'+(D+_i) - Uk~__i+l D~- for i - 0 , . . . , r + 1. m .. . , r + l , we h a v e y E F+( D i + n _ i ) for such i. S i n c e y E Uk=i+ID~fori-0, + Hence, since by (2.7) all vertices of D i n _ i have the same out-neighborhood we have I ' - ( y ) _D D+_~ for i - 0 , . . . , r + 1. Taking unions, we obtain Iir+l + rn F - (y) __ ~ t.)i=0 Dm-i - Uk=m-r-1 DTk, which is (2.8) for i - r + 1. 5) =~ 6): If rn = 0, then D has no arcs, and hence zero weights and threshold satisfy Condition 6. Therefore we assume that rn > 0. Put p = ~ ] and b = 2IV[ + 1, and define the following non-negative integer weights and threshold: For every vertex v E D~:,
w+ (v) -
{b
b p+2 -
b ~+l-k
k- 0
k-p+l
~''"
~
p
m
(2.9)
and t-
b p + 2 - 1.
(2.10)
To show that these weights and threshold satisfy Condition 6, we prove the following facts:
2.2
Ferrers Digraphs, Characterizations
43
(a) for ~), ~ C {+, - } , and for x C D/~ and y C D~, wC)(x) + w e ( y ) >
t r
i + j > m;
(b) w+
D~
+w-
D~
(c) if x C D~ and i > p, then
P r o o f of (a)" A s s u m e i + j > m. generality that i > p. If j _< p, then
Then we may assume without loss of
WC)(X) -~- W ( } ( y ) -- b p+2 -- Dm + l - i -~ b j > b p+2 > t,
and if j > p, then
~ (x) +
~
(y) -
bp+ 2 _ b m + l - i + b p+2 - - b m + l - j
> 2b p + 2 - 2b m-p > b p+2 > t.
Conversely, assume i + j <_ m. Then we may assume without loss of generality that i _< p. I f j _< p, then w V ( x ) + wO(y) - bi + b j _< 2b p < b p+2 - t + 1,
and if j > p, then w~(x) + w~
- b~ + b p+2 - b m + l - j < b i -t- b p+2 - b i -
P r o o f of (b)" w+
D+
+ w-
D~-
-
p
E
(ID+l + ID;I) z
k=O
b "+1 - 1
21vI b - 1
= b p+I -
1 < t.
t + 1.
44
Ferrers Digraphs and Difference Graphs
P r o o f of (c)-
) m-i
bp+2 - bm+l-i -~- E
bk
(IV+l + IV~-I) <
k=O
bre+l-i- 1 bp+2 - b m+l-i -t- 21VI
b- 1
= t.
Now we are ready to prove that Condition 6 is satisfied. Part (a) of Condition 6 is obvious. To show part (b) of Condition 6, assume first that (X x Y) NA -~ e , so that (x,y) E A for some x C X and y E Y. If x C D + and y E then from Condition 5 i + j > m, and from fact (a) w+(x) + w - ( y ) > t, and therefore w+(X)+ w - ( Y ) > t. Conversely, assuming that (X x Y ) N A - e and also w+(X) <_ t, w - ( Y ) <_ t, we prove that w+(X) + w - ( Y ) <_ t 9 If X C_ Uk=0 p Dk+ and Y C_ Uk=0P D~- , then the result follows from fact (b). Otherwise, there exists, say, an x C X such that x E D + and i > p. In that case
Dj-,
rn-i
YC_UD;, k=0
for otherwise (x, y) r A for some # r Y by Condition 5, contrary to our assumption. Also m--i
X-xC_
UD+ , k=0
for otherwise there exists some y r X - x such that 9 r D+ and i + j > m, hence by fact (a) w+(x)+w+(y) > t, contradicting our assumption w+(X) <_ t. Then the result follows from fact (c). 6) ==~ 7)" The same weights and threshold of Condition 6 work for Condition 7, as can be seen by taking X - {x} and Y - {y} in Condition 6. 7) ==~ 8)" Take integer weights and threshold as in Condition 7, let L be the integers, and define f+(v)-t+l-w
+(v),
f-(v)-w-(v),
vCV.
8) =~ 2)" This is obvious. We make two remarks concerning Condition 6 of Theorem 2.2.2.
2.2
45
Ferrers D i g r a p h s , C h a r a c t e r i z a t i o n s
1. Part (b) of the condition is rather awkward. One would like to separate empty rectangles ((X x Y) N A = O) from non-empty rectangles by means of the weights and threshold. Unfortunately, the assumptions that w+(X) <_ t and w-(Y) <_ t are essential. Consider for example the Ferrers digraph D = (V, A) shown in Figure 2.6. Figure 2.6" A Ferrers digraph. 1
3 Assume that, if possible, there exist non-negative weights w+(v) and w-(v) and a threshold t such that (X x Y ) N A - rg ~ w+(X) + w-(Y) _< t. Then w+(1) + w - ( 1 ) + w - ( 2 ) + w-(3)
<
t
w+(1) + w+(2) + w+(3)+ w-(3)
< >
t t
w+(2) + w-(2)
>
t
w+(3) + w - ( 1 )
>
t
w+(3) + w-(2)
>
t
Multiplying the first two inequalities by 2 and adding, and also adding the last four inequalities, we obtain 4w+(1) + 2w+(2)+ 2w+(3)+ 2 w - ( 1 ) + 2 w - ( 2 ) + 4w-(3) < 4t 4t < 2w + (2) + 2w + (3) + 2w-(1) -4- 2w-(2). Therefore 4w + (1) + 4w- (3) < 0, contradicting non-negativity. 2. Recall Theorem 1.3.1. We say that an integer t is a feasible threshold for a threshold graph G - (V, E) if there exists a feasible solution (w,t) for the linear program (1.11). Theorem 1.3.1 asserts that the minimal feasible threshold uniquely determines the corresponding integer weights w for G. Analogously, a non-negative integer t is said to
Ferrers Digraphs and D i f f e r e n c e G r a p h s
46
be a feasible threshold for a Ferrers digraph D = (V, A) if there exist integer weights w+(v), w-(v) for each v C V satisfying Condition 6 of Theorem 2.2.2. Here the minimal feasible threshold does not determine the corresponding weights uniquely, as illustrated by the following two examples: 9
t=5;
w+ -(1,2,4),
w- - ( 2 , 4 , 5 )
or
w + = (1,3,5), w - = (1,3,5). 9
11; w + = (1,2,4,8), w - = (4,8,10,11)
t =
or
w + = (1,2,6,11), w - = (2,6, 10, 11).
2.3
T h e Ferrers D i m e n s i o n
In this section, based on Cogis [Cog82b], we define the Ferrers dimension of a digraph, and show that it generalizes the dimension of a partially ordered set (poset). Known results of Dushnik and Miller and of Ore about the poset dimension are extended to the Ferrers dimension and given independent proofs. It is also shown that computing the Ferrers dimension of a digraph is polynomially equivalent to computing the dimension of a poset. We use here the terminology of digraphs and equivalently of binary relations, whichever is more convenient. We assume that all digraphs are finite. Recall that a p r e o r d e r is a reflexive and transitive relation, a p a r t i a l o r d e r is an antisymmetric preorder, and a l i n e a r o r d e r is a total partial order. D e f i n i t i o n 2.3.1 An embedding of a digraph D = (V, A) in the Cartesian product D1 x ... x Dk of digraphs Di = (V/,Ai) is a mapping f : V V1 • "" x Vk with f ( v ) = ( f l ( v ) , . . . , f k ( v ) ) such that for every x , y C V,
(x,y) E A ~
(fi(x), fi(y)) E Ai for each i.
The following result and definition [DM41] are well-known. T h e o r e m 2.3.2 ( D u s h n i k a n d M i l l e r ) Every partial order P is the intersection of all the linear orders (on the same elements) containing P.
2.3
The Ferrers Dimension
47
D e f i n i t i o n 2.3.3 ( D u s h n i k and Miller) The d i m e n s i o n do(P) of a partial order P is the smallest number of linear orders whose intersection is P. Ore [Ore62] characterized the dimension of a partial order in the following way, which motivates the term "dimension":
T h e o r e m 2.3.4 ( O r e ) For every partial order P, do(P) is the smallest number of linear orders such that P has an embedding in their Cartesian product. Bouchet [Bou71] generalized "partial order" to "digraph" and "linear orders" to "Ferrers digraphs" in Theorem 2.3.2, Definition 2.3.3 and Theorem 2.3.4. These results are as follows.
T h e o r e m 2.3.5 Every digraph D is the intersection of all the Ferrets digraphs (on the same vertices) containing D. P r o o f . Every digraph D = (V, A) satisfies
D-
A (~,y)~tA
Each digraph under the intersection sign is a Ferrers digraph, because it has just one non-arc, and thus cannot contain any of the configurations of Figure 2.2. If the intersection is empty, then D itself is a Ferrers digraph for a similar reason. 9
D e f i n i t i o n 2.3.6 The Ferrers d i m e n s i o n dF(D) of a digraph D is the smallest number of Ferrers digraphs (on the same vertices) whose intersection is D. T h e o r e m 2.3.7 For every digraph D, dF(D) is the smallest number of Ferrets digraphs such that D has an embedding in their Cartesian product. Moreover, each fi in the embedding can be required to be an injection, or in other words, the Ferrets digraphs can be required to have the same set of vertices as D.
P r o o f . For this proof only, denote the smallest number in the theorem by dE(D). If D = O 1 N . - - N Dk, then f, defined by fi(v) = v for each i, is an
48
Ferrers Digraphs and Difference Graphs
embedding of D in D1 x ... x Dk. Therefore dE(D) <_ dF(D). Moreover, each fi is an injection. To prove the reverse inequality, assume that f is an embedding of D = (V,A) in D 1 x ' ' ' x D k and each Di = (V~,Ai)is a Ferrers digraph. For each i, let D~ - (V,A'~), where A ~ - { ( x , y ) E V2 " ( f i ( x ) , f i ( y ) ) E A~}. Then D - D~ fl ... fl D~. Moreover, each D~ is a Ferrers digraph. This can be seen for example from Condition 7 of Theorem 2.2.2: Di has weights w • and a threshold t satisfying ( x , y ) E Ai ~ w + ( x ) + w - ( y ) > t for all x , y E V/; define weights w '+ for D~ by w'• = w • (fi(v)), and then (x, y) E A~ z-->, w'+ ( x ) + w'-(y) > t for all x, y E V; hence D~ is a Ferrers digraph. Therefore dF(D) < dE(D), tt Next we come to one of the principal results of this section. 2.3.8 ( C o g i s ) If D is a transitive digraph, then every minimal Ferrers digraph containing D is transitive.
Theorem
P r o o f . Let D - (V, A) and let F - (V, B) be a minimal Ferrers digraph containing D. The Ferrers digraph F must have the same vertices as D because every induced subgraph of a Ferrers digraph is again a Ferrers digraph. By Condition 2 of Theorem 2.2.2, the vertices of F can be indexed as v l , . . . , v,~ so that C+(v,) C_ ... C_ C+(v~), (2.11) where F + refers to F. We now establish the following two assertions" 1. for every indexing satisfying (2.11), if (x,y) E B with x there exists a vertex z - vk such that k _< i and (z, y) E A;
vi, then
2. if ( x , y ) E A and ( y , z ) E B, then ( x , z ) E B. 1" If 1) fails, then we can drop from F all arcs of the form (vk, y) where k < i, and obtain a smaller digraph that still contains D and is still a Ferrers digraph by Condition 2 of Theorem 2.2.2, contradicting the minimality of F. 2" Assume that, if possible, (x,y) E A, (y,z) E B, and yet ( x , z ) ~ B for some vertices x , y , z . Every indexing satisfying (2.11), with x - vi, y - vj, must satisfy i < j. Choose the indexing so that j - i is as small as possible. We assert that P+(vj) - r+(vj_~), from which it follows that by switching the indexes j and j - 1 we maintain (2.11), contradicting the minimality of j - i. To prove the assertion we need only show P+(vj) C_ F+(Vj_l), the reverse inclusion following from (2.11). So assuming (vj, u) E /3, we must
2.3
T h e Ferrers D i m e n s i o n
49
show (Vj_I, It) E B. Now by 1) above there exists an index k _< j such that (vk, u) C A C_ B. If k _< j - 1, then (Vj_l,U) E B by (2.11). If k - j, then from (vi, vj) C A and (vk, u ) C A we have (vi, u ) C A C_ B by the transitivity of D, and therefore (Vj_l, u) C B by i _< j - 1 and (2.11). We now prove the transitivity of F as follows. Assume that (x, y), (y, z) C B. Choose an indexing satisfying (2.11), and let x - vi. By ( x , y ) E B and 1) above, there exists a vertex z' - vk satisfying k <_ i and (z', y) C A. Hence by (y,z) C B and 2) above, (z',z) C B, and therefore (x,z) C B by (2.11). Theorem 2.3.8 has a number of corollaries. C o r o l l a r y 2.3.9 If D is a transitive digraph, then the Ferrers digraphs of Theorem 2.3.5, Definition 2.3.6 and Theorem 2.3.7 can be required to be transitive Ferrets digraphs. P r o o f . The Ferrers digraphs of Theorem 2.3.5 and Definition 2.3.6 can be required to be minimal, and then Theorem 2.3.8 applies. As for Theorem 2.3.7, its proof shows that Di is transitive if and only if D~ is transitive. .. C o r o l l a r y 2.3.10 If D is a preorder, then the Ferrets digraphs of Theorem 2.3.5, Definition 2.3.6 and Theorem 2.3.7 can be required to be total preorders with the same strong components as D. P r o o f . It is easy to see using Figures 2.1 and 2.2 that every reflexive Ferrers digraph is total, and every transitive and total digraph is a Ferrers digraph. It follows that a total preorder is nothing but a reflexive and transitive Ferrers digraph. This and Corollary 2.3.9 show that the Ferrers digraphs in the theorems and definition in question can be required to be total preorders. If we also require them, as we can, to be minimal total preorders containing D, then they must have the same strong components as D, as can be verified easily. .. C o r o l l a r y 2.3.11 If D is a partial order, then the Ferrers digraphs of Theorem 2.3.5, Definition 2.3.6 and Theorem 2.3.7 can be required to be linear o r d e rs. P r o o f . This is a special case of Corollary 2.3.10 in which D has no directed circuits of length 2 or more. 9 The next corollary shows that the Ferrers dimension is an extension of the partial order dimension.
50
Ferrers Digraphs and Difference Graphs
C o r o l l a r y 2.3.12 If D is a partial order, then dF(D) = do(D). P r o o f . This follows from Corollary 2.3.11 since every linear order is a Ferrers digraph, as can be seen from Figure 2.1. [] Corollaries 2.3.11 and 2.3.12 provide in particular an independent proof of Ore's characterization of the partial order dimension, Theorem 2.3.4. We discuss now the other principal result of this section, which provides another way that the Ferrers dimension generalizes the partial order dimension. D e f i n i t i o n 2.3.13 Let D = (V, A) be any digraph. For each vertex v E Is,
we consider the following sets of vertices: Vl( )
= =
{
e v: r+(v) c
}
Let 12(D) denote the collection of all sets V~ (v) and V2(v). The d i m e n s i o n a l o r d e r of D is the poset P(D) = (F(D), C_). The following three lemmas follow directly from the definitions. L e m m a 2.3.14 For every digraph D = (V, A) and every vertices u, v E Is, (u, v ) C A if and only if V~(u) C_ V2(v). L e m m a 2.3.15 A digraph D = (Is, A) is transitive if and only if every v E V c
L e m m a 2 . 3 . 1 6 A digraph D = (V, A) is reflexive if and only if every v E V
satisfies Vl(v) C_ V2(v). P r o p o s i t i o n 2.3.17 A digraph D is a partial order if and only if D is iso-
morphic to P(D). P r o o f . The "if" part is trivial. For the "only if" part we note that if D (V, A) is a partial order, then 1/1(v) = V2(v) for every v C V by Lemmas 2.3.15 and 2.3.16, and moreover Vl(u) 7t V2(v) for u ~r v by the antisymmetry ~nd Lemma 2.3.14. Therefore the mapping v ~ Vl(v) is a bijection of V to 12, and it is an isomorphism of D to P(D) by Lemma 2.3.14. ,, T h e o r e m 2.3.18 (Cogis) For every digraph D, dv(D) = do(P(D)).
2.3
The
Ferrers
Dimension
51
P r o o f . Let D = (V,A). First we show that dp(D) > do(P(D)). Assume that D = O1 n ... n Dk where each D~ = (V, A~)is a Ferrers digraph (by Theorem 2.3.7 we may assume that the vertex set of each Di is V). We exhibit an embedding f of P(D) = (12(D), C_) in the Cartesian product of k copies of the linear order (N, >) (N denotes the non-negative integers) as follows. For each R 6 I;(D) and for each i, put
fi(R) - min r6R
IVZ( )l
where F + refers to the Ferrers digraph Di, and put
f(R)-(fl(R),...,A(R)). To show that f is an embedding, we need to show that for every R, S C V(D), R C_ S if and only if I(R) >_ f ( S ) , i.e., if and only if f~(R) >_ f~(S) for all i. The "only if" part follows directly from the definition of fi(R) as a minimum. For the "if" part, we have for some ri C R and si C S"
Ir+(,,)l- min lr+(r)l- A(R) > f~(S)- min Ir+(s)lr6R
--
s6S
Therefore, since the out-neighborhoods of Di are nested, we have for all i and all r E R,
2 Hence for all r G R, -
N
D
i
N
(2.12)
i
where F refers to D. Now there are two cases regarding S. C a s e 1" S - 1/1(v) for some v E V. Then s~ E 1/1(v) for each i, which means that nj F+(si) - F+(si) _D F+(v). By taking the intersection over i we have
i
i
d
which gives with (2.12) F+(r) D r+(v) for all r E R. This means that r C 1/1(v) - S for all r E R, giving the required conclusion R C S. C a s e 2" S V 2 ( v ) - r - ( v ) f o r some v E V. Since si E S, we have (si, v) C A C_ Ai for all i. By definition of si, and since the out-neighborhoods of Di are nested, this implies that (r, v) C Ai for all i and all r C R. Since
52
Ferrers Digraphs and Difference Graphs
D - D1 ffl ... f'l Dk, this gives (r,v) E A for all r E R, and therefore R c_ s. Since P(D) has an embedding in the Cartesian product of k linear orders, it follows from Theorem 2.3.4 that do(P(D)) <_ k. Therefore dF(D) >_
do(P(D)). Now we show the reverse inequality dr(D) < do(P(D)). Let f be an embedding of P(D) - (12(D), C_) in the Cartesian product (C, _<) of k linear orders (L1,_
(u,v) E Ai
if and only if
fi(Vl(u)) <_i fi(V2(v)).
By Condition 8 of Theorem 2.2.2, each Di is a Ferrers digraph. Also, D = D1 N ... ('1 Dk. To see this, observe that the following conditions are equivalent for each u, v E V: (u, v) E A; Vl(u) C_ V2(v) (by Lemma 2.3.14); f(Vl(u)) <_ f(V2(v)) (since f is an embedding); fi(Vl(u)) <_i fi(V2(v)) for each i (by definition of Cartesian product); (u, v) C A~ for each i (by definition of Ai). Since D is the intersection of k Ferrers digraphs, dr(D) <_ k. By Theorem 2.3.4, dF(D) < do(P(D)). ,, Theorem 2.3.18 and Proposition 2.3.17 provide another proof of Corollary 2.3.12. Corollary 2.3.19 The following problems are polynomial-time equivalent:
computing the dimension of a partial order and computing the Ferrets dimension of a digraph. P r o o f . If P is a partial order, then do(P) = dF(P) by Corollary 2.3.12, so any algorithm for computing dF(D) for arbitrary D will compute do(P) when applied to P. On the other hand, to compute dF(D) for a digraph D, compute P(D), which can clearly be done in polynomial time, and then any algorithm for computing do(P) for arbitrary P will compute dF(D) when applied to P(D) by Theorem 2.3.18. 9
2.4
Difference Graphs
This section, based on [HPS90], considers properties of difference graphs, some of which have been mentioned at the end of Section 2.1. Questions relating to their degree sequences are discussed in Chapter 3.
2.4
Difference Graphs
53
The Dilworth number of a graphs G is defined as the largest size of an antichain in the vicinal preorder of G, i.e., the largest number of mutually incomparable vertices of G. Thus G is a threshold graph if and only if its Dilworth number is at most 1. Chapter 9 is devoted to the Dilworth number. In particular, the following result of Benzaken, Hammer and de Werra is proved in Theorem 9.2.5.
The Dilworth number of a graph G is at most 2 if and only if there exist real numbers a l , . . . , an associated with the vertices of G and positive real numbers S and T such that
T h e o r e m 2.4.1 ( [ B H d 8 5 a ] )
1. lail < min(S,T) for i = 1 , . . . , n ; 2. distinct vertices i and j are adjacent if and only if la~ + ajl >_ S or l a i - a j l >_T. Consider the following two subclasses of graphs with Dilworth number at most 2:
Type I: distinct vertices i,j are adjacent if and only if la~ + ajl _ S, i.e., T-oc; Type II: distinct vertices i , j are adjacent if and only if l a i - ajl >_ T, i.e., S
--
CX).
P r o p o s i t i o n 2.4.2 .
The graphs of type I are exactly the unions of two vertex-disjoint threshold graphs.
2. The graphs of type II are bipartite. P r o o f . Partition the vertices according to the sign of ai, and use property 8 of Theorem 1.2.4 for Part 1. 9 The graphs of Type II are exactly the difference graphs of Definition 2.1.8, which explains their name. They are also known as chain graphs [Yan82] because, having Dilworth number at most 2, they can be covered by two chains of the vicinal preorder. In fact, the vicinal preorder is linear (a chain) on each side of the bipartition, as will be shown in Theorem 2.4.4.
Ferrers Digraphs and Difference Graphs
54
Let G be a difference graph with a l , . . . , its vertices. Set X={i:ai>_0};
an
the numbers associated with
Y={i:a~
Since lail < T for i = 1 , . . . , n, X and Y are stable, i.e., G is bipartite with bipartition (X, Y), as mentioned in the proof of Proposition 2.4.2. We say that G is a difference graph with bipartition (X, Y). Given a bipartite graph G = (V, E) with bipartition (X, Y), we define a new split graph Gx = (V, E U E x ) by adding to G all possible edges between vertices in X, i.e., EX "- {XlX2 : Xl,X2 E X , xl r x2}.
We now prove Theorem 2.1.9, which we reformulate as follows. T h e o r e m 2.4.3 A graph G = (V,E) is a difference graph if and only if there is a partition of V into stable sets X and Y such that Gx is a threshold graph. P r o o f i Assume G is a difference graph, and let a l , . . . , a n be the numbers associated with the vertices of G, and (X, Y) the bipartition of V as above. Associate with each vertex i C X the weight wi = T + ai and with each vertex i C Y the weight wi = - a i . Let the threshold value be 2T. Thus, for vertices i, k C X, we have wi + wk >_ 2T since ai and ak are nonnegative. For vertices i C X and j E Y, we have wi + wj >_ 2T if and only if l a i - ajl >_ T. For vertices j, 1 C Y, we have wj + w~ < 2T since [aj l, lat[ < Z. Therefore the threshold graph defined by the weights w and threshold 2T is identical with Gx. Conversely, assume that V partitions into stable sets X and Y such that G x is a threshold graph. Let D 0 , . . . , D m be the degree partition of G x . We may adjust X and Y if necessary so that Y - Do U ... U D [ ~ j and X - D [ ~ j + 1 U ... tO Din. Then we can find vertex weights wi such that for distinct vertices i and j, ij E E tO E x we can choose the weights so that wi This is a variant of the proof that 6) take k - L~J - 1,
r l,
if and only if wi + wj >_ O. Moreover, > 0 for i C X and wi < 0 for i C Y. =v 8) in Theorem 1.2.4: for i C Dk, k - 0 , . . . , t~J
k-
+ 1,...,m.
2.4
Difference Graphs
55
Now choose the number T so that T > m a x { w i 9 i C X} and T > - m i n { w i 9 i C Y}, and define the numbers ai by ai
- S wi,
[
-wi-T,
i c x
icY.
It follows that lail < T for all i. Moreover, for distinct vertices i and j, la~ - ajl > T ~ one of i, j is in X and the other is in Y and wi + wj >_ 0 ," ',, ij C E. Therefore G is a difference graph. 9 The most useful characterizations of difference graphs are summarized in the following theorem. T h e o r e m 2.4.4 Let G - (X, Y; E) be a bipartite graph. Then the following conditions are equivalent: 1. G is a difference graph with bipartition ( X , Y ) ; 2. there are no Xl , X2 C X and yl , y2 E Y such that Xlyl , x2y2 C E and xly2, X2Yl ~ E ; 3. the vicinal preorder is linear on X (equivalently on Y ) ; ~. let 51 < " " < 5~ be the distinct non-zero degrees in X , and set 50 - O. Let al < " " < at be the distinct non-zero degrees in Y , and set Cro - O. Let X - )2o U . . . U X~, Y - }So U . . . U }st be the degree partitions of X and Y , where X i - {x e X " d e g ( x ) - 5i}, Yj - {y C Y" d e g ( y ) crj} (Xo or )So may be empty). Then s - t, and for x r X~,y r Yj, xy C E if and only if i + j > t. P r o o f . Use Theorems 2.4.3 and 1.2.4. We only sketch the argument that if G x is a threshold graph, then G satisfies Condition 4. We may assume without loss of generality that Xo - Y0 - O. Then Do - ~ and each Di is entirely contained in X or in Y, where D o , . . . , Dm is the degree partitiori of G x . For x r Di C_ X and y r Dj C_ Y we have by Condition 6 of Theorem 1.2.4 that xy C E if and only i f j - s , s - 1 , . . . , s - i + 1, in other words i + j > s. Similarly xy E E if and only if i + j > t. Hence s - t and the result follows. 9 C o r o l l a r y 2.4.5 A bipartite graph is a difference graph if and only if every induced subgraph without isolated vertices has on each side of the bipartition a dominating vertex, that is, a vertex adjacent to all the vertices on the other side of the bipartition.
56
Ferrers Digraphs and Difference Graphs
P r o o f . If G is a difference graph with bipartition (X, Y) and without isolated vertices, then by Condition 3 of Theorem 2.4.4, the vertices of largest degrees in X and Y are dominating in G. Since by Condition 2 of Theorem 2.4.4 every induced subgraph of a difference graph is itself a difference graph, it has the same property. Conversely, the condition in our theorem implies Condition 2 of Theorem 2.4.4, which means that G is a difference graph with bipartition (X, Y). In the following, we give another forbidden subgraph characterization for a bipartite graph to be a difference graph. P r o p o s i t i o n 2.4.6
1. A bipartite graph is a difference graph if and only if it has at most one non-singleton connected component, and this component, if any, is a difference graph. 2. A connected bipartite graph is a difference graph if and only if it has no induced Ps, the path on five vertices. P r o o f . (1) follows easily from Condition 2 of Theorem 2.4.4. The necessity part of (2) also follows easily from the same condition. We prove the sufficiency part of (2) by showing that forbidding P5 implies Condition 2 of Theorem 2.4.4. Let Xl, X2 ~ X , Yl, Y2 E Y satisfy XlYl, x2y2 E E, xly2, x2yl ~ E. Since G is connected, it has a path from Xl to y2; let P be a shortest such path. Then P is an induced path having at least two edges distinct from X l y 1 and x2y2. But then P and G have an induced Ps, contradicting the given condition. .. The following is a forbidden subgraph characterization for an arbitrary graph to be a difference graph. P r o p o s i t i o n 2.4.7 A graph is a difference graph if and only if it has no triangle, no induced 2K2, and no induced pentagon. P r o o f . If G is a difference graph, then G is bipartite, so G has no triangle and no induced pentagon. From Condition 2 of Theorem 2.4.4, G has no induced 2K2 either. Conversely, if G has no triangle or induced 2K2 or pentagon, then it follows easily that G is bipartite and satisfies the conditions of Proposition 2.4.6, so G is a difference graph. []
Difference Graphs
2.4
57
T h e following characterizations of difference graphs is analogous to Condition 3 of T h e o r e m 1.2.4. 2 . 4 . 8 Let X N Y - 0 . A graph G on X U Y is a difference graph with bipartition (X, Y) if and only if there exist partitions ( X 1, X 2) of X and ( y 1 , y 2 ) of Y such that Proposition
o
The subgraph of G induced by X I [.J y1 is complete bipartite with bipartition ( X 1, y 1 ) .
2. N ( X 2) ~ ]/1 and
N(Y 2) C X l ;
3. the vicinal preorder is linear on X 2 and on y2. P r o o f . " O n l y if"" Using Condition 4 of T h e o r e m 2.4.4, choose any integer r such t h a t 0 _< r _< t, and set X 1 - Xr U "'" U Xt, y1 _ Yt+l-r U "'" U Yt, X 2 - X - X 1, y2 _ y _ y1. T h e n Conditions 1 and 2 are satisfied. Condition 3 is also satisfied by Condition 2 of T h e o r e m 2.4.4. " I f " " Note t h a t G is bipartite with bipartition (X, Y) by Conditions 1 and 2. We show t h a t Condition 2 of T h e o r e m 2.4.4 is satisfied. Assume xl, x2 E X , Yl, Y2 E Y and XlYl, x2Y2 E E. By s y m m e t r y , there are three cases to consider: 1 9 Xl, X2 ~ X 1 , yl E Y 1 , y2 E y 1 U y 2 . In this case, x2yl E E. 2. Xl,X 2 ~ X 1, Yl, 92 C y2. W i t h o u t loss of generality, assume N ( y l ) C_
N(y2). T h e n y2xl ~ F__.,. 3 9 Xl E X 1 , x2 C X 2 , y2 E y1 , yl E }f 2. In this case xly2 C E. In each case, xly2, x2yl ~ E is impossible, proving the required condition.
9
Chapter 3 Degree Sequences 3.1
Graphical Degree Sequences
A g r a p h i c a l d e g r e e s e q u e n c e (or just a g r a p h i c a l s e q u e n c e or a d e g r e e s e q u e n c e ) is the sequence of vertex degrees of a simple graph, i.e., a finite undirected graph without loops or multiple edges. Every graph is said to be a realization of its degree sequence. The theory of graphical degree sequences is intimately connected to degree sequences of threshold graphs. In this section we list eight criteria for a graphical degree sequence. One criterion is that the sequence is non-negative and integer and is majorized in the sense of HardyLittlewood-Pdlya by a threshold sequence. In Section 3.2, the threshold sequences are characterized as those graphical sequences that satisfy many of the inequalities in the above criteria with equality, as well as by having a unique labeled realization. In Section 3.3 we study the convex hull of graphical degree sequences of a given length, and the threshold sequences turn out to be its extreme points, among other results. The final section, Section 3.4, shows that the difference sequences play among bipartite degree sequences a role analogous to the one played by the threshold sequences among all graphical sequences. To state the criteria we need some definitions, starting with majorization. For many characterizations and applications of majorization, see HardyLittlewood-Pdlya [HLP52] and Marshall and Olkin [MO79]. D e f i n i t i o n 3.1.1 Let a = ( a l , . . . , an) and b = ( b l , . . . , b~) be real vectors of length n. Denote the i-th largest component of a (resp. b) by a[~] (resp. b[~]). 59
60
Degree
Sequences
We say that a m a j o r i z e s b, denoted by a ~ b, if k
k
a[i]>~b[i I i=1
fork-l,...,n,
i=1
with equality for k - n. The majorization is s t r i c t , denoted by a ~- b, if at least one of the inequalities is strict, namely if a is not a permutation of b. The relation a ~ b is a precise formulation of the intuitive idea that the common sum of the components of a and b is distributed more evenly in b than in a. Let us remark that our notation is a little different than the one used in [HLP52, MO79]. These authors use ~- for majorization and do not use a special notation for strict majorization. The main result about majorization in integers that we use here was proved by Muirhead [Mui03] in 1903. To state it we define unit transformation. D e f i n i t i o n 3.1.2 If a is a vector and ai >_ aj+2, then the following operation is called a u n i t t r a n s f o r m a t i o n from i to j on a" subtract 1 from ai and add 1 to aj. Clearly if a ~ is obtained from a by a sequence of unit transformations, then a ~- a'. Muirhead's result is that the converse is also true for integer vectors. T h e o r e m 3.1.3 ( M u i r h e a d L e m m a ) If a and b are integer vectors and a ~ b, then some permutation of b can be obtained from a by a finite sequence of unit transformations. (Had we allowed ai > aj + 1 in the definition of a unit transformation, then b itself could have been obtained, because any two components could now be exchanged by repeated unit transformations.) P r o o f . We generally follow the proof of 5.D.1 of [MO79]. Another proof can be obtained by modifying the proof of 2.B.1 in [MO79]. Assume without loss of generality that a l > ' ' ' >_ a n and bl _> ... >_ b~. Also assume that a -~ b, for otherwise we are done. Then there is a largest index 1 for which l
l
i=1
i=1
3.1
Graphical
Degree
Sequences
61
Consequently, since a ~ b, we have l+l
l+l
E b,- E i=1
i=1
Hence bl+l > al+l, and there is a largest index k _< 1 for which bk < ak. Therefore ak >
bk >_ b l + l
> al+l.
Let a' be obtained from a by a unit transformation from k to 1+ 1. We show below that a ~ ~ b, and hence a repetition of the argument with a ~ replacing a will eventually obtain b. Clearly }-'~i=1 ai' > -- ~ i = 1 b i h o l d s f o r a l l r < k a n d all r > 1. If this inequality failed for some r - k , . . . , l, namely Y'~r'~i=Iai! < Eir=.l bi, then since at+ 1 ' <_ br+l, we would have v'~+l z_,i=l ai~ < V'r+l z_.,i=l bi , in other words the inequality would also fail for r + 1. Repeating this argument we would find that the inequality failed for 1 + 1, contradicting the fact that lq-1 E i=1
t _ _ X--',l+l - - N-"l+l bi ai z_.,i=l a i z_.,i=l 9
9
C o r o l l a r y 3.1.4 If e is a graphical sequence and d is an integer vector such that e ~ d, then there exist graphical sequences e ~
such that each e i yields graphical sequence.
e i+1
e0
er ~
d
by a unit transformation.
In particular, d is a
P r o o f . The existence of integer sequences e - e ~ e ~ - d such that each e i yields e i+1 by a unit transformation follows from Muirhead Lemma. We show by induction on i that each e i is graphical. Let G i be a graph with degree s e q u e n c e e i, and let e i+a be obtained from e i by transferring a 1 from component j to component k. Since vertex j has a larger degree than vertex k in G i, there exists a third vertex 1 adjacent to j but not to k in G i. Then the graph G i+1 obtained from G i by deleting the edge j l and adding the edge lk has degree sequence e i+1. 9 To formulate the criteria for graphical sequences, we use some terminology as follows. D e f i n i t i o n 3 . 1 . 5 If d l , . . . , dn are integers and dl >__ "'" >_ dn >__ O, then the c o n j u g a t e s e q u e n c e of d - ( d l , . . . ,dn) is the sequence d* - (d~,d~,...) given by d* - I{j " dj > i}l.
62
Degree Sequences
The D u r f e e n u m b e r
of d is given by f - f(d) -I{j'dj
> J}l.
It is convenient to visualize d by means of the Ferrers diagram of d, an n x n 0/1 matrix whose row sums are d l , . . . , d ~ and in which the l's in each row are left-justified. For example, the Ferrers diagram of the sequence d = (4, 2, 2, 0, 0) is illustrated in Figure 2.3. The conjugate sequence is then the sequence of column sums of the Ferrers diagram, in this case d* = (3,3, 1, 1 , 0 , . . . ) , and the Durfee number is the length of the largest principal submatrix that is full of l's, in this case f = 2. The complementary submatrix of this principal submatrix, i.e., the submatrix of rows and columns f + 1 , . . . , n, is entirely zero. We say that a vector d = ( a l l , . . . , dn) is a proper sequence if 1. the di are integers; 2. n - 1
>_ dl>_ . . . >_dn >_0.
Clearly when trying to characterize graphical degree sequences, we may restrict attention to proper sequences. A second convenient way to visualize a proper sequence d, which turns out to be more useful for us here than Ferrers diagrams, is by means of its corrected Ferrers diagram [Ber76, FF62], defined as follows. D e f i n i t i o n 3.1.6 Let d - ( d l , . . . , d n ) be a proper degree sequence. The corrected Ferrers d i a g r a m of d is an n z n matrix C - C ( d ) of 0 's, 1 's a n d , 's (special kind of 0 's) such that 1. all the diagonal entries and no others are , ' s ; 2. the row sums are d l , . . . ,
dn;
3. the 1 's in each row are to the left of the 0 's in that row. The corrected conjugate sequence of d is the sequence d' of column sums of C. It is given by the formula d~ - I{i " i < k and di >_ k - 1 } l
+ l{i " i > k and di >_ k}l.
3.1
Graphical
Degree
63
Sequences
The c o r r e c t e d D u r f e e n u m b e r
of d is defined by ~ j - 1}1.
m - re(d) - I { j ' d j
An example is shown in Figure 3.1. Figure 3.1: The corrected Ferrers diagram C(d) of the proper sequence d - (2, 2, 2, 2, 2). The corrected conjugate sequence is d' - (4, 4, 2, 0, 0). The corrected Durfee number is ram3.
*
1
1
0
0
1
*
1
0
0
1
1
*
0
0
1
1
0
*
0
1
1
0
0
*
Again m is the size of the largest principal submatrix of C that is full of l's and *'s, and the complementary submatrix is all O's and *'s. It is easy to see from the definitions of f and m that d]+l < f. If equality holds, then m - f + 1 and d~+ 1 - d/+l; otherwise m - f. The corrected conjugate sequence d t need not be proper, because it can have an increase, but the only possible increase occurs when m = f, namely d~ - f - 1 and d~+ 1 - f. When a corrected Ferrers diagram C(d) is symmetric, it is the adjacency matrix of a graph G with degree sequence d. By the definition of C(d), the vicinal preorder of G is total, and so, by Condition 5 of Theorem 1.2.4, G is a threshold graph and d is a threshold sequence. Every threshold sequence arises in this way by the same result. We are now ready to state the eight criteria for a proper sequence to be graphical. Our proof here is adapted from [SH91]. Criterion 9 is from Peled and Srinivasan [PS89b]. T h e o r e m 3.1.7' ( S i e r k s m a a n d H o o g e v e e n ) Let d - ( d l , . . . , d n ) proper sequence with ~i~=1 di even. Then the following are equivalent:
be a
Degree
64
Sequences
1. d is a graphical sequence;
2. the R y s e r Criterion" there exists a bipartite graph in which the degrees of each color class are all,..., tin, where cli-[ di+l,
[
di,
fori-l,...,f for i - f +
(3.1)
1,...,n;
3. the B e r g e Criterion: k
k
di <_ ~ d~ i=1
for each k -
1,...,n;
(3.2)
i--1
~/. the Erd6s-Gallai Criterion: k
n
d/_
~
1,...,n;
(3.3)
1,...,n and r - O,...,n - k;
(3.4)
min{k, di}
for each k -
i=k+l
5. the F u l k e r s o n - H o f f m a n - M c A n d r e w k
Criterion"
n
~-~di
~
di
i=n-r+l
for each k 6. the Bollob~is Criterion" k
n
E di < E i----1
k
di + E min{ k - l, di }
i--k+l
for each k -
1,...,n;
(3.5)
i=1
7. the G r f i n b a u m Criterion" k
n
~max{k-l,di}
i=1
~7~ di
for each k -
1,...,n; (3.6)
i=k+l
8. the Hiisselbarth Criterion: k
E
i=1
k
<-E d', i=1
for each k -
1,...,f;
(3.7)
3.1
65
Graphical Degree Sequences
9. t h e P e l e d - S r i n i v a s a n Criterion" there exists a threshold sequence e satisfying e ~ d. Proof. 1) ~ 2)" Let G be a graph on the vertex set { 1 , . . . , n} with degree sequence d. Construct from G a symmetric digraph D by giving each edge of G both orientations. Then add to D loops on the vertices 1 , . . . , f. Now the indegrees and outdegrees of D are the di, and therefore its bipartite representation B ( D ) (Definition 2.1.2) has the required properties. 2) ~ 3)" Let B - (X, Y; E) be a bipartite graph with color classes X {Xl,...,x~} and Y - {yl,...,y~}, where the degree of xi and yi is di. Given k, let F be the set of edges joining {Xl,...,xk} to Y. We then have the following, where the inequality holds since each y~ has at most min{k, d~} incident edges in F, and the second equality follows by summing the entries of the first k columns of the (uncorrected) Ferrers diagram of d in two ways: N
k
n
E
k
- I l l _<
i=1
min{k, a~i} - ~ dye.
i=1
(3.8)
i=1
(This is a special case of the easy part of the Gale-Ryser characterization of bipartite degree sequences with a given partition.) Since replacing the *'s of the first f rows of C(d) by l's and those of the later rows by 0's gives the Ferrers diagram of d, we see that ~* di
-
/ d~+l, d~, %
fori-1,...,f for i - f + 1 , . . . , n.
From this and Equations (3.1) and (3.8) we obtain, for k - 1 , . . . , f, k
k
k
k
i=1
i=1
i=1
i=1
k
k
and for k - f + 1 , . . . , n , k
k
+ S-
-< E d ) - E d : + s.
i=1
i=1
i=1
i=1
In both cases, we obtain the inequality (3.2). 3) =~ 4)" Given k, every proper sequence d satisfies k
n
d: < _ k ( k - 1 ) + i=1
~ i=k+l
min{k, di}
for e a c h k - 1 , . . . , n
66
Degree
Sequences
because the left-hand side is the number of l's in the first k columns of C(d), the first term of the right-hand side is an upper bound for the number of l's in the first k rows and these columns, and the second term is the number of l's in the other rows and these columns. This inequality combined with (3.2) yields (3.3). 4) => 5): Given k and r, every proper sequence d satisfies n
k(k-1) + ~
min{k, di} -
i=k+l n~r
n
k(k - 1) + ~ i=k+l
i=n-r+l
n-r
k(k-1)+
min{k, di } <_
E
min{k, di} + n
~
di-
k+
i=k+l
i=n-r+l
n
k(n-r-1)+
~
di.
i=n-r+l
This, combined with (a.a), yields (3.4). 5) => 6)- Given k, there exists some 1, 0 _< l _< k, such that d l , . . . , d/ > k - 1 ~nd dl+l,..., dk < k - 1. Substituting 1 for k in 5), we have l
n
~-~ di < l ( n - r - 1 ) - + i=1
di
for each r - 0 , . . . , n - 1.
i=n-r+l
Choose r - n -
k in the above to obtain l
n
E di < l ( k - 1 ) + ~ i=1
di.
i=k+l
Therefore k
n
k
i=k+l
i=I+1
~ di+l(k-1)+ ~
i=1
n
=
~ i=k+l
di
k
di+~min{k-l,
di}.
i=1
6) ~ 7)" Inequality (3.5) is seen to be equivalent to the following inequality" n
k
k
k
di >_~_. di + ~ m a x { - d i , - k + 1} - ~ max{0, d i - k + 1} i=k+l
i=1
i=1
i=1
3.1
Graphical
Degree
Sequences
67
k
k
= y ~ ( m a x { k - 1 , d i } - k + 1) - ~--~max{k - 1, di} - k ( k i=1
1).
i=1
7) ~ 8)- Put l - d~. Since k _< f, we have k _< 1 _< n, and dl,..., dl > k, d r + l , . . . , d~ _< k - 1 (refer to the associated Ferrers diagram). For the same reason d~ - d ~ - 1 for i - 1 , . . . , k. We then have, using (3.6) for 1 to get the first inequality, k
k
k
n
d'i - y~(d* - l) - ~ d: - k - kl + ~_~ d i - k i=1
i=1
i=1
i=/+1
l
>_ k ( 1 - 1 ) + ~ m a x { / -
1, di} - l ( 1 -
1)
i=1
l
= (k- l)(1- 1)+ ~max{/-
1, di}
i=1
k
l
>_ ( k - l ) ( 1 - 1 ) + ~ di + ~ i=1
(l-l)
i=k+l
k
= Edi. i=1
8) =~ 9): Set e = d and let C be the corrected Ferrets diagram of e. We present an algorithm that transforms C and with it its vector e of row sums. The algorithm is shown in Figure 3.2 and an example is illustrated in Figure 3.3. We remark that in the intermediate steps of the algorithm e need not be proper, since e l , . . . , e / m a y be unsorted and e 2 , . . . , e/_l may exceed n - 1, as can be seen by running the algorithm on the proper degree sequence (9, 9, 9, 9, 8, 4, 4, 4, 4, 4, 4). However, we prove below that at termination C(e) becomes symmetric, and this guarantees that e is proper, since the original e is proper and the column sums e ll , . . . , e} can only decrease during the algorithm. We show below that the algorithm is not stuck when i = 1: the problem is to show that when i = 1, s is a non-negative even integer (if s were negative or odd, the algorithm would be required to transfer l's above the first row, an impossibility). To see this, we show that e satisfies the H/isselbarth Condition after each iteration with i > 1. Denote by e and e' the row and column sums at the beginning of the iteration and by ~ and ~' these sums at the end of the iteration. We assume by induction on f - i that e satisfies (3.7) and show
68
Degree Sequences
Figure 3.2: An algorithm transforming a graphical sequence into a threshold sequence. for i := f d o w n t o 1 do ! 8 "-- e i -- el,
if s < 0 t h e n transfer the last Isl l's of row i to the end of row i - 1; if s > 0 t h e n do transfer the last [~J l's of c o l u m n / t o the end of row i; if s is odd t h e n transfer the last 1 of column i to the end of row i - 1 od od
t h a t ~ does t h e s a m e . Since ek -- ek a n d e^'k - e 'k for k - 1 , . . . , i - 2, as well as e~ ^ - ek for k - i , . . ., f , we o n l y h a v e to show t h a t ~2k=li-1 ek __~ ~-'~k=li-1e~. ^ If s < 0, t h e n i-1
i-1
i-1
i
E ~J- E ~ + I~1- E ~J + ~ - ~'~- E ~J- ~'~
j=l
j=l
j--1
i
i-1
j=l
i-1
-< E ~ - ~'~- E ~ - E ~. j=l
i-1
j=l
i-1
j=l
i - 1 ^!
If s > 0 is e v e n , ~ j = l ej -- ~'~'~j=l e j a n d ~-~j=l ej c o n c l u s i o n is d i r e c t . If s > 0 is o d d , we h a v e i-1
i-1
i-1
i-1 ! ~--~j=l ej, a n d
SO t h e
i-1
E e J - E e J + l < E e ~ + l - E e ~ +1. j=l
j=l
j=l
j=l
E q u a l i t y c a n n o t h o l d here, since this w o u l d i m p l y , t o g e t h e r w i t h t h e e q u a l i t i e s ~j - ~} for j - i , . . . , f , t h a t E j n = l ~j - E j n = l d j is o d d , c o n t r a r y to t h e a s s u m p t i o n of t h e t h e o r e m . T h e r e f o r e ~ satisfies (3.7) in this case too. It n o w follows t h a t w h e n i - 1, s is an e v e n n o n - n e g a t i v e i n t e g e r , a n d t h e r e f o r e t h e a l g o r i t h m does t e r m i n a t e : t h a t s is e v e n follows f r o m t h e f a c t s t h a t ~ kn= l ek is e v e n a n d e !k - ek for k - 2 , . . . , m; t h a t s _> 0 follows f r o m (3.7) for k - 1. A t t e r m i n a t i o n t h e l ' s of rows 1 , . . . , m of C are to t h e left of t h e 0's of t h e s e rows, a n d t h e l ' s of c o l u m n s 1 , . . . , m are a b o v e t h e 0's of t h e s e
3.1
Graphical Degree Sequences
69
Figure 3.3: Illustrating the algorithm in the proof that 8) =~ 9) on the example d (8, 8, 3, 3, 3, 3, 3, 3, 3, 1). Blank entries are O's or ,'s. The row sums e and column sums e ~ are shown in the margins of C. The horizontal and vertical separating lines indicate that f - 3. The moving l's are shown in boxes. 19
8
8
3
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
0
8
5
3
3
3
2
2
2
.
1
1
1
1
1
1
1
1
1
.
1
1
1
1
1
1
1 ~-~
1
1
.
1
1
1
1
1
1
1
1
1
1
1
1
~19
1
1
1 [-i~
1
1
1
1 [-i~
1
1
1
1 [-i-]
1
1
1
1
i=3
i-2
s-5
s=-I 8
5
3
.
1
1
1
1
1
1
1
.
1
1
1
1
1
1
1
.
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
I 9
3
1
i=1 s-0
3
2
2
2
1
1
1
1
1
1
1
70
Degree Sequences
columns. This fact and the equalities ei - ei~ for i - 1 , . . . , m guarantee that C is symmetric, and hence it is the adjacency matrix of a graphs G with degree sequence e. Clearly the vicinal preorder of G is total, so G is a threshold graph, and hence e is a threshold sequence. The only operations the algorithm performs on C are to repeatedly transfer a 1 from a row to a higher row. Since d is proper, the net effect is the transfer of l's from components of d into larger or equal components, and consequently e N d. 9) =~ 1): This follows from Corollary 3.1.4. .. F a c t 3.1,8 1. The Hh'sselbarth Criterion is part of the Berge Criterion, but is fully equivalent to it, as follows f r o m the theorem. It could also be formulated as k
k
i=1
i=1
for each k -
1, . . . , m
because, as we have noted, m - f or else m - f + 1,din - d~. 2. As we have seen in the proof above, the Bollobds and Griinbaum Criteria (3.5) and (3.6) are just two f o r m s of the same inequality. 3. If in (3.6) we make the substitution
di - n - 1 -
dn+a-i,
where d is the proper complementary sequence, and perform some sireple manipulations like the ones used in the proof of 6) ~ 7), we obtain n - - ]r
n
di<(n-k)(n-k-1)+ i=1
E
min{n-k,
di}.
i=n-k+l
This is just the ErdSs-Gallai inequality (3.3) with n - k replacing k. Thus the k-th Griinbaum inequality for a proper sequence is the same as the ( n - k)-th ErdSs-Gallai inequality for the complementary sequence.
Some of the ErdSs-Gallai inequalities are redundant. In fact, the rn-th inequality of (3.3) implies all the subsequent inequalities.
3.1
Graphical
71
Degree Sequences
3.1.9 ( [ H I S 7 8 , H I S 8 1 ] ) L e t d = ( d l , . . . , d ~ ) b e a proper sequence. If d satisfies (3.3) for k = m, then it satisfies it with strict inequality for k = m + 1 , . . . , n. Consequently, the first m Erdb's-Gallai inequalities can replace the full n inequalities in Theorem 3.1.7. Theorem
P r o o f . By definition of m we have di > m - 1 for k - 1 , . . . , m and di <_ m - 1 for k - m + 1 , . . . , n. Therefore for k >_ m, the k-th ErdSs-Gallai inequality (3.3) can be written as k
n
di<_k(k-1)+
~
i=1
di.
(3.9)
i=k+l
Assuming now that (3.9) holds for k - m, we show that it holds with strict inequality for each k > m as follows. k
m
k
n
di - ~ di + ~ i=1
i=1
di <_ m ( m - 1 )
re(m-l)+2
di + ~
i=m+l
i=m+l
k
=
k
+ ~
~ i=m+l
di
i=m-t-1
n
di+
~
di
i=k+l n
<_ m ( m - 1 )
+ 2(k - m ) ( m - 1 )
+ ~
di
i=k+l n
<
m(m-1)+2(k-rn)(m-1)+(k-m)(k-m+l)+
~
di
i=k+l n
=
k(k-1)+
~
di.
i=k+l
We conclude this section with another famous characterization of graphical sequences, the Havel-Hakimi characterization [Hay55, Hak62]. This one has a recursive form, and therefore we list it separately. Corollary 3.1.11 below gives an easy way to characterize threshold sequences as the graphical sequences having a unique labeled realization. 3 . 1 . 1 0 ( H a v e l - H a k i m i ) . Let d be a proper sequence. For any i, let e be the shorter sequence (not necessarily proper) obtained from d by dropping di and decreasing the first di remaining components by 1. Then d is a graphical sequence if and only if e is.
Theorem
72
Degree Sequences
P r o o f . " I f " : Let jl,..., jk be the indices of those components of d that were decreased by 1 to obtain e, where k = di. Assume that H is a realization of e. Then by adding to H a new vertex and joining it to the vertices with degrees e j i , . . . , ejk we obtain a realization of d. " O n l y I f " : We could reverse the argument in the "if" part if we could show that when d has any realization, it has a realization in which the vertex with degree di is joined to the di other vertices with largest degrees. So let G = (V,E) be a realization of d with V = { 1 , . . . , n } and deg(j) = dj for each j. Call a pair of vertices p, q a bad pair of G if p is a neighbor and q is a non-neighbor of i, but dp < dq. If p, q is a bad pair of G, then there must exist a fourth vertex r that is a neighbor of q but not of p. Then by dropping from E the edges ip and qr and adding the edges iq and pr, we transform G into another realization of d with fewer bad pairs than in G. By induction it follows that d has a realization without bad pairs. ..
Every two realizations of a degree sequence can be obtained from each other by a sequence of transfers, where a t r a n s f e r involves dropping the two edges and adding the two non-edges of an alternating 4-cycle (Definition 1.2.2).
C o r o l l a r y 3.1.11 ( [ F H M 6 5 ] )
P r o o f . This follows from the proof of the "only if" part above, since every realization can be transformed into the realization without bad pairs by sequence of transfers, and the reverse of a transfer is again a transfer. []
3.2
Threshold Sequences
We begin this section by showing that the threshold sequences, i.e., the degree sequences of threshold graphs, can be characterized as those graphical sequences d that have a unique labeled realization. This means that if d = ( d l , . . . , dn) and G = (v, E) is a graph with V = { 1 , . . . , n} and deg(i) = di for i = 1 , . . . , n, then E is completely determined.
T h e o r e m 3.2.1 A graphical sequence is a threshold sequence if and only if it is strictly unigraphic, i.e., has a unique labeled realization. P r o o f . A threshold sequence has only one labeled realization by Corollary 3.1.11 and Condition 2 of Theorem 1.2.4. Conversely, if d is a nonthreshold graphical sequence, let G be any realization of d, so that G is a
3.2
Threshold Sequences
73
non-threshold graph. Then G has an alternating 4-cycle C by Condition 2 of Theorem 1.2.4, and by doing a transfer along C we obtain another realization of d. .. We are now in a position to show that the threshold sequences are special among all graphical sequences in another way, namely they satisfy most of the criteria of Theorem 3.1.7 in an extremal way. One criterion, the FulkersonHoffman-McAndrew Criterion, is not treated here; its extreme analog is discussed with the linear description of the polytope of degree sequences in Section 3.3. Recall the definition of the Durfee number f, the corrected conjugate sequence d ~ and the corrected Durfee number m, Definitions 3.1.5 and 3.1.6, as well as the definition of majorization and strict majorization, Definition 3.1.1.
T h e o r e m 3.2.2 Let d = ( d l , . . . , dn) be a proper sequence. Then the following are equivalent:
1. d is a threshold sequence; 2. there exists a difference graph in which the degrees of each color class are d l , . . . , dn, defined by (3.1) as in the Ryser Criterion; 3. d satisfies inequalities (3.2) of the Berge Criterion with equality; equivalently di - d~i for i - 1,. . . ,n; ~. d satisfies the first m ErdSs-Gallai inequalities (3.3) with equality; 5. d satisfies the last m Bollobds inequalities (3.5) with equality; 6. d satisfies the last m Griinbaum inequalities (3.6) with equality; 7. d satisfies (3.7) of the Hiisselbarth Criterion with equality; equivalently d i - d~ for i - 1 , . . . , f ; 8. d is a graphical sequence and there does not exist a graphical sequence e satisfying e ~ d.
74
Degree
Sequences
P r o o f . 1) =~ 2)- Let G be a threshold realization of d with degree partition D o , . . . , Din. It is easy to see by Condition 6 of Theorem 1.2.4 that m
E f
w
IDkl-1,
forrnodd
IDkl,
for m even.
m
E
k=[ 12 Give both orientations to each edge of G, and put a loop on the vertices with the largest f degrees. The resulting symmetric digraph D has the di as its indegrees and outdegrees, and it is a Ferrers digraph by Theorem 2.1.4. Therefore its bipartite representation B(D) has in each color class the degrees di, and it is a difference graph by Theorem 2.1.10. 2) =~ 3)" Referring to the proof of 2) =~ 3) in Theorem 3.1.7, we see that when B is a difference graph, each yi has exactly mill{ k, di} incident edges in F. Therefore (3.8) holds with equality, and the rest of the argument shows that the Berge inequality holds with equality. 3) =~ 4)" Referring to the proof of 3) ~ 4) in Theorem 3.1.7, we have for k - 1 , . . . , m that k
n
d~-k(k-1)+ i=1
~
min{k, di},
i=k+l
because k ( k - 1) is the exact number of l's in the first k rows and columns of C(d). This and the fact that (3.2) holds with equality yields that (3.3) holds with equality. 4) ~ 7)" By the argument just given, the right-hand side of (3.3) is equal k to ~2/=1 diI for k - 1 , . . . , m. Hence if (3.3) holds with equality for such k, so does (3.7). 7) ~ 1)" By Part 1 of Fact 3.1.8, (3.7) holds with equality for each k 1 , . . . , m. Since the submatrix of the last n - m rows and columns of C(d) is entirely zero, this implies that C(d) is symmetric. By the remarks preceding Theorem 3.1.7, it follows that d is a threshold sequence. 1) r 6)" Each of the following statements is equivalent to the next one" 9 d is a threshold sequence; 9 the complementary sequence d is a threshold sequence (by Condition 2 or 4 of Theorem 1.2.4);
3.3
The Polytope of Degree Sequences
75
9 d satisfies the first rn Erd6s-Gallai inequalities with equality; 9 d satisfies the last rn Grfinbaum inequalities with equality (by Part 3 of Fact 3.1.8). 5) e , 6)" This follows from Part 2 of Fact 3.1.8. 1) =~ 8)" Assume that e is a graphical sequence satisfying e ~ d. By Corollary 3.1.4, there exist graphs G ~ ~ with degree sequences e e~ e ~ - d, respectively, such that for i - 0 , . . . , r - 1, e i+1 is obtained from e i by a unit transformation. For such i, G i+1 is obtained from G i as in the proof of Corollary 3.1.4, and it cannot be a threshold graph, because in this graph deg(j) >_ deg(k), yet k has a neighbor 1 that is not a neighbor of j, contrary to Condition 6 of Theorem 1.2.4. Since the majorization e ~ d is strict, r > 0, and thus the realization G ~ of d is a non-threshold graph. Therefore d cannot have any realization that is a threshold graph, because threshold sequences have a unique realization by Theorem 3.2.1. 8) =~ 1)" Assume that, if possible, d satisfies 8) but is not a threshold sequence. By 9) of Theorem 3.1.7, there exists a threshold sequence e satisfying e ~ d, and since d itself is not a threshold sequence, the majorization must be strict. But this contradicts 8). .. Characterization 8 above is also discussed in [RG79].
3.3
The Polytope of Degree Sequences
This section discusses the special role played by the threshold sequences in the polytope of degree sequences. It is based on [PS89b] and uses linearprogramming duality and the structure of threshold graphs to show that the threshold sequences are the extreme points of this polytope, to characterize adjacencies on it, to provide a totally-dual-integral system of linear inequalities for it, and to describe its facets. Some of these results were obtained earlier by Koren [Kor73], using the ErdSs-Gallai inequalities. Our approach here fits naturally the modern trend of using LP duality and some combinatorics to obtain polyhedral results. We use here the shorter terminology "degree sequence" for "graphical degree sequence". D e f i n i t i o n 3.3.1 Let n be a positive integer. We denote by T)Sn the collec-
tion of all graphical sequences of length n, not necessarily proper, i.e., ~ ) ~ n -- { ( X l , - . . ,
Xn) " (Xl,... ,Xn) is a graphical sequence}.
76
Degree Sequences
The p o l y t o p e of d e g r e e s e q u e n c e s ~)n is defined as the convex hull of DS~, 7?n = conv(DSn).
3.3.1
Extreme Points
Consider the following combinatorial optimization problem: given a real vector (Cl,...,c~), n
maximize
~
CiX i
i:1
subject to
(3.10)
(xl,...,x~)ED3~,
or equivalently n
maximize
~ cixi i=1
subject to
(3.11)
(Xl,...,x~)CD~.
Figure 3.4 presents a very simple greedy algorithm producing an optimal solution for the problems (3.10) and (3.11). Figure 3.4: The Greedy Algorithm for problem (3.11). v := { 1 , . . . , n } ;
E :=O; for all {i, j} C_V do if ci + cj > 0
then E := E U ij od; (Xl,..., Xn) : - - degree sequence of G = (V, E).
Fact 3.3.2 1. It is clear that the algorithm produces an optimum for problem (3.10) and therefore also for problem (3.11), because adding the edge ij to E adds ci + cj to the objective function.
2. If ci + cj = 0 for some {i,j} C_ V, we have the freedom of not adding the edge ij to E and still obtain an optimal solution. This freedom is sufficient to obtain all graphs with optimal degree sequences. 3. In particular, the following conditions are equivalent:
3.3
77
The Polytope of Degree Sequences
(a) c~ + cj 7~ 0 for all {i,j} C_ V; (b) there is only one optimal degree sequence; (c) there is only one graph on the vertex set { 1 , . . . , n} with an optimal degree sequence. .
.
The algorithm can be thought of as the usual greedy algorithm of the uniform matroid on the edges of the complete graph with edge costs ci + cj. The graph G produced by the algorithm is always a threshold graph. Indeed it satisfies Condition 5 of Theorem 1.2.~, namely the vicinal preorder on V is total and coincides with the numerical order of the components ci.
We now have enough information to characterize the extreme points of Dn, a result originally proved by Koren [Kor73]. T h e o r e m 3 . 3 . 3 A degree sequence is an extreme point of T)~ if and only if
it is a threshold sequence. P r o o f . " O n l y if"" Let d be an extreme point of T~n. Then for some objective function Ein__=l CiXi, d is the unique optimum of the linear program (3.11), so the Greedy Algorithm must produce d on input (Cl,..., c~). But by Part 5 of Fact 3.3.2 the algorithm always produces a threshold sequence. Hence d is a threshold sequence. " I f " : Let d = ( d l , . . . , dn) be a threshold sequence, and let G = (V, E) be a realization of d with degree partition D o , . . . , Din. Choose c = ( c l , . . . , c~) as follows: for each vertex i E Dj, take 2j-m-l,
ci-
2j-m,
if j_< i f j > ~.
This choice of c is illustrated in Figure 3.5 for the cases m = 5 and m = 6. It is easy to check that the Greedy Algorithm with input (Cl,...,cn) outputs precisely the graph G = (V, E) and its degree sequence d. Moreover, by Part 3 of Fact 3.3.2, d is the unique optimum of the linear program (3.11). Therefore d is an extreme point of T)n. 9 As a corollary, we give a new proof of Theorem 3.2.1 without using the theorem of Havel-Hakimi. This was originally shown by Koren [Kor73].
78
Degree Sequences
Figure 3.5: Examples illustrating the proof of the "if" part of Theorem 3.3.3. A line between sets Di and Dj indicates that every vertex of Di is joined to every vertex of Dj. The ovals on the left indicate cliques.
Ira-51
Ira-01 -6
-4
3
6
|
@
-7
@
-5 -3
I
2
-1
3.3.4 (Theorem 3.2.1) A degree sequence is threshold if and only if it has a unique labeled realization.
Corollary
P r o o f . Let d be a degree sequence having realization G - (V, E) with V = { 1 , . . . , n}. Then the following statements are equivalent" 9 d is a threshold sequence; 9 d is an extreme point of 7Pn; 9 d is the unique o p t i m u m of the linear program (3.11) for some c; 9 G is the unique realization of d on the vertex set V (by Part 3 of Fact 3.3.2).
3.3.2
Adjacency
We now develop criteria for two extreme points of ~)n to be adjacent and produce a formula for the number of threshold sequences adjacent to a given one.
3.3
The Polytope of Degree Sequences
79
L e m m a 3.3.5 Let T1 = (V, E1) and T2 = (V, E2) be two threshold graphs with degree sequences f and g, respectively. If IE1/~ E21 >_ 2, then f and g are not adjacent extreme points of ~Dn (A denotes symmetric difference). P r o o f . Assume that, if possible, f and g are adjacent extreme points of Z)n. Then by Theorem 3.3.3 and the definition of adjacency there exists a c - ( C l , . . . , c~) such that c. x - E ~ I c~x~ is maximized over the threshold sequences only by f and g. Hence the Greedy Algorithm on input c will produce one of T1 and T2, say T1. Let e = ij C E1/~ E2. We have ci + cj = 0 (for otherwise e must be in all or none of the optimal graphs), and hence e C E1 according to the Greedy Algorithm. Put E3 = E1 - e . We assert that T3 = (V, E3) is a threshold graph. This is a contradiction, since T3 is different from both T1 and T2, hence its degree sequence h differs from both f and g by Corollary 3.3.4, yet h maximizes c.x. To prove the assertion, assume T3 is non-threshold. Then by Condition 2 of Theorem 1.2.4 T3 has an alternating 4-cycle, but T1 has none, so the alternating 4-cycle must involve the nonedge ij. In other words, there exist two other vertices k, 1 with ik, j l C E3 and ij, kl ~ E3. This means that ik, j l C E1 and kl C} E l , and by the Greedy Algorithm we have ci + ck >_ 0, cj + cl _> 0, ck + cl < 0, and, as noted above, ci + cj = 0. This gives the contradiction ci + cj + ck + ct >_ 0 > ci + cj + ck + cl. To prove the converse of Lemma 3.3.5, we determine in the next lemma which single edges can be dropped from or added to a threshold graph to obtain another one. L e m m a 3.3.6 Let G = (V,E) be a threshold graph with degree partition D 0 , . . . , D m , and let x C Di, y C Dj be distinct vertices. 1. If e = xy C E, the graph G - e obtained by dropping e from G is a threshold graph if and only if i + j = rn + 1. 2. If e = xy ~ E, the graph G + e obtained by adding e to G is a threshold graph if and only if i + j = rn. P r o o f . Recall that by Condition 6 of Theorem 1.2.4, xy C E if and only if i+j>rn. We begin by proving Part 1. Given that i + j = rn + 1, assume that, if possible, G - e is not a threshold graph. By Theorem 1.2.4, G - e has an alternating 4-cycle, but G does not. Therefore there exist two other vertices z , w C V satisfying xz, yw C E, zw ~ E. Let z C Dk, w C Dl. Then
80
Degree Sequences
i+k_> m+l,j+l_> m + l , and k + l < m+l. Adding the first two of these inequalities on the one hand, and adding the third one to i + j - m + 1 on the other hand, results in a contradiction. Conversely, given that i + j > r e + l , it follows that ( m + l - i ) + ( m + l - j ) < m + 1. Since e is an edge of G, we have 1 _< i , j <_ m, hence Dm+l-i and Dm+l-j are defined and distinct from Do, and thus non-empty. Moreover, there exists a vertex z C Dm+l-i such that z =fi z and hence z z E E. The reason is that if i - m + 1 - i, then m is odd and i - [~1, in which case there is room for z in D~ as IOgl _> 2 (for if ID[~] I - 1, then the single vertex of D [ ~ 1 has the same degree as the vertices of D [ ~ j , contrary to the definition of a degree partition). Similarly there exists a vertex w E Dm+l-j such t h a t w =fig and hence yw C E. If we can choose z and w as distinct vertices, then we also have zw (} E, and G - e has the alternating 4-cycle z z w y , as required. The only possible obstacle to choosing z and w as distinct vertices occurs when i - j and IDm+~-~l- 1. In that case 2i > m + 1 _> 2, hence i _> 2 and Dm+2-i is defined and distinct from Do. We may then choose a v E Dm+2-i such that v r x (the only possible obstacle to doing t h a t is m + 2 - i - i and I D i l - 1, which is not the case since both x and y are in Di). Then c e r t a i n l y w C v , a n d w v ~ E a s ( m + l - i ) + ( m + 2 - i ) _ < m + l , so G - e has the alternating 4-cycle x v w y , as required. We now derive the second part of the l e m m a by applying the first one to the complement G of G, which is also a threshold graph. To do so, we need to determine the degree partition C o , . . . , Ct of G. There are two cases to consider. C a s e 1" D 0 - r e . Then ( C 0 , . . . , C t ) ( e , D m , . . . , D 0 ) , hence l - m + l and Di -- Cm+l-i for i - 0 , . . . , m. Adding to G an edge between Di and Dj results in a threshold graph if and only if dropping from G an edge between Cm+l-i and Cm+l-j results in a threshold graph. By Part 1, the latter holds if and only if (m + 1 - i) + (m + 1 - j) - 1 + 1, i.e., i + j - m. C a s e 2: Do - e . Then ( C o , . . . , C t ) - ( D m , . . . , D 1 ) , hence 1 - m - 1 and Di - Cm-i for i - 1 , . . . , m. Again, adding to G an edge between Di and Dj results in a threshold graph if and only if dropping from G an edge between Cm-i and C~_j results in a threshold graph, which holds if and only if (m - i) + (m - j) - 1 + 1, i.e., i + j - m. " We are now ready to characterize adjacency on ~ . T h e o r e m 3 . 3 . 7 Let T~ - (V, Ea) and T2 - (I7, E2) be the (unique) realizations on the vertez-set V of the threshold sequences f and 9, respectively.
3.3
The P o l y t o p e of Degree Sequences
81
Then f and g are adjacent extreme points of Z)~ if and only if IE, /~ E2I = 1. P r o o f . The "only if" part is Lemma 3.3.5. We prove here the "if" part. Given that E 1 / ~ E2 = {e}, we may assume without loss of generality that E1 = E2 U {e}. Let D o , . . . , Dm be the degree partition of T2, and let e = xy with x C Di and y C Dj. Since adding e to T2 results in the threshold graph T1, we have i + j = m by Part 2 of Lemma 3.3.6. We consider the c given in (3.3.1) and distinguish the following two cases. C a s e 1: i ~ ~. Then one of i and j is larger than [~J and the other one is not, and therefore c~ + cy = 2i - m + 2j - m - 1 = - 1 . In this case define c~ by ,+1 ifv-xorv-y Cv Cv otherwise. C a s e 2- i - j - ~. Then c~ - cy - - 1 . In this case define c' by
_{ 0, ifv-xorv-y Cv
cv, otherwise.
Figure 3.6 illustrates c~in Case l for m = 5, i = 4 a n d j = 1. The graph produced by the Greedy algorithm on input d is also shown. In both cases it is easy to verify that the Greedy Algorithm on input c~ will produce T1 and its degree sequence f. Furthermore, since c~ + c'v - 0 if and only if {u, v} = {x, y}, the only other optimum of (3.10) with objective function c'. x is g by Part 2 of Fact 3.3.2. Therefore f and g are adjacent extreme points of Z)~. .. We now develop a condition for adjacency of two threshold sequences that does not refer to their realizations as threshold graphs. L e m m a 3.3.8 Let f = ( f l , . . . , f ~ ) be a threshold sequence with the unique realization T = (V, El) and g = (91,... ,in) a degree sequence with a realization G = (V, E2), where V = { 1 , . . . , n } . If for some i r j we have
for k - i , j otherwise,
(3.12)
P r o o f . The proof is by induction on min(gi,gj). positive components of g.
Let q be the number of
fk
_ ~ gk + l, ( gk,
then ij E El.
82
Degree
Sequences
Figure 3.6: An illustration of cI and the graph produced by the Greedy Algorithm for m - 5, i - 4, and j - 1, with the conventions of Figure 3.5.
(
t
Do )
-6
y)
-4
D1 -
1
-3 3 3~1 -2
3.3
The Polytope of Degree Sequences
83
gj) - - 0, say gj - - O. Then the number of positive components of f is q + 1 (resp. q + 2) if g~ is positive (resp. zero), and by Condition 4 of Theorem 1.2.4 the largest degree in T is q (resp. q + 1). On the other hand, the largest degree in G is at most q - 1, and so fk < q - 1 for each k -r i, j. Therefore q (resp. q + 1) - max(fi, fj), and one of the non-isolated vertices i , j of T has the largest degree in T. Therefore ij C E1 by Condition 4 of Theorem 1.2.4. I n d u c t i o n step: min(gi,gj) > 0. In this case the number of positive components of f is also q. If one of f~ and fj is q - 1, then c l e a r l y i j E El. If not, then fl - q - 1 for some 1 5r i,j by Condition 4 of Theorem 1.2.4. Then gl - q - 1, so 1 is adjacent to all non-isolated vertices in both T and G. Delete 1 from both T and G and apply induction to the resulting induced subgraphs. 9 R e m a r k . One might wish to generalize Lemma 3.3.8 by relaxing one of its assumptions. Instead of assuming Condition (3.12), we wish to assume only fk >__gk for all k, and to conclude that by dropping zero or more edges in the unique realization of f we can obtain some realization of g. Under the additional assumptions that (a) g is a threshold sequence and (b) fl >_ "'" >_ f~ and g l ~ "'" ~ gn, the conclusion is true [HIS78]. However, (a) is not enough without (b), as can be seen from the example f - (5, 5, 5, 4, 4, 3), g - (4, 1, 0,2,2,3).
B a s i s : min(gi,
T h e o r e m 3.3.9 The threshold sequences f - ( f l , . . . , f~), g - ( g l , . . . ,gn) are adjacent extreme points of T)n if and only if there exist indices i 7~ j such that 1, f o r k - i , j f k - gk O, otherwise Or
gk - f k -
1, f o r k - i , j O, otherwise.
P r o o f . The "only if" part follows easily from Theorem 3.3.7. For the "if" part, assume without loss of generality that Condition (3.12) holds. Let T1 = (V, El) and/12 - (V, E2) be the unique realizations of f and g respectively on the vertex set V - { 1 , . . . , n } . Then ij E E1 by Lemma 3.3.8, and from the uniqueness of realizations of threshold sequences, it follows that E2 E1 {i j}. The result now follows from Theorem 3.3.7. 9
84
Degree Sequences
The next theorem exhibits the threshold sequences adjacent to a given threshold sequence d without referring to its realization, except for its degree partition, which is easily read from d itself. T h e o r e m 3.3.10 Let f be a threshold sequence of length n and D o , . . . , Dm the degree partition of its realization on the vertex set { 1 , . . . , n}. The threshold sequences g adjacent to f on Dn are precisely the ones obtained in one of the following two ways: 1. choose some r set
0 , . . . , L~] and distinct indices i e D~, j E Dm_~ and fk,+l, fk
gk -
fork-i,j otherwise;
2. choose some r = 1 , . . . , [m@lJ and distinct indices i C DT, j e Dm+l-r and set fk - 1 , for k - i , j gkfk, otherwise.
l
P r o o f . This follows from Lemma 3.3.6 and Theorem 3.3.7. ,, The next result counts the extreme points of D~ that are adjacent to a given one. T h e o r e m 3.3.11 Let f = (f 1 , . . . , f n ) be a threshold sequence with a realization having degree partition D o , . . . , Din. Then the number of extreme points of l?,~ adjacent to f is equal to
ID~lIDm-~l + r=0
ID~IIDm+I-~I + r=l
IDql 2
where q P r o o f . This follows from Theorem 3.3.10. In particular, the binomial coefficient accounts for the cases where i and j are in the same block of the degree partition. " We can now determine the threshold sequences with the largest and smallest number of adjacent sequences. T h e o r e m 3.3.12 Let f = ( f l , . . . , fn) be a threshold sequence with a realization G having degree partition D o , . . . , Din.
3.3
85
T h e P o l y t o p e of D e g r e e Sequences
~
The number of extreme points adjacent to f is a maximum, equal to
if aria only if
of
foUo
g hota "
fi-O
for all i;
9 G is stable, i.e., 9 G is a clique, i.e., fi-n-1
for all i;
9 G is a star, i.e., for some j
fi
_~
fori-j fori #j;
n-l, 1,
9 G is a costar, i.e., for some j fi
,
fori-j
_ J" o,
~-2, fo~i#j.
The number of extreme points adjacent to f is a minimum, equal to n, if and only if [D~ I - 1 for i # 0, [~1 IDFmll
(3.13)
- 2 m
iDol
- n-
y ~ iDol. i=1
P r o o f . 1- By T h e o r e m 3.3.7, the n u m b e r of neighbors of f equals the number of ways in which we can add or drop an edge to or from G and preserve its thresholdness. This is obviously at most (~), and this upper bound is achieved if and only if every present edge can b e dropped and every absent edge can be added. By L e m m a a.a.6 this happens if and only if every present edge joins Di to Dm+l-i for some i and every absent edge joins Di to D,~-i for some i. It follows from this condition that m _< 2, for otherwise G has edges between Dm and Din-1 e v e n though m + ( m - 1) > m + 1. Moreover, if m - 2 we must have ID21 - 1, otherwise there are edges within D2 e v e n though 2 + 2 >~- m + 1. In case m - 0, G has no edges and f - 0. In case m - 1, [D01 must be 0 or 1, for otherwise there are absent edges joining Do to itself even though 0 + 0 < m; thus G is a clique or a costar. In case m - 2
86
Degree Sequences
we must have ] D 2 1 - 1 as observed above, and also ID01- 0, for otherwise there are absent edges between Do and DI even though 0 + 1 < m; thus G is a star in this case. It is easy to see that conversely, the degree sequences of a stable set, a clique, a star and a costar do meet the upper bound. 2" We denote d i - ]Di] and consider the parity of m. C a s e 1" m - 2p. Then dp _> 2 (otherwise the single vertex of D; has the same degree as the vertices of Dp+l). From Theorem 3.3.11, the number of extreme points adjacent to f is
E did2p-i + i=0
did2p-i+l + i=1
= dod2p -Jr-E did2p_i + i=1
did2p_i+l -nti=1
>_ d o + ( p - 1 ) + ( p + l ) + l =
d0+2p+
1.
This lower bound is achieved if and only if equalities (3.13) hold. In that case the value of the bound is do + 2 p - 1 - (n - ~i=1 2; di) + 2p + 1 - n. C a s e 2" m - 2p + 1. Then dp+l > 2 (otherwise the single vertex of D;+I has the same degree as the vertices of D;). The rest of the analysis is similar to Case 1. 9
3.3.3
Linear Description and Facets
In this subsection we use linear programming duality and the structure of threshold graphs to provide a linear description of Dn. Lemma
3 . 3 . 1 3 Let S and T be disjoint subsets of { 1 , . . . , n } .
Then the
inequality xi- ~xi
_< ] S [ ( n - 1 - I T ] )
(3.14)
iES lET is valid for I)n. Moreover, the degree sequence of a graph G satisfies (3.1~) with equality if and only if 1. S is a clique of G; 2. T is a stable set of G; 3. every vertex of S is adjacent to every vertex of S U T in G;
3.3
87
T h e P o l y t o p e of D e g r e e Sequences
~. no vertex of T is adjacent to any vertex of S U T in G.
P r o o f . To show that (3.14) is valid for T~, we may assume that x is the degree sequence of a graph G. Set C - {ij 9 i E S , j E T}. It is easy to see that
x~ _< ISI(n - 1 - I T I ) + ICI,
(3.15)
iES
equality holding if and only if Conditions 1 and 3 of the lemma hold; ,
- ~ xi <_ -ICI,
(3.16)
iET
equality holding if and only if Conditions 2 and 4 of the lemma hold. By adding (3.15) and (3.16)we obtain (3.14)and the "moreover" part. T h e o r e m 3.3.14 7:)n is determined by the linear inequalities (3.14) for all sets S and T such that 0 7~ S U T C { 1 , . . . , n } and S M T - 0 . P r o o f . Denote by Z)~n the polytope defined by the inequalities (3.14). By Lemma 3.3.13, we have Z)~ C_ 79~. To show that 79~ - 79'n, it is enough to show that for an arbitrary vector c = (Cl,..., cn) E N n, the linear program (3.11) has the same optimal value as the linear program n
maximize
~ CiXi i=1
subject to
(3.17)
(3.14).
We know that the Greedy Algorithm produces an optimal solution d of (3.11), and so the theorem will be proved if we can show that d is an optimal solution of (3.17). The dual of (3.17) uses variables YS,T for each pair ( S , T ) such that O r SUTC_{1,...,n}, SNT-O. It reads: minimize
~
ISl(n - 1 -IT])YS,T
subject to
~ YS,T
--
E YS,T
Sgi Tgi YS,T >_ O.
--
ci
for i - 1 , . . . , n,
(3.18)
88
Degree Sequences
To show that d is an optimal solution of (3.17), it suffices to produce a feasible solution y of (3.18) that satisfies the complementary slackness conditions: YS,T
> 0
only if
~ diiES
Z di -iET
ISl(
- 1 -ITI).
(3.19)
(This uses only weak duality; strong duality asserts that if in fact d is optimal for (3.17), then such a y exists; we do not need this result, as we construct y explicitly.) Let G = (V, E) be the graph produced by the Greedy algorithm on input c. We may reindex the variables so that r
~_ "'" ~ C r
< 0 ~ Cr+ 1 ~
"'" ~ C n
(3.20)
and thus I - { i " ci < 0} - { 1 , . . . , r ) is a stable set of G and K - {i" c~ _> 0} - { r + l , . . . , n } is a c l i q u e o f G . From the nature of the Greedy Algorithm it is clear that N(1) c_ ... c N ( r )
(3.21)
N ( r + 1) ffl I C . . . C N ( n ) ffl I.
(3.22)
Consider the following pairs of sets (Si, Ti) for i Figure 3.7:
1 , . . . ,n, illustrated in
for i E I
(3.23)
for i E K.
(3.24)
Si --
N(i)
and S~ - { i , . . . , n } T~ - I - N ( i )
It is easy to see, using (3.21) and (3.22), that each pair (S~, T~) satisfies the conditions of L e m m a 3.3.13, and therefore satisfies (3.14) with equality. We shall find a feasible solution y of the dual problem (3.18) with the restriction that ys, T > 0 only if ( S , T ) - (S~,T~) for some i. Such y will therefore automatically satisfy the complementary slackness condition (3.19) and the proof will be complete. Since Si C_ I'( and Ti C_ I for each i, and by the definition of I( and I, we may rewrite the dual feasibility conditions (3.18) that our n unknowns 9s,,r,
3.3
89
T h e P o l y t o p e of D e g r e e S e q u e n c e s
Figure 3.7 9 Illustrating the choice of dual variables in the proof of Theorem 39149
Si
T/
%
Si
....- 3x.~ 1
r+le
r+le
or
K
er
K
I
I
are supposed to satisfy as follows:
E y~,,~, -Icjl,
j CI
(3.25)
E Ys,,r, -Icjl,
j EK
(3.26)
S, gj
YSi,T, >_ O.
Our remaining task is thus to show that the linear equations (3.25)-(3.26) have a non-negative solution. For each j E { 1 , . . . , n}, let Pj be the set of all indices i such that YS,,T, appears in the j-th equation of (3.25)-(3.26). Then by (3.22)-(3.24) we h~w, forj CI,
Pj -
{i.jcT~}-{iEI'i>j}U{iCK'ij~E}
=
{iEI'i>_j}U{iCK'ci<
=
{i E I " i >_ j } tO {i E
Icjl}
K'lc~l
<
Icjl},
(3.27)
90
Degree Sequences
and for j C K, Pj
-
{i " j E Si} - {i c I f " i <_ j } U {i C I " ij c E }
=
{i C K ' i
=
{i E K " i <_ j } U {i C I ' l c j l >_ [cil}.
_<j}U{i E I'cj
>_ Ic l}
(3.28)
Let 7r(1),..., ~r(n) be the permutation of 1 , . . . , n that sorts the components of c in nondecreasing absolute values, resolving ties as follows: within I reverse the original order, within K maintain the original order, and place all components of I before equal components of K; in other words, 1. Icr(1)l _~ - ' ' ~ 2. if
Ic (01 -Ic (j)l
for some i -7(:j, then < 0 > 0
if r e I if 7c(i),~r(j) e K,
(a)
(i - j)(Tr(i) - 7r(j))
(b)
7r(i) < 7r(j) if 7r(i) C I,~r(j) e K.
Then P r ( j ) - {Tr(1),...,Tr(j)} by (3.27) and (3.28). We now rearrange the n equations (3.25)-(3.26) so that the t-th new equation is the 7r(t)-th old equation, and also rearrange the n unknowns YS~,T~ so that the t-th new unknown is Ys,(,),T,(~). The new system has the form A y - b where the coefficient matrix A has zeros above the main diagonal and ones everywhere else, and the components of b are nonnegative and nondecreasing. This system has a unique, nonnegative solution y, as required.
C o r o l l a r y 3.3.15 The system (3.14) of linear inequalities is totally dual integral; that is, whenever C l , . . . , cn are integers, the dual of the linear program (3.17) has an optimal solution in integers. 9 For more information on totally dual integral systems, see [EG84, PayS0, Sch86]. In order to identify the facets of ~ , we need to know its dimension and the dimension of a related polytope. For m > 1, n > 1, let Km,~ denote the complete bipartite graph with bipartition { 1 , . . . , m } , {m + 1 , . . . , m + n}, and let Z)m,~ denote the convex hull of the degree sequences of the spanning subgraphs of Km,n (just as T)n is the convex hull of the degree sequences of the spanning subgraphs of K~, the complete graph on { 1 , . . . , n}).
3.3
91
The Polytope of Degree Sequences
Lemma 3.3.16
1. dim ~)1 -- O, dim 792 - 1;
2. dim/)m,~ - m + n - 1 for m >_ 1, n >_ 1; 3. dim:Dn - n f o r n > 3. P r o o f . 1" This is clear. -~m+n 2: Since/)m , n is contained in the hyperplane ~ i m= l xi __ xz_.i=m+l xi, we have dim/)m,n _< m + n--1. To prove the reverse inequality, consider any spanning tree of Km,n and let A be its edge-vertex incidence matrix. The m + n - 1 rows of A are linearly independent, and each of them lies in /)m,n. Hence dim/)m,~ >_ m + n - 1. 3" Koren [Kor73] proved this fact by showing that/:)n has interior points for n >_ 3. We prove it as follows. For n odd, let H be any Hamiltonian cycle in Kn, and for n even, let H consist of any cycle through n - 1 vertices and a single edge at the remaining vertex. Let A be the edge-vertex incidence matrix of H. In each case A is nonsingular and its rows lie i n / ) ~ . Hence dim Dn > n. Theorem
3 . 3 . 1 7 For n >_ 4, the facets
of ~) n
are
the following:
1. inequalities (3.1~) f o r all sets S, T such that S 5r 0 , T 5r ~g, S N T - 0 , S U T C_ { 1 , . . . , n } , I S u T I - 2 , . . . , n - 3 , n; 2. xi > 0 f o r i - 1, . . . , n; 3. xi < n -
l fori-
1,...,n.
The facets of 2)a are only of the f o r m 1 above.
P r o o f . By Theorem 3.3.14, every facet of 7Pn has the form of inequality (3.14) for some sets S, T with O :/- S U T C_ { 1 , . . . , n}, S N T - O. Let 7PS,T denote the convex hull of the degree sequences satisfying (3.14) with equality. Thus by Part 3 of L e m m a 3.3.16, (3.14) is a facet of Dn if and only if dim DS, T -- n - 1. From L e m m a 3.3.13 it follows that dim DS, T -- dim DIsI,IT I + dim Z)ISuTI, where dim Z)ISI,ITI is understood to be 0 if either S or T vanishes and dimD0 is 0. Thus for S - e , (3.14) is ~ facet of Z)n if and only if ITI 1 and ITI >_ 3, which means that n >_ 4 and T - {i} for some i, and gives
92
Degree Sequences
the facet xi >_ O. Similarly for T - O, (3.14) is a facet if and only if Isl 1 and Isl _ 3, which implies that n _> 4 and gives the facet xi _< n - 1. Finally i f S - ~ e and T r e , (3.14) is a facet if and only if IS'l + I T I - 1 + dim Z)lsur I = n - 1, or equivalently dimZ)lsur I = IS u TI, which holds if and only if IS t2 T I - 0, 3, 4 , . . . , n - 2 by Lemma 3.3.16. This case corresponds to 1 of the lemma. 9 We mention in closing this subsection the work of Stanley [Sta91], which discusses all the faces of Z)~.
3.4
Difference Sequences
In this section we characterize the degree sequences of difference graphs and show that they play among bipartite degree sequences a role similar to the one played by the threshold sequences among all graphical sequences. A s p l i t s e q u e n c e is the degree sequence of a split graph. Note that if one realization of a degree sequence is a split graph, then all its realizations are split graphs. This follows from Theorem 3.1.11, since every alternating 4-cycle of a split graph G ( K , S ) must alternate between K and S, and a transfer along it leaves K as a clique and S as a stable set. The role of split and threshold sequences among all graphical sequences is depicted in the following result. T h e o r e m 3.4.1 Let d - (dl,... ,dn) be a proper sequence with an even s u m and a corrected Durfee n u m b e r rn. Then 1. d is a graphical sequence if and only if it satisfies the first rn Erd5sGallai inequalities (3.3); 2. d is a split sequence if and only if it satisfies the first rn E r d S s - G a l l a i inequalities, the rn-th one with equality; in this case d has a split realization G( {1, . . . , rn } , { rn + 1, . . . , n } ) ; 3. d is a threshold sequence if and only if it satisfies the first rn ErdSsGallai inequalities with equality.
P r o o f . Part 1 is Theorem 3.1.9 and Part 3 is Condition 4 of Theorem 3.2.2. Part 2 follows from Part 1, the fact that the m-th Erd6s-Gallai inequality can be written as Eirn=l d i -Ein.=m+l di ~ ?Tt(?Tt- 1) (see Equation 3.9), and L e m m a 3.3.13. 9
3.4
Difference
93
Sequences
To formulate analogous results for bipartite graphs, we say that a pair of integer sequences x = ( x l , . . . , x p ) and y = ( y l , . . . , y q ) is b i p a r t i t e resp. d i f f e r e n c e r e a l i z a b l e if there exists a bipartite resp. difference graph whose color classes have degrees x and y. The following famous characterization of bipartite realizable pairs of sequences is known as the Gale-Ryser Theorem. Several proofs can be found in [BerT6, FF62, MO79]. We give here a short proof using Theorem 3.4.1. Theorem
3.4.2 A pair of non-negative integer sequences X-
(X 1 ~__ " ' "
~
Xp) and
y-
(Yl ~__ " ' "
_~
Yq)
with Yl <_ P is bipartite realizable if and only if x ~ y*, where y * is the conjugate of y.
P r o o f . Without loss of generality we may assume that xp _> 1, yq > 1, and Yl _~ p - 1, for otherwise delete xp or yq or delete yl and decrease each xi by 1 without affecting the bipartite realizability or the majorization. Clearly x and y are bipartite realizable if and only if the sequence xl+p--1
>_ "" > _ X p + p - - 1 > yl > -- ... >_yq
(3.29)
is a split sequence. For this sequence m - p, since Yl __~ P - 1. Also since xp _> 1, the first p Erd6s-Gallai inequalities for this sequence can be written as k
p
i=1
q
~
k+~min(k,
i=k+l
i=1
~-~(xi+p-1)_
yi)
for k - 1 , . . . , p ,
or equivalently as k
k
xi<_~_~y7 i=1
fork-1,...,p.
(3.30)
i=1
Now if x and y are bipartite realizable, then (3.29) is a split sequence, and so by Part 2 of Theorem 3.4.1 it satisfies inequalities (3.30), the p-th one with equality. Conversely, if it satisfies these inequalities, the p-th one with equality, then from the first inequality Xl _< q and so the sequence is proper, and from the p-th the sequence has an even sum, hence it is a split sequence by Part 2 of Theorem 3.4.1. 9
94
Degree
Sequences
T h e o r e m 3.4.3 A pair of non-negative integer sequences X ----(X 1 ~
"'"
~
Xp) and y
= (Yl ~_ " ' "
_~
Yq)
with yl ~_ p is difference realizable if and only if x = y*, where y* is the conjugate of y. Proof. This is similar to the proof of Theorem 3.4.2, using Part 3 of Theorem 3.4.1. 9 In further developing the analogy between general and bipartite degree sequences, we define now the polytope of bipartite degree sequences with given partition, and show that it is a translation of the facet of the polytope of degree sequences associated with that partition. The extreme points of the former polytope are precisely the difference sequences with the given partition, just as the extreme degree sequences are precisely the threshold sequences. All the bipartite graphs below have color classes So = { 1 , . . . , p } and To = { p + l , . . . , n } , wheren = p + q . We say that they and their degree sequences have the fixed partition (So, To). In analogy with Definition 3.3.1, we denote by DSp,q the collection of all bipartite realizable sequences with partition (So, To). The p o l y t o p e of b i p a r t i t e degree s e q u e n c e s is defined as the convex hull of 7:)Sp,q: 7?p,q = conv(7:),S'p,q). According to Theorem 3.3.17, the polytope of degree sequences T)n possesses the facet P
n
xii=1
~
xi <_ p ( p - 1 ) ,
(3.31)
i=p+l
which we denote by Fso,To. The results below are from [PS89b]. T h e o r e m 3.4.4 For a given partition (So, To), consider the constant nvector c = ( p - 1,... , p - 1 , 0 , . . . , 0 ) , where the first p components are p - 1 and the last q components are O. Then
1.
= {xby - c ;
x
F o,% },
fac t F o,% of
t, an at d
3.4
Difference Sequences
95
2. the extreme points of Z)p,q are precisely the difference sequences with partition (So, To). P r o o f . 1: Since each convex polytope is the convex hull of its own extreme points, it is sufficientto prove that d - c C T~Sp,q if and only if d is a degree sequence lying on Fso,To. For the "if" part, we have by L e m m a 3.3.13 that every realization of d is a split graph G(So, To), from which it follows that d - c has the bipartite realization obtained by dropping from G the edges in So. The "only if" part applies this argument in reverse. 2: By Theorem 3.3.3 and L e m m a 3.3.13, the extreme points of the facet Fso,ro of 7P~ are precisely the threshold sequences with realizations of the form G(So, To). But by Theorem 2.1.9 d has this property if and only if d - c is difference realizable with partition (So, To). The result then follows from Part 1 of our theorem. .. Part 8 of Theorem 3.2.2 characterizes the threshold sequences as the maximal graphical sequences under the partial order of majorization. An analogous result holds for difference sequences among the bipartite realizable sequences with a given partition. 3.4.5 A bipartite realizable pair (x,y) is difference realizable if and only if there does not exist a bipartite realizable pair (z,y) such that z;,.- x.
Theorem
P r o o f . Let x - ( x 1 ~ . - . ~ Xp) and y - ( y l >_ " " >_ yq). The proof is by induction on p + q. The result is trivial if p - 0 or q - 0. Assume therefore that p >_ 1 and q >_ 1. We distinguish the following cases. C a s e 1" Yl < P- Then by Corollary 2.4.5 (x, y) is difference realizable if and only if xp - 0 and (x', y ) i s difference realizable, where x ' - ( X l , . . . , Xp_l). The condition xp - 0 is superfluous, as it follows from the bipartite realizability of (x, y) and (x', y). By induction (x', y) is difference realizable if and only if there does not exist a bipartite realizable (z', y) with z' ~- x'. This is true in turn if and only if there does not exist a a bipartite realizable (z, y) with z ~- x (if z' exists, take z - (z', 0); conversely if z exists, then p >_ 2 and permuting the components of z so that Zl _> " - >_ zp, we can take
z ' - (Zl + C a s e 2" Yl - - P" Then by Corollary 2.4.5 (x, y) is difference realizable if and only if (x",y")is difference realizable, where x " - ( x ~ - 1 , . . . , x p - 1) and y " - (y2,..., yq). By induction (x", y " ) i s difference realizable if and only if there does not exist a bipartite realizable (z", y") with z" ~- x". This is true
96
Degree Sequences
in turn if and only if there does not exist a bipartite realizable (z, y) with z ~- x (if z" exists, take xi - z it! + 1; conversely if z exists, then zp _> 1 and take z it l - z i - 1). ,, We conclude this section by showing how to recognize difference sequences when the partition is not given. T h e o r e m 3 . 4 . 6 L e t d - ( d a , . . . , dn) be a sequence of positive integers. Let di - m a x ( d l , . . . , d n ) and put eo - n - di. Then 1. if d is a difference sequence, then there exists some j 5r i such that dj - Co; 2. if there exists some j r i such that dj - Co, let d' be obtained f r o m d by dropping two entries equal to di and dj and subtracting 1 f r o m the remaining entries. Then d is a difference sequence if and only if d' is.
Proof.
1. Assume that there is a difference graph G with bipartition (X, Y) and degree sequence d. Since the degrees di are positive, G has no isolated vertex. By Corollary 2.4.5, each one of X and Y has a dominating vertex. Hence the result. 2. If G is a difference graph with bipartition (X, Y) and degree sequence d, we may assume without loss of generality that di is a degree of a vertex in X. By Corollary 2.4.5, X has a dominating vertex x, whose degree must be di, and Y has a dominating vertex y, whose degree must be e0. Then G - {x, y} is a difference graph with degree sequence d'. The converse is shown in a similar way.
From Theorem 3.4.6, one can easily give a linear-time algorithm to test whether a given sequence is a difference sequence. The details are omitted.
Chapter 4 Applications 4.1
Introduction
In this chapter we consider some applications of threshold graphs. Section 4.2 deals with aggregations of inequalities in 0-1 programming. Section 4.3 treats synchronizing competing processes in a complex system such as a large computer. Section 4.4 discusses job scheduling. Section 4.5 introduces G u t t m a n scales in psychology.
4.2
Aggregation of Inequalities
Chvgtal and Hammer [CH73, CH77] coined the name "threshold graphs". Their motivation for introducing these graphs was the aggregation of linear inequalities in integer programming. Consider the set-packing problem whose constraints are A x < 1,~ x binary,
(4.1)
where A is an m x n 0/1 matrix and lm is the m-vector of l's. If m is large compared to n, it takes much storage to store the matrix A of coefficients. This motivates the search for a t x n matrix B, not necessarily 0/1 but with t smaller than m, such that the constraints (4.1) are equivalent to the constraints B x < It (4.2) x binary, 97
98
Applications
in the sense that both constraints have exactly the same solutions. The constraints (4.2) are referred to as an aggregated form of the constraints (4.1). It is important to emphasize that both sets of constraints use the same set of binary variables. We can always obtain a single equation equivalent to (4.1) by adding slack variables to convert (4.1) into equations and taking an appropriate linear combination of these equations, but this uses more variables. Naturally, one is interested in the smallest possible t such that (4.2) is equivalent to (4.1). It is denoted by t(A). In particular we wish to know whether t(A) - 1, namely whether the constraints (4.1) can be aggregated into a knapsack constraint in the same binary variables. Consider the intersection graph G - (V, E) of the columns of A, namely V - { 1 , . . . , n} and ij C E if and only if the i-th and j - t h columns of A have a 1 in a common row (every graph can be obtained in this way from its own edge-vertex incidence matrix and possibly from other 0/1 matrices). Clearly, a binary vector satisfies the constraints (4.1) if and only if its support is a stable set of G. Thus the constraints (4.1) can be aggregated to a knapsack constraint if and only if G is a threshold graph. It turns out that t(A) depends only on G and not on A itself. We define the threshold dimension t(a) of ~ graph G - (V, E) as the smallest integer k such that E can be covered by k threshold spanning subgraphs of G. The relation of this definition to the more usual usage of the term "dimension" in connection with intersections is that t(G) is the smallest k such that the complementary graph G is the intersection of k threshold graphs. Chapters 6 and 7 treat the threshold dimension in more detail. Our purpose here is to present the result of Chvs and Hammer that t ( A ) - t(G). T h e o r e m 4.2.1 ([CH77]) Let A be a 0/1 matrix with intersection graph
G. Then t(A) - t(G). P r o o f . Assume that G is covered by t threshold subgraphs G1,..., Gt. Each G~ has by definition a separating inequality b(~). x <_ 1. Let the b(~) form the rows of a matrix B. Now the following are seen to be equivalent for a binary vector x" 1. x satisfies (4.1); 2. the support of x is a stable set of (7;
4.3
Synchronization
99
3. the support of x is a stable set of each G~; 4. b(i)- x _< 1 for each r;
5. Bx < lt. Therefore the set-packing constraints can be aggregated into as few as t linear inequalities in the same variables, i.e., t(A) <_ t(G). Conversely, assume that the constraints (4.1) and (4.2) are equivalent. Let G - (V,E). For r 1 , . . . , t , define the graphs G~ - (V,E~) on V = { 1 , . . . , n} by the following"
ij E E~ .+---->.B~ + Brj > 1. If ij C E~, then the characteristic vector of {i,j} violates (4.2), hence it also violates (4.1) and so ij C E. Thus each G~ is a subgraph of G. Likewise, if ij ~ E~ for each r, then the characteristic vector of {i,j} satisfies (4.2) and (4.1) and so ij ~ E. Thus the G~ cover E. We now show that each G~ is a threshold graph. Indeed if not, then by Condition 2 of Theorem 1.2.4 G~ has an alternating 4-cycle i, j, k, 1 with
Bri + Brj > 1
Bri A- Brk < 1 B~j + B~t < 1.
These inequalities are clearly contradictory and so G~ is indeed a threshold graph. Therefore E can be covered by as few as t threshold subgraphs of G, i.e., t(G) < t(A). ,,
4.3
Synchronization
In this section, based on the work of O r d m a n [Ord85, Ord86, Ord89], we consider the problem of synchronizing processes running in parallel in a large system such as a computer. The processes require some resources such as an output device or access to a memory location, and it may happen that several processes cannot use a resource at the same time. We then need a mechanism that will not allow a process to enter a phase wherein it uses the resource until such time as this usage will not conflict with that of other processes. Such mechanism is said to ensure mutual exclusion. We ignore other problems here, such as preventing deadlock of the whole system and ensuring a finite waiting time for each process.
100
Applications
What is usually done is that each process has a section of its program, called the critical section, where it uses the resources in competition with other processes. Before it enters its critical section, the process executes an entry routine, designed to verify that it is safe to do so. After it completes its critical section, the process executes an exit routine, to record the fact. The communication between the processes is done entirely in terms of integer shared variables. Access of the shared variables is done via operations known as synchronizing primitives. In the entry routine of the test-and-set synchronizing primitive, the process keeps examining a shared variable until the latter reaches a fixed set of values, and then resets the value of the shared variable, and control passes to the next statement. This may be written in the following way: test V until V C S then V := function(V). The exit routine does not need the test of V, but it can formally be described by the same kind of statement by letting S contain all possible values of the variable V. A restricted special case of test-and-set is the P V-chunk synchronizing primitive. It can be described by a statement of the form test V until V > c then V := V - c , where c is a constant that can depend on the process in question. The variable V is initialized to some positive value, and the above statement ensures it never becomes negative. The exit routine can be described by the same kind of statement with a negative c, and has the effect of simply increasing V. Thus V can be thought of as a semaphore indicating the available quantity of some resource. The process needs at least c units of the resource, and as soon as this quantity is available, the process enters its critical section and decreases V by c. Upon exiting it increases V by the same amount to signal that it no longer uses the resource. The minimal sets of processes that cannot be in their critical sections simultaneously form the edges of a certain hypergraph on the set of processes. We consider the case that this hypergraph is in fact a graph G, namely that each minimal set of processes that cannot be in their critical sections simultaneously consists of exactly two processes. The graph G is called the exclusion graph of the processes. If G is a threshold graph with separator }-'~in_=lWiXi ~ t, then mutual exclusion can be achieved by using one PV-chunk variable V initialized to
4.3
Synchronization
101
the value t. The entry routine of processor i is to test V until V >_ wi ~Lndthen decrease V by wi; its exit routine is simply to increase V by wi. Conversely, if a single PV-chunk variable suffices, then G is a threshold graph. This was recognized by Henderson and Zalcstein [HZ77], who defined threshold graphs by this property and found many of their properties. They called these graphs PV-chunk definable graphs. Clearly, if the exclusion graph G of the processes is a threshold graph, the minimum number of resource units needed to ensure mutual exclusion by means of PV-chunk operations is equal to the Orlin threshold t of G as given in Section 1.3. The state of the resource is expressed by the PV-chunk variable V, which can assume the t + 1 values 0 , . . . , t. We show below that when the exclusion graph is a threshold graph, even if mutual exclusion is performed by means of the more powerful testand-set synchronizing primitives, the shared variables must be able to assume at least t + 1 collective states. If the exclusion graph G is not a threshold graph, we have to use several PV-chunk variables, say V I , . . . , V~. Each variable Vk represents a separate resource type and each process i requires a certain quantity wki of this resource. A set of processes with a characteristic vector z can be in their critical sections simultaneously if and only if ~in=l WkiZi <__ tk for each k, where tk is the available amount of resource k. In other words, a set of vertices of the exclusion graph is stable if and only if its characteristic vector z satisfies W x <_ t. These considerations make the following result clear. T h e o r e m 4.3.1 ([Ord85]) Let G be the exclusion graph of the processes. The minimum number of resource types needed to ensure mutual exclusion is equal to the threshold dimension of G. Apart from minimizing the total number of resource types needed to ensure mutual exclusion, we are interested in minimizing the total number of units of all resource types, namely Ek tk. In other words, for a given graph G, we wish to cover G by threshold subgraphs Gk having Orlin thresholds tk, and minimize Ek tk over all such coverings. We denote this minimum by U ( G ) . We show below that U(G) is equal to the edge clique cover number e c ( G ) of G, namely the minimum number of cliques needed to cover the edges of G. To this end we prove the following result. T h e o r e m 4.3.2 ([Ord85]) Let G be a threshold graph with Orlin threshold t and edge clique cover number c. Then
c
102
Applications
P r o o f . Let G = (V, E). Let D o , . . . , Dm be the degree partition of D, and let S be a largest stable set of G. The set S consists of Do U ... U D L~J plus one vertex of D [ ~ ] in case m is odd. For each v E S -
Do, the closed
neighborhood N[v] is a clique, and these cliques cover E. Moreover, these cliques constitute a smallest clique covering of E, since each vertex v E S - D o is incident to some edge ev, and no clique can cover edges ev and eu if v -~ u. Therefore
-
ISl -
IDol
-
IDol + i=1
_< (1 +
- L J)
(r- l
-
j (1 + IDol)-
k -J)
1 - t,
i=1
where the inequality follows from 1 + E xi _< I-I(1 + xi) for x~ _> 0, and the last equality is a restatement of Equation (1.19). This proves that c _< t. The inequality t + 1 _< 2 c follows similarly from 1 + xi _< 2x~ for integer xi >_ O. 9 We can now prove that the minimum total number of units required for mutual exclusion is equal to the edge clique cover number. T h e o r e m 4.3.3 ([Ord85]) For every graph G, U(G) - ec(G). P r o o f . Cover the edges of G with ec(G) cliques. Each clique is a threshold graph with Orlin threshold tk = 1, and the total of these thresholds is ec(G). Therefore U(G) <_ ec(G). To prove the reverse inequality, cover the edges of G by threshold subgraphs Gk with Orlin thresholds tk satisfying ~ k t k = U(G). By Theorem 4.3.2 the edges of each Gk can be covered by tk or fewer cliques of Gk. Therefore the edges of G can be covered by U(G) or fewer cliques of G, so that ec(G) <_ U(G). i We have now characterized the required number of resource types as the threshold dimension, and the total number of resource units required as the edge clique cover number, for arbitrary exclusion graphs. The problem of characterizing the storage requirements in bits is considerably harder, and we solve it only for threshold exclusion graphs. Intimately related to this is the problem already mentioned of the total number of states of the test-andset variables required for mutual exclusion.
4.3
Synchronization
103
If a variable is capable of assuming the values 0 , . . . , v, then it has v + 1 possible states, and to distinguish them requires #v - [(log 2 v + 1)1 bits of storage. If we have several such variables Vk capable of assuming the values 0 , . . . , vk, then collectively they have 1-I(vk + 1) states and require #vk bits of storage. If the exclusion graph G is a threshold graph with Orlin threshold t, we can ensure mutual exclusion by using one PV-chunk variable capable of assuming the values 0 , . . . , t with storage requirements of #t bits, or by covering G with ec(G) cliques having Orlin thresholds of 1 with storage requirements of ec(G) bits. By Theorem 4.3.2 #t <_ ec(G), and so the first method requires no more storage than the second. We may ask what happens if we cover the edges of G by other threshold subgraphs, i.e., use some other PV-chunk variables, or more generally what the storage requirement are if we ensure mutual exclusion by means of test-and-set variables. The following result answers this question when G is a threshold graph. T h e o r e m 4.3.4 ([OrdS9]) Let the exclusion graph of the processes be a threshold graph with Orlin threshold t. If mutual exclusion is ensured by means of test-and-set shared variables, then these variables must have at least t -4- 1 collective states. P r o o f . Assume that, if possible, the number of collective states of the shared variables is at most t. Let D o , . . . , Dm be the degree partition of the threshold graph G in the theorem. We put r - [~] and define the sets X 1 , . . . , X~ of vertices by Xi = Di for i = 1 , . . . , r except that X, is just a single vertex of D, if m is odd. As in the proof of Theorem 4.3.2, the set S = X1 U --. U X~ is a m a x i m u m stable set of G and t is given by the equation
t+ 1- fi(l+xi), i=1
where xi = IXil. Therefore there are exactly t + 1 integer r-tuples a = (al,... ,at) satisfying 0 <_ a~ <_ x~ for all i. It is possible to list these rtuples so that successive r-tuples agree in all but one component, where they differ by 1. This is done by a variant of the Gray code as follows. Recursively list the r-tuples a with a, = 0, starting from ( 0 , . . . , 0 ) and ending with ( a ~ , . . . , a , _ l , 0 ) , say. Continue with ( a ~ , . . . , a , _ ~ , l ) and go
104
Applications
through the previous list in reverse with last component 1 till ( 0 , . . . , 0, 1). Continue with ( 0 , . . . , 0 , 2 ) through ( a ~ , . . . , a r _ ~ , 2 ) , then ( a l , . . . , a ~ _ l , 3 ) , through ( 0 , . . . , 0, 3), and so on. We order each set Xi linearly in some fixed manner. With each of our r-tuples a we associate a subset Ra consisting of the first ai vertices of Xi for each i. We have therefore a list of t + 1 stable sets of G, where successive sets differ by exactly one vertex. Each set R~ corresponds to the state S~ of the processors in which the processors of Ra and no others are in their critical sections. Thus we have a list of t + 1 states of the processors in which each state is obtained from the previous one by one processor entering or leaving its critical section. Since each state corresponds to a stable set of the exclusion graph G, the system can actually evolve from each state to the next without processor conflict. Since we have t + 1 different states of the processors and by hypothesis at most t collective states of the shared variables, there must exist r-tuples a -r b such that the shared variables agree in states S~ and Sb. We may assume without loss of generality that aj < bj and aj+l = bj+l, . . . , ar = br. Now starting from Sa and from Sb, let the first ai processes of Xi leave their critical sections one by one and in the same order, for all i = j + 1 , . . . , r. Then let the last aj active processors of Xj leave their critical sections. We obtain the states S(al .....aj_l,0 .....O) and S(bl .....b~_~,bj-~j,0,...,0) respectively, in which the shared variables still agree. But in the first state a processor of D m + l - j may enter its critical section, and in the second state it may not, contradicting the assumption that the shared variables carry all the information necessary for mutual e x c l u s i o n . . . C o r o l l a r y 4.3.5 Let the exclusion graph of the processors be a threshold graph with Orlin threshold t. If mutual exclusion is ensured by test-and-set variables, then these variables require at least #t bits of storage. C o r o l l a r y 4.3.6 Let the exclusion graph of the processes be a threshold graph with Orlin threshold t. If mutual exclusion is ensured by means of P V-chunk shared variables, then these variables must have at least t + 1 collective states. P r o o f . This follows from Theorem 4.3.4, since PV-chunk is a special case of test-and-set. " C o r o l l a r y 4.3.7 If a threshold graph with Orlin threshold t is covered by threshold subgraphs with Orlin thresholds tk, then 1 + t <_ 1-I(1 + tk).
4.4
Cyclic Scheduling
105
P r o o f . This follows from Corollary 4.3.6, since each threshold subgraph defines a PV-chunk variable having 1 + tk states. .. Corollary 4.3.7 was proved in [Ord85] by a complicated graph-theoretic argument. In [Ord89] it is shown that when the exclusion graph is a 4cycle, mutual exclusion by means of PV-chunk variables requires more shared variables and more storage than by means of test-and-set variables.
4.4
Cyclic Scheduling
In this section we present an application to cyclic scheduling of off-weekends, based on Koop [Koo86]. Consider the problem of constructing a cyclic timetable for a worker. If the worker is scheduled to work on a particular weekend, this weekend is called an on-weekend, otherwise an @weekend. For positive integers A _< B, the schedule is said to satisfy the A / B offweekend ratio constraint if in every B consecutive weekends of the schedule, at least A are off-weekends (since the schedule is cyclic, its first weekend is considered to follow its last). S u c h constraints are common in scheduling problems. A sequence of h consecutive weekends whose only off-weekend is the last one, and such that the weekend preceding it is also an off-weekend, is called an @weekend stretch of length h. Thus every cyclic schedule with off-weekends can be partitioned into some m off-weekend stretches of some lengths h o , . . . , hm-1. The A / B off-weekend ratio constraint says that starting from any moment, the waiting time for the A-th off-weekend must not exceed B weekends. Stated differently, For every A consecutive off-weekend stretches, their total length must not exceed B. Our problem here is that the lengths of the off-weekend stretches are given, but we are free to arrange them in any order so as to satisfy the A / B off-weekend constraint. This leads to the following problem. P r o b l e m (Cyclic s c h e d u l i n g w i t h r a t i o c o n s t r a i n t ) Given positive integers A < m, B, and ho,...,hm-1, is there a permutation 7c of { 0 , . . . , m - 1} such that i+A-1
h~(k) <_ B k=i
where the indices are taken rood m ?
fori-O,...,m-1
(4.3)
106
Applications
The problem is trivial for A - 1. Margot showed that it is NP-complete even when A _> 3 is fixed, as we see in Chapter 7. Koop solved it for A - 2, and for another special case, as we show below. Theorem
A-
4.4.1 The cyclic schedulin 9 problem with ratio constraint with
2 is solvable in polynomial time.
P r o o f . Define a graph G - (V,E) with V - {v0,...,Vm_l} and vivj E E if and only if hi q- hj <_ B. The problem asks whether G is Hamiltonian. But G is a threshold graph, since its complement is a threshold graph by Condition 8 of Theorem 1.2.4, and Hamiltonian threshold graphs can be recognized in polynomial time, as we saw in Section 1.6. 9 We turn next to the other special case of the problem. Often it is desired that the lengths of the off-weekend stretches be as equal as possible. We assume therefore that for some integer H, every hi is equal to H or to H - 1. 4.4.2 Assume that hi C {H, H - 1} for each i. Then there exists a permutation 7r satisfying (~.3) if and only if the average length of an offweekend stretch does not exceed B/A, in other words
Theorem
1
~ 1 h~ <_ B/A.
(4.4)
m i=0 P r o o f . The "only if" part holds even without the assumption that hi C { H , H - 1} for each i, since by adding the inequalities (4.3) for all i we obtain (4.4). We turn now to the "if" part. We must have H - 1 G B / A , since otherwise each hi would exceed B / A and (4.4) would be violated. We may also assume that H > B/A, since otherwise every permutation 7r would satisfy (4.3). Thus H - 1 - [B/A]. (4.5) We construct the desired permutation by selecting the next length to be H, unless this raises the average of the selected lengths above B / A or all the H's have already been used up, in which case we select H - 1. In other words, we construct 7r by the following rule: 9 for j - 0 , . . . m -
1, put I I j -
{ ~ r ( 0 ) , . . . , z r ( j - 1)}. If
j-1
Y~. h~(k) + H > (j + 1)B/A k=0
t.4
Cyclic Scheduling
or if h~ h~(j) - g -
107
g1 for all i ~ IIj, then select 7r(j) ~ IIj such that 1. Otherwise select 7r(j) ~ IIj such that h~(j) - H.
As an illustration, if A = 5, B = 13, and H = 3, then the sequence h~(0), h~(1),.. 9 begins as 2, 3, 2, 3, 3, 2, 3, 2, 3, 3, .... We now show that the construction can be carried out and that the resulting p e r m u t a t i o n satisfies (4.3). If 7r(j) cannot be constructed by our rule, then j-1
h~(k) + H > (j + 1)B/A, k=0
yet h i - H for all i ~ IIj. But then j-1
m-1
-
~ h.(k) + ( r n - j ) H k=O
k=O
> (j+I)B/A+(m-I-N)H >_ (j + 1)B/A + ( m - 1 - j ) B / A = mB/A,
by (4.5)
contradicting (4.4). This shows that 7r can be constructed. It now follows that the average of the first selected lengths does not exceed B/A, in other words J
h~(k) <_ (j + 1)B/A
for j - 0 , . . . , m - 1.
(4.6)
k=O
Indeed, if j-1
h~(k) + H <_ (j + 1)B/A,
(4.7)
k=0
the result follows by adding (4.7) and
h~(j) <_ H.
h~(y) - H - 1
Otherwise we have
<_ B / A
(4.8)
by the construction and (4.5). By induction we also have j-I
h~(k) <_j B/A, k=O
(4.9)
108
Applications
and the result follows by adding (4.8) and (4.9). We conclude the proof by showing that rr satisfies (4.3) by induction on i. The case i - 0 is inequality (4.6) with j - A - 1, so assume that i > 0. If i+A-1
i+A-2
k=i
k=i-1
the result follows by induction. Otherwise we must have hTr(i-1) - H - 1. It follows that
hTr(i+A-1)
--
H and
i-2
h~(k) + H > iB/A,
(4.10)
k=0
for otherwise the construction would give hTr(i-1) - H. We distinguish two cases according to whether or not the A stretches in question loop back around the cycle to the first stretch. C a s e 1" i _< m - A (no looping back). We have i+A-2
h~(k) + H < (i + A ) B / A
(4.11)
k=0
by (4.6) with j - i + A -
1. By subtracting (4.10) from (4.11) we obtain i+A-2
h~(k) < B.
(4.12)
k=i-1
The left-hand side of (4.3) is larger exactly by 1 than the left-hand side of (4.12), and therefore it does not exceed B. C a s e 2" i > m - A (looping back). Note that 0 _< A - m + i - 1 < r n - 1. We have i-2
rn-1
h~(k) + ( H -
1)+ ~
h~(k) < m B / A
(4.13)
k=i
k=0
by (4.4), and A-m+i-1
h~(k) <_ ( A - m + i)B/A
(4.14)
k=0
by (4.6) with j - A - m + i (4.10), we obtain
1. Adding (4.13) and (4.14) and subtracting
m-1
-1 + ~ h~(k) + k=i
which implies (4.3) in our case.
A-re+i-1
~ k=O
h~(k) < B,
4.5
Guttman Scales
4.5
Guttman
109
Scales
In many situations in psychology, politics, education and so on one has "subjects" and "items", where each subject "agrees" or "disagrees" with each item. For example, the subjects may be students, the items tests, and agreement may mean that the student can pass the test. Other examples are people and opinion polling, or soldiers fearing some combat situations and so on. Often it is desired to place each subject and each item on some linear scale so that every subject agrees with each item succeeding it in the scale and disagrees with each item preceding it in the scale. For example, the tests are graded by difficulty and a student can pass all tests up to his or her level of competence. Such a scale is called a G u t t m a n scale. To formalize this, let S denote the set of subjects and I the set of items. A Guttman scale is then a mapping g from S tO I into some linear order, like the real numbers, such that for each subject s and each item i, s agrees w i t h / i f and only if g(s) < g(i).
(4.15)
We want to determine which sets of subjects and items have G u t t m a n scales. To this end consider the split graph G = G(S, I) in which S is a clique, I is a stable set, and an s E S is adjacent to an i E I if and only if subject s agrees with item i. Theorem
4.5.1 ( [ C L 8 7 , C L 8 4 ] ) S and I possess a Guttman scale if and
only if G(S, I) is a threshold graph. P r o o f . If G is not a threshold graph, then by Condition 2 of Theorem 1.2.4 it contains an alternating 4-cycle, which must alternate between S and I since G is split. Thus there are two subjects Sl, s2 and two items il, i2 such that Sl agrees with il but not with i2, and s2 agrees with i2 but not with il. But this contradicts (4.15), since it implies that
g(i2) s g(81) < g(il) g(il) __< g(s2) < g(i2). Conversely, if G is a threshold graph, then by Condition 4 of Theorem 1.2.4, its vertices can be linearly ordered so that each vertex of S is adjacent to all the vertices preceding it and to no others. The reverse ordering then satisfies
(4.15).
,,
110
Applications
Sometimes there can be degrees of agreement between a subject and an item. For example, a subject may disagree, agree, or agree strongly with an item, with the understanding that strong agreement implies agreement. We can model such situations by replacing each item i by two items i0 and il, and joining a subject s to i0 if s agrees with i and to i0, i l if s agrees strongly with i. An "extended G u t t m a n scale" is a linear ordering of the vertices such that s agrees with i if and only if s precedes i0 in the ordering, and s strongly agrees with i if and only if s precedes il in the ordering. As a special case of Theorem 4.5.1, we have the result that an extended G u t t m a n scale exists if and only if the split graph described above is a threshold graph. Likewise, more refined degrees of agreement can also be handled as a special case of Theorem 4.5.1.
Chapter 5 Split Graphs 5.1
Introduction
A graph is called a split graph if its vertex set can be partitioned into a clique and a stable set. If (K, S) is such a partition with K as the clique and S as the stable set, we then say that (K, S) is a split partition of the graph and denote the graph by G(K,S). The split graphs were defined and characterized by FSldes and Hammer [FH77b]. These graphs were also introduced independently by Chernyak and Chernyak [CC86] under the name polar graphs. We introduce in this chapter some of the basic properties of split graphs. More results on split graphs can be found in Chapters 6, 7, 8, 13.
5.2
Basic Properties
Recall the terms triangulated graphs, interval graphs, comparability graph and cocomparability graph from Definition 1.4.1. In addition we need the following definitions. Given a set of vertices K and two vertices x,y, not necessarily in K, we say that x dominates y in K, denoted by x ~/~- y, if every neighbor of y in K - x is also a neighbor of x. Clearly ~K is a reflexive and transitive relation on V - K and the Dilworth number of V - K , denoted by D(V - K), is the minimum number of chains of the partial preorder ~/,that V - K can be partitioned into. If K - V, we denote x ~/~- y by x ~ y. Note that L is the vicinal preorder of G. Similarly, we denote D(V) by D(G) and call it the Dilworth number of G. 111
112
Split Graphs
Theorem
5.2.1 ( [ F H 7 6 ] )
For every graph G -
(V, E), the following con-
ditions are equivalent: 1. G is a split graph; 2. both G and its complement G are triangulated; 3. G does not contain C4, C5, or 2K2 as induced subgraphs. Proof. 1) ~ 2)" By definition every induced subgraph of a split graph is a split graph. Hence a split graph does not contain any induced cycle of size four or more, since the vertex set of a cycle of size four or more cannot be p a r t i t i o n e d into a clique and a stable set. Also the complement of a split graph is a split graph, and hence it is triangulated too. 2) => 3)" Since G is triangulated it does not contain C4 or Cs, and since G is t r i a n g u l a t e d and 2K2 is C4, G does not contain 2K2. 3) =~ 1)" Let K be a m a x i m u m clique in G with the fewest possible edges in V - K . Assume that, if possible, two vertices x, y in V - K are adjacent. If there are two vertices z, w in K such t h a t xz, yw E E but xw, yz ~ E, then those four vertices induce a 6'4, a contradiction. It follows t h a t either x ~ K Y or y ~ K X. Assume without loss of generality t h a t x ~ K Y. Now, if x has two non-neighbors z, w in K , then x, y, z, w induce a 2K2, a contradiction. If y has at most one non-neighbor in K , say z, then K - z + { x , y } is a larger clique t h a n K in G, a contradiction. It follows t h a t x has exactly one non-neighbor in K , say z, and y has at least one more non-neighbor in K , say w. Now z must have a neighbor u in V - K t h a t is not a neighbor of x, for otherwise K ~ - K - z + x is also a m a x i m u m clique and V - K ~ has fewer edges t h a n V - K , a contradiction. Now, yu E E or else x, y, z, u induce a 2K2 in G. Applying to u and y the above a r g u m e n t about x and y, we find t h a t u ~ K Y and u has exactly one non-neighbor w ~ in K. Now, x, y, u, z, w ~ induce a C5, a contradiction. .. Theorem
5.2.2 ( [ F H 7 7 a ] )
For every split graph G ( K , S ) ,
conditions are equivalent: 1. G is an interval graph; 2. G is a cocomparability graph;
J. D(S) <_2,
the following
5.2
Basic P r o p e r t i e s
113
~. G does not contain any of the graphs of Figure 5.1 as induced subgraphs.
Figure 5.1" The forbidden subgraphs for interval graphs within the class of split graphs.
G1
G1
G2
PFoof.
1) ~ 2). This is true for every graph. Let i(x) be the interval associated with x for each x E V. For each xy ~ E, orient the edge xy of G from x to y if i(x) is completely to the left of i(y). Otherwise orient it from y to x. Since the two intervals are disjoint, this gives a unique orientation to each edge of G. This orientation is clearly transitive, and hence G is a cocomparability graph. 2) =~ 1)" By Part 1 of Theorem 2.1.6, a graph G is an interval graph if and only if G contains no induced C4 and G is a comparability graph. Since split graphs do not contain induced C4 (Theorem 5.2.1), the result follows. 2) ~ 3)" Notice that the Dilworth number D(S) is the same in G and G since if x L/~" Y in G, then Y ~/," x in G. We show that D(S) < 2 in G by partitioning S into two chains S1, $2. Consider a transitive orientation of G. Then for every vertex x E S, all the edges from K to x are oriented in the same direction, since K is a stable set in G. Let $1 be the set of all x C S with all such orientations towards x, and let $2 be the remaining vertices of S. We show that ~1 forms a chain. Assume that, if possible, there are two vertices x, y C S1 such that x ~K g and y ~K x. Then there are two vertices z, w in the stable set K such that (z, x), (w, g) are arcs (oriented edges) of G, but (z, y), (w, x) are not. This violates the transitivity of G no matter which direction the edge xy is oriented. Hence S1 must be a chain. Similarly $2 is also a chain and hence D(S) <_2.
114
Split G r a p h s
3) ~ 2). Since D(S) <_ 2, S is partitioned into two chains of ~K, say ~1, ~2. We exhibit a transitive orientation for G. Order the vertices of $1 so that a vertex x precedes a vertex y only if x ~K Y. Order the vertices of $2 similarly. Let xy be an arbitrary edge of G. Orient the edge from x to y if 9 xCKandyCSl, 9 xGS2andyEKUSl,
orif orif
9 x,y C $1 and y precedes x, or if 9 x , y C $2 and x precedes y. It is routine to see that each edge receives a unique orientation and the resulting orientation is transitive. 3) =~ 4): If D(S) _< 2 for G, then it is also true for every induced subgraph of G. The three graphs in the Figure 5.1 have D(S) = 3. Therefore G does not contain them. 4) =~ 3): If D(S) >_ 3, then consider an antichain x , y , z E S. There are vertices a, a ~, b, b~, c, c~ C K such that xa, xa', yb, yb~,zc, zd C E and xb', xc, ya, yc', za', zb ~ E (see Figure 5.2.) Figure 5.2" A minimal configuration with
D(S) -
i1~\\ ii
\\
3. Dashed lines indicate non-edges.
5.2
Basic P r o p e r t i e s
115
Consider the subgraph H induced by {x, y, z, a, b, c, a', b', c'}. Clearly a, b, c are distinct vertices in K and similarly a ~, b~, d are distinct vertices in K. Also a may coincide with a ~ or d and similarly b with b~ or a' and c with c' or b'. Put L = {a,a',b,b',c,c'}. If ILl = 3 (i.e., a = a',b = b',c = c' or a = c', b = a', c = b'), then H is isomorphic to G1 or G1, a contradiction. If IL[ >_ 4, assume without loss of generality that a, b, c, a' are distinct. Then x, y, z, a, b, c, a' induce G2, a contradiction. 9 C o r o l l a r y 5.2.3 A split graph is a comparability graph if and only if it does not contain G1 or G1 of Figure 5.1 or G2 of Figure 5.3.
Figure 5.3: A forbidden subgraph for split comparability graphs.
A w
A w
G2
P r o o f . This follows from Conditions 2 and 4 of Theorem 5.2.2. C o r o l l a r y 5.2.4 For a split graph G the following conditions are equivalent:
1. D(G) <_ 2; 2. G does not contain the graphs ure 5.3 as induced subgraphs;
G1, G1, G2 of Figure 5.1 or G2 of Fig-
3. G is both an interval graph and a comparability graph. Proof. 1) =~ 2): If V can be partitioned into two chains V~, V2, then (V1N S, V2 gl S) partition S into two chains and hence D(S) <_ 2. Similarly D ( K ) < 2. Hence the result follows from Theorem 5.2.2.
116
Split Graphs
2) =V 1)" By Theorem 5.2.2, D(S) _< 2 and D ( K ) <_ 2. Let (S~,$2) be a partition of S and (K1, K2) a partition of K into chains. Since for every x E K and y C S we have that x > y, it follows that (S1 U K1,$2 U K2) is a partition of V into chains. 2) r 3)" This follows from Theorem 5.2.2 and Corollary 5.2.3.
5.3
Hamiltonian Split Graphs
Let G(K, S) be a split graph with IKI - ISl and let B be the bipartite graph obtained from G by removing the edges having both ends in K. Then G is Hamiltonian if and only if B is. Thus recognizing Hamiltonian split graphs is NP-complete (See [G J78]). Burkard and Hammer [BHS0] gave a necessary condition for a split graph to be Hamiltonian. We give a different proof below. L e m m a 5.3.1 Let C be a Hamiltonian cycle in a graph G - (V, E). Orient C cyclically and denote by C+(x) and C - ( x ) the successor and predecessor of a vertex x along C. For a set X C_ V, let C+(X) denote U~exC+(x). Define similarly C - ( X ) . If A and B are subsets of V, IAI - IBI, C+(A) C_ B and C - ( A ) C_ B, then A U B - V. P r o o f . A is in one-to-one correspondence with each of C+(A) and C - ( A ) . Hence IAI - IC+(A)I - IC-(A)I <_ IBI, which implies that C+(A) - t 3 G - ( A ) because IA] - IBI. Also C+(x) - # if and only if G-(y) - x. Therefore C+(B) - A. Hence C+(A U B) - B U A. So A U B - V because C has no subcycles. 9 We need the following definitions. Let G(K, S) be a split graph and let B be the bipartite graph obtained from G by removing all edges having both ends in If. a connected component H of B is called deficient if ]S a V(H)] > ]K N V(H)] and critical if 15' n V(H)] - ]K n V(H)]. The deficiency of H is defined to be ISN V(H)] - II( n V(H) if ISN V(H)I > IK N V(H)[ , and 0 otherwise. The deficiency of B is the sum of the deficiencies of its components. Notice that the deficiency of B can be computed easily. T h e o r e m 5.3.2 ([BH80]) Let G ( K , S ) be a Hamiltonian split graph with IXl < IKI. Let X be any subset of S and Y any subset of N ( X ) . Let B be the bipartite graph having partition ( X , N ( X ) - Y) and all edges of G between X and N ( X ) - Y, and let B have h critical components and deficiency k. Then 21Y I > 2k + h. Furthermore if h - O , then 21Y I >_ 2k + 1.
5.4
117
T h e S p l i t t a n c e of a Graph
Let C, C + and C - be as in the Lemma 5.3.1. If D is a deficient component of B with deficiency d, then there are at least d edges of C oriented from D n S to Y and at least d edges of C from Y to D N S. It follows that at least 2k edges of C are between the S-vertices of the deficient components and Y. If R is the set of S-vertices of a critical component, then there is at least one C-edge either from R to Y or from Y to R. Otherwise by L e m m a 5.3.1, the critical component equals the entire G, contradicting the assumption that IsI < IKI. It follows that there are at least h edges of C between the S-vertices of the critical components and Y. Thus there are at least 2k + h C-edges between X and Y. Hence 2k + h _< 21YI. This proves the first part. For the second part, assume that h = 0 and, if possible, 2k = 21Y [. Let D* be the set of vertices of the deficient components of B. Then Proof.
C+(D * N S) c_ (D* O K) U Y, C - ( D * n S) c_ (D* N K ) U Y. Also since 2k =
21YI, we
have
ID q SI =
IN n
It" I + k =
IN n
h'l + IYI.
(5.1)
Hence by Lemma 5.3.1 it follows that V = D* U Y. Therefore S = D* N S and K = (D*O It')U Y. But then [Xl- I1(1 by ({5.1), a contradiction to
ISI <
5.4
II
T h e S p l i t t a n c e of a G r a p h
Hammer and Simeone [HS81] defined the splittance of an arbitrary graph G to be o(G) = min{lE(G )/~ E(S)I : S is a split graph on the same vertices as G}. In other words, or(G) is the minimum number of edges to be added or removed in order to change G into a split graph. These authors show that the splittance depends only on the degree sequence of G and give a simple formula to compute it. Thus the splittance of a graph can be computed in polynomial time. Using this result the authors characterize the degree sequence of split graphs. This section is mainly based on [HSS1]. Another similar concept is the following graph sandwich problem (Section 1.5): given a graph G, a subgraph H and a graph property P, is there
118
Split Graphs
a graph satisfying the property P which contains H and is contained in G? When P is the property of being a split graph, the problem can also be solved in polynomial time as shown in Section 1.5. Clearly G is a split graph if and only if r = 0. Also for all graphs G, r - rT(G). For a graph G - ( V , E) and a set X C_ V, set
-
1
[Xl(IXl- 1 ) - Ie(X)l +
IE(V- X)l,
(5.2)
where E ( W ) denotes the set of edges with both ends in W. L e m m a 5.4.1 For every graph G -
(V, E) ( 7 ( G ) - min s ( X ) . XCV
P r o o f . Clearly rT(G) _< s ( X ) for all X C_ V. On the other hand, let G' = (V, E ~) be a split graph, with clique X ' and stable set V - X ' , obtained from G by the addition and removal of the minimum number of edges. Because of the minimality assumption, no removed edge can have an endpoint in X' and no added edge can have an endpoint in V - X'. Hence or(G) - s ( X ' ) . Let d - ( d l , . . . , d ~ ) , with dl > . . . define
> d~, be a graphic sequence.
m(d) - m a x { k " dk >_ k - 1 }
We
(5.3)
and, f o r 0 _ < k _ < n ,
1(
crk(d) - -~ k ( k - 1 )
k di + ~n di ) .
- ~
i=1
(5.4)
i=k+l
When there is no danger of confusion, we simply write m and crk in place of rn(d) and crk(d), respectively. Re 11 that r e ( d ) i s the corrected Durfee number of d as in Definition 3.1.6.
L e m m a 5.4.2 2. O"0 > ' ' "
1. ak > O for O < k < n. > O'm_ 1
and
(Tin < " "
< ~n.
3. The sequence {crk } has a single m i n i m u m at k - rn if dm > m - 1, and two adjacent m i n i m a at k - m 1 and k - m, if din - m 1.
5.4
The Splittance of a Graph
119
P r o o f . Part 1 is a consequence of the Erd6s-Gallai inequalities [EG60] k
n
~_~di <_k ( k - 1 ) + ~ i=1
min{k, di}
for 0 _ k < n,
(5.5)
i=k+l n
which, together with "~-'~ di is even", are necessary and sufficient conditions i=1
for d to be graphic (see Condition 3 of Theorem 3.1.7). As for Part 2, a direct computation shows that for 1 _< k _< n, one has c r k - ak-1 - ( k - 1) - d k . This last expression is negative for 1 _< k _< m - 1 because, for every such k, dk >_ dm >_ m - 1 > k-1; and positive for m + 1 <_ k <_ n by the definition of m. Finally Part 3 results from observing that am < ~,~-1 or crm - crm-1 according as dm > m - 1 or dm - m 1. " Theorem
5.4.3
For every graph G,
where d is the degree sequence of G and m is defined as in (5.3). P r o o f . For every X ~ V, one has d(x) -
2IE(X)] + I~Xl,
(5.6)
xEX
where d(x) is the degree of the vertex x, and 5X is the set of edges with exactly one end in X. Using (5.2) and applying (5.6) to X and V - X, we find that -
1 (IX,(IXl-l)-~d(x)+
-i
xEX
~
d(x))
(5.7)
xEV-X
Since the sequence d is non-increasing, by putting k - IX], we have
k xEX
i=1
s xEV-X
i=k+l
and therefore (5.7) gives with (5.4) that s ( X ) >_ ak(d),
where k - IXl.
(5.8)
120
Split Graphs
On the other hand, we notice that for each k, there is at least one set X the set of the k vertices with largest degrees for which (5.8) holds as an equality. In conclusion, we have, taking into account Lemmas 5.4.1 and 5.4.2, a(G)-
min s ( X ) -
X C_V
min min s ( X ) IXl-k
min a k ( d ) - am(d). 0
0
The proof of Theorem 5.4.3 gives the following simple procedure for obtaining a split graph from a given graph G = (V, E) with a minimum number of additions and removals of edges: 1. Determine the degree sequence d of G and index the vertices so that dl >_ "." >_dn. 2. Compute m = rn(d). 3. Add to E all edges ij ~ E such that i < j _< m. 4. Remove from E all edges ij E E such that m < i < j. An immediate consequence of Theorem 5.4.3 is the following result, which places the split sequences nicely between the threshold sequences (Condition 4 of Theorem 3.2.2) and the general graphical sequences (Condition 4 of Theorem 3.1.7 and Theorem 3.1.9). T h e o r e m 5.4.4 A graph with degree sequence d is split if and only if m
E di - m ( m - 1 ) i=1
n
+ E
di,
(5.9)
i=m+l
where m = re(d) is given by (5.3). C o r o l l a r y 5.4.5 Every split degree sequence is forcibly split, i.e., all its realizations are split. Moreover, for each fixed s, if Ps denotes the property of a graph having splittance s, then the degree sequence of every graph with property Ps is forcibly P~. The next theorem describes the split graphs having the same degree sequence. Recall from Corollary 3.1.11 that given a graph G = (V, E) and four vertices a, b, c, d of G such that ab, cd E E and ac, bd ~ E, the operation of adding the edges ac, bd and removing the edges ab, cd is called an (edge) transfer.
5.4
The Splittance of a Graph
121
T h e o r e m 5.4.6 If G and G' are split graphs with the same degree sequence and on the same vertex set V, there is a partition (K, S) of V such that
1. in both G and G', K is a clique and S is a stable set; 2. G' can be obtained from G by a finite sequence of transfers of edges in 5K. P r o o f . By Corollary 3.1.11 (see also [Rys63, page 68]), any two graphs with the same degree sequence can be obtained from each other by a finite sequence of transfers. Thus, it is enough to prove the theorem in the case when G' is obtained from G by a single transfer. The general case follows by induction. Since G is split, there is a partition of V into a clique K and a stable set S. If the transfer removes ab, cd and adds ac, bd, we may assume, without loss of generality, that a belongs to K. But then c E S and hence d E K, which in turn implies that b C S. Hence, both ab and cd belong to 5K. After the transfer, both ac and bd belong to 5K. It follows that K is a clique and S is a stable set in G' as well. 9 In fact, the proof of Theorem 5.4.6 shows that if G and G ~ are graphs on the same set of vertices and G is split, then G' is also split with the same split partition. This gives another proof of Corollary 5.4.5. Theorem =
5.4.7 If G is a split graph with degree sequence d, then aJ(G) =
x(a).
P r o o f . If (K, S) is a split partition of G, then every clique contains at most one vertex of S. Thus if the split partition (K, S) is chosen to maximize IKI, then II(I = w(G). Further, d(z) >_ I K I - 1 for all z C K and d(z) <_ IK I - 1 for all z C S. Therefore we may assume that the first IKI vertices in the degree sequence are in K. T h e n d k >_ k - 1 and dk+l < k, where k = ]K]. Hence by definition of re(d), we have r e ( d ) = k = II<1. The fact that aJ(G) = x;(G) follows since G is a perfect graph, or simply by using k colors for K and observing that one of them is available for each vertex of S. 9
Chapter 6 The Threshold Dimension 6.1
Introduction
The threshold dimension t(G) of a graph G is the minimum number k of threshold subgraphs T1,...,Tk of G that cover the edge-set of G, i.e., E(T~) U ... U E(Tk) - E(G). Since every edge along with isolated vertices is a threshold subgraph, the threshold dimension is well-defined and is bounded by the number of edges of the graph. The problem of determining the threshold dimension of a graph has several applications (see Chapter 4). Chvs and Hammer [CH77] showed that this problem is NP-hard. In this section we discuss their proof and a lower bound for threshold dimension. Yannakakis later proved that for every fixed k >_ 3 the problem of recognizing that a graph has threshold dimension at most k is NP-complete. We discuss his proof in Chapter 7. In the next section we discuss bounds for the threshold dimension. In Section 6.3 we discuss the relation of the threshold dimension to other dimensional concepts. In Section 6.4 we discuss operations preserving the threshold dimension. Finally, in the last section we show that a more restricted version of the threshold dimension remains hard. As usual, a(G) denotes the stability number of a graph G, i.e., the largest size of a stable set of G. A triangle-free graph is a graph that contains no triangles.
L e m m a 6.1.1 ([CH77]) For every graph G on n vertices we have t ( G ) < n - a(G).
F u r t h e r m o r e , if G is triangle-free, then t ( G ) - n - a ( G ) .
P r o o f . Let S be a largest stable set. For each vertex u C V 123
S, consider
The Threshold Dimension
124
the star centered at u, i.e., the subgraph consisting of all the edges incident with u. Each such star is a threshold graph and all the stars together cover G s i n c e S h a s no edges. Thus t(G) <_ I V - S I - n - c ~ ( G ) . If in addition G is triangle-free, then every threshold subgraph is a star, and the centers of stars that cover G form the complement of a stable set. It follows that t(G) _> n - c~(G) and hence t(G) - n - c~(G) for every triangle-free graph G. The threshold partition number, denoted by tp(G), is the minimum number of edge-disjoint threshold subgraphs needed to cover E(G). Clearly t(a) <_ tp(a) <_ IE(G)I. L e m m a 6.1.2 ([EOZ87]) If G is a triangle-free graph, then t(G) - tp(G). P r o o f . As in the proof of Lemma 6.1.1, E(G) can be covered by t(G) stars. If an edge belongs to more than one star, delete it from all but one of the stars. This gives a threshold partition of size t(G). 9 Theorem
6.1.3 ([CH77])
The problem of determining t(G) is NP-hard.
P r o o f . Poljak [Po174] has shown that computing the stability number remains NP-hard even for triangle-free graphs. By Lemma 6.1.1, the same is true of computing the threshold dimension. .. In a graph G, two edges e - xy, f - zw are said to be in conflict if G has an alternating 4-cycle on the vertex set {x,y,z, w}. The conflict graph of G, denoted by G*, is defined by taking V(G*) - E(G) and by joining two vertices of G* if and only if the corresponding edges in G are in conflict. G* is also called the 2-summability graph of G. Since two conflicting edges cannot belong to the same threshold subgraph, we must have t(G) >_ x(G*), where X denotes chromatic number. Chvs and Hammer [CH77] posed the problem whether there is any graph G for which t(G) > x~(G*). Cozzens and Leibowitz [CL84] describe a family of split graphs Gn on 6n vertices, n _> 1, for which x(G~) - n + 1 and t(G~) - [ ~ ] . Thus t ( G ) - X(G*) can be arbitrarily large. Note that t(Gn) > x ( G ; ) only for n >_ 3. In Chapter 8 we show that t(G) - x(G*) whenever x;(G*) _< 2. We do not know of an example of a graph G with t(G) > x(G*) - 3. The example of Cozzens and Leibowitz is as follows. Gn has the vertices
ai, bi, ci, Ai, Bi, Ci for i - 1 , . . . , n and the following edges"
6.1
Introduction
125
1. aiAi, biBi, ciCi for i - 1 , . . . , n, 2. aiBj, biCj, ciAj for i, j -
1 , . . . , n.
In addition, { A 1 , . . . , A n , B 1 , . . . , B n , C1,..., Cn} forms a clique. Figure 6.1 illustrates G3. Figure 6.1" Cozzens and Leibowitz's example G3. The oval around A 1 , . . . , 6 3 indicates that these vertices form a clique. al
a2
a3
i l l
bl l
b2
b3
c2
c3
q
N
1 A2
cl
i
A3
B1
B2
B3
6.1.4 The graph G~ of Cozzens and Leibowitz satisfies ;g(G~) n + 1 and t(G~) -- [ ~ ] .
Theorem
P r o o f . Observe that G n has the (n + 1)-clique { a l A l , . . . ,anAn, DIC1}, and therefore )/(G*) >_ n + 1. On the other hand, we can color the vertices of G~ using colors 1 , . . . , n + 1 as follows. All vertices of the form aiBj receive color 1, biCj receive color 2 and ciAj receive color 3. The n vertices aiAi receive all colors other than 2, the biBi receive all colors other than 3, and the ciCi receive all colors other than 1. The remaining edges of G~ (clique edges) are isolated vertices of G n. Hence x ( G ~ ) = n + 1. Let T be any threshold subgraph of G~. We assert that at most two of the 3n edges aiAi, biBi, ciCi can be in T. Indeed, aiAi conflicts with ajAj for i 5r j. Moreover, if T contains aiAi and bjBj, then it must contain aiBj to avoid conflict, and hence it cannot contain any ckCk. This proves the assertion, from which it follows that t(G,~) >_ 3n/2. On the other hand, we can cover
The Threshold D i m e n s i o n
126
the edges of Gn by [~1 threshold subgraphs as follows. If n is even, we can partition the 3n edges aiAi, biBi, ciCi into 3n/2 pairs of non-conflicting edges: {alAl, b2B2}, {blBl, c2C2}, {clCl,a2A2}, {a3A3, b4B4}, .... We extend each of these pairs to a threshold subgraph of G~. For example, to the pair {alA~, b2B2} add all edges a~Bj along with all the clique edges. These 3n/2 threshold subgraphs cover all the edges of Gn. If n is odd, proceed as before with n - 1, and the remaining three edges anAn, bnBn, c~Cn can be covered by two additional threshold subgraphs. This proves that t(Gn) <_ [~1" "
6.2
B o u n d s for t h e T h r e s h o l d D i m e n s i o n
This section is based on the results of ErdSs et al. [EOZ87]. Recall that the threshold partition number of G, denoted by tp(G), is the minimum number of edge-disjoint threshold subgraphs needed to cover E(G). Clearly t(G) <_tp(G). The smallest known graph for which t(G) < tp(G) is shown in Figure 6.2. It is an easy exercise to show that t(G) = 2 and tp(G) = 3 for this graph. Figure 6.2: A graph G with t(G) - 2 and tp(G)- 3.
A W
A v
6.2.1 There is a constant A such that for n large enough, there is a graph G on n vertices with
Theorem
tp(G) - t(G) > n - Ax/~log n.
6.2
127
B o u n d s for t h e T h r e s h o l d D i m e n s i o n
P r o o f . In [Erd61], Erd6s shows that for a sufficiently large fixed constant A, there is an integer N such that for n > N there is a triangle-free graph G on n vertices with a(G) < Av/-fflog n. Thus tp(G)= t(G) by L e m m a 6.1.2, and t(G) > n - Ax/~log n by L e m m a 6.1.1. = This shows that there are graphs with relatively large values of t(G). The following theorem gives an upper bound for tp(G). Theorem
6.2.2 For every graph G on n vertices,
tp(G) < n - ~ +
1.
P r o o f . Assume that G = (V, E) has a stable set S with IS[ >_ v/ft. Then the stars centered on the vertices of V - S form a threshold cover, which can be modified to a threshold partition of cardinality n - x/~ as in L e m m a 6.1.2, and we are done. So assume now that a(G) < v/~. Then pick a vertex z in G and let X l , . . . , xk be a maximal stable set in the star of z; hence k < v/-n. For each xi, construct a subgraph Ti of G consisting of all edges incident to xi together with all triangles that include the edge zxi; omit from Ti all edges necessarily incident to z included in the previous Tj's in order to keep the Ti's disjoint. Each Ti is then a threshold subgraph. Thus we have constructed k edge-disjoint threshold subgraphs that cover the union of the stars of the k + 1 vertices z, X l , . . . , xk. Delete from G all the covered edges and the vertices that become isolated as a result. This eliminates at least k + 1 vertices. Since an edge is always deleted together with one or both of its ends, the reduced graph G' is an induced subgraph of G and hence a(G') <_ a(G). Reduce G' by choosing a new z and continue this process until all the vertices are deleted. At each stage we eliminate at least k + 1 vertices by covering t h e m with k threshold subgraphs, where k < v/-n, and thus k k+l
< v~+l
Hence the total number of graphs needed to cover G is at most
v/-~ + 1
The Threshold Dimension
128
R e m a r k . We can conclude from the above two theorems that if t(n) (tp(n)) denotes the maximum of t(G) (tp(G)) over all graphs G on n vertices, then for large n n - Av/-nlog n < t(n) < n - x/~ + 1 and n - A v ~ log n < tp(n) < n -
v ~ + 1.
Using the graph of Figure 6.2, one can build examples of graphs G for which the difference tp(G) - t(G) grows linearly in the number of vertices of
a [EOZ87].
6.3
Dimensional Properties
Definition 6.3.1
9 A graph property P is called an i - d i m e n s i o n a l p r o p e r t y if every graph G = (V, E) is the edge-intersection of a finite set of graphs on V with property P. 9 A graph property P is called a u - d i m e n s i o n a l p r o p e r t y if every graph G = (V, E) is the edge-union of a finite set of graphs on V with property P. 9 The i - d i m e n s i o n of a g r a p h G = (V, E) w i t h r e s p e c t to p r o p e r t y P, denoted by idimp(G), is the smallest number of graphs on V with property P whose edge-intersection is G. 9 The u - d i m e n s i o n of a g r a p h G = (V, E) w i t h r e s p e c t to p r o p e r t y P, denoted by udimp(G), is the smallest number of graphs on V with property P whose edge-union is G. The following lemma characterizes the dimensional properties. We denote by Kn - e the graph obtained from the complete graph I(n by deleting one edge. L e m m a 6.3.2 A property P is i-dimensional if and only if both Kn and Kn - e have property P for all n. Similarly P is u-dimensional if and only if both I'(~ and I(~ - e have property P for all n.
6.3
Dimensional Properties
129
Proof. "If": This follows because every graph on n vertices is the edgeintersection of graphs of the form K~ and K~ - e. " O n l y if"" This follows because each of K~ and K~ - e can only be the edge-intersection of itself. 9 The property of being a threshold graph is both i-dimensional and udimensional. Cozzens and Roberts [CR88] and Cozzens and Halsey [CH911 discuss various dimensional properties. We consider here most of these properties and obtain a poset of implications. These implications can be used to obtain inequalities between various idimp's (udimp's) as suggested by the following lemma.
L e m m a 6.3.3 If P and Q are i-dimensional properties such that P ~ Q, then idimQ(G) <_ idimp(G). Similarly if P and Q are u-dimensional properties such that P ::v Q, then udimQ(G) <_ udimp(G). We now define various dimensional properties. D e f i n i t i o n 6.3.4 9 A graph is called an interval g r a p h if each of its vertices can be associated with an interval on the real line in such a way that two vertices are adjacent if and only if the associated intervals have a nonempty intersection. These intervals are said to form an interval represent a t i o n of the graph. We denote by I the property of being an interval graph. 9 A graph is called a unit interval g r a p h if it is an interval graph with an interval representation where all the intervals have the same length. These intervals are said to form a unit interval r e p r e s e n t a t i o n of the graph. We denote by U the property of being a unit interval graph. 9 A graph is called an overlap g r a p h if each of its vertices can be associated with an interval on the real line in such a way that two vertices are adjacent if and only if the associated intervals overlap, namely they have a nonempty intersection and neither interval contains the other. These intervals are said to form an overlap r e p r e s e n t a t i o n of the graph. Overlap graphs need not be interval graphs as we see below. We denote by 0 the property of being an overlap graph.
130
The Threshold Dimension
9 A graph is called a c i r c u l a r - a r c g r a p h if each of its vertices can be associated with an arc on a circle in such a way that two vertices are adjacent if and only if the corresponding arcs have a nonempty intersection. These arcs are said to form a c i r c u l a r - a r c r e p r e s e n t a t i o n of the graph. We denote by C the property of being a circular-arc graph.
9 A graph is called a rigid c i r c u i t g r a p h (or a t r i a n g u l a t e d g r a p h or a c h o r d a l g r a p h ) if every cycle of length at least 4 contains a c h o r d (i.e:, an edge between two non-consecutive vertices along the cycle). We denote by R the property of being a rigid circuit graph.
9 We denote by T the property of being a threshold graph. R e m a r k . A graph is called a circle graph if each of its vertices can be associated with a chord on a circle in such a way that two vertices are adjacent if and only if their associated chords cross inside the circle. Gavril noted that the circle graphs are the same as the overlap graphs. (See [Go180, page 244].) Using Lemma 6.3.2, one can easily show that the above six properties are i-dimensional. The following theorem gives the poset of implications between these graph properties. T h e o r e m 6 . 3 . 5 Among the properties T, U, I, O, R, C, each of T, U implies each of I, O, and I implies each of R, C. All other implications between these properties follow from the above by transitivity. (See the poset structure in Figure 6.3.)
Figure 6.3: A poset structure of dimensional properties.
6.3
Dimensional P r o p e r t i e s
131
P r o o f . T) =~ I, O)" Let x l , . . . , x~ be the vertices of an arbitrary threshold graph G with x l ~ ... ~ x~. Further assume that the first k vertices form a largest stable set. For each j _< k, associate with xj the interval I(xj) - (j - l, j). For each j > k, if i is the smallest index such that xixj is an edge, associate with xj the interval I(xj) - ( i - 1, k). This gives an interval representation of G, and hence G is an interval graph. To show that G is also an overlap graph, consider the degree partition D 0 , . . . , D m of G. For each i - 0 , . . . , [~] and for each vertex x C Di, take I(x) - (0, i); for each i - [~J + 1 , . . . , m and for each vertex x C D~, take I(x) - ( - i + 1/2, m - i + 1/2). This ensures that for the vertices of the stable set S - Do U -.. U DL~ j , no two intervals overlap; for the vertices of the clique K - DL~]+ 1 U .-- U Din, every two intervals overlap or coincide; and every interval of a vertex in K overlaps the intervals of the correct vertices of S. It remains to perturb the intervals of the vertices of the same Di C_ K and make them overlap each other instead of coinciding. This can be achieved by translating the interval of the k-th vertex of such Di by ~ , where n is the total number of vertices. The resulting interval representation is an overlap representation of G. U) =~ I, O)" By definition, a unit interval graph is also an interval graph. To prove that a unit interval graph is also an overlap graph, assume without loss of generality that each vertex x is associated with an open unit interval I(x). For each interval I(x) do the following. Check if I(x) coincides with I(y) for some y -r x. If so, put 1 e - ~ m i n { l I ( u ) N I(v)[" u r v,I(u) N I(v) r rg} > 0 and translate by e the interval I(x) as well as every interval that is completely to the right of I(x). This operation does not change the intersection pattern of the intervals, and ensures that I(x) does not coincide with any other interval. Therefore the resulting unit interval representation is also an overlap representation of the graph. I) =~ R, C)" It is well-known that the class of interval graphs is properly contained in the class of rigid circuit graphs [GH64]. To show that interval graphs are circular-arc graphs, let a be a point on the real line to the left of all the intervals, and b a point on the real line to the right of all the intervals. Transform the line segment (a, b) into a circle by joining the two ends a, b. Then each interval transforms into an arc, and we have a circulararc representation of the same graph.
132
The Threshold Dimension
It now remains to show that no other implications are possible. Table 6.1 lists graphs G that have property P but not Q, proving that P 7~ Q. Table 6.1: Counter examples for Figure 6.3. P Q Graph that proves P 7~ Q T U I O
U T O I
K1,3
O
t~
C4
0
C
K2,3
R
C
G2 of Figure 6.4
P4 G1 of Figure 6.4 6'4
CRC4
Figure 6.4: Two graphs used in the proof of Theorem 6.3.5.
X
.j_ a
e
f
._ A
w
G1
lw
G2
It is routine to verify the validity of these examples. We show here only that G~ of Figure 6.4 is not an overlap graph, or, what amounts to the same thing by the Remark above, that it is not a circle graph. Assume that G1 is a circle graph. Since a, c, e form a stable set and each of them is adjacent to z, their chords must be parallel, i.e., when traveling along the circle, one encounters their endpoints in the order a, c, e, e, c, a up to a permutation of a, c, e. Similarly the chords of b, d, f must be parallel. The adjacencies among
6.3
Dimensional Properties
133
a, b, c, d, e, f, x then dictate that the associated seven chords be configured as indicated in Figure 6.5. But then it is impossible to draw the chord of z to cross all of them, since a, f, x are not parallel.
Figure 6.5: Illustration of the proof that G1 of Figure 6.4 is not a circle graph.
b a
a
d
x
c
c
f
b
f
All other implications that do not follow by transitivity from the ones in our theorem contradict Table 6.1; for example if C => I, then C => R follows from I => R, contradicting the table; similarly if R => O, then I => O follows from I => R, a contradiction. 9 An obvious corollary of Theorem 6.3.5 and Lemma 6.3.3 is the following remark. R e m a r k . Every graph G satisfies idimp(G) >_ idimQ(G) for all pairs (P, Q) in the set
{(T, I),
(T, 0), (T,R), (T, C), (U,I), (U, 0),
(U, R), (U, C),
(I,R), (I, C)}.
A similar result holds for udim. Exercises. 1. Show that every threshold graph, although it is not necessarily a unit interval graph, has an interval representation whose intervals have only two distinct lengths. 2. Verify the validity of Table 6.1.
134
6.4
The Threshold Dimension
Operations Preserving the Threshold Dimension
From Lemma 6.1.1, it follows that for subclasses of triangle-free graphs for which the stability number can be computed in polynomial time, the threshold dimension can also be computed in polynomial time. So for instance, the threshold dimension of trees and more generally bipartite graphs can be computed in polynomial time. On the other hand, computing the threshold dimension of even a split graph is NP-hard as we show in Chapter 7. We present here two operations on graphs that preserve the threshold dimension and may help in finding other classes of graphs for which the threshold dimension can be obtained in polynomial time. Recall that if G and H are vertex-disjoint graphs, their join G O H has the vertex set V ( G ) U V ( H ) and all the edges of G and H as well as all possible edges between G and H. Thus for example the complete multipartite graph I( m .....p~ is isomorphic to S m | ... | Sp., where Sk denotes an edgeless graph on k vertices.
Proposition 6.4.1 ([EZ77]) If k <_ t(G), then t(G | Sk) - t(G). P r o o f . Let T1,..., Tt be threshold subgraphs covering E ( G ) , where t = t(G). Let G 1 , . . . , Gk be k graphs on one vertex each, disjoint from G and from each other. Then T1 @ G 1 , . . . , T k @ Gk, Tk+l, . . . , Tt are subgraphs of t(GO Sk) = t(G) covering its vertices, and they are threshold graphs by Condition 4 of Theorem 1.2.4. Therefore t(G | Sk) _< t(G). The reverse inequality is trivial. 9 We apply this result to compute the threshold dimension of complete multipartite graphs (This result has also appeared in [CL84]): C o r o l l a r y 6.4.2 If n > 2 and
P l ~_ " ' "
~_ P n ,
then t(Kpl .....pn) - p2.
P r o o f . The result holds for n - 2 by Lemma 6.1.1. Proposition 6.4.1 then implies it f o r n > 2 , sinceI< m .....p~ = I<m,p2 | Sp3 | . . . | Sp~. 9 We define the operation of graph substitution as follows.
Definition 6.4.3 Let x be a vertex of a graph G, and let H be a graph disjoint from G. S u b s t i t u t i n g H for x in G means deleting x from G, adding H to G, and joining every vertex of H to every neighbor of x. denote the resulting graph by G(x ~ H).
We
6.5
Restricted Threshold Dimension
135
If T is a threshold graph whose degree partition is D o , . . . , Din, we refer to Do U ..- U D [ ~ ] as the principal stable set o f T and to D [ ~ j + I U .-. U Dm as the principal clique of T.
Proposition
6.4.4 Let T1,..., Tt be threshold subgraphs covering the edges of G, where t = t(G), and let x be a vertex belonging to the principal clique of at least one T~. Then the operation of substituting a complete graph for x preserves t(G). P r o o f . Let K be the complete graph substituted for x, and let S be an edgeless graph on the same vertices as K. For each i such that x is in the principal stable set of T~, put T[ = T~(x ~ S) and for each i such that x is in the principal clique of Ti, put T / = Ti(x ~ K). Then T~,... , T t are subgraphs covering the edges of G(x ~ K). They are threshold graphs by Condition 3 of Theorem 1.2.4. Hence t(G(x ~ K)) <_ t(G). The reverse inequality is trivial. 9
6.5
Restricted Threshold Dimension
In Theorem 6.1.3 we saw that computing the threshold dimension is hard. In Chapter 7 we show the stronger result of Yannakakis that recognizing t(G) <_ k remains NP-complete even for split graphs G and a fixed k _> 3. Here we show that a restricted form of the problem is hard. The concepts in this section are based on [CL84]. Vertices x and y of a graph G are called twins if N ( x ) - y - N ( y ) - x. The equivalence class of twins of a vertex x is denoted by Ex. Clearly each E~ induces a clique or a stable set in G. Given a graph G, the reduction G R is defined by V(a ~) -
{E~ " x C
V(a)}
and
E(G n) - {E~Ey " Ex # Ey, xy C E(G)}. Clearly G n is isomorphic to an induced subgraph of G, and in particular if G is threshold, then so is G n. To investigate the converse, we do the following. We label each vertex Ex of G n by k, s or b according as Ex induces a nonsingleton clique, a non-singleton stable set or a singleton in G. Given a subgraph H of G n, the unfolding Hu of H is the subgraph of G defined by
U{E
e V(H)}
136
The Threshold D i m e n s i o n
and
E(Hu)
{xy : E~Ey E E ( H ) } U {xy : x 7~ y,E~ = Ey C V(H),E~ is labeled by k).
The following question now arises naturally. If H is a threshold subgraph of G R, under what conditions is its unfolding Hu a threshold subgraph of G? A sufficient condition is given below. 6.5.1 Let the vertices of a graph be labeled by k, s or b. A threshold subgraph H is called a d m i s s i b l e if in H all k-vertices form a clique and all s-vertices form a stable set.
Definition
Lemma
6.5.2 If H is an admissible threshold subgraph of G R, then Hu is
a threshold subgraph of G. P r o o f . Let the vertex set of H be partitioned into a clique K and a stable set S. Since H is admissible, at most one k-vertex is in S and at most one s-vertex is in K. Therefore by moving at most one k-vertex from S to K and at most one s-vertex from K to S, we achieve a partition of V(H) into a clique K containing all k-vertices and a stable set S containing all svertices. Now Hu is obtained by duplicating some vertices of K into cliques and some vertices of S into stable sets. Hence Hu is also a threshold graph by Condition 3 of Theorem 1.2.4. [] It is easy to see that, conversely, if an unfolding Hu is a threshold subgraph of G, then H is ~n admissible threshold subgraph of G n. However, if T is an arbitrary threshold subgraph of G, then its image under the reduction of G to G n need not be admissible as illustrated in Figure 6.6. The example in Figure 6.6 also illustrates a case where G R is a threshold graph but its unfolding G is not threshold. The restricted threshold dimension of G, denoted by t*(Gn), is the mini m u m number of admissible threshold subgraphs of G R required to cover the edges of G n if such a cover exists, or oo if no such cover exists (as when G = C4). These subgraphs need not be spanning. Cozzens and Leibowitz [CL84] gave an equivalent definition of t*(GR). The next result states that the threshold dimension of G is bounded by t*(GR). C o r o l l a r y 6.5.3 For every graph C,, t(G) <_ t*(GR).
6.5
Restricted Threshold Dimension
137
Figure 6.6: A threshold subgraph T of G whose reduction is not admissible in Gn. The edges of T are indicated by thick lines.
G
k
i
k
Gn
P r o o f . This follows easily from Lemma 6.5.2. 9 We show below that equality holds in the above corollary when G is split. To do so, we need the next three lemmas and corollary. L e m m a 6.5.4 The vertices of every split graph can be partitioned into a clique K and a stables set S such that every equivalence class Ex is entirely contained in K or in S. P r o o f . Label the vertices of G by k, s, b according to the labels of their equivalence classes in G n. Since G has no induced 2K2 or C4, the k-vertices form a clique and the s-vertices form a stable set. Now argue as in the proof of Lemma 6.5.2. 9 L e m m a 6.5.5 Let H be a threshold subgraph of a split graph G(K, S). Then G has a threshold subgraph containing all the edges of H and the edges induced by K . P r o o f . The spanning subgraph H' containing the edges of H and the edges induced by K is a threshold subgraph of G, since every alternating 4-cycle in H' would also be an alternating 4-cycle in H. 9
138
The Threshold Dimension
Corollary 6.5.6 Every split graph C(K, S) can be covered by t(C) threshold
subgraphs, each containing all the edges of K. L e m m a 6.5.7 Let G(K, S) be a split graph with a clique K and a stable set
S as in Lemma 6.5.~. Let H be a threshold subgraph of C containing all the edges of K, and let F be the image of H under the reduction operation of C to C R. Then F is an admissible threshold subgraph of G R. T h e o r e m 6.5.8 For split graphs C, t(C) - t*(Cn).
Proof. The inequality t(G) <_ t*(G R) holds by Corollary 6.5.3 and the reverse inequality holds by Lemma 6.5.4, Corollary 6.5.6 and Lemma 6.5.7.
Corollary 6.5.9 For fixed k > 3, recognizing that t* ( C n) < k is NP-
complete. Proof. This follows from the above theorem and the result of Yannakakis for split graphs mentioned at the beginning of this section. 9 R e m a r k . The above corollary implies that the problem of computing t(G) remains hard when a labeling of V(G) by k, s, b is given and we require that all the threshold subgraphs in the cover be admissible.
Chapter 7 NP-Completeness 7.1
Introduction
In the next section we prove a result of Yannakakis which states that the problem of determining if an arbitrary poset has dimension at most 3 is NP-complete. Recall from Lemma 6.1.1 that the problem of computing the threshold dimension is NP-hard even for the class of triangle-free graphs. In Section 7.3 we strengthen this result for arbitrary graphs by showing that the problem of determining if t(G) _< k remains NP-complete for every fixed k > 3. Other similar results are also discussed in that section. All these results follow from the result of Yannakakis. Other complexity results are discussed in Section 7.4. Similar results exist for the split dimension, which is defined analogously to the threshold dimension. We discuss these results in Section 7.5. In the final section we define a generalization of split graphs called "polar graphs" and discuss complexity results related to the class of polar graphs.
7.2 7.2.1
The Partial Order Dimension Preliminaries
This section is based on Yannakakis [Yan82]. A partial order P on a finite set N (also called a poset) is an irreflexive, transitive binary relation on N. (This definition of partial order differs slightly from the one in Section 2.3, but this makes no difference to the issues of the present chapter.) If (x, y) C P, we 139
140
NP-Completeness
say that x < y in P. A linear order L on N is a partial order which contains (x, y) or (y,x) for every two distinct elements x, y of N. The linear order L is a linear extension of a partial order P if P C_ L. A partial order P can be viewed as a transitive directed acyclic graph (DAG) with the set of vertices N and an arc x ~ y for each pair (x,y) E P. A linear order is then a complete DAG; it is a linear extension of P if P is a subgraph of L. The intersection of a set of partial orders on a set N is obviously a partial order on N. The dimension do(P) of a partial order P on N is the m i n i m u m number of linear orders whose intersection is P. Clearly, a partial order has dimension 1 if and only if it is a linear order. Dushnik and Miller [DM41] gave a necessary and sufficient condition for a partial order P to have dimension 2. Two elements x and y of N are comparable if (x, y) or (y, x) belongs to P; otherwise they are incomparable. The incomparability graph of P is an undirected graph I(P) with N as its set of vertices and edges connecting the pairs of incomparable elements. Dushnik and Miller's result (Lemma 16.4.4) is that P has dimension at most 2 if and only if I(P) is transitively orientable; i.e., the edges of I(P) can be oriented so that the resulting directed graph is transitive. (A graph possessing a transitive orientation is called a comparability graph.) This condition combined with an efficient algorithm for the recognition of transitively orientable graphs [PLE71] gives a polynomial algorithm to test if a partial order has dimension at most 2. Here we prove that it is NPcomplete to determine if the dimension of a partial order is at most 3, and that consequently the same also holds for every fixed k _> 3. Let P be a partial order on a finite set N and partition the elements of N into two sets S and S' so that every arc of P between S and S' is from S to S'; in other words, S is an ideal of P. Let B(P) be a bipartite graph (S, S'; E) with the set of vertices N and the set of edges {xy 9 x E S,y E S ' , x , y incomparable}. Therefore for x E S,y E S' we have xy ~ E if and only if x < y. Consider a linear extension L of P, and let L' be the bipartite graph on N with the edge set {xy 9 x C S,y E S ' , ( y , x ) E L}; i.e., L' contains those arcs of L (without the direction) that are directed from S ~ to S. Since P has no such arcs and L is a linear extension of P, L' must be a subgraph of B(P). Recall the characterization of difference graphs given in Condition 2 of Theorem 2.4.4. It follows that L' is a difference graph, for assume that Xl,X2 E S and yl,y2 E S ~ are four distinct vertices such that Xlyl,x2y2 e E(L'). Then (yl,Xl),(y2, x2) E L, and since L is linear, (yl,x2) or (y2, Xl) must be in L. Hence at least one of xly2 and x2yl is in L'.
7.2
141
The Partial Order Dimension
Yannakakis uses the term chain graphs for difference graphs. For a bipartite graph B, the difference dimension of B, denoted by ch(B), is the minimum number of difference subgraphs of B needed to cover E(B). 7 . 2 . 1 For every partial order P, ch(B(P)) < do(P). In particular, do(P) < 3 =~ ch(B(P)) < 3. Lemma
P r o o f . If P has dimension d and if L 1 , . . . , Le are linear extensions of P whose intersection is P, then L ~ , . . . , L ~ are difference subgraphs of B(P) covering its edges. ,,
7.2.2
The Reduction
Consider the following two decision problems. C h r o m a t i c n u m b e r 3 p r o b l e m - Given a graph G, is the chromatic number x(G) at most 3? P a r t i a l o r d e r d i m e n s i o n 3 p r o b l e m : Given a partial order P, is the dimension do(P) at most 3? The chromatic number 3 problem is known to be NP-complete [GJS76]. We reduce it to the partial order dimension 3 problem by constructing from G in polynomial time a partial order P such that x(G) _< 3 if and only if
do(P) <_ 3. Let G : (V,E) , with V = {u~,...,u,~} and E = {e~,...,e,~}. We construct a partial order P on the union of two disjoint sets S and S ~ as follows. The elements of S are partitioned into Q, R and the elements of S' are partitioned into Q', R', where
Q - {uik. vertex ui is incident with edge ek}, I~-
{ t t i a , ?.tib " tt i is a
vertex}.
Q~, R I are "primed versions" of Q, R, respectively, namely
Q ' - {u'ik "vertex ui is incident with edge ek}, R' - {U'ia, U'ib " Ui is a vertex}. The partial order P is defined by the following five rules" 1. Each vertex in R is smaller than each vertex in R I U Q / w i t h the same first index, except for its primed version.
NP-Completeness
142
,
(a) Each vertex in Q is smaller than each vertex in R'. (b) A vertex u~k in Q is smaller than a vertex u'jt in Q' if k < 1.
3. A vertex uik C Q is smaller than a vertex u'jk C Q~ if ek - uiuj. 4. A vertex uik C Q is smaller than a vertex ujl C Q if k < 1. 5. There are no other relations in P. It is easy to verify that the relation P defined by the above five rules is a partial order and that S is an ideal of P. Thus the edges of B(P) are as specified in the three conditions below: 1. From each vertex in R to its primed version in R' and to all vertices of R' U Q' with a different first index. 2. From uik C Q to u'jl c Q' if k > 1. 3. From each vertex in Q to its primed version in Q'. Figure 7.1 illustrates B(P). Lemma
7.2.2 ch(B(P)) < 3 =>. x(G) < 3.
P r o o f . Let B1, B2, B3 be three difference subgraphs of B(P) that cover it. Consider the subgraph Hi of B(P) induced by all vertices with first index i. It has three connected components" the edge ttiattlia, the edge ttibtffib and the subgraph induced by the uik, u'ik with 1 _< k _< m. Being a difference graph, none of the Bt's can contain two edges from different components of Hi. Since Hi has three components, all edges of the third component are in the same Bl; color vertex ui with color 1. We must show that this is a proper coloring of G. Assume that, if possible, there are two adjacent nodes ui, uj with the same color 1. Let ek - uiuj. From the definition of the coloring we have UikUlik, ttjkUtjk C Bl. But these two edges induce a 2K2 in B(P), hence also in Bt, contradicting the assumption that Bl is a difference graph. 9 Lemma
7.2.3 x(G) <_ 3 => do(P) <_ 3.
P r o o f . Let Co, C1, C2 be the sets of indices of vertices of G that receive colors 0, 1, 2 respectively. We exhibit three linear extensions L0, L1, L2 whose intersection is P.
7.2
T h e P a r t i a l Order D i m e n s i o n
143
Figure 7.1" A graph G and the associated B(P). Only the edges incident to Ula, Ulb E R and to the vertices of Q are completely shown. Ul
U2
U3
G ILl 1
U12
7221
U32
Ula
Ulb
U2a
t/2b
tt3a
U3b
tL/11
U / 12
72121
U/32
?At 1a
it I 1b
U / 2a
tt/2b
U/3a
U/3b
B(P) To describe linear extensions, we use the following notation. A linear order Xl < " ' " < Xp is denoted by the string Xl " ' " Xp. If I = { i l , . . . , ip} is an index set with il < ... < ip and {Fi : i E I} is a set o f p a i r w i s e disjoint strings, then (F~ T i c I> denotes the concatenation F h . . . F~, and (F~ I i C I> denotes the concatenation F ~ . . . F h. For c = 0, 1,2 we let
L ~ - R~(E~ T k e {1,...,m}>R'~(Li ~, i e C~+2>, where addition of color indices is modulo 3 and R c - - {Uia?-l, ib"
i C C~},
R'~ - { u'~U'~b 9 / C C~},
E~ __ ~ UikUjk, L tLjkU/ikttik,
if i, j ~ C~ if i C C~,
ia Uia It ib
where ek -
1""
uiuj~
NP-Completeness
144
Li = ~iaU'ib?~ibUtia(~tik
,L k E { 1 , . . . , m ) ) .
(In the above definition each of the sets Re, R'c and the set in the first case of E~ denote an arbitrary linear ordering of the elements in the set.) It is straightforward to verify that each Li is a linear extension of P. We show now that for every pair of incomparable elements x, y G P, (x, y) is in one of the L~'s. This will show that Lo n L1 ('1 L2 = P, as required. We consider all the possible forms of x and y, using the conventions i , j E { 1 , . . . , n } , k , l E { 1 , . . . , m } a n d s , t E {a,b}. C a s e 1: x = u i ~ , y = u j t . (x,y) E L ~ i f a ) i E C ~ j ~ C ~ , b ) i = j E C~+~, s = b, t = a, c) i = j E C~+2, s = a, t = b, d) i , j E C~+I, i < j, or e)
i,jEC~+2, i>j. C a s e 2: x = ui~, y = u'jt or y = ujk or y = u'jk. (x,y) E L~ if i E C~. C a s e 3: x = u'i~, y = ujt. In this case i 7~ j or (i, s) = incomparable. Then (x, Y) E L~ if a) i E Cc,j ~ C~, b) i, j E C~+2, i > j, d) i = j E C c + l , 8 -- a = t, or e) i = C a s e 4: x : u'is, y : tttjt. (x, y) E L~ if a) i E C~,j i<j,c) i,jEC~+2, i>j,d) i=jEC~+l,s=a,t=b,
(s, t) because x, y are i,j E C~+I, i < j, c) j E Cc+2, s = t = b. ~ C~, b) i , j E Cc+l, ore) i=jEC~+2,
s=b,t=a. C a s e 5: x = u'i~, y = ujk. In this case (y,x) E P, contradicting the incomparability of x and y, so the case is impossible. C a s e 6: x = u'i~, y = u'jk. (x,y) E L~ if a) i E C~,j ~ C~, or b) i , j E C~+I. C a s e 7: x = u~k, y = uj~ or y = u'5~ or y = u'jl. (x,y) E L~ if j ~ C~. C a s e 8: x = uik, y = ujt. In this case k = 1 because x, y are incomparable. Then (x, y ) E L~ if j C C~. C a s e 9: x = u'ik, y = ujt. In this case i -r j because x, y are incomparable. Then (x,y) E L~ if a) i E C~,j q~ C~, b) i,j E C~+l, i < j or c) i , j E C~+2,
i>j. C a s e 10: x = u'ik, y = u'jt. (x,y) E L~ if i E C~. C a s e 11: x = u'ik, y = ujl. In this case (i,k) = (j, 1) or k < / b e c a u s e x and y are incomparable. Then (x, y) E L~ if i E Co. C a s e 12: x = u'~k,y = u ' j l . (x,y) E L~ if a) i E C~,j q~ C~, b) i , j E Cc, k j, or e) i = j E C ~ + a , k > l . In each possible case, one of the alternatives leading to (x, y) E L~ must hold for some c. [] Theorem
7.2.4 It is NP-complete to determine if the dimension of a given
partial order is at most 3.
7.2
T h e P a r t i a l Order D i m e n s i o n
P r o o f . This follows from Lemma 7.2.1, Lemma 7.2.2, and Lemma 7.2.3.
145 9
T h e o r e m 7.2.5 It is NP-complete to determine if a given bipartite graph
can be covered by at most 3 difference subgraphs. P r o o f . Again this follows readily from Lemma 7.2.1, Lemma 7.2.2, and Lemma 7.2.3. 9 T h e o r e m 7.2.6 For every fixed k >_ 3, the problem of determining whether ch(B) <_ k is NP-complete. P r o o f . We use a simple reduction from the case when ch(B) _< 3. For a bipartite graph B, add (k - 3)K2's (i.e., k - 3 independent edges) to get B'. Then ch(B') = ch(B) + k - 3 so that ch(B') <_ k if and only if ch(B) <_ 3, and the result follows from Theorem 7.2.5. 9 The height of a partial order P is the length of a longest path in (the DAG) P. Kimbel [Kim73] showed that every partial order P can be transformed efficiently into a partial order P' of height 1 such that do(P) <_ do(P') <_ do(P) + 1. Therefore it is desirable to have an efficient algorithm to compute the dimension of a partial order of height 1, since this would enable us to find a close approximation for the dimension of a partial order. However, the following result holds. T h e o r e m 7.2.7 For every fixed k >_ 3, the problem of determining if the
dimension of a poset of height 1 is at most k is NP-complete. P r o o f . By virtue of Theorem 7.2.4, we may assume that k >_ 4. Let B1 - (S1, S{;E1) be a bipartite graph. Construct the bipartite graph B (S, S'; E), where S - $1 U {u}, S ' - S{ tO {u'} and E - E 1 [,_J {?.t?_tt}. Let P be the poset of height 1 on S tO S' with (x, y) C P if and only if x C S, y E S' and xy ~ E. Clearly B(P) - B. We assert that ch(B1) < k - 1 if and only if do(P) <_ k. The result then follows from Theorem 7.2.6. "If"" If do(P) <_ k, then by Lemma 7.2.1, ch(B) <_ k and clearly ch(B1) < k-1. " O n l y if"" If ch(B1) _< k - 1, let G 1 , . . . , Gk-1 be the difference subgraphs covering El. Recall from Condition 4 of Theorem 2.4.4 that for each l, the vertex sets S1,S~ are partitioned into $1 - R0 U ... tO Rt and S~ - R'o U ... tO R't (Ro or R'o may be empty) so that for each vertex
146
NP-Completeness
x C Ri and y E R'j, xy is an edge of Gt if and only if i + j > t. Define the linear order
Kl = ProR't R1 R't- 1"'" Rt R'o on S1 U S[. Then define the linear order
LI = uKl u~ on S U S'. Each Lz is a linear extension of P because, given (x, y) E P, 9 if x C R~,y E R'j, then xy ~ B1 :=~ xy ~ GI ~ i + j < t ~ (x,y) c I(l =~ (x, y) C Lt. 9 if x - u then y E S~, hence (x,y) C Ll; 9 if y = u' then x C S1, hence (x, y) C Lt; Now let C, C' be linear extensions of fl)-] Ll restricted to $1, S[ respectively, and let D, D ~ be the reverse orders of C, C ~ respectively. Define the linear order
Lo = Du' uD' on S U S ~. Clearly L0 is a linear extension of P and thus P C_ N~-ILI. Conversely, assume that (x, y) e N~-0~Lt. We show below that (x, y ) i s in P in all cases. C a s e 1: z = u. Then y q~ $1 t_J {u'} by the definition of L0. Thus y C S[, but then (x, y) C P. C a s e 2: y = u ~. This case is similar to Case 1. C a s e 3- x :/: u, y -r u'. Then x C $1 and y C S~ by the definition of L 0 , . . . , L k - 1 . Now, (x,y) ~ P => xy C B =>. xy E G~ for some l = 1 , . . . , k 1 => (x,y) ~ I(l =~ (x,y) ~ Ll. Thus (x,y) ~ N~__-ILI, a contradiction. It k-1 follows that P - fit= 0 Ll and hence do(P) <_ k. "
7.3
Related N P - c o m p l e t e P r o b l e m s
In this section we show, using Theorem 7.2.6, that several related dimensiontype problems are NP-complete.
7.3
Related NP-complete Problems
7.3.1
147
Interval D i m e n s i o n
Let X be a set of closed intervals on the real line. We can define a partial order P on X, where for x, y C X we have (x, y) C P if and only if the right endpoint of interval x is to the left of the left endpoint of interval y. A partial order that can be constructed in this way is called an interval order, as in Definition 2.1.5. The interval dimension of a partial order P, denoted by di(P), is the m i n i m u m number of interval orders whose intersection is P. Since every linear order is an interval order, we have de(P) <_do(P). Interval orders of height 1 are closely related to difference graphs. Recall from Part 2 of Theorem 2.1.6 that a necessary and sufficient condition for a partial order P to be an interval order is that P does not contain a pair of independent arcs, i.e., two arcs (x,y) and ( u , v ) s u c h that x and y are incomparable with u and v. Thus, a partial order of height 1 is an interval order if and only if its bipartite underlying graph G(P) (its comparability graph) has no induced 2K2. By Condition 2 of Theorem 2.4.4, an equivalent condition is that G(P) is a difference graph. Let P be a partial order of height 1 and let S ~ be the set of elements of height 1 and S the set of elements of height 0. Clearly all arcs of P are directed from S to S'. Let B(P) be the graph that we defined in the previous section; i.e., B(P) is the bipartite graph on S U S ~ with the set of edges {xy : x C S,y E S',(x,y) ~ P}. Thus G(P) and B(P) are bipartite complementary graphs, and therefore G(P) is a difference graph if and only if B (P) is a difference graph. Lemma
7.3.1 Let P be a poset of height 1. Then di(P) = ch(B(P)).
P r o o f . d i ( P ) <_ c h ( B ( P ) ) " Let ~l,...,~k be difference subgraphs of B(P) that cover its edges. For each B~ define the partial order P~ - {xy 9 x C S, y E S',xy ~ Bi}. Since Bi is a difference subgraph of B(P), Pi is an interval order that contains P. Since the Bi's cover the edges of B(P), the intersection of the Pi's is P. It follows that do(P) <_ k. c h ( B ( P ) ) <_ di(P)" Let P 1 , . . . , Pk be interval orders whose intersection is P. For each i, let P~ be the subgraph of Pi consisting of those arcs of Pi that are directed from S to S'. Let (x, y), (u, v) be two arcs of P[ with distinct vertices x, u C S and y, v E S'. Since Pi is an interval order, these two arcs cannot be independent in Pi. By symmetry we may assume that Pi contains an arc from {x, y} to {u, v}. Then by transitivity (x, v) E Pi, and therefore
NP-Completeness
148
(x, v) E P[. Thus P/~ is an interval order of height 1, and consequently B(P~) is a difference graph. Since the intersection of the Pi's is P and all arcs of P are directed from 5' to S', the intersection of the P['s is also P. Therefore, the B(P[)'s are difference subgraphs of B(P) that cover its edges. It follows that ch(B(P)) <_ k. ,, C o r o l l a r y 7.3.2 For every fixed k >_ 3, it is NP-complete to determine if
the interval dimension of a partial order of height 1 is at most k. P r o o f . This follows from Theorem 7.2.6 and Lemma 7.3.1.
7.3.2
Boxicity
Let X be a set of closed intervals on the real line. Consider a g r a p h on X, having an edge between every two intervals with a nonempty intersection. A graph that can be constructed in this way is called an interval graph, as in Definition 2.1.5. Thus, an interval graph is the incomparability graph of an interval order. The boxicity of a graph G, denoted by b(G), is the m i n i m u m number of interval graphs whose intersection is G. It exists by L e m m a 6.3.2, since Kn and K n - e are interval graphs. L e m m a 7.3.3 Let B be the complement of a bipartite graph B. Then b(B)
-
P r o o f . Let us show first that the complement B of a bipartite graph B is an interval graph if and only if B is a difference graph. Clearly, if B is a difference graph, then B is a comparability graph without induced 2K2. Then by Part 1 of Theorem 2.1.6, B is an interval graph. Conversely, if B is an interval graph, then it is the incomparability graph of an interval order P. Therefore B, the underlying graph of P, does not contain a pair of independent edges. Since B is also bipartite, it is a difference graph. b ( B ) <_ c h ( B ) " Let B ~ , . . . , Bk be difference subgraphs of B that cover its edges. Their complements B 1 , . . . , Bk are interval graphs whose intersection is B. Therefore b(B) <_ k. e h ( B ) <__b(B)" Let B 1 , . . . , Bk be interval graphs whose intersection is B. Their complements B 1 , . . . , Bk are subgraphs of B and are therefore bipartite. Thus, the Bi's are difference subgraphs of B that cover its edges. Therefore h(B) < k. 9
7.3
Related NP-complete Problems
149
C o r o l l a r y 7.3.4 For every fixed k >_ 3, it is NP-complete to determine if the boxicity of a graph G is at most k, even if G is the complement of a bipartite graph.
7.3.3
Cubicity
A unit interval graph is the intersection graph of unit intervals (closed intervals of length 1) on the real line. The cubicity c(G) of a graph G is the minimum number of unit interval graphs whose intersection is G. It exists since Kn and K n - e are unit interval graphs. Clearly b(G) <_ c(G). L e m m a 7.3.5 Let B be the complement of a bipartite graph B. Then c(B)
-
P r o o f . In view of Lemma 7.3.3 and its proof, it sumces to show that the complement of a difference graph B is a unit interval graph. We have already seen that B is an interval graph. Further, B is also claw-free (i.e., has no induced K1,3). A well-known theorem of Roberts [Rob69] asserts that an interval graph is a unit interval graph if and only if it is claw-free. Therefore B is a unit interval graph. .. C o r o l l a r y 7.3.6 For every fixed k >_ 3, it is NP-complete to determine if the cubicity of a graph G is at most k, even if G is the complement of a bipartite graph.
7.3.4
Threshold D i m e n s i o n
Recall that the threshold dimension t(G) of a graph G is the minimum number of threshold subgraphs required to cover E(G). L e m m a 7.3.7 Let B be a bipartite graph whose vertices are partitioned into stable sets X and Y. Let B' be obtained from B by adding all edges between vertices in X (i.e., making X into a clique). Then ch(B) - t(B'). P r o o f . t ( B ' ) < o h ( B ) : Let B~,... ,Bk be difference subgraphs of B that cover its edges, and let B ~ , . . . , B~ respectively be obtained from them by making X into a clique. Then by Theorem 2.1.9, the B~'s are threshold subgraphs of B' that cover its edges. Therefore t(B') <_ k. o h ( B ) _< t ( B ' ) : Let B ~ , . . . , B ~ be threshold subgraphs of B' that cover its edges. For each i, let Bi consist of the edges of B~ between X and Y.
150
NP-Completeness
Then the Bi's cover the edges of B. We assert that they are also difference graphs. Assume that, if possible, Bi has a pair of independent edges xy, x'y' with x, x' E X and y, y' E Y. Then the subgraph of B~ induced by these four vertices is either a P4 (if it contains the edge xx') or a 2K2 (if it does not). In either case B~ is not a threshold graph by Theorem 1.2.4, a contradiction. This proves the assertion, and so ch(B) <_ k. .. Recall that a graph G is called a split graph with a split partition (K, S) if V(G) can be partitioned into a clique K and a stable set S. C o r o l l a r y 7.3.8 For every fixed k > 3, it is NP-complete to determine if a given graph G has threshold dimension at most k, even if G is a split graph. P r o o f . Clearly the graph B' in Lemma 7.3.7 is a split graph with a split partition (X, Y). Hence the result follows from Lemma 7.3.7 and Theorem 7.2.6.
7.4
Other Complexity Results
In this section we discuss some complexity results about threshold graphs due to Margot [Mar94b].
7.4.1
Preliminaries
We denote the set of integers by Z and the set of positive integers by Z +. Recall that a hypergraph H - (Is', E) consists of a set V of vertices and a collection E of subsets of V called edges. If I F I - r for all F E E, then H is called an r-hypergraph. An r-hypergraph is called a threshold r-hypergraph if there exists a function y 9 V ~ Z and an integer Y such that for every S C_ V with ISI - r, S is an edge if and only if y(S) - 2~es y(s) > Y. A Hamilton cycle in a r-hypergraph is a cyclic ordering of all its vertices such that every r consecutive vertices form an edge. If G - (V, E) is a graph with a weight function w" E ~ Z, and if T is a subgraph of G, then w ( T ) - ~ e E ( T ) w ( e ) . We consider the following recognition problems: LARGEST
THRESHOLD
SUBGRAPH"
I n s t a n c e : a graph G - (V, E) and a positive integer h _< IEI. Q u e s t i o n " Does G have a threshold subgraph r - (v, E') with IE'I >_ h?
7.4
Other Complexity Results
151
SMALLEST THRESHOLD SUPERGRAPH: I n s t a n c e : A graph G = (V, E) and a positive integer h. Q u e s t i o n : Is there a threshold graph T = (V, E') that can be obtained by adding at most h edges to G? WEIGHTED 2-THRESHOLD PARTITION: I n s t a n c e : A graph G = (V, E) with two weight functions Wl, w2 from E to Z and an integer W. Q u e s t i o n : Can G be partitioned into two threshold subgraphs T1, T2 (i.e., E(T1)U E(T2) = E(G) and E(T1)NE(T2) = O)such that wl(T1)+ w2(T2) >_
W? WEIGHTED 2-THRESHOLD COVER: I n s t a n c e : A graph G = (V, E) with two weight functions Wl, w2 from E to Z and an integer W. Q u e s t i o n : Can G be covered by two threshold subgraphs T1, T2 (i.e., E(T1)U E(T2) = E(G)) such that wl(T1)+ w2(T2) >_ W? MONOTONE 3-PARTITION (MON3PART)" I n s t a n c e : A set U of 3k elements and a size t(u) C Z + for each u C U. 1 Q u e s t i o n : Let T - -~ ~ueu t(u). Can U be partitioned into k ordered triples Vi = (ai, bi, ci), i = 1 , . . . , k, such that i- 1,...,k t(ai) -~- t(bi) + t(ci) = T, i=l,...,k-1 t(ai) <_ t(ai+l), t(ai) -~- t(bi) <_ t(ai+l)-4- t(bi+l), i - 1 , . . . , k -
1?
r-CYCLIC SCHEDULING: I n s t a n c e : A finite set C, alength l(c) C Z + U { 0 } for each c E C and a positive integer B. Question" Is there a cyclic ordering of the elements of C such that the sum of the lengths of every r consecutive elements is at most B? HAMILTONIAN THRESHOLD r-HYPERGRAPH (HTrH): I n s t a n c e : A threshold r-hypergraph H defined by the function y and the constant Y. Q u e s t i o n : Does H possess a Hamilton cycle? CLIQUE: I n s t a n c e : A graph G = (V, E) and a positive integer k < IVI. Question" Does G contain a clique of size k or more? C o m m e n t : This problem is NP-complete [G J78, page 194]. O N E - I N - T H R E E 3-SAT" I n s t a n c e : A set U of variables, a collection C of clauses over U such that
N P- C omplet enes s
15 2
each clause c C C has Icl = 3 and does not contain any negated variables. Q u e s t i o n : Is there a truth assignment for U such that each clause in C has exactly one true variable? C o m m e n t : This problem is NP-complete [G J78, page 259]. NUMERICAL MATCHING WITH TARGET SUMS (NMTS): I n s t a n c e " Disjoint sets A and B each containing rn elements, a size s(a) E Z + for each element a E A U B, and a target vector C = ( e l , . . . , Cm} with positive integer entries. Q u e s t i o n " Can A U B be partitioned into rn disjoint sets D 1 , . . . , Din, each containing exactly one element from each of A and B, such that ~ s(a) - ci
aEDi for i = 1 , . . . , r n ? C o m m e n t : This problem is NP-complete [GJ78, page 224]. We use the last three problems to prove that the remaining problems are NP-complete. Recall that threshold graphs can be recognized in linear time (Section 1.4). It follows that the first four problems are in NP. It is routine to verify that the next three problems are also in NP. In what follows we describe, for each of these problems, a polynomial-time reduction from a known NP-complete problem.
7.4.2
Largest Threshold Subgraph
A stable set of N vertices is denoted by IN. L e m m a 7 . 4 . 1 Let G - (V,E) be a graph and let G' - G | IN, where N > IVI. If T - (V U IN, E * ) i s a largest threshold subgraph of G', then there exists a split partition (If, S) of V(T) such that K C_ V. P r o o f . Consider a split partition (K, S) of T where K is a maximal clique. If K N IN = e , we are done. Otherwise IK N INI = 1 and we put K N IN = {j}. If N s ( j ) = e , then ( K - {j}, S + { j } ) i s the required partition. Now assume that N s ( j ) r rg, and let s C Ns(j). Then by the maximality of K, there exists a vertex k E K N V such that ks ~ E*. For each vertex s' C IN N S, we have ks ~ ~ E*, for otherwise s', k, j, s induce a P4 in T. Let T t be a spanning subgraph of G' obtained by deleting all the edges between j and N s ( j ) and adding all the missing edges between K N V and S n IN. At most I V I - 1 edges have been deleted (jk was not deleted)and at least INI- 1 _> Ivl edges were added between k and IN -- {j}. Therefore T' has more edges than T.
7.4
Other Complexity Results
153
Further, it is easy to verify that T ~is a threshold graph with a split partition (K - {j }, S + {j }), a contradiction. .. L e m m a 7 . 4 . 2 Let G - (V,E) be a graph and let G' - G | IN, where N _> IVI2/4. If T - (V U IN, E*) is a largest threshold subgraph of G', then there exists a split partition (K, S) of T such that K is a maximum clique of G. P r o o f . By Lemma 7.4.1, T has a split partition (K, S) with K C_ V. Thus IE(T)
<_ (IKI)2+ [KIN + IKIIV- KI _< (IKI)2+ IKIN + 1vi2/4 <_ (IKI)2+ (IKI + 1)N.
If K' is any clique of G, construct T t as a spanning subgraph of G whose edges join each vertex of K' to every other vertex of K ~ U IN. Clearly T ~ is a threshold graph with (I/~'1) + II,(,IN edges. If IK'I >_ [K I + 1, then T has more edges than T', contradicting the maximality of T. Hence IKI >__ IK'[.
L A R G E S T THRESHOLD S U B G R A P H and S M A L L E S T T H R E S H O L D S U P E R G R A P H are NP-complete.
Theorem
7.4.3
P r o o f . First we reduce CLIQUE to LARGEST THRESHOLD SUBGRAPH. Consider the following algorithm, whose validity follows from Lemma 7.4.2: I n p u t : A graph G = (V, E). O u t p u t : The cardinality co of a maximum clique of G. 1. For N - [ V~l-~], construct the graph G | IN and compute the number d of edges of its largest threshold subgraph. 2. Construct the graph G | IN+I and compute the number e of edges of its largest threshold subgraph. 3. S e t w - e - d .
NP-Completeness
154
This algorithm implies that if we can solve LARGEST THRESHOLD SUBGRAPH in polynomial time, then we can solve CLIQUE in polynomial time as well. It follows that LARGEST THRESHOLD SUBGRAPH is NPcomplete. This result directly implies that SMALLEST THRESHOLD SUPERG R A P H is also NP-complete, as T is a threshold subgraph of G if and only if T is a threshold supergraph of G. " The NP-completeness of the above problems also follows from the results of Yannakakis [YanS1]. 7.4.3
Weighted
2-Threshold
Partition
We assert that the NP-completeness of LARGEST THRESHOLD SUBGRAPH implies that of W E I G H T E D 2-THRESHOLD PARTITION and W E I G H T E D 2-THRESHOLD COVER. To see this, let G = (V, E) be a graph and h a positive integer forming an instance of LARGEST THRESHOLD SUBGRAPH. Construct an instance of W E I G H T E D 2-THRESHOLD PARTITION (respectively, W E I G H T E D 2-THRESHOLD COVER) as follows: Let W = h and let G' be the complete graph on V. Define for all
e E(c'), el(e)
__
{
1, -IEI,
ifecE
otherwise,
As the complement of a threshold graph is also a threshold graph, it follows that W E I G H T E D 2-THRESHOLD PARTITION (respectively, W E I G H T E D 2-THRESHOLD COVER) has an answer "yes" if and only if LARGEST THRESHOLD SUBGRAPH has an answer "yes". Hence the assertion. Moreover, from Theorem 7.4.6 below, W E I G H T E D 2-THRESHOLD PARTITION and W E I G H T E D 2-THRESHOLD COVER remain NP-complete even if we require that the weight functions be nonnegative. Let U, C be an instance of ONE-IN-THREE 3-SAT. Let the sets U, U be given by U - {Zl,...,x,~} and C - { C ~ , . . . , C m } . Assume without loss of generality that m _> 3. Construct a graph G - (V, E) with two weight functions wl, w2 and a constant W as follows: v - {x,,...
,Xn} u
u
7.4
Other
Complexity
Results
E -
155
u @ {x xj, i,j
Wl (XiXj)
x xj},
i:/:j
-/
t
0, ifxi, xj appear i n c k f o r s o m e k , 1, otherwise, 1 if xi appears in ck, 1 + g--~, 1, otherwise,
Wl(XiCk) -
W 1 (Xi-X j ) -- W 1 (-Xi-Xj) Wl('XiCk)-
-- 1
for all i r j,
1,
w2 (e) - 0 for all e C E, W - n(n-
1 1) + n m + -g.
Thus G has 2 n ( n - 1)+ 2rim edges, namely all possible edges except the edges between clauses or between complementary literals. Clearly, using rational rather than integer values for Wl, w2 and W is just a convenience, which does not affect the answer of the question. We show below that W E I G H T E D 2-THRESHOLD PARTITION on G with Wl, w2, W has an answer "yes" if and only if the given instance of ONEIN-THREE 3-SAT has an answer "yes". The proof is based on the following two lemmas. L e m m a 7.4.4 If T -
(V, E') is a threshold subgraph of the graph G defined 1)+ nm. Equality holds if and only if T has a split partition ( K , S ) such that If C_ { X l , . . . , X n , - ~ l , . . . , g n } , I1(I- ~, NT(C ) K for k - 1 , . . . , m , and there is an ordering { U l , . . . , u n } of the vertices of S - {C1,... , Cm} such that INT(Ul)[ - O, I N r ( u 2 ) l - 1 , . . . , INz(u )l - 1.
above, th n IE'I_
P r o o f . We describe a collection of threshold subgraphs T of G with n ( n 1) + n m edges each. Choose literals U l , . . . , Un containing exactly one of xi, x-~ for each i. Put S - { U l , . . . , u ~ , c ~ , . . . , c m } and If - V - S - { g l , . . . , g ~ } . Let T have all the edges uiuj with i 7~ j as well as all the edges cigj. In addition T has the edges uigj if and only if i > j. We now show that the graphs T described above are all the largest threshold subgraphs of G. Let T' be any threshold subgraph of G. We show that T' has at most n ( n - 1) + n m edges. In G, every edge between two literals conflicts with (i.e., forms an alternating 4-cycle with) exactly one other edge between literals. Thus by Condition 2 of Theorem 1.2.4, T' can have at most 1 [(2~) _ n], - n ( n - b e1)t wedges een literals. Next we show that T' has at most n m edges joining clauses to literals. Indeed, in G the edges xick and
156
NP-Completeness
gicl conflict if k -~ l. Therefore if NT,(Xi)N C 7~ 0 and NT,(g~)N C 7~ 0, then NT,(Xi)N C - NT,(gi)N C - {ck} for some k, in which case T' has exactly 2 edges between {x~,g~} and C. Otherwise NT,(X~)N C - ;g or NT,(-&)NC - r in which case T' has at most m edges between {x~,g~} and C. Since m > 2, T' has at most nm edges between literals and clauses, and T' attains this bound only if from each pair {xi,gi}, one literal, call it ui, is joined in T ~ to every clause, and the other one to none. Therefore T' can be a largest threshold subgraph only if T' has exactly n ( n - 1) edges between literals and exactly nm edges between literals and clauses. Let T' be a largest threshold subgraph and put K - { g l , . . . , u--~}, where the ui are as defined above. Clearly K is a clique of T', for if uiuj is not an edge of T', then ~iCl conflicts with -5jc2 in T', an impossibility. Put S - { U l , . . . , u ~ , c l , . . . , c m } . T' cannot contain any edges uiuj, because this edge conflicts with gigj of K. Thus S is a stable set in T'. By Condition 3 of Theorem 1.2.4 we may reindex the variables so that NT(Ul) C_ ... C_ NT(U~). Since u~g~ is not an edge, it follows that INT( n)I _< 1, and hence INT(Ur,_I)I < n - 2 , . . . , [Nz(ul)l <_ O. Since T' has exactly n ( n - 1) edges between literals, the above inequalities must be satisfied as equalities, and hence T' is one of the threshold subgraphs T described in the beginning of the proof. 9 L e m m a 7.4.5 For the graph G defined above,
1. if T is a largest threshold subgraph of G, then G - T is also a largest threshold subgraph of G; 2. conversely, if (T,T') is a partition of G into two threshold subgraphs, then both T and T' are largest threshold subgraphs of G. P r o o f . 1: By Lemma 7.4.4, G - T is isomorphic to T. 2: Since T, T' are threshold subgraphs of G, each has at most one half of the total number of edges by Lemma 7.4.4. Therefore each has exactly that many edges, and hence each is a largest threshold subgraph by Lemma 7.4.4.
T h e o r e m 7.4.6 The problems WEIGHTED 2-THRESHOLD P A R T I T I O N and WEIGHTED 2-THRESHOLD COVER remain NP-complete even if the weight function wl can take only 3 different nonnegative values and the weight function w2 is always O.
7.4
157
Other Complexity Results
P r o o f . We obtain a polynomial-time reduction from O N E - I N - T H R E E 3SAT to W E I G H T E D 2-THRESHOLD PARTITION. Let an instance of ONEI N - T H R E E 3-SAT be given and construct G, Wl, w2 and W as above. We show that O N E - I N - T H R E E 3-SAT has an answer "yes" if and only if W E I G H T E D 2-THRESHOLD has an answer "yes". Assume that W E I G H T E D 2-THRESHOLD P A R T I T I O N has an answer 1 "yes". Consider the threshold subgraph T having w l ( T ) >_ n ( n - 1) + n m + -d, and let it contain r edges e with Wl(e) - 1 + ~1 and s edges e with W l ( e ) - - 1 1 Since each clause has only three variables, r _< am. From r(1 + g-~) + s >_ 1 it then follows that r + s > n ( n - 1) + n m . L e m m a 7.4.4 n ( n - 1 ) + n m + -g then shows that r + s - n ( n - 1) + n m and T is a largest threshold subgraph of G whose edges are precisely the edges e with wl(e) >_ 1. But since the clique K described by L e m m a 7.4.4 contains only edges e with w l ( e ) -- 1, no clause can have more than one variable in K, and consequently r _< m. Thus r - m, each clause has exactly one variable in K, and a solution of O N E - I N - T H R E E 3-SAT is obtained by setting all variables that are in K to T R U E and the others to FALSE. Conversely, assume that O N E - I N - T H R E E 3-SAT has an answer "yes". By L e m m a 7.4.5, it suffices to find a largest threshold subgraph T - (V, E') 1 We construct T as follows: The clique of G with W 1 ( T ) ~ n ( r t - 1) + n m + -g. K of T consists of all vertices xi (respectively gi) such that xi is T R U E (respectively FALSE) in the solution of O N E - I N - T H R E E 3-SAT. For each k, put NT(ck) -- K . Since K represents a solution of O N E - I N - T H R E E 3SAT, ck has exactly one incident edge e with W l ( e ) -- 1 + ~1 (recall that ck contains only unnegated variables) and n - 1 incident edges e with W l ( e ) -- 1. 1 Each of Thus the total weight Wl of the edges between C and K is n m + ~. the (~) edges e of If has w l ( e ) -
1, since each clause contains exactly one
T R U E variable. It remains to find (~) edges e with w l ( e ) -
1 between K
and { X l , . . . , X n , g l , . . . , 5 n } K to add to T so as to keep it as a threshold graph. To ensure that each selected edge e satisfies W l ( e ) -- 1, at least one endpoint of e must be a negated variable. Assume for notational convenience that K { x l , . . . , x p , - ~ p + l , . . . , x - - ~ } . The required selection is then obtained by taking
{xiT1,...,Xp,-Xp+l,-.-,-Xn},
gT(-Xi)
--
NT(Xj)
-- {xjT1,...,Xn},
i- 1,...,p j - p+ 1,...,n.
The result for W E I G H T E D 2-THRESHOLD C O V E R is directly implied
158
NP-Completeness
by the above proof, as the only 2-threshold covers of the constructed graph G are actually 2-threshold partitions of G. This follows from Lemma 7.4.5 and the fact that a largest threshold subgraph of G contains exactly one half of the edges of G. ..
7.4.4
Reduction
from
NMTS
to MON3PART
The following theorem is due to M. Troyon [Mar94b]. Theorem
7.4.7 M O N 3 P A R T
is N P - c o m p l e t e .
P r o o f . Reduction from NMTS. Let At B, C and s be an instance of NMTS. For brevity, we write only "x" for "s(x)" or "t(x)" in the following. Let A - { a l , . . . , a m } and B - { b l , . . . , b m } . We may assume that m
m
m
i=1
i=1
i=1
for otherwise NMTS has an answer "no" and we are done.. We also assume that m _> 3, otherwise NMTS is trivial. We construct the following instance of MON3PART: Put F - m a x { a i , bi, ci 9 1 <_ i <_ m } . We may assume without loss of generality that F > 0 (think of F as a very large integer). Define xi = 8 ( m a i + i m 2 F + i) + 1, y i = 8mbi + 2, zij = 8 ( - m c j - i m 2 F - i) + 4, hij = 8 ( m c j + i m 2 F + m F + i ) - 4, Pi = - 8 m F + 7, qi = 8 ( - r n c i q- rn4F) q- 7, ri = 8 ( - i m 2 F - i - m F m 4 F ) + 4,
zzz= z= z= z i--
1,...,m 1,...,m 1,...,rn;j = 1,...,m 1,...,rn;j = 1,...,m 1,...,m2-rn I
~ .
.
.
~ Trt
1,...,m.
and let these 3(m 2 + m) numbers form the set U. The sum of the elements of U is 7(rn 2 + rn), and accordingly we put T = 7. We prove that NMTS and MON3PART have the same answer for their respective questions. Notice that pi is a constant and hence in the following we denote it simply by p. a) Assume that NMTS has an answer "yes" with the solution ai+b~(i) = cp(0, where ~r and p are permutations of 1 , . . . , rn, and partition the elements of
~
~
.
o
~'"
~
,..~
~< .
--
-"~~.~~4~~
..
~
"'"
0
~, ~ "' "
~r.,
~
~
.
~ ~
-.
"
~ ~ .
.
~
~
" .-.-,
~
.
o~
""
..
-
~
-
..
~-~
<
c~ ~
o~
~
~
~
,.< ~
~'+
~g
~
~
-.
~
~ ~
,-<
~
o
~
~ ~,~.,,~ III ~
+f,.
--"
=,'o
~
@ ~
~ ".., "
9
,~
"
"
o ~..~.~..~
0
~
~
.
m-
~.IA
...
c~
=o~
~
oo ~
V
In" ~
o
~o~"
~
o ~
.
~ iv
~
~
"--"
~
q
~
~ o~ 9 ~
~
~
~
"<
"-
.
...
~
9
~
r~
~
~
.
~ -7- ~
~
~" ~
~
~
~
l::::b
.
9
~
IA
~
~
IA
.
~.
+
II ~
o ~ ~ ~
~
Oo
IA
+~
~
+
~
~
I
II
~
~
~
~.
~o
~
~
o
@
~
"-"
~T
-.
~'~
o
~
o
~
~
~
9
~
0
=
~
~
~ u-'
~
~
~
=-~
,~,~
o ~ r~ ~ ~ ~ ~. ~ ~
~ Z "
~
~IA
=
~
~
"-
~"
9 ~
~ ~
u-' ~ o ~ o
.
II
..
.
"~
9
"$t-. "
~
II 9
~..., ,~
~ ~ :" "
~ ~ ~
~ ~
~-~.
~
o
o
o
"
_
o !~
~"
NP-Completeness
160
1. Exactly m triples of type (x, y, z) appear in the solution and they contain each of X l , . . . ,xm, y l , . . . , ym exactly once. For every such triple (xi, yj, zlk) we have xi+Yj+Zlk -- 7 mod 8m, i.e., (8i+ 1 ) + 2 + ( - 8 / + 4 ) = 7 + 8(i - l) - 7 rood 8m, which implies i = 1 and hence ai q- bj = ck. This shows that each ai and each bj appears exactly once in ai q-bj = ck. It remains to show that the same is true for each ck. 2. Exactly m triples of type ( h , q , r ) appear in the solution and they contain each of q l , . . . , q m , r l , . . . , r m exactly once. By the same argument as above one can show that for every such triple (hij,qk, rl) one has i = l, and since hij + qk + ri = 8m(cj - c k ) + 7 = T, we have cj = ck. Hence hij = hik and we may assume without loss of generality that j = k (if j -~ k, exchange h~j with h~k to obtain another solution of MON3PART; these exchanges will not cycle because if (hik, qk, ri) appears, then no other (h, q, r) has the same index for q, so this hik will never be required for another exchange). Therefore for each v = 1 , . . . , m, exactly one h~v appears in the triples (h, q, r). 3. Exactly m 2 - m triples of type (z, h, p) appear in the solution to account for all the p's. With the same arguments, one can show that for every such triple (zij, hkt, p) one has i = k and cj = cl. Once again as zij = zil, we may assume without loss of generality that j = 1 (if j r l, exchange zij for zil to obtain another solution of MON3PART; these exchanges will not cycle because once the indices of z, h are made equal in (z, h, p), this z is not needed for any other exchange). Since the (m 2 - m) pairs of indices of z, h agree in (z, h, p), the remaining m indices of z in (x, y, z) agree with the m indices of h in (h, q, r). The second indices of h and q agree in (h, q, r). Therefore each index appears exactly once as a second index of h in (h, q, r), and hence as a second index of z in (x, y, z). Thus each ck appears exactly once in ai + bj = ck, i.e., all targets appear in these triples. Hence NMTS has an answer "yes". 9 7.4.5
r-Cyclic
Scheduling
and
HTrH
We show in three stages that r-CYCLIC SCHEDULING is NP-complete for all r > 3. In the first stage we reduce MON3PART to 3-CYCLIC SCHEDULING. Then we reduce it again to 4-CYCLIC SCHEDULING. In the last stage we reduce r-CYCLIC SCHEDULING to (r + 1)-CYCLIC SCHEDULING.
7.4
Other Complexity Results
161
We then show that HAMILTONIAN THRESHOLD r - H Y P E R G R A P H is also NP-complete. T h e o r e m 7.4.8 3 - C Y C L I C S C H E D U L I N G
is NP-complete.
P r o o f . The proof is by reduction from MON3PART. Let U, t be a given instance of MON3PART and T = t ( U ) / k . Construct an instance of 3-CYCLIC SCHEDULING in the following way: set C = U t_J {a, b, c, d, e}, l(u) = t(u) for all u C U, l(a) = l(b) = l(c) = l(d) = O, l(e) = T and B = T. Any solution V I , . . . , Vk of MON3PART allows the construction of a solution of 3-CYCLIC SCHEDULING in the following way: take the elements corresponding to Vk,..., V1 in that order and then take a, b, e, c, d. The verification of this solution is quite simple. It is also clear that any solution of 3-CYCLIC SCHEDULING induces a solution of MON3PART. Indeed, The element e in the solution has to be preceded and followed by two elements with length 0, i.e., by two elements among a, b, c, d. Now partition the elements of C - {a, b, c, d, e} into k sets of three consecutive elements in the cyclic ordering. The corresponding triples form a solution of MON3PART, as can be readily verified by adding the inequalities of 3-CYCLIC SCHEDULING and using the value of T. T h e o r e m 7.4.9 4 - C Y C L I C S C H E D U L I N G we require that [ C [ - 0 mod 4.
remains N P - c o m p l e t e
even if
P r o o f . The proof is by reduction from MON3PART. Let U, t be a given instance of MON3PART and T = t ( U ) / k . Construct an instance of 4-CYCLIC SCHEDULING in the following way: let D be a set of ( k - 1) elements, C = U U D U { a , b , c , d , e } , l(u) = t(u) for all u C U, l(x) = 3T for all x G D, l(a) = l(b) = l(c) = l(d) = l(e) = T, B = 4T. Clearly ICI = 0 mod 4. It is obvious that any solution V I , . . . , Vk of MON3PART allows the construction of the following solution of 4-CYCLIC SCHEDULING:
Vk, dk-1, Vk-1, d k - 2 ,
9 9 9 , V2,
dl, V1, a, b, c, d, e,
where D = { d l , . . . , d k _ l } . Conversely, assume that 4-CYCLIC SCHEDULING has a solution. Then each d C D must be preceded and followed by three elements of length < T each, namely by three elements of U, as the sum of the lengths of the three
NP-Completeness
162
elements preceding or following d is at most T and all elements are positive. This implies that the solution must have the form:
Vk, dk-1,
Vk-1, dk-2,
. . . , V2, d l , V1,
A,
where D - { a l l , . . . , dk-1}, the V/are ordered triples that partition U, and A is a permutation of a, b, c, d, e. Putting V / - (ai, bi, ci), adding the inequalities of 4-CYCLIC SCHEDULING, and using the value of T, we see that the V/ form a solution to MON3PART. " T h e o r e m 7.4.10 For fixed r > 4, r - C Y C L I C S C H E D U L I N G remains NPcomplete even if we require that ICJ - 0 mod r. P r o o f . The result is true for r = 4 by Theorem 7.4.9. The general result will follow by induction if we reduce r-CYCLIC S C H E D U L I N G with ICI _ 0 mod r to (r + 1)-CYCLIC SCHEDULING with IcI- 0 mod (r + 1). Let C, l, B be an instance of r-CYCLIC SCHEDULING with IcI - 0 mod r. Let us construct an instance C', l', B' of (r + 1)-CYCLIC S C H E D U L I N G as follows: let D' be a set of IC[/r elements, define C ' = C U D', l'(c) = l(c) for all c 6 C, l'(d') = 2B for all d' E D' and B' = 3B. Clearly [C' I = 0 mod (r + 1). Any solution of r-CYCLIC SCHEDULING can be transformed into a solution of (r + 1)-CYCLIC SCHEDULING by inserting an element of D' after every r elements. Conversely, if (r + 1)-CYCLIC SCHEDULING has a solution, then each element of D ~ must be preceded and followed by at least r, and hence exactly r, elements of C. Thus, the solution obtained by deleting all elements of D ~ is a solution to r-CYCLIC SCHEDULING. " Theorem
7.4.11 For r > 3, H T r H is NP-complete.
P r o o f . The proof is a simple reduction from r-CYCLIC SCHEDULING. In fact, the two problems are easily seen to be polynomially equivalent. Let C, l, B be an instance of a r-CYCLIC SCHEDULING. Construct an instance of H T r H as follows: each element of C has a corresponding vertex in the hypergraph H = (V,E), the function y is defined by y ( v ) = - l ( v ) f o r all vCV, andY=-B-1. Then a set of r vertices forms an edge if and only if the sum of the lengths of the r corresponding elements of C is at most B, which implies
7.5
The Split Dimension
163
that r-CYCLIC SCHEDULING has an answer "yes" if and only if H T r H has an answer "yes". 9 Notice that 2-CYCLIC SCHEDULING and HT2H are equivalent to the problem of determining if a given threshold graph is Hamiltonian, and can be solved in polynomial time (as seen in Section 1.6).
7.5
T h e Split D i m e n s i o n
Recall the definitions of a split graph and a split partition from Section 5.1. The split dimension of a graph G, denoted by ds(G), is the least number of split subgraphs of G that cover the edge set of G. The split dimension is well defined since an edge with isolated vertices is a split graph. We show in this section that for every fixed k > 3, the problem of determining whether the split dimension of a given graph is at most k is NP-complete, and that for k < 2, the problem can be solved in polynomial time. We then show that the problem of determining the split dimension remains NP-hard even for bipartite graphs. 7.5.1 The problem of determining for a given graph G - (V, E) whether ds(G) - 1 can be solved in O(IVI 2) time. In other words, split graphs
Theorem
O(lUl
tim .
P r o o f . In Theorem 1.5.2, we have seen that given a spanning subgraph H of G, the problem of determining whether there is a split graph T such that E ( H ) C_ E(T) C_ E(G) can be solved in O(IM I + IF[ + IVI) time, where M - E ( H ) and F - E(G). By taking H as G itself, we obtain the desired result. 9 We need the following two lemmas. 7.5.2 For every graph G and positive integer k, ds(G) <_ k if and only if V(G) can be partitioned into k or fewer cliques and a maximal stable set.
Lemma
Note that the word "maximal" may be dropped from the lemma, since vertices can be transferred into the stable set until it becomes maximal, leaving the rest of G still partitioned into k or fewer cliques. P r o o f . Assume that V(G) can be partitioned into k or fewer cliques K~ and a maximal stable set S. For each i, let Gi be the subgraph of G induced by the edges with at least one end in Ki. Clearly the Gi are split graphs
164
NP-Completeness
covering E(G), and hence ds(G) <_ k. Conversely, assume that E(G) can be covered by k or fewer split subgraphs G~. For each i, let (Iq, &) be a split partition of Gi and let S = V ( G ) - U Ki. Clearly S is a stable set. The cliques Ki can be made disjoint by dropping common vertices. 9 L e m m a 7.5.3 If G = (1/, E) is a graph with ds(G) < k, then the number of
maximal stable sets in G is at most
where
n =
II/I.
P r o o f . Assume that ds(G) <_ k. Then by Lemma 7.5.2, V can be partitioned into k or fewer cliques I'(i and a maximal stable set S. If S' is any maximal stable set of G and T = (12 Iq) n S', then ITI _< k and S' = T U (S - Ns(T)). It follows that for e a c h / - 0 , . . . , k , there are at most (n) maximal stable sets S' with ](U Ki) N S'] = i. Hence the result. 9 T h e o r e m 7.5.4 ([CC91]) For every graph G, we can determine in polyno-
mial time whether ds(G) < 2. P r o o f . Let n = IV(a)l. By Lemma 7.5.2, ds(G) _< 2 if and only if V(G) can be partitioned into two or fewer cliques and a maximal stable set. By L e m m a 7.5.3, if ds(G) _< 2, then G has at most
maximal stables sets. Therefore the following algorithm determines whether
ds(G) <_ 2. 1. Enumerate the maximal stable sets of G. If there are more than (o) + (;) + (2) of them, then stop" d s ( G ) > 2. Otherwise proceed. 2. for each maximal stable set S, determine whether V - S can be partitioned into two or fewer cliques. If so, then stop: ds(G) _< 2. If for no maximal stable set S can V - S be partitioned into two or fewer cliques, then ds(G) > 2.
7.5
T h e Split D i m e n s i o n
165
In [TIAO77], an O(]3dl)-time algorithm for obtaining the set ,M of all maximal stable sets is given. Hence step 1 can be executed in O(n 2) time. For each S C .A4, it is easy to determine in O(n 2) time whether V - S can be partitioned into two or fewer cliques, i.e., whether it induces the complement of a bipartite graph. Hence step 2 requires O(n 4) time. Thus the problem of determining whether ds(G) _< 2 can be solved in O(n 4) time. 9 In contrast with Theorem 7.5.4, we now show that for every fixed k _> 3, it is NP-complete to determine whether ds(G) <_ k. This result was first proved in [CC91]. We give a different proof here. Consider the following problem: PARTITION INTO CLIQUES: Instance: A graph G - (V, E) and a positive integer k _< IVI. P r o b l e m " Can V be partitioned into k or fewer cliques? C o m m e n t " This problem is NP-complete for every fixed k >_ 3 [G J78, page 193]. T h e o r e m 7.5.5 ([CC911) For every fixed k > 3, the problem of determin-
ing whether the split dimension of a given graph is at most k is NP-complete. P r o o f . Since split graphs can be recognized in O(n 2) time, the problem is in NP. We reduce PARTITION INTO CLIQUES to this problem. Let G (V, E) and k form an instance of PARTITION INTO CLIQUES. Construct the graph G' - GO Ik+l, where Ik+l is a stable set of k + 1 vertices. We show that ds(G') <_ k if and only if V can be partitioned into k or fewer cliques. If V can be partitioned into k or fewer cliques, then V(G') can be partitioned into these cliques and the stable set Ik+l, and it follows from Lemma 7.5.2 that ds(G') <_ k. Conversely, if ds(G') <_ k, then again by Lemma 7.5.2, V(G') can be partitioned into k or fewer cliques Ki and a stable set S. Now if V N S -~ 0, then Ik+l C_ [J Ki by the construction of G', which is impossible since each Ki can meet Ik+l at most once. It follows that V N S - ~ and hence V C_ U Ki. 9 Recall that a vertex cover of a graph G - (V, E) is a subset R of V such that every edge of G has at least one end in R. Clearly a subset S of V is a stable set if and only if V - S is a vertex cover. Recall also that p(G) denotes the size of a smallest vertex cover of G. The following problem is known to be NP-complete [G J78, page 190]. VERTEX COVER: I n s t a n c e : A graph G and a positive integer s. Question: Is p(G) <_ s?
NP-Completeness
166
T h e o r e m 7.5.6 ([CC91]) The problem of computing the split dimension remains N P - h a r d even when restricted to the class of bipartite graphs. P r o o f . We reduce VERTEX COVER to the problem of determining the split dimension of a bipartite graph. Let G and s form an instance of VERTEX COVER with V ( G ) {Vl,...,Vn} and E ( G ) - { e l , . . . , e , ~ } . Construct a graph G' as follows" V(G')
V ( G ) U { x i , yi, zi " l <_ i <_ n} U
-
{aki, akj, bk, Wk" 1 <_ k <_ m and ek E(G')
-
-vivj},
{vixi, xiy~,yizi " 1 <_ i <_ n} U {viaki, akibk, bkakj, akjvj, bkwk " ek -- vivj}.
Thus G' is obtained from G by subdividing each edge ek - vivj by three vertices aki, bk, akj, attaching a pendant P4 at each vertex vi, and attaching a pendant-edge bkwk to each new vertex bk. See Figure 7.2. Figure 7.2" A part of the graph G' in the proof of Theorem 7.5.6 arising from the edge vivj of G.
vi ~
X,i
aki -
bk
akj -,.
D
~ vj
|
Xj
yj
Wk
Yi
qD
q
Zi
|p
i~ zj
Thus IV(C')l - 4n + 4m, I E ( C ' ) I - 3n + 5m, and G' can be constructed from G in O(n + m) time. Since each edge of G is replaced with a P5, all cycles in G' are even and hence G' is a bipartite graph. We now show that
-
+
+ p(a).
7.5
T h e Split Dimension
167
This will imply that if the split dimension of a bipartite graph can be computed in polynomial time, then p(G) can also be computed in polynomial time. Since V E R T E X C O V E R is NP-complete, it then follows that determining the split dimension is NP-hard even for the class of bipartite graphs. Let R be a smallest vertex cover of G. For an edge xy of G', let [xy] denote the subgraph consisting of all edges of G' with at least one end in {x, y}. Clearly [xy] is a split subgraph of G'. Using R we construct a cover of G ~ by split subgraphs as follows. For each vertex vi of G, let if vi C R, if vi q~ R. For each edge ek = vivj of G with i < j, let {[bkaki]},
Qk --
if vj E R,
{[bkakj]}, if vj ~ R (and therefore vi C R).
Clearly the set T = (U~=IP~)U (U~__,Qk) is a collection of split subgraphs covering E(G'). Hence
ds(G') < ITI = 2IRI + ( ~ - I R I ) + m = ~ + m + p ( a ) . To prove the reverse inequality, let T be a minimum split cover of G'. Since G' is bipartite, we may assume without loss of generality that every split graph in T is of the form [xy] for some edge xy of G'. Indeed, by Theorem 5.2.1, if the split graph contains a P4 on a, b, c, d, then it is contained in [bc] and we may extend it to [bc]. If not, then for any edge ab of the split graph, the latter is contained in lab] and we may extend it to lab]. If for some edge ek = vivj of G, T contains two subgraphs of the form [xbk], [gbk], then x = aki and y = akj, for otherwise x = wk or y = wk and T - {[bkwk]} is also a split cover, contradicting the minimality of ITI. For each edge ek = vivj of G with i < j and [akiG], [akjbk] E T, delete [akjbk] from T and add [akjvj] to T. Let T ~ be the resulting collection of split subgraphs of G ~. It follows that T ~ is still a minimum split cover of G t and satisfies the following conditions. 1. For each edge ek of G , T ' has exactly one subgraph of the form [xbk] (at least one is required to cover bkwk and at most one by the minimality of T').
NP-Completeness
168
2. For each vertex vi of G, T' has exactly one subgraph of the form [xyi] (at least one is required to cover YiZi and at most one by the minimality
of T'). 3. The set {vi: [xvi] e T' for some x} forms a vertex cover of G (if the edge ek = vivj of G is not covered by this set, then T' must contain both [akibk] and [akjbk] in order to cover the edges viak~ and vjakj, contradicting Condition 1 above). It follows that T' contains the disjoint sets T1, T2, T3 consisting of subgraphs of the form [xbk], [yYi], [zvi] for some x, y, z, respectively. Hence by the above conditions, ITll- m, IT~l- ~, and IT31 _> p(a). Therefore
ds(G) - I T ' I ~ m + n + p(G).
7.6
Polar Graphs
The concepts and results presented in this section are all due to Chernyak and Chernyak [CC86]. A graph G - (V,E) is called a polar graph if V can be partitioned into (A,B) (A or B may be e m p t y ) s o that G[A] is the join of stable sets and G[B] is the union of cliques. In other words, all the components of G[B] and of G[A] are cliques. We then say that (A, B ) i s a polar partition of G. A polar partition is not unique, and we denote the graph G with the polar partition (A,B) by (G,A,B). Let l(G) denote the largest size of a component of a graph G. Chernyak and Chernyak [CC86] introduced the following classes of polar graphs, where c~ and/3 denote positive integers or
(X)"
(a,/3)- {(G,A,B)" I(G[A]) <_a, l(O[B]) <_/~}, (c~,/~)- {(G,B,A) " (G,A,B) c (a,/3)} - ( / 3 , a). Observe that (c~,/3) C_ (cd, fl') whenever c~ _< c~' and/3 _< /3'. In Chapter 13 we show that the inclusion is proper if at least one of the inequalities is strict. The smallest class of polar graphs in this hierarchy, namely the class (1, 1), is precisely the class of split graphs. The class (o o, 1) contains all the bipartite graphs and some other graphs, and the class (1, ~ ) contains their
7.6
Polar Graphs
169
complements. For arbitrary fixed, finite a and ~, membership in the class (a, ~) can be determined in O(n 2~+2z+a) steps, where n is the order of the graph, and membership in the class (1, ~) can be determined in O(n 3) steps, for finite or infinite/3 [CC86, page 134]. In this section we show that the membership problem in (oe, ~) is NP-complete for every fixed /3 _> 2, and also that the membership problem in the class (oe, co) of all polar graphs is NP-complete. We introduce these recognition problems formally as follows. POLAR(~)I n s t a n c e : A graph G. Question" Does G belong to (ec,/3)? POLAR:
Instance" A graph G. Question" Is G a polar graph? Recall the following problem: ONE-IN-THREE
3-SAT:
Instance" A set U of variables, a collection C of clauses over U such that each clause c C C has I c l - 3 and does not contain any negated variables. Question- Is there a truth assignment for U such that each clause in C has exactly one true variable? C o m m e n t " This problem is NP-complete [GJ78, page 259]. We reduce this problem to POLAR(/~- 1) for each/3 >_ 3. T h e o r e m 7.6.1 POLAR(~) is NP-complete for each/~ > 2. Proof. POLAR(~) is clearly in NP. We reduce ONE-IN-THREE 3-SAT to POLAR( - 1) for/3 >_ 3. Let C -
{el,...
, cm }
with c i - {un, ui2, ui3} for each i
be an instance of ONE-IN-THREE 3-SAT. We may assume that m >_ 2. Construct a graph G - (V, E) as follows:
V-
E
{vij" l <_i <_m,l <_j <_~} U{v~jkt " i # k, (j, l <_ 3, u~j - uk~) or (j, l>_ 4)} -
{v
jv..jCl}
U{VijVijkl, VijklVkl " Vijkl C V }
I,.J{Vl4Vl ~ VlV2~ ?)2v3~ v3v4~ ?)4v24~ v2v5~ v3v5}
170
NP-Completeness
(if fl = 3, the edges Vl4V1 and V4V24 do not exist). We demonstrate now that G C (oc, f l - 1) if and only if ONE-IN-THREE 3-SAT has an answer "yes". First assume that there is a truth assignment as required for ONE-INT H R E E 3-SAT. Partition V into (A, B) as follows: 1. vij C A if and only if j _< 3 and uij - TRUE;
2. v~jkt E A if and only if j, 1 _> 4 or (j, 1 _< 3, u~j - ukt - FALSE); 3.
V l , V4, V 5 ~
A;
4. B - V - A . It is easy to see that A is a stable set and each connected component of G[B] is isomorphic to K1, I~2 or KZ_I. Therefore ( G , A , B ) C (oc, f l - 1). Conversely, assume that ( G , A , B ) E ( ~ , / 3 - 1). Then G[B] does not contain a clique of size fl, hence A must contain at least one vertex vii for each i. If G[A] contained an edge of the form vijvit, then it would have an induced subgraph /(1 U K2 (disjoint union), a contradiction. Therefore A contains exactly one vertex vii for each i. If vii C A for some i and some j _> 4, then vkt E A for all k r i, 1 _> 4, since otherwise G[A] will contain an induced subgraph K1 U K2 whenever vijkt C A, and G[B] will contain an induced subgraph K1,2 whenever vijkl C B, a contradiction. But in that case fl - 4, V14, V24 E A, and it is not hard to see that, with D - {v14, v24, V l , . . . , v5}, G[A N D] contains an induced IQ U I~2 or G[B fl D] contains an induced K1,2, a contradiction. Therefore for each i, the unique vii in A satisfies j _< 3, and the following is the desired truth assignment for U"
u~j -
TRUE, FALSE,
if v~j C A, if v~j C B.
Let C denote the class of graphs G - (V, E) for which V can be partitioned into ( A , B ) s o that G[A] is an edgeless graph and G[B] has largest degree 0 or 1. Observe that C C (oo, 2). C o r o l l a r y 7.6.2 Recognizing membership in C is NP-complete. P r o o f . Apply the above proof for the case fl - 3, and observe that ONEI N - T H R E E 3-SAT has an answer "yes" if and only if G C C. .. We need the following result for the NP-completeness of POLAR.
7.6
Polar Graphs
171
Figure 7.3" Forbidden subgraphs for the class C.
w
w
H1
w
H2
H3
w
w
w
H4
L e m m a 7.6.3 If G C C, then G does not contain any of the subgraphs H 1 , . . . , / / 4 shown in Figure 7.3. The Hi's need not be induced. P r o o f . Since (J is closed under taking subgraphs (not necessarily induced), it is enough to show that Hi ~_ C for i - 1 , . . . , 4. The latter is easy to see using the observation that each triangle of Hi contains exactly one vertex of A, as G[A] is edgeless, forcing a vertex of degree >_ 2 in G[B]. ,, T h e o r e m 7.6.4 POLAR is NP-complete. P r o o f . Clearly P O L A R is in NP. We observe that the following problem is NP-complete by Corollary 7.6.2 and Lemma 7.6.3: ADDIT: I n s t a n c e : A graph G without subgraphs isomorphic to H I , . . . ,/-/4 (not necessarily induced). Question: Is G C C? We reduce ADDIT to POLAR. Let G be an instance of ADDIT. We construct in polynomial time a matching X meeting every triangle of G as follows: 1. if two triangles of G have a common edge e, then put e in X; 2. if two triangles of G have exactly one vertex v in common, then from each of these two triangles put the edge that is not incident to v in X; 3. if a triangle has no common vertex with any other triangle, put exactly one arbitrary edge of the triangle in X. Clearly X meets every triangle of G. Using the fact that G does not contain H 1 , . . . , / / 4 as a subgraph, it is straightforward to verify that X forms a matching.
NP-Completeness
172
We now transform the graph G to an instance H of P O L A R as follows. For each edge e - ala2 C X , delete e and introduce new vertices a 3 , . . . , a l l so that a l , . . . , axl induce the gadget H~ shown in Figure 7.4. Further, put Figure 7.4" A gadget He replacing the edge e -
a la2
E X.
a7
a8
al0
a5
a6
a3
a4
--
I
-- a9 al
a2
"
"
I
all
He
Me
-
NG(al)-
NG[a2] ,
We -
NG(a2)- N G [ a l ]
,
and join ax0 to every vertex of Me and all to every vertex of Are. Finally, add a new component F isomorphic to K1,2. The resulting graph is H. Obviously, H can be constructed in polynomial time. It remains to show that G C C if and only if H is polar. Assume that (G, A , B ) C C. We assert that for each edge ala~ - e C X , if al C B then M~ C_ A. Indeed, e is contained in a triangle T, and T has a vertex in B other than a l . Hence if M~ N B r ~, then degB(al ) >_ 2, a contradiction. We now exhibit a polar partition (H, W1, W2). Let A C_ W1, B C_ W2, and let any one vertex of F be in W1 and the other two in W2. For each edge e - axa2 E X , we show how to assign the new vertices of He to W1 and W2 so that W1 remains stable and W2 remains a disjoint union of cliques. We distinguish the following two cases. C a s e 1" al, a2 C B. Assign a3, a 4 , a s , a9 t o W1 and the other vertices of H~ to W2. Clearly a3, a 4 , a s , a9 form a stable set and do not have any neighbors in W1. In W2, the new vertices form an isolated triangle on as, a6, aT, and two isolated vertices al0, all (al0, all are isolated because Me U Are C_ A C_ W1
7.6
Polar Graphs
173
by the assertion). Thus W2 remains a disjoint union of cliques. C a s e 2- al C B, a~ C A (the case al C A, a2 C B is similar). Assign the vertices a3, a6, as, all to W1 and the other new vertices of H~ to W2. Again the vertices a3, a6, as, all form a stables set and have no neighbors in W1 (all does not have any neighbors in W1 because N~ C_ B C_ W2 as a2 C A). The new vertices of W2 form in W2 isolated cliques asa-t, a4, a9, and al0 (al0 has no neighbors in W2 because M~ C_ A C_ W1 by the assertion). Hence (H, W1, W2)is polar, as required. Conversely, assume that (H, W1, W2) is polar. Then V(F) N W1 7/= ;g, for otherwise H[W2] will contain an induced subgraph K1,2. It follows that H[W~- V(F)] is edgeless, for otherwise H[W1] will contain an induced [~1 (-J K2. Now we distinguish the following two cases. C a s e 1" H[W1] contains an edge. Since H[W1] is a complete multipartite graph with an edge, it is connected, and since F is a component, H[W1] C_ F. Hence H - F C_ H[W2], and since H[W2] is a disjoint union of cliques, H~ cannot exist and hence X is empty. Hence G is triangle-free. Thus G - G f"l H[W2] C 1C2, where/Cp denotes the family of graphs all of whose components are cliques Kn with n _< p, and (G, 0, V(G)) C C. C a s e 2" H[W1] is edgeless. Put A - V(G) N W~ and B - V(G) N W2. We show that (G,A,B) C C. Clearly H[A] is edgeless and H[B] is a disjoint union of cliques. We show that G[A] is edgeless and G[B] C 1C2,proving that
(G,A,B) EC. To show that G[A] is edgeless, assume that, if possible, G[A] has an edge e. Since H[A] is edgeless, this edge must be of the form e - ala2 E X, with al, a2 C A C_ W~. Then a3, a4 E W2 (since H[W1] is edgeless), and hence exactly one of as, a6 is in W2, say as. Then aT is in W2 and hence H[W2] contains an induce K1,2 on a3, as, a~, a contradiction. It follows that G[A] is edgeless. To show that G[B] E lC2, we show equivalently that G[B] has neither triangles nor induced K1,2's. Assume first that G[B] contains a triangle T. Exactly one of the edges of T is in the matching X because G - X is trianglefree. But then K1,2 is isomorphic to H[T] C_ H[B] C_ H[W2], a contradiction. Assume now that G[B] contains an induced K1,2 on the vertex set {a~, a2, w} with center al. Clearly exactly one of its two edges, say e - ala2, is in the matching X, because H[W2] is K1,2-free. Then the vertices al, w along with the vertices a8, al0 of He induce a C4 in H, because w E Me. Since al, w C W2 and H[W2] is K~,2-free, it follows that a8, al0 C W~, contradicting Case 2. It follows that G[B] C 1C2. 9
Chapter 8 2-Threshold Graphs 8.1
Introduction
Recall from Chapter 7 the result of Yannakakis that the problem of determining if the threshold dimension of a graph is at most k is NP-complete for every fixed k >_ 3. This problem is clearly polynomial for k - 1. In this chapter we study the graphs of threshold dimension at most 2, called
2-threshold graphs. Recall that two edges of a graph G are said to conflict if their endpoints induce in G a C4, a P4 or a 2K2. Also recall that the conflict graph G* of G is constructed as follows:
v ( a * ) - E(a) E(G*)
-
{ef'eandfconflictinG}.
Let H be a subgraph of G and let e and f be edges of H. Clearly, if e and f conflict in G, they also conflict in H. Therefore if H is a threshold graph, no two of its edges conflict in G, and the vertices of G* corresponding to the edges of H form a stable set. This shows that the chromatic number of G* is bounded by the threshold dimension of G:
x(G*) < t(G).
(8.1)
Chvs and Hammer [CH77] observed that the inequality (8.1) often holds with equality, and asked whether any graph satisfies it with a strict inequality. Cozzens and Leibowitz gave an example of a family of graphs satisfying (8.1) as a strict inequality for every value of x(G*) >_ 4, as we have seen in 175
2-Threshold Graphs
176
Section 6.1. We do not know the answer for the case x~(G*) = 3. The case x(G*) _< 2 has been studied extensively because it is necessary for G to be 2-threshold. Partial results on its sufficiency have been obtained by several authors. Ibaraki and Peled [IP81] and independently Cogis [Cog791 and Doignon et al. [DDF84] proved that if x~(G*) is bipartite and G is a split graph, then G is 2-threshold. Ibaraki and Peled also proved that if x~(G*) is bipartite and has at most two non-singleton connected components, then G is 2-threshold. They conjectured that, in fact, a graph G is 2-threshold if and only if G* is bipartite. This conjecture has recently been proved by Raschle and Simon [RS95]. It implies a polynomial-time algorithm to recognize 2threshold graphs. An earlier independent work of Ma [Ma93] using results of Ma and Spinrad [MS94] gave another polynomial-time algorithm to recognize 2-threshold graphs, reducing the problem to recognizing difference dimension at most 2. These results are discussed in Sections 8.5, 8.6 and 8.7. In the first few sections we study properties of 2-threshold graphs and interesting subclasses of them. In Section 8.2 we present the result of Hammer et al. [HMP89] that the 2-threshold graphs are weakly triangulated. We also present the results of Chv~tal et al. [CHMd87] and of Hammer and Mahadev [HM85] that these graphs and their complements are perfectly orderable. In Section 8.3 we present the results of Hammer and Mahadev [HM85] on the class of bithreshold graphs, motivated by Boolean biregular functions, and show that their complements are 2-threshold graphs. In Section 8.4 we consider a special class of 2-threshold graphs that are also comparability graphs, called strict 2-threshold graphs and studied by Mahadev and Peled IMP88].
8.2 8.2.1
Properties of 2-threshold Graphs As Perfect Graphs
A graph G is called weakly triangulated if neither G nor its complement contains an induced cycle of size 5 or more. A perfect order for a graph G is a total order < on V(G) such that no induced P4 with edges ab, bc, cd satisfies a < b and d < c. A graph possessing a perfect order is called perfectly orderable. The weakly triangulated graphs and the perfectly orderable graphs are known to be perfect [BC84]. We show below that the 2-threshold graphs and their complements are both weakly triangulated and perfectly orderable.
8.2
Properties of 2-threshold Graphs
177
T h e o r e m 8.2.1 ( [ H M P 8 9 ] ) The 2-threshold graphs are weakly triangulated. Proof. Observe first that Cs, 6'6 and P6 are not 2-threshold graphs, as their conflict graphs are not bipartite (see Figure 8.1). Since every induced subgraph of a 2-threshold graph is also a 2-threshold graph, it follows that the 2-threshold graphs do not contain Cs, 6'6 or P6 as induced subgraphs. Hence the 2-threshold graphs do not contain any induced cycles of size five or more. Figure 8.1: The conflict graphs of C5, C 6 and P6.
v
v
~
v
v
We now prove that for n >_ 5, C~ is also forbidden for 2-threshold graphs, by showing that for n _> 5, the conflict graph of C~ contains an odd cycle. Let V l , . . . , v~ be the vertices along a cycle C=. Clearly, V l V 3 : V2V4~ V3V5~ 9 . . ~ V n - l Vl~ VnV2~ V l V 3
is an n-cycle in C~*, which settles the case where n is odd. For n - 4k + 2, V l V 2 k + 2 ~ V2V2k+3~ V 3 V 2 k + 4 ~ 9 9 9 ~ V 2 k + l V 4 k + 2 :
is a (2k + 1)-cycle in Cn*
9
V2k+2Vl
For n - 4k
VlV2k+2: V2V2k+3: V3V2k+4~ 9 . . : ?22k-lV4k~ V2kVl~ V2k+lV2~ V2k+2Vl
is a (2k + 1)-cycle in Cn*. T h e o r e m 8.2.2 ( [ C H M d 8 7 ] ) able.
The 2-threshold graphs are perfectly order-
178
2-Threshold
Graphs
P r o o f . Consider an arbitrary 2-threshold graph G - (V, E) and let it be the union of threshold graphs T1, T2 defined on the same vertex set. E n u m e r a t e the vertices of V as X l , . . . , x ~ so that x, ~- ..- ~ x~ in T1. Let k be the largest of all the subscripts i such that T~ has an edge xixj with i < j. We may assume that k exists, for otherwise G - T2 is a threshold graph, which is obviously perfectly orderable. Write A - { X l , . . . , x k } and B - V - A. Thus X k X k + 1 C::_.E(T1) and B is stable in T1. Enumerate the vertices in B as y l , . . . , Yn-k SO that Yl ~ " ' " ~ Yn-k in T2. Now define the linear order < by Xl <
"'"
< Xk
<
Yl
<
"'"
< Yn-k.
We show that < is a perfect order. Assume that, if possible, G contains an induced P4 on a, b, c, d with edges ab, bc, cd such that a < b and d < c. Note that the two edges ab, cd cannot be in the same Ti, so we may assume without loss of generality that ab C E(T~) and cd C E(T2). If bc E E(T1), then a ~ b in T~. It follows that b - x~,a - xj for some i < j and, moreover, i _< k as xixj is an edge and B is stable in T1. But then b - x~ < xj - a, contradicting a < b. It follows that bc C E(T2) - E(T1). Hence d ~ c in T2, but since d < c, we must have d C A. Hence d - xi with i _< k. Since xkxk+l E E(T1) and d ~ xk in T1, we have dxk+l E E(T1). Also, a ~- d in T~ since b E N ( a ) - N ( d ) . Hence axk+l E E(T1). But then a C N ( x k + l ) - N ( d ) in T1, contradicting the fact that d - x~ ;-- Xk+l. " T h e o r e m 8.2.3 ([HM85]) The complements of 2-threshold graphs are perfectly orderable. P r o o f . Let G = (V, E) be the intersection of two arbitrary threshold graphs T1,T2 defined on V. Order the vertices of V according to non-increasing degrees in T1. Thus x < y only if deg(x) _> deg(y). We prove that this order is a perfect order for G. Consider any induced P4 on vertices a, b, c, d with edges ab, bc, cd. It is enough to show that in T1, either deg(a) < deg(b) or deg(d) < deg(c). Since each of T1 and T2 contains all edges of G and is threshold, one of ac and bd, say ac, is in E(T1) - E(T2) and the other, say bd, is in E ( T 2 ) - E(T1). But then c 2~ d in T1, hence d -~ c in T1, and hence deg(d) < d e g ( c ) i n T1. " Note that C5 has threshold dimension 3. Thus graphs of threshold dimension 3 need not be perfect graphs. In [CHMd87] it was shown that given a graph with a perfect order, a m i n i m u m coloring and a m a x i m u m clique can be obtained in linear time. From this and from the proofs of Theorems 8.2.2
8.3
BithresholdGraphs
179
and 8.2.3, it follows that if a 2-threshold graph G is given as a union of two threshold graphs, then for both G and its complement, a minimum coloring and a m a x i m u m clique can be obtained in polynomial time. Raschle and Simon's algorithm of Section 8.5 in fact obtains such a decomposition, if one exists, in polynomial time.
8.3
Bithreshold Graphs
A graph G is called a bithreshold graph if it is the intersection of two threshold graphs T1 and T2 on the same vertices such that every stable set of G is also a stable set in T1 or in T2. In this case G is said to be decomposable into T1 and T2, or simply that (T1, T2) is an i-decomposition of G. We give good recognition and decomposition algorithms for bithreshold graphs. All the results in this section are taken from [HM85]. One motivation for studying bithreshold graphs comes from biregular Boolean functions. A Boolean function is a (0,1)-valued function defined on {0,1} ~. For a (0,1) vector X - (Xl,...,Xn) , denote by ixJ the vector obtained from X by setting xi = 1 and xj = 0. A monotonically increasing Boolean function is called regular if for each pair i,j C { 1 , . . . , n } , either f(~X j) >_ f ( J x ~) for all X or f ( J x ~) >_ f(~X j) for all X. A Boolean function is called biregular if it is the product of two regular Boolean functions. A Boolean function of the form f = Ca V ... V cm, where each clause ci is the product of exactly two (uncomplemented) variables, is called a graphic Boolean function. Associated with each graphic Boolean function f is a graph G(f) whose vertices are the variables, and whose edges correspond to the clauses. It was shown in [HM85] that a graphic Boolean function f is biregular if and only if the associated graph G(f) is bithreshold. 8.3.1
Decomposing Bithreshold Graphs
A signed graph is a graph whose edge set is partitioned into positive and negative edges. A signed graph H is said to be balanced if every cycle of H contains an even number of negative edges. The following result is wellknown [Har53]. L e m m a 8.3.1 A signed graph is balanced if and only if its vertex set can be
partitioned into two sets A, B such that an edge e is negative if and only if one end of e is in A and the other end is in B.
2-Threshold Graphs
180
We refer to the complement of a bithreshold graph as a cobithreshold graph. Clearly, a graph G is cobithreshold if and only if it is the union of two threshold graphs T1, T2 such that every clique of G is also a clique of T1 or T2. We then say that (T1,T2) is a u-decomposition of G. We need the following lemma. L e m m a 8.3.2 (Ta, T2) is a u-decomposition of a graph G if and only if T1
and T2 are threshold graphs on the same vertices whose union is G and every clique of G of size 3 or ~ is also a clique of T1 or T2. P r o o f . The 'only if' part follows from the definition. To prove the 'if' part, suppose there is a clique K of G that is not a clique of :/71 or T2, so that for i = 1,2, the graph induced by K in Ti contains a nonedge xiYi. Then the graph induced by Xl,X2, yl,y2 is a clique of size 3 or 4 in G, but is not a clique of T1 or in T2, a contradiction. 9 Let G - (V, E) be a graph. Recall that the conflict graph G* associated with G has V ( G * ) = E(G) and E(G*)is given by
E ( G * ) - { e f ' e and f conflict in G}. Now associate with G a signed graph H(G) as follows:
1. V(H) is the set of nonisolated vertices of V(G*); 2. the negative edges of H are precisely the edges of G*; 3. two vertices of H are joined by a positive edge if and only if the ends of the corresponding two edges of G induce a clique in G. Figure 8.2 illustrates an example. The idea behind H(G) is that if G has a u-decomposition (T1, T2), and if e f is an edge of H, then e and f should belong to the same Ti if ef is a positive edge and to different Ti if ef is a negative edge. For these requirements to be consistent, H should be balanced. We prove below that G is cobithreshold if and only if H is balanced, taking proper account of the isolated vertices of H and other details. First we need to prove several lemmas. L e m m a 8.3.3 If G is cobithreshold, then H(G) is balanced.
8.3
Bithreshold
Graphs
181
Figure 8.2: G, G* and a
g
H(G).
b
a
b
o
c
/
,w
~
g
,iw
e
G
f
c
d
e
,w
+
f
G*
c
+
d
H
P r o o f . Let (TI, T2) be a u-decomposition of G. Let A =
V(H)N E(T1)
and
B = V ( H ) N E(T2).
1) A
U B-
V(H) since V(H) C V(G*) - E ( G ) -
E(T1)U E(T2).
2) If two nonadjacent edges e, f conflict in G, then exactly one of e, f is in T1 and the other is only in T2 as T1, T2 are threshold graphs covering G. Every vertex of H, being a nonisolated vertex of G*, corresponds to an edge in conflict in G. Thus each vertex of H is in exactly one of E(Ti), i = 1,2. Therefore A N B = 0. Hence (A,B)is a partition of V(H). We now show that an edge of H has one end in A and the other end in B if and only if it is a negative edge. Then by Lemma 8.3.1 H(G) is balanced. 3) Let ef be an edge of H with e r A and f r B. I f e f is apositive edge of H, then by the construction of H, the ends of e, f induce a clique K in G. Therefore K is also a clique in T1 or in T2, say T1. But then f r A, contradicting A N B = 0. Thus e f is a negative edge. 4) Conversely, suppose ef is a negative edge with both ends in A, say. Then E(T1) contains two conflicting edges, contradicting the assumption that TI is threshold. Therefore, ef must have one end in A and the other in B. Suppose G is a graph whose associated signed graph H(G) is balanced. In order to prove that G is cobithreshold, we construct two graphs G1 and G2 as described in the following steps.
2-Threshold Graphs
182
Algorithm A: 1. Obtain a partition $1 U $2 of V(H) such that the c u t (S1, $2) consists of all the negative edges of H. 2. Let K: be the set of all 3-cliques and 4-cliques of G. For K E K; and S C_ V(H), we say that ' K meets S' if some edge of K is in S. For K:' C_ K:, let E(K:') - I.J{E(K) 9 If E K:'}. For i - 1,2 let ]C~ -
{K c ]CIK meets
E~
S~ U E(JC~).
-
Si}
3. Let
E;
-
{K C K . ' E ( K ) ~s Ei for i -
--
Ei
U E(K~3)
1,2}
i - 1,2.
4. Let E ' - E ( G ) - (E~ U E;). For i - 1,2, let Gi be the graph defined on V(G) with E(G~) - E' U E~. We make the following observations about Algorithm A. 1. E1 CI $2 = O = E2 CI $1. For if, say, EI N $2 r 0 , then since ~1 f'l ~2 = 0, we have E(/C1)N $2 7~ 0. It follows that some clique K E ]t~1 meets both S1 and $2, contradicting the fact that the cut (S1, $2) does not contain a positive edge. 2. E[ r"l S 2 - 0 - E~ N S 1. This follows from the above observation and the fact that K does not meet Si (i - 1,2) for any K E K;g. 3. K: - K: 1 I,.J K~2 I,.J K~3. This follows from the definitions in Steps 2 and 3. 8.3.4 If G1, G2 are constructed as in Algorithm A from a graph G with balanced H(G), then
Lemma
1. g ( a ) - E ( ~ 1)(.j E(~2);
2. every clique of G is also a clique of G1 or G2; 3. for each i - 1,2, the set of vertices of H corresponding to the edges of Gi does not induce a negative edge in H.
8.3
Bithreshold
183
Graphs
P r o o f . 1) follows from the definition of E' in Step 4 of the algorithm. 2) follows from the definition of E~ and E; in Step 3 of the algorithm and Cemma 8.3.2. By Observation 2 above, $1N E(G2) = 0 = $2 N E(G1). Since each negative edge of H has one end in S1 and the other in $2,3) f o l l o w s . . . Our next goal is to show that G1 and G2 are threshold graphs. For this we use the following lemma. L e m m a 8.3.5 If G1, G2 are as in the Lemma S.3.~, and if {a, b, c} is a 3clique of G such that ab C E ( G 2 ) - E(G1) and bc C E(G1), then there exists a vertex d such that cd, bd C E(G1) and ad ~_ E(G). See Figure 8.3.
Figure 8.3: Illustrating Lemma 8.3.5. Dashed lines indicate nonedges of G. Lines labeled 1 are edges of G1 and lines labeled 2 are edges in E(G2)- E(G1). .....
a A
Ab
a"
_..
m
-
...
-..
"d
C
P r o o f . By the hypothesis and from Step 4 of the Algorithm A, bc C E ( G 1 ) E. Hence bc C S1 or bc C E 1 - S1 or bc C E ~ - El. C a s e 1: bc C $1. It follows that {a, b, c} C/(;1 and hence ab C E1 G E(G1), a contradiction. Therefore this case is impossible. C a s e 2: bc C E1 - $1. It follows that bc C E(K:I). Let K C K;i be such that bc C E ( K ) and de C E ( K ) N S 1. C a s e 2.1: Both d and e are distinct from b and c. If a , b , d , e induce a 4-clique in G, then this clique is in ~1. Hence by Step 2, ab E E(G1), a contradiction. It follows that a, b, d, e do not induce a 4-clique. Hence ad or ae is a nonedge in G, and we may assume without loss of generality that ad is a nonedge in G. Then the lemma is proved in this case. C a s e 2.2: e coincides with b or c. If a, b, c, d induce a 4-clique in G, then this clique is in ~1. Hence by Step 2, ab C E(G1), again a contradiction. It follows that a, b, c, d do not induce a 4-clique in G. Hence ad is a nonedge and the lemma is proved in this case.
2-Threshold Graphs
184
C a s e 3: bc C E~ - El. There exists a K C K;3 such that bc C E(K). C a s e 3.1: V(K) = {b, c, d}. If ad C E(G) then a, b, c, d induce a 4-clique {a, b, c, d}. But E({a, b, c, d}) g E~ UE(Ka) since ab (f E 1 I..JE(]~3). Therefore E({a, b,c,d}) C_ E2. Hence E(K) C_ E2, contradicting the fact that If E lea. Hence ad r E(G). Thus the conclusion of the lemma is true in this case. C a s e 3.2: V(K) = {b, c, d, e}. If ad, ae E E(G) then a, b, d, e induce a 4clique {a, b, d, e}. But E({a, b, d, e}) ~ E~ U E(K:3) since ab r -El I,.J E(/~3). Therefore E({a, b, d, e}) C_ E2. By similar reasoning E({a, b, c, d}) C_ E2 and E({a, b, c, e}) _C E2. Thus E(K) = E({b, c, d, e}) C_ E2, implying that If ~/C3, a contradiction. Therefore, ad r E(G) or ae (~ E(G), and we may assume without loss of generality that ad r E(G). Then the conclusion is true in this case. Since all possible cases are examined, we conclude that the lemma is true in general. 9 L e m m a 8.3.6 If G1, G2 are constructed by Algorithm A from a graph G
with balanced H(G), then G1 and G2 are threshold graphs. P r o o f . We prove that G1 is a threshold graph. By a similar argument G2 is also a threshold graph. Assume that G1 is not a threshold graph. Then there exists four distinct vertices a, b, c, d such that ab, cd ~ E ( ~ I ) and ac, bd ~ E(~I). Since by L e m m a 8.3.4 ac, bd do not induce a negative edge in H, at least one of ab, cd and at least one of ad, bc is in E(G). It follows that it is enough to consider the four cases illustrated in Figure 8.4. In each of the four cases we prove that two edges of G1 induce a negative edge in H, contradicting Property 3 of Lemma 8.3.4. Figure 8.4: The four cases of Lemma 8.3.6, with the conventions of Figure 8.3.
a
2
c Case i
b
a
d
c
~)
b
a
d
c
"11 ! il Case 2
2
2 Case 3
b
a
2
b
d
c
2
d
"11)4 _1 Case 4
C a s e 1. By Lemma 8.3.5 applied to triangle {a, b, d}, there exists a vertex e such that be, de E E(G1) and ae r E(G). But then the edges be, ac of ~1 induce a negative edge in H.
8.3
Bithreshold Graphs
185
C a s e 2. By Lemma 8.3.5 applied to triangle {a, b, d}, there exists a vertex e such that be, de C E(G1) and ae ~ E(G). But then the edges de, ac of G1 induce a negative edge in H. C a s e 3. The same argument as in Case 1 applies. Case 4. By Lemma 8.3.5 applied to triangles {a, b, c}, {a, b, d}, there exist vertices e , f such that be, a f C E(G1) and ae, bf ~ E(G1). But then the edges be, a f of G1 induce a negative edge in H. Since all four cases lead to a contradiction, it follows that G1 is a threshold graph. 9 From Lemma 8.3.4 and Lemma 8.3.6, we obtain immediately the following lemma. L e m m a 8.3.7 If H(G) is balanced, then G is a cobithreshold graph. T h e o r e m 8.3.8 A graph G is a cobithreshold graph if and only if H(G) is balanced. P r o o f . This follows from Lemma 8.3.3 and Lemma 8.3.7. Fact 8.3.9 1. Theorem 8.3.8 gives rise to the following method for recognizing and decomposing bithreshold graphs. Let G be the given graph.
9 Construct the signed graph H associated with the complement -G of G. 9 If H is not balanced, G is not bithreshold. 9 If H is balanced, construct the two threshold graphs G1, G2 as in Algorithm A. Then (G1, G2) is a u-decomposition of G. This algorithm runs in O(n4)-time. 2. A bithreshold graph (cobithreshold graph) need not be a comparability graph, e.g. G1 (G2) of Figure 8.5. 3. Neither a bithreshold graph nor its complement need be triangulated, e.g. G1 of Figure 8.5. 4. For every positive integer n, there ezists a bithreshold graph whose Dilworth number is n. For ezample consider the graph H~ with vertices X l , . . . , x ~ , y l , . . . , y n , z l , . . . , z ~ such that the zi's induce a clique, the zi's induce a clique, the Yi's induce a stable set, each xi is adjacent to
2-Threshold Graphs
186
yj for i < j and each zi is adjacent to yj for i > j. The graph Hn is cobithreshold and D(H~) = n. See Figure 8.5 for H4.
8.4
Strict 2-Threshold
Graphs
A graph G is called a strict 2-threshold graph if its edge-set can be partitioned into two threshold graphs T1 and T2 such that every triangle of G is also a triangle of T1 or of T2. In this section we indicate a polynomial-time algorithm to recognize these graphs and a characterization of them by forbidden configurations. We also show that they are comparability graphs. Recall that two non-adjacent edges ab and cd are said to be in conflict if ac, bd are non-edges. As before, given a graph G, its conflict graph G* is defined by:
v(a*) = e(a) E(a*) = { e f : e
and f are in conflict in G}.
Observe that if T is a threshold subgraph of G, then E(T) corresponds to a stable set of G*, since no two edges of a threshold graph T can be in conflict in G. Moreover, if T1 and T2 are the threshold graphs defining a strict 2threshold graph G, then E(T1) and E(T2) partition V(G*)into two stable sets such that the three vertices of G* corresponding to the edges of a triangle in G are all in the same side of the partition. This gives a necessary condition for a strict 2-threshold graph G. The sufficiency of this condition is stated in Theorem 8.4.1. We shall associate a signed graph H(G) with each graph G in analogy with Section 8.3. Recall the definition of a balanced signed graph from that section and also Lemma 8.3.1. The signed graph H(G) associated with G is defined as follows.
V(H) E-(H) E+(H)
=
v(a*)
=
E(a*)
=
{ e f : e and f are edges of the same triangle in G}.
T h e o r e m 8.4.1 A graph G is a strict 2-threshold graph if and only if H(G)
is balanced.
8.4
Strict 2-Threshold Graphs
187
Figure 8.5" Graphs used in Fact 8.3.9.
w
w
G1
w
G2
H4
w
2-Threshold Graphs
188
We omit the proof of this theorem because it is similar to (in fact, is a simplification of) the proof of Theorem 8.3.8. Theorem 8.4.1 can be used to recognize a strict 2-threshold graph and find its decomposition into T1 and T2 as in its definition. A l g o r i t h m . Given a graph G with rn edges, 1. construct its signed graph H(G) as defined above. This can be done in O(m2)-time. 2. Check if H(G) is balanced. This can be done in O(m2)-time. By Theorem 8.4.1, G is a strict 2-threshold graph if and only if H(G) is balanced. Recently Petreschi and Sterbini [PS94b] gave an O(IEl)-time recognition algorithm for these graphs. The next theorem characterizes the strict 2-threshold graphs by forbidden configurations. Figure 8.6 lists eight configurations H I , . . . , Hs. To the right of each of them is a negative cycle in the associated signed graph. T h e o r e m 8.4.2 A graph G is a strict 2-threshold graph if and only if G does not contain any of the configurations H I , . . . , Hs of Figure 8.6. Proof. Assume first that G is a strict 2-threshold graph. Since every induced subgraph of a threshold graph is also a threshold graph, it follows that every induced subgraph of strict 2-threshold graph is also a strict 2-threshold graph. Hence it is enough to show that none of H 1 , . . . , Hs can be completed to a strict 2-threshold graph by specifying the missing edges and non-edges. By virtue of Theorem 8.4.1, this can be done by showing that each of the associated signed graphs of these configurations contains a negative cycle. Such cycles are illustrated in Figure 8.6. Hence the "only if" part. The proof of the converse ("if" part) is somewhat involved and can be found in [MP88]. 9 R e m a r k . The strict 2-threshold graphs are clearly cobithreshold graphs. They are are also comparability graphs, as shown below. However, there are cobithreshold graphs that are also comparability graphs but are not strict 2-threshold graphs, such as the graph of Figure 6.2. T h e o r e m 8.4.3 ([HMP89])
ity graphs.
The strict 2-threshold graphs are comparabil-
8.4
Strict 2 - T h r e s h o l d Graphs
189
Figure 8.6" The forbidden configurations H1,..., H8 of strict 2-threshold graphs. Corresponding negative cycles in the associated signed graphs are indicated to the right of H1,. 9 H8.
a
b
c
bd
+
be
a
b
ab
c , ~ - "--•177 if
-e
a[:t
-
ce
"'~/ d
H1
\
-
f
cd
-
~f
H5 be
a ~"-c"-.
e
ab
ae
d "-
e
"
~
/
ad
-
-cf
-
d
H2
.~ cd -
.;
ef
H6
e I"~a''~
f
~
ab
a
ab
ac _ ~ _ a d
c x..b
i
d
df
-
ce c
H3 a
l~b "
d
-"
bc
~7-
gc
g
ab + ac II /
e
ae-
It7
g
cg-
x \l
be
H4
d Hs
P r o o f . Recall [Ber76, p. 365] that a graph is a comparability graph if and only if its edges can be oriented so that for every two edges "forming a V" that is, of the form ab, bc and such that a c is not an edge ~ the orientations are (a, b) and (c, b)or else (b, a) and (b, c). This is called the V - r u l e . Suppose our graph G is not a comparability graph. Then by the "Vrule" there is a cyclic sequence e 0 , . . . , ek-1 of edges in which consecutive edges "form a V" and such that by following the V-rule around it we reverse the orientation of an edge. Choose such a sequence with smallest number of edges. Then every three consecutive edges ei, e i + l , ei+2 (suffixes modulo k)
190
2-Threshold Graphs
must form one of the configurations labeled as Type I and Type II in Figure 8.7. Figure 8.7" Configurations used in the proof of Theorem 8.4.3.
~ ~ ~ ~ ~ ~
~
111111
/
i1~\\ II I \\ /ei+
iII~ lp,
1\ \\\
lp'
w
ei+l
Type I
Type II
Give an arbitrary orientation to e0 and apply the "V-rule" to e l , . . . , ek-1. We say that ej has forward polarity if it receives an orientation in which its head is an endpoint of ej+l. Otherwise we say that ej has backward polarity. If ei, el+l, ei+2 are in a configuration of Type I, then ei and ei+l have different polarities, whereas if these three edges are in a configuration of Type II, then ei and ei+l have the same polarity. Since ek-1 forces e0 to change its polarity, the number of i's such that ei, ei+l, ei+2 are in a configuration of Type I is odd. Now consider H(G). Its vertices corresponding to the edges ei, ei+2 are joined by a negative or a positive edge according as el, el+l, ei+2 are in a configuration of Type I or Type II. Thus for k odd, e0, e2, e 4 , . . . , e0 form in H(G) a k-cycle with an odd number of negative edges. For k even there are two (k/2)-cycles e0, e 2 , . . . , e0 and el, e 3 , . . . , el one of which has an odd number of negative edges. So H(G) is not balanced in each case. Hence by Theorem 8.4.1, G is not a strict 2-threshold graph. 9
8.5
Recognizing Threshold Dimension 2
In this section conflict graph notation used component of
we present the proof of Raschle and Simon [RS95] that if the G* is bipartite, then t(G) _< 2. We start by introducing some here. For an edge e of G, we denote by C*(e) the connected G* containing e. An alternating cycle AC2k in a graph G =
8.5
191
Recognizing Threshold D i m e n s i o n 2
(V, E) is a sequence of vertices v 0 , . . . , v2k-1 such that vivi+l E E for i odd and v~v~+l ~ E for i even (indices modulo 2k). Notice that by convention, we always take VoVl to be a nonedge. The edges yiVi+l for i odd are called the edges of the alternating cycle. If all the edges of the alternating cycle belong to a subset S c_ E, it is called an alternating cycle in S. Figure 8.8 illustrates the only possible AC4 (also referred to as a 4-alternating cycle) and the only two possible AC6's. Figure 8.8: The alternating cycles AC4 and AC6. V4 P" I)3
Vl
/
I)3 "K \
I)4
voI Iv, ', '/' Y0
AC4
Y2
v3"v,
731
AC6
Recall the definition of threshold completion from Section 1.5. Observe that the threshold dimension t(G) of G = (V, E) is the smallest k such that E can be partitioned into k sets each having a threshold completion in G. Recall also that a subset S of E has a threshold completion in G if and only if G has no alternating cycle in S, in which case a threshold completion of S in G can be computed in time O(IEI + IVl) (Theorem 1.5.1). The main result of this section is the following theorem. T h e o r e m 8.5.1 If the conflict graph G* of G = (V, E) is bipartite, then E
can be partitioned in O(IEI(IE I + IVI))-time into two sets Eo and E1 such that G has no alternating cycles in Ei, i = O, 1. A partition of E as in Theorem 8.5.1 is in particular a proper 2-coloring of G*, and the difficulty of finding one stems from the fact that G* may have many connected components. In the following we present an efficient method to transform a given 2-coloring of G* into one in which both colors are free from alternating cycles. We denote by xy II vw the fact that x, v, w, y is an AC4 (in this order). As a first step in establishing Theorem 8.5.1, we show that it is enough to avoid just AC4 and AC6 rather than all alternating cycles.
192
2-Threshold Graphs
T h e o r e m 8.5.2 ( [ H I P 8 1 ] ) Let G* be bipartite with color classes Eo and El. If G has an alternating cycle in Eo, then it has an AC6 in Eo. P r o o f . An even alternating polygon in S is an alternating cycle in S with distinct vertices. A bicycle in S is an alternating cycle in S of the following form (or its reverse)" riOt...
~ Up
--
WO~
Wl
~ . . . ~ W r
~
VO~
. . . ~ Yq
--
Wry.
9 9 ~ Wl
~
where the ui, wi, vi are distinct except for uo - up - Wo and Vo - vq - w~, and where p and q are odd. Thus the alternating cycle (or its reverse) traverses the odd polygon Uo,..., up, then the path W o , . . . , w~, then the odd polygon v o , . . . , vq, and finally the path w ~ , . . . , Wo. By following an arbitrary alternating cycle until the first or second repetition of a vertex, it is easy to see that is must contain an even alternating polygon or a bicycle. Let C be an alternating cycle in Eo with the least number of vertices. Clearly there is no AC4 in Eo or El. C a s e 1" C has six distinct consecutive vertices a, b, c, d, e, f with bc, de E Eo. To avoid the AC4 b, e, d, c in Eo, we must have be C E, and then be E E1 by the minimality of C. Again by the minimality of C, we have ad, c f E El. To avoid the AC4 a, f, c, d in El, we must have a f E E, and then a f E Eo by a f II b~. But now a, b, c, d, f is an AC6 in E0, as required. C a s e 2: C does not have six consecutive vertices as in Case 1. By the minimality of C and the remarks above, C is an even alternating polygon or a bicycle, and since we are in Case 2, C must be a bicycle. For the same reason we must have p - q - 3 and r _< 1. If r - 0, then the bicycle C or its reverse is an AC6 in E0, as required. If r - 1, then since we are in Case 2, UoVo C Eo. Now to avoid the AC4 Uo, Vl, v2, vo in E0, we must have UoVl E E. Similarly vou2 E E. Since UoVl II U2Vo, one of these two edges is in E0, say U2Vo without loss of generality. But then v0, Vl, v2, v0, u0, u2 is an AC6 in E0, as required. 9 As we saw in Figure 8.8 there are only two possibilities for an AC6. We define these two possibilities as follows. D e f i n i t i o n 8.5.3 Let v 0 , . . . , v5 be an AC6 in one of the color classes of G*. Then it is called an a l t e r n a t i n g p o l y g o n of length 5 or 6 (AP~ or AP6 for short) according as the number of distinct vertices among v 0 , . . . , v6 is 5 or 6, as in Figure 8.9.
8.5
193
Recognizing Threshold Dimension 2
Figure 8.9: The alternating polygons AP~ and AP6.
V0 z V3 //
V4
//~\ \ / \ ' .
V4
/
V
//
V5 AP5
V3 \ ',
l;0
Vl AP6
In Figure 8.9 and subsequent figures, edges in one color class (usually E0) are indicated by thin lines, and edges of the other color class (usually El) by thick lines. As indicated in the figure, the edges VlV2, v3v4 and VsVo of one color class force edges in the other color class by the bipartiteness of G*. Thus an AP6 vo, . . . , vs implies the complementary AP6 vo, Vl, v4, vs, v2, v3 in the complementary color class. Note also that all the edges of an APs except possibly VlV2 and all the edges of an AP6 belong to connected components of G* with size greater than 1. By Theorem 8.5.2, to prove the main result (Theorem 8.5.1) it is enough to transform a given 2-coloring of G* into an ACc-free 2-coloring. We do this below in three parts.
Part 1 In this part we develop an efficient method to transform a given APc-free 2-coloring of G* into an ACc-free 2-coloring. Parts 2 and 3 show how to obtain an APc-free 2-coloring. T h e o r e m 8.5.4 From a given APc-free 2-coloring of G*, an ACc-free 2coloring of G* can be computed in O(IEI(IEI + IVl))-time. P r o o f . An edge vlv2 E E is called critical if an APs v o , . . . , v 5 exists. Since a critical edge VlV2 together with an AC4 x, Vl, v2, y results in an AP6 v4, v5, v2, y , x , vl, we conclude that IC*(vlv )l - 1 if YlV2 is critical (recall that C*(e) is the connected component of G* containing e). We now show that the 2-coloring of G* obtained by inverting the color of all critical edges is ACc-free. Certainly no new AP6 can arise, because every
194
2-Threshold Graphs
edge e of an AP6 satisfies [C*(e)l >_ 2. On the other hand, all the original APs's are destroyed. It remains to show that no new APs is created. Assume that, if possible, a new APs w o , . . . , ws is created. Let v 0 , . . . , vs be the APs in the old coloring that caused vxv2 = WlW2 to change its color. Without loss of generality we may assume that Vl = Wl and v2 = w2. Note that all considered edges other than VlV2 retain their color (their connected component in G* has size greater than 1). Therefore {v4, vs} N { w 0 , . . . , ws} = 0 , and the situation is as illustrated in Figure 8.10. Figure 8.10" A configuration in the proof of Theorem 8.5.4.
V4
W0 B W3
V5
Since VlV 4 and WoW4 have the same color and WOVl ~ E, we find that v4w4 C E and similarly vsws C E. But v4w4 [[ vsws, hence these edges have different colors. If v4w4 has the same color as v2vs, then vs, v4, w4, ws, wo, v2 is an AP6 in the old coloring of G*, and otherwise v4, vs, ws, w4, wo, Vl is an AP6 in the old coloring. Both cases contradict our assumption that the original coloring of G* is AP6-free. The proof above does not make use of the vertex vo = v3 of the APs Vo,..., vs. Therefore the argument still holds if we relax the definition of a critical edge and say that an edge VlV2 C E is critical when there are vertices V4, V5 such that V4V 5 ~ E, {VlV4, VlVs, v2v4, v2vs} C_ E, and these four edges belong to the complementary color class of VlV2 and their connected components in G* have size greater than 1. Now we can achieve the required running time, because we can determine in linear time if a given edge VlV2 is critical or not as follows. Mark all vertices x for which the edges XVl and xv2 are in the complementary color class of VxV2 and their connected components in G* have size greater than 1. Then scan through the adjacency lists of
8.5
195
Recognizing Threshold Dimension 2
the marked vertices to discover a pair v4, Vs of nonadjacent marked vertices. Each of these operations can be done in O(IV I + [El)-time. ,,
Part 2 It remains to construct an AP6-free 2-coloring of G*. In order to study an APo more closely, we extend our notation. D e f i n i t i o n 8.5.5 For a 2-coloring (Eo, El) of G* and an AP6 V o , . . . , Vs in Eo, the nonedge vovl is called the b a s e of the AP6 and the edge v2v5 C E1 its f r o n t . I f in addition VoV2, VlVs C Eo, then v 0 , . . . , vs is called a d o u b l e AP6.
Figure 8.11 illustrates a double AP6. Note that the complementary AP6 v0, Vl, v4, vs, v2, v3 of a double AP6 v 0 , . . . , vs is also a double AP6. Figure 8.11" A double AP6.
Y0
Y4 I
?)1
Y3
In this part, we develop an efficient method to transform a given doubleAPB-free 2-coloring of G* into an APB-free 2-coloring. The next three facts are also proved in [HIP81]. F a c t 8 . 5 . 6 Let V o , . . . , v 5 be an AP6 and v2v5 - xoyo II "'" II XhYh a path in G* satisfying { X O , . . . , X h , Y O , . . . , y h } N {Vo, V l } - - O . Then an AP6 with base vovl and front XhYh exists. P r o o f . We use induction on h. The case h - 0 is just our assumption. If h > 1, then the induction hypothesis implies the existence of an AP6 vo, Vl~ Yh-1 ~9 9 9 ~Xh-1 or an AP6 v0, Vl, Xh-1, 9 9 9 Yh-1. In the former case, from xh-aYh-1 II XhYh and {xh, yh} N {v0, vl} -- 0 , we infer the existence of the AP6 vo, vl, Yh-1, Yh, Xh, Xh-1. Then the complem e n t a r y AP6 vo, Vl, Xh, Xh-1, Yh-1, Yh satisfies our claim. The latter case is similarly treated. "
196
2-Threshold Graphs
F a c t 8 . 5 . 7 Let v 0 , . . . , v 5 be a double AP6 and v2v5 - xoyo It ' II XhYh a path in G*. Then { X o , . . . , X h , Y o , . . . , y h } N { V O , Vl} -- ~ and a double AP6 with base vovl and front XhYh exists. P r o o f . Again we use induction on h. The case h - 0 is our assumption. For h _> 1, the induction hypothesis implies { x 0 , . . . , Xh-1, Y o , . . . , Yh-1 } N {v0, vl} -- e and a double AP6Vo, V~,Yh-1,...,Xh-~. Therefore {xh,Yh}gl {VO, Vl} -- O . From this and the fact that Xh-lYh-1 II XhYh w e obtain the double AP6 Vo, V l , Y h - l , Y h , Xh, Xh-1, whose complementary double AP6 VO, Vl , Xh, Xh-1, Yh-1, Yh satisfies our claim. F a c t 8 . 5 . 8 L e t v o , . . . , v5 be an AP6 and v2v5 - x o y o II II XhYh a path in G* satisfying {x h, Yh} N {V0,721} r • . Then a double AP6 exists.
P r o o f . We assume that { x 0 , . . . , Xh-1, Y o , . . . , Yh-1 } ~ {Vo, Vl } "-- ~ without loss of generality. Thus Fact 8.5.6 guarantees either an AP6 Vo, vl, Y h - l , . . . , Xh-1 or an AP6 VO, V l , X h - I , . . . ,Yh-1. Because of s y m m e t r y it suffices to discuss the first possibility. Figure 8.12" A configuration in the proof of Fact 8.5.8.
Yh -- VO ~ ~ _ h ~
l _~<
Xh
/ Vl 1.
1. Yh-1
W i t h o u t loss of generality, assume that yh - v0 as illustrated in Figure 8.12 (the case xh = 721 iS similar). From Xh-lYh-~ II hYh = XhVo we obtain the APs vo, Vl, Yh-1, vo, xh-1, xh, which also induces the complementary edges VlXh-1, VlXh, Yh-lXh-1 and Yh_lXh . On the other hand vlyh-1 is an edge of the AP6 Vo, vl, Y h - 1 , . . . , X h - 1 , and therefore another edge xy C E with xy II vlyh-1 exists. Therefore Xh, X h - I , V l , X , y , yh-1 is & double AP6. 9 We are now ready to prove the result of Part 2.
8.5
197
Recognizing Threshold D i m e n s i o n 2
8.5.9 From a given double-AP6-free 2-coloring of G*, an AP6-free 2-coloring of G* can be computed in O(IEI(IEI + IVl))-time.
Theorem
P r o o f . Let (E0, El) be the 2-coloring of G*. We assume there is an AP6 v 0 , . . . , v5, for otherwise we are done. With respect to these fixed v0 and Vl, we let
H = {xy C E :3 an AP6 with base
YOVl
and front xy}.
(s2)
Since (E o, El) is double-AP6-free, Facts 8.5.8 and 8.5.6 imply that if an edge e of G belongs to H, then all edges of G in C*(e) belong to H. Therefore if we swap the color of all edges of H, we obtain another 2-coloring of G*. For this new 2-coloring we assert the following: No edge in H is an edge of an AP6.
(s.3)
In order to prove this assertion, we assume that the new coloring has an AP6 w 0 , . . . , w5 with one of its edges in H, and obtain a contradiction. W i t h o u t loss of generality we assume that wows C H and that wows C E1 (we always refer to the old coloring if not mentioned otherwise; thus w 0 , . . . , ws is an AP6 in E0 in the new coloring). Since WoWs II WlW4, either v0, Vl, w0, Wl, w4, w5 or v0, vl, w5, w4, Wl, w0 is an AP6 in E0. The s y m m e t r y allows us to assume the first case. Figure 8.13 illustrates this situation, including the edges vowl, vlw4 C E1 of the complementary AP6 vo, vl, w4, w5, wo, Wl in El. The vertices w2 and w3 remain to be specified.
Figure 8.13: A configuration in the proof of Theorem 8.5.9.
W4
Wl
2-Threshold Graphs
198
Since all edges incident to v0 or Vl retain their color and vow1, VlW4 C E,1, a choice of w2 = v0 or w3 = vl would contradict our assumed AP6 W o , . . . , w5 in the new colors. The following possibilities remain. C a s e 1: I{Vo, Vl, W 0 , . . . , W5}I = 8. C a s e 1 . 1 : w l w 2 C H. Then WlW2 E E1 and WoWa C Eo. From WlW2 C H, Fact 8.5.6 implies the existence of an AP6 in Eo with base VoVl and front WlW2. But vow1 C El, and therefore vow2, VlWl C Eo must be edges of this AP6. A closer look reveals that Vo, Vl, wl, Wo, w3, w2 is an AP~ in Eo, thus its complementary AP6 guarantees V0Wo,vlwa C El, as illustrated in Figure 8.14.
Figure 8.14: Cases in the proof of Theorem 8.5.9.
Case 1.1
W3
W3
W2
W2
Case 1.1.2
C a s e 1.1.1: W3W 4 E H. The above argument applied to W 3 W 4 instead of WlW2 results in VOW4,VlW3 C Eo, which is impossible. C a s e 1 . 1 . 2 : w a w 4 ~ H. Then w3w4 C Eo and therefore w2w5 C El. Further, since VlWa, W2Ws E E1 and w3w2 ~ E, we must have VlW5 C E. Moreover, VlWs E El, for otherwise vo, Vl, ws, w4, w3, w2 would be an AP6 in Eo, which would result in w2ws, w3w4 C H, contrary to our case. Further, as depicted in Figure 8.14, since WoVo, VlW4 C E1 and vovl ~ E, we must have WoW4 C E. But WoW4 C E1 implies the double AP6 w4, ws, wo, Wl, Vo, vl, whereas wow4 C Eo implies the double AP6 wo, wl, w4, ws, Vo, vl; a contradiction to our assumption. C a s e 1 . 2 : w 3 w 4 C H. This case is symmetric to Case 1.1.
8.5
Recognizing Threshold Dimension 2
199
C a s e 1.3: WlW 2 ~ H and W3W4 ~ H. In this case WlW2, W3W4 ~ E 0 and Since VoWs, W4W3 C Eo and wsw4 ~ E, we must have VoW3 C E. Further, VoW3 E E0, for otherwise w2ws, w3w4 E H because of the AP6 Vo, vl, w4, ws, w2, w3. The symmetric argument leads to v, w2 C Eo, which contradicts VoW3 ]1 VlW2. See Figure 8.15.
WoW3, W2W5 C El.
Figure 8.15" Cases in the proof of Theorem 8.5.9.
W3~
W3
W2 Wl
Case 1.3
Case 2
C a s e 2: Vo = w3 and V1 ~ W2. If WlW2 ~ H, then wow3 - WoVo @ H, a contradiction. Therefore WlW2 ~ H, hence WlW2 C Eo and wow3 = WoVo C El. Further, since wlvo, w2w5 E E1 and VoW2 ~ E, we have WlW5 C E. But WlW5 does not have an admissible color, because WlW5 C E1 implies the double AP6 Wo, wl, Vo, vl, w4, ws, and WlW5 E E0 implies the double AP6 W4~ W5~ V0~ Vl~ W0~ Wl.
C a s e 3: vo :/: w3 and Vl = w2. This case is symmetric to Case 2. C a s e 4: Vo = w3 and Vl = w2. Then WlVl, VoW4 ~ H , hence WlVl, vow4 C Eo and WoVo, vlw5 C El. Since WoVo,VlW4 C Eo and vovl ~ E, we have WoW4 C E. Further, WoW4 C Eo, for otherwise the double AP6 w4, ws, Vl, vo, Wl, wo exists. The s y m m e t r i c argument leads to WlW5 C E0, which contradicts WoW4 ]1 wlws. See Figure 8.16. Since all the cases above lead to contradictions, we conclude that the new coloring does not have an AP6 with an edge in H, and therefore our assertion (8.3) holds. But then the new coloring has fewer AP6's than the old one. Continuing in this way, we achieve an AP6-free coloring in a finite number of steps.
200
2-Threshold Graphs
Figure 8.16: A case in the proof of Theorem 8.5.9. W4 W3
Case 4
W2 Wl
In order to demonstrate the O( EI(IE I + IV])) running time, it suffices to show that the determination whether an APo V o , . . . , vs exists for a given edge v2vs and the computation of H defined by (8.2) can be done in O(IV I + IEI)time. First we consider the former problem. Since the coloring of G* is doubleAPB-free, Fact 8.5.8 implies that {x, y } N {v0, Vl} = e for each AP6 V o , . . . , vs if xy II v2vs; hence the APo Vo, Vl, v2, x, y, vs also exists. Therefore a fixed edge v3v4 conflicting with v2vs may be chosen in advance. The remaining search for the base vov~ is in O(IVI + IEI), similarly to Theorem 8.5.4. As to the computation of H, an edge xy is in H if and only if it is the front of some AP6 with base vovl. Again, it is easy to see that if such an APo exists, then an APo with base vovl, front xy and an edge vw must also exist whenever vw II xy. Therefore, the computation of H is also in O(IVI + IEI).
Part 3 In this part we present an efficient method to transform a 2-coloring of G* into a double-APB-free 2-coloring, which is the remaining task according to Theorem 8.5.9. In order to do this we need a deeper analysis of the structure of a double AP6. To begin with, we consider the neighborhood of a vertex in G* in more detail. The vertex partition induced by an edge xy E E is defined as follows (see Figure 8.17):
K(xy)
=
V(C*(xy)),
8.5
Recognizing Threshold Dimension 2
I(xy)
=
X(xy)
= =
D(xy)
{icV-K:ix~E,
201
iy~E},
iU{ {dcV-K:dxCE,
cV-K:
x
E,
ycE},
dyCE}.
Figure 8.17: The vertex partition induced by an edge xy E E.
/ /
II
/I
[/~
\ I
\ \
\
\\
\ \
\
I 71)
I
Let vw C E be an edge satisfying xy ]] vw. Then K(xy) = K(vw) by definition. Further, let io E I(xy) and do C D(xy). If iow E E, then io C K(xy) since iow ]] xy. Therefore low ~ E. The symmetric argument leads to iov ~ E, and hence io E I(vw) and I(xy) C_ I(vw). But the situation is symmetric with respect to I(xy) and I(vw), so I(vw) C_ I(xy). Therefore Next, since dow ~ E implies dox II wv and consequently do C K(xy), we conclude that dow E E. In the same way we get cloy E E, hence D(xy) C_ D(vw). Again, by symmetry, we have D(vw) C_ D(xy), and consequently D(xy) : Thus the partition induced by xy is identical to the partition induced by vw whenever xy ]1 vw. By induction on h, if xy = xoyo I[ "'" II XhYh, then xy and XhYh induce identical vertex partition, i.e., all edges in C*(xy) induces the same vertex partition.
202
2-Threshold Graphs
For the rest of this section let v o , . . . , vs be a double AP6 and V = K U I U S U D the vertex partition induced by its front v2vs. From Fact 8.5.7 we know that the front of a double AP6 and an edge incident to one of its base vertices are in different connected components of G*. Thus {v0, Vl} C_ D. Without loss of generality, we assume that v2vs C EI throughout this section. From the definition of a double AP6 and the existence of its complementary double AP6, we derive {V0V2, V0V5, VlV2, VlV5, V3V4} C Eo, {VoV3, VoV4, VlV3, VlV4, v2v5} C E 1 .
Lemma
(8.4)
8 . 5 . 1 0 I U {v0, Vl} is a stable set.
P r o o f . Since an edge with both its ends in I contradicts the definition of the vertex partition, it suffices to show that there is no i C I adjacent to any vertex in {v0, Vl}. Assume voi C E as illustrated in Figure 8.18. Figure 8.18: Illustrating the proof of Lemma 8.5.10.
?)0
?31
Then VlV2 ][ voi II VlV3 contradicts (8.4). The case vii e E can be similarly treated. 9 Lemma8.5.11 Let s C S satisfy sv2 ~ E and svs C E (sv2 C E and sv5 ~ E). Then
1. SVo, svl ~ E; 2. v2v4 ~_ E and v3vs E E (v2v4 E E and V3V5 ~ E);
8.5
Recognizing Threshold Dimension 2
203
3. the edges VoV2, VoVs, "VlV2, VlV5 and svs (sv2) belong to the same color class and the same connected component of G*.
P r o o f . Because of symmetry it suffices to consider the case sv2 ~ E and svs C E. Since sv3 ~ E implies svs II v3v4 and consequently s C K, we conclude that sv3 C E and sv4 ~ E. Suppose that Statement 1 does not hold, i.e., SVo C E or SVl C E, as illustrated in Figure 8.19. Figure 8.19: Illustrating the proof of Statement 1 of Lemma 8.5.11.
V0
Vl
But SVo C E implies E0 ~ VlV2 I[ V0$ II VlV4 E E0, and 8V 1 ~ E implies II II vov c Eo, both cases contradicting (8.4). Based on Statement 1, we observe that v3vs C E because otherwise svs II v4v3 results in s E K. But if v2v4 E E, then sv3 [[ v4v2 II i.e., sv3 and svs would have the same color. This would contradict the coloring stated in (8.4) because of sv3 II v0v and svs 1] vov4. Thus Statement 2 also holds, as illustrated in Figure 8.20. Finally, Statement 3 follows from vovs II v, v4 11 sv5 II VOV4 [[ VIV2 [[ 'SV3 II vov4 II viva.
E0
L e m m a 8.5.12 {s C S " sv2 E E } or {s E S " svs C E } is empty. P r o o f . Suppose {s C S : sv2 E E } # r and {s C S : svs C E } # 0 . Then we derive a contradiction by applying Statement 2 of Lemma 8.5.11 to a vertex sl C S with Sly5 C E, which gives v2v4 ~ E, whereas the same lemma applied to a vertex s2 C S with s2v2 C E gives v2v4 C E. 9
204
2-Threshold Graphs
Figure 8.20: Illustrating Lemma 8.5.11.
VO
Vl
L e m m a 8.5.13 S U {Vo, Vl} is a stable set. P r o o f . By Lemma 8.5.11, it suffices to show that S is stable. Assume now that there are vertices Sl, s2 E S with sis2 E E and, without loss of generality, SlVs E E, as in Figure 8.21. Figure 8.21" Illustrating the proof of Lemma 8.5.13. 81
V0
Vl
-_.
_.""
"-
82
Then s2vs E E follows from Lemma 8.5.12. Thus VoV2 [[ 8182 ]] V0V4, i.e., 9
VoV2 and VoV4 have the same color, which contradicts (8.4).
8.5
Recognizing Threshold Dimension 2
205
Further, we observe that no edge is with i C I and s C S exists, because such an edge is adjacent to v2vs in G*. This together with Lemmas 8.5.10 and 8.5.13 leads to the following corollary. C o r o l l a r y 8.5.14 I U S U {v0, vl} is a stable set. The next observation is fundamental. L e m m a 8.5.15 The sets {k C K " vok E E0} and {k @ K " vok E El} are cliques in the induced subgraph G[K]. P r o o f . Otherwise there are vertices k0, kl E K such that kokl ~ E and voko, vokl belong to the same color class Ei, i - 0, 1. By Fact 8.5.7 there is a double AP6 Vo, vl, k l , . . . , and therefore Vlkl C El. But this contradicts
v0k0 II ~k~.
9
By the definition of K the graph G[K] consists of at most two connected components, one containing v2 and one containing vs. Then by Statement 2 of L e m m a 8.5.11 we obtain the following" C o r o l l a r y 8.5.16 If S 7~ (g, then G[K] is connected. Let H be a subset of the connected components of G* such that all the edges of the double AP6 v o , . . . , vs belong to connected components in H. Then the connected components of H can be divided into five groups (recall that E ( W ) denotes the set of edges with both ends in W):
T1 - Tl(v2vs)" The connected components in H that contain at least one of the edges vov2, vovs, VlV2 and vlvs. T2 - T2(v2vs)" The connected components in H that contain both edges in E ( V - If) and edges not in E ( V - If). T3 - T3(v2vs)" The connected components in H whose edges are exclusively in E ( V - K). T4 - T4(v2vs)" The connected components in H whose edges are exclusively in E ( K ) . T5 - Ts(v2vs)" The connected components in H that are not in T1,... ,T4. The following fact is easily verified.
206
2-Threshold Graphs
F a c t 8 . 5 . 1 7 T1 U T2, T3, T4, T5 is a partition of H. Further, all edges Vok,
k C K, are in Tl-components, and if S ~ ~, then T1 consists of a single connected component (by Statement 3 of Lemma 8.5.11). Let ks c E be an edge with k c K and s C S. Then sk and vok have the same color and C*(sk) - C*(vok) - C*(vovs) C T1. Moreover, sk cannot be the front of a double AP6 (in any 2-coloring of G*). LemmaS.5.18
P r o o f . By the definition of the vertex partition and the existence of a double AP6 vo,..., vs, there also exists a double AP6 with base vovl and front kko, where kko E C*(v2vs). Applying Lemma 8.5.11 to this AP6 and s C S, we obtain that C * ( k s ) - C * ( v o k ) - C*(vlk)and that sk and vok have the same color. But G[K] is connected by Corollary 8.5.16, and so has a path v5 - x 0 , . . . , x ~ k. Then we have voxo
II VlXl II vox2 II VlX3 II ....
This means that G* has a path from VoVs to either vok or vlk, and hence C*(vovs) = C*(ks), which proves the first statement of the lemma. In order to prove the second statement, suppose there exists a double AP6 no, Ul,S,..., k. Then, by the first statement and Fact 8.5.7, a double AP6 Uo, Ul,Vo,... ,k also exists. Thus uovo and UlS are identically colored, which contradicts UoVo II U18" 9 L e m m a 8 . 5 . 1 9 Let
C*(vov5)
-
-
]gO/~l E E(K). If C*(]%~1) ~ E(K), then S r 0 and
C*(/%/Q) C T1.
P r o o f . If C*(kokl)~ E(K), then there are edges XoX 1 ~ C*(~0/Cl)I1E(I() and yoy~ C C * ( k o k l ) - E(K) satisfying xoxl ]l yoyl. But yoyl ~ E ( V - K) because I O S is stable and y0, Yl ~ D. Therefore we assume without loss of generality that y0 C K and yl E V - K. Moreover, since Yl C V - K is adjacent to y0 E K but not adjacent to Xl C K, we obtain yl C S. Then C*(yoyl) - C*(voV5) follows from applying Lemma 8.5.18. ,, From Lemma 8.5.18 and 8.5.19, together with the fact that T5 has no edges in E ( V - K) we conclude the following: C o r o l l a r y 8.5.20 Every edge in a Ts-component has one end in K and the
other in D.
8.5
Recognizing Threshold Dimension 2
207
L e m m a 8.5.21 Let XoX 1 E E ( V - I() and yoyl C E with Yl E K satisfy xoxl II yoyl, i.e., C*(XOXl) = C*(yoyl) E T2. Then yo C D and, for all ko E K, the edges yoko are identically colored and belong to the same connected component of G*. P r o o f . We have y0 C V - K, for otherwise xo, xl E I tO S, contradicting Corollary 8,5.14. Hence y0 C S tO D. Further, Xl C I U S and x0 C D, the latter because I U S is stable. Our partition now yields a double AP6 with base VoVl and yl gs an end of its front, say v0, Vl, w2, wa, w4, yl. If y0 C S, then by Lemma 8.5.12 Xl C I, and by Lemmas 8.5.11 and 8.5.15 yowa and yoyl have different colors, a contradiction to yowa II XOXl II yoyl. Therefore yoCD. If Xl C I, then for all k0 E K the edges yoko satisfy yoko [[ xoxl and we are done. If Xl C S, then Lemma 8.5.11 implies XlWa ~ E and ylwa ~ E. Thus yoyl l[ xoxl l] yowa. By Corollary 8.5.16 there is a path k0, kl, k : , . . . , yl, Wa in G[I(] for every given ko e K. Therefore a path yoko ]] xokl ]] yok2 ]] Xok3 ]1''" of even length to either yoyl or yow3 exists in G*, and the result follows. 9 L e m m a 8.5.22 Let C* E T1 and S - 0. Then all edges in C* have one end in K and the other in D, and every edge wk C C* with k C K has the same color as vok. P r o o f . By definition every edge in C* is connected by a path in G* with an edge in {VoV2, VoVs, VlV2, VlVs}. Let e l k 1 II I 1 - denote such a path with We ~ {V0, ?-)1} and kl E {732,735}. Further, let k0 E {v3, v4} be a vertex satisfying kokl ~ E, and thus wlk0 and Wlkl have different colors. Suppose that our lemma is wrong and Wj+lkj+l is the first edge in the path satisfying Wj+l ~ D or kj+l ~ K. Then Wj+l C I U D because of wj C D and oc - 0 , and kj+l ~ K for otherwise kj+l C K yields Wj+l E D, which contradicts the choice of j. Thus Wj+lkj+l C E(V - / ( ) and Lemma 8.5.21 applies, which guarantees the same color for wjkj and wjkj_l. This is a contradiction because w~ko II ' II wjkj-1 and Wlk 1 II " II jkj imply different colors for wjkj and wjkj_l. From wi C D and ki C K for all wiki together with S - ~, we conclude that k l , k 2 , . . , is a path in G[K]. But the color of the edges vok, k C K induces a 2-coloring of G[K], and thus wiki and voki are identically colored because Wl k l and V0kl have the same color. 9 Thus T1 N T2 - O if S - ~ and we obtain the following corollary:
2-Threshold Graphs
208
C o r o l l a r y 8.5.23 If S -
0, then T1,..., T5 is a partition of H.
8 . 5 . 2 4 No edge in a T2-component (in any 2-coloring of G*).
Lemma
can be
the front of a double AP6
P r o o f . Since every connected component C* C T2 contains 15wo edges xoxl, y0yl satisfying the condition of Lemma 8.5.21, there must exist two identically colored edges yoko, yokl C C* with kokl ~ E. If there is a double AP6 with base UoUl and front edge in C*, then the double AP6's Uo, Ul, Yo,..., ko and Uo, ul,Yo,...,ka follow from Fact 8.5.7. Thus uoko and Ulkl have the same color, which contradicts uoko II ttlkl" II If a 2-coloring of G* is double-AP6-free in the set of (T2 U Ta)-edges, then the property that G[K] is bipartite allows us to compute a 2-coloring of G* that is double-AP6-free in the set of edges in all the connected components of H, as we show below. This recursive algorithm can be formulated as follows: S t e p 1" Find a double AP6 Vo,..., vs with all its edges in H. If no such AP6 exists then we are done. S t e p 2: Compute I f -
V(C*(v2v5)) and T1,... ,Ts.
S t e p 3" Let H' - T2 tOT3. Recursively find a 2-coloring of G* that is doubleAP6-free in the set of edges of H' (by swapping the colors in some components of H'). S t e p 4" Change the coloring of each C* E Ts so that the color of every edge wk E C*, k C K, is identical to the color of the edge vok. S t e p 5" Change the coloring of each C* E T4 so that the color of every edge kokl C C* is identical to the color of the edge voko whenever voko and vokl have the same color. Let us show that Steps 4 and 5 give proper 2-colorings of G*. Concerning Step 4, we observe that for every path woko 11 ' " 11wjkj in a Ts-component, where w0 E D and k0 C K, the sequence wo,..., wj is a path in G[D] and the sequence ko,..., kj is a path in G[K] (see Corollary 8.5.20). Therefore voko 11 Vl/~I II V0/~2 11 Vl/% II'" ", and it follows that wjkj and vok i have the same color if and only if woko and voko have the same color. Thus if suffices to consider a single edge to determine the coloring of the whole component.
8.5
Recognizing Threshold Dimension 2
209
Concerning Step 5, let kokl E E ( K ) be an edge in a T4-component and k0kx II ' rl k jk j+i be a path in G*. Again, since the color of the edges vok, k E K, induces a partition of G[K] into two cliques and k0, k2,..., k2j is a path in G[K], the edges k2jk2j+l and vok2j have the same color if and only if kokl and Voko have the same color. Obviously, the same argument applies to the path kx, k3,..., k2j+l, and thus voko, Vokl and kOkl have the same color if and only if Vok2j, Vok2j+l and k2jk2j+l have the same color. Again, it suffices to consider a single edge to determine the coloring of the whole component. Fact 8.5.25 The sets Ko - {k C K ' v o k C Eo} and I~1 - - {]~ E I s " El}, defined with respect to the new coloring, remain cliques of G[K].
U0]~
Proof. The edges Vok, k C K, are Tl-edges by Fact 8.5.17. Hence K0 and K1 can only be affected by Step 3. If S = O, then T1fIT2 = O by Corollary 8.5.23, all Tl-edges retain their color during Step 3, and K0 and K1 stay the same. If S r 0, then by Fact 8.5.17 T1 consists of a single connected component, either all Tl-edges retain their color or all of them change their color during Step 3, and K0 and /(1 either stay the same or are exchanged with each other. In any case, since K0 and K1 were cliques in G[K] by Lemma 8.5.15, they remain so in the new coloring, and so continue to define a 2-coloring of
C[K] Furthermore, our algorithm achieves the desired result, as shown by the following theorem. Theorem 8.5.26 fFee.
The 2-coloring computed by Steps 1 to 5 is double-AP6-
In order to simplify the proof of Theorem 8.5.26, we state the following intermediate result. L e m m a 8.5.27 Let (Eo, E1) be the 2-coloring computed by Steps 1 to 5.
1. ff wlkl C E with Wl E V - K, ]~1 ~ K , and if W l k l and V0]g 1 have different colors, then Wa C D and kiwi belongs to a T2-component. 2. If in addition ko E K with kOkl ~ E, then WlkO and Wl kl belong to the same component and have the same color. 3. If kokl E E(K), then kokl and voko have the same color whenever voko and vokl have the same color.
210
2-Threshold Graphs
P r o o f . 1" By Lemma 8.5.18 W1 E D. Further, Wlkl is neither in a Tscomponent (Step 4) nor in a Tl-component with S - O (Lemma 8.5.22), nor in a (T3 U T4)-component. Therefore G* has a path Wl~I 1[ "'" ][ Wj~j I[ WjTI~j+I
(8.5)
with w~ c D and k~ C K for i _< j but Wj+l ~ D or kj+l C} K (indeed, if Wlkl is a T2-edge, there is a path from it to E ( V - K) and then kj+l ~ K; and if Wlkl is a Tl-edge and S -r Z, then T1 consists of a single component by Fact 8.5.17, so there is a path from Wlkl to an edge between S and K by Lemma 8.5.18, and Wj+l C S). Then Wj+l C V - K because of wj E D. If kj+l C K, then Wj+l C S and Lemma 8.5.18 implies the same color for Wj+lkj+l and vokj+l. But this is a contradiction because k l , . . . , kj+l is a path in a[Kl, hence the 2-coloring of G[K] induced by the (new) colors of the edges in vok, k E K, (see Fact 8.5.25) implies different colors for Wj+lki+l and v0kj+l. Therefore ki+l C V - K, which completes the proof of 1). 2" By Lemma 8.5.21 applied to wjkj and Wj+lkj+l, the edges wjkj_l and wik j belong to the same connected component and have the same color. From Wlko I[ w2kl [I "'" I[ wj]gj_l together with (8.5)it follows that Wlk0 and Wlkl are in the same connected component and have the same color. 3" Because of Lemma 8.5.24 and Steps 4 and 5, it suffices to show that 3) holds for edges kokx in Tl-components. But for every edge kokl C E(K) in a Tl-component there exists a path kok~ [[ ... II ]~2j]~2J+1 with k~ E K, i < 2j, and either k2i E S or k2j+l E S (notice that S -/- o by Lemma 8.5.19, and apply Lemma 8.5.18). Without loss of generality we assume that k2j+x E S. But vok2j and k2i+lk2j have the same color by Lemma 8.5.18. Because of the 2-coloring of G[K] induced by the colors of the edges vok, k C K, and the path ko, k2,..., k2j in G[K], the edges voko and kokl have the same color. P r o o f of T h e o r e m 8.5.26 If the theorem does not hold, then a double AP6 w 0 , . . . , ws in one of the color classes E0, E1 computed by our algorithm must exist. Without loss of generality assume that w2ws C El, and thus
{W0W2,WOW5, WlW2, Wee5, W3W4} C Eo, {W0W3,WOW4, WlW3, WlW4, W2W5} C El.
(8.6)
(8.7)
Further, there must be a stage of our coloring algorithm where all the edges of the double AP6 wo,..., ws are in connected components of H, but not all of them are in connected components of H ~. We consider the situation
8.5
Recognizing Threshold Dimension 2
211
after Step 5 of this stage, and so v 0 , . . . , vs stands for the double AP6 of Step 1 of this stage and K, I, S, D for the vertex partition induced by v2vs. Now we discuss the possibility of the base wow1 relative to K and V - K. C a s e 1" w 0 C K a n d w l C V - K . ThenwlCIUS. C a s e 1.1" w2 C V - K and ws C K. T h e n w l C S. B y L e m m a S . 5 . 1 8 we obtain VoWs C Eo. Thus by Statement 1 of Lemma 8.5.27, the edge w2ws belongs to a T2-component, which is impossible because no such edge can occur as the front of a double AP6 by Lemma 8.5.24. C a s e 1.2: w2ws C K . Then Wl C S. By Lemma 8.5.18 we have vow2, vows C E0. Now Statement 3 of Lemma 8.5.27 implies w2ws C Eo, which contradicts (8.6). C a s e 1.3" w2,ws C V - K . If {w3, w4} ~ V - K , then we consider the complementary double AP6 wo, Wl, w4, ws, w2, w3 instead of w 0 , . . . , Ws, and we are back in Case 1.1 or 1.2. Thus we may assume that w3, w4 C V - K. Then all the edges of the double AP6 w o , . . . , W s belong to (T2 U T3)components. Thus w 0 , . . . , ws is a double AP6 in H', a contradiction to our assumption. C a s e 2" w0, Wl ~ K. C a s e 2.1" w2 E V - K and Ws E K. By Fact 8.5.25, from the 2-coloring of G[K] induced by the colors of the edges incident to v0, we know that vowo and vowl have different colors. Then vows C E0, for otherwise Statement 3 of Lemma 8.5.27 implies wows C E1 or WlWs C El, contradicting (8.6). But w2w5 C E1 and therefore, by Statement 1 of Lemma 8.5.27, w2ws must belong to a T:-component, which is impossible because of Lemma 8.5.24 C a s e 2.2: w2, Ws E K. Again we obtain VoWs C Eo by the same reasoning as in Case 2.1. Since w2 E K, a similar argument applies and VoW2 C Eo. But VOW2,VoWs C Eo together with Statement 3 of Lemma 8.5.27 results in w2ws C E0, a contradiction to (8.6). C a s e 2.3" w2,ws C V - K. Again from the 2-coloring of G[K] induced by the colors of the edges incident to v0, we see that VoWo and vowl have different colors. Without loss of generality we assume that vowl C El. Thus, by Statement 1 of Lemma 8.5.27 WlWs and WlW2 are T2-edges, and then by Statement 2 of Lemma 8.5.27 WoWs and WoW2 are T2-edges. Note that w2ws and W 3 W 4 are (T2 U T3)-edges. Therefore all edges of the double AP6 w o , . . . , Ws belong to connected components of H', which contradicts out assumption. C a s e 3" w0, wl C V - K .
212
2-Threshold Graphs
Case 3 . 1 : w 2 E V - K and w5 E K. Since w2w5 is the front of a double AP6, we conclude that w2 C D by Lemma 8.5.18, and hence w3 C V - K. Further, by Lemma 8.5.24, w2w5 cannot be in a T2-component. Thus {w3, w4} V - K, and hence w4 C K. But VoWs C El, for otherwise, by Statement 1 of Lemma 8.5.27, w2w5 must be in a T2-component. Again by Statement 2 of Lemma 8.5.27, we infer that wows and WoW4 have the same color, which contradicts (8.6). Case 3.2: w2, w5 C K. Then w3, W4 ~ V stable.
K is impossible because I U S is
But if {w3, w4} ~ V - If and {w3, w4 } ~ If, we consider the complementary double AP6 wo, wl, w4, ws, w2, w3 instead of w 0 , . . . , ws and we are back in Case 3.1. Thus it remains to consider the case w3, w4 E K. Then by Statement 3 of Lemma 8.5.27, either VoWs E E1 o r VoW2 E El. In the former case, by Statement 2 of Lemma 8.5.27, WoWs and WoW4 have the same color, which contradicts (8.6). The latter case is similar. Case 3.3" w2, w5 C V - K. If {wa, w4} ~ V - K, we consider the complementary double AP6 Wo, Wx, w4, ws, w2, w3 and we are back in Case 3.1 or 3.2. But if w3, w4 E V - K, all the edges of the double AP6 w o , . . . , w5 belong to connected components of H', a contradiction to our assumption. 9 The following theorem together with the foregoing theorems establishes the claimed running time to cover G with two threshold graphs.
T h e o r e m 8.5.28 A double-AP6-free 2-coloring of a bipartite G* can be computed in O(IEI(IEI + IVI))-time.
P r o o f . Given a double AP6 V o , . . . , vs, Steps 2, 4 and 5 take linear time. By induction on IEI, the recursive Step 3 takes O(IE'I(IE'I + IVl))-time, which is O(IEI(IEI + ]V]))-time, where E' is the set of edges in the components of H'. As for Step 1, the search for all double AP6's can be done in O(IEI(lVl+IEI))time by exploiting the fact that a given edge xy C El, i = 0, 1, is the front of a double AP6 if and only if IC*(xy)l > 1 and the set L = {v E V : x v C E - Ei, yv C E - Ei} is not a clique. Observe that the vertices in L can be marked in O(IVl)-time. To obtain a nonedge in L, if any, simply build and use the adjacency lists of a[L], which can be done in O(IEI + I V l ) - t i m e . . .
8.6
8.6
R e c o g n i z i n g Difference D i m e n s i o n 2
213
R e c o g n i z i n g Difference D i m e n s i o n 2
In this section we present the necessary background from Ma and Spinrad [MS94] for Ma's algorithm for recognizing threshold dimension 2, to be discussed in the next section. Recall from Section 2.4 that a difference graph, also known as a chain graph, is a bipartite graph in which the neighborhoods of the vertices in each color class are nested. Given a bipartite graph G, its intersection difference dimension idime(G) is the minimum number of difference graphs whose intersection is G, and its union difference dimension udimg(G) is the minimum number of difference graphs whose union is G. We consider that udimd(G) = 1 if G has no edges. Note that udimd(G) is the same as ch(G) of Section 7.2. Our problem here is to recognize when idima(G) _< 2. Since the class of difference graphs is closed under bipartite complementation, an equivalent problem is to recognize when udime(G) _< 2. Other equivalent problems are the recognition when a given split graph can be covered by 2 threshold subgraphs, solved by Ibaraki and Peled [IP81]; the recognition of Ferrers dimension 2, solved by Cogis [Cog79]; and the recognition of bidimension 2, solved by Doignon et al. [DDF84]. The solution of Ma and Spinrad reduces the problem to recognizing poset dimension 2. Recall from Theorem 16.4.4 that a poser has dimension 2 if and only if its incomparability graph is transitively orientable, which gives a polynomial-time recognition algorithm for poset dimension 2. In fact, there are O(n2)-time recognition algorithms for poset dimension 2, and the reduction to be presented here can be done in the same time bound, but we would not go into these details, since the recognition of threshold dimension 2 has a larger time bound. A linear extension of a strict poset P = (X, R) is a strict poset (X, L), where L contains R and is complete. A realizer of P is a set of linear extensions whose intersection is P, and the poser dimension of P, do(P), is the minimum size of a realizer of P. D e f i n i t i o n 8.6.1 Let P - (X, R) be a strict partial order. The b i p a r t i t e r e p r e s e n t a t i o n of P is the bipartite graph B ( P ) = ( X , X ' ; E) with color classes X and X', where X ' = {x' : x C X } is a disjoint copy of X , and xy' C E if and only if y f p x, i.e., x
214
2-Threshold Graphs
P and the maximal difference subgraphs of B(P). For this end we need the following results.
Proposition 8.6.2 B(P) satisfies 1. xx' ~ E for all x E X ; 2. N(x) - N(y) if and only if x - y; 3. N(x) D N(y) if and only if x < y. P r o o f . Part 1 is trivial, and so is the "if" part of Part 2. For the "only if" part of Part 2, note that if y ~ x, then y' C N(x) - N(y), and hence N(x) 5r N(y); thus if N(x) - N(y), we must have y < x and similarly x <_ y, i.e., x - y. For the "if" part of Part 3, assume that x < y and z' e N(y). Then z :~ y and h e n c e z :~ x, and so z' e N(x). Thus x < y implies N(y) C_ N(x), and equality does not hold by Part 2. For the "only if" part of Part 3, assume that N(y) C N(x). We cannot have x - y; if we had x :~ y, then we would have x' e N(y) and hence x' e N(x), contradicting Part 1; therefore we must have x < y. 9 8.6.3 Let H - ( X , X ' ; F) be a maximal difference subgraph of the bipartite graph G - (X, X'; E) and let xy' C E - F. Then there exists some z e X such that NH(Z) D NH(X) and z y ' ~ E.
Lemma
P r o o f . Assume that some x C X violates the lemma. Among all such x, choose one with a maximal NH(X). There exists a y' E X ~ such that every z E X satisfying NH(z) D NH(X) must also satisfy zy' E E. Moreover, zy' C F , for otherwise z would also violate the lemma, contrary to the m a x i m a l i t y of NH(X). Since xy' is a nonedge in the maximal difference subgraph H, adding it to H creates an alternating 4-cycle. In other words, there exist z E X and w' C X' with zw' C F and zy', xw ~ ~ F. Since the neighborhoods NH(Z) and NH(X) are comparable and w' C N H ( Z ) - NH(X), we must have Nu(z) D Nu(x). But then by assumption zy' E F , a contradiction. .. 8.6.4 Let P - (X, R) be a strict poset and H - (X, X'; F) a maximal difference subgraph of B(P). For every x, y E X, if NH(x) D NH(y), then xy ~ C F.
Lemma
8.6
215
R e c o g n i z i n g Difference D i m e n s i o n 2
P r o o f . Assume that x violates the lemma and is chosen so that NH(X) is maximal. Then there exists a y C X with NH(X) D NH(y) and xy' ~ F, and every z C X satisfying NH(Z) D NH(X) must also satisfy zy' C F. By lemma 8.6.3 xy' ~ E, where B(P) = (X,X'; E). Therefore by definition of B(P) we have y < p x, and hence by Proposition 8.6.2 NB(p)(y) D NB(p)(X). Since NH(X) D NH(y), the set S = {w C X : xw' E F, yw' ~ F} is nonempty, and each w C S satisfies yw' C E because xw' E E and NB(p)(y) D NB(p)(X). If we add all these edges yw', w E S to H, H remains a difference subgraph of B(P) since the neighborhood of y has been increased to equal the neighborhood of x. But this contradicts the maximality of H. 9 L e m m a 8.6.5 Let P = ( X , R ) be a strict poset and let H be a maximal difference subgraph of B(P). Define a strict poset L = (X, T) by
x
y
N.(x)
N.(y).
(8.8)
Then L is a linear extension of P. Consequently x = y
N.(x)=
(8.9)
P r o o f . To show that L is complete, assume that, on the contrary, x IlL Y. Since g is a difference graph, we have Ng(x) = NH(y), and as xx', yy' are nonedges of H, both xy' and yx' must be nonedges of H. By the definition of B ( P ) , one of xy' and yx', say xy', must be an edge of B(P). By Lemma 8.6.4, for each w satisfying NH(W) D Nil(x) = NH(y), wy' is an edge of H. Therefore H remains a difference subgraph of B(P) even after xy' is added to it, contradicting its maximality. This shows that L is a strict linear order. To show that L is an extension of P, assume that x
xy~ C F ,~-~, x < L y. Then H is a maximal difference subgraph of B(P).
(8.10)
2-Threshold Graphs
216
P r o o f . We assert that x
the maximal difference subgraphs H of B(P) and the linear extensions L of P given by Lemmas 8.6.5 and 8.6.6 are inverses of each other. Consequently, if H and L correspond under these mappings, then for every x, y C X, the following conditions are equivalent: 1.
x
Y;
2. xy' is an edge of H;
s. N.(x)
N.(y).
P r o o f . Starting with a maximal difference subgraph H of B(P), define a linear extension L of P as in Lemma 8.6.5, and from L define another maximal difference subgraph H' of B(P) as in Lemrna 8.6.6. For every x, y C X, if xy' is an edge of H', then x
8.6
Recognizing Difference Dimension 2
217
L e m m a 8.6.8 For every strict poset P, d o ( P ) - udimd(B(P)). P r o o f . Let H1,...,Hk be difference subgraphs covering B(P). We may assume that they are maximal, and define the corresponding linear extensions L1,...,Lk of P - ( X , R ) as in Lemma 8.6.5. For every x,y E X, if y f p z, then x9' is an edge of B(P) and hence also an edge of some Hi, and by Proposition 8.6.7 we have x
udimd(B(P) < do(P).
"
Lemma 8.6.8 reduces the recognition of partial order dimension of at most 2 to the recognition of union difference dimension of at most 2. However, ~ve need a reduction in the opposite direction. Before achieving it, we need to define a certain induced subgraph of B(P). Given a strict poset P, we say that an ordered pair (x, y) of incomparable elements is covered by a linear extension L when x
8.6.9 Let P - (X, R) be a strict poset and consider its bipartite
2-Threshold Graphs
218
representation B ( P ) - (X,X'; E). The reduced bipartite r e p r e s e n t a t i o n B ' ( P ) of P is the subgraph of B(P) induced by U U V', where U -- {x C X " (x,y) is an unforced pair for some y C X} V' -- {y' C X " (x,y) is an unforced pair for some x E X}. The following lemma says that, in a sense, B'(P) carries as much information as B(P) does. Lemma
8 . 6 . 1 0 For every strict poser P, -
P r o o f . Since B'(P)is an induced subgraph of B(P) and an induced subgraph of a difference graph is a difference graph, it is clear that udime(B'(P)) <_ udime(B(P)). To show the reverse inequality, let G 1 , . . . , Gk be difference subgraphs covering B'(P). Extend them to maximal difference subgraphs HI,..., Ilk of B(P). Each Hi leads to a linear extension Li of P according to L e m m a 8.6.5. We show that each edge xg' of B(P) is an edge of some Hi, which gives the required inequality udime(B(P)) <_ k. By definition of B(P) we h a v e x < y o r x l l Y . If x < p y, then x
8.6
219
R e c o g n i z i n g Difference D i m e n s i o n 2
S t e p O- If G has distinctvertices z and w with N(w) identify them (this does not change udimd(G)).
N(z) (twins),
S t e p 1" Add (xi, xj) to R if N(xi) D N(xj). S t e p 2" Add (yi, yj) to R if N(yi) C N(yj). S t e p 3- Add (yj, x~) to R if z~yj ~ E. S t e p 4: Add (xi, yj) to R if U(yj) N X C_ U(xi) N X, where U(x) denotes the set of all y satisfying (x, y) C R. Figure 8.22 illustrates this construction. Figure 8.22" A bipartite graph G - (X, Y; E) with X - { X l , X 2 , x 3 } , Y - {yl, Y2, y3} and the Hasse diagram of the strict poset P constructed from it by the reduction.
Xl
Yl
x2
Y2
X3
Xl
Yl
y2
x3
Y3
1
X2
G
P
The crucial properties of the construction are given by the following lemma. L e m m a 8.6.11 In the construction above, where G is after Step O,
1. P is a strict poset; 2. G is isomorphic to an induced subgraph of B(P); 3. B'(P) is isomorphic to an induced subgraph of G.
220
2-Threshold Graphs
P r o o f . 1" Clearly R is irreflexive, and we have to show that it is transitive. This is done by showing that each step preserves its transitivity. Step 0 leaves R empty. Steps 1 and 2 use containment relations to add pairs to R, and so they maintain transitivity. Assume that, if possible, adding the pair (yj,xi) to R in Step 3 violates its transitivity. At this stage no arc is directed from X to Y, and so there are two types of possible violation" (i) (xi, xk) C R, (yj, xk) ~ R and (ii) (yk, yj) C R, (yk, xi) ~ R. These types are similar, and we deal with (i). Since (x~, xk) has been added to R in Step 1, we have g(x~) D N(xk); since (yj,xk) has not been added to R in Step 3, we have yj C N(zk); since (yj,z~) has been added to R in Step 3, we have yj ~ N(x~). But these conditions are contradictory. Assume that, if possible, adding the pair (xi, yj) to R in Step 4 violates its transitivity. Then there exists a w such that (i) (w, x~) is in R but (w, yj) is not, or (ii) (yj, w ) i s in R but (xi, w)is not. We deal with (i) first. Since U(yj) n X C_ U(xi) N X and xi e (U(w) - U(xi)) n X, we have w r yj. If w C X, then U(w) n X D U(x~) n X because R was transitive after Step 1, and hence (w, yj) should be added to R in Step 4, contrary to assumption. If w E Y, then U(w)NX D U(x~)NX D__U(yj)NX (the first inclusion holds since R was transitive after Step 3 and it is strict since xi E ( U ( w ) - U(xi))n X). Therefore, by Step 3, for every x E X, xyj ~ E implies xw ~ E, but not conversely; in other words, N(w) C N(yj). But then (w, yj) was added to R in Step 2, contrary to assumption. Now assume that the violation is as in (ii). We must have w -r xi, for otherwise xi e U(yi) n X C_ U(xi) N X, which is impossible. I f w C X, t h e n w E U(yj) N X C_ U(x~)NX, and so (xi, w) was added to R in Step 1, contrary to assumption. If w E Y, we have U(w) C U(yj) by the transitivity of R after Step 3, hence U(w)O X C_ U(yj) N X C_ U(xi)N X, and hence (xi, w) should be added to R in Step 4, contrary to assumption. 2" G is a bipartite graph with color classes X, Y and B(P) is a bipartite graph with color classes X U Y, X~U Y~. For every x C X and y E Y, we have by Step 3 and the definition of B(P) that xy C E if and only if y :~p x if and only if xy ~is an edge of B(P). Therefore G is isomorphic to the subgraph of B(P) induced by X U Y'. 3: by Definition 8.6.9 B'(P) the subgraph of B(P) induced by U U V', where U
-
{w " ( w , z ) i s an unforced pair in P for some z},
V' -
{ z " ( w , z ) is an unforced pair in P for some w}.
We now show that every unforced pair (w, z) in P belongs to X x Y. Conse-
8.6
Recognizing Difference Dimension 2
221
quently U C_ X, V' C_ Y', and since G is isomorphic to the subgraph of B ( P ) induced by X U Y', it follows that B'(P) is isomorphic to a subgraph of G, as required. The unforced pair (w, z) cannot belong to X x X, for otherwise, by w II z, N(w) and N(z) are incomparable sets (they are unequal because of Step 0). In particular there exists a y C N(w) - N(z). By Step 3 we have (y, z) C R and (y, w) ~ R. By transitivity and w II z we have (w, y) ~ R. Therefore (w, y) is a pair of incomparable elements, and it forces (w, z), a contradiction. Similarly (w, z) cannot belong to Y x Y. The unforced pair (w, z) cannot belong to Y x X, for otherwise, by Step 4, there exists an x C (U(w) - U(z))N X. Then (x, z) ~ R by transitivity and w II z, and so (x, z)is a pair of incomparable elements, and it forces (w, z), a contradiction. .. T h e o r e m 8.6.12 Let G be a bipartite graph and P the strict poset constructed in Steps 0-4 above. Then udimd( G) - do(P). Proof. The proof comes from the following equalities and inequalities d o ( P ) - udimd(B'(P)) < udimd(G) < udimd(B(P)) - do(P),
where the first equality follows from Lemmas 8.6.8 and 8.6.10, the next inequality from Part 3 of Lemma 8.6.11, the next inequality from Part 2 of Lemma 8.6.11, and the last equality from Lemma 8.6.8. 9 In recognizing threshold dimension 2 in the next section, we need variations of the recognition problems for poset dimension 2 and union difference dimension 2. These variations are called "restricted" problems. D e f i n i t i o n 8.6.13
1. Let P be a strict poset and R1,R2 disjoint sets of incomparable pairs of elements of P. The r e s t r i c t e d poset d i m e n sion 2 p r o b l e m asks whether there exist linear extensions L1, L2 containing R1, R2, respectively, whose intersection is P.
2. Let G be a bipartite graph and El, E2 disjoint sets of edges of G. The r e s t r i c t e d u n i o n d i f f e r e n c e d i m e n s i o n 2 p r o b l e m asks whether there exist difference subgraphs H1, H2 containing El, E2, respectively, whose union is G.
T h e o r e m 8.6.14 There exists a polynomial-time reduction of the restricted poset dimension 2 problem to the poset dimension 2 problem.
222
2-Threshold Graphs
P r o o f . We regard P as a set of ordered pairs and begin by finding pairs that must be put into L1 or L2. First of all, L1 must contain the transitive closure of P U R1 and L2 must contain the transitive closure of P U R2. Hence we put Pi = P U Ri for i = 1, 2 and replace each Pi by its transitive closure. If any Pi contains a directed cycle, we stop with a No answer, and otherwise the current Pi are strict posets. Next, if a pair (u, v) belongs to P~ but not to P2, then it is incomparable in P, and thus the opposite pair (v, u) should belong to L2. We then add (v,u) to P~ and replace P2 by its transitive closure. Again, if the new P2 contains a directed cycle, we stop, and otherwise it is a strict poset. We do similar steps of adding pairs to P1, and repeat these steps as long as possible. We then obtain two strict posets P1 and P2 having the same set R* of incomparable pairs, unless we stopped previously with a No answer. We know that if L1 and L2 exist, they should contain P1 and P2, respectively. Therefore we should also have P1 N P2 = P, for otherwise there cannot be extensions L1 and L2 with L1 N L2 = P and we stop with a No answer. Now we solve the poset dimension 2 problem for P1. Assume first that the answer is Yes and we obtain a partition of R* into R~ and R~ such that P1 U R~ and P1 U R~ are strict linear orders. Note that R~ and R~ have opposite pairs, i.e., (u, v) C R~ if and only if (v, u) C R~. We assert that P2 U R~ is also a strict linear order, and so L~ - P~ U R~ and L2 - P2 U R~ are strict linear extensions of P whose intersection is P, as required. If the assertion is false, then P2 U R~ contains a directed cycle. Let C be a shortest such cycle. C cannot have length 2, since P2 is acyclic, R~ has no cycles of length 2, and its elements are incomparable pairs for P2. Assume that C has length 3 and it consists of the pairs (a, b), (b, c), (c, a). At most one of these three pairs can be in P2, since two consecutive pairs in P2 imply a shorter cycle by transitivity. Since R~ is contained in the strict linear order P1 U R~, at least one of the three pairs must be in P2. Therefore one of the three pairs, say (a, b), is in P2 and the other two pairs are in R~. Since (b, c) and (c, a) are in R~, the opposite pairs (c, b) and (a, c) are in R~. The pair (a, b) cannot belong to P1, otherwise C would be a cycle in the strict linear order P1 U R~. Hence the opposite pair (b, a) is either in P1 or is incomparable for P1, namely is in R*. But the latter possibility contradicts (a, b) C P2, since R* is the set of incomparable pairs for P2 as well. Therefore (b,a) C 1'1. Thus the opposite cycle is contained in the strict linear order P1 U R~, a contradiction. Assume now that C has length k > 3 and let its pairs be (a~, a2), (a2, a 3 ) , . . . , (ak, al). If (al, a3) C R~, then we have the shorter cycle
8.6
Recognizing Difference D i m e n s i o n 2
223
(al, a3), (a3, a 4 ) , . . . , (ak, al). If (al, a3) e R~, then (a3, al) e / ~ and we have the shorter cycle (al, a2), (a2, aa), a3, al). Otherwise al and a3 are comparable for P2, and (al, a3) or (a3, aa) is in P2, giving rise again to one of the above shorter cycles. This contradiction proves the assertion. Finally, assume that the poset dimension 2 problem for P1 has a No answer. In that case there cannot be strict linear orders whose intersection is P. For if there were, they would have to be of the form P1 U R~ and P2 U R~, where (R~, R~) is some partition of R* into sets of opposite pairs. But from our assertion in the previous paragraph, P1 U R~ is also a strict linear order, and so P1 U R~ and P1 U R~ are strict linear orders whose intersection is P1.
T h e o r e m 8.6.15 ([Ma94]) There is a polynomial-time reduction from the restricted union difference dimension 2 problem on a bipartite graph without twins to the restricted poset dimension 2 problem. Proof. Let the input of the restricted difference dimension 2 problem be the bipartite graph G = (X,Y; E) and disjoint sets of edges E1 and E2. Construct the strict poset P by Steps 0 through 4. Since G has no twin vertices, Step 0 does not apply and hence does not eliminate any edges of E1 or E2. Set R1 = {(x, y): xy' C El}, R2 = {(x, y): xy' C E2} and solve the restricted poset dimension 2 problem for P, R1 and R2. We now show that the answer of the restricted union difference dimension 2 problem is Yes if and only if the answer of the restricted poset dimension 2 problem is Yes. Assume that P is the intersection of strict linear orders L1 and L2 containing R1 and R2, respectively. Let M1 and M2 be the corresponding maximal difference subgraphs of B(P), and let H~ be the subgraph of M~ induced by X 12Y'. By Lemma 8.6.11 G is isomorphic to the subgraph of B(P) induced by X U Y' and we identify these two graphs. By this identification, the Hi are maximal difference subgraphs of G. Since Li contains Ri, we have that Hi contains Ei by Proposition 8.6.2. We show that HI and//2 cover G as follows. Let xy be any edge of G. By Step 3 (y, x) q~ P, and since LI N L2 = P, we must have x
224
2-Threshold Graphs
Ri by Proposition 8.6.2. To show that L1 N L2 = P, it is enough to show that if w lip z, then w
8.7
Intersection Threshold Dimension
2
In this section, based on Ma [Ma93], we present the first polynomial-time algorithm for recognizing threshold dimension 2. The problem is to recognize whether a given graph is the union of two threshold subgraphs, or equivalently whether its complement is the intersection of two threshold graphs on the same vertices. Threshold graphs are (special) interval graphs, and therefore an intersection of two threshold graphs is a boxicity-2 graph, namely the intersection graph of rectangles whose sides are parallel to the coordinate axes in N 2. This is so because two rectangles intersect if and only if their projections on each of the two axes intersect. Threshold graphs can be characterized as those interval graphs that have an interval model in which every interval has its left endpoint at the origin or is a point (an interval of length 0) and all the points are distinct from each other and from the endpoints of the intervals. We call such an interval model a threshold interval model. A graph with a threshold interval model is clearly a threshold graph, since the vertices represented by the intervals form a clique K, the vertices represented by the points form a stable set I, and the neighborhoods of the vertices of I are nested according to the order of the points on the line. Thus the graph satisfies Condition 3 of Theorem 1.2.4. Conversely, every threshold graph has a threshold interval model, constructed as follows. Represent the vertices v C K by intervals i(v) whose left endpoint is the origin and such that for all u, v E K we have N[u] C N[v] if and only if i(u) C i(v); represent each vertex v C I by a point slightly to the left of the right endpoint of the largest interval i(u) such that u is adjacent to v (or by a point to the right of all the intervals if v is isolated). Clearly this can
8.7
225
Intersection Threshold Dimension 2
be done so that all the points are distinct. Figure 8.23 illustrates a threshold interval model for a threshold graph. Figure 8.23: A threshold graph and its threshold interval model. The oval around a, b, c, d indicates that these vertices form a clique.
e
d C
I b
f g
a
g
Consider now the intersection G = T1 fl T2 of two threshold graphs T1 and T2 on the same vertices. We can construct a threshold interval model for T1 and T2 along the positive x and y axes, respectively. Thus each vertex of G is represented by an interval or a point along the x axis and by an interval or a point along the y axis. In the Cartesian product of the two threshold interval models, the vertex is represented by the Cartesian product of its two representations. We call this a threshold rectangle model (TRM) for G. More specifically, a T R M consists of the following kinds of geometrical objects in the first quadrant: boxes
Cartesian products of an interval along one axis and an interval along the other axis; they are rectangles with sides parallel to the axes and one corner at the origin;
s e g m e n t s Cartesian products of an interval and a point; they are line segments having an endpoint on one of the axes and parallel to the other axis; p o i n t s Cartesian products of two points; they are single points.
226
2-Threshold
Graphs
We denote boxes, segments with an endpoint on the x and y axes and points by the letters b*, x*, y*, p*, and their corresponding vertices in the intersection graph by the letters b,x,y,p, respectively. The sets of these geometrical objects and also of the corresponding vertices are denoted by B, 5'~, Su, P, respectively. A TRM is specified by the following key-points: for every box b* its corner c(b*) opposite the origin; for every segment s* its base b(s*) (the endpoint on the axis) and its tip t(s*) (the other endpoint); and for every point the point itself. Figure 8.24 illustrates a TRM and its intersection graph. Figure 8.24: A threshold rectangle model and its intersection graph. The boxes are drawn with dashed lines. The oval around bl, b2, b3 indicates that these vertices form a clique.
Pl
b~ I I
y~
I I I I
b~ Yl
I I
b; . . . .
I I I I I x* 1
I I I
I
Xl
y2
x2
Y3
I I I I
I
I
.
y4
~g2
We note that the (vertices corresponding to the) boxes of a T R M form a clique, since all of them contain the origin. Also the points intersect only boxes, since the points of a threshold interval model are distinct. For the same reason no two segment have the same base, and so the segments form a bipartite graph. No segment is on the same line as a side of a box, since the points of a threshold interval model are not endpoints of intervals. The question we now have to answer is this: given a graph, does it have a TRM? To facilitate this, we observe that every TRM can be transformed into a normalized threshold rectangle model (NTRM) without changing its
8.7
Intersection Threshold Dimension 2
227
intersection graph by the following normalization steps (each step is applied as long as possible before the next step; the five steps are then repeated until no longer posssible; the process terminates because segments can only become points or boxes and points can only become boxes). These steps are also discussed in Sterbini [Ste94]. 1. Every segment that intersects only boxes becomes a point near its base. Every remaining segment therefore intersects other segments. 2. If a point intersects all the boxes, it becomes a small box near the origin. This can be done only once, since the new box will not intersect any remaining point (or segment). 3. Every point is moved near the corner of the intersection of all the boxes that contain it (without leaving these boxes). .
If there are vertical segments that intersect all the boxes, the leftmost of them becomes a narrow box with the same height as the segment. (There can be no obstruction to this step, since an obstruction would have to be a horizontal segment that does not intersect the vertical segment but is lower than its tip; such a horizontal segment has already become a point in Step 1 and moved out of the way in Step 3; it could not have become a box in Step 2, because such a box would not meet the vertical segment, so Step 4 would not apply to the latter.) After this operation no vertical segment meets the new box. An analogous operation is done on the lowest horizontal segment that intersects all the boxes.
5. If a box b~ intersects all the segments and points that intersect a box b~ and yet b~ does not include b~, the corner of by is moved horizontally or vertically until it lies just inside b* (by does not lose any point contained in it, even if the point was moved in Step 3). Figure 8.25 illustrates the NTRM resulting from the TRM of Figure 8.24. We can reformulate our recognition problem as follows: given a graph G, does G have a NTRM? Two consequences of the normalization are that the boxes form a maximal clique (Steps 2 and 4) and that every segment intersects other segments (Step 1). Hence if it is known which vertices of G are to be represented by boxes, the points can be identified as the vertices that become isolated after
228
2-Threshold Graphs
Figure 8.25: The normalized threshold rectangle model obtained from the threshold rectangle model of Figure 8.24. (a) After the first round of Steps 1-5, segment y~ becomes a point near its base and then moved near the corner of the intersection of b~ and b~, point p~ moves near the corner of b~, segments y~ and y~ become narrow boxes, and box b~ moves inside box b~. (b) After the second round, segment y~ becomes a point near its base and then moved near the corner of box x~.
y~
y~ x 1
--lXl
--'1 I
y;
I
b~
I
_A
m
_e--.
,
b2
1
I I I
I
_
--1" I
I
I I
I
--'I
m
b;
_.]
-
pT i I
-I-t
-1
II
I
I I
b;
I
--t
I -
I
__
m
I A I I I I I I -- -- - - I - t
I
p~ ---1 I
II
I I
X2
(a)
(b)
the boxes are removed, and the segments are the rest of the vertices, which should induce a bipartite graph. Proposition 8.7.1 below shows t h a t a graph on n vertices having a N T R M has at. most n 2 m a x i m a l cliques. Since it is straightforward to generate the m a x i m a l cliques one by one in polynomial time per clique, we can try each m a x i m a l clique in t u r n as a candidate for B, identify the corresponding P and S, and see if it is possible to build a corresponding N T R M . If the answer is negative (for example, because S does not induce a bipartite subgraph of G), we consider the next m a x i m a l clique of G. If G has more than n 2 m a x i m a l cliques, the answer is a u t o m a t i c a l l y negative. P r o p o s i t i o n 8.7.1 Let G be a graph on n vertices having a N T R M . G has at m o s t n 2 m a x i m a l cliques.
Then
P r o o f . It is easy to see that each set of geometrical objects (boxes, segments, points) forming a clique has a c o m m o n point. Hence we can obtain all max-
8.7
Intersection Threshold Dimension 2
229
imal cliques by considering, for each point in the plane, the set of objects containing that point. Clearly it is sufficient to consider only the origin, the bases of the segments, the intersections of segments, and the points. Let s~,sv, p denote the number of vertical segments, horizontal segments, and points in the NTRM, respectively. Then s~ + sy + p _< n and the number of maximal cliques is bounded by 1 + s~: + s v + s~sy + p. This is bounded by 1 + n + max s~sv, where the maximum is taken subject to s~ + s v - n. It is easy to see that the bound is not more than n 2 for n > 1. 9 We remark that the estimates in the proposition are crude. Additionally, one can show that if G has a NTRM, it has one in which the boxes form a m a x i m u m clique, that G has at most n 2 / 4 maximum cliques, and that these cliques can be obtained efficiently. See [Ma93] for the details. From now on we assume that the vertices of G are already partitioned for us into boxes B, segments S and points P, with B forming a maximal clique, the vertices that become isolated in G - B forming the set P, and the remaining vertices forming the set S and inducing a bipartite graph. We ask whether we can position these boxes, segments and points to form a NTRM so that their intersections represent the adjacencies of G. We may now assume that no two boxes are twins, namely have the same closed neighborhood, for otherwise we can delete one of them without affecting the answer (if we find a N T R M without this box, we can then add it as an exact or approximate copy of its twin box). Similarly we may assume that no two points are twins, namely have the same open neighborhood. As for the segments, we assume for the moment that the bipartite graph that they induce is connected, and therefore the segments partition uniquely into two sets that we may assign arbitrarily as horizontal and vertical segments. We may then assume that no two horizontal and no two vertical segments are twins, for similar reasons. The search for a NTRM is done in two stages. In the first stage we ignore the tips of the segments and try to place the other key-points (corners of boxes, points, and bases of segments) in the plane so as to reflect the adjacencies of the corresponding vertices, except for adjacencies between segments. In the second stage we arrange the segments, without disturbing their intersections with the boxes, to reflect their adjacencies with each other. Let us define a binary relation ~ on Ii{2 as follows" ( x l , y e ) __ ( x 2 , y 2 ) , when X 1 ~ X 2 and y~ _< y2. We say that ( x i , y l ) d o m i n a t e s (x~,y2), written as (xl,yl) -~ (x2, y2), when (xl, yl) ~___ (x2, Y2)and (xl,Yl) -r (x2,y2). Two different points that do not dominate each other are said to be incomparable. Clearly ~ is a partial order on Ii{2, and it is 2-dimensional, since it is the
230
2-Threshold Graphs
intersection of the linear orders of the separate z and y coordinates. The strict partial order -~ is also 2-dimensional. We are interested in finding domination relations between some of the key-points in every NTRM of the given graph G, namely between the corners b of the boxes, the bases s of the segments and the points p (since we are now in the first stage, we ignore the tips of the segments). It turns out that to a large extent these can be deduced directly from the neighborhoods of G. Every NTRM of G must satisfy the following, where we use the letters b, s, p to denote both the key-points of the geometrical objects and the corresponding vertices of G" 9 For a box corner b, a base s and a point p we have s-.< b < > s c:_ N(b)
(8.11)
p--< b ~
peN(b).
(8.12)
N[bl] C N[b2]
(8.13)
9 For box corners bl a n d b2 we have b1 ~ b2 ~
(the ~ the ~
part follows from b~ C b~ and from the absence of box twins; part follows from Step 5 of the normalization of the TRM).
9 For a point p and a box b we have b-.~ p ~
Yb' E N(p)
(8.14)
b-~ b'
follows from Step 3 of the normalization of the TRM). Hence (the < by (8.13) (8.15) b -~ p r Vb' e N(p) N[b] C N[b']. 9 For points pl and p2 we have
Pl ~ P2 ~
(8.16)
N(pa) D N(p2)
(the ~ follows from the absence of point twins; the < Step 3 of the normalization of the TRM).
follows from
9 For a point p and a segment s we have s -.~ p ~
(the ~
N(p) C_ N ( s ) N B
follows from Step 3 of the normalization of the TRM).
(8.17)
8.7
Intersection Threshold Dimension 2
231
9 For segment bases 81,82 E ~x or 81,82 E ~y we have the implication 81 "~ 82 ,r
N ( S l ) N B D N(s2) N B.
(8.18)
Let Kb, Kp, Kx, Ky be the sets of box corners, points and bases of the vertical and horizontal segments, respectively. Let R be the binary relation on K = Kb O I(p O K~ O Ky, R such that (a, b) C R if and only if a -~ b according to (8.11)-(8.18). The relation R can be computed from the neighborhoods of G. If G and the partition of its vertices into B, P, S~, Sy have a NTRM, then P = (K, R) is a strict poset of dimension 2, which we know how to check in polynomial time. If it turns out that P has a realizer, we can use the positions of the elements of K in the two linear extensions of P as coordinates of the corresponding key-points in R 2. However, we want to ensure that the bases of the vertical segments are lower than any other key-point and that the bases of the horizontal segments are to the left of any other key-point. Therefore we solve the restricted poset dimension 2 problem given by P and the following two sets of incomparable pairs of P:
{(a,b) : a C Kx, b ~ Kx,(a,b) ~ R} R2 = {(a,b) : a C Ky,b ~ Ky,(a,b) ~ R}
1~ 1
:
(i.e., we ask whether R is the intersection of two linear extensions containing RU R1 and Rt.J R2, respectively; this can be determined in polynomial time by Theorem 8.6.14). If the answer is negative, the current B is discarded. If the answer is positive, the two linear extensions are used to place the box corners, the points and the segment bases in the plane. Since the bases of the vertical segments are lower than any other key-point, we can lower them down further to the x axis without changing their intersections with the boxes or any domination relations, and similarly for the bases of the horizontal segments. We then obtain a NTRM for G except for the intersections between segments, since we have not yet placed the segment tips. Now we enter the second stage and try to arrange the segments bases and tips without changing the intersections between segments and boxes, so as to reflect the intersections between segments. Let us ignore the intersections between segments and boxes for the moment. We say that a bipartite graph has a segment intersection model when it is the intersection graph of vertical and horizontal segments in the first quadrant whose bases are on the coordinate axes. The question is then whether the bipartite subgraph of G induced by the segment vertices has a segment intersection model.
232
2-Threshold Graphs
P r o p o s i t i o n 8.7.2 A bipartite graph has a segment intersection model if and only if it is the intersection of two difference graphs with the same color classes. Proof. " O n l y if"" Consider a segment intersection model and its bipartite intersection graph Q. Consider the grid defined by the lines containing the segments. The horizontal and vertical lines of the grid correspond to the rows and columns of the adjacency matrix A of Q, and A has a 1 in a given position if and only if the corresponding horizontal and vertical segments intersect. Thus A is the intersection (component-wise product) of two adjacency matrices A1 and A2:A1 has l's in the positions corresponding to the grid points on the horizontal segments, and similarly for A2 and the vertical segments. Therefore Q is the intersection of the the bipartite graphs/-/1 and /-/2 whose adjacency matrices are A1 and A2, respectively. Now //1 is a difference graph, since every two rows of A1 are comparable by inclusion according to the lengths of the corresponding segments. Similarly//2 is a difference graph, since every two columns of A2 are comparable. Figure 8.26 illustrates this argument. "If": We assume that the bipartite graph Q is the intersection of difference graphs //1 and //2 having the same color classes. Let the color classes be X : { X l , . . . , x k} and Y : {yl,. 9 9 , Yl}, where N , l (xl) D " ' " D N , 1 (Xk)
(8.19)
N , 2 ( Y l ) _~ " ' " __~ NH~(y,).
(8.20)
Consider the adjacency matrices A of Q, A1 of HI and A2 of//2 as having columns corresponding to Xl,..., xk from left to right and rows corresponding to y l , . . . , y t from bottom to top. By (8.19) and (8.20), the l's in every row of A1 are consecutive from the first column on, and the l's in every column of A2 are consecutive from the first row on. We construct horizontal segments corresponding to the l's in the rows of A1 and vertical segments corresponding to the l's in the columns of A2. The i-th vertical segment intersects the j-th horizontal segment if and only if AI(j, i) = A2(j, i) = 1, which is equivalent to A ( j , i ) = 1 since A is the component-wise product of A1 and A2. In other words, the i-th vertical segment intersects the j-th horizontal segment if and only if xi and yj are adjacent in Q. Therefore we have constructed a segment intersection model for Q. ,, Proposition 8.7.2 reduces the recognition of bipartite graphs having a segment intersection model to the recognition of intersection difference di-
8.7
233
Intersection Threshold Dimension 2
Figure 8.26: A segment intersection model and its intersection graph Q. The adjacency matrix A of Q is the intersection of adjacency matrices A1 and A2 of difference graphs.
Y4
Yl
Ys
Y2
Y3
y
Y2
Y4
Yl X1
Xl
X2
X3
X2
X3
y4
0
Y4
1
1
0
y4
0
1
0
ys
0
Y3
1
0
0
y3
1
1
0
y2
1
Y2
1
1
1
y2
1
1
1
yl
0
yl
1
1
0
yl
1
1
1
Xl
X2
X3
Xl
X2
X3
Xl
X2
A
X3
A1
A2
2-Threshold Graphs
234
mension 2 (or equivalently to the recognition of union difference dimension 2 of the bipartite complement). In turn, this problem is reduced by Theorem 8.6.12 to recognizing poset dimension 2. However, we must also take into account the domination relations between segment bases imposed in the first stage by the intersections of segments with boxes. We partition the sets I(= and h'y of segment bases on the x and y axes into equivalence classes called windows. Two elements of I(~ or two elements of I(y are in the same window when they intersect the same boxes. After the first stage we are free to exchange the positions of segment bases only if they are in the same window; if 81,82 E I(= are in different windows, then the first stage has imposed a definite order relation between them, say sl -4 s: (because N(Sl)M B D N(s2) M B). As the proof of Proposition 8.7.2 shows, the segments are induced by the ordering of the roots, whereas the roots on each axis are ordered by the neighborhood containment relations in one of the two difference graphs. We can therefore formulate the problem of finding a segment intersection model for the bipartite subgraph Q = (S=, Sy; E) of G induced by the segment vertices as follows. The color classses S= and Sy are partitioned into windows X0,... ,Xp and Y0,..., Yq, respectively (corresponding to the partitions of the segment bases into windows). We seek difference graphs HI a n d / / 2 with color classes S=, 5'y such that H1 ('1/-/2 = Q and such that
Va C Xi, b E Xi+l,
NH, (a) D___NH, (b)
Va C Y/, b C Y/+I, NH2(a)D___NH2(b). Equivalently we can consider the bipartite complement Q - (S=, Sy; E) of Q and seek difference graphs H1 and H2 with color classes S=, Sy such that H1 U/-/2 - Q and such that
Va e X,, b e X,+,,
Va C
b C Y,+,,
NT, ' (a) C_ NT, ' (l,)
(a) C_
(t,).
Construct a new bipartite graph Q' - (S= u U, S v u V; E U Eu U Ev), where U = {ua,...,uq} and V = {v~,...,vp} are sets of new vertices and
Eu = { u ~ y : y C Y j , i < _ j } Ev
=
{vix:xCXj,i<_j}.
8.7
Intersection Threshold Dimension 2
235
N
It is easy to see that H1 a n d / / 2 exist if and only if Q~ can be covered by two difference subgraphs, one containing Ev and the other containing Eu. This is precisely an instance of the restricted union difference dimension 2 problem. Moreover, Q' does not have twin vertices, since twin vertices of Q' would have to belong to the same window (due to Eu and Ev), and they would then have the same intersections not only with the segments but also with the boxes. In other words, twins of Q~ would be twin segment vertices of G, which do not exist according to our assumption (they were eliminated before the first stage). Therefore by Theorem 8.6.15, we can reduce our instance of the restricted union difference dimension 2 problem in polynomial time into an instance of the poset dimension 2 problem. This completes the description of the second stage of the algorithm. We have one more assumption to be taken care of. We have assumed that the bipartite subgraph Q of G induced by the set S of segment vertices is connected, so that S partitions uniquely into two color classes that we assigned arbitrarily as S~ and Sy. If Q is a bipartite graph with k connected components, we can run the second stage separately on each connected component, but we have the choice of switching color classes (i.e., horizontal and vertical segments) in each component independently. This leads to 2 k possibilities, too many to exhaust in polynomial time. Let C 1 , . . . , Ck be the connected components of Q. The vertices of each Ci partition uniquely into two color classes that we denote as Ci~ and Cib. We may assign the segments corresponding to Cia to S~ (i.e., as vertical segments) and those of Cib to Sy (horizontal segments), or vice versa. Each segment of Ci~ intersects some segments of Cib but no segments from other connected components, and similarly for each segment of Cib. Therefore, no m a t t e r whether the segments of Ci~ are vertical or horizontal, the segments of each Ci occupy an area of IR2 that looks like a hook, and these hooks are disjoint. Thus for every two hooks, one of them is closer to the origin than the other one, as in Figure 8.27. We can tell from the graph G which hooks are closer to the origin as follows. The intersections of B with the segments of Ci~ are linearly ordered by set inclusion. If u* and v* are the (innermost and outermost) segments of Ci~ with the m a x i m u m and minimum intersections with B, respectively, we define max(Cia) and min(Cia) to be NB(u) and NB(V), respectively. In the same way we define max(Cib) and min(Cib). For components Ci and Cj, we write Ci
2-Threshold G r a p h s
236
Figure 8.27: Three hooks generated by the connected components of the segments.
".'.'.'.'.'.'.-.'.'.-.'.'.-.'.-.-.'.'.'.-.-.'.'.'.'.-.'.
i iiiiiiiiiiiiiiiiiiiiiiiii~ 9 .'.'.-...-.-...-.-
....-...........
i:i:i:i:i:i:i:i:i:i:i:i:i:i:i:i~ 9 .'
".'.'.'.'.'.
i iiiii~
closer to the origin than Cj. If neither C~ ~_ Cj nor Cj <1 C~ holds, there is no N T R M for the present choice of boxes. If both Ci <1 Cj and Cj <1 Ci hold, we have min(C/~) - max(Ci~) - min(Cj,) - max(Cj~), min(Cis) - max(Cib) -- min(Cjb) -- max(Cjb ) or
min(C,o) - m~x(C,o) - m~n(Cj~) - m~x(Cj~), min(Cib)
--
max(Cib)
--
min(Cja
) -
max(Cja
)
and we may place either Ci or Cj closer to the origin. Thus we may assume that the Ci have been reindexed so that Ca _<1 ... _<1Ck, as in Figure 8.27. To decide which of Ci~ and Cib will be the horizontal segments, we process the components from the origin outward. When we process Ci, we try making Ci~ the horizontal segments and check if this yields a consistent N T R M with the boxes, the points and the previous segment components. If it does, we accept this assignment and continue with Ci+l without checking the other
8.7
Intersection Threshold Dimension 2
237
possibility that Cib are the horizontal segments. Only if it does not do we check the other possibility, and if it fails too, we conclude that B does not yield a NTRM. Thus we check at most 2k possibilities instead of 2 k. The following lemma and proposition justify this greedy procedure. L e m m a 8.7.3 Assume that both placements of Cia as horizontal segments and of Ci= as vertical segments yield a N T R M with B, P and C I , . . . , Ci-1.
Then there exists a partition of B into subsets B1 and B2 such that 1. no box of B1 intersects any segment of Ci; 2. each box of B2 intersects each segment of Ci-1; 3. c(b~) -~ c(b~) for each bl C BI, b2 C B2, i.e., each corner of a box of BI dominates each corner of a box of B2. P r o o f . [Mar94a] Consider a N T R M of B, P and C1,..., Ci such that flipping Cia and Cib also yields a N T R M for these objects. The lines through the vertical and horizontal segments of Ci-1 with the largest z and y coordinates and those of Ci with the smallest z and y coordinates delimit nine zones, as illustrated in Figure 8.28. No box corner can lie in zone E, because such box intersects some horizontal segments of Ci, and by our assumption it should also intersect them after the flip of Cia and Cib, but this cannot be achieved, since the vertical segments of Ci-1 stand in the way. Similarly no box corner can lie in zone I. If zones B and D also contain no box corners, then we put the boxes with corners in zone A into B1 and the boxes with corners in zones C, F, G, H into B2 and we are done. Otherwise we may assume without loss of generality that zone D contains some box corners. Let b0 = (z0, y0) be a box corner in the union C U D with x0 as large as possible. If each box corner is comparable with b0, we put the boxes whose corners dominate b0 into B1 and the boxes whose corners are dominated by b0 into B2. Conditions 1 and 3 of the lemma are then satisfied, and so is Condition 2 (trivially if b0 lies in zone C, and by its definition if it lies in zone D). Hence we may assume that some box corners are incomparable with b0. Let bl = (xl,yl) be a box corner incomparable with b0 with yl as large as possible. Note that each box corner in zone F is comparable with b0, otherwise the flip cannot be done, as b0 stands in the way. This fact and the fact that zone E has no box corners imply that bl lies in zone A, B, C or
238
2-Threshold Graphs
Figure 8.28" Nine zones used in the proof of Lemma 8.7.3.
E
F
G
I:i:i:i:i:i:i:i:i:i:i:i:i:i:i:il!i:i:i:i:i:i:i:i:i:i:ili~il
B .
.
.
.
.
.
H
D
I
OiL!i!:l
I::::::::: .
C
.
.
.
.
A
.
.
.
.
.
.
D. Each box corner in zone H is comparable with bl; this is obvious if bl is in zone A or D, and follows from the impossibility of the flip because bl stands in the way if it is in zone B or C. Since b0 dominates every box corner in zone F , bl dominates every box corner in zone H, no box corner lies in zone E or I, and by the definitions of b0 and bl, it follows that z = (x0, y~) lies in zone C or D and is comparable with every box corner. Now we place each box whose corner dominates z into B1 and each box whose corner is d o m i n a t e d by z into B2 (if z itself is a box corner, place its box arbitrarily into B1 or B=). As before, B1 and B2 satisfy the required conditions. ,, P r o p o s i t i o n 8 . 7 . 4 The greedy procedure of processing C1, C2,... in order, and assigning Ci~ as the horizontal segments if this is consistent with the already made assignments for C1, . . . , Ci-1 and as vertical segments otherwise will find a N T R M for B, P, S if one exists. P r o o f . For convenience, we may assume that in every N T R M considered, the o u t e r m o s t horizontal and vertical segments of each Ci have the same
8.7
Intersection Threshold Dimension 2
239
distance from the origin (this can be achieved by continuous transformations of the axes, which do not affect our algorithms, because the latter only specify ordinal domination relations between key-points). Assume that a NTRM M exists and let N be the model being constructed by the greedy procedure. Let Ci be the first connected component for which the horizontal and vertical segments are assigned in opposite ways in M and N. Then Ci satisfies the assumption of Lemma 8.7.3, and consequently its conclusion holds for it. Change M as follows: reflect about the line x = y all the segments of Ci, Ci+l,..., all the boxes of B2, and all the points contained in these boxes or in their reflected images. By the properties of B1 and B2 and our assumption at the beginning of this proof, the new M has the same intersection relations of geometrical objects as the old one, i.e., M remains a NTRM. But now M agrees with N on the assignment of horizontal and vertical segments for C1,..., Ci. By induction on i, it follows that N is a NTRM. ,,
Chapter 9 The Dilworth Number 9.1
Introduction
We begin by introducing some definitions from [FH78a]. Recall that for a graph G - (V, E), the vicinal preorder on G is a binary relation ~ on V defined by x~y if and only if N(x) U { x } _ D N ( y ) . We say that x dominates y if x ~ y. It is easily verified that ~ is reflexive and transitive and hence is a preorder. If x ~ y but y ~ x, then we denote this by x ~- y (not to be confused with our notation for strict majorization). I f x ~ y and y ~ x, then we denote this by x ~ y. We say that x,y are comparable if x ~ y or y ~ x, incomparable otherwise. Thus two vertices are incomparable if and only if they are opposite vertices in some alternating 4-cycle. A chain is a set of mutually comparable vertices, or equivalently a sequence of vertices X l , . . . , xk such that xi ~ xj whenever 1 < i < j < k. The Dilworth number of a graph G - (V, E), denoted by D(G), is the least number of chains into which V can be partitioned. By the well-known Dilworth Theorem [Dilh0], the Dilworth number equals the size of a largest set of mutually incomparable vertices. Such a set is called an antichain. Observe that x ~ y in G if and only if y ~ x in the complement G, and hence D(G) - D(G). Clearly the graphs of Dilworth number 1 are precisely the threshold graphs. The graphs of Dilworth number 2 have been characterized in [BHd85b]. In [HM89], the graphs of Dilworth number 3 are shown to form an important subclass of perfect graphs. Payan [Pay83] notes that the graphs of Dilworth number at most 4 are perfect graphs, 241
242
The Dilworth Number
but graphs of Dilworth number 5 need not be perfect. The graphs with the property that in every induced subgraph the Dilworth number is strictly smaller than the number of vertices were studied in [MT85]. These graphs are called domination graphs. The Dilworth number of a graph can be computed in O(n3)-time [Mah84]. We report these and other related results in this chapter. T h e o r e m 9.1.1 ( [ M a h 8 4 ] ) puted in O(n3)-time.
The Dilworth number of a graph can be com-
P r o o f . Let G = (V,E) be a graph with V = { x ~ , . . . , x ~ } . transitive digraph G' on V whose arc set is given by
Construct a
E(G') = {(xixj) : (xi ~- xj) or (xi ~ xj and i < j)}. Clearly each clique of G' forms a chain of G and conversely. Thus the Dilworth number of G is the minimum size of a clique-partition of G'. for transitively orientable graphs, such a partition can be obtained in O(n2) time [Go180]. The construction of G' itself can be done in O(n3)-time since for each pair x, y of vertices one needs to scan through the rest of the vertices to determine if x, y are comparable in the vicinal preorder. 9 The above result is useful, as we show below that the Dilworth number gives an upper bound for some important parameters such as the diameter, domination number and threshold dimension, each of which is NP-hard to compute for an arbitrary graph. T h e o r e m 9.1.2 ( [ F H 7 8 a ] )
The diameter of a graph G is at most D ( G ) + I .
P r o o f . If the diameter of G is k, then G contains an induced path on k + 1 vertices. Clearly no two intermediate vertices of such a path are comparable, so the Dilworth number is at least k - 1. 9 P r o b l e m : Characterize the graphs for which the diameter is exactly one more than the Dilworth number. It is easy to see that a tree has such a property if and only if it is a caterpillar, i.e., a tree with a path P such that every vertex not on P is adjacent to a vertex on P. D e f i n i t i o n 9.1.3 A d o m i n a t i n g set (not to be confused with the domination defined with respect to the vicinal preorder) is a subset S of vertices such that every vertex not in S is adjacent to some vertex in S. The D o m i n a t i o n n u m b e r of G, denoted by 7(G), is the minimum size of a dominating set of G.
9.1
Introduction
243
T h e o r e m 9.1.4 ( [ F H 7 8 a ] ) If G is a graph with no isolated vertices, then
a) <_ D( a) . P r o o f . Let S be a minimum dominating set such that the subgraph of G induced by S has the largest possible number of edges. We assert that S is an antichain. Indeed, assume that for two distinct vertices x and y of S we have x ~ y. If x were adjacent to a vertex of S, the set S - {x} would be dominating, contradicting the minimality of S. Therefore, x is not adjacent to any vertex of S. But since G has no isolated vertices, x is adjacent to a vertex z C V(G) - S. Since x ~ y, y is also adjacent to z, and (S - {x})U {z} is a minimum dominating set inducing a larger number of edges than S, a contradiction. Thus 7 ( G ) = IXl _< D(G) since S is an antichain. ,, P r o b l e m : Characterize the graphs G for which 7(G) = D(G). In [FH78a] it was shown that for split graphs, the threshold dimension is bounded by the Dilworth number. We show below that this inequality remains valid for all C4-free graphs. T h e o r e m 9.1.5 For every C4-free graph G, t(G) <_ D(G). P r o o f . Let V ( G ) be partitioned into d = D(G) chains X x , . . . ,Xd. For each i, let Yi be a maximal clique in the threshold graph Ti induced by Xi. Then for every x E Xi - Yi and y C Yi, we have y )-- x in Ti and hence also in G. Let Gi be the spanning subgraph of G consisting of all edges incident to the vertices in Yi. We show below that G i , . . . , Gd are threshold graphs covering G, proving the result. If Gi is not threshold for some i, then it contains an alternating 4-cycle with edges ab, cd and nonedges bc, da. Since every edge of Gi has an end in Y~, and since Y~ forms a clique, we must have {a, c} C_ Y~ or {b, d} C Y~. But neither a, c nor b, d forms a pair of comparable vertices, contradicting the fact that Xi is a chain. Hence Gi must be a threshold graph for each i. If G has an edge xy that is not covered by any Gi, then there exist i -~ j such that x ~_ Xi - Yi and y E X j - Yj, for otherwise x, y ~_ Xi - Yi for some i, contradicting the stability of Xi - Yi. By the maximality of the cliques Y~ and Yj, there exist an x' C ~ not adjacent to x and a y' E Yj not adjacent to y. We have x' 5r y' since i 5r j. But then x' ~- x and y' ~- y, and hence x, y, x t, y' induce a C4 in G, a contradiction. Therefore every edge of G is covered by some Gi. 9
244
The Dilworth Number
Figure 9.1" A graph G with 3 - t(G) > D(G) - 2. A
A v
v
A v
R e m a r k . The inequality in Theorem 9.1.5 is not true in general. For example the graph G in Figure 9.1 has t(G) > D(G). P r o b l e m " Characterize the graphs G for which t ( G ) - D(G). Recall from Theorem 2.1.6 that a graph is a cointerval graph if and only if it is both a comparability graph and 2K2-free. Also recall that the boxicity of a graph G is the least number of interval graphs whose edge-intersection is G. In other words, it is the least number of cointerval subgraphs whose edgeunion is G. The boxicity of a graph G is denoted by b(G), as in Section 6.3. T h e o r e m 9.1.6 For every graph G, b(G) < D(G). m
P r o o f . It is enough to prove that G is the union of d - D(G) cointerval graphs. Let V(G) be partitioned into d chains X 1 , . . . , Xd. For each i, let Gi be the spanning subgraph of G consisting of all edges incident to the vertices in Xi. We show below that G 1 , . . . , Gd are 2K2-free comparability graphs, and hence are cointerval graphs by Theorem 2.1.6. Thus G is the union of d cointerval graphs, as required. Assume that for some i, Gi contains a 2K2 with edges ab, cd. Since every edge of Gi has an end in Xi, we may assume without loss of generality that a, c C Xi. But a and c are incomparable in the vicinal preorder, contradicting that Xi is a chain. Thus Gi is 2K2-free. To see that each Gi is a comparability graph, let Xl ~ "" ~ xk be all the vertices of Xi. Orient the edges of Gi so that xi is a source vertex in the subgraph G i - {Xl,... ,Xi-1}. In particular, no arc of Gi has its tail outside Xi. Now if (a, b), (b, c) are arcs of the orientation, then a, b C Xi and hence a ~ b. Therefore ac is an edge of G~, and it must be oriented as (a, c) whether or not c C Xi, proving that the orientation is transitive. .. P r o b l e m " Characterize the graphs G for which b(a) - D ( G ) .
9.2
245
Graphs of Dilworth Number 2
9.2
G r a p h s of D i l w o r t h N u m b e r 2
Benzaken, Hammer and de Werra [BHd85b] characterized the graphs of Dilworth number at most 2 by forbidden subgraphs and proved them to be equivalent to the threshold signed graphs defined below. The split graphs of Dilworth number 2 were characterized in [FH77a, BHd85a]. We present these results in this section.
9.2.1
Threshold Signed Graphs
In this subsection we define the threshold signed graphs and prove them to be equivalent to the graphs of Dilworth number at most 2. Definition 9.2.1 A graph G - (V, E) is called a t h r e s h o l d signed graph, or simply a TS graph, if there is a mapping w 9 V ~ R and two positive real numbers S, T such that 1. Iw(x)l < min(S,T) for all x E V; 2. for x 5r Y, xy E E if and only if
I~(x) + ~(~)1 > s
o~
I w ( x ) - w(y)l > r.
Let G, w, S, T be as in Definition 9.2.1. Clearly, if w(x) - O, then x is an isolated vertex. Thus if xy E E ( G ) , then w ( x ) w ( y ) 5r O. The following lemma shows that the "or" in Condition 2 of Definition 9.2.1 is exclusive. L e m m a 9 . 2 . 2 Let G, w, S, T be as in Definition 9.2.1. If xy E E(G), then exactly one of the following conditions holds:
Iw(x) +w(y)l Iw(x) - w(y)]
>_ S, >_ T.
(9.1) (9.2)
P r o o f . Since xy is an edge in G, at least one of Conditions (9.1) and (9.2) is satisfied. If w ( x ) w ( y ) > 0, then
]w(x) - w(y)] < max(iw(x)], Iw(y)l) < rain(S, T),
T h e D i l w o r t h Number
246
and hence Condition (9.2) is not satisfied. If w(x)w(y) < 0, then
Iw(x) + w(y)] < max(Iw(x)l , [w(y)l ) < min(S, T), and hence Condition (9.1) is not satisfied. We call an edge xy an S-edge if Iw(x) + w(y)l >_ S and a T-edge if ] w ( x ) - w(y)l >_ T. Put X = {x E V : w(x) >_ 0} and Y = {x C V : w(x) < 0}. From the proof of Lemma 9.2.2, an edge ab is an S-edge if and only if a, b are in the same set X or Y and a T-edge if and only if a, b are in different sets X, Y. As we have observed in Theorem 2.4.1, the difference graphs are precisely those TS graphs that have no S-edges. L e m m a 9.2.3 The TS graphs have Dilworth number at most 2. P r o o f . Let ( X , Y ) be a partition of V as defined above. We assert that each of X and Y is a chain in the vicinal preorder. Indeed, let x, y C X with w(x) >_ w(y). Then" ( i ) i f yz is an S-edge, then w(x) + w(z) >_ w(y) + w(z) >_ S and hence xz is also an S-edge; and (ii) if yz is a T-edge, then w(x) - w(z) >_ w(y) - w(z) >_ T and hence xz is also a T-edge. Thus x ~ y, proving that X is a chain. Similarly Y is a chain, and the graph has Dilworth number at most 2. " The main result of this subsection is the converse of Lemma 9.2.3. L e m m a 9.2.4 ( [ B H d 8 5 b ] )
The graphs of Dilworth number at most 2 are
TS graphs. P r o o f . Let G - (V, E) be a graph of Dilworth number at most 2 with its vertex set partitioned into two sets X - { X l , . . . , x m } and Y - { y l , . . . , y n } such that Xl ~- " " ;'- xm and y, ~ "'" ~- Y~. We shall obtain distinct positive integral weights ai - w(xi) for i - 1 , . . . , m, distinct positive integral weights bj - - w ( y j ) for j - 1 , . . . ,n and positive integral thresholds S , T such that G is a TS graph with w, S, T. Let GI be the graph induced by X. Clearly G1 is a threshold graph. By Condition 4 of Theorem 1.2.4, there exists a permutation a of { 1 , . . . , m} such that each xo(k) is either an isolated vertex or a dominating vertex in the subgraph induced by x~(1),... ,x~(k). We construct S, a~(a),..., a~(,~) as follows. Initially set S "- 2 and a~(1) "- 1. At step k, we have constructed S and aa(1),..., aa(k-1). If xo(k) is isolated, set
S "- S + 2,
aa(i)
"-- a,7(i)
+ 1 for i < k,
a~(k) "-- 1,
9.2
Graphs of Dilworth Number 2
247
and if x,,(k) is dominating, set S " - S + 2,
ao(i) " - aa(i) + 1 for i < k,
a~(k) "- S + 1.
After m steps we have integers S > a l > ' ' ' > am > 0 such that x i x j is an edge of G1 if and only if ai q- aj > S. We may assume that S - al >_ 2 (otherwise multiply all these integers by 2), hence we can insert an integer T such that S > T > a l > ' " > am > O. We now continue the construction to obtain the bj's. Let G2 be the graph induced by Y. G2 also is a threshold graph, hence there exists a permutation r of { 1 , . . . , n} such that each yr(j) is either an isolated vertex or a dominating vertex in the subgraph induced by y~(~),..., yr(j). The initial step of this part of the construction is as follows. If y~(1) is not adjacent to any xi, set S " - S + 2,
T " - T + 2,
ai " - ai q- 1 for all i,
br(1) "- 1,
and if yr(1) is adjacent to X l , . . . ,Xj and non-adjacent to x j + l , . . . ,x,., then do not change S, T and the ai, and put br T - aj. We continue by constructing br b,(~). Note that we may assume for each j that v ( 1 ) , . . . , r ( j ) are consecutive indices among 1 , . . . , n. Therefore at the general step of this part of the construction, we have constructed thresholds S, T and weights a l , . . . , a m , bk+l,...,bs-1, and must now construct either bk, where the next vertex yk to be introduced is adjacent to each of y k + l , . . . , y~-l, or b~, where the next vertex y~ to be introduced is adjacent to none of them. C a s e 1: yk is introduced. It is adjacent to X l , . . . , x i and non-adjacent to Z i + l , . . . , Zm for some i, 0 <_ i <_ m. Let us begin with the generic case 0 < i < m. The weight bk should satisfy the following inequalities: (9.3)
bk
>
bk+l
(9.4)
bk + b~_l
>_ S
(9.5)
bk + ai
>_ T
(9.6)
<
(9.7)
bk + ai+l
T.
Inequalities (9.3)-(9.7) are solvable for a real bk if and only if
S-
bk+l
<
T - ai+l
(9.8)
bs-1
<
T - ai+l
(9.9)
<
T-ai+l.
T-ai
(9.10)
248
The Dilworth Number
Inequalities (9.8) and (9.10) are already satisfied by the previous construction. Therefore a suitable real bk exists if and only if S-T
<
bs-l-ai+l,
(9.11)
in which case a real value for bk is given by bk
max (bk+l + ~, S -
--
1
bs-1, T -
ai).
If this value for bk is not integral, multiply all integers constructed so far by 2. Suppose that (9.11) is not satisfied. Then we change the weights and thresholds as follows" .
-
4bj + 2
j-k+l,...,s-1
a} "-- 4aj + 2
j-1,...,i
a~ "-- 4aj + 1
j-i+l,...,m
S' "- 4S + 1 T"-4T+4. It is straightforward to verify, using an integrality argument, that these new weights and thresholds are suitable for all the vertices introduced so far. With them, it is possible to solve for bk if and only if S'-T'
!
!
< bs_ 1 - a i + l ,
which is equivalent to
S-
T < bs-1 - a i + l -4- 1.
(9.12)
Inequality (9.12) is a relaxation of (9.11). If it is still not satisfied, we repeat the above steps of changing the weights and thresholds enough times, and eventually will be able to solve for bk. In the extreme case that i - 0, the argument is the same, except that Inequalities (9.6) and (9.10) are omitted. Similarly in the extreme case i - m, the argument is the same if we take am+l - 0. C a s e 2" y~ is introduced. It is adjacent to X l , . . . , x i and non-adjacent to X i + l , . . . , Xm for some i, 0 <_ i _< m.
9.2
249
G r a p h s of D i l w o r t h N u m b e r 2
This case is very similar to Case 1 above. We begin again with the generic case 0 < i < m. We want bk to satisfy the following inequalities: b~ >
0
(9.13)
bs
<
bs-1
(9.14)
b~ + bk+l
<
S
(9.15)
b~+ai
>
T
(9.16)
bs + ai+l
<
T.
(9.17)
Inequalities (9.13)-(9.17) are solvable for a real b~ if and only if (9.18)
T-ai
<
bs-1
T - ai
<
S-
T - ai
<
T - ai+a.
bk+l
(9.19) (9.20)
Again, inequalities (9.18) and (9.20) are already satisfied by the previous construction. Therefore a suitable real b~ exists if and only if S-T
<
bk+l-ai,
(9.21)
in which case an integral solution is given by bs - T - ai.
If inequality (9.21) is not satisfied, we change the weights and thresholds as follows" b~ -
4bj + 2
j-k+l,...,s-1
a~ " - 4aj + 3
j-1,...,i
ajI " - - 4 a j + 2
j-i+l,...,m
S"-4S+4 T'.-4T+
1.
Once again, these new weights and thresholds are suitable for the vertices introduced so far. With them, the condition for determining a real b~ is !
!
S' - T ' > bk+ 1 - a i
,,' ;, 4(S - T) -4- 3 > 4(bk+l - ai) - 1 < ;- S - T + 1
>bk+l-a~.
(9.22)
250
The Dilworth Number
Inequality (9.22) is a relaxation of (9.21), and by repeating these steps as necessary, we eventually find a suitable value for b~. In the extreme case i = m, the argument is the same with am+~ = 0. In the extreme case i = 0, the argument is even easier, since inequality (9.16) drops and there is no lower bound for b~ except for the strict lower bound 0. Therefore we change the existing weights and threshold as follows: aj bj b~ S T
"""-
aj + 1 bj -]- 1 1 S+2 T+2.
j- 1,...,m j-k+l,...,s-1
This completes the construction in all cases. 9 The next Theorem follows directly from Lemma 9.2.3 and Lemma 9.2.4. T h e o r e m 9.2.5 A graph is a TS graph if and only if its Dilworth number is at most 2. C o r o l l a r y 9.2.6 Every TS graph is a comparability graph. P r o o f . Let G - (V, E) be a graph of Dilworth number at most 2 with its vertex set partitioned into two sets X - { x ~ , . . . , x m } and Y - { y ~ , . . . , y ~ } such that x l ~- " . ~ xm and yl ~ "'" ~- y~. Orient each edge ab as (a, b) if a - xi, b - yj for s o m e i , j , o r a - x i , b - xj w i t h i < j , o r a yi, b - yj with i < j. The resulting orientation is transitive. 9 9.2.2
Forbidden
Subgraphs
By the Dilworth Theorem, a graph has Dilworth number at most 2 if and only if it does not contain an antichain of size 3. Thus by obtaining all the minimal graphs with an antichain of size 3, we get a characterization of TS graphs by forbidden subgraphs as stated below. A proof of the next theorem can be found in [BHd85b]. T h e o r e m 9.2.7 A graph G is a TS graph if and only if it does not contain any of the 21 graphs listed in Figure 9.2 as induced subgraphs. Using Theorem 9.2.7, one can characterize the split graphs of Dilworth number 2 as follows.
9.2
251
G r a p h s of D i l w o r t h N u m b e r 2
Figure 9.2: The forbidden subgraphs for TS graphs; G2i+l - G2i, i - 1,..., 10.
_
i I
G1
G2
G4
G6
I I I
X>
alo
G8
a12
. k/Z/_ v
v
w
Q14
v
w
G18
G16
w
v
w
w
G2o
v
252
The Dilworth Number
T h e o r e m 9.2.8 ([FH77a, B H d 8 5 b ] ) For each graph G, the following ditions
con-
are equivalent:
1. G and G are interval graphs; 2. G is a split TS graph; 3. G contains as induced subgraphs neither 2K2, C4, C5, nor Gs, Gg, G14, G15 of Figure 9.2. Proof. 1) =~ 3)" As we have mentioned after Definition 1.4.1, G is an interval graph if and only if G is triangulated and G is a comparability graph. Since G and G are interval graphs, G contains neither C4, C5 (being a triangulated graph) nor Gs, G14 (being a comparability graph) nor their complements 2K2, Gg,
G15. 3) =~ 2)" Since G does not contain 2K2, C4, C5, it is a split graph by Theorem 5.2.1. For the same reason, the only induced subgraphs of Figure 9.2 that G might possibly contain are Gs, Gg, G14, G15. But since by assumption G does not contain them, it is a TS graph by Theorem 9.2.7. 2) =~ 1)" Since G is a split TS graph, it is both triangulated and a comparability graph (by Corollary 9.2.6). But G is also split, and it is a TS graph by Theorem 9.2.5. So G is also triangulated and a comparability graph. Thus G and G are triangulated and cocomparability graphs, and therefore both are interval graphs by the above-mentioned characterization of interval graphs.
9.3 T h e D i l w o r t h N u m b e r and P e r f e c t G r a p h s In this section we examine the relationship between the perfectness of a graph and its Dilworth number. A graph is called minimally imperfect if it is not perfect, but every proper induced subgraph is perfect. L e m m a 9.3.1 If G is a minimally imperfect graph, then
D(G) -IV(G)I. Proof. The proof amounts to showing that V(G) is an antichain. Assume that, if possible, V(G) is not an antichain, and let x ~ Y- If x and y are
9.3 T h e D i l w o r t h N u m b e r and Perfect Graphs
253
not adjacent, then color the perfect subgraph G - {x} with w(G) colors, and then assign to x the color of y, proving that x(G) - c0(G), a contradiction to minimal imperfectness. If x and y are adjacent, then they are not adjacent in G, which is also minimally imperfect [Lov72], and for which y ~ x, so the previous argument applies. Therefore V(G) is an antichain, as required. 9 C o r o l l a r y 9.3.2 ([Pay83]) If D(G) <_4, then G is perfect. P r o o f . If not, G contains an induced minimally imperfect graph H. Now D(H) <_ D(G) _< 4. Hence by Lemma 9.3.1 Iv(a)L <_ 4, which is a contradiction since the smallest imperfect graph is Cs. The pentagon C5 shows that if D(G) is 5 or more, G need not be perfect. Recall that a graph is called perfectly orderable if its edges have an acyclic orientation such that in every P4, at least one of the two end-edges is oriented towards the endpoint of the P4. Such an orientation is called a perfect orientation. An important subclass of perfectly orderable graphs is the class of brittle graphs. These are the graphs with the property that in every induced subgraph there exists a vertex that is not an endpoint of any P4, or not a midpoint of any P4. A perfect orientation for such graphs is easily obtained as follows: if x is not an endpoint (resp. a midpoint) of any P4, orient all the incident edges away from x (resp. into x), then delete x and repeat. A simplicial vertex in a graph is a vertex whose neighborhood forms a clique. Such a vertex clearly cannot be a midpoint of any P4. The following theorem therefore shows that the graphs with Dilworth number at most 3 are brittle. T h e o r e m 9.3.3 ( [ H M 8 9 ] ) If G is a graph with D(G) < 3, then G or its
complement G contains a simplicial vertex. P r o o f . Since D(G) _< 3, the vertex set of G can be partitioned into three chains X1, X2, X3 (possibly empty). Linearly order the elements of Xi by
1. ai to be the largest vertex in Xi, 2. ci to be the smallest vertex in Xi, and 3. bi to be the smallest vertex in Xi with the property that all vertices (of Xi) larger than bi form a clique.
254
The Dilworth Number
The vertices ai, bi, ci need not be distinct. Note that within each Xi, no vertex smaller than bi is adjacent to bi and the vertices smaller than bi form a stable set. Let {i, j, k} - {0, 1, 2}. If c~ is not adjacent to any vertex outside X~, then ci is simplicial in G. Thus, we may assume that ci is adjacent to some vertex in Xj, and hence aj is adjacent to every vertex in Xi. If either Xk is empty, or ck is also adjacent to some vertex in Xj, then clearly aj is simplicial in G. From the above remarks, we may assume now that each ct has a neighbor in Xt+l and no neighbor in Xt+2 (subscripts are taken modulo 3). If some ct is not joined to any vertex smaller than or equal to bt+l in Xt+l, then clearly ct is simplicial in G. Hence we may assume that each ct is adjacent to some vertex smaller than or equal to bt+l in Xt+l. Now, we assert that each at is simplicial in G. To justify the assertion, note that ct+2 is adjacent to some vertex in Xt; therefore at is adjacent to ct+2 and hence to all vertices of Xt+2. It follows that the non-neighbors of at are of two kinds" those in Xt are smaller than or equal to bt and form a stable set, and those in Xt+ 1 a r e smaller than bt+l and also form a stable set. Moreover, there are no edges joining vertices of different kinds. Thus at is simplicial in G as asserted. 9 P r o b l e m . Characterize the graphs G such that for every induced subgraph H of G, H or H has a simplicial vertex. The graphs of Dilworth number 1 are precisely the threshold graphs, the graphs of Dilworth number at most 2 are completely characterized in Section 9.2, the graphs of Dilworth number at most 3 are brittle graphs as shown above, and the graphs of Dilworth number at most 4 are perfect graphs. We define below another interesting class of perfect graphs, using the concept of the Dilworth number. D e f i n i t i o n 9.3.4 A graph G is called a d o m i n a t i o n g r a p h if every induced subgraph H of G with more than one vertex satisfies D ( H ) < IV(H)I, or equivalently, if every induced subgraph with more than one vertex has a pair of comparable vertices. It is easy to see that D(Ck) - k for k _> 5. Therefore the domination graphs contain neither cycles of size 5 or more nor their complements as induced subgraphs. The graphs that contain neither cycles of size 5 or more nor their complements as induced subgraphs are called weakly triangulated,
9.3 The Dilworth N u m b e r and Perfect Graphs
255
and Hayward [Hay85] has shown that the weakly triangulated graphs are perfect graphs. Thus the domination graphs are perfect graphs. Hayward also obtained the smallest known weakly triangulated graph that is not a domination graph; it has 24 vertices. We c o n j e c t u r e that the graphs that are both weakly triangulated and perfectly orderable are domination graphs. A result supporting this conjecture is proved below. We first need the following concepts and lemma. A bipartite graph with no induced cycles of size 6 or more is called a chordal bipartite graph. An edge xy in a bipartite graph is called a bisimplicial edge if every neighbor of x is adjacent to every neighbor of y. The following lemma is due to Golumbic and Goss (see Theorem 12.10 of [Go180]). Lemma
9.3.5
Every chordal bipartite graph with at least one edge has a
bisimplicial edge. T h e o r e m 9.3.6 ( [ M T 8 5 ] ) The weakly triangulated comparability graphs are domination graphs. Let G be a comparability graph with no induced cycles of size 5 or more. Since every induced subgraph of G has the same properties, it is enough to show that G itself contains a pair of vertices that are comparable in the vicinal preorder. Assign a transitive orientation to the edges of G. A vertex x of G is called a source if there is no vertex 9 adjacent to x with the edge x9 oriented from 9 to x. Let S be the set of all sources of G and let T = V(G) - S. Associate with G a bipartite graph H on V(G) with color classes S and T having an edge between a vertex x C S and a vertex y C T if and only if G has an edge oriented from x to y. It is easy to verify that H is a chordal bipartite graph since G is weakly triangulated. If H has no edges, then neither does G, and the result follows. Otherwise by Lemma 9.3.5, H contains a bisimplicial edge xy with x C S and Y C T. We now distinguish two cases as follows: C a s e 1: y has a neighbor x' 5r x in H. Then since x9 is a bisimplicial edge, every neighbor of x in H is adjacent to x' in G. Therefore x' dominates x in G. C a s e 2: y has no neighbors other than x in H. We assert that in this case x dominates y in G. Indeed, let z be any neighbor of y in G other than x. If the edge yz is oriented from y to z, then by transitivity G has an edge oriented from x to z. If y z is oriented from z to y, then G has a directed path from some source to z and then on to y along the edge yz. Since we are in Proof.
256
The Dilworth N u m b e r
Case 2 and by transitivity, that source must be x, and again by transitivity G has an edge oriented from x to z. Thus in either case there is a comparable pair of vertices in G. ..
Chapter 10 Box-Threshold Graphs 10.1
Introduction
We recall from Condition 5 of Theorem 1.2.4 that the threshold graphs are characterized by the absence of incomparable vertices under the vicinal preorder. The box-threshold graphs form a larger class of graphs in which incomparable vertices are allowed under a certain condition. We denote the fact that vertices x and y are incomparable under the vicinal preorder by x I1 Y, and the fact that vertex x is larger than vertex y under the vicinal preorder by x ~- y. D e f i n i t i o n 10.1.1 A graph G is called a b o x - t h r e s h o l d ( B T ) graph when every two vertices x, y of G satisfy x
Ily~degx=degy,
(10.1)
or equivalently degx>degy~x~-y.
(10.2)
The boxes of a graphs are defined as the blocks of its degree partition, i.e., the equivalence classes of vertices under equality of degrees. Thus Definition 10.1 requires that incomparable vertices belong to the same box. The analogy between BT and threshold graphs will become clear below: it turns out that if every box of a BT graph is shrunk into a single vertex, a threshold graph results. Figure 10.1 exhibits the adjacency matrix of a BT graph, with rows and columns sorted by vertex-degrees. Note that the only incomparable pairs are the two vertices of degree 4 and the two vertices of degree 3. 257
258
Box-Threshold Graphs
Figure 10.1" The adjacency matrix of a BT graph. 116544331 1 1
1
1
1
1
1
1
1
1
1
1
1
1 1 1
Condition 10.2 was introduced by Rawlinson and Entringer IRE79], who applied it to a problem of a communications network. They also found the minimum number of edges of a BT graph with given lower bounds for its degrees. The topic was developed further by Peled and Simeone [PS84], on whose work this section is based. Further work on the subject was done by R.I. Tyshkevich and A.A. Chernyak [TC85a], who used the decomposition method to enumerate the BT graphs, as reported in Chapter 17. In Section 10.2 we present elementary properties of BT graphs. Section 10.3 introduces a model of a symmetric transportation network with priority constraints to characterize the degree sequences of BT graphs. Section 10.4 introduces the concept of the frame of a graph to capture the box interconnection structure, and exhibits the close analogy between the frames of BT graphs and threshold graphs.
10.2
Elementary Properties
It follows immediately from (10.1) that every regular graph is BT, and from 10.2 that adding or deleting an isolated vertex to a BT graph results in a new BT graph. Rawlinson and Entringer [RE79] actually considered only connected BT graphs, but the following proposition shows that every nonconnected BT graph results from adding isolated vertices to some connected BT graph or to some regular graph. A
10.2.1 Let G be a B T graph and let G be obtained from G by deleting its isolated vertices. Then G is connected or regular.
Proposition
10.2
Elementary Properties
259 A
Proof. Since all connectedcomponents of G have edges, every two vertices in different components of G are incomparable. Since G is BT, it follows that every two vertices in different components of G have equal degrees. Therefore G is connected or regular. 9 In Section 11.3 we define matrogenic graphs and characterize them by the absence of the configuration 9C(A, B, C, D, E) consisting of vertices A, B, C, D and E, edges A B , A C and ED, and nonedges E B , E C and AD. The following result is then immediate.
Proposition 10.2.2 The class of B T graphs properly contains that of matrogenic graphs. Proof. By Definition 10.1.1, if G is not BT, then it contains incomparable vertices A and E with deg(A) > deg(E). By the incomparability, there exist vertices B and D such that A B and E D are edges and AD and E B are nonedges. Since deg(A) > deg(E), there e x i s t s a vertex C such t h a t AC is an edge and E C is a nonedge. Thus G contains the configuration .T'(A,B, C , D , E ) and is not matrogenic. An example of a non-matrogenic BT graph is illustrated in Figure 10.2. 9 Figure 10.2: A non-matrogenic BT graph.
I I I I The following two results for BT graphs generalize similar results for threshold graphs.
Proposition 10.2.3 The complement of a B T graph is BT. Proof. Complementation does not alter vertex incomparabilities or equality of degrees. 9
Theorem 10.2.4 B T is a forcible property of a degree sequence. In other words, if G and H are graphs with the same degree sequence and G is BT, then H is also BT. We may thus unambiguously define a degree sequence to be B T if (all) its realizations are B T graphs.
Box-Threshold Graphs
260
P r o o f . Since there is a degree-preserving bijection between the vertices of G and H, we may assume that G and H have the same vertices and that each vertex has equal degrees in G and H. Then by Corollary 3.1.11, H can be obtained from G by a sequence of transfers, where a transfer involves dropping the two edges xu and zy and adding the two nonedges x z and yu of an alternating 4-cycle. We may therefore assume that H is obtained from G by a single transfer as above. Moreover, by the symmetry of the four vertices of the alternating 4-cycle, it is enough to show that if x II P in H, where p is a fifth vertex, then deg(x) = deg(p). Since x II p in H, x and p are opposite corners of an alternating 4-cycle A in H. If neither x u nor x z is a side of A, then A is also an alternating 4-cycle in G and the conclusion follows since G is BT. If both o f x u and x z are sides of A, then x II Y II p i n G, and hence deg(x) = deg(y) = deg(p). If xu is a side of A and x z is not, then the configuration in G and H is as illustrated in Figure 10.3, where the vertices of A are x, u, p, q. Figure 10.3" Configurations in the proof of Theorem 10.2.4. q
x
z
q
x
z
T
9
9
9
i I I
I I I
I I I
I I I
I ,k v
v
p
u G
y
I
I
i
9
~k
.L
v
v
v
p
u
y
H
If pz is an edge, then x I] P in G; otherwise x II Y It P in G. Therefore the conclusion follows in both cases as before. Finally, if xz is a side of A and x u is not, we repeat the argument with pu replacing pz. 9 The next theorem gives an easy test of the BT property. To state it, we use the following definitions. D e f i n i t i o n 10.2.5 A bipartite graph with bipartition ( X , Y ) is said to be c o l o r - r e g u l a r ( C R ) if all the vertices of X have the same degree and all the vertices of Y have the same degree. Two disjoint sets X and Y of vertices in a graph G are said to be c o m p l e t e l y c o n n e c t e d , C R c o n n e c t e d , or
10.2
Elementary Properties
261
c o m p l e t e l y d i s c o n n e c t e d when the edges joining them in G form a com-
plete, a CR, or an edgeless bipartite graph, respectively. A similar definition applies in the case of a connection of X to itself, where the subgraph induced by X should be complete, regular, or edgeless, respectively. Note that complete connection and complete disconnection are special cases of CR connection. D e f i n i t i o n 10.2.6 Assume that a graph G has the degree sequence
d? i.e., exactly m i vertices have degree di, with d l > of degree di constitute the i - t h b o x Bi of G.
"'" > d~. The rni vertices
is B T if and only if for each subscript i there is some k(i) such that Bi is completely connected to B I , . . . ,Bk(i)_l, Ct~ connected to Bk(i), and completely disconnected from
Theorem
10.2.7 A graph with boxes B I , . . . , B ~
Bk(0+l,. 9 9 B~. P r o o f . " O n l y if"" Recall that N(x) denotes the set of neighbors of a vertex x. For every vertex x C B~, let k(z) be the largest k such that N ( z ) N Bk r ~. Then by the BT property (10.2), {x} is completely connected to B 1 , . . . , Bk(x)-I and completely disconnected from Bk(x)+l,..., B~. Moreover, if y is any other vertex of B~, then since deg(z) = deg(y), we must have k(x) = k(y) and IN(x) N Bk(~)l = IN(y)N Bk(y)l. This means, first, that k is a function of i alone and not of the particular x in Bi, and may be denoted by k(i); and, second, that for j = k(i) and trivially for each j 5r k(i) all the vertices x E Bi have the same IN(x)N Bj]. In particular, all the vertices x C Bk(~) have the same IN(z)N Bil. Therefore Bi and Bk(~) are CR connected. " I f " : Let x II Y for some x C B~, y E Bj. We have to show that i = j. First of all, k(i) = k(j), for if, say, k(i) > k(j), then N(y) C_ N(z), contradicting non-comparability. Let us denote by p the common value of k(i) and k(j). The only way that x and y can be non-comparable is for each of them to have a neighbor in Bp that is not a neighbor of the other. Therefore Bi and Bj are neither completely connected to Bp nor completely disconnected from Bp. This implies that k(p) is equal to both i and j. " Note that a BT graph is a threshold graph if and only if every two boxes are either completely connected or completely disconnected. This means that
Box-Threshold Graphs
262
the adjacency matrix is equal to the corrected Ferrers diagram of the degree sequence. Deleting a vertex of degree 1 from the graph of Figure 10.2 results in a non-BT graph. This shows that BT is not hereditary, and hence cannot be characterized by forbidden configurations. However, the next theorem shows that the BT property is preserved when an entire box is deleted from the graph. The results of Section 10.4 can be interpreted as a characterization of the BT property in terms of forbidden configurations of boxes. T h e o r e m 10.2.8 If G is BT and H is obtained from G by deleting an entire
box, then H is also BT. P r o o f . let the vertices of the deleted box have degree d in G. Assume that, if possible, H is not BT. Then it has vertices x, y, z such that degu(x ) > degH(y), yet z is adjacent to y but not to x. Since G has the same configuration and is BT, dega(x ) _< dega(y). Hence d e g a ( y ) - degH(y) > dega(x ) - d e g u ( x ) , which means that in G, Y has more neighbors of degree d than x has. By Theorem 10.2.7, y is adjacent in G and H at least to all vertices u such that dega(u) > d, whereas x is adjacent in H at most to these vertices. Hence degu(y ) > degH(x), which is a contradiction. ..
10.3
A Transportation M o d e l
Theorem 10.2.4 raises the question of characterizing BT sequences without constructing an arbitrary realization and testing it for the BT property. Here we give such a characterization, which does not even assume that the sequence is realizable. A transportation network consists of suppliers A1,...,A~ with supplies al,. 9 a~ of some commodity, consumers B 1 , . . . , B~ with demands b l , . . . , b~, and capacities c~j of the route from A~ to Bj. A flow is a matrix (f~j) such that 0 <_ f~j <_ c~j. We say that the flow f satisfies the supplies (resp. demands) when it satisfies the equations Ej f i j -- ai (resp. Ei f i j -- a j ) . We define a special flow r called the supplier-priority flow, by the following recursion:
jl ~)ij --
min { ai
-- E
} r
cij
9
(10.3)
k=l
This has the interpretation that each supplier A i sends as much as possible to the first consumer B1, limited only by its own supply ai and the capacity eil,
10.3
A Transportation Model
263
regardless of the demand bl; then to B2, limited only by the residual supply and the capacity ci2; and so on. Clearly, under the feasibility conditions ~-'~j cij > ai, ~ satisfies the supplies. Similarly, we define the consumerpriority flow ~ by the recursion
r
- min {bj - ~ ~zkj, cij} ,
(10.4)
k=l
which satisfies the demands under the feasibility conditions ~ i cij > bj. The network is said to be symmetric when r = s, ai = bi for all i, and cij = cji for all i, j. T h e o r e m 10.3.1 In a symmetric transportation network satisfying the feasibility conditions, the following conditions are equivalent:
1. r satisfies the d e m a n d s ; 2. r
= Cji for all i, j;
3. r 1 6 2 P r o o f . 1) =~ 2): Assume that r < Cji for some i,j. Since Cji <_ cji = cij, we have r cij, and hence by (10.3) elk = 0 for all k > j. Similarly, since 0 < Cji, we have Cki = cki = cik for all k < j. Therefore
bi
=ai
=
k
k<j
k<j
k<j
and so r does not satisfy the demands. 2) =~ 3): We show by induction on i that r r
=
min{bj, Clj }
--
k
~)ij. For i = 1 we have
=
min{aj, Cjl } = Cjl = r
If ~kj = Ckj holds for all k < i, then
min{
min{a k=l
=
=
k=l
3) =~ 1): This is obvious, since r satisfies the demands. W i t h every sequence d l 1.-- d~mr, dl > ... > dr, of non-negative integers we associate a symmetric transportation network given by
ai = bi = dimi,
cij = m i ( m j - ~ij),
264
Box-Threshold Graphs
where 1, i f i - j O, if not.
5ij -
T h e o r e m 10.3.2 A sequence d~ ~ . . . d ~ ~, dl :> "" :> dr, of non-negative integers is B T if and only if dl < ~ i mi and the associated symmetric transportation networks is such that the conditions of Theorem 10.3.1 hold and the eli are even integers. Before proving the theorem, let us remark that the "if" part does not assume that the sequence is graphical. Another remark is that the condition dl < ~-~imi is equivalent to the feasibility condition ~ j c~j = m ~ ( ~ j m j - 1 ) _> midi = ai, and thus guarantees the equivalence of the three conditions of Theorem 10.3.1. An example of a BT degree sequence is (23)2(20)4(13)3(11)56446. The vector (ai) is (46, 80, 39, 55, 24, 24) and the matrices (cij) and (r are shown in Figure 10.4 Figure 10.4: Capacity and flow matrices for the sequence (23)2(20)4(13)3(11)~6446.
(Cij) --
2 8 6 10 8 12
8 12 12 20 16 24
6 12 6 15 12 18
10 20 15 20 20 30
8 16 12 20 12 24
12 24 18 30 24 30
2 8 6 10 8 12
(r
8 6 10 8 12 12 12 20 16 12 12 6 15 0 0 20 15 0 0 0 16 0 0 0 0 12 0 0 0 0
P r o o f . To prove the necessity, assume that the BT graph G has degree sequence d~ 1 . . . d~ ~. Clearly dl < ~-,i mi, because G has ~-~i mi vertices in total. To prove the other conditions, let xij be the number of edges connecting Bi and Bj for i r j, and let Xii be twice the number of edges within Bi. Thus xij = xji and Xii is even. Moreover, ai = midi is the sum of the degrees of the vertices of Bi, and cij = r n i ( m j - (~ij) is the upper bound for xij reflecting the absence of multiple edges and loops. Hence by Theorem 10.2.7, j-1 X ij --
min
ai-
E
} X ik, Cij
-- (~ij.
k=l
To prove the sufficiency we need the following two facts.
10.4
Frames of BT Graphs
265
F a c t 1 If f is a common multiple of the positive integers p and q and f <_
pq, then there exists a biregular graph with degree sequence ( f /p)V(f /q)q. P r o o f . To construct such a graph, take p vertices x 0 , . . . , Xp_l and q vertices yo,...,yq-1, put r - f / p , and join x0 with y 0 , . . . , y ~ - l , Xl with y~,...,y2~_l, and so on in a cyclic fashion, where the indices are taken modulo q. This gives to each xi the degree r for a total of f edges. Since f is divisible by q, it also gives to each yj the same degree f / q . This proves Fact 1. F a c t 2 If f is an even integer divisible by the positive integer p and f <_ p ( p - 1), then there exists a d-regular graph on p vertices, where d - f /p. P r o o f . Note that d _< p - 1 by assumption. We distinguish the cases p even and p odd. For p even, the complete bipartite graph I(p/2,p/2 is a union of p/2 edgedisjoint perfect matchings (if the vertices are x0,. 9 xp/2-1 and y0,. 9 Y p / 2 - 1 , then the i-th matching joins xy with yj+i with indices modulo p/2). If d _< p/2, take the union of any d matchings, and if d > p/2, take the complement (with respect to Kp) of the union of any p - 1 - d matchings. For p odd, d must be even as f is even. Take p vertices x 0 , . . . , xp-1 and join xi with X i • Xi+d/2. This proves Fact 2. To complete the proof of Theorem 10.3.2, we show that the conditions are sufficient by constructing a BT graph with the given degree sequence. Put mi vertices in cell Ci for each i. Since ai and cij are multiples of mi, so is r For every i r j, since r - Cji, this number is a common multiple of mi and rnj, and furthermore r <_ cij - mimj. Therefore by Fact 1, we can construct a biregular connection between Ci and Cj such that each vertex of Ci has r neighbors in Cj and each vertex of Cj has r neighbors in Ci. Similarly for each i, r iS an even integer divisible by rag, and r <_ ci~ - m i ( m ~ - 1). Therefore by Fact 2, we can construct a (r regular graph on Ci. In the resulting graph G, all the m i vertices of Ci have the same degree, and the sum of these m i degrees is ~ j r - a i - m i d i because r satisfies the supplies. Thus the boxes of G are the Ci and its degree sequence is d~n l . - . d m~. Finally, G is BT by Theorem 10.2.7. 9
10.4
F r a m e s of B T G r a p h s
In order to represent the box-interconnection structure of a graph we use the concept of a frame. The frame of a graph G can be thought of as a graph obtained by shrinking each box of G into a single vertex and coloring
266
Box-Threshold Graphs
the resulting edges to indicate whether or not the boxes were completely connected. Definition 10.4.1 Let G be a graph whose boxes are BI , . . . , Br. The f r a m e of G is a graph F on { B I , . . . , B~} in which Bi and Bj are joined by a black edge, a red edge, or no edge if they are completely connected, partially but not completely connected, or completely disconnected in G, respectively. This includes the case that i - j , and so F has black and red loops. In the case that IBil - 1, there is an ambiguity whether Bi should have a black loop or no loop, since Bi is both completely connected to itself and completely disconnected from itself in G. We resolve this ambiguity by giving to Bi a black loop in F when Bi is connected in G to some box Bk with i > k, i.e., when some vertex of Bi has a neighbor with smaller degree in G. The set of all black (red) edges and loops is denoted by B (R). We denote the box containing a vertex x by 2. In this section we characterize when G is BT in terms of its frame F, and also characterize when a given F is the frame of some BT graph G. For this we use the following definition. Definition 10.4.2 A m a t c h i n g w i t h loops is an undirected graph with loops, no two of whose edges are incident to the same vertex, i.e., its adjacency matrix does not have two 1 's in the same row or column. A t h r e s h o l d g r a p h w i t h loops is an undirected graph with loops such that the rows (and columns) of its adjacency matrix are totally ordered by set-inclusion. An equivalent definition is that it is the underlying graph with loops of a symmetric Ferrets digraph (Section 2.1). If the loops are removed from a threshold graph with loops, it becomes a threshold graph by Theorem 2.1.3, and every threshold graph can be obtained in this way by Theorem 2.1.~. T h e o r e m 10.4.3 Let F be the frame of G. Then G is B T if and only if 1. F is a threshold graph with loops; 2. the black edges of F form a threshold graph with loops; 3. the red edges of F form a matching with loops.
P r o o f . " O n l y if"" The adjacency matrix of F is obtained from the flow matrix r upon replacing r by
10.4
F r a m e s of B T G r a p h s
9 a b l a c k 1 if r
-
cij
> 0 or if
267
i -
j,
eli
-
cii -
0
and ~bik > 0 for some
k>i; 9 a red 1 if 0 < r
< Cij;
9 a 0 in all other cases. Since (r is symmetric by Theorem 10.3.2, and by the definition (10.3) of r F satisfies Conditions 1 through 3. "If"" We assume that deg a x > deg a y and show that z ~ y in G. Some third vertex z is adjacent to z but not to y. We assert that for each vertex w of G, i f t ~ C B, then wz C B. Indeed, 22 C B U R and 2~ ~ B. If zx C B, then t~2 C B by Condition 2 as asserted. If 22 C R, then 29 ~ R by Condition 3, i.e., 2~ is not an edge of F, hence xw C B U R by Condition 1. But t~ 7~ 2 because t ~ is an edge of F and 2~ is not, hence xw ~ R by Condition 3, and therefore 2t~ C B as asserted. Returning to the proof that x ~- y, we assume that, if possible, w r x, y, wy is an edge of G and wx is not. Then t~2 ~ B, so t ~ ~ R by the assertion, hence wy C R. Therefore t~2 ~ R by Condition 3, i.e., t~2 is not an edge of F. Since zx is an edge of F, we have 2 :/- t~, and since wy C R, we have zy ~ R by Condition 3. Hence zy C B by Condition 1, and this contradicts the fact that z is not adjacent to y in G. " T h e o r e m 10.4.4 Let F be a graph with loops whose edges are colored black or red. Then F with its colors is the frame of some B T graph if and only if 1. F is a threshold graph with loops; 2. the black edges of F form a threshold graph with loops; 3. the red edges of F form a matching with loops; ~. every two vertices of F differ in their number of incident black edges or in their number of incident red edges. We say that the vertices differ in their black degree or their red degree, where a loop contributes 1 to the degree. Moreover, in that case no three vertices of F can have the same black degree.
268
Box-Threshold Graphs
P r o o f . " O n l y if"" Assume that F is the frame of a BT graph G. By Theorem 10.4.3, Conditions 1 through 3 hold. To prove Condition 4, assume that ~ and ~ are distinct vertices of F, say deg a z > deg a y, and that ~ and have the same black degree. By Condition 2, for every z, z z E B if and only if ~2 E B. But some z is adjacent to x and not to y in G, hence zy ~ B and 22 E R. By Condition 3, ~,~ ~ R, i.e., 29 is not an edge of F. We assert that no red edge is incident with 9, which shows that 2 and 9 differ in their red degrees. Indeed, if @~ E R, then w x ~ R by Condition 3 and @2 ~ B by the above, and this contradicts Condition 1, thus proving t h e assertion and Condition 4. Moreover, if 2 and r have the same black degree, then by Conditions 3 and 4, their red degrees differ by exactly 1, and so no three vertices can have the same black degree. "If"" We construct a BT graph G whose frame is F. For each vertex v of F, let G have four vertices v0, vl, v2, v3. For each black edge v w E t3 of F with v 7~ w, join each vi to each wj. For each red edge v w E R of F with v -~ w, join each vi to wi and Wi+l (indices modulo 4). For each black loop vv E B of F, join each vi to each vj, i 7~ j . For each red loop vv E R of F, join each Vi to Vi+I and v i - , . This construction is illustrated in Figure 10.5. Note that each red edge or loop of F contributes 2 to the degrees of the vertices of G corresponding to its ends, a black loop contributes 3, and a black edge that is not a loop contributes 4. It is sufficient to show that F is the frame of G, for this implies that G is BT by Theorem 10.4.3. Clearly for each vertex v of F, all the vi have the same degree in G. Therefore it only remains to show that if v and w are distinct vertices of F, then deg a v0 =fi dega w0. If v and w have the same black degree, then by Condition 2, either both have a black loop or both do not, so the black edges incident to v and w contribute equally to the degrees of v0 and w0. Also by Condition 4, v and w have different red degrees, hence deg a v0 r deg a w0 as required. Assume now that the black degree of v is larger than the black degree of w. Then by Condition 2, for each vertex x of F, z w E B implies x v E B , but not conversely. Therefore the black edges contribute more to deg a v0 than to dega w0. We now prove that for each vertex y of F, y w E R implies yv E R U B , which shows that deg C v0 > dega w0 as required. Assume that, if possible, y w E R and yv ~ R U B. Let x be a vertex of F such that x v E B and x w ~ B. Then x-~ y (sinceyv ~ B ) , hence by Condition 3, x w ~ R, i.e., x w is not an edge of F. This contradicts Condition 1. .. The construction used in the "if" part of the proof of Theorem 10.4.4 can be generalized to yield all the degree sequences of BT graphs with a given frame.
10.4
Frames of BT Graphs
269
Figure 10.5: The construction of a BT graph with a given frame.
vo . . . . ~
wo
V0
W0
Vl
Wl
-
Wl
V2 ~
W2
.,.
W2
V3 -
. W3
?-)3
.,.
vwEB
W3
vwER
V2
"
-
131
V2
"
V3
...
-
VO
Y3
.
vv E B
~
Vl
-
vv E R
VO
Chapter 11 Matroidal and Matrogenic Graphs 11.1
Introduction
We have seen in Theorem 1.2.4 that a graph G - (V, E) is threshold if and only if G does not contain any alternating 4-cycle. Therefore, if we call a set of edges I C_ E "independent" when no two edges of I induce an alternating 4-cycle, then a spanning subgraph (V, I) is a threshold graph if and only if I is independent. Obviously the independent subsets of E form an independence system, i.e., a subset of an independent set must be independent. The circuits of this independence system, namely the minimal dependent sets of edges, are the sets of two edges whose endpoints induce an alternating 4-cycle in G. We call these sets couples. We are interested here in those graphs for which the above independence system is a matroid. As is well-known, one definition of a matroid is an independence system such that if C and C ~ are distinct circuits and e C C N C', then C U C ' - { e } is dependent. In the present situation, where every circuit has cardinality 2, this condition simply reads as follows" if a, b, c are distinct edges and {a, b}, {b, c} are couples, then {a, c} is a couple.
(11.1)
An equivalent condition is the following. Define a reflexive and symmetric binary relation R on E by having aRb if and only if a = b or {a,b} is a couple in G. Then our independence system is a matroid if and only if R is transitive. In that case we say that G is a matroidal graph. Although the 271
272
Matroidal and Matrogenic Graphs
corresponding matroids are uninteresting, the matroidal graphs themselves have a nice structure, which permits us to find their threshold dimension and show that they are perfect graphs. Peled [Pe177] introduced these graphs, characterized them by two forbidden configurations, the chordless pentagon and configuration ~ of Definition 11.2.1, and found their structure. We present his results in the next section. FSldes and Hammer [FH78b] introduced a variation of the above concept. Instead of an independence system on the edge set E, they considered an independence system on the vertex set V whose circuits, i.e., minimal dependent sets, are the sets of four vertices that induce an alternating 4-cycle of G. If this independence system is a matroid, the graph G is said to be matrogenic. The matrogenic graphs are characterized by forbidding configuration 9r alone. Furthermore, a matrogenic graph can have at most one chordless pentagon, and hence the structure of matrogenic graphs is almost the same as that of matroidal graphs, even though the two are defined in an apparently different way. We characterize the matrogenic graphs and present their structure Section 11.3. In Section 11.4 we present the work of Marchioro et al. [MMPS84] that characterizes the degree sequences of matrogenic graphs. These results were also obtained independently by Tyshkevich [Tys84].
11..2
Matroidal Graphs
11.2.1
Forbidden Configurations
We begin our study of the matroidal graphs by characterizing them by forbidden configurations. Definition 11.2.1 A configuration ~ consists of vertices A, B, C, D, E such that A is adjacent to B, C but not to D, whereas E is adjacent to D but not to B, C. As with all configurations, unspecified edges (in this case among B, C, D and between A and E) may or may not exists. See Figure 11.1. We denote the fact that A, B, C, D, E generate a configuration jz in this order by 5(A,B,C,D,E).
T h e o r e m 11.2.2 A graph is matroidal if and only if it contains neither the configuration ~" nor a chordless pentagon.
11.2
M a t r o i d a l Graphs
273
Figure 11.1: The forbidden configuration $'(A, B, C, D, E). A
B
E
P r o o f . The "only if" part is immediate: if .T(A, B, C, D, E), then the edge D E forms a couple with both A B and AC, which do not form a couple with each other, contradicting transitivity of the binary relation R; similarly each edge of a chordless pentagon forms a couple with two adjacent edges. To prove the "if" part, assume that R is not transitive, so that there exist edges a, b, c satisfying aRb, bRc, but not aRc. It follows that a, b, c are distinct edges having a total of five or six endpoints, according as a and c have a common endpoint or not.
Five endpoints. Put a = AB, b = CD, c = B E with AC and B D nonedges (Figure ll.2(a)). If E C is a nonedge, we have ~ ( B , A, E, D, C), so assume that E C is an edge. Since b, c form a couple, B C and D E are nonedges (Figure ll.2(b)). Now if AD is a nonedge, then JZ(B, A , E , C, D), and if AD is an edge, then A, B, E, C, D induce a chordless pentagon if A E is a nonedge and $'(A, B, E, C, D) otherwise. Six endpoints. Put a = AB, b = CD, c = E F with AC, BD, CE, D F nonedges (Figure 11.3). Since a r c does not hold, some endpoint of a is adjacent to some endpoint of c. By symmetry we may assume that B E is an edge, and then we have .T(B, A, E, D, C). 9
C o r o l l a r y 11.2.3 The complement of a matroidal graph is matroidal.
P r o o f . This follows immediately from the fact that 5 and the chordless pentagon are self-complementary. 9
274
Matroidal and Matrogenic Graphs
Figure 11.2" Configurations in the proof of Theorem 11.2.2.
c
A a
AT
b
B
a
D
/
B
---
c
b D
,,~,
E
E
(~)
(b)
Figure 11.3" A configuration in the proof of Theorem 11.2.2.
j
A
C
//
B
/%
/
D
/
/
/
/
/
/
c
11.2.2
F
P4-vertices
In this subsection we describe the s t r u c t u r e of those m a t r o i d M graphs for which every vertex belongs to an induced P4 (a p a t h on 4 vertices). 1 1 . 2 . 4 Let vertices A1, A2, B1, B2 induce a P4 with edges Al131, BIB2, B2A2 (Figure 11.~). We then say that A1,A2, B1,B2 i n d u c e a P4 in t h i s o r d e r and denote this fact by 7 9 4 ( A ~ , A 2 , B~,B2). We call the A~ the e x t e r n a l v e r t i c e s and the Bi the i n t e r n a l v e r t i c e s of this P4, and similarly call the edges AiBi the e x t e r n a l e d g e s and the edge B1B2 the i n t e r n a l e d g e of the P4. Definition
1 1 . 2 . 5 Assume that ~P4(A1,A2, B1,B2) in a matroidal graph G, and let X be a fifth vertex of G. If X is adjacent to A1, then X is adjacent to A2, B1 and B2. If X is adjacent to B1, then X is adjacent to B2.
Lemma
11.2
Matroidal Graphs
275
Figure 11.4: P4(A1, As, B1, B2). B1 "
i
"" B2
\
/ \
/ x
/ /
"
\ \ \
A1
A2
P r o o f . If X is adjacent to A1 but not to A2, then we have the configuration S'(A1, B I , X , B2, A2). If X is adjacent to A1 and A2 but not to B1, then in case X is not adjacent to B2 the five vertices induce a chordless pentagon, and in case it is we have ~ ( X , A2, B2, B1,A1). Finally, if X is adjacent to B1 but not to A1, A2, B2, then we have JZ(B1,A1,X, A2, B2). " 1 1 . 2 . 6 In a matroidal graph, if edges a and b form a couple of the form P4 and edges b and c form a couple, then the latter couple is also of the Lemma
P r o o f . We may obviously assume that a, b and c are distinct edges. Assume that P4(A1,A2, B1, B2) with a = AIBI and b = A2B2. Since c forms a couple with each of a and b, there are a fifth vertex X and a sixth vertex Y with c = X Y . If the couple bc is of the form 2K2, then by L e m m a 11.2.5 X and Y are not adjacent to B1, and hence X Y forms a couple with BIB2, contradicting transitivity. If the couple bc is of the form C4, then by L e m m a 11.2.5 X and Y are both adjacent to A2 and B2, a contradiction. " C o r o l l a r y 1 1 . 2 . 7 Let R' be the binary relation defined on the edges of a
graph G so that e R ' f if and only if e = f or e and f form a couple of the form P4. If G is matroidal, then R' is an equivalence relation. The next l e m m a says that if a vertex in a matroidal graph belongs to some P4's, then it is either external in all of them or internal in all of them, and we may call it an external vertex or an internal vertex unambiguously. The same applies to edges too. Lemma
1 1 . 2 . 8 A vertex or an edge in a matroidal graph cannot be internal
in one P4 and external in another P4.
276
Matroidal and Matrogenic Graphs
The result for edges follows from the one for vertices, which we prove below. Assume that P4(A1,A2, B1,B2), and assume that, if possible, A1 is an internal vertex in another P4. Then A1 must have neighbors in the new P4, which by Lemma 11.2.5 are also adjacent to B1 and A2. It follows that B1 cannot belong to the new P4, so A1, having degree 2 in the new P4, must have two new neighbors X and Y in it. But one of X and Y is external in the new P4, and since it is adjacent to A2, A2 is also adjacent to the internal vertex A1 of the new P4 by Lemma 11.2.5 applied to the new P4. This is a contradiction.
L e m m a 11.2.9 In a matroidal graph, all the internal vertices form a clique and all the external vertices form a stable set. P r o o f . We prove the result for the internal vertices, and the result for the external vertices then follows by Corollary 11.2.3. If BIB2 and B2B3 are two internal edges, then B1 is adjacent to B3 by Lemma 11.2.5. Now assume that B1B2 and B3B4 are two internal edges and show that the B i form a clique. If some of B1, B2 are adjacent to some of B3, B4, the result follows from Lemma 11.2.5. If not, let A1 be an external vertex adjacent to B1. By Lemma 11.2.5 A1 is not adjacent to B3 and B4, and therefore B3B4 forms couple with each of B1A1 and BIB2, contradicting the transitivity of R. 9 In order to describe the structure of the equivalence classes of the binary relation R ~ of Corollary 11.2.7, we introduce the following terminology. Definition 11.2.10 Let A 1 , . . . , A p , B 1 , . . . , B p be 2p distinct vertices for some p > 2. We say that these vertices induce (in this order) a net (resp. a n e t - c o m p l e m e n t ) of o r d e r p and denote this fact by A f ( A ~ , . . . , Ap, B 1 , . . . , Bp) (resp. A T ( A ~ , . . . , Ap, B 1 , . . . , B p ) )
if all the Ai form a stable set, all the Bi form a clique, and each A~ is adjacent to Bi and to no other Bj (resp. each Ai is adjacent to all the Bj except for Bi). Figure 11.5 displays a net and a net complement of order 3. If N ' ( A I , . . . , A;, B I , . . . , Bp) holds in G, then ~?(B1,...,/3p, A1, . . . . Ap) holds in G, and conversely; and if 794(A1, A2,/~1~/~2), then Af(A1, A2,/31,/32) and A?(A1, A2,/~2,/~1 ). L e m m a 11.2.11 In a matroidal graph, two or more edges forming an equivalence class under the binary relation R' of Corollary 11.2.7 induce a net.
11.2
Matroidal Graphs
277
Figure 11.5: A net and a net-complement of order 3. A1
A1
B
2
_
A2
A3 (a) a net
A2
B1
A3
(b) a net-complement
P r o o f . Let A 1 B 1 , . . . , A p B ; be the distinct edges of the equivalence class with the Ai external and the Bi internal vertices. Clearly if Ai = Aj, then Bi = Bj and as the p edges are distinct, we have i = j. Similarly Bi = Bj implies i = j. Also by Lemma 11.2.8 A~ r Bj for all i,j. Thus we have 2p distinct vertices. By Lemma 11.2.9 the Ai form a stable set and the Bi form a clique. Finally for i -r j, A~ is not adjacent to Bj since we have 794( Ai, Aj, Bi , Bj ). .. Although the equivalence classes of R' are edge-disjoint, they may share vertices. The next lemma is crucial in determining the situation in these cases. L e m m a 11.2.12 In a matroidal graph G, let E and E ~ be distinct equivalence classes under the binary relation R' of Corollary 11.2.7, each having two or more edges. Assume that some vertex is an endpoint of an edge of E and of an edge of E'. Then each of E and E' has exactly two edges and these four edges induce in G a net-complement of order 3. P r o o f . Let us first consider the case that the common vertex is internal. Let 7)4(A1,A2, B1,B2) where AIB1 and A2B2 belong to E, and let the edge XB1 belong to E'. Then X must be external, since it follows from Lemma 11.2.5 that internal edges do not belong to couples, and so X -r B2 by Lemma 11.2.8. Also X r A1 since E -r E', and X :/- A2 since A2 is not adjacent to B1. Therefore X is a fifth vertex, which is adjacent to B2 by Lemma 11.2.5, but not to A1 or A2 by Lemma 11.2.9. By assumption ~P4(X, Y, B~, Z) for some
278
Matroidal and Matrogenic Graphs
vertices Y, Z. By Lemma 11.2.8 Z -~ X, A1, A2 and by definition of a couple Z -~ B1, B2. Thus Z is a sixth vertex, which is adjacent to B1 and B2 by Lemma 11.2.9 but not to X by definition of a P4 (see Figure 11.6). Figure 11.6" A configuration in the proof of Lemma 11.2.12.
al
B1
B2
A2
A
A /
/ \
/ /
u
We assert that Y = A2. Clearly Y r Z, B1, B2 by Lemma 11.2.8; Y -~ A1 since A1 is adjacent to B1 and Y is not; and Y -J= X. Therefore if Y -r A2, then Y is a seventh vertex. In the latter case, since YZ forms a couple with XB1, it cannot form a couple with XB2 by transitivity, and therefore Y must be adjacent to B2. But then Y is adjacent to B1 by Lemma 11.2.5, contrary to the assumption that YZ forms a couple with XB1. This proves the assertion Y = A2, from which it follows that Z is adjacent to A2 and thus also to A1 by Lemma 11.2.5. We have therefore shown that ~(A1,A2, X, B2,B1,Z). Moreover, since A2 was an arbitrary external vertex other than A1 belonging to an edge of E, it follows from the assertion that E has only two edges A1B1 and A2B2. By symmetry E' also has only two edges XB1 and A2Z, and the lemma is proved in this case. We now examine the other possibility, that the edges of E and E' share an external vertex but not an internal one. We show that this is impossible. Let 7)4(A1, A2, B1, B2) where A1B1 and A2B2 belong to E, and let the edge XA1 belong to E'. Then X must be internal, and therefore by assumption X -r A2, B1,B2. By Lemma 11.2.5 X is adjacent to A2, B1,B2. By assumption E' contains another edge that forms a P4 with XA1. This edge cannot contain B1 or B2 by assumption and it cannot be of the form A2Y, since Lemma 11.2.5 would imply that Y is adjacent to A1, contrary to the definition of P4. Thus this edge is of the form YZ, where Y is an internal sixth
11.2
M a t r o i d a l Graphs
279
vertex and Z is an external seventh vertex (see Figure 11.7). We now apply Lemma 11.2.5 several times to the two P4's. Since B1 is adjacent to A1, it is adjacent to Z. Since Z is adjacent to BI, it is adjacent to B2. Since B2 is adjacent to Z, it is adjacent to A1. But this contradicts the definition of P4.
Figure 11.7: A configuration in the proof of Lemma 11.2.12. z Y x v
A1
B1
w
B2
v
A2
In order to generalize Lemma 11.2.12 to more than two equivalence classes, let us consider a new abstract graph G whose vertices are the equivalence classes of two or more edges under R'. By Lemma 11.2.11, the edges of G that belong to a single vertex of G induce a net in G. Two vertices of G shall be adjacent when the corresponding two nets of G have vertices in common. L e m m a 11.2.13 For a matroidal graph G, let X l , . . . , 2 q be a sequence of
vertices of G such that X~ is adjacent to some of X 1 , . . . , X~-I for each i 2 , . . . , q, and q >_ 2. Then each )[i contains exactly two edges of G and these 2q edges induce a net-complement in G. P r o o f . The proof is by induction on q. The basis q - 2 is the content of Lemma 11.2.12. Assume that q > 2 and that the lemma holds for q - 1 . Then each of J ( 1 , . . . , Xi-1 contains exactly two edges of G and these 2q - 2 edges induce in G a net-complement N ' ( A ~ , . . . , Ap, B 1 , . . . , Bp). By assumption Xq is adjacent to 2 i for some i - 1 , . . . , q - 1. Hence by Lemma 11.2.12 J~q contains exactly two edges of G, which induce in G a net N(Q, T, R, S), and Xi contains exactly two edges of G, which induce in G a net N(A~, A~, B~, B~). It further follows from Lemma 11.2.12 that these two nets share exactly one internal vertex and exactly one external vertex, and their six distinct vertices induce in G a net-complement of order 3. Hence by renaming Q, T, R, S if ,v
280
Matroidal and Matrogenic Graphs
necessary we may assume that Q = A~ and S = B~, as illustrated in Figure 11.8. Figure 11.8: A net-complement in the proof of Lemma 11.2.13.
Q=Ar
R
w
As
8
v
S = Br
v
T
Clearly T is distinct from B I , . . . , Bp and R is distinct from A I , . . . , Ap. Assume that T is one of A I , . . . ,Ap, say T = At. Then R -r Bs because B~ is adjacent to T and R is not. If R r Bt, then the fact that R is adjacent to A~ but not to At contradicts Lemma 11.2.5 as applied to 7)4(As, At, Bt, B~). Therefore R - Bt and the vertices of G in ) ( 1 , . . . , 32q are just A I , . . . , Ap, B 1 , . . . , Bp, which induce a net-complement of order p in G, as was to be proved. Now assume that T is distinct from A 1 , . . . , Ap. Then R is distinct from A I , . . . , Ap, because by Lemma 11.2.5 R = Bt would imply that R is adjacent to T. Then for each t -r s we can apply Lemma 11.2.5 to P4(At, A~, B~, Bt) to conclude that T is adjacent to Bt but not to At and R is adjacent to both At and Bt. Thus we have a net-complement of order p + 1, ~?'(A1,..., Ap, T, B 1 , . . . , Bp, R), as was to be proved, tt C o r o l l a r y 11.2.14 For a matroidal graph G, the vertices belonging to a
single connected component of G induce in G a net or a net-complement. These nets and net-complements are vertex-disjoint. P r o o f . If a connected component C of G contains exactly one vertex of G, then the corresponding vertices of G induce in G a net by Lemma 11.2.11. If C contains two or more vertices of G, then these vertices can be arranged in a sequence satisfying the conditions of Lemma 11.2.13, and so the corresponding vertices of G induce a net-complement. Assume that C1 and C2
11.2
M a t r o i d a l Graphs
281
are connected components of G such that the corresponding nets or netcomplements N1 and N2 of G share a vertex X. Then X belongs to some P4 contained in N1, hence X is an endpoint of an edge of G belonging to a vertex X1 of G belonging to C1. Similarly X is an endpoint of an edge of G belonging to a vertex X2 of G belonging to C2. By definition of G, X1 is adjacent to 22, hence C1 - C2, hence N1 - N2. 9 Thus we have shown that in a matroidal graph G, the vertices that belong to P4's partition into disjoint sets, which we now call cells, such that each cell induces in G a net or a net-complement, and each P4 in G is induced by the vertices of a single cell. We number the cells as 1 , . . . , k and denote by E i (resp. P) the set of external (resp. internal) vertices of the i-th cell. We say that cell i dominates cell j, where i =/= j, when each vertex of E i is adjacent to each vertex of I j, and no vertex of E j is adjacent to any vertex of I i. L e m m a 11.2.15 The domination relation between the cells of a matroidal
graph is a linear order. P r o o f . By definition the domination relation is irreflexive and antisymmetric. We show that it is transitive and total. Totality. Consider any two cells, say cell 1 and cell 2, and let AiBi be any external edge of cell i, with Ai external and Bi internal (i = 1, 2). We assert that either A1 is adjacent to B2, or else A2 is adjacent to B1, but not both. If neither holds, then by Lemma 11.2.9 we have JP4(A1, A2, B1, B2), contrary to the fact that the vertices of each P4 are contained in a single cell. If both hold, then by Lemma 11.2.5 each vertex of E 1 is adjacent to each vertex of 12 and each vertex of E 2 is adjacent to each vertex of I 1. Let "]')4(Ai, A~, Bi, B~) in c e l l / - 1,2. Then we have 7'4(A1,A2, B;,B~), again contrary to the fact that the vertices of each P4 are contained in a single ceil. This proves the assertion, say A1 is adjacent to B2 and A2 is not adjacent to B1. Then it follows from Lemma 11.2.5 that cell 1 dominates cell 2. Transitivity. In view of the totality, it is enough to show that it is impossible for cell 1 to dominate cell 2, cell 2 to dominate cell 3, and cell 3 to dominate cell 1. Assume that, if possible, this is so, and let A1 E E 1, B2 C 12 , Aa E E 3, and B3 E 13, with A3 adjacent to B3. By Lemma 11.2.9 B2 is adjacent to B3 and A1 is not adjacent to A3. By our assumption we have 7?4(A1, A3, B2, B3), contrary to the fact that the vertices of each P4 are contained in a single cell. 9
282
Matroidal and Matrogenic Graphs
Lemma 11.2.15 allows us to renumber the cells so that cell i dominates cell j if and only if i < j. This determines completely the structure of the subgraph induced by the edges of couples of the form P4 in a matroidal graph. We summarize the results of this subsection by the following theorem. T h e o r e m 11.2.16 In a matroidal graph G, the vertices belonging to couples of the form P4 partition into disjoint sets called cells. Each cell induces in G a net or a net-complement. All the internal vertices form a clique and all the external vertices form a stable set in G. The cells can be indexed so that the external vertices of cell i are adjacent to the internal vertices of cell j if and only if i < j. We call a matroidal graph all of whose vertices belong to couples of the form P4 a cell graph.
11.2.3
2I(2-vertices and C4-vertices
In this subsection we complete the description of those matroidal graphs for which every vertex belongs to some edge in some couple. In particular, we show that every vertex of such a graph belongs either only to couples inducing a P4, or only to couples inducing a 2K2, or only to couples inducing a 6'4.. Moreover, a matroidal graph cannot contain couples of the form 2K2 and 6'4 at the same time. As usual, by a perfect matching inK2 we mean a graph with 2m vertices, all of degree 1. Figure 11.9 displays a perfect matching 3K2 and its complement 3K2. Figure 11.9: A perfect matching and its complement.
3K2
3K2
11.2
M a t r o i d a l Graphs
283
T h e o r e m 11.2.17 Let G be a matroidal graph in which the set M of vertices belonging to couples of the form 2K2 is not empty. Then M induces a perfect matching in G and the vertices of G outside M partition into a clique C whose vertices are adjacent to every vertex of M and a stable set I whose vertices are adjacent to no vertex of M . P r o o f . Let edges A B and C D form a couple of the form 2K2, and let X be a fifth vertex. We observe that X is adjacent to all of A, B, C, D or to none of them. Indeed, if X is adjacent to A, then by the transitivity of R, X A cannot form a couple with CD, and therefore X is adjacent to both C and D (Figure 11.10). Figure 11.10: A configuration in the proof of Theorem 11.2.17. A
C \
/ \
X
/ x
/
\
/
B
D
A repetition of this argument shows that X is also adjacent to B. From this observation it follows that the binary relation "equals to or forms a couple of the form 2K2 with" is transitive, and thus an equivalence relation. By definition each equivalence class induces in G a perfect matching, and from the assumption of the theorem there is at least one equivalence class g with at least two edges A B and CD. Let M' be the set of endpoints of the edges of g. By the above observation the vertices of G outside M ~ partition into a set C of vertices adjacent to every vertex of M ~ and a set I of vertices adjacent to no vertex of M ~. Any two vertices X, Y of I are not adjacent, otherwise the edge X Y would belong to g. Every two vertices X, Y of C are adjacent, otherwise X A would form a couple with both Y C and Y D , contradicting transitivity. Thus I is a stable set and C is a clique. It follows that the vertices of M ~ belong only to couples formed from two edges of g, and that C U I induces a split graph, which has only couples of the form P4, if any. Therefore M ~ = M. 9
Matroidal and Matrogenic Graphs
284
C o r o l l a r y 11.2.18 Under the conditions of Theorem 11.2.17, G has no couples of the form C4, C contains all the internal vertices and I contains all the external vertices of G. P r o o f . We have seen that G has no couples of the form C4. Let B1 be any internal vertex of G. Then we have 794(A1,A2, B1, B2) for some A1,A2, B2, and It follows from Lemma 11.2.5 that the edge B I ~ 2 does not belong to any couple of G. Therefore at least one of B1, B2 must be in C. If B1 is in I and B2 is in C, then A1 cannot be in C since it is non-adjacent to B2, and cannot be in I U M since it is adjacent to B1, a contradiction. Therefore B 1 must be in C and C contains all the internal vertices. It follows from this that A1 and A2 must be in I, so I contains all the external vertices. .. By taking the complement of G we obtain from Theorem 11.2.17 and Corollary 11.2.18 the following analogous results. T h e o r e m 11.2.19 Let G be a matroidal graph in which the set M of vertices belonging to couples of the form C4 is not empty. Then M induces a complement of a perfect matching in G and the vertices of G outside M partition into a clique C whose vertices are adjacent to every vertex of M and a stable set I whose vertices are adjacent to no vertex of M. C o r o l l a r y 11.2.20 Under the conditions of Theorem 11.2.19, G has no couples of the form 2K2, C contains all the internal vertices and I contains all the external vertices of G. The following summarizes the results of this subsection. D e f i n i t i o n 11.2.21 A matroidal graph G all of whose vertices belong to couples is called a s t r i c t m a t r o i d a l g r a p h . T h e o r e m 11.2.22 A graph G is strict matroidal if and only if the vertices of G partition into subsets M and S, M induces a perfect matching or a complement of a perfect matching, S induces a cell graph, and the vertices of M are adjacent to every internal vertex and no external vertex of S. 11.2.4
Threshold
Vertices
We now have to consider those vertices of a graph G that do n o t b e l o n g to any couples. We call these vertices threshold vertices, since they induce
11.2
M a t r o i d a l Graphs
285
a threshold subgraph of G. Recall the definition of the vicinal preorder on the vertices of G. We extend its definition to subsets of vertices so that X~Yifandonlyifx~yforallxCX, yEY. If G is matroidal, then as seen in the previous subsection, its vertices belonging to couples partition into sets M, I 1, E l , . . . , [k E k, where M is the set of vertices that belong to couples of the form 2K2 or C4, I t is the set of internal vertices of cell l, and E l is the set of external vertices of cell l. These vertices induce in G a strict matroidal graph S, relative to which
[k ~ ... ~_ I 1 ~ M ~ E 1 ~ "'" ~- E k.
(11.2)
The threshold vertices of G induce a threshold graph T, and they can be labeled as X 1 , . . . , Xt so that relative to T
X , ~ ... ~ Xt.
(11.3)
Moreover, (11.2) and (11.3) remain true relative to G, because they could only be violated if a vertex of T belonged to a couple of G (there is an exception in the case that Xi ~ Xj relative to T but Xi ~- Xj relative to G; in that case we adopt the convention that i < j). Thus the sets M , I ~ , E 1 , . . . , I k , E k, { X 1 } , . . . , {Xt} are totally ordered by ~ relative to G in a way that is a common refinement of both (11.2) and (11.3). Conversely, assume that S is a strict matroidal graph satisfying (11.2) and T is a threshold graph disjoint from S and satisfying (11.3). If S and T are connected by edges so that relative to the resulting graph G the sets M, I 1, E l , . . . , I k, E k, {X1},..., {Xt} are totally ordered by ~- in a way that is a common refinement of both (11.2) and (11.3), then G is matroidal and its threshold vertices are precisely the vertices of T. Indeed, the Xi are comparable with every vertex of G and hence do not belong to couples of G; the other vertices of G do belong to couples since S is strict; further, R is transitive on S by assumption and hence remains transitive on G. It remains to see how S and T are to be connected by edges so as to satisfy the above necessary and sufficient requirements. By Theorems 11.2.17 and 11.2.19, if a vertex of T is adjacent to some vertices of M, it is adjacent to all vertices of M. By Lemma 11.2.5, if a vertex of T is adjacent to some vertices of E t, it is adjacent to all vertices of E t t_J I t, and if it is adjacent to some vertices of I l, it is adjacent to all vertices of I t. It therefore follows that a vertex of T cannot be equivalent to a vertex of S' under the vicinal preorder. The remaining question is to which sets M, I 1, E l , . . . , I k, F_,k a given vertex of T should be adjacent.
Matroidal and Matrogenic Graphs
286
We begin to consider this problem by assuming that S is a single cell, i.e.,M-Oandk-1. T h e o r e m 11.2.23 Let S be a cell with external vertices E and internal vertices I. Let T be a threshold graph disjoint from S, whose vertices X 1 , . . . , Xt satisfy (11.3) relative to T. If S and T are joined by edges so that the resulting graph G is matroidal and its threshold vertices are precisely X 1 , . . . , Xt, then the following conditions hold: 1. there is an index r - O , . . . , t such that { X r + l , . . . , X t } is a stable set, or equivalently such that X~+I is not adjacent to X~+2 (provided r + 2 <_ t); 2. there is an index s - 0 , . . . , t satisfying i < s < r and Xs >- X j , where j is the smallest index other than r such that X j and X~ are not adjacent, and i is the largest index such that Xi and X~+I are adjacent (if i or j is not defined, the corresponding condition on s is omitted; Xo :'- XN is considered to be true); 3. each vertex of I is adjacent to X1, . . . , X~, but not to X r + l , . . . , X t / ~. each vertex of E is adjacent to X1, . . . , X~, but not to X s + l , . . . , X t. Conversely, r and s can always be chosen to satisfy 1 and 2, and if S and T are connected according to 3 and ~, then the resulting graph G is matroidal and its threshold vertices are precisely X 1 , . . . , Xt. P r o o f . Assume that G is matroidal and its threshold vertices are X1, . . . , Xt. Then there are indices 0 _< s <_ r _< t such that relative to G we have X1 ~ . . .
~ X s ~- I ~ Xs+ 1 ~ . . .
~'- X r
~- E
~- Xr+ 1 ~ - . . ,
~-- X t .
(11.4) We prove that r and s satisfy 1-4. To prove 3, consider an external vertex A, an internal vertex B adjacent to A, and an internal vertex B' not adjacent to A. By Lemma 11.2.5, since X 1 , . . . , X ~ >- A, X 1 , . . . , X ~ are adjacent to B and hence to every vertex of I. Since A >-- X r + l , . . . , Xt, X r + l , . . . , Xt are not adjacent to B' and hence not to any vertex of I. Condition 4 has a similar proof.Assume that 1 fails and there is an edge connecting two vertices among X ~ + I , . . . , Xt. Then by 3 this edge forms a couple with any internal edge of S, contradicting the assumption that X 1 , . . . , Xt are threshold vertices of G. It remains to prove 2. We assert that I ~ Xj. Indeed, otherwise we would have
11.2
M a t r o i d a l Graphs
287
Xj ;,-- I, and since the vertices of I are adjacent to X~, Xj would be adjacent to X~, contradicting the definition of j. Similarly we see that Xi ~ I. Since Xi ~- I ;,- Xj and s is the largest index such that X~ ~ I, we have i <_ s and X~ ~- Xj relative to T. Conversely, assume that r is chosen to satisfy 1. We assert that s can always be chosen to satisfy 2, in other words Xi ~- Xj and i _< r must hold. To see that X~ ~ Xj, note that if i -r r, then X~ is adjacent to X~ whereas Xj is not, and if i - r, then X~ is adjacent to X~+I, { X i , . . . , X~+I} is a clique, j must be one of r + 2 , . . . , t, and Xi is adjacent to X~+I whereas Xj is not. To see that i _< r, note that by 1 i >_ r + 1 would contradict the definition of i. Thus it is always possible to choose r and s to satisfy 1 and 2, often in different ways. Now assume that this was done and S and T were joined by edges according to 3 and 4. We complete the proof by showing that (11.4) holds relative to G. First we show that if u _< v, then X~ ~ X~ relative to G. Indeed, let B be an internal vertex adjacent to X~. Then by 3 v _< r, hence u _< r and by 3 B is adjacent to X~. A similar use of 4 results in the same conclusion for external vertices. It remains to show that X~ ~- E ~- X~+I and X~ ~- I ~- X~+I. X~ ~ E: Let Z be any vertex adjacent to some vertex of E. Then Z is in I o r T. In the first case Z is adjacent to X~ by 3 and we are done. In the second case we have Z - Xq for some q and q _< s by 4. If j is defined, then by 2 Xq ~ Xj relative to T, hence q < j, and by the definition of j we have that Z coincides with or is adjacent to X~. If j is undefined, then X~ is adjacent to all other vertices in T, so again Z coincides with or is adjacent to XT. E ~- X~+I" Let Z be any vertex adjacent to X~+I. Since s < r by 2, and by 3 and 4, Z must be in T, and so Z - Xq for some q. Then i is defined and satisfies q < i, and by 2 i < s. Therefore q < s and so by 4 Z is adjacent to the vertices of E. Xs ~ I: Let Z be any vertex adjacent to some vertex of I. If Z is in S, then by 3 and 4 and the fact that s < r, Z is adjacent to X~ and we are done. If Z is in T,we have Z - Xq for some q and q < r by 3. If j is defined, we distinguish the cases s 7~ r and s - r. In the first case, since by 2 X~ ~- Xj relative to T and therefore s < j, Xs is adjacent to XT by the definition of j, and therefore X~ coincides with or is adjacent to Xq. In the second case X~ ~- Xj by 2 so that r < j, by the definition of j { X 1 , . . . , X~} is a clique, and in particular since q, s _< r we have that Xq coincides with or is adjacent to X~. Again, if j is undefined, then X~, and hence X~, is adjacent to all
288
Matroidal and Matrogenic Graphs
other vertices in T, so t h a t Xq coincides with or is adjacent to X~. I ~- Xs+l" Let Z be any vertex adjacent to Xs+l. If Z is in S', then by 4 Z is internal, and therefore Z is adjacent to all other vertices of I and we are done. I f Z i s i n T , then Z - X q for s o m e q . Since b y 2 i_< s < s + l , and by the definition of i, X~+I and X~+I are not adjacent. This means t h a t either s + 1 - r + 1, in which case q _< r by 1, or else X~+I and XT+I are distinct non-adjacent vertices, in which case Xq ~- XT+I relative to T, hence again q _< r. Thus in both cases Xq is adjacent to the vertices of I by 3. .. We illustrate T h e o r e m 11.2.23 with the following example. Let T be the threshold graph illustrated in Figure 11.11, relative to which one has X1 ~- X2 "~ X3 ~- X4. Table 11.1 summarizes all the possibilities of m a t r o i d a l graph whose threshold vertices are X1, . . . . X4 and whose other vertices induce a cell. These graphs are illustrated in Figure 11.12 for the case t h a t the cell is a P4. Figure 11.11" A threshold graph.
X3
X1
X2
X4
Table 11.1" A summary of the possibilities for the graph of Figure 11.11. Case
r
i
j
s
(a) (b)
1 2
1 1
4 3
1 1
(c)
3
2
0
(d) (e)
3 4
2 1
1 0
Order of vertices X1 X1 I X1 I
~ ~ ~ ~~-
I I X1 I X1
~ ~ ~ ~~-
E X2 22 X2 X2
}.- 2 2 }.- f_, ,.-, 2 3 ,.~ X 3 ,~ X 3
~ ~ ~.~:,-
X3 X3 ~, E X4
~ ~~~~-
24 24 24 X4 E
Having e x a m i n e d the case where S' is a cell, we now generalize to the case t h a t S is a cell graph. The next theorem describes the situation in this case. Theorem
1 1 . 2 . 2 4 Let S be a cell graph with cells 1 , . . . , k satisfying Ik;, - . . . ~ - I 1 ~- E 1~- . . . ~ - E k
(11.5)
relative to S. Let T be a threshold graph disjoint from S with vertices X 1 , . . . , X t satisfying (11.3) relative to T. If S and T are joined by edges
tl.2
Matroidal Graphs
289
Figure 11.12: Matroidal graphs corresponding to Table 11.1.
X3
Xl
X2
X4
X3
X1
(~)
X3
X1
X2
X4
X2
X4
(b)
X2
X4
X3
X1
(c)
(d)
X3
X1
X2
X4
~v
v
v
v
(e)
Matroidal and Matrogenic Graphs
290
so that the resulting graph G is matroidal and its threshold vertices are precisely X 1 , . . . , Xt, then for each cell l there exist indices rl, st satisfying 1 of Theorem 11.2.23 with respect to I t and E l, and furthermore Sk ~
"'"
< 81
~
rl ~
...
~ rk.
(11.6)
Conversely, r~ and st can always be chosen to satisfy 1 and 2 as well as (11.6), and if the connecting edges satisfy 3 and ~ with respect to I t and E ~, then the resulting graph is matroidal and its threshold vertices are precisely X1, . . . , Xt.
P r o o f . If G is matroidal with threshold vertices X 1 , . . . , X t , then the sets 11, E l , . . . , I k, E k, {X1 } , . . . , {Xt } are totally ordered by ~ relative to G in a way that is a common refinement of both (11.5) and (11.3). For each cell l, I l U E t U { X 1 , . . . , Xt } induces a matroidal graph whose threshold vertices are X 1 , . . . , Xt and whose other vertices induce a cell. By Theorem 11.2.23 there are indices rl and st satisfying 1-4 of that theorem with respect to I t and E I. Using (11.4) applied to rt, st, I t and E t and also (11.5), we obtain (11.6). Conversely, assume that S and T are given as above. Then by Theorem 11.2.23, for each cell 1 it is possible to choose indices rt, st satisfying 1-2 of that theorem. Furthermore, it is also possible to satisfy (11.6), for example by choosing rl . . . . . rk and Sl . . . . = sk. We assert that if the vertices of I t are joined to X 1 , . . . , Xr~ and the vertices of E l are joined to X 1 , . . . , X~ so as to satisfy 3-4 of the theorem, then the resulting graph G is matroidal and its threshold vertices are X 1 , . . . , X t . To show this, it is sufficient to demonstrate that (11.3) and (11.5) continue to hold relative to G and that (11.4) holds relative to G with rl, sl, I l and E t It is immediate to obtain (11.3) from 3 and 4 of Theorem 11.2.23. As for (11.5), 11 ~- E 1 follows from Theorem 11.2.23. To show that 12 ~ 11, assume that Xq is adjacent to the vertices of I ~. Then q _< rl by (3), hence q _< r2 by (11.6), and Xq is adjacent to the vertices of 12 by 3. Similarly all the relations of (11.5) can be proved. It remains to prove the relations Xr z > E t > X~z+1 and Xs~ ~- I l ~ Xs~+1. Let us prove X~.t ~ E l , the other relations being similar. Let Z be any vertex adjacent to the vertices of E z. If Z is in T, then Z coincides with or is adjacent to X~ z by Theorem 11.2.23. If Z is in S, then by definition of a cell graph and by (11.5), Z must be in 11 U ... U I k. By 3 Z is adjacent at least to X 1 , . . . , X m , where m - m i n ( r l , . . . , r k ) . But m - rt by (11.6), and therefore Z is adjacent to X~. 9
Corollary 11.2.25 Let G be a matroidal graph all couples of which are of the f o r m P4. Then G is a split graph.
2
M a t r o i d a l Graphs
291
roof. We use the results and notations of Theorem 11.2.24. Let h be the rgest index such that Sl _< h _< rl and { X ~ , . . . , Xh} is a clique. Then if < rl, Xh is not adjacent to Xh+x. Therefore in all cases { X h + l , . . . , X~ } is a able set. We assert that in fact { X I , . . . , Xh} is a clique and { X h + l , . . . , Xt } a stable set. Indeed, if sl < h, the first statement is obvious; if Sl - h, follows from the facts that X1 >- I x, . . . , X~ >- I ~ and that X~ ~ are adjacent to all the vertices of 11. If h < rl, the second statement obvious; if h - rl, it follows from the fact that X~+I and X~+2 are not tjacent. Since X 1 , . . . , X~ 1 are adjacent to the vertices of 11 U . . . U I k, u U 11 U ... U I k is a clique. Since X~ l + l , . . . , X t are not tjacent to any vertex of E 1 tJ . . . t.J E k, { X h + l , . . . , X t } U E 1 U " " [_J E k a stable set. .. We conclude the description of the matroidal graphs by answering the ~estion which vertices of T are adjacent to M. h e o r e m 11.2.26 Let S be a cell graph and T a threshold graph as in Theo:m 11.2.2~. Let M be a perfect matching inK2 or a complement of a perfect ~atching inK2 disjoint from S and T, with rn > 2. If the edges joining M S and T are such that the resulting graph G is matroidal with threshold ~rtices X1, . 9 Xt , then 1. the vertices of M are adjacent to all the internal vertices and to none of the external vertices of S; 2. if h is the largest index such that Xh is adjacent to the vertices of M (h - 0 if none), then Sl < h < rl, { X l , . . . , X h } U 11 U . . . U I k is a clique and { X h + l , . . . , X t } t2 E 1 tJ . . . U E k is a stable set. ~onversely, it is possible to choose an index h such that S 1 < h < r l , X I , . . . , X h } is a clique and { X h + l , . . . , X t } is a stable set. If the vertices f M are joined to the vertices of { X 1 , . . . , X h } U 11 U . . . U I k and to no ther vertices, then the resulting graph G is matroidal with threshold vertices ~'1,''', Xt.
'roof. Condition 1 has been proved in Subsection 11.2.3, together with the mt that the vertices of S partition into a clique whose vertices are adjacent ) M and a stable set whose vertices are not. If h - 0, then the vertices of { X 1 , . . . , X t } U .~1 I,_J . . . I,.J E k are not djacent to M, hence they form a stable set, Sl - 0, and 2 follows. The
292
Matroidal and Matrogenic Graphs
case h - t is similarly easy, and therefore we now assume that 0 < h < t. Since (11.3) holds relative to G, the vertices of M are adjacent to X 1 , . . . ,Xh. It follows that { X 1 , . . . , X h } t0 I 1 tO ... tO I kis a cliqueand { X h + l , . . . , X t } tO E 1 U ... U E k is a stable set. Since M is comparable with every vertex of S and T relative to G, it satisfies in particular 11 P- M >- E 1 and Xh >- M >Xh+l relative to G. By transitivity of >- we have Xh >- E 1 and 11 >- Xh+l, from which it follows that Sl _< h _< rl and 2 is proved. Conversely, by Corollary 11.2.25 there is an index hi _< h _< rl such that { X 1 , . . . , X h } tO I1 U ... tO I k is a clique and {Xh+~,...,Xt} U E 1 U ..- tO E k is a stable set. Assume that M is joined to the vertices of { X 1 , . . . , X h } U I 1 U " " U I k and to no other vertices of S U T. In order to prove that the resulting graph G is matroidal with threshold vertices X 1 , . . . , Xt, it is sufficient to show that M is comparable with every vertex of S U T relative to G. We show below that each cell l satisfies I 1 >- M >- E t and t h a t X 1 > - M f o r q _ < h a n d M > - X q forq_>h+l. I t >- M: Let Z be any vertex adjacent to some vertex o f M . I f Z i s i n M or in S, then Z is adjacent to all vertices of I t. If Z is in T, say Z - Xq, then q <_ h <_ rl ~ rl and therefore Xq is adjacent to all the vertices of ft. M >- E l" This is proved similarly. Xq >- M for q _< h" Let Z be any vertex adjacent to some vertex of M. If Z is in M, then Z is adjacent to Xq. If Z is in S, then it is internal, say Z C fl, and thus adjacent to Xq since q _< h _< r 1 ~ r I. If Z is in T, say Z - Xp, then p <_ h and Xq is adjacent to Xp because { X 1 , . . . , X h } is clique. M >- Xq for q _> h + 1" This is proved similarly. 9
11.2.5
Properties of Matroidal Graphs
The structure of matroidal graphs has been completely described in the previous three subsections. Each matroidal graph can be decomposed into a cell graph S, induced by the vertices that belong to P4's and described by Theorem 11.2.16, a perfect matching or a complement of a perfect matching M, induced by the vertices that belong to 2K2's or C4's, and a threshold graph T induced by the threshold vertices. The vertices of M are adjacent to all the internal and to none of the external vertices of S'. The edges joining T to S' are described by Theorems 11.2.23 and 11.2.24, and the edges joining T to M are described by Theorem 11.2.26. We can now determine the threshold dimension t(G) of a matroidal graph G, which is the original
11.2
M a t r o i d a l Graphs
293
reason of interest in these graphs. T h e o r e m 11.2.27 Let G be a matroidal graph and let E l , . . . ,Eq be the
equivalence classes of the relation R of page 271. Then
t(G) = max(IE, I,..., levi). P r o o f . Put t = m a x ( l E l l , . . . , IEql). If fewer than t subgraphs of G cover all its edges, then one of these subgraphs H has two edges from the same equivalence class Ei. These two edges form a couple in G and therefore in H too, and so H cannot be a threshold graph. This shows that t(G) >_ t. To prove the reverse inequality, we exhibit t threshold subgraphs of G covering its edges. We construct one of these subgraphs, called H, as follows. Since G is matroidal, it decomposes into S, M and T as above. Consider a cell of S. If it is a net of order p, J~f(AI,...,Ap, BI,...,Bp), then its p external edges AiBi form one equivalence class, and each internal edge BjBk forms an equivalence class by itself. There are p ways to select one edge from each of these equivalence classes, giving p threshold subgraphs of the net covering its edges. We select one of these p threshold subgraphs and put its edges in H. If the cell is a net-complement of order p, A/'(A1,..., dr, B 1 , . . . , Bp)), then each pair AjBk, AkBj, j ~ k, of external edges forms an equivalence class, and each internal edge BjBk forms an equivalence class by itself. The collection of the external edges AjBk with j < k and all the internal edges is a threshold subgraph of the net-complement containing one edge of each of these equivalence classes. This collection and a similar one obtained with j > k cover all the edges of the net-complement. We select one of these two and enter its edges in H. Now consider M, and assume it is a perfect matching inK2. Then each of its m edges forms an equivalence class by itself and is a threshold subgraph of M, and these m subgraphs obviously cover the edges of M. We select one of these edges and put it in H. If M is a complement inK2 of a perfect matching induced by the vertices A 1 , . . . , Am, A 1 , . . . , A" with all edges present except for AiA~, i - 1 , . . . , m, then each edge X Y forms an equivalence class with ZU, where Z is the unique vertex of M not adjacent to X and U is the unique vertex of M not adjacent to Y. The collection of edges AjA'k with j < k and all edges AjAk forms a threshold subgraph of M having one edge of each of these equivalence classes. This collection and its complement, which has a similar form, cover all the edges of M. We select one of these two collections and put its edges in H.
294
Matroidal and Matrogenic Graphs
Each of the remaining edges of G (namely the edges of T and the edges joining S, M, T and the different cells of S) forms an equivalence class by itself. We put all of them in H. The H constructed in this way has exactly one edge of each equivalence class Ei, and it is clear that we can construct t H's of this form that will cover all the edges of G. Moreover, we assert that each H constructed in this way is a threshold subgraph of G, in other words, no two edges a and b of H form a couple in H. Indeed, if both a and b are in the same cell of S, or if both are in M, then the assertion follows by construction. Otherwise a and b do not form a couple in G, because G contains enough edges so that the endpoints of a and b induce a triangle in G, namely the edges of T and the edges joining S, M, T and the different cells of S. But these edges are in H as well, so the endpoints of a and b induce a triangle in H too, and so a and b do not form a couple in H. This proves that t(G) <_ t. 9 As an illustration, consider the matroidal graph displayed in Figure 11.13. Figure 11.13" A matroidal graph.
A
B
E
H
C
D
Here M is induced by A, B, C, D and is a complement of a perfect matching, S is induced by E, F, G, H and is a cell (both a net and a net complement of order 2), and T is empty. Thus the largest equivalence class Ei has two edges. The two threshold subgraphs used in the proof above are shown in Figure 11.14. By computing the Orlin weights (Section 1.3) of these two threshold subgraphs we find a smallest system of linear inequalities separating the incidence vectors of the stable and the non-stable sets of vertices of the graph of Figure 11.13, where in each inequality each coefficient is an integer which is as small as possible: llF+10G+8A+4B+4C+2D+E
<_ 11
llG+10F+SD+4B+4C+2A+H
_< 11.
11.2
M a t r o i d a l Graphs
295
Figure 11.14: Two threshold subgraphs covering the graph of Figure 11.13. A
B
E
A G
H
B H
E
A v
v
C
D
C
v
D
Chvgtal and H a m m e r [CH77] have proved that for each ~ > 0 there exists a positive integer n and a graph G on n vertices satisfying t(G) > (1 - e)n. The situation for matroidal graphs is quite different, as the next theorem shows. 1 1 . 2 . 2 8 If G is a matroidal graph on n vertices, then t(G) <_ n/2, and equality holds if and only if G is a perfect matching, a square or a net.
Theorem
P r o o f . The graph G decomposes into T, S and M as above. Let T have t vertices, let S have k cells of orders p l , . . . , pk, and let M have m vertices. If m = k = 0, then G is a threshold graph, n = t and t(G) is 1 or 0 according as G possesses edges or not. In that case clearly t(G) <_ n/2, equality holding if and only if G is a single edge, which is a perfect matching. Now assume that m + k > 0. Let at be pl or 2 according as cell 1 of S is a net or a net-complement. Also let b be m / 2 , 2, or 0 according as M is a matching, a complement of a matching, or empty. Then n = t + 2(pl + - " + pk) + m and t(G) = max(b, a l , . . . , ak). By definition of b, if m > 0, then b/rn <_ 1/2, equality holding if and only if M is a perfect matching or a square. By definition of at, at/2pt <_ 1/2, equality holding if and only if cell 1 is a net. From this the result follows immediately. ,. Theorem
11.2.29
Each matroidal graph is chordal or co-chordal, and hence
perfect. P r o o f . Let G be a matroidal graph, partitioned into M, S and T as above. If M is empty, then G is split by Corollary 11.2.25 and therefore chordal. If M is a matching, then G is chordal by Theorem 11.2.17. If M is a complement of a matching, then G is co-chordal by the same result. '.
296
11.3
Matroidal and Matrogenic Graphs
Matrogenic Graphs
We begin our study of the matrogenic graphs, based on [FH78b], with the following simple lemma, which uses the notation $-(A, B, C, D, E) of Definition 11.2.1. L e m m a 11.3.1 For a graph G, the following conditions are equivalent.
1. G does not contain the configuration ~; 2. if two alternating ~-cycles of G have exactly three common vertices, then their union induces a chordless pentagon. P r o o f . 2) =~ 1): This is clear, since the vertices of 7 ( A , B, C, D, E) cannot induce a chordless pentagon, yet the configuration contains two alternating 4-cycles with exactly three common vertices, A D E B and ADEC. 1) =~ 2): Assume that G has two alternating 4-cycles on the vertex-sets {A, B, C, D} and {A, B, C, E}. Without loss of generality, we may assume that A B and CD are edges and BC and DA are nonedges. Note that if E A is an edge, then so is EC, otherwise we have ~-(A, B, E, D, C), a contradiction. Similarly, E A is an edge if EC is an edge, and E B is an edge if and only if ED is an edge. Since { A , B , C,E} induces an alternating 4-cycle, the above considerations imply that if EA and EC are edges, then AC is a nonedge, and E B and ED are nonedges. Now if BD is a nonedge, we have ~ ' ( A , B , E , C,D), a contradiction. Therefore BD is an edge, and our five vertices induce a chordless pentagon. If instead EA and EC are nonedges, then AC is an edge, and E B and ED are edges. Now if B D is a nonedge, we have a chordless pentagon, otherwise we have ~ ( D , B, E, A, C). .. We are now ready to characterize the matrogenic graphs. Recall that by definition, a graph is matrogenic if and only if whenever C1 and C2 are distinct sets of four vertices, each inducing an alternating 4-cycle, and sharing a vertex x, then C1 U C2 - {z} contains an alternating 4-cycle. T h e o r e m 11.3.2 A graph is matrogenic if and only if it does not contain the configuration jz. P r o o f l The necessity is clear, since in a configuration JZ(A,B, C , D , E ) ,
C1 = {A, B, E, D} and C2 = {A, C, E, D} induce alternating 4-cycles and share the vertex D, but C1 U C 2 - {D} = {A, B, C, E} does not contain an alternating 4-cycle.
11.3
Matrogenic Graphs
297
To prove the sufficiency, assume that G has no configuration ~- and that C1 and 6'2 are distinct sets of four vertices, each inducing an alternating 4-cycle, and sharing a vertex x. We show below that C1 U C2 induces a matching of three edges, a net of order 3 (Definition 11.2.10), a chordless pentagon, or their complements. Each of these graphs is easily seen to be matrogenic, and therefore C1 U 6'2 - {x} contains an alternating 4-cycle, as required. We distinguish the following cases. C a s e 1: 6'1 and C2 share exactly one vertex. Then the situation is as illustrated in Figure 11.15. Figure 11.15: A configuration in Case 1 of Theorem 11.3.2. E
--- ---I C
i
F
B
Now EC must be an edge, otherwise we have an )r(A, B, E, D, C), contrary to our assumption. Similarly CG must be a nonedge, otherwise we have an 5 ( C , D, G, B, A). But then we have an ~-(E, A, C, F, G), a contradiction. Therefore this case is impossible. C a s e 2 : C 1 and C2 share exactly two vertices, which are adjacent. Let C1 = {A, B, C, D} and C2 = {A, B, E, F} where AB is an edge. We distinguish three subcases depending on how many of the edges CD and E F are present. C a s e 2.1: Both edges CD and E F are present. We may then assume without loss of generality that AD, BC, AF and B E are nonedges. If the edge CF were present, then {A,B, C,F} would induce an alternating 4cycle, but {A, B, C, D, F} cannot induce a chordless pentagon, contrary to Lemma 11.3.1. Therefore CF is a nonedge, and similarly DE is a nonedge. The situation is illustrated in Figure 11.16.
298
Matroidal and Matrogenic Graphs
Figure 11.16: A configuration in Case 2.1 of Theorem 11.3.2.
E
A
c
B
D
i;'" •
F
We assert that {A, C, E} is a stable set or a clique. For otherwise, we may assume without loss of generality that CE is an edge and AC is a nonedge. Then {A, B, C, E} induces an alternating 4-cycle, but {A, B, C, E, F} cannot induce a chordless pentagon, contrary to Lemma 11.3.1. Similarly {B, D, F} is a stable set or a clique. Moreover, {A, C,E} and { B , D , F } cannot both be cliques, because in that case {C, D, E, F} would induce an alternating 4-cycle, but {A, C, D, E, F} cannot induce a chordless pentagon, contrary to Lemma 11.3.1. We conclude that either {A, C,E} and { B , D , F } are both stable, in which case the six vertices induce a matching 3K2, or else one is stable and one is a clique, in which case the six vertices induce a net of order 3. Case 2.2: Both edges CD and EF are absent. We may then assume without loss of generality that AC, BD, AE and BF are edges and AD, BC, AF and BE are nonedges, as in Figure 11.17. It follows that {A, B, C, D} and {A, B, C, F} induce alternating 4-cycles even though {A, B, C, D, F} cannot induce a chordless pentagon, contrary to Lemma 11.3.1. Therefore this subcase is impossible. Case 2.3: Exactly one of the edges CD and EF is present, say CD is present and EF is absent. We may then assume without loss of generality that AE and B F are edges and AF and BE are nonedges. If BD were present, then AD must be absent to avoid the triangle ABD, and this gives an ~ ( B , D, F, E, A), a contradiction. Therefore BD must be a nonedge, and similarly AC, AD and BC are nonedges. Further, if FD were present, we would have an ~ ( D , C, F, B, A), a contradiction. Therefore FD is a nonedge, as illustrated in Figure 11.18.
11.3
Matrogenic Graphs
299
Figure 11.17" A configuration in Case 2.2 of Theorem 11.3.2. E
A
I \ \
/ /
I
\
I
i
I /
X
C \
\
/ /
/
\
\
i
i
\
\
/
X
/
I
\
/
I
I
\
\
I v
F
B
D
Figure 11.18" A configuration in Case 2.3 of Theorem 11.3.2. E
A
A
A
T, I
\
\
I I
I /
/
\ i /
X
/
C \
\
/
/
\
\
i \
/
\
/
X
/
/ \ \
2,,
F \-.
B
--~ D
It follows that {A, B, C, D} and {B, C, D, F} induce alternating 4-cycles even though {A, B, C, D, F} cannot induce a chordless pentagon, contradicting Lemma 11.3.1. Therefore this subcase is also impossible. Case 3 : C 1 and C2 share exactly two vertices, which are not adjacent. Since the alternating 4-cycle, the configuration $', and the chordless pentagon are isomorphic to their complements, it follows from Case 2 that in Case 3, the six vertices induce a complement of a matching 3K2 or a net-complement of order 3. C a s e 4 : C 1 and C2 share exactly three vertices. Then by Lemma 11.3.1 C 1 LJ C 2 induces a chordless pentagon. 9 The following corollaries follow easily from Theorem 11.3.2. C o r o l l a r y 11.3.3 All induced subgraphs of a matrogenic graph are matrogenic.
300
Matroidal and Matrogenic Graphs
Corollary 11.3.4 The complement of a matrogenic graph is matrogenic. In the following we find it useful to refer to a perfect matching with two or more edges or its complement or a chordless pentagon as a core.
Corollary 11.3.5 All cores are matrogenic. We now reduce the problem of finding the structure of matrogenic graphs to the problem of finding the structure of split matrogenic graphs. Specifically, we shall see that the vertices of a matrogenic graph partition into S U K U C, where S U K induces a matrogenic split graph with S a stable set and K a clique, C induces a core, and every vertex of C is adjacent to every vertex of K and to no vertex of S. Conversely every graph with these properties is matrogenic. T h e o r e m 11.3.6 Let G be a graph whose vertex set is partitioned into disjoint sets S U K U C, where S U K induces a matrogenic split graph with S a stable set and K a clique, C induces a core, and every vertex of C is adjacent to every vertex of K and to no vertex of S. Then G is matrogenic. P r o o f . Since the graphs induced by Q = S tJ K and by C are matrogenic, it is sufficient to show that no alternating 4-cycle can meet both Q and C. Assume that, if possible, vertices x, y, z, u induce an alternating 4-cycle and z E C, y E Q. We may further assume without loss of generality that y E K, for if y E S, then one of z and u must be in K, and we can rename it to be y. Then z E S U C, for if z E K, then the alternating 4-cycle contains a triangle xyz, an impossibility. Similarly u E S U C. But now if z, u E S, then {z, z, u} is stable, if z, u E C, then y has three neighbors in the alternating 4-cycle, and if z E S and u E C, then y has three neighbors or z has three non-neighbors in the alternating 4-cycle, depending on whether yz is present or not. In each case we have a contradiction. .. To prove the converse of Theorem 11.3.6, we prove the following two lemmas. L e m m a 11.3.7 Let P be a chordless pentagon in a matrogenic graph G. Then the vertices of G outside P partition into a clique whose vertices are adjacent to every vertex of P and a stable set whose vertices are adjacent to no vertex of P. Moreover, P is uniquely determined by G.
11.3
Matrogenic Graphs
301
P r o o f . Denote the vertices of P by A, B, C, D, E cyclically along the pentagon. Let x be a vertex outside P. We assert that if x is adjacent to A, then it is also adjacent to B. Assume that, if possible, xA is an edge and x B is a nonedge. Then {A, B, C, E} and {A, B, C, x} induce alternating 4cycles, but {A, B, C, E , x } cannot induce a chordless pentagon, since A has three neighbors in this set, contrary to Lemma 11.3.1. It follows that every vertex outside P is adjacent to all or to none of the vertices of P. If two vertices x and y outside P are adjacent to every vertex of P, then they are adjacent to each other, for otherwise G has an 9r(x, A, B, y, D), contrary to Theorem 11.3.2. By working in the complement we then see that if two vertices x and y outside P are non-adjacent to every vertex of P, then they are not adjacent to each other. The uniqueness of P follows from the facts that no chordless pentagon can meet both P and G - P, and that a split graph cannot contain a chordless pentagon (Theorem 5.2.1). 9 L e m m a 11.3.8 Let G be a matrogenic graph and M a maximal induced perfect matching in G having at least four vertices. Then the vertices of G outside M partition into a clique whose vertices are adjacent to every vertex of M and a stable set whose vertices are adjacent to no vertex of M. Moreover, M is uniquely determined by G. The same is true i f M is a maximal induced complement of a perfect matching having at least four vertices. P r o o f . Let A B and CD be distinct edges of M and x a vertex outside M. If x is adjacent to A, then it must also be adjacent to C, for otherwise G has an .7"(A, B , x , D, C). By the same argument x must also be adjacent to B, and therefore to every vertex of M. It follows that every vertex outside M is adjacent to all or to none of the vertices of M. If two vertices x and y outside M are adjacent to every vertex of M, then they are adjacent to each other, for otherwise {A, C, x, y} and {B, C, x, y} induce alternating 4-cycles even though { A , B , C , x , y } cannot induce a chordless pentagon. If two vertices x and y outside M are non-adjacent to every vertex of M, then they are not adjacent to each other, for otherwise we could add them to M, contradicting its maximality. The uniqueness of M follows from the facts that no perfect matching with two or more edges can meet both M and G - M, and that a split graph cannot contain a perfect matching with two or more edges (Theorem 5.2.1). This proves the lemma if M is a perfect matching. If M is a complement of a perfect matching, the result follows by working in the complement of G. 9 We are now ready for the converse of Theorem 11.3.6.
302
Matroidal and Matrogenic Graphs
T h e o r e m 11.3.9 A matrogenic graph is either a split graph or its vertex set partitions uniquely into S O K U C so that Q = S o K induces a split graph, S is a stable set and K is a clique, C induces a core, and every vertex of C is adjacent to every vertex of K and to no vertex of S. P r o o f . If G has an induced core, the result follows from Lemmas 11.3.7 and 11.3.8. If G has no induced core, then it has no induced 2K2, C4 or C5, and therefore it is a split graph by Theorem 5.2.1. [] As we have pointed out, Theorems 11.3.6 and 11.3.9 reduce the problem of finding the structure of matrogenic graphs to the problem of finding the structure of matrogenic split graphs. However, by Theorems 11.3.2, 5.2.1 and 11.2.2, a matrogenic split graph is matroidal, and the structure of a matroidal split graph was given in Section 11.2, namely it is a cell graph with threshold vertices connected to it according to Theorems 11.2.23 and 11.2.24. From the above structure of a matrogenic graph G, we can determine its Dilworth number D(G) (Section 9.1) and threshold dimension t(G) (Section 6.1). T h e o r e m 11.3.10 Let G be a matrogenic graph. Let Q, K, S and C be as in Theorem 11.3.9 if G is not a split graph, and let Q = V(G), C = 0 if G is a split graph. Then
D(G) t(a)
=
max(D(G[C]), D(G[Q])),
=
max(t(G[C]), t(G[Q])).
P r o o f . If G[X] is an induced subgraph of G and A is an antichain of (the vicinal preorder of) G[X], then A remains an antichain of (the vicinal preorder of) G. Therefore D(G) >_ D(G[X]) and in particular
D(G) >_ max(D(G[C]), D(G[Q])). On the other hand, no antichain of G can meet both C and Q, since every vertex of C is comparable to every vertex of Q. Hence
D(G) < max(D(G[C]), D(G[Q])). If T is a spanning threshold subgraph of G and G[X] is an induced subgraph of G, then T[X] is a spanning threshold subgraph of G[X]. Therefore t(G) >_ t(G[X]), in particular t(G) >_ On the other hand, if Tc is a spanning threshold subgraph of G[C] and T o is a spanning
11.4
Matrogenic Sequences
303
threshold subgraph of G[Q], then the spanning subgraph of G consisting of the edges of Tc U TQ together with all the edges of G[K] and all the edges of G joining C to K is a threshold subgraph of G. This can be easily verified by noting that no alternating 4-cycle of this subgraph can meet both C and Q. If we apply this fact to a minimum collection of spanning threshold subgraphs of G[C] covering its edges and similarly for G[Q], we see that
t(G) <_ max(t(G[C]), t(G[Q])).
..
To apply Theorem 11.3.10, we need to know the threshold dimension and the Dilworth number of cores and split matrogenic graphs. It is easy to see that D(Ps) = 5, D(mK2) = D(mK2) = m and t(Ps) = 3. Split matrogenic graphs are matroidal and their threshold dimension is given in Theorem 11.2.27. Their threshold vertices are comparable with every vertex and therefore can be dropped without changing the Dilworth number, and we remain with the problem of the Dilworth number of a cell graph. Since vertices of different cells are comparable, the Dilworth number of a cell graph is the maximum of the Dilworth numbers of its cells. A cell is a net or a net-complement of order p, and it is easy to see that its Dilworth number is p.
11.4
Matrogenic Sequences
In this section we present some results of Marchioro et al. [MMPS84] characterizing the degree sequences of matrogenic graphs, called matrogenic sequences. Since matroidal graphs differ from matrogenic graphs only by the fact that their core cannot be a chordless pentagon, the results characterize degree sequences of matroidal graphs as well. Our task is simplified by the following result. 11.4.1 Every matrogenic sequence is unigraphic, i.e., all its realizations are isomorphic.
Theorem
P r o o f . We assume that G is matrogenic and H has the same degree sequence as G, and show that G and H are isomorphic. We may assume without loss of generality that G and H are graphs on the same vertex set. Then by Corollary 3.1.11, H can be obtained from G by a sequence of transfers. We may therefore assume that H is obtained from G by a single transfer, namely that G has an alternating 4-cycle with edges AB, CD and nonedges AC, BD, and H is obtained from G by dropping edges AB, CD and adding edges AC,
304
Matroidal and Matrogenic Graphs
B D . The required isomorphism from G to H simply exchanges A with D and fixes every other vertex. Showing that it is indeed an isomorphism is equivalent to showing that if X is a fifth vertex, then X A and X D are either both edges or both nonedges of G. This holds, for otherwise G contains the configuration ~ (Definition 11.2.1), contrary to Theorem 11.3.2. 9 As an aid in describing the structure of matrogenic graphs, we now introduce a graph operation of Tyshkevich and Chernyak [TC853], which is used extensively in Chapter 17.
Definition 11.4.2 Let G = G ( K , S ) be a split graph with a clique K and a stable set S, and let H be a graph disjoint from G. The c o m p o s i t i o n G @ H of G and H is the graph obtained by taking G U H and joining every vertex of H to every vertex of K . In Chapter 13, we give a slightly more general definition of graph composition. As we saw in Section 11.3, a matrogenic graph has the form G ( K , S ) Q C, where G is a matrogenic split graph with a clique K and a stable set S, and C is a core, namely a perfect matching or a complement of a perfect matching or a chordless pentagon. Conversely, every such graph is matrogenic. This reduces the problem of studying the structure of matrogenic graphs to the one for split matrogenic graphs. Since a split matrogenic graph is also matroidal, its structure has been determined in Section 11.2, namely it consists of a cell graph and threshold vertices connected to it according to Theorem 11.2.24. That theorem assumed as given the structure of the cell graph and of the threshold graph, and was concerned with the edges connecting them. Here we reformulate this result to describe the overall structure of split matrogenic (equivalently split matroidal) graphs. T h e o r e m 11.4.3 Let G = G ( K , S ) be a split graph with a clique K and a stable set S. Then G is matrogenic if and only if K tO S partitions into disjoint sets C 1 , . . . , Cq, called c h a m b e r s , such that 1. each chamber Ci satisfies one of the following: (a) it induces a net or a net-complement (Definition 11.2.10) with internal vertices Ii = Ci N I( and external vertices Ei = Ci N S, in which case it is called a cell c h a m b e r ; (b) it is contained entirely in K , in which case it is called a clique chamber:
11.4
Matrogenic Sequences
305
(c) it is contained entirely in S, in which case it is called a s t a b l e chamber; 2. for i 7/= j, a vertex of Ci N S is adjacent to a vertex of Cj N K if and only if i < j. When G is matrogenic, the threshold vertices of G are the vertices of the clique and stable chambers, and the vertices of the cell chambers of G induce a cell graph as in the end of Section 11.2. P r o o f . "If"" Assume that G satisfies the conditions in the theorem. We assert that the threshold vertices of G are precisely the vertices of the clique and stable chambers. Clearly, if a chamber induces a net or a net-complement, then its vertices belong to couples and are not threshold vertices. Conversely, consider an alternating 4-cycle of G with vertices x E Ci N S, y E Cj N K, z E Ck n K, u E Cl n S, edges xy, zu and nonedges xz, yu (since G is split, every alternating 4-cycle has this form). Assume that, if possible, Ci c_ S. Then i :fi j, k, hence by Condition 2, k < i < j. But the edge and nonedge at u imply that j _< l _< k, a contradiction. Similarly Ci c_ K leads to a contradiction, proving that Ci is a cell chamber. Dropping the threshold vertices from G cannot affect the matrogenic property, but the resulting graph is a cell graph and is therefore matroidal and matrogenic. Therefore G is matrogenic. " O n l y if"- If chambers Ci and Ci+I a r e both clique chambers or both stable chambers, we may merge them into one chamber without affecting the validity of Conditions 1 and 2. We always assume that this has been done whenever possible. We say that cell chambers C~ and C~ with r < s are consecutive when C ~ + I , . . . , C~-I are not cell chambers, and therefore are alternately clique and stable chambers. This terminology is extended to the case that r - 0 and C~ is the first cell chamber, or s - q + 1 and C~ is the last cell chamber. We prove that Conditions 1 and 2 hold by induction on the number of threshold vertices of G. If G has no threshold vertices, then it is a cell graph and the conditions are clearly satisfied. For the induction step, we assume that G satisfies our conditions and we add to it another threshold vertex x, and show that the resulting graph G ~ still satisfies the conditions. We assume without loss of generality that x is added to S (otherwise work with the complementary graph). Note that if x is adjacent to some vertex of Ii, then it is adjacent to all vertices of Ii, for otherwise x belongs to an
306
Matroidal and Matrogenic Graphs
alternating 4-cycle. For the same reason, x is not equivalent (under the vicinal preorder) to any vertex of Ei. If x is equivalent to some vertex of a stable chamber Ci, then G' satisfies our conditions with the new chambers C I , . . . , C i _ I , Ci u { z } , C i + l , . . . , Cq,
and we are done. Therefore we may assume that x is not equivalent to any vertex of S. Since x is comparable with every vertex of S, there exist consecutive cell chambers C~ and C~ such that
Er~..x~-E ~. It follows t h a t x is adjacent to every vertex of Ci VI K for i >_ s and to no vertex of Ci fl K for i _< r. We now compare x with the stable chambers between Cr and Cs. Since the chambers between Cr and Cs are alternately stable and clique chambers, and since x is not equivalent to any vertex of S, the typical case is that there exists an index j with r < j - 1 < j + 1 < s such t h a t Cj-1 and Cj+I are stable chambers and Cj_ 1 ~ x ~ Cj+l.
(If one or both of Cj-1 and Ci+I is missing, the a r g u m e n t is similar.) It follows t h a t x is adjacent to all the vertices of the clique chambers Ci for i > j + 1 and to no vertices of the clique chambers Ci for i < j - 1. There remains the question of the adjacencies between x and the vertices of Ci. Put - Cj n N ( x ) - Cj n N ( x ) . Both sets C~ and Cy are not empty, for otherwise x would be equivalent to the vertices of Cj-1 or Cj+I. It now follows that G' satisfies Conditions 1 and 2 with the new chambers C1,...,~-I,C],{x],~t,G+I,...,Cq,
as required. 9 We now give an explicit characterization of the degree sequences of BT graphs and matrogenic split graphs. Recall the definitions of the conjugate sequence d*, corrected Ferrers diagram C(d), corrected conjugate sequence d' and corrected Durfee n u m b e r m of a proper sequence d = ( a l l , . . . , dn) from Definitions 3.1.5 and 3.1.6. We use the notation /xk - d~ - dk.
11.4
Matrogenic Sequences
307
Theorem 3.2.2 characterized the threshold sequences d by the property Ak -0 for k - 1 , . . . , n. Recall that the boxes of a graph are the maximal sets of vertices with the same degree. In analogy we say that the boxes of a proper sequence dl >_ ... >_ dn are the maximal sets of indices i over which di is constant. The following theorem generalizes Theorem 3.2.2 in characterizing the BT sequences. Theorem only if
11.4.4 A proper sequence d with boxes B 1 , . . . , B ~
is B T if and
Ai - O for k - 1 , . . . , r. iEBk
P r o o f . Let C - C(d) be the corrected Ferrers diagram of d. The supplierspriority flow for the symmetric transportation network associated with d, as defined in (10.3), is given by Ckl -
and consequently, for k k
E E Cij , iEBk jEBl
1 , . . . ,r,
qSk, -
l=l
E di iEBk
~ l=l
(11.7)
gPlk -- E d:. iEBk
The expression ~i~__1Ckt is equal to the k-th component ak of the supply vector. According to Theorem 10.3.2, d is BT if and only if r satisfies the demands (which are equal to the supplies), that is, if and only if ~t~_-i Ctk - ak for k = 1 , . . . ,r. By (11.7), this is equivalent to ~ i e B k ( d i - d}) = 0 for all k, which is the condition of the theorem. 9 In order to characterize split matrogenic sequences, we need the next two lemmas.
L e m m a 11.4.5 Then
Let G
be a
graph with degree sequence
d -
1. for n > 4, G is a net if and only i f n is even and
A(d)where u - n / 2 ;
( u - - 1, (--1)~'-1, u - 1, (--1)~'-1),
(dl,...,dn).
308
Matroidal and Matrogenic Graphs
2. f o r n > 4, G is a net-complement if and only if n is even and A(d)-
(1 " - '
1-
u, 1 u-1 1 - u)
where u - n/2; 3. for n >_ 2, G is a matching if and only if A ( d ) - (n - 2, 0, ( - 1 ) ~ - 2 ) ;
~. for n > 2, G is the complement of a matching if and only if A ( d ) - (1 n - 2 , 0 , 2 - n);
5. G is a pentagon if and only if
zX(d) - (2, 2, O , - 2 , - 2 ) . P r o o f . To save work, n o t e t h a t C o n d i t i o n 1 is e q u i v a l e n t to C o n d i t i o n 2, a n d C o n d i t i o n 3 is e q u i v a l e n t to C o n d i t i o n 4. Indeed, it is easy to verify t h a t A for t h e c o m p l e m e n t a r y g r a p h G is o b t a i n e d f r o m A for G by n e g a t i n g its c o m p o n e n t s a n d reversing t h e i r order. T h e "only if" p a r t of t h e l e m m a is verified by s t r a i g h t f o r w a r d checking. We prove t h e "if" p a r t s of C o n d i t i o n 1, C o n d i t i o n 3 a n d C o n d i t i o n 5. C o n d i t i o n 1" 1. F r o m t h e f o r m of A, Am is u - 1 or - 1 . In t h e first case we have d m - d'~ - Am - ( m - 1) - (u - 1) _< m - 2, c o n t r a r y to t h e definition of rn. T h e r e f o r e A,~ - - 1 a n d c o n s e q u e n t l y dm - m . 2. If m - n, t h e n A is t h e zero sequence, c o n t r a r y to a s s u m p t i o n . T h e r e fore m < n a n d therefore - 1 - A,~ - d~_ 1 - d n , hence dn _> 1 a n d d~ _> 1. F r o m u - 1 - A1 - d~ - dl - 1 we o b t a i n dl - u a n d t h e r e f o r e :r
~
du+ 1 -
.
.. = dn_ 1 - 0.
3. B y 1 above dm - rn, a n d t h e r e f o r e d~n_ 1 >_ rn. H e n c e by 2, r n - 1 _< u. B u t m c a n n o t be u + 1, since by 1 we have Am - - 1 5r u - 1 - A , + I . T h e r e f o r e m < u.
11.4
Matrogenic Sequences
309
4. F r o m 3 we h a v e - 1 -
A.+I
-
d; - d,+l
-1
-
A,+2
-
d~,+l-du+2
-1
-
A~
-
d;_~-dn.
T h e n f r o m 2 we h a v e du+2 = ".. = dn - 1 a n d 1 _< d , + l - d; - u + 1. F r o m t h e l a t t e r e q u a t i o n we d e d u c e t h a t d; _> u a n d t h e r e f o r e d~ _> u. B u t f r o m 2 we h a v e u - dl >_ d,. T h e r e f o r e d. - u. 5. Since d~ - u, we have m >_ u by definition of m , b u t by 3 we h a v e m _< u. T h e r e f o r e m - u. H e n c e by definition of m d , + l < L,, f r o m w h i c h it follows t h a t d; <_ u. B u t by 4 d; >_ u, a n d so d; - u. T h e first e q u a t i o n of 4 now i m p l i e s t h a t d,+l - 1. 6. T h u s d has r e m 5.4.4, it u v e r t i c e s of a s t a b l e set. u, G is a net
b e e n c o m p l e t e l y d e t e r m i n e d as d - (u ", 1~). B y T h e o follows now t h a t G is a split g r a p h . Since m - u, t h e first G f o r m a m a x i m a l clique, a n d so t h e last u v e r t i c e s f o r m Since t h e last u degrees are 1 a n d t h e first u degrees are of o r d e r u.
Condition a: We h a v e n - 2 - / ~ 1 - d~ - d 1 ~ (?% - 1) - 1. It follows t h a t d~ - n - 1 a n d dl - 1, a n d t h e r e f o r e d - (1 ~) a n d G is a p e r f e c t m a t c h i n g . Condition 5" W e h a v e 2 AI - d ~ - dl. If d 1 - 3 a n d dl - 1, t h e n d - (14, 0), w h i c h gives t h e w r o n g A. T h e only o t h e r p o s s i b i l i t y is d~ - 4, dl - 2. F u r t h e r m o r e , 2 - /k2 d ~ - d2. If d~ - 3 a n d d2 - 1, t h e n we would h a v e t h e a b s u r d d3 > d2. T h e only o t h e r p o s s i b i l i t y is d~ - 4, d2 - 2. T h i s d e t e r m i n e s d as d - (2s), a n d t h e r e f o r e G is a p e n t a g o n . 9 1 1 . 4 . 6 Let G ( K , S ) be a split graph with a clique K , a stable set S, and a proper degree sequence da. Let H be a graph with a proper degree sequence dH. Then the A sequence of G (9 H is given by
Lemma
A - (AK, AH, As), wh e re
A.As
-
k-tKI (/Nk+l(dG),.
. ., /Xk+s(dG)),
-
I 1"
Matroidal and Matrogenic Graphs
310
P r o o f . Put d = dH, e = da, f = da| diagram of e is given by
Since G is split, the corrected Ferrers
-IkQ 0s) where Jk is the all-1 matrix and Ik is the identity matrix of order k, O~ is the all-O matrix of order s, P is k x s, and Q is s x k. On the other hand, the corrected Ferrers diagram of f is given by
C(f) =
(
Jk--Ik
Jkx~
P
)
C(d)
Q
0~•
,
0~
where J, I and 0 are all-l, identity and all-O matrices of the indicated orders, respectively, and n = Iv(g)l. From the structure of C ( f ) , it is apparent that !
!
9 for i - 1 , . . . , k, f[ - fi - ei + n - ei - n - e i - ei; 9 fori-k+l
,..., k+n,
f" . fi . n + d.~ _ k -.n
9 fori-k+n+l,...,k+n+s,f[-fi-ei_
di-k
' k - di-k ; di_
-ei-~.
If d is a proper sequence with boxes B I , . . . , Br and a A sequence A = A(d), we denote by ABk the subsequence of A corresponding to the box Bk. We call a p r i m i t i v e sequence of length p (not necessarily a prime) a sequence of length p of the following types: (p-1,-1,...,-1),
(1,...,1, I-p),
(0,...,0).
We are now ready for the characterization of matrogenic split sequences. T h e o r e m 11.4.7 A proper sequence d is the degree sequence of a m a t r o g e n i c split graph if and only if all its ABk are p r i m i t i v e sequences and 1. the n u m b e r q of non-zero p r i m i t i v e sequences is even; 2. f o r k = 1 , . . . , q/2, the k-th and ( q - k ) - t h are equal.
non-zero p r i m i t i v e sequences
11.4
Matrogenic Sequences
311
P r o o f . " I f " : Let G be a realization of d = (dl,. 9 dn) with boxes B 1 , . 9 9 , B r and A = Aa. The graph G is BT by Theorem 11.4.4, since the sum of the elements of every primitive sequence is 0. We use induction on r, the number of boxes of G. If r = 1, then A = 0 by Condition 1. Hence G is threshold and thus matrogenic split. For the induction step, we distinguish three cases: C a s e 1: G has dominating vertices (dl = n and S = 0. C a s e 2: G has isolated vertices (d~ = 0).
1). In this case, let K = B1
In this case, let K = O and
S=B~. C a s e 3: G has no dominating and no isolated vertices. K = B1 and S = B~.
In this case, let
In Case 3, B~ must be stable, otherwise by the BT property the vertices of B1 would be dominating in G. Similarly, each vertex of B~ has some neighbors in B1, otherwise the vertices of B~ would be isolated in G. Therefore B1 is a clique. Moreover, each vertex of B2 U ... U B~-I is adjacent to each vertex of B1 and to no vertex of B~. In all cases, the subgraph induced by K U S is a split graph G'(K, S), and if H denotes the subgraph induced by v(a)-v(a'), then G = G'(I'(,S)QH. Hence A = (AK, AH,/kS)
by Lemma 11.4.6. In Case 1, AK = 0 since the vertices of K are dominating, and As is empty, hence AH satisfies the conditions of the theorem. Similarly in Case 2, AK is empty and As = 0, and AH satisfies the conditions of the theorem. In Case 3, AK and As are not equal to the zero sequence as B1 and B~ are neither completely connected nor completely disconnected. Hence by Condition 2, Air = As, and again AH satisfies the conditions of the theorem. Since in Case 3 AK and As are equal primitive sequences, G' is a net or a net-complement (or a graph on two vertices) by Lemma 11.4.5. In all cases, H is a split matrogenic graph by the induction hypothesis, and hence G is split matrogenic by Theorem 11.4.3. " O n l y if"" Let G be matrogenic split with boxes B , , . . . , B~. We use induction on r. If r = 1, G must be complete or edgeless, hence A is the zero sequence. For the induction step, we have by Theorem 11.4.3 that G = G' @ H, where H is again a matrogenic split graph and G'(K, S) is a
312
Matroidal and Matrogenic Graphs
split graph which is (a) a complete graph or ( b ) a n edgeless graph or (c) a net or (d) a net-complement. By Lemma 11.4.6, A = (A/,-, AH, As), where in Case (a) As is empty and A/s- = 0, and in Case (b) A/,- is empty and As = 0. By Lemma 11.4.5, both A/s- and As are primitive sequences and if both are non-zero, they are equal. Moreover, in Case (a) in Case (b) B1 U B~, in Case (c)or (d).
B1, v(a')
-
B,,
The result then follows by induction.
Chapter 12 Domishold Graphs 12.1
Introduction
Recall from Definition 9.1.3 that a dominating set of a graph G = (V, E) is a subset S of V such that every vertex not in S has a neighbor in S, and that the domination number 7(G) of G is the size of a smallest dominating set of G. We have seen in that section that the domination number is bounded above by the Dilworth number. Also recall that the threshold graphs are defined as the graphs for which the characteristic vectors of the stable sets are separated from the characteristic vectors of the nonstable sets by a hyperplane. In a similar spirit Benzaken and Hammer [BH78] introduced the domishold graphs as the graphs for which the characteristic vectors of the dominating sets are separated from the characteristic vectors of the nondominating sets by a hyperplane. They characterized the domishold graphs and showed that the threshold graphs form a proper subclass of domishold graphs. They also introduced the concept of domistable graphs. Later, Payan [PayS0] introduced a class of equidominating graphs, and Cherynak and Chernyak [ccg0], introduced a class of graphs called pseudodomishold graphs. We study these results in this chapter. In addition, some enumeration problems and other characterizations of domishold graphs are discussed in Chapter 13.
12.2
Notation and Main Results
We begin with the definitions of domishold graphs and domistable graphs. 313
314
Domishold Graphs
1. A graph G - (V, E) is called a d o m i s h o l d g r a p h if there exist a positive real-valued function w on V and a real 0 such that for all S C V,
D e f i n i t i o n 12.2.1
S is dominating if and only if
>_ o. xES
2. A d o m i s t a b l e g r a p h is a graph all of whose minimal dominating sets
are stable sets. 3. A graph G - (V, E) is called e q u i d o m i n a t i n g if there exist a positive integer-valued function w on V and a positive integer 0 such that for all Q c_ V, Q is a minimal dominating set if
only if
w(x) -- 0 xEQ
Clearly, in the definition of domishold graphs one can assume without loss of generality that w and 0 are positive integers. We refer to w(x) as the weight of x and to 0 as the threshold value. The domishold graphs and the domistable graphs were defined in [BH78] and the equidominating graphs were defined in [PayS0]. The results and concepts in this section are from [BH78]. As usual, N(x) denotes the neighborhood of vertex x and we put M(x) = V - ( N ( x ) U {x}). a stable dominating pair is a set of two nonadjacent vertices each of which is adjacent to every other vertex. Let Sk denote an edgeless graph on k vertices, Kk denote a complete graph on k vertices, and J2k denote the complement of a perfect matching on 2k vertices (kK2). The graph J2k is called a cocktail-party graph. We write Q d o m G to indicates that Q is a dominating set of G. Let us now define a binary relation ~d on the vertex set V of G as follows" D e f i n i t i o n 12.2.2 For x, y E V, x Ld Y if and only if for all Q c V - { x , y}, (Q u {y}) dom G ~ (Q u {x}) dom G. L e m m a 12.2.3 The relation ~d is reflexive and transitive, i.e., it is a preorder.
P r o o f . The reflexivity is obvious. To prove the transitivity, we assume that i, j, k are distinct, i ~e j and j ~d k, and show that i Ld k. Let Q c_ V - { i , k}
12.2
315
Notations and Main Results
be such that ( Q U { k } ) d o m G . I f j ~ Q, t h e n Q U { j } ) d o m G a n d h e n c e (Q u {i}) dom G. If j C Q, put Q' = Q - j. Then Q u {k} = ( ( Q ' u {k}) u {j }) dom G, and hence ((Q'u { k}) U {i}) dom G, and the latter set contains k but not j. So ((Q'U {j}) u {i}) = Q u {i} dom G. Hence i ~d k. 9 In view of Lemma 12.2.3, the relation ~d is called the dominal preorder of G. We now state the main result of this section. T h e o r e m 12.2.4 For every graph G equivalent:
(V, E), the following conditions are
1. G is domishold; 2. the dominal preorder ~d is linear; 3. G can be built from the empty graph by repeated application of the operation G' ~ G", where G" = (G' U S;) | Kq | J2~ and p + q + r > O; in other words, G can be obtained from an empty graph by repeatedly adding an isolated vertex, a dominating vertex, or a stable dominating pair; ~,. V can be partitioned into sets 1/1, 1/2 and 1/3 inducing the graphs SIVll, KIV21, Jig31 respectively, with the following properties: (a) each vertex in 1/2 is adjacent to each vertex in 173; (b) for each i E Vx, g ( i ) N V3 induces a cocktail-party subgraph of G; (c) the neighborhoods of the vertices of V1 are nested; 5. G can be obtained from some threshold graph with split partition (K, S) by substituting cocktail-party graphs for some vertices of K; 6. the graphs of Figure 12.1 are not induced subgraphs of G. Proof. 1) =v 2): It is enough to show that for every two vertices x, y with w(x) > w(y), we have x ~d Y. This is indeed the c~se, since for every
QcV-{x,y}, Q u {y} dom G ==~w(Q) -4- w(y) >_ 0
w(Q) + w(x) > 0 :=~ Q u {x} dom G, where w(Q) - EzeQ w(z). 2) =V 3)" First we show that if x is any maximal vertex in the linear order
Domishold Graphs
316
Figure 12.1" The forbidden induced subgraphs of domishold graphs.
H1
Ha
H2
H4
Hs
~d, Q is any maximal stable set, and x ~ Q, then x is adjacent to every vertex in Q. Since Q is a maximal stable set, Q dom G. Now for every y C Q, Q = ((Q - y ) u {y}) dom G and hence ((Q - y ) u {x}) dom G, since x ~d Y. But the only neighbor of y in ( Q - y ) u {x} is x. Thus x is adjacent to y, as required. We now show that G contains an isolated vertex, a dominating vertex, or a stable dominating pair. The result then follows by induction since removing isolated vertices or a dominating set preserves Condition 2, as is easy to verify. Assume that G contains no isolated vertex or dominating vertex. Let x be a maximal vertex in ~d and y C M(x) (y exists since x is not dominating). We show that X(y) = N(x). Suppose that, if possible, zx C E and zy q~ E. Extend {y, z} to a maximal stable set Q, which will not contain x. Then, as shown above, x is adjacent to every vertex in Q, contradicting xy ~ E and y C Q. This shows that N(x) C_ N(y). It follows that y is also a maximal vertex in Le and hence, by symmetry, N(y) C_ N(x). It follows that every vertex in M(x) has the same set of neighbors as x. Thus if z C N(x) (z exists since x is not isolated), then {z, y} dom G and hence {x, y} dom G as x is a maximal vertex. Thus G has a stable dominating pair {x, y}, as required. 3) =~ 4): Let Go,..., Gt be a sequence of graphs with Go = 0, Gt = G and
G~+I - (G~ u Sp,) | Kq, @ &~,,
i-O,...,t-
i.
12.2
Notations
and
Main
317
Results
Putting i
i
i
and using an easy induction, we see that this partition has the desired property. 4) =~ 5)" Identify each vertex of V3 with its unique nonneighbor in V3 to obtain a clique V~. The resulting graph is clearly a threshold graph with split partition (1/2 U V3', 1/1), 5) =~ 6)" The graphs of Figure 12.1 are not threshold graphs, nor do they contain a stable dominating pair. Hence they cannot be obtained from a threshold graph by substituting cocktail-party graphs for some vertices in the clique. The result now follows since if G satisfies Condition 5, so does every induced subgraph of G. 6) => 3)" It is enough to show that G contains an isolated vertex, a dominating vertex, or a stable dominating pair. If G is not connected, then G contains isolated vertex since H1 is forbidden. So assume that G is connected. Then by a well-known result about P4-free graphs (Lemma 14.3.6), G is not connected since H2 is forbidden. If a connected component of G has one vertex, then it is a dominating vertex in G, and if it has two vertices, then they form a stable dominating pair in G. Otherwise, G contains two components, each with at least three vertices. Let xl, x2, x3 be vertices of a component such that x2 is adjacent to the other two. Similarly, let yl, y2, y3 be vertices of another component with y2 adjacent to the other two. Then, depending on the adjacency between xl and x3 and between yl and y3, G contains Ha,/-/4 or Hs as an induced subgraph, a contradiction. 3) =~ 1)" The empty graph is obviously domishold. Assuming that G' = (G u Sp) | Kq @ J2r and that G is domishold, we show that G' is domishold too. Let wl represent the weight of each 1 E V(G), and 0 the threshold for G. Let w* - mint wt/2. We may assume that 2w* < 0, since otherwise G is a clique, and we can change all weights wt for 1 C V(G) as well as 0 into 1 to achieve2w* < 0. Let us also put W - 1 + ~ t e y ( a ) wl and let us define 0 ~ 0 + p W and
i , wi -
W 0 + pW O+pW-w*
v(G),
iESp, i E Kq, i G J2~.
318
Domishold Graphs
The weights w~ and the threshold O' characterize the dominating sets of G'. Indeed, every minimal dominating set D' of G' is of one of the following three forms: 1. D ' = {k}, k e Kq; 2. D' = { x , y } , x C J2r, x r y, y C J2,. U Sp t2 V(G);
3. D' = D tO Sp, where D is a minimal dominating set of G. It is straightforward to verify that these are also precisely the minimal sets Q' of G' satisfying w'(Q') > 0'. tt Since each of Ha,//4, Hs of Figure 12.1 contains an induced 6'4, it follows that all threshold graphs are domishold graphs. The next theorem gives other characterizations of threshold graphs among the domishold graphs. T h e o r e m 12.2.5 For a domishold graph G, the following conditions are equivalent: 1. G is a threshold graph; 2. G is a C4-free graph; 3. G is a split graph; .~. G is an interval graph; 5. G is a domistable graph.
P r o o f . 1) =~ 2,3,4,5): This follows from Theorem 1.2.4 characterizing threshold graphs, Theorem 2.1.6 characterizing interval graphs, and the fact that a minimal dominating set of a threshold graph considered as a split graph G(K, S) is S itself or consists of one vertex from K and all its nonneighbors in S. 3) =~ 2): This follows from Theorem 5.2.1. 4) =~ 2): This follows from Theorem 2.1.6. 5) =~ 2): Since G is a domishold and domistable graph, it must contain a dominating vertex or an isolated vertex (otherwise, as in the proof of 3) =, 4) in Theorem 12.2.4, if x is any maximal vertex with respect to the dominal preorder, y C M ( x ) and z C N(x), then {y, z} is a minimal dominating set that is not stable). Delete any dominating or isolated vertex from G, and the
12.2
Notations and Main Results
319
resulting graph is clearly again a domistable and domishold graph. Hence this process can be repeated until all the vertices are removed. Since no vertex of an induced C4 can become isolated or dominating, it follows that G is C4-free. 2) => 1): This follows from Condition 6 of Theorem 12.2.4 and Condition 2 of Theorem 1.2.4. 9 A linear inequality n
E
WiXi ~__ 0
i=1
with Wl >_ " " >_ Wn > 0 is called domigraphic if W l , . . . , w ~ are weights and 0 is a threshold of a domishold graph. The condition n
y~'~wi >__O i=1
is obviously necessary for the inequality to be domigraphic since V(G) is a dominating set. In the case n - 1, it is sufficient too. For n - 2, this condition and w2 < 0 => wl < 0 are again sufficient. The following theorem gives a recursive characterization of domigraphic sequences for n >_ 3. Theorem
12.2.6 A linear inequality n
E wixi >_ 0 i=1
with W 1 ~ " ' " ~___W n > 0 and n >_ 3 is domigraphic if and only if one of the following conditions holds: 1.
W 1 ~
0 and ~i~2 wixi >_ 0 is domigraphic;
2. w~ < O, E ~ 2 wi < 0 and ~i~2 wixi >_ 0 - Wl i8 domigraphic; 3. Wl < O, W 1 -~- W2 ~__ 0 and ~i~3 wixi >_ 0 is domigraphic. P r o o f . Let the inequality ~-~iL1W i X i ~-- 0 be domigraphic and let G be the associated graph. Let x be a maximal vertex of the dominal preorder. Without loss of generality, we may assume that w(x) - w I (&s in the proof of 1) => 2) of Theorem 12.2.4). If x is dominating, then Condition 1 is satisfied. If x is isolated, then Condition 2 is satisfied. If G has no isolated or dominating vertex, then there exists another maximal vertex y such that {x, y} is a stable
Domishold Graphs
320
dominating pair (as in the proof of 2) ~ 3) of Theorem 12.2.4). Without loss of generality, we may assume that w(y) = w2. Then Condition 3 is satisfied. Conversely, suppose one of the Condition 1 - Condition 3 is satisfied. Let G' be the domishold graph associated with the domigraphic inequality in each case. Then, clearly, the linear inequality of the theorem corresponds to a domishold graph obtained from G' be adding an isolated vertex (Condition 2), or a dominating vertex (Condition 1), or a dominating stable pair (Condition 3). "
12.3
Equidominating Graphs
Payan [PayS0] defined equidominating graphs as follows: D e f i n i t i o n 12.3.1 A graph G = (V, E) is said to be e q u i d o m i n a t i n g when there exist a weight function w: V ~ Z + U {0} and a number t E Z + U {0} such that for every S C_ V, S is a minimal dominating set ~
~
w(x)-
t.
xES
The class of equidominating graphs neither includes nor is included in the class of domishold graphs. As evidence, observe that 2K2 is an equidominating graph but not a domishold graphs. To see that it is equidominating assign a weight of 1 to each vertex of one edge and a weight of 2 to each vertex of the other edge, and let t = 3. From Theorem 12.2.4, 2K2 is forbidden for domishold graphs. On the other hand, K2,z is a domishold graph (Theorem 12.2.4), but not an equidominating 'graph. To see this, let (A, B) be the bipartition of K2,3 into stable sets with ]A I = 2. Then A and any pair {x, y} with x C A and y C B are minimal dominating sets, and hence every vertex should receive the weight t/2. But then B is a minimal dominating set with total weight exceeding t. The following theorem characterizes the equidominating graphs that are also domishold graphs. T h e o r e m 12.3.2 ([Pay80]) The following conditions are equivalent for every graph G: 1. G is both a domishold graph and a equidominating graph;
12.3
Equidominating Graphs
321
2. G has weights and threshold that characterize simultaneously the dominating sets by inequality and the minimal dominating sets by equality; 3. G can be built from the empty graph or from a cocktail-party graph (the complement of a perfect matching) by repeatedly adding an isolated vertex or a dominating vertex; ~. G has no induced graph isomorphic to H i , . . . , H4 of Figure 12.2.
Figure 12.2: The forbidden induced subgraphs for domishold and equidominating graphs.
H1
H2
H3
H4
P r o o f . 2) =~ 1)" This is obvious. 1) =~ 3)" We proceed by induction on IV(G)]. Let G - (V, E) be a domishold graph with weight function w~ and threshold t~, as well as an equidominating graph with weight function w~ and threshold t~. By Theorem 12.2.4, G has an isolated vertex, a dominating vertex, or a stable dominating pair. C a s e 1" G has an isolated vertex x 9 For i - 1, 2, let WG_ ~ x be the restriction of w~ to G - x, and let t ia_~ - t ~ - wb(x). It is easy to check that G - x is domishold and equidominating with these modified weights and thresholds. Hence by induction G - x satisfies Condition 3, and so G does too. C a s e 2: G has a dominating vertex x. The argument is similar to Case 1 with t~_~ - t~. C a s e 3" G does not have an isolated or a dominating vertex, but has a stable dominating pair x, y. Observe that a set S C V(G) is a minimal dominating set of G if and only if S is a minimal dominating set of G - {x,y}, or S - {x,y}, or for some v e V ( G ) - {x,y}, S - {x,v} or 5' - {y,v}. Since we m a y assume that IV(G)I >_ 3, it follows that w~ - t2c/2. Hence S is a minimal dominating set of G if and only if ISI - 2. We assert that G is a cocktail-party graph. Since every two vertices of G form a dominating set, G does not contain any induced K1 tO K2 or an i n d u c e d / 3 . Hence G does not contain any isolated vertices or induced K1,2 or induced K3. Therefore every 9
322
D o m i s h o l d Graphs !
q
connected component of G has exactly two vertices, and hence G forms a perfect matching, and G satisfies Condition 3. 3) =~ 2)" The empty graph trivially satisfies Condition 2 with null w a and ta - O. The cocktail-party graph satisfies Condition 2 with wa - 1 and to - 2. Assume now that x is an isolated or dominating vertex of G such that G - x satisfies Condition 2 with weights wa-~ and threshold t a - ~ . Then we obtain wa and ta as follows: 9 If x is an isolated vertex, then S is a minimal dominating set of G if and only if x 6 S and S - {x} is minimal dominating set of G - x. We then set for all v 6 V -
wa(v)
--
wa_~(v)
wa(x)
=
y~ wa_~(v) + 1 - ta_~ v~V-{~}
ta
=
E w a - x ( v ) + 1. v~V-{~}
{x}
9 If x is a dominating vertex, then S is a minimal dominating set of G if and only if S - {x} or S is a minimal dominating set of G - x. Then we set for a l l v C V - { x }
-
a(x)
-
ta_
ta
--
tG-x.
In each case it can be verified that G is both a domishold graph and a equidominating graph with weights wa and threshold ta, and hence condition 2 is satisfied. 3) =~ 4)" This follows from the fact that the graphs H 1 , . . . , / / 4 neither are cocktail-party graphs nor do they contain isolated or dominating vertices. 4) =~ 3)" Assume that G contains no induced subgraph isomorphic to the graphs of Figure 12.2, and assume further that G contains no isolated or dominating vertices. We complete the proof by showing that G must be a cocktail-party graph. G is connected, for otherwise G contains HI. Hence by a well-known result about P4-free graphs (Lemma 14.3.6), G is not connected since G is H2-free. Each connected component of G has at least two vertices since G has no dominating vertices. If each component of G has exactly two
12.4
P s e u d o d o m i s h o l d Graphs
323
m
vertices, then G is a cocktail-party graph, as required. Otherwise, G has a component with at least two vertices Xl,X2 and another with at least three vertices yl, y2, y3 such that Y2 is adjacent to both yl and y3. But then, depending on whether or not 91 and y3 are adjacent, these five vertices induce Ha or//4 in G, a contradiction. .. The following corollary follows from Condition 3 or 4 of Theorem 12.3.2.
Corollary 12.3.3 The threshold graphs are equidominating (and domishold).
12.4
P s e u d o d o m i s h o l d Graphs
Chernyak and Chernyak [CC90] call a graph G - (V, E) a pseudodomishold graph if there is a function w" V , R + U {0}, w ~ 0, and a nonnegative real t such that for every S c_ V, SdomG
?, ~ w( x ) >_t xES
--(SdomG)
:, ~ w ( x ) <_t. xES
If one of the inequalities above were replaced with a strict inequality, we would have the definition of a domishold graph. Unfortunately, an induced subgraph of a pseudodomishold graph need not be a pseudodomishold graph. This makes the problem of characterizing pseudodomishold graphs a difficult task. Instead, the authors of [CC90] investigated the hereditary pseudodomishold (HP) graphs, namely the pseudodomishold graphs all of whose induced subgraphs are pseudomishold as well. These authors characterized the HP graphs in terms of the composition of the simplest components and by forbidden induced subgraphs. They used this characterization to estimate the number of n-vertex HP graphs, and compare these estimates with estimates of the number of n-vertex domishold graphs. We report their results without proofs in this section. It can be verified from the characterization below that the class of HP graphs strictly includes the class of domishold graphs. We need the following notations. Let M be the class of all graphs H such that either each component of the complement H is a path or a cycle, or H is a Ps. A graph G together with a partition (A,B) of V(G) is denoted by
324
Domishold Graphs
G[A, B]. If G is an edgeless graph on a set V of n vertices, then Q~ denotes G[V,O]. If G is a graph on a set V of a single vertex, then 01 denotes G[O, V]. If G = P4, then we consider P4 as G[A, B], where B consists of the two vertices of degree 1. The composition @ of graphs is defined as follows: Given G[A,B] and H with V(G) N V(H) = 0, G[A, B] Q H - G U H U KA,V(H), where KA,V(H) is the complete bipartite graph with color classes A and V(H). Theorem
12.4.1 For every graph G, the following conditions are equivalent:
1. G is an l i p graph; 2. G contains neither the configurations shown in Part (a) nor the induced subgraphs shown in Part (b) of Figure 12.3; 3. G can be represented in the form G
-
X1 @ ...
@ Xrn
where H E M and Xi C {Q1, Q2, Ol,
@ H with m >_ O,
P4}.
Let tn denote the number of non-isomorphic n-vertex graphs in M without isolated vertices, dominating vertices, or stable dominating pairs (tn -- 0 for n < 4), and put tnX n n>l
For n > 6, it is possible to evaluate tn from the definition of M by partitioning the vertex set of the complementary graph into cycles and paths of length 3 or more. Let Un denote the number of non-isomorphic n-vertex HP graphs, and put u(x) - ~ unx n. n>l
The following result expresses u ( x ) i n terms of t(x). C o r o l l a r y 12.4.2 t ( ~ ) + x - ~3 u(x)
-
1-
2x-
x 2 + x 3-
x 4"
L2.4
325
Pseudodomishold Graphs
Figure 12.3" Forbidden configurations and induced subgraphs for HP graphs.
(a) Forbidden configurations. Dashed lines indicate nonedges and solid lines indicate edges. Other edges may or may not exist.
w
v
"i__ '. i I I I w
w
w
v
w
(b) Forbidden induced subgraphs
w
w
Domishold Graphs
326 An estimate of un is given by the following result.
Corollary 12.4.3
For
n > 6, (2.32) n-1 < un < (2.37) n-1.
We can compare the above estimates with an estimate of the number d~ of non-isomorphic n-vertex domishold graphs. Put
d ( x ) - E dnxn" n>l Then we have the following result.
Corollary 12.4.4 XmX 3 d(x) Further,
dn ~" c r n, w h e r e r ..~
-
1 - 2 x - x 2 + x 3"
2.25
is t h e m a x i m u m
root (in absolute
value)
of the equation x 3 - 2x 2 - x + 1 -
O.
We see that un is larger than dn, consistent with the fact that all domishold graphs are HP graphs, but not conversely.
Chapter 13 The Decomposition Method 13.1
Introduction
In Definition 11.4.2 we saw how to compose a split graph with an arbitrary graph, and in this chapter we investigate the opposite operation of decomposition. This subject was studied by Tyshkevich [Tys84, TysS0], Chernyak and Chernyak [CC90, COS1]and Tyshkevich and Chernyak [TC85b, TC85a]. It turns out that every graph has a unique decomposition into indecomposable components. Tyshkevich and Chernyak [TC85a] also introduced a generalization from the class of split graphs to the larger class of polar graphs that we saw in Section 7.6, and obtained a hierarchy of decompositions and a unique decomposition at each level of the hierarchy. The decomposition method proves to be a unifying approach to the study of many graph problems, since many properties of graphs hold for a graph if and only if they hold for each indecomposable component, perhaps with a small change which is easy to pinpoint. It simplifies the description of the structure of several graph families, leads to their enumeration, and serves as a tool to explore them. Section 13.2 presents the decomposition, the hierarchy, and the unique decomposition result. Section 13.3 applies this theory to threshold and domishold graphs, Section 13.4 applies it to box-threshold graphs and enumerates them, and Section 13.5 does the same for matroidal and matrogenic graphs. 327
The Decomposition Method
328
13.2
The Canonical D e c o m p o s i t i o n
In Section 7.6 we defined the class of polar graphs and its subclasses (c~,/3), and discussed the complexity of their recognition problems. In this section we present a theory of decomposition of polar graphs based on Tyshkevich and Chernyak [TC85b]. To review the definition, a graph G = (V, E) is said to be polar if V can be partitioned into subsets A and B, possibly empty, such that each of the graphs G[A] and G[B] is a union of cliques. This partition is called a polar partition. If in addition every connected component of G[A] (resp. G[B])is (a clique)of size at most c~ (resp./3), we say that G belongs to the class (c~,/3) of polar graphs. The polar partition may not be unique: for example, if G is the path P3 with consecutive vertices a, b, c, then we may take A = {b}, B = {a,c} or A = {a,b}, B = {c}, putting G in (1, 1)in both cases; if G is the cycle C4, we may take A to consist of three vertices, putting G in (2, 1), or we may take A to consist of two adjacent vertices, putting G in (1, 2), or we may take A to consist of two non-adjacent vertices, putting G in (2, 1) again. Other examples are G = C6 with A consisting of three mutually adjacent vertices and G E (1, 3), and G bipartite, with G C ( ~ , 1). The class (1, 1) is precisely the class of split graphs. We indicate a polar graph with its polar partition as G(A, B), and use the (c~,/3) notation for it as well. We say that polar graphs G(A,B) and G'(A', B') are polar isomorphic if there is an isomorphism of G to G' mapping A onto A' (and hence B onto B'). It can be checked that the graph in Figure 13.1 is not polar. Figure 13.1" A non-polar graph.
w
v
w
Clearly if G(A,B) r (o~,/3), then G(B, A) C (~, c~). Another easy result is the following one, establishing a hierarchy among the polar graphs. P r o p o s i t i o n 13.2.1 If a < (~' and/3 < /3', then (a,/3) C_ (a',/3'), and the
inclusion is proper if at least one of the inequalities is strict.
13.2
The Canonical Decomposition
329
P r o o f . The inclusion is trivial. We show that the graph
C = (/3' + I)K~, U (c~' + I )K~,, which clearly belongs to (c~',/3'), cannot belong to (c~',/~'- 1) if /3' > 1. Indeed, if G(A, B) E (c~',/~'- 1), then A must contain at least one vertex of each of the c~' + 1 copies of KZ,. Consequently, G[A] contains a stable set of size c~' + 1, which is not the case by G(A, B) E (c~',/3'- 1). Similarly if c~' > 1, G cannot belong to (c~'- 1, fl). 9 We now define the operation of graph composition, which specializes to the operation of Definition 11.4.2 for the class (1, 1). D e f i n i t i o n 13.2.2 The classes of polar and ordinary graphs are denoted by
7) and G, respectively. We define the c o m p o s i t i o n operator
O:Pxg~g as follows. If G(A,B) C 79 and H C ~ are vertex-disjoint, then G(A, B ) 0 H is obtained from G U H by adding every edge between A and H. The graphs G and H are called the c o m p o n e n t s of the composition. Note that if in the above definition H is polar and H(C, D) E T', then the composition Q = G O H is also polar Q(A U C, B U D). Thus O is a binary operation on the class of polar graphs. In general, composition is associative when all components except possibly the rightmost are polar. Therefore the algebra (T ~, O ) i s a semigroup, and each class (c~,/3) is a subsemigroup. D e f i n i t i o n 13.2.3 A graph G that can (cannot) be written in the form F(A, B ) 0 H is called d e c o m p o s a b l e ( i n d e c o m p o s a b l e ) . If in addition
we require that F(A, B) E (c~,/3), G is said to be decomposable 5ndecomposable) at t h e level (c~,/3). If in addition G is polar, G(C,D) E (c~,/3) and H E (c~,/3), then G(C,D) issaid to be decomposable (indecomposable) in t h e class (c~,/3). It can be verified that Cs is an indecomposable polar graph and the graph of Figure 13.1 is an indecomposable non-polar graph. To state the decomposition result below, we define an equivalence relation on the set of polar graphs as follows: 1. each polar graph G(A,B) is equivalent to itself (but when A and B are non-empty, not to any other polar graph even if they are polar isomorphic);
330
The Decomposition Method
2. every two graphs of the form G(O, B) are equivalent, and every two graphs of the form G(A, rg) are equivalent. It is easy to see that the composition Q is commutative on every class of equivalent graphs. T h e o r e m 13.2.4 1. every graph from the class (a, fl) can be represented as a composition of components (necessarily from (a, fl)) that are indecomposable in the class (a, fl). The decomposition is unique up to permutations of consecutive equivalent components.
2. every graph not from the class (a, fl) and decomposable at the level (a, fl) decomposes uniquely as H(C, D) @ F, where H(C, D) C (a, fl), F ~ (a, fl) and F is indecomposable at the level (a, fl). Before proving the theorem, we use it to make the following definition. D e f i n i t i o n 13.2.5 Let G(A,B) be decomposable in the class (a, fl). Consider its decomposition into indecomposables in this class. If in this composition we replace each maximal set of consecutive equivalent components by their composition, we obtain a representation of G in the form
G(A, B)
-
Xl
(~ . . .
(~ X n ,
X k --
Gk(Ak, Bk) e (a, fl),
(13.1)
where Xk and X k + l a r e not equivalent and each Xk satisfies one of the following three conditions: 1. Ak - O C Bk; 2. Ak r O - Bk; 3. Ak, Bk r 0 and Xk is indecomposable in the class (a, fl). The decomposition (13.1) is referred to as t h e c a n o n i c a l d e c o m p o s i t i o n of G ( A , B ) in t h e class (a, fl). Likewise, if F does not belong to the class (a, fl), its c a n o n i c a l d e c o m p o s i t i o n at t h e level (c~,/3) has the form F
= X 1 (~ . . .
(~ X n
(~
H,
where the Xk are as above, H ~ (a, fl) and H is indecomposable at the level
13.2
The Canonical Decomposition
331
13.2.4. The existence of the decompositions in question follows from the finiteness of the graphs, and what we need to prove is their uniqueness. P A R T 1" Let G(A, B) C (o~,/~). For each a C A, we let d(a) denote IN(a)N BI, and for each X C_ A, d(X) - ~-~aEXd(a). Similarly for each b E B, d(b) denotes IN(b)N AI, and for each Y C_ B, d(Y) - ~be~" d(b). Since the induced subgraph G[B] is a union of cliques of cardinalities at most /3, there exists a unique partition B - B1 tO -.. tO BZ, where G[Bj] ji(j and the nj are non-negative integers. Thus Bj uniquely partitions into cliques of cardinality j" Bj - Bj~ U ... U Byn,. Similarly A - A 1 U . . . U Ac~, where G[Ai] - m i K i and the m i are nonnegative integers, and Ai uniquely partitions into stable sets of cardinality i" Ai -- A l l I..J . . . I..J Aim,. Observe that since the Air are stable sets, for each canonical decomposition (13.1), each All is contained in one of the Bk, and similarly each Bjt is contained in one of the Bk. We represent G(A, B) in the form Proof of Theorem
/..
G(A,B) - X1 6) H(C,D),
Xa - GI(A1,B~),
where X1 is the first term of a canonical decomposition (13.1). We want to show that X1 is uniquely determined by G(A, B), from which it follows that H(C,D) is also determined, and the result follows by induction. We distinguish three exclusive cases. Case 1" A - / ~ and some Bjk satisfies d(Bjk) - O. Denote the union of all such Bjk by N. We must have A1 - 0, for otherwise (0, Bjk) is a further component of X1. Similarly B1 - N, and so G1 - G[N] and X1 is uniquely determined by G(A, B). Case 2" B r e and some Bik satisfies d(Aik) - i . IBI. Denote the union of all such Aik by N. In analogy to Case 1 we must have A1 - N, B 1 - O , G1 - G I N ] a n d X1 is uniquely determined. C a s e 3: The situations under the previous cases do not occur. We may also assume that A, B r O, for otherwise the theorem is trivial, and therefore we have that A1, B1 -r O and X1 is indecomposable. We note that /..
t..
/..
^ ^ d(Bjk) { < j" JAil, if Bjk C Be, j I./~ll, if Bjk ~ B1.
(13.2)
If, for example, the first line of (13.2) is false, then (;g, Bjk) is a right component of X1. The second line follows similarly because in that case Bjk C_ D. Equation (13.2) shows that B1 is uniquely determined by A1.
332
The Decomposition M e t h o d
Assume that G(A, B) can also be represented in the form ~..
G(A, B) - X~ fi) H'(C', D'),
A!
X~ - Gi (A'I, J~l),
where X~ is the first A term ofh another canonical decomposition. We assert that one of the setsA ! B1 and B~ contains the other one. For assume that, if A h possible, x C B a B 1 and y C B ~ B1. Then the assumptions on x imply that h A! ~. x C B~ND' and therefore Aa C_ ANN(x)C_ Aa. Similarly the assumptions on y imply that A1 C_ A 1. Thus A1 A-! A 1. But as noted above, A1 determines B1 h by (13.2), and therefore B1 -- BJ' contrary to assumption. This proves the assertion. Next we assert that .B 1 -- B 1. Assume that, if possible, B 1 C B1. A! A A Then by theA argument ofA ! the t .previous assertion, A 1 C_ A1, Aand since A1 ! determines B1, we ..have A 1 C A1. Moreover, every., vertex of A 1 of adjacent to every vertex of/31 - B[, and every vertex of B~ of non-adjacent to every v e r t e x of A 1 - A 1. This shows that (AI,Ba)is a component of (A1,_B1) , contradictinfi^ the indecomposability of X1. This proves our second assertion that B1 - B~, and therefore D - D'. We also note that
d(Ail)
IDI, if A~, c_ A1, _< i IDI, if Aa ~ m l ,
> i.
(13.3)
for otherwise X1 decomposes. Equation (13.3) shows that D uniquely deterA ~ A! ! mines A1, and thus A1 - A 1. Therefore X1 - X 1. P A R T 2" Assume that G ~ (c~,/3) and G has two decompositions
G - H(C,D) Q F - H'(C',D') (!) F', with H ( C , D ) , H ' ( C ' , D ' ) C (c~,~)and F , F ' ~ (c~,~). It follows that the set R - V ( F ) N V(F') is not empty, for otherwise F ' is an induced subgraph of H and so F ' E (c~,/3), or symmetrically. Assume that , if possible, R' = V ( F ' ) - R 7/=r We represent R' in the form R ' - C1 U D1 with C1 C_ C and D1 C_ D. But then we have the decomposition F ' - F(R')(CI,D1)fi)F(R), which contradicts the indecomposability of F ' at the level (c~,/3). This shows that R ' - e , i.e., V(F') C_ V(F). By symmetry we also have V(F) C_ V(F'), and so V(F') - V(F). Since F is an induced subgraph of G, V(F) uniquely determines F, and also C and D as the sets of vertices of G adjacent to all and to none of the vertices of V(F), respectively. The sets C and D uniquely determine H. 9
13.2
T h e Canonical Decomposition
333
C o r o l l a r y 13.2.6 The canonical decomposition of the graph G(A, B) in the class (a,/~) coincides with its canonical decomposition in every class (c~',/3') containing (a, fl). In other words, a polar graph has a unique canonical decomposition. Proof. This follows from Part 1 of Theorem 13.2.4. C o r o l l a r y 13.2.7 Every non-polar graph G has a unique representation of the form G = H(C,D) 0 F, where H(C,D) is polar and F is an indecomposable non-polar graph. Proof. This follows from Part 2 of Theorem 13.2.4. P r o p o s i t i o n 13.2.8 If (a',fl') D (c~,fl), then there exist graphs indecomposable at the level (a,/~) but decomposable at the level (a', fl'). Proof. We may assume without loss of generality that a' > a. Let F be a non-polar indecomposable graph, such as the graph of Figure 13.1. Define a graph G by its canonical decomposition at the level (a',/Y) as G = S~,(A,O)O F, where S~, is an edgeless graph on a' vertices. We assert that G is indecomposable at the level (a,~). Assume the contrary, and let G1(A1, B1) be the first component of the canonical decomposition of G at the level (c~, fl). Let G2(A2, B2) be the first component in the canonical decomposition of GI(A1,B1)in the class (a', fl'). Then G2(A2, B2)is the first component of the canonical decomposition of G at the level (a',/3'). Since A1 does not contain a stable set of size c~', the same is true of A2. But then G2(A2, B2) cannot be the same as S~,(A, rg), contradicting Theorem 13.2.4. Now we specialize to the class (1, 1), the class of split graphs. Two polar isomorphic split graphs are said to be split isomorphic. We would like to use the canonical decomposition at the level (1, 1) to give a criterion for split graphs to be isomorphic. We need the following lemma, which spells out the freedom in choosing a split partition of a split graph. L e m m a 13.2.9 Let G(A,B) and G'(A',B') be isomorphic split graphs on the same vertices. If they are not split isomorphic, then there exists a vetrex x such that A = A ' U { x } (and therefore B' = B U { x } ) , we have the decompositions
G(A,B) G'(A',B')
= H(A- {x},B)O/(l({X},~), = H ' ( A ' , B ' - {x})O SI( e , {x}),
334
The Decomposition Method
and H ( A - { x } , B ) and H ' ( A ' , B ' - { x } ) are split isomorphic, or the same holds with reversing the role of the primed and unprimed letters. P r o o f . The sets A - A ' = A N B' and A ' - A = A ' N B are both cliques and stable sets, hence their cardinality is at most 1. If they are both empty, then G(A,B) and G'(A',B') are split isomorphic, which is not the case by assumption. If both sets have cardinality 1, say A - A ' = {x} and A ' - A = {y}, then N(x) = N ( y ) = A N A', except that x and y are possibly adjacent; thus x and y are twins and by swapping them we turn (A, B ) i n t o (A', B'), so again G ( A , B ) a n d G'(A',B')are split isomorphic, contrary to assumption. Therefore one of the sets, say A - A', consists of a single vertex x and the other one, say A ' - A, is empty. Then the required properties are seen to hold. ,, We are now ready for characterizing split isomorphism, first proved by Tyshkevich.
Theorem 13.2.10 ([Tys80]) Let G(A,B) G'(A', B')
=
al(A1,B1)
@
-
G'1(A'I, B~) @
am(Am,Bm)
...
@
-..
@ G~n(A'n, B;)
be the decompositions of split graphs G and G' into indecomposable components in the class (1, 1). Then G and G' are isomorphic graphs if and only
if 1. m = n ; 2. Gi(Ai, Bi) and G'i(A~,B~) are split isomorphic for i -
1,...,m-
1;
3. either G,~(Am, Bin) and G~(A~, B~) are split isomorphic, or else one of them is K1 ({x }, ;g) and the other one is S1 (;g, {x }). P r o o f . The sufficiency is clear. For the necessity, we have two cases. If G and G' are split isomorphic, then Part 1 of Theorem 13.2.4 implies that our conditions hold with the first alternative in Condition 3. If G and G' are not split isomorphic, then Lemma 13.2.9 and Theorem 13.2.4 imply that our conditions hold with the second alternative in Condition 3. 9
Theorem 13.2.11 ([Tys80]) Let :
~'
-
~I(A1,B1)@ -
...
QGm(A,~,Bm)Q H
~'1 (A'I, B'I) @ "'" @ Gin (din, B'n) @ H'
13.3
Domishold Graphs and Decomposition
335
be the decompositions of non-split graphs G and G' with Gi(Ai, Bi) and G~(A~,B~) indecomposable in the class (1,1) and H and H' non-split indecomposable at the level (1, 1). Then G and G' are isomorphic graphs if and only if 1. m - n ; 2. G~(A,, B,) and G~(A~, B~) are split isomorphic for i = 1 , . . . , m; 3. H and H' are isomorphic. P r o o f . This is Part 2 of Theorem 13.2.4 specialized to the class (1, 1).
13.3
Domishold Graphs and Decomposition
We apply the theory of canonical decomposition presented in Section 13.2 to enumerate and classify the domishold graphs, which we saw in Chapter 12. First we do the same with the simpler threshold graphs. This section is mainly based on Tyshkevich and Chernyak [TC85b]. We use the notation I<~ = I'(n(A, e ) where A is a clique of size n, and S~ = S n ( e , . ~ ) where B is a stable set of size n. We denote by 7- the class of threshold graphs. From Condition 4 of Theorem 1.2.4, it is easy to deduce the following result. T h e o r e m 13.3.1
1. All threshold graphs belong to the class (1, 1).
2. A graph is threshold if and only if all its indecomposable components in the class (1, 1) have a single vertex. 3. The algebra (7-, Q) is a free semigroup with two generators K1 and
S 1.
According to Part 3 of Theorem 13.3.1, and by considering the canonical decomposition, we see that a threshold graph G on n vertices is determined up to complementation by a composition of n, i.e., an ordered partition Tt = Tt 1 J r ' ' ' + rts of 1"/ into positive integer parts: if G has no isolated vertices, then G = I's @ Sn2 @ I's @ ' ' " (13.4) and if G has isolated vertices, then G = Sn, (D Kn~ (D S,~ Q . . .
(13.5)
336
The
Decomposition
Method
Using in addition Theorem 13.2.10, which gives a criterion for isomorphism of graphs in the class (1, 1) represented as compositions of indecomposable graphs in that class, we obtain the following result. Theorem 13.3.2 1. A graph with no isolated vertices is threshold if and only if it has the form (13.4). 2. A graph with isolated vertices is threshold if and only if it has the form (13.5).
3. For n > 1, graphs of the form (13.4) and (13.5) are not isomorphic. Graphs of the form (13.4) (or (13.5)) corresponding to different compositions n -- rtl - J r " .
Jr- n s
and
n -
ml
-Jr'"-Jr
are isomorphic if and only if s - t + 1, ns - 1, for i - 1 , . . . , t - 1, or vice versa.
mt
1 and ni
n t - - m t --
-
mi
T h e o r e m 13.3.3 Let cm denote the number of non-isomorphic threshold graphs without isolated vertices that have m edges, with Co - 1 by convention. Let D ( m ) denote the set of partitions of m into distinct (positive integer) parts. Then 1.
2.
E cm x m m>O
l-I(l+xJ) 9 j_>l
Proof. The two parts of the theorem are equivalent by the well-known generating function for the number of partitions of integers into distinct parts. We prove Part 1 by exhibiting a suitable bijection [TC85b]. Part 2 has been proved by different techniques by Peled [Pel80], see Chapter 17. The partition m -- ml
- - I - ' ' ' nt- rrtk
with
ml
>
'''
>mk
:>
0
is mapped to the graph K1 @
Sml--m2--1 (~ ''" (~
K1 @
Sink_l--ink--1 (~
K1 @ Sm k C
D(m),
13.3
Domishold Graphs and Decomposition
337
where empty graphs So are understood to be omitted. By Part 3 of Theorem 13.3.2, this mapping is injective. Moreover, for the same reason, every threshold graphs without isolated vertices can be represented in the form K~ Q Sl~ Q . . . Q K~, Q Sl, with positive ni and li, and it is easy to reconstruct the partition that maps to it. Thus the mapping is surjective. .. Turning now to domishold graphs, we denote by D the set of polar graphs in the class (2, 1) that are domishold. We easily deduce the following theorem from Theorem 13.2.4 and Condition 3 of Theorem 12.2.4: Theorem
13.3.4
1. All domishold graphs belong to the class (2, 1).
2. A graph in the class (2, 1) is domishold if and only if all its indecomposable components in this class have one or two vertices. .
o
The algebra (~, 5)) is a free semigroup generated by the polar graphs K l ( { X } , e ) , SI(•, { x } ) a n d S2(;g, {x,y})with x,y non-adjacent. The set of domishold graphs in the class (1, 1) coincides with the set of threshold graphs.
For the classification of domishold graphs, it is convenient to work with their complements, the codomishold graphs, which by Part 3 of Theorem 13.3.4 are the compositions of components of the form KI({X}, e ) , S l ( e , {x}) and M ( e , {x, Y}) with x, y adjacent. Using the notation Mtm - S~ Q M m - S[ Q M TM, we see that the codomishold graphs are the graphs that have one of the following forms of decomposition" M/lrn I @ I(n I @ M/2rn 2 @ tin 2 @ . . . @ MItrnt @ lin t
(13.6)
Mllrnl Q linl Q Ml2rn2 @ l(n2 @ "" Q l(nt_l @ Mltrrtt
(~a.7)
I'(nl @ Ml2m2 @ I'(n2 @ Ml3m3 @"" @ Mltmt @ I~nt
(13.8)
I(nl Q Mt~m~ Q K~2 Q Mt3.~3 Q " Q
K~_I Q Mt,.~,
(~a.9)
with t >_ 0. Here, as above, Kn denotes K~. We call a composition of the form (13.6) or (13.8) with nt >_ 3 or of the form (13.7) or (13.9) with It -t- rat > 2 &
standard decomposition.
338
The Decomposition Method
T h e o r e m 13.3.5 Every codomishold graph with at least three vertices has a unique standard decomposition. P r o o f . Observe that in each standard decomposition, every component with the possible exception of the last two is uniquely determined. For instance, if the graph has isolated vertices or edges, then [1 and ml are the numbers of isolated vertices and edges, respectively, n l is the number of dominating vertices remaining after the previous vertices are deleted, and so on. It follows that in any two standard decompositions, the numbers of components differ by at most 1. The following are the only cases. Case 1" One standard decomposition ends with Mtm q) K~. Then n >_ 3, and n is the number of vertices of degree at least 2 in the graph induced by the vertices of these last two components. Therefore n is uniquely determined, and with it the last two components. C a s e 2" One standard decomposition ends with K~ Q Mzm. Then l + m >_ 2, and n is the number of dominating vertices in the graph induced by the vertices of these last two components. So, again, n and the last two components are uniquely determined. C a s e 3" All standard decompositions have exactly one component, namely Mllml or K ~ . This case is trivial because the graph has at least three vertices. 9 Every threshold graph is a unigraph, i.e., determined up to isomorphism by its degree sequence (in fact, a threshold sequence has a unique labeled realization). In contrast, non-isomorphic domishold graphs can have the same degree sequence. For example, the complete bipartite graph K2,3 and the pentagon with one chord have the same degree sequence (3, 3, 2, 2, 2). The first one is domishold, since its complement has the standard decomposition M2,0 (~ K3; the second is not, since it contains an induced P4, which is forbidden by Theorem 12.2.4. However, a domishold graph without isolated vertices is an edge-unigraph, i.e., determined up to isomorphism by the list of degrees of its edges , where the degree of an edge is defined as the unordered pair of degrees of its endpoints. To show this, we make the following definition. D e f i n i t i o n 13.3.6 Let a graph G have an alternating ~-cycle t with edges ab, cd and nonedges ad, bc, and let deg(a) = deg(c). We then say that G admits a swap t, and the graph t G is obtained from G by swapping the edges and nonedges oft. See Figure 13.2.
13.3
Domishold Graphs and Decomposition
339
Figure 13.2: A swap.
a
d
b
a
c
d I
I
I I Ark
I I
b
d e g ( a ) - deg(c)
c
d e g ( a ) - deg(c)
Chernyak and Chernyak [CC81] have proved that if two graphs without isolated vertices have the same list of degrees of edges, then one can be obtained from the other by a sequence of swaps. Therefore it is enough for us to prove the following result. P r o p o s i t i o n 13.3.7 If G is a domishold graph admitting a swap t, then G
is isomorphic to tG. m
P r o o f . Clearly the complement G also admits t as a swap, and so it is enough to show that G and tG are isomorphic. By Theorem 13.3.5, G has a unique standard decomposition in one of the forms (13.6) - (13.9). Without loss of generality we may assume that the first component of this decomposition contains one of the vertices a, b, c, d of t, for we may delete all preceding components, if any. Considering the polar graph G(A, B), we examine the possible cases of which of the sets A, B contains each vertex of t, taking into account the fact that A is a clique and B induces a matching with isolated vertices. C a s e 1" a, b, c, d C B. Since a and c have the same degree, they must be in the same component, which must also contain their neighbors c and d. But then clearly tG is isomorphic to G. C a s e 2" a,b,c E B, d C A (the case a,c,d C B, b C A is similar). The neighbors a and b are in the same component, and c must be in a later component, since the vertex d of A is a neighbor of it but not of a. Therefore a, b C Miami, hence deg(a) - 1, and it follows that deg(c) - 1. This implies
The Decomposition Method
340
that d E K ~ , nl - 1, and c E Mt2m2. But now swapping a and cgives a graph isomorphic to G and also equal to tG. C a s e 3" b,c,d E B, a E A (the c a s e a , b,d E B, c E A i s similar). Since a E A is adjacent to b E B but not to d E B, d (and with it its neighbor c E B) must be in an earlier component than b. Hence c,d E Mt~n~, and therefore deg(c) - 1, from which deg(a) - 1. Hence b is the only vertex in its component, and this component is the last one. But this contradicts the definition of the standard decomposition, so this case is impossible. C a s e 4: a,b E A, c,d E B (the case c,d E A, a,b E /3 is similar). We must have c, d E Mt~nl, so deg(c) - 1, hence deg(a) - 1. This implies that A - {a, b}. Now if a and b are in the same component, then this component is K ~ and is the last component, contradicting the definition of the standard decomposition. If a and b are in different components, then since deg(a) - 1, the component containing a has no other vertices and is the last component, again contradicting the definition of the standard decomposition. Therefore this case is impossible. C a s e 5" a, c E A, b, d E /3 (the case b, d E A, a, c E B is similar). Since a is a neighbor of b and c is not, the component containing a is earlier than the one containing c. But this contradicts the fact that d is a neighbor of c but not of a, so this case is impossible. 9 We conclude this section by classifying the forcibly domishold degree sequences, i.e., those degree sequences all of whose realizations are domishold. We prove, in fact, that a forcibly domishold sequence must be unigraphic. As usual, we denote a star on n + 1 vertices by KI~. 13.3.8 A forcibly domishold degree sequence is unigraphic, and its realization is of one of the following types:
Theorem
1. a threshold graph; 2. rnK2 U Kin with rn, n > 1; 3. T(A, B ) Q inK2 U Kin with rn, n >_ 1, where T is a threshold graph. Conversely, every graph of the one of the above types is domishold and a unigraph. P r o o f . Let d be a forcibly domishold sequence with a realization G. We have to show that G i s o f t y p e 1 - 3 . I f G E (1,1), then G i s o f t y p e 1 b y Part 1 of Theorem 13.3.4, and we are done. Assume now that G ~ (1, 1).
13.4
Box-Threshold Graphs and Decomposition
341
We show below that if G is indecomposable at the level (1, 1), then it is of type 2, from which it follows that if G is decomposable at the level (1, 1), then it is of type 3. Since all realizations of d are domishold, and since every transfer (cf. Corollary 3.1.11) done on the complete bipartite graph K2,3 yields the nondomishold pentagon with a chord, G has no induced K2,3. Consider the standard decomposition of G. Since G is indecomposable at the level (1, 1), the first component of the decomposition is of the form M0ml, rrtl ~ 1. If there are no other components, then rn~ >_ 2 because G ~ (1, 1), and hence G is of type 2. Assume now that there are other components. Then G is triangle-free, since G is (K2 U K3)-free. Hence in the polar representation G(A,B), IAI _< 2. By the definition of a standard decomposition, the last component must then be of the form Mr,0 with It >_ 1. Further, t - 2 and nl 1 since G is triangle-free. This means that -
-
G
--
M0rrt
I
@ K1 @ M I 2 0
--
rnlK2 U Kll2,
so G is of type 2, as required. To prove the converse, it is enough to notice that if G is of type 1 3, then it is domishold, and every transfer done on it yields an isomorphic graph, hence it is a unigraph by Corollary 3.1.11. 9
13.4
B o x - T h r e s h o l d Graphs and D e c o m p o s i tion
This section is adapted from Tyshkevich and Chernyak [TC85a]. We characterize box-threshold (BT) graphs in terms of their decomposition into indecomposable components at the level (1, 1), and then use these results to enumerate them. All the polar graphs in this section are in the class (1, 1) (split) and the decompositions will always be at the level (1, 1). We use the notation Na(x) for the set of neighbors of a vertex z in a graph G, and ~ a for the vicinal preorder ~ on the graph G. If A and B are sets of vertices of a graph, we use NA(B) to denote A N ( U N(b)), and A ~- B to indicate bEB
that a ~- b for all a C A and b C B, and similarly for A ~ B. L e m m a 13.4.1 A composition is BT if and only if each component is BT.
342
The Decomposition Method
P r o o f . Let F = G(A, B) Q H. We have to show that F is BT if and only if G and H are BT. Note that A ~ V ( H ) ~ B. " O n l y if"" Assume that F is BT. To show that H is BT, consider vertices x,y of H with degH(x ) > degH(y ). Since Na(x) = Na(y), we must have degF(x ) > degp(y). Since F is BT, this implies that x L~ Y, and therefore x ~H Y, so H is BT. To show that G is BT, consider vertices x,y of G with dega(x ) > dega(y ). If x and y are both in A or both in B, then since NH(X) = NH(y), we must have degr(x ) > degp(y). Since F is BT, this implies that x ~ p y, and therefore x ~ a y, as required. If not, then necessarily x C A and y C B, which already implies that x ~ a y. " I f " : Assume that G and H are BT. To show that F is BT, assume that degF(x ) > degF(y ). If y E A, then x E A and dega(x ) > dega(y ). Since G is BT, we have x ~ a y and hence x ~ p y. If y E V(H), then x E V(H) or x C A. In the first case x ~ p y since H is BT, and in the second case x ~ p y since A ~ V(H). If y C B, we similarly reach the same conclusion x LF YTherefore F is BT. .. The next two lemmas identify the indecomposable BT graphs. Observe that if a split graph G(A, B) is biregular, then all the vertices of A have the same degree and all the vertices of B have the same degree. L e m m a 13.4.2 A split graph with more than one vertex is an indecompos-
able B T graph if and only if it is biregular and has no dominating or isolated vertices. P r o o f . " O n l y if": Let G(A,B) be an indecomposable graph in the class (1, 1) with more than one vertex and also a BT graph. By being indecomposable with more than one vertex, G has no dominating or isolated vertex. We show that it is biregular. Let A' be the set of vertices of A with largest degrees, and let B ' = N B ( A - A'). Since G is BT, we have A' ~ A - A' and therefore B' is completely joined to A'. Unless A ~ = A, we then have the decomposition
G(A, B) = G'(A', B - B') Q H ( A - A', B'), contradicting the indecomposability of G. So A' = A and all the vertices of A have the same degree. Similarly all the vertices of B have the same degree. " I f " : Let G(A, B) be a split biregular graph with no isolated or dominating vertices. To show that G is BT, notice that if deg(x) > deg(y), then x C B and y E A, which implies in turn that x ~ y. To show that G is indecomposable, assume the opposite and let G = G'(A', B ~) Q H be a decomposition
13.4
Box-Threshold Graphs and Decomposition
343
of G with G ~ and H non-empty. There must exist a vertex x C A' such that NB,(X) 7/= rg, for otherwise the vertices of B' are isolated in G, and if B' = rg then the vertices of A ~ are dominating in G. Similarly there must exist a vertex y C B' such that N ( x ) is a proper subset of A'. Now pick any vertex h of H, and we must have dega(x) > dega(h ) > dega(y ). But this contradicts the biregularity of G. L e m m a 13.4.3 A non-split graph with more than one vertex is an indecomposable B T graph if and only if it is regular and has no dominating or isolated vertices. P r o o f . " O n l y if"" Let G be an indecomposable non-split graph with more than one vertex and also a BT graph. By being indecomposable with more than one vertex, G has no dominating or isolated vertices. To show that G is regular, let A be the set of vertices with the largest degree in G, let H = (1 N(a), and let B = V(G) - (A U H). For each a E A and x E B U H aG_.A
we have deg(a) > deg(x), and so A ~ BU H. Each b e B has a non-neighbor in A, for otherwise b C H; therefore by A ~- B U H, b has no neighbors in B U H . I f H r 0 , then by A ~- H, A is a clique and G decomposes as a = G ' ( A , B ) O G[HI, where G[H 1 is the subgraph induced by H. This contradicts the hypothesis, and so H = O. If A is a clique, then G is a split graph G(A, B), contrary to hypothesis. Therefore there is a nonedge uv in A. S i n c e u ~- B, v has no neighbors in B. Let b b e a v e r t e x o f B , if any. Since it is not isolated, it has a neighbor z C A. Since A >- b, the closed neighborhood N[z] contains A U {b}. However, N[v] is a proper subset of A, and thus deg(z) > deg(v), contradicting the definition of A. This proves that B = 0 , and so G is induced by A and is therefore regular. " I f " : Let G be a regular graph without dominating or isolated vertices. By being regular, G is BT. To show that G is indecomposable, assume the contrary and let G = G'(A, B ) Q F, where G' and F are non-empty graphs. It follows that A ~- B, and hence deg(a) > deg(b) for all a E A and b E B. Now A r 0 , for otherwise the vertices of B are isolated, and B 7~ 0, for otherwise the vertices of A are dominating. This contradicts the regularity of G. " The next theorem characterizes BT graphs in terms of their indecomposable components at the level (1, 1).
The Decomposition M e t h o d
344
T h e o r e m 13.4.4 Let G = Xx Q ... Q X~ be the decomposition of a graph G into indecomposable components at the level (1, 1). Then G is B T if and
only if 1.
X I
, . . . ,
Xn-1 are split biregular graphs;
2. Xn is a split biregular or non-split regular graph. P r o o f . Note that if Xi has more than one vertex, then it cannot have dominating or isolated vertices by being indecomposable. The result then follows immediately from Lemmas 13.4.1, 13.4.2 and 13.4.3. [] We now enumerate the BT graphs using the above results. Let us denote by ap the number of non-isomorphic indecomposable split graphs on p vertices, by bp the number of non-isomorphic indecomposable non-split graphs on p vertices, and by cp the number of non-isomorphic BT graphs on p vertices. We also use the generating functions of these sequences, namely
a(x) - ~ apx p,
b(x) - ~ bpx p,
p>_l
p>_l
c(x) - ~ cpx p. p>_l
By the uniqueness of the canonical decomposition and Lemma 13.4.1, we have the following relation: 4x) =
1 -a(x)
Below we show how the ap and bp can be computed. C o m p u t i n g ap: Clearly a~ - 1 and for p > 1, by Lemma 13.4.2, ap is the number of non-isomorphic biregular split graphs on p vertices with no dominating or isolated vertices. Therefore ap --
Z Amn, m+n=p m,n>O
where A,~n is the number of non-isomorphic biregular split graphs with no dominating or isolated vertices, having the form G ( A , B ) with IAI = m, It l = S u c h ~ graph G ( A , B ) i s specified by the adjacency matrix M whose rows correspond to the vertices of A and whose columns correspond to the vertices of B. It is an m x n 0/1 matrix with constant row sums r, 0 < r < n, and constant column sums s, 0 < s < m. Let us denote by
13.4
Box-Threshold Graphs and D e c o m p o s i t i o n
345
Ad~n~ the set of all such matrices, and by Sm and S~ the symmetric groups of degrees m and n respectively. We define an action of the direct product Sm x S~ o n . / ~ m n by
(7r,a)M = PTrMP~ -1 ,
~ESm,
aES~,
where P~, Po are the permutation matrices of 7r, a, respectively. Then Amn is the number of orbits of this group action. By Burnside's Lemma, we have 1
A.~ =
~
F(rr, a),
TIt! TL! (Tr,o')e"~mXSn
where F(~r, a ) i s the number of matrices M C JPlmn that are fixed by (re, a), that is (Tr, a ) M = M. To compute F(r~, or), we write rr and cr as products of disjoint cycles 71- - -
where rri is a cycle of length
7f'l
9 9 9 7Ck~
0"
~
O" 1 9 9 9 0 " I ~
mi and aj is a cycle of length nj,
77"t1 :> " ' "
~
?Ytk~
Using the notation m = ( m l , . . . , m k ) a n d n = ( n l , . . . , n t ) , we observe that F(rr, a ) d e p e n d s only on m and n and not on the particular rc and a, and we may denote it by F ( m , n). There are m!/ml...mk permutations rr corresponding to m and similarly for n. Hence rtl >
"'"
~
rtl, m
-- ml
+'..
+ ink,
rt - - rtl + . . .
1
Am,~ - }-~. 77"tl . . .
?Tt k Tt 1 . . .
+ rtl.
r(m, n), TLl
where the summation extends over all the partitions m , n of the integers rn, n into positive parts. To compute F(m, n), consider the action of (rr~, aj) on the submatrix M~j of M consisting of the m i rows cycled by rri and the nj columns cycled by aj. The entries of Mij are partitioned into dij = g c d ( m / , nj) cycles, each one of length rninj/dij (i.e., the least common multiple of m i and nj). Each such cycle meets each row of Mij nj/dij times, and each column of Mij mi/dij times. The matrix M is fixed by (rr, a) if and only if in each submatrix Mij, each cycle is all-0 or all-1. If exactly t cycles of Mij are all-l, then Mij has constant row sums tnj/dij and constant column s u m s tmi/dij. We denote by e~...~k;,~..., , the number of m x n 0/1 matrices M fixed by (rr, a) for which the rows cycled by rri have constant row sums ri and the columns cycled by
The Decomposition Method
346
O'j have constant column sums sj. Then by the above discussion we obtain the generating function
E
"''Yk~kZ~ a ' ' ' z ~ ~ - -
Crl,...,rk;sl,...,sty~l
rl ,...,rk 81 ,...,3l
H
l
tni/di ~ tmi/di3
Yi
zj
,
O
l<_j<_l
and the required F ( m , n ) can be computed from the relation F(m,
n) -
~
e~;~,
O
k
l
where s - m r / n and rk; s t is an abbreviation for r.."-fk'~, r; .~YL~. s 9 s. C o m p u t i n g b v" As before, by Lemma 13.4.3, bp is the number of nonisomorphic regular non-split graphs on p vertices with no dominating or isolated vertices. We may omit the condition "non-split", since it follows from the others. Let Alp be the set of all adjacency matrices of such graphs. We define the action of the symmetric group Sp on M p by 7rM - PTrM P~ -1 ,
7r" C Sp .
Then bp is the number of orbits of this group action. By Burnside's Lemma, we have t,, -
1
where F(Tr) is the number of matrices M E 2t4p that are fixed by 7r, that is 7 r M - M. Write 7r as a product of disjoint cycles 71" - -
71"1 " ' ' T "
k
where 7ri is a cycle of length pi, with pl >_ "'" >_ pk, p - pl nt- ' ' " -t- pk, and use the notation p - ( p l , . . . ,pk). Again, F(Tr) depends only on p, and we denote it by F ( p ) . Thus 1
pl "'" pk where the summation extends over all the partitions p of the integer p.
13.4
347
Box-Threshold Graphs and Decomposition
To compute F(p), consider the action of 7r on the submatrix Mij of M consisting of the pi rows cycled by 7ri and the pj columns cycled by 7cj. The entries of Mij are partitioned into dij = gcd(pi, pj) cycles, each one of length pipj/dij. Each such cycle meets each row of Mij pj/dij times, and each column of Mij pi/dij times. The matrix M is fixed by 7r if and only if in each Mij, each cycle is all-0 or all-1. By the s y m m e t r y of M, the submatrix Mij with i < j determines the submatrix Mji as its image under the symmetry. Thus for i < j, If exactly t cycles of Mij are all-l, then exactly t cycles of Mji are all-1. Therefore Mij has constant row sums tpj/dij and Mji has constant row sums tpi/dij. The number of ways to choose t such cycles is
Let hii,t denote the number of ways to select exactly t out of the dii = pi cycles of Mii to be all-1 so that Mii becomes a symmetric matrix with zero diagonal. When such a choice is made, Mii has constant row sums t. It is not hard to verify that
{0( )
if
pi and t are odd
otherwise
(note in particular that hii,p, - 0). We denote by erl...rk the number of adjacency matrices of order p fixed by 7r for which the rows cycled by ~ri have constant row sums ri. As before, we obtain the generating function E rl ~...~rk
•rl,...,rkXl
rl
rk 9. . X k
X i 1
and the required
Xj
)(
0
t) l
F(p) can be computed from the relation F(p)
--
Crk 9 O
348
13.5
The D e c o m p o s i t i o n M e t h o d
Matroidal and Matrogenic Graphs and Decomposition
In this section, following Tyshkevich [Tys84], we use the decomposition theory to exhibit the structure of the matroidal and the matrogenic graphs and enumerate them. We already know that the threshold graphs are matroidal, the matroidal graphs are matrogenic, and the matrogenic graphs are unigraphs (Theorems 11.2.2, 11.3.2 and 11.4.1). The decomposition theory at the level (1, 1) gives us a convenient way to recognize these graphs. 13.5.1 A graph is threshold, matroidal, matrogenic, or a unigraph if and only if all its indecomposable components at the level (1, 1) are threshold, matroidal, matrogenic, or unigraphs, respectively.
Theorem
P r o o f . To prove the "only if" part of the first three statements, we note that the properties in question (threshold, matroidal, matrogenic) are preserved for induced subgraphs because they are characterized by forbidden configurations. For the "if" part of the first three properties, we note that if a composition F = G(A, B ) Q H contains one of our forbidden configurations (an alternating 4-cycle, the configuration 5 , a chordless pentagon), then this configuration is entirely contained in G or in H. For example, suppose F contains an alternating 4-cycles as in Figure 1.2. If one of its vertices, say a, is in A, then it follows that c C B, d E A, and b E B, so the whole configuration is contained in G. Similarly if a C B, the whole configuration is in G. Otherwise the whole configuration is in H. Since the configuration pc and the chordless pentagon contain several alternating 4-cycles, it follows immediately that if one of their vertices is in G, all are in G. To prove the "if" part of the fourth statement (about unigraphs), we show that the composition of unigraphs is a unigraph. Consider a composition F = G ( A , B ) Q H, where G and H are unigraphs, and let F ' be a graph with the same degree sequence as F. We have to show that F ~_ F ~. By Theorem 3.1.11, F ' can be obtained from F by a sequence of transfers, and we may assume without loss of generality that the sequence consists of a single transfer along an alternating 4-cycle C. By what was shown above, C is entirely contained in G or in H, and in the former case, the transfer preserves the polar partition (A, B). Hence f ' takes the form G'(A, B)(9 H, where G' and G have the same degree sequence, or G(A, B) (9 H', where H' and H have the same degree sequence. Then G _~ G ~ or H _~ H ~ by the assumption, and hence F " F' in either case.
13.5
Matroidal and Matrogenic Graphs and Decomposition
349
To prove the "only if" part of the fourth statement, consider the decomposition of a unigraph G into indecomposable components. We have to show that each component C is a unigraph. Let C ~have the same degree sequence as C. If we replace C by C' in the decomposition, we obtain a graph G' with the same degree sequence as G. By assumption G _~ G ~. Hence by the uniqueness of the decomposition, it follows that C ~_ C ~. .. We. have seen in Theorem 13.3.1 that the only indecomposable components of a threshold graph are the one-vertex graphs. Tyshkevich [Tys84] lists the indecomposable unigraphs, and uses them to find the indecomposable matroidal and matrogenic graphs. Instead, we can rely on the structure of these graphs found in Chapter 11. The result is the following. T h e o r e m 13.5.2 o
.
The indecomposable matroidal graphs are precisely the one-vertex graph, the nets and net-complements (Definition 11.2.10), the perfect matchings of more than one edge, and the complements of these matchings. The indecomposable matrogenic graphs are precisely the graphs listed above and the chordless pentagon.
We can use the results above to enumerate the matroidal and matrogenic graphs as follows. T h e o r e m 13.5.3 Let m~ and l~ denote the number of non-isomorphic ma-
troidal and matrogenic graphs, respectively, and consider the generating functions of the sequences {ran} and {l~}" l(x) -
-
n>l
Z n>l
Then -
2 p ( x ) - 3x + x 4 + x 5
2 p ( x ) - 3x + x 4
1 -p(x)
'
l(x) -
1 -p(x)
wh e re
p(x) - 2x + x 4 +
2x 6 1 B X 2"
350
The Decomposition Method
P r o o f . Let pn denote the number of pairwise non split-isomorphic indecomposable split matroidal graphs. By Theorem 13.5.2 we have Pl -- 2 ( t w o split partitions for the one-vertex graph), p3 - 0, p4 - 1 (the self-complementary net of order 2), and for k _> 3, p2k - 2 (the net and the net-complement of order k) and P 2 k - 1 - - O. Hence the generating function for the p~ is p ( x ) - y ~ p n x n - 2x + x4 + 2 E n>l
x2k-
2x + x 4 +
2x 6 1 -
k>3
x2
Let qn denote the number of pairwise non-isomorphic indecomposable nonsplit matroidal graphs. Then q2k - 2 for k _> 2 (the perfect matching on k edges and its complement) and q~ - 0 for all other n. Therefore the generating function for the qn is q ( x ) -- p ( x ) -- 2X + X 4. Finally, the generating function for the number of pairwise non-isomorphic indecomposable non-split matrogenic graphs is r ( x ) - q ( x ) + x s due to the pentagon. Therefore the generating function for the number of pairwise non-isomorphic indecomposable matroidal graphs (split or not) is p ( x ) + q ( x ) - x - 2p(x) - 3x + x 4 (we subtract x because the two split partitions of the one-vertex graph give isomorphic graphs). By Theorem 13.5.1, this function enumerates the last indecomposable component in the canonical decomposition of a matroidal graph, whereas p ( x ) enumerates each of the previous components. Hence m ( x ) - (2p(x) - 3x + x 4) ~ ( p ( x ) ) y>_o
j = 2 p ( x ) - 3x + x 4 1 -p(x)
"
The result about l ( x ) follows in the same way. 9 From Theorem 13.5.3 one can obtain recurrences and asymptotic estimates of mn and ln.
Chapter 14 Pseudothreshold and Equistable Graphs 14.1
Introduction
In this chapter we study two classes of graphs containing the threshold graphs, namely the pseudothreshold graphs introduced by Chvs and Hammer [CH77] and the equistable graphs introduced by Payan [PayS0] and studied by Mahadev, Peled and Sun [MPS94] . Pseudothreshold graphs are graphs for which there exists a hyperplane such that the characteristic vectors (of sets of vertices) lying on one side of the hyperplane correspond to stable sets and the ones lying on the other side correspond to nonstable sets; the characteristic vectors lying on the hyperplane itself may correspond to stable or nonstable sets. These graphs are characterized in the next section. Equistable graphs are graphs for which there exists a hyperplane such that all the characteristic vectors lying on one side of the hyperplane correspond to stable sets, and in addition the characteristic vectors lying on the hyperplane itself correspond precisely to the maximal stable sets. As we see in this chapter, these two classes are very different despite the similarities in their definitions. In fact, neither of these two classes contains the other.
14.2
Pseudothreshold Graphs
In their key paper on threshold graphs, Chvs and Hammer [CH77] introduced the concept of pseudothreshold graphs as follows: 351
Pseudothreshold and Equistable Graphs
352
D e f i n i t i o n 14.2.1 A graph G - (V, E) is called a p s e u d o t h r e s h o l d g r a p h if there exist a mapping w" V --~ N (w ~ O) and a real t such that for every SC__V, S is a stable set ---> ~ x e s w(x) <_ t S isanonstable set ~ E~esw(x) >t. (14.1) Thus in a pseudothreshold graph, the hyperplane separating the characteristic vectors of stable and nonstable sets may contain vectors of both kinds of sets. In contrast, in a threshold graph the separation is strict, and the hyperplane does not contain characteristic vectors of nonstable sets (or equivalently of any sets). The same authors obtained the structure of pseudothreshold graphs. We present their results in this section. L e m m a 14.2.2 Let G - (V,E) be a pseudothreshold graph as in Definition 1~.2.1. Then the t in Equation (1~.1) must be positive if E 5r fg and may be assumed to be positive otherwise. P r o o f . If E - O, then t - 1 and w(x) <_ 0 will satisfy Equation (14.1). Assume that E 7(: ~. Since the empty set is stable, Equation (14.1) implies that t >_ 0. If t - 0, then since every singleton is a stable set, w(x) <_ 0 for each x C V, and since w ~ 0, there exists a z C V such that w(z) < O. Since E r O, there exist adjacent vertices x, y, not necessarily distinct from z. Then the set S - {x, y, z} violates Equation (14.1). Hence t > 0. tt From now on we assume that t > 0. For every graph G - (V, E), we define two subsets P0, Q0 of V as follows: No - {72 E V 9 ~721, ?22, u 3 E V, Uttl, ?2?./2, uu 3 E E , UlU2, ?22?23, ?_/3Ul @ E }
Qo - {v c v . 3Vl, y2, v3 E v, yyl, vv2, yv3, yll)3 ~ E , yly2, y2v3 ~ E } .
These definitions are illustrated in Figure 14.1. The next four lemmas are used in the characterization of pseudothreshold graphs. Lemma
14.2.3 Let G -
(V, E) be a pseudothreshold graph. Then u C Po ---> w(u) >_2t/3 u c Qo ~
w(u) <_ t/3.
r
IA
IV
V
O0
"1
~)
N
II
~3
D
C8
~
~
.
~
C8
.
r
C
.-,
0~ ~
~
dh
~
~ <
S
C
~,
.~
IV
IV
IA
4 - - t - + +
IA
IV
c~ 9
IV
IV
IV
+ 4 - + +
IA
4-
~
~
9
o
,O
m
m
w
oa
A w
~
I~I
o
O
(1)
0~
t~
r162
r162
O
O
t~
354
Pseudothreshold and Equistable Graphs
These implications follow easily by induction on m from Lemma 14.2.3.
9
L e m m a 14.2.5 If P* N Q* - ~, then every two vertices in P* are adjacent and no two vertices in Q* are adjacent. P r o o f . This follows from the definition of P* and Q*. L e m m a 14.2.6 No pseudothreshold graph contains an induced 3K2. P r o o f . Assume that a pseudothreshold graph contains a 3K2 with edges UiVi for i - 1, 2, 3. Then w(u~) + w ( u ~ ) + w ( u a )
_< t
~ ( ~ ) + ~ ( ~ ) + ~(v~)
_< t
~(~,) + ~ ( ~ )
>_ t
~ ( ~ ) + ~(v~)
_> t
~(~) + ~(~)
>_ t.
But these inequalities are clearly inconsistent with t > 0. The following theorem characterizes pseudothreshold graphs. T h e o r e m 14.2.7 For every graph G equivalent:
(V, E), the following conditions are
1. G is pseudothreshold; 2. P* n Q* - 0 and G is 3K2-free; 3. V can be partitioned into sets P, Q, R such that (a) every vertex in P is adjacent to every vertex in P U R, (b) no vertex in Q is adjacent to another vertex in Q u R, (c) there are no three mutually nonadjacent vertices in R. P r o o f . 3) =~ 1)" An appropriate assignment is
w(u)-
..
0, i f u c Q 1, i f u E R 2, if u C P
t-2.
14.2
Pseudothreshold Graphs
355
1) =~ 2): This follows from Lemma 14.2.4 and Lemma 14.2.6.
2) =~ 3): We prove this by means of a simple algorithm that terminates in O(rt 4) steps either by showing that Condition 2 does not hold or by constructing the partition described in Condition 3. The algorithm is as follows. First of all, find P* and Q*. (This can certainly be done in O(n 4) steps.) Then find out whether P * N Q* = ~. (If not, stop: Condition 2 does not hold.) Then set S = V - (P* U Q*); note that by the definition of P* and Q*, every vertex in S is adjacent to all the vertices in P* and to no vertex in Q*. Let So consist of all the vertices in S that are adjacent to no other vertex in S; define
P=P*,
Q=Q*USo,
R=S-So.
Find out whether there are three mutually nonadjacent vertices in R. If not, stop: by Lemma 14.2.5 P, Q and R have all the properties described in Condition 3. If, on the other hand, there are three mutually nonadjacent vertices Ul,U2,U3 C R, then each ui is adjacent to some vi E R. Using the fact that R N (P0 U Q0) = o , we may now easily verify that the set {Ul, u2, u3, Vl, v2, v3} induces a 3K2 in G. (To see this, note that the vj's are distinct, mutually nonadjacent and that each vj is adjacent to exactly one ui.) Hence Condition 2 does not hold. " The corollary below follows from the proof of the above theorem.
Corollary 14.2.8 If G is pseudothreshold, Equation (14.1) can be satisfied with t = 2 and w(u) C {0, 1,2} for all u.
"
We conclude this section with the following remarks.
Remarks 1. The degree sequences of pseudothreshold graphs on n vertices lie on the boundary of the convex hull of the degree sequences of all graphs on n vertices, because they satisfy the facet inequality
Z iEP
x ~ - ~ x~ _< IPl(n- 1 - I Q I )
(14.2)
iEQ
with equality, where P, Q, R is the partition of V as in Condition 3 of Theorem 14.2.7. This follows from Lemma 3.3.13.
356
Pseudothreshold and Equistable Graphs
2. The converse is not true. For instance, the graphs K1@K3,3 and K1@C6 have the same degree sequence (6, 4, 4, 4, 4, 4, 4) satisfying (14.2) with equality, where P is a singleton corresponding to the vertex of K1, Q is empty, and R consists of the other six vertices. But the first graph is not a pseudothreshold graph and the second one is. 3. The complement of a pseudothreshold graph need not be pseudothreshold. For instance, 3K2 is pseudothreshold. In view of the above remarks, the following questions are interesting.
Problem 1. Which degree sequences lie on the boundary? 2. Which degree sequences are potentially pseudothreshold?
14.3
Equistable Graphs
Payan [Pay80] introduced the equistable graphs, and later Mahadev, Peled and Sun IMPS94] obtained several interesting results on these graphs. We present the results of IMPS94] in this section. Definition 14.3.1 A graph G - (V,E) is said to be equistable if there exists a mapping ca" V --. N + such that for all S C_ V, S is a maximal stable set ~
c a ( S ) - ~ c a ( v ) - 1. vES
Payan [PayS0] showed that the threshold graphs and the domishold graphs are equistable, and announced that the P4-free graphs are equistable. In the next subsection we introduce a subclass of equistable graphs the strongly equistable graphs. We show that the strongly equistable graphs are closed under disjoint unions and joins, and therefore the P4-free graphs are strongly equistable. Later in this section, necessary conditions for equistability and sufficient conditions for strong equistability are obtained and used to characterize the equistability of some classes of perfect graphs, pseudothreshold, and outerplanar graphs. The structure of these equistable graphs is also given.
14.3
Equistable Graphs
357
Finally, we show that for a wide family of graphs, equistability implies strong equistability, and discuss the closure of various classes of strongly equistable graphs under graph substitution. An induced path on four vertices is denoted by P4(a, b, c, d) to indicate that its vertex set is {a, b, c, d} and its edges are ab, bc, cd.
14.3.1
Strongly Equistable Graphs
Let G = (1,1,E) be a graph. We denote by $ the set of maximal stable sets of vertices of G, and by 7- the set of all other nonempty sets of vertices of G. Put A - A(G) - {~v" V ~ R+'~v(S) - 1 for all S C $}. Thus A(G) is a set defined by a finite number of linear equations and nonnegativity inequalities, i.e., it is the intersection of an affine set with the first orthant. Since each vertex belongs to some maximal stable set, A ( G ) is bounded and therefore it is a polytope, possibly empty.
Definition 14.3.2 A graph G is said to be strongly equistable if for each T E 7- and each c <_ 1, there exists an w E .A such that w(T) 7~ c. L e m m a 14.3.3 Let G be strongly equistable, and assume that for each T E T , a forbidden value cr <_ 1 is given. Then there exists an co C .4 such that w(T) 7~ cT for all T E T . In particular, G is equistable, because we can take CT -- 1 for all T C 7-. P r o o f . For each T E 2r, the linear equations and inequalities defining .A(G) do not imply a)(T) = CT, since G is strongly equistable. In other words, the polytope A(G) is not contained in the hyperplane aJ(T) = CT. Therefore the intersection AT = A N {a~ : c0(T) = CT} constitutes a lower dimensional subpolytope of A. Consider the affine hull ~ of A, i.e., the set of all affine combinations of a finite number of elements of A. In the relative topology of 7{, ~4 has a positive volume whereas AT has zero volume. Since iT is finite, [J{AT : T C 7"} has zero volume and is therefore a proper subset of A. This means that A possesses an aJ which is outside every AT. 9
T h e o r e m 14.3.4 The strongly equistable graphs are closed under disjoint union.
358
P s e u d o t h r e s h o l d and E q u i s t a b l e G r a p h s
P r o o f . Let Gi -- (Vi, Ei), i - 1,2, be strongly equistable with V1 and 89 disjoint, and let G - (V,E), where V - 1/1 UV2, E E1 UE2. For each subset X of V, we use the notation X i - X N Vi. Let ,4, 7" etc. refer to G, and ~4i, T / e t c . refer to Gi. Then S C $ if and only if $1 E 81 and ~q2 C 32. To show that G is strongly equistable, let T C 7- and c _< 1 be given. Then T1 E T1 or T2 C ~ or T1 C 81, T2 - ~ or T1 - O, T2 C 32. Assume that T1 E T~. Then there exists an CVl in .A1 such that Cvl(T1) 7~ c. Define w" V ~ R0+ by (.U
w(v) -
(V)
0
if v E I/1
if v E V2.
Then w C A and aJ(T) - wl(T~) + 0 -r c. Assume that T1 E S1, T2 - ~. Consider arbitrary wl E ,41, aJ2 E A2. If c 7~ 0, define aJ" V ~ R + by
{
0 w2(v)
{
a21(V) if v E V1
i f v E V1 ifvEV2,
and if c = 0, define aJ by
0
i f v E V2.
In both cases w C ,4, a~(T) r c. The other cases are symmetric. Theorem
14.3.5
The strongly equistable graphs are closed u n d e r join.
P r o o f . Let Gi = (Vi, Ei), i = 1,2, be strongly equistable with V1 and V2 disjoint, and let G - (V, E) be their join, where V - 1/1 U V2, E - E1 U E2 U El2, and E12 is the set of all possible edges joining 1/1 and 89 We use the same notation for ,4, .di etc. as before. Then a subset S of V is in ,S' if and only if S1 E 81 and 5'2 - ~ , or the other way round. Based on aJi " V / ~ N +, we define the composition w of Wl and ~o2 to be w 9 V ~ N + given by
CO(?_)) _ S
/
v e yl
aJ2(v)
if v E V2.
If wi E .Ai for i - 1, 2, then the composition w is in .A. To show that G is strongly equistable, let T E 7" and c <_ 1 be given. Then T1 and T2 are not
14.3
Equistable Graphs
359
both empty. If T1 E 81 and T2 C 5'2, choose any wi C .Ai, i - 1, 2, and let be their composition. Then w E ~4 and aJ(T) - coI (rl)-t-co2(Z2) - 2 > c. In all other cases T1 C T1 or T2 C ~ , so without loss of generality, assume that T1 E T1. Choose anyw2 C ~42. Then c-cz2(T2) _< c_< 1, and since T1 E T1, there exists an col E r such that ~1 (T1) r c-~o2(T2). Let w be the composition of Wl and aJ2. Then w C ~4 and w(T) - wl(T1) + a32(T2) -r c . . . The following result is well-known. L e m m a 14.3.6 ([Sei74]) Let G - (V, E) be a graph. Then the following conditions are equivalent" 1. G is P4-free; 2. if G has more than one vertex, then G is the disjoint union or the join of smaller P4-free graphs.
Since the one-vertex graph is clearly strongly equistable, we obtain the following result from Theorems 14.3.4, 14.3.5 and Lemma 14.3.6, establishing the results of Payan mentioned above. C o r o l l a r y 14.3.7 The P4-free graphs are strongly equistable.
14.3.2
Some Strongly Equistable Perfect Graphs
We now present a useful necessary condition for a graph to be equistable. T h e o r e m 14.3.8 Let G = (V,E) be an equistable graph with an induced P4(vi, v2, v3, v4). Then every maximal stable set of G containing the two ends Vl, v4 must have a vertex adjacent to the two middle vertices v2, v3. P r o o f . Let {Vl, v4} 0 S be a maximal stable set ( 0 indicates disjoint union). Put P = {x e S : xv2 ~ E}, Q = {x e S : xv3 ~ E} and assume that, if possible, P U Q = S. Let us extend the stable sets {V2, V4} 0 P and {Vl, V3) 0 Q to maximal stable sets {v:, v4} @P @P' and {Vl, va} 0 Q 9 Q', respectively. Then P' N Q' = 0, because if v C P' N Q', then {Vl, v4, v} 0 S is a stable set properly containing the maximal stable set {Vl, v4} @ S. Now pick an w C fl, such that w ( X ) = 1 only if X is a maximal stable set of G. We have W(Vx) + w(v4) + w(S) - 1
Pseudothreshold and Equistable Graphs
360
02(V2) -~- 02(?24) -~- 02(P) --[-02(Pt) -- 1 02(Vl) + 02(?23) -~- 02(Q) -[--02(Qt) -- 1, and by adding the last two equations and subtracting the first, we obtain
~(v~) + ~ ( ~ ) + ~(P n Q) + ~(P') + ~(q') = ~ However, {v2, v3} 0 ( P n Q) 0 P' 0 Q' is a non-stable set (not multiset), contradicting the choice of ~. .. We call the graph shown in Figure 14.2 an "A". Figure 14.2: An "A" graph.
/k T h e o r e m 14.3.9 Let G be an A-free graph (for example a triangle-free graph, a bipartite graph etc.). Then the following conditions are equivalent:
1. G is equistable; 2. G is strongly equistable; 3. G is P4-free. P r o o f . This follows from Corollary 14.3.7 and Theorem 14.3.8. 9 We now present a useful sufficient condition for a graph to be strongly equistable. T h e o r e m 1 4 . 3 . 1 0 If S is a maximal stable set of a graph G = (V, E) such that for every pair u, v C V - S, (14.3)
then G is strongly equistable.
14.3
Equistable Graphs
361
P r o o f . The following four facts are used in the proof. F a c t 14.3.11 Let w" V ---, R+o . Then w E .A if and only if w(S)w(v)
1 -
w(Ns(v))
(14.4) for all v C V -
S.
(14.5)
For the "only if", (14.4) is trivial, and (14.5) is true because for every v E V - S , the set O - { v } U N s ( v ) i s maximal stable. Indeed, Q is clearly stable. Moreover, Q is maximal stable, because we cannot add any vertex of Ms(v) to Q, and we cannot add any vertex z E V - S to Q, since such x would satisfy N s ( z ) N N s ( v ) = e , and also N s ( x ) n N s ( v ) = e by (14.3), and so M s ( x ) = e , contradicting the maximality of S. For the "if" part, if co satisfies (14.4), (14.5) and X is any maximal stable set, then co(X) = co(X n S) + w(X - S). Now co(X - S') = ~ v e x _ s W ( N s ( v ) ) by (14.5). The neighborhoods Ms(v) for v E XS partition S " - X because, first, they are disjoint by (14.3), and, second, if there were a vertex y in ( S - X ) - U v e x - s N s ( v ) , then X U { y } would be stable, contrary to the maximality of X. Therefore 2 v e X - S W ( N s ( v ) ) = co(S - X) and w(X) = co(S) = 1. Hence w E A. F a c t 1 4 . 3 . 1 2 For every T C_ V (not necessarily T E T ) and w E ~4, w(T) -
Indeed, by Fact 14.3.11, w(T) - w(T N S) +
E
vCT-S
sES
where Xzns is the characteristic function of T N S. Using N r - s ( S ) -- NT(S), we see that XTAS(8) _qt_[NT-s(S)[ - INT[s]I . F a c t 1 4 . 3 . 1 3 If INT[s]I - 0 for all s E S, then T - 0 . Indeed, S N T - O and no vertex of S has a neighbor in T. Hence T - 0 , for otherwise S is not maximal stable. F a c t 1 4 . 3 . 1 4 If INT[s]I - 1 for all s C S, then T is a maximal stable set. Indeed, T is stable for the following reason: if two vertices of T - S are adjacent, then by (14.3) they have a common neighbor s E S, and so INT[S]I >_ 2; if x E T N S and y E T - S are adjacent, then INr[z]l >_ 2. r is maximal stable,
Pseudothreshold and Equistable Graphs
362
because we cannot add to T any vertex of S (such vertex is already in T or is a neighbor of some vertex of T), and we cannot add to T any vertex v E V - S (if {v} U (T - S) is stable, then by (14.3), N s ( v ) N N s ( T - S) - o , and so N s ( v ) C_ T N S by the condition of Fact 14.3.14, and moreover N s ( v ) 7/= rg by the maximality of S, so N s ( v ) meets T). To conclude the proof of Theorem 14.3.10, let T C T and CT _< 1 be given, and assume that, if possible, w(T) - Cr for all w C ~4. Then by Fact 14.3.12, for all w C ~4, -
(14.6)
sES
Therefore by Fact 14.3.11, Equation (14.6) is a consequence of (14.4) and (14.5), and hence a linear combination of them. In the matrix of coefficients of Equations (14.4) and (14.5), the columns of V - S contain an identity matrix in the rows of Equation (14.5) and 0 in the row of Equation (14.4). Since these columns also contain 0 in Equation (14.6), none of Equations (14.5) can contribute to the linear combination. Thus Equation (14.6) is a multiple of Equation (14.4), that is to say INr[s]l = cr for each s E S. Since Cr _< 1, it follows that Cr = 0 or Cr = 1. Therefore by Facts 14.3.13 and 14.3.14, T = O or T is a maximal stable set, contradicting T C T. .. By applying Theorem 14.3.8 and Theorem 14.3.10, we obtain necessary and sufficient conditions for some classes of graphs to be equistable.
Definition 14.3.15 A graph is called a b l o c k g r a p h if each of its blocks is a complete graph. T h e o r e m 14.3.16 Let G be a block graph. are equivalent:
Then the following conditions
1. G is equistable; 2. G is strongly equistable; 3. each block of G has a vertex that is not a cut vertex. P r o o f . 3) =~ 2): Let the blocks of G be B 1 , . . . , Bk, and let si be a non-cut vertex in Bi for i = 1 , . . . , k. Note that si belongs only to Bi, and N[si] = Bi. This implies that the set S' = { S l , . . . , sk} is maximal stable. Moreover, for u , v C V - S' we have: uv C E ~ u and v belong to the same Bi for some
14.3
Equistable Graphs
363
i 4---5, u and v have a common neighbor in S. Therefore Condition 2 follows from Theorem 14.3.10. 2) =~ 1)" This follows from Lemma 14.3.3. 1) ~ 3)" Assume that, if possible, G has a block B - {c~,..., ck} consisting entirely of cut vertices. Then k >_ 2. For each 1 _< i _< k, choose a neighbor di of ci such that di ~ B. If didj E E for some i r j, then there is a cycle dicicjdj meeting B, and hence contained in B, contradicting the choice of di. Therefore {all,..., dk} is a stable set. Extend it to a maximal stable set S. This S cannot have a common neighbor of Cl and c2, because S N B - 0. Thus the existence of P4(dl, Cl, c2, d2) contradicts Theorem 14.3.8. .. Recall that G(K, S) denotes a split graph G with split partition (K, S). Clearly every split graph can be written in the form G(K, S), where S is a maximal stable set (if it is not, we can move one vertex from K to S and make S maximal stable).
T h e o r e m 14.3.17 Let G(K, S) be a split graph with S a maximal stable set. Then the following conditions are equivalent:
1. G is equistable; 2. G is strongly equistable; 3. Every two vertices of K have a common neighbor in S. P r o o f . 3) =v 2): This follows from Theorem 14.3.10. 2) =v 1): This follows from Lemma 14.3.3. 1) =v 3): Let b and c be distinct vertices of K with no common neighbors in S. Vertices a C Ns(b) and d C Ns(c) exist by the maximality of S, and hence there is an induced P4(a, b, c,d). However, S has no vertex adjacent to both b and c, contradicting Theorem 14.3.8. 9
14.3.3
Pseudothreshold and Outerplanar Graphs
Recall the characterization of pseudothreshold graphs in Theorem 14.2.7. In that theorem we can require that GIRl has no dominating vertex, since such vertex can be put in P. We denote G with the partition as in that theorem by G(P, Q, R), always requiring that GIRl has no dominating vertex. L e m m a 14.3.18 A graph G is a P4-free graph without a dominating vertex
or stable set of size 3 i f and only if G -
W1 (~ "" | Wt for some t >_ 1,
364
Pseudothreshold and Equistable Graphs
where each W~ is of the form W~ - K~ U K[ and I(~, I([ are disjoint non-empty complete graphs. P r o o f . This follows easily from Lemma 14.3.6. 9 Note that G(P, Q, o) is a split graph, whose equistability is characterized by Theorem 14.3.17. The next theorem characterizes the equistability of the other pseudothreshold graphs. T h e o r e m 14.3.19 For a pseudothreshold graph G(P, Q, R) with R ~r 0, the following conditions are equivalent"
1. G is equistable; 2. G is strongly equistable; 3. G[R] is P4-free. P r o o f . 2) =~ 1): This follows from Lemma 14.3.3. 1) ~ 3): If G[R] contains an induced P4(a, b, c, d), then S = {a, d} U Q is a maximal stable set, since R has no stable set of size 3, and every vertex of P is adjacent to a. However, S has no vertex adjacent to both b and c, contradicting Theorem 14.3.8. 3) ~ 2): Lemma 14.3.18 describes the structure of G[R], and we adopt the same notation. We also put I ' ( i - {kil, ki2,...} and I ( [ - {k~l , k~2,...} for i = 1 , . . . , t. Clearly the maximal stable sets of G are the sets of the following two forms: {p} U NQ (p) with p C P, and { kij, k~t } U Q with kij E I(~, k~t E I'(~, i = 1 , . . . , t. Therefore aJ C .A if and only if aJ is non-negative and satisfies the following equations: m
w(p) + co(NQ (p) ) w(kij) + a3(k~t) + aJ(Q) -
1 1
Vp E P
(14.7)
Vi,j, 1.
(14.8)
It follows from (14.8) that aJ is constant on each / T i and on each K~. Therefore (14.7) and (14.8) are equivalent to the following system of linearly independent equations:
w(p) + w(-NQ(p))
-
1
Vp E P
32(~il) + (-U(]~I) -t- co(Q)
w(kij)--w(kil)
--
1
Vi
(14.10)
--
0
Vj _> 2, Vi
(14.11)
-
0
v j _> 2, vi.
( 4.12)
(14.9)
14.3
Equistable Graphs
365
To prove that G is strongly equistable, let T E T and c _< 1 be given, and assume that, if possible, w(T) - c for all w E ~4. Then the equation aJ(T) - c is a consequence of Equations (14.9)-(14.12), and therefore a linear combination of them. Therefore the equation w ( T ) - c takes the form t
E (~p[O,.)(p)-~-(.u(NQ(p))] Jr E ")/i[('u(~il ) + ("g(]r pEP t
-t- ~
+ (,M(Q)]
i=1 t
~_~ aij[w(kij) - co(kii)] + ~ ~ a'ij[w(k~j ) - w(k~l)]
i = 1 j_>2
(14.13)
i = 1 j_>2 t
pEP
i=1
' Since w(p) appears only once in the sysfor some multipliers 5p, ~/i, aij, aij. tern (14.9)-(14.12), and with a coefficient of 1, we have 5p = 1 if p E P N T, 5p=0ifpE P-T. Similarly for j _ > 2 , aij = 1 ifkij E K i n T , aij = 0 i f k~j E K~ - T, a~j - 1 if k~j C K[ N T, a}j - 0 if k~j E K~ - T. Therefore, in order for the coefficient of w(k~l) in the linear combination (14.13) to assume its correct value (1 if k~l E T, 0 if not), 3'~ must be equal to ]Is n T I. Similarly 7i must also be equal to IK[ N T I. Thus we can rewrite (14.13) in the following way: t
pEPnT
[~(p) + ~(xq(p))] + E ~ ( Q ) i=1 t
+ ~(/q n T) + ~(/(~
n T ) --
IP n TI + ' ~ ~,
(14.14)
i=1
where
~ - IIq n T I Note that
IK[ n TI.
(14.15)
t 1 ~/i - 71R n T I.
(14.16)
i=1
Therefore 1 IP N T] + ~]R n T] - c.
(14.17)
Further, in order for w(q), q E Q, to assume its correct coefficient in (14.14) (lifqEONT, 0ifqEO-T),wemusthave 1
INpnr(q)l + -~lR A T
]e 1 I - ~[ 0
for q E Q N T forqEQ-T.
(14.18)
Pseudothreshold and Equistable Graphs
366
From (14.15)-(14.17), c is an integer, and from c _< 1 we obtain c - 0 or C--1. C a s e 1" c - 0. Then by (14.17) P A T - R A T - 0 . Then the left-hand side of (14.18) is 0, which implies Q n T - O. Therefore T - O, contradicting TET. C a s e 2" c - 1. From (14.17), either P n T - {p} and R n T - O, or else P A T - O and R A T - {kij, k~l } (by (14.15)). In the first possibility, (14.18) can be rewritten as [I.N{p}(q).-
1 forqCQNT 0 for q E Q - T,
which means that Q N T - NQ(p). Thus T - { p } U N Q ( p ) , which is a m a x i m a l stable set, contradicting T C T. In the second possibility, the left-hand side of (14.18) is 1, which implies Q - T - o . Thus T - {kij, k~l} U Q, which is a m a x i m a l stable set, contradicting T E T. 9 D e f i n i t i o n 1 4 . 3 . 2 0 A planar graph is said to be o u t e r p l a n a r if it can be embedded in the plane so that every vertex lies on the boundary of the infinite region. Obviously, a graph is outerplanar if and only if each of its blocks is outerplanar. The following l e m m a is used to prove Theorem 14.3.23 below. L e m m a 1 4 . 3 . 2 1 Every 2-connected outerplanar graph with more than two vertices is a Hamiltonian graph. P r o o f . E m b e d the 2-connected outerplanar graph in the plane so t h a t all vertices lie on the b o u n d a r y B of the infinite region. Let C - V l , . . . , v k be ~ cycle all of whose edges lie on B. If C is not Hamiltonian, there is a vertex Ul ~ C adjacent to some vertex of C, say Vl. Since Ul is on B, Ul is in the exterior of C. Let v~ be any vertex of C, r :/: 1. By 2connectivity there is a cycle C' - V l t t l U 2 . . . containing the edge VlU 1 and the vertex v~. Let rn be the smallest index such that u,~ coincides with a vertex on C, say vj. Note that U l , . . . , u m - 1 are in the exterior of C and t h a t 2 _< j _< k. If j - 2, then V l , U l , . . . , u m , v 3 , . . . , v k is a cycle enclosing the interior of the edge VlV2, so that edge cannot lie on B, contradicting the choice of C. A similar contradiction occurs if j - k. If 2 < j < k, then either the cycle V l , U l , . . . , u m , v j + l , . . . , v k encloses v2 or else the cycle Vl, U l , . . . , Urn, V j - I , . . . , ?22 encloses vk, so either v2 or vk is not on B, a contradiction. 9
14.3
Equistable Graphs
367
D e f i n i t i o n 14.3.22 A flower Fn
-
Fn(?tl,...,?.tn;Yl,...,Vn)
is a graph consisting of an even cycle UlVlU2V2...UnVn whose chords are precisely the short chords UxU2, U2U3, . . . , U~Ul. Figure 1~,.3 illustrates the flowers F2 and F6.
Figure 14.3: Flowers.
V2
vx
U2
Y3 ..
U
V4 v
U
2
.Yl
6
,., V6
Ul
?,)2
~
~
U
2/ V5
F2
F6
T h e o r e m 1 4 . 3 . 2 3 Let G be an outerplanar graph. Then the following conditions are equivalent:
1. G is equistable; 2. G is strongly equistable; o
(a) each block of G is a flower, a square, or a complete graph on at most 3 vertices; (b) in a block of G that is a flower or a square, no vertex of degree 2 in the block is a cut vertex:
368
Pseudothreshold and Equistable Graphs
(c) in a block of G that is a complete graph, not all vertices are cut vertices.
P r o o f : 3) =~ 2)" By Theorem 14.3.4 we may assume that G is connected. If a block of G is a square, then by Condition 3b, this block is the entire G, and it is strongly equistable by being P4-free. If the block is a single vertex, then it is the entire G by connectivity and the same conclusion holds. We may therefore assume in addition that each block of G is a flower or a complete graph on two or three vertices. We construct a set S of vertices as follows" from each block that is a flower, put in 5' all the vertices of degree 2 in the block; from each other block put in S exactly one vertex that is not a cut vertex. Clearly the vertices of S in each block from a maximal stable set in the block, and further, by Condition 3b, S contains no cut vertex of G. Therefore S is a maximal stable set of G. It is easy to verify that S satisfies the condition of Theorem 14.3.10, and hence G is strongly equistable. 2) =~ 1)" This follows from Lemma 14.3.3. 1) =~ 3)" First we prove Condition 3a. Every block B of G is outerplanar. If B has at most four vertices, then B is clearly F2, a square, or a complete graph on at most three vertices. So assume that B has at least five vertices. By Lemma 14.3.21 B has a Hamiltonian cycle C - Zl . . . zk. We assume that G is embedded in the plane so that every vertex lies on the boundary of the infinite region. Therefore every chord of C lies in the interior of C. We now show the following two facts" F a c t 1 No f o u r consecutive vertices along C induce a P4. P r o o f . Assume without loss of generality that C has a P4(Xl, x2, z3, x4). By Theorem 14.3.8, G has a vertex v adjacent to both x2 and x3, but to neither Xl nor x4. Clearly v is in B, and hence v - xi for some i _> 6. Note that zi is the only vertex of G adjacent to both x2 and x3 by planarity. If x4xi-1 ~ E , extend { X l , X 4 ~ X i _ I } t o & maximal stable set S, and S will violate Theorem 14.3.8 with respect to P4(xl,x2, x3, x4). Therefore x 4 x i - , E E. See Figure 14.4. Now consider P4(x2, xi, xi-1, x4). The only vertex that can possibly be adjacent to both xi and xi-1 is x3, which is adjacent to x2, a contradiction to Theorem 14.3.8. This proves Fact 1. F a c t 2 Between every four consecutive vertices along C, there is exactly one chord, and this chord joins two vertices at distance 2 along C. P r o o f . Consider for example Xl,X2, X3, X4. By Fact 1, there is a chord between them, and it is enough to show that XlX4 is not a chord. If XlX 4 is & chord, then between x2, z3, x4, xs or between xk, x l , x 2 , x3 there is no chord,
14.3
Equistable Graphs
369
Figure 14.4: Illustrating the proof of Fact 1. Dashed lines indicate nonedges. X4 X3
9
X 2
Xl
Xi-1
contradicting Fact 1. This proves Fact 2. From Fact 2, it follows that k is even and B has a spanning flower fn(tll,
. . . , tln;
Yl,.
. . , Yn),
where n - k/2 >_ 3. It remains to show that the cycle U l . . . t t n is chordless in B. Assume for example that U l U i C E , where 2 < i < n. Then the P4(vl, Ul, u~, v~) and any maximal stable set S containing { V l , . . . , v~} contradict Theorem 14.3.8. This proves Condition 3a. To prove Condition 3b, consider first a block B that is a flower fn(tll,
. . . , tln;
Yl,
. . . ~ ~)n)
and assume for example that Vl is a cut vertex. Let x be any neighbor of t~1 outside B. Then the P4(x, vl, u2, v2) and any maximal stable set S containing {x, v2, v~} contradict Theorem 14.3.8. Similarly, consider a block B that is a square abcd, and assume for example that a is a cut vertex. Let x be any neighbor of x outside B. There is no vertex adjacent to both a and b, yet there is P4(x, a, b, c), again contradicting Theorem 14.3.8. The proof of Condition 3c is similar to the proof of Condition 3b. 9
370
14.3.4
Pseudothreshold and Equistable Graphs
Equistability, Strong Equistability, and Substitution
In Subsection 14.3.2 we saw among other things that for split graphs and block graphs, equistability is equivalent to strong equistability. Below we show that more generally, the same is true for all perfect graphs. Recall the definitions of .A, S, and T at the beginning of Subsection 14.3.1. Theorem
14.3.24
1. If G is a perfect graph and .A 7~ 0, then .A has an integer-valued weight function w. 2. A(G) has an integer-valued weight function if and only if G has a clique meeting all maximal stable sets. 3. If G is equistable, and if for every T C T there exists some co E A such that w(T) is not in the open interval (0,1), then G is strongly equistable. ~. In particular, if G is an equistable perfect graph, and more generally if G is an equistable graph with a clique meeting all maximal stable sets, then G is strongly equistable. P r o o f . 1" Consider the clique matrix M of the complementary graph G, whose rows are the incidence vectors of the maximal stable sets of G. By Ldvasz's Perfect Graph Theorem [Lov72], G is perfect. Hence by Chvs Theorem [Chv75], the extreme points of the polytope defined by Ma~ _< 1, aJ _> 0 are integer-valued. Note that A is a face of this polytope, and since by assumption A r 0 , .4 contains an extreme point of the polytope. 2: Let co be an integer-valued weight function in .4. Since every maximal stable set S satisfies aJ(S) - 1, S must contain exactly one vertex x with w(x) - 1. Let C be the set of all vertices x such that aJ(x) - 1. Clearly C meets all maximal stable sets. Moreover, C is a clique, otherwise some two vertices of C can be extended to a maximal stable set S with a~(g) >_ 2. Conversely, if C is a clique meeting all maximal stable sets, let aJ be the characteristic vector of C. Clearly w is an integer-valued weight function in
A. 3: Since G is equistable, there exists a non-negative weight function a / s u c h that J ( S ) - 1 if and only if S E $. To show that G is strongly equistable,
14.3
Equistable Graphs
371
let T E 7 " a n d c_< 1 be given. B o t h w a n d w ~ are in A. I f c < 0 there is nothing to prove. If c - 0, then co(T) r 0 since T r e (any vertex x C T can be extended to a set 5' C $; if w'(x) - O, then co'(S- x) - 1 even though S-x ~,5'). If0 < c < 1, then co(T) r c. If c - 1, t h e n a / ( T ) r csince
T s. If G is equistable, then ~4 -~ ~. If in addition G is perfect, then by Parts 1 and 2 above, G has a clique meeting all maximal stable sets. If G is equistable and has such a clique, then by Parts 2 and 3, G is strongly equistable. [] Note that the flower Fs is a non-perfect equistable graph having a clique meeting all maximal stable sets. The strongly perfect graphs [BC84] are the graphs in which every induced subgraph has a stable set meeting all maximal cliques. Their complements then have a clique meeting all maximal stable sets. Moreover, the strongly perfect graphs are perfect [BC84], and so are their complements. A clique of the form N[v] for some vertex v is said to be a simplicial clique. Clearly a simplicial clique meets all maximal stable sets. We now characterize the graphs satisfying the sufficient condition of Theorem 14.3.10 using simplicial cliques. 4:
T h e o r e m 14.3.25 For every graph G - (V, E), the following conditions are equivalent:
1. G has a maximal stable set S such that for every u, v C V - S, uv C E if and only if Ns(u) n N s ( v ) # ~; 2. every edge of G is in a simplicial clique. P r o o f : 1) ~ 2)" For every s C S, N[s] is a clique by the "if" part of Condition 1. These simplicial cliques cover E by the "only if" part of Condition 1. 2) =~ 1)" Let N[v~],... ,N[vk] be all the distinct simplicial cliques, and let S - {Vl,..., vk}. The set S' is stable, since if vivj C E, then N[vi] C_ N[vj] and N[vj] C_ N[vi], contradicting the distinctness of N[vi] and N[vj]. Further, S is maximal stable, because every vertex belongs to some simplicial clique by Condition 2. Again by Condition 2, if u, v C V - 5' and uv ~ E, then u and v cannot have a common neighbor vi, because N[vi] is a clique.
C o r o l l a r y 14.3.26 If G - (V, E) is a graph satisfying Condition 1 of Theorem 14.3.25, then for each x C V there exists some w C A with co(x) - 1.
~
~
~
C~
~
9 r bo
~
II ~
~ ~
Ch
~'~ ~ "
~"
~.~.~
~i,
9
-
mr<
~
"~
.'7-"
~
.~ ~
9
C
II
m
~
I ~cn
i,O
~
"~"
O ~ t O m" ~
II
~i1
"
~'~
CbC]
t,o
b.a
"--~
o+c~
~
9
~.~,
9
~
0
b~
('1)
~
C
~
~
~n4
~.~
cao
C~
E.~
="
Fat]
""
~
~<
m'~
~
~"
.
car]
9
~,
l:m (~
~H
~
II
~F~. ~ Cb
0
o ~..
~~~
~~2
~ ~ ~
---'
~'~
."7" 0
~-~~
o
~
~
~~
~
=-.
c~
o
~.~
~.~.
t,,a
~~
~
[9=
~
~~-~
9
o~
(1)
~.~.
m-
A~
~"
~
e-~ c~" 9
0
e-~
~
m-
c-~
c-~
~
~ . .
~ ~
0~ o
~~~
~~~
~~ o~
d)
9
0
[m ..
9
~~-
(1)
9
T-< ~--~-
o Cb~
C~
~.Zo
(I)
~ G~
~Tc~
9
~.~~ o 9
o" ~J
lid,
t~
o
fl)
m"
o
14.3
Equistable Graphs
373
P r o o f : For each COl E r 022 E r define co" V(H) ~ R + as in Lemma 14.3.28. Then ~o C A(H). Given any T C T ( H ) and c < 1, let T1 - T fl V(G1), T2 - T N V(G2). Then co(T) - col (T1) -t- col (x)co2(V2).
If w2(T2) is not constant for all ~2 C ~4(G2), choose aJi - a~, and then aJ(T) is not constant for all ~o C ~4(H). If aJ2(T2) is a constant b > 1 for all co2 C ~4(G2), then again takew - w~, and then c0(T) - aJl(T1)+w2(T2) >_ b > 1 >_ c. In the remaining case aJ2(T2) is a constant b _< 1 for all w2 C .A(G2). Since G2 is strongly equistable, T2 - O or T2 C 8(G2). If T2 - 0 , then b - 0, T1 C T(G1), and w(T) - COl(T1); and since G1 is strongly equistable, we can choose col so that COl(T1) -r c. If T2 C 8(G2), then b - 1, T1 t2 {x} C T(G1), and aJ(T) - wl(T1 U {x}); again we can choose aJ1 so that aJl(T U {x}) -~ c, since G1 is strongly equistable. 9 C o r o l l a r y 14.3.30 Assume that GI satisfies the sufficient condition of Theorem 1~.3.10 and G2 is strongly equistable. Then Gl(x ~ G2) is strongly
equistable for each x C V(G1). P r o o f : This is a consequence of Corollary 14.3.26 and Theorems 14.3.10 and 14.3.29. C o r o l l a r y 14.3.31 Let C be the class of all strongly equistable graphs G
such that for each x C V(G), there exists a weight function co E .A(G) with co(x)- 1. Then C is closed under substitution. P r o o f : This follows from Theorem 14.3.29 by defining the weight function as in L e m m a 14.3.28. 9 The class C contains all the equistable graphs that we encountered in the last two subsections: in every one of these graphs, every vertex belongs to a clique meeting all the maximal stable sets. An interesting class of graphs from our point of view here is the class of co-Meyniel graphs, the complements of the Meyniel graphs. A Meyniel graph [Mey76] is a graph in which each odd cycle of length at least 5 has two or more chords. L e m m a 14.3.32
substitution.
The Meyniel and the co-Meyniel graphs are closed under
374
Pseudothreshold and Equistable Graphs
P r o o f i Let G1 and G2 be Meyniel, and assume that, if possible, H = Gl(x --+ G2) has an odd cycle C of length at least 5 with at most one chord. Then C has at least two vertices of G2, for otherwise G1 is not Meyniel. Also, C has at least two vertices of G1, for otherwise G2 is not Meyniel or C has a dominating vertex. Therefore the vertices of C alternate at least twice between G1 and G2, i.e., C has non-incident edges ab and cd with a, c in G1 and b, d in G2. It follows that ad and bc are edges of H. One of them, say bc, is an edge of C and the other, say ad, is a chord of C, for otherwise C has length 4 or C has two chords. The sequence of vertices along C from d to a in the direction abcd begins with the vertex d of G2 and ends with the vertex a of G1. This sequence has at least three vertices. Therefore it has adjacent vertices e in G1 and f in G2 such that at least one of them is distinct from a, b, c, d. If e is distinct from a, b, c, d, then eb is a second chord of C, and if f is distinct from a, b, c, d, then fc is a second chord of C, a contradiction. This proves that the Meyniel graphs are closed under substitution. The co-Meyniel graphs are also closed, as Gl(x --+ G2) = Gl(x ---+ G2). I The following is a result of Hokng [Hok87] (See also [Her90]). L e m m a 14.3.33 A graph is Meyniel if and only if, for each induced subgraph, each vertex belongs to a stable set meeting all maximal cliques. We can now prove the following about the co-Meyniel graphs: T h e o r e m 14.3.34 The equistable co-Meyniel graphs are strongly equistable, and are closed under substitution. P r o o f i By Lemma 14.3.33, if G is co-Meyniel, then each vertex of G belongs to a clique meeting all maximal stable sets. If in addition G is equistable, then G is strongly equistable by the "more generally" clause of Part 4 of Theorem 14.3.24. (In fact, the Meyniel graphs are known to be strongly perfect [Rav82] and thus perfect, and hence G is perfect. Therefore the strong equistability of G follows also from the more particular clause of Part 4 of Theorem 14.3.24.) Further, by the proof of Part 2 of Theorem 14.3.24, for each vertex x of G there exists an aJ E ,4 with a3(x) = 1. Therefore, if both G1 and G2 are co-Meyniel and equistable, they are strongly equistable, and GI(X ~ G2) is strongly equistable by Theorem 14.3.29 and co-Meyniel by Lemma 14.3.32. 9 We conclude this section with the following two c o n j e c t u r e s .
1. The strongly equistable graphs are closed under substitution. 2. All equistable graphs are strongly equistable.
Chapter 15 Threshold Weights and Measures 15.1
Introduction
In this chapter we consider three ways, in addition to the threshold dimension, to gauge by how much a given graph differs from being a threshold graph. The threshold weight of a graph was introduced by Wang and Williams [WW91] and also considered by Mahadev and Peled [MP91]. We assign a non-negative weight to each vertex and each edge of the graph, and define the score of a set of vertices as the sum of the weights of its vertices and of the edges induced by these vertices. We wish to choose the weights so that the score of each stable set is smaller than the score of each non-stable set, and the sum of the edge weights is minimal. Under a suitable normalization, the minimum value is the threshold weight of the graph, and by this definition it is zero if and only if the graph is a threshold graph. We discuss the threshold weight in Section 15.2. The threshold measure of a graph was introduced by Peled and Simeone [PS89a]. Here one assigns non-negative weights just to the vertices, as in the definition of a threshold graph, and considers that the score of a set of vertices is the sum of the weights of its vertices. In general we cannot make the score of each stable set smaller than the score of each non-stable set. Instead, we normalize the weights by requiring that the smallest score of a non-stable set be 1, and minimize the largest score of a stable set. The minimum value, which is smaller than 1 if and only if the graph is threshold, is the threshold measure of the graph. We discuss the threshold measure in Section 15.3. The threshold gap of a graph was 375
Threshold Weights and Measures
376
introduced by Hammer, Ibaraki and Simeone [HIS78, HIS81]. It is actually a property of the degree sequence of the graph, namely half of the smallest distance in the L 1 n o r m between the degree sequence and any threshold sequence of the same length. Thus it vanishes if and only if the given degree sequence is a threshold sequence. Arikati and Peled lAP94] introduced the majorization gap of the degree sequence as the minimum number of reverse unit transformations required to transform it into a threshold sequence. It turns out that the threshold gap is the same as the majorization gap. We discuss the threshold and majorization gaps in Section 15.4.
15.2
Threshold Weights
In this section, based on the work of Wang and Williams [WW91] and Mahadev and Peled [MP91], we define the threshold weight of a graph and discuss its properties. As we mentioned in the Introduction, to define the threshold weight of a graph G = (V, E), we assign a weight w~ >_ 0 to each v e r t e x i E V and a w e i g h t we >_ 0 to each edge e E E. The score o f a s e t S C_ V of vertices is computed as ~ i e v wi + ~eeE(S) we, where E(S) is the set of edges with both endpoints in S. We require that the score of each stable set be smaller than the score of each non-stable set. This requirement has the normalized form in which the score of each stable set is at most t - 1 and the score of each non-stable set is at least t for some threshold parameter t. By the non-negativity of the weights, it is sufficient to require this only for maximal stable sets and minimal non-stable sets (two adjacent vertices). We wish to minimize the sum of the edge weights, and its minimum value is defined as the threshold weight of G. We are thus led to the following formal definition.
Definition 15.2.1 The threshold weight W(G) of a graph G = (V, E) is the optimum value of the following linear programming problem. rain
~
w~
eEE
s.t.
~ wi ~ t - 1
for each maximal stable set S C_ V
iES
wi + wj + we >_ t for each edge e = ij E E
w>O.
(15.1)
15.2
Threshold Weights
377
An assignment (w; t) is called a feasible ( o p t i m a l ) t h r e s h o l d a s s i g n m e n t when it is feasible (optimal) for the linear programming problem (15.1). In general (15.1) involves an exponential number of constraints, since there are as many maximal stable sets. The graph G satisfies W(G) - 0 if and only if G is a threshold graph, since W(G) - 0 means that all the edge weights are zero. The assignment of zero vertex weights and unit edge weights is always feasible with t - 1, and this feasible threshold assignment has an objective function value equal to IEI, the number of edges. Therefore 0 < w ( a ) _< ]El for every graph G, where one extreme, 0, characterizes the threshold graphs. We call a graph G - (V, E) at the other extreme, i.e., one satisfying W ( G ) - IEI, ~ h~avy graph. In this sense, the heavy graphs are the most non-threshold graphs (of course, if E - O, then G is both a threshold graph and a heavy graph, but this is the only such case). A feasible threshold assignment remains feasible when restricted to an induced subgraph, and hence W ( H ) <_ W(G) for every induced subgraph H of G. Moreover, if C 1 , . . . , Ck are the connected components of G, then for the same reason ~ =k1 W(C~) <_ W(G). Recall that two edges are said to be in conflict if their endpoints induce an alternating 4-cycle. L e m m a 15.2.2 Let e and f be edges in conflict in G. Then every feasible threshold assignment (w; t) for G satisfies w~ + wf >_ 2. Consequently, if G is a non-threshold graph, then W(G) > 2. P r o o f . Let e - p q and f wp + wT _< t - 1;
rs, where pr and qs are nonedges. Then
wq+ws
wp + wq + w~ > t;
w~ + w~ + wf >_ t
and therefore
w~ + w f > 2 t - wp - w q - w ~ - w ~ > _ 2 .
D e f i n i t i o n 15.2.3 Let (w; t) be a feasible threshold assignment of a graph G. The edges e satisfying w~ < 1 are called the light edges of (w; t). Part (a) of Figure 15.1 illustrates a feasible threshold assignment whose light edges do not form a threshold graph, although the graph induced by their endpoints is threshold. Part (b) illustrates an optimal threshold assignment
378
Threshold Weights and Measures
(its optimality follows from Lemma 15.2.2) whose light edges form a threshold graph, but the graph induced by their endpoints is not threshold. However, the following lemma shows that the light edges of an optimal threshold assignment form a threshold subgraph (not necessarily an induced one). Figure 15.1" (a) a feasible threshold assignment whose light edges do not form a threshold graph. (b) an optimal threshold assignment the endpoints of whose light edges do not induce a threshold graph. t-4 t-5
1
1
0 A
0
4
2
0
A
A
3
w
./
2
x_
w
0
3
w
2
0
2
(b) L e m m a 15.2.4 Let ( w ; t ) be an optimal threshold assignment of a graph G - (V,E), and let L be the set of light edges of ( w ; t ) . Then (V,L) is a threshold graph. P r o o f . If (V, L) is not a threshold graph, it has an alternating 4-cycle with edges pq and rs and nonedges pr and qs. The nonedges pr and qs may be nonedges of G, or edges of G with weight at least 1. If pr is a nonedge of G, we have wp + w~ _< t - 1 by the constraints of (15.1), and if pr is an edge with wp~ _> 1, we have the same conclusion, otherwise wp~ could be decreased below 1, contradicting the optimality of the threshold assignment. Similarly wq + w~ _< t - 1. On the other hand, wp + wq + Wpq ~ t together with wpq < 1 imply that w p + w q > t - 1, and similarlyw~ + w ~ > t - 1. These four inequalities are inconsistent. ..
15.2
T h r e s h o l d Weights
379
The following result follows directly from the constraints (15.1). It is very useful in proving that certain graphs possessing symmetry properties are heavy. L e m m a 15.2.5 Let ab be an edge and cd a nonedge of a graph G. Every feasible threshold assignment (w; t) for G satisfying wc + Wd > Wa + Wb must satisfy Wab >_ 1. In particular, if e -- xy is an edge, zy is a none@e, and Wz > wx, then we > 1. The following corollary is an example of applying Lemma 15.2.5. C o r o l l a r y 15.2.6 All cycles of length 4 or more and their complements are heavy. Proof. Let G be the k-cycle Ck. Consider any optimal threshold assignment (w;t) of G. Each of the k cyclic permutations of the vertex weights of w around the cycle accompanied by a corresponding permutation of the edge weights is again an optimal threshold assignment. The average (w*; t) of these k optimal threshold assignments is yet another optimal threshold assignment (this follows from the convexity of the set of optimal threshold assignments). But (w*;t) enjoys the property that its vertex weights are constant. Let e be an arbitrary edge of G and let f be a nonedge adjacent to e, which exists since k > 4. By applying Lemma 15.2.5 to (w*; t), we see that w~ > 1. Thus G is heavy. The proof for the complements of cycles is similar. 9 The heavy graphs cannot be characterized by forbidden configurations, since they are not closed under taking induced subgraphs. In fact, every graph with at least one edge has an induced threshold subgraph with one edge, which is not heavy. The following theorem gives a convenient characterization of heavy graphs in terms of the optimum value of a linear programming problem having fewer variables and constraints than (15.1). T h e o r e m 15.2.7 A graph G [El
>
max
(V, E) is heavy if and only if
E dizi
iEv
s.t.
for each maximal stable set iES
Scv
z>_O,
(15.2)
T h r e s h o l d W e i g h t s and M e a s u r e s
380
where di is the degree of vertex i. Proof. The linear programming dual of (15.1) is max
~-~ ys S
s.t. S
e
Vi C V S ~i
(15.3)
e ~i
y~ _< 1
Ve C E
y>_O. The constraints of (15.3) imply that E s ys <_ IEI, equality holding if and only if y~ = 1 for all e C E. By the definition of heavy graphs and the duality theorem of linear programming, we thus have that G is heavy if and only if the following system of linear inequalities is solvable. ys -
IEI
S
~--~Ys >_ di
VicV
S ~i
y>_O. In other words, again using linear programming duality, if and only if IE]
_> min E Ys
=
max
s
s.t.
~ ys >_di Vi
E dizi iEv
s.t.
~ z i <_ 1 VS
S~i
iES
y_O
z_>O.
A direct proof of Theorem 15.2.7 not using LP duality can be found in [MP91]. We apply Theorem 15.2.7 to show that several types of graphs are heavy. L e m m a 15.2.8 Ps (the path on 5 vertices) is heavy.
15.2
Threshold Weights
381
P r o o f . Denote the vertices as 1 , . . . , 5 along the path. Let z be feasible for (15.2). Then Zl + z3 + zs _< 1, z2 + z4 _< 1, and z3 _< 1. After multiplying these inequalities by 1, 2, and 1, respectively, and adding, we obtain Zl + 2 ( z 2 + z3 + z4) + zs _< 4, which is the condition for a heavy graph in Theorem 15.2.7.
T h e o r e m 1 5 . 2 . 9 If G - ( V , E) is a regular graph and x(G) < G is heavy.
IVI/2,
th~
P r o o f . Let r be the degree of every vertex, and let S 1 , . . . , S X be a partition of V into X - x(G) stable sets. If z is feasible for (15.2), then x k=l iESk
iEV
which is the condition of Theorem 15.2.7 for G to be heavy. T h e o r e m 1 5 . 2 . 1 0 Let G = (V,E) have a proper vertex-coloring in which each color has at least two vertices and all the vertices of the same color have the same degree. Then G is heavy. In particular, the complete k-partite graph K ~ .....~nk is heavy if mj >_ 2 for each j, the perfect matching inK2 is heavy if m >_ 2, and so on.
P r o o f . Let '--q'l,-.., Sk be a partition of V into stable sets, and let Dj be the common degree of the vertices of Sj for each j - 1 , . . . , k. If z is feasible for (15.2), then k
iEV
k
Dy j=l
E Dj iCSj
j=l
d /2 -IEI, iEV
which is the condition of Theorem 15.2.7 for G to be heavy. 9 Recall that N ( x ) denotes the open neighborhood of a vertex x, namely the set of all neighbors of x. The next theorem has a construction that preserves heaviness. T h e o r e m 15.2.11 Let G be a heavy graph, let x be a vertex of G, and let H be obtained from G by adding a new vertex y such that N(y) C N ( x ) in H (y is not adjacent to x). Then H is heavy. In particular, if v is a non-isolated vertex of a heavy graph and we add a new vertex of degree 1 adjacent to v, the graph remains heavy.
Thre s hold Weights and Measures
382
P r o o f . Let di denote the degree of vertex i C V ( H ) in H. The degree of vertex i E V(G) in G is then given by
d'i
if i ~ N(y) _ f di, d i - 1, if i c N(y).
In particular, d2 - d~ >_ dy. Let z be a feasible solution of (15.2) for H. Then the following constitutes a feasible solution of (15.2) for G:
, {
zi -
zi, if/=fix z~ + zu, i f i - x .
By applying the constraints of (15.2) to z on H and Theorem 15.2.7 to z / on G, we obtain
E
di Zi --
iEV(H)
iq~N(y)U{x,y}
<<=
E
iq~N(y)U{x,y}
E
iq~N(y)W{x,y}
~
dizi nt- E dizi + iEN(y) ieN(y)
d',z~ + ~
d~z~ + dyzy
ieN(y)
d'~z, + IN(v)I + d'~"
iEn(y)
d'~z~+ IN(y)I + d'~z"
i~x,y
_< IE(o)I + IN(y)i- IE(H)I. This is the condition for H to be heavy by theorem 15.2.7. T h e o r e m 15.2.12 Every forest having at least two non-singleton connected components is heavy. P r o o f . The forest can be obtained from a matching inK2 with m _> 2, which is heavy by Theorem 15.2.10, by repeatedly adding vertices of degree 1, which preserves heaviness by Theorem 15.2.11. 9 Recall that a star is a tree with at most one vertex of degree larger than 1. It is a threshold graph, and so its threshold weight is zero. A bistar is as tree with exactly two vertices of degree larger than 1; in other words, it is obtained from two disjoint stars by joining their centers. In the following, we show that the triangle-free graphs are heavy, with the exception of stars and bistars plus isolated vertices.
15.2
Threshold Weights
Theorem
15.2.13 I f G -
383
(V, E) is a bistar, then W ( G ) - IE[ - 1.
P r o o f . Let a and b be the vertices of degrees rn + 1 and n + 1, respectively (i.e., a is adjacent to b and to rn additional vertices of degree 1, and similarly for b). To show that W ( G ) = IEI- 1 = rn + n, we exhibit feasible solutions of the dual linear programming problems (15.1) and (15.3) that achieve the same objective function value. The solution of (15.1) has t = 2, w~ = 1 for each edge e with the exception ofw~b = 0, and wi = 0 with the exception of w~ = Wb = 1. The edge constraints are clearly satisfied, and so are the maximal stable set constraints, as is easy to verify for all the maximal stable sets, namely S~ = N ( a ) , Sb = N(b) and So = V - {a, b}. The objective function value is rn + n. The solution of (15.3) has y~ = 1 for each edge e with the exception of W~b = 0, and Yso = n, YSb = rn, YSo = 0. Again it is easy to verify the constraints and the fact that the objective function value is rn + n. .. Isolated vertices are immaterial to the question whether a graph is heavy, so in the next theorem we assume that there are none. T h e o r e m 15.2.14 Let G be a triangle-free graph without isolated vertices, which is not a star or a bistar. Then G is heavy. P r o o f . Let (w; t) be an optimal threshold assignment for G - (V, E), and let L be the set of light edges for it. If L - O, then clearly G is heavy, so assume that L 7~ 0 . By Lemma 15.2.4, the edges of L form a triangle-free threshold graph T, which is necessarily a star. Assume first that L consists of a single edge e. Since G is triangle-free, has no isolated vertices and is not a star or a bistar, it has an edge f in conflict with e, and by Lemma 15.2.2 w~ + w/ _> 2. Every other edge has weight of at least 1, and so the sum of the edge weights is at least ]E I and G is heavy. Now assume that L has more than one edge, and thus T is a star with more than one edge. Let a be the center of T. Since G is triangle-free, one of the cases below must hold. C a s e 1" a is on some cycle C of length 4. Let a, b, c, d be the vertices along C (b and d may or may not be in T), let V l , . . . , vk be the vertices of T other than b, d that are adjacent to b, and let U l , . . . , ut be the other vertices of T. Then a, c, b, d, V l , . . . , vk induce a complete bipartite graph K2,k+2, which is heavy by Theorem 15.2.10. By adding to it U l , . . . , ul we obtain an induced subgraph H of G in which U l , . . . , ul have degree 1, and so H is heavy by Theorem 15.2.11. Since (w; t) remains a feasible threshold assignment when
384
Threshold Weights and Measures
restricted to the induced subgraph H, the sum of the edge weights of the edges of H is at least IE(H)]. Since g contains all the light edges, every other edge has weight at least 1, and therefore the sum of all the edge weights of G is at least IE(G)I, so G is heavy. C a s e 2" a is on some cycle C of length 5, but not on any cycle of length 4. Then C is a chordless cycle and so is heavy by Corollary 15.2.6. The vertices of T not already on C are not adjacent to any vertex of C except for a, since G is triangle-free and a is not on any cycle of length 4. As in Case 1, these vertices and the vertices of C induce a heavy subgraph H of G containing all the light edges, and we proceed as before. C a s e 3" a is not on any cycle of G of length smaller than 6, and there are paths a, p, q and a, r, s having only the vertex a in common. Then q, p, a, r, s induce a chordless path of length 5, which is heavy by Lemma 15.2.8, and the vertices of T not already on it are not adjacent to any vertex of it except for a. As before, these vertices and the vertices of the path induce a heavy subgraph H of G containing all the light edges, so G is heavy. C a s e 4" a is not on any cycle of G of length smaller than 6, and there are no paths as in Case 3. If G has an edge e in a different connected component than the one containing T, then e and any light edge induce a matching 2K2, which is heavy by Theorem 15.2.10. Hence by Theorem 15.2.11 T and e form a heavy induced subgraph H of G containing all the light edges, and we are done as before. Therefore we may assume that G is connected. Since G is not a star or a bistar and we are in Case 4, there is a chordless path of length 4 starting from a. The vertices of this path, together with any vertex of T not already on it, induce a chordless path of length 5, and the argument continues as in Case 3. .. a clique C c_ V of G - (V,E) is called a big clique when IE(C)I > ] E ( V - C)I, where E ( X ) denotes the set of edges with both ends in X C_ V. The following lemma characterizes graphs possessing a big clique. L e m m a 15.2.15 A graph G - (V,E) has a big clique if and only if the following inequalities have an integral solution.
dizi > [El
where di is the degree of i E V
iEV
for each maximal stable set S C V iES
z>O.
(15.4)
15.2
Threshold Weights
385
P r o o f . Let z be integral and satisfy (15.4). Then each zi is 0 or 1, and the set C = {i C V : zi = 1} is a clique. Therefore
[El < ~ & z ~ - ~ & - 21E(C)I + IBI, iEV
iEC
where B is the set of all edges joining C to V - C. Therefore IE(C)I > ] E ( V - C)I , so C is a big clique. Conversely, if C is a big clique of G, its characteristic vector z satisfies (15.4) by a similar argument, tt C o r o l l a r y 1 5 . 2 . 1 6 A graph with a big clique is not heavy. P r o o f . This is immediate from Theorem 15.2.7 and Lemma 15.2.15. 9 It was conjectured that the converse of Corollary 15.2.16 holds. Indeed it holds for triangle-free graphs by Theorem 15.2.14, since stars and bistars have a big clique. However, it fails even f o r / Q - f r e e and Ks-free graphs, as the following examples show. Let Gk,~ denote the graph obtained from the k-cycle Ck by adding r dominating vertices. Then G9,2 is not heavy, and yet has no big clique. To see this, denote the successive vertices of C9 by u o , . . . , us and the two dominating vertices by vo, Vl. Then every maximal clique of G9,2 = (V, E) has the form C = {v0, Vl, Uj, Uj+ 1} (addition mod 9), and ]E(C)[ = 6 = [E(V - C)], so C is not a big clique. To show that G9,2 is not heavy, set zi = 1 for i = v0, Vl and zi = 1/4 for i = u 0 , . . . , Us. It is easy to verify that z is a feasible solution of (15.2) with objective function value larger than IE]. By a similar argument Gk,T is not heavy and has no big clique for each r -2,3mod4
if k - 3 + (~+2). The above counterexample is Ks-free, but not K4-free. There are also K4-free counterexamples. Consider the 5-wheel G5,1 and attach a path of length 2 to one of its vertices. Call the resulting graph an umbrella if the path is attached to the center, and a kite if it is attached to another vertex. It is easy to see that both the umbrella and the kite have no big cliques. Both of them are also not heavy by Theorem 15.2.7, as can be seen from the (optimum) solution of (15.2): zi = 1 if i is the center of the wheel, zi = 1/2 if i is any other vertex of the wheel, and zi = 0 if i is one of the other two vertices. The conjecture does hold for perfect graphs, as shown by the next theorem. Theorem
1 5 . 2 . 1 7 Every non-heavy perfect graph has a big clique.
Thre s hold Weights and Measures
386
P r o o f . Let G = (V, E) be a non-heavy perfect graph. By Theorem 15.2.7, since G is not heavy, inequalities (15.4) have a solution. This means that the optimum solutions of the linear programming problem (15.2) have a value larger than ]El, and hence this linear programming problem has a basic feasible solution z with value larger than IEI. Since G is perfect, every basic feasible solution is integer by Chvgtal's theorem [Chv75], so z must be integer. Hence G has a big clique by Lemma 15.2.15. m To close this section, we mention the following open p r o b l e m s . 1. We do not know if the problem of recognizing a heavy graph belongs to NP, nor do we know if it belongs to co-NP. 2. The problem of recognizing a graph with a big clique is in NP, but we do not know if it is in P. 3. Within the class of non-heavy graphs, which graphs, in addition to perfect graphs, have an integer optimal solution to the linear program (15.2)?
15.3
Threshold Measures
This section is based on the work of Peled and Simeone [PS89a]. By the definition of threshold graphs, a graph is threshold if and only if we can assign a non-negative weight to each vertex so that the total weight of each stable set of vertices is smaller than the total weight of each non-stable set of vertices. By the non-negativity of the weights it is enough to require this separation just for maximal stable sets and minimal non-stable sets (pairs of adjacent vertices). In a suitable normalization of the weights, this means that a graph G = (V, E) is a threshold graph if and only if there exist vertex weights wv >_ 0, v C V and a threshold r < 1 such that ~ v e S Wv <_ r for each maximal stable set S and w~ + Wv _> 1 for each edge u v C E . In other words, the minimum of r is smaller than 1 when subject to the maximal stable set and the minimal non-stable set constraints and the non-negativity of w. We therefore regard the minimum of r subject to the above constraints as a certain measure of the non-thresholdness of G. This motivates the following definition.
15.3
387
Threshold Measures
1 5 . 3 . 1 The t h r e s h o l d m e a s u r e v ( G ) of a graph G - (V, E) is the optimal value of the following linear programming problem.
Definition
min
s.t.
r
~ wv <_ ~-
for each maximal stable set S c_ V
yES
(15.5)
wu + w, >_ l for each edge uv C E w>O.
To emphasize the dependence of the optimum w on G, we sometimes denote it by w(G). Thus the optimum value of 15.5 is smaller than 1 if and only if G is a threshold graph. In that case, the minimum can be found by the very efficient and elegant algorithm of Section 1.3. The optimum value is equal to 1 if and only if G is a pseudothreshold graph. We have seen in Section 14.2 an algorithm to recognize these graphs and a characterization of their structure, from which it follows that when the optimum of (15.5) is 1, there is always an optimum solution for which the components of w have values of 0, 1/2 and 1. Figure 15.2 illustrates optimal solutions of (15.5) for a threshold graph and a non-threshold graph. Like (15.1), the linear programming problem (15.5) has exponentially many constraints, since in general there are as many maximal stable sets. This indicates that finding T(G) may be hard. We show below that this is indeed the case. We begin our general discussion of the threshold measure by determining the threshold measure of a disjoint union of two or more graphs. 15.3.2 w(G1 [..J G2) --~ (w(G1),w(G2)). Consequently T(G1 U G2) -- 7"(G1) -k- T(G2). This generalizes immediately to the union of any number of graphs.
Theorem
P r o o f . For k = 1,2, it is convenient to denote by Ak and Bk the edge-vertex incidence matrix and the maximal-stable-set-vertex incidence matrix of Gk. In other words, Ak has a column for each vertex and a row for each edge of Gk, and the corresponding entry is 1 or 0 according as the vertex is or is not an endpoint of the edge. Similarly Bk has a column for each vertex and a row for each maximal stable set, and the corresponding entry is 1 or 0 according
Threshold Weights and Measures
388
Figure 15.2" Threshold measures of (a) a threshold graph and (b) a non-threshold graph. Tz
8 9
5 4
T-1 4
1
1
9
l
9
~ ~1
12 / '
(b) as the vertex belongs or does not belong to the maximal stable set. We also let e k and fk denote all-1 column vectors of appropriate dimensions. Then the linear programming problem (15.5) for Gk can be written as follows, where tt k and u k denote row vectors of dual variables corresponding to the vector constraints of (15.6)" min #k
s.t.
Vk
A k w k >_ ek - - B k w k + rk.f k > 0 Wk>_O.
(15.6)
The linear programming dual of (15.6) is the following" T(Gk) lVk
-
max
13,k e k
s.t.
ttkAk -- v k B k <_ 0
vkf
- 1
tt k >_ O,
(15.7)
~'k >_ O.
To formulate the corresponding linear programming problems for G1 U G2, we use the fact that its maximal stable sets are precisely the unions of maximal
15.3
Threshold Measures
389
stable sets of G1 and G2. If i and j index the maximal stable sets of G1 and G;, respectively, then the maximal independent set constraint of (15.5) for G1 tO G2 reads ( B l W l ) i -~- (B2w2) j ~ T. We can therefore write (15.5) for G1 [-J G2 as follows, where jttl, jM2, Pl, P2 and uij are the dual variables to the corresponding constraints of (15.8), and where ~1 and rl2 are auxiliary column vectors introduced for convenience: r(GIUG2)
--
rain T s.t.
/-t2 Pl P2 Pij
A l W l ~ el A2w2 k e2 - B l W l + T~I -- 0 - B 2 w 2 + r12 - 0
(15.8)
--(?]1)i- (?]2)j -t'- T ~ 0 W 1 ~ 0,
W2 ~ 0.
The linear programming dual of (15.8) is as follows" 7-(G1 [,.J G2) Wl w2 (?]1)i
-
max s.t.
I-I,l e l -~ ~2e2 ~t 1A1 - PlB1 < 0 t t 2 A 2 - p2B2 < 0 ( P l ) i - E j 17ij = 0 (m)j
T
-
aj
= 0
~ i j vii = 1 tt 1 > 0 , tt 2 > 0 ,
aj >_ O.
The theorem asserts that if wl, r~ and w~, r~ are optima of (15.6) for k - 1,2, respectively, then (w~, w~), r~ + r~ defines an optimum of (15.8) when the auxiliaries rl~, rl~ are determined from the equations of (15.8). To show this, note that the constraints of (15.8) are satisfied, and then consider optima t t ; , v ; of (15.7). They satisfy the following complementary slackness conditions: tt*k(Akw*k -- ek) = 0 (15.10) v*k(--Bkw*k + r[~f k ) = O.
(15.11)
We define variables for (15.9) as follows:
It is easy to see that these variables define a feasible solution of (15.9). They also satisfy all the required complementary slackness conditions: (15.10),
390
Threshold Weights and Measures
(15.11), and the condition .;
+
-(,;),-
- 0
By theorem 15.3.2 we may assume without loss of generality that G is connected. We now consider how the threshold measure of a join of two graphs is related to their threshold measures. Unlike the case of the union, we only give estimates, for a reason that will be shown soon. T h e o r e m 1 5 . 3 . 3 Let G1 and G2 be disjoint graphs with largest stable set sizes OL1 and a2, respectively. Then C~lt~2 ~1 -t'- C~2
~ T(G1 (~ G 2 ) ~
~1 max(o~ 1 , c~2 ) 9
P r o o f . The upper bound for T(G10 G2) follows from the fact that assigning to every vertex a weight of g1 and taking T -- 71 max(a1, a2) defines a feasible solution of (15.5) for G1 | G2. To prove the lower bound, let Sk be a stable set of size ak in Gk for k = 1, 2. For every feasible solution w, T of (15.5) for G1 @G2, Sk possesses a vertex vk satisfying Wvk <_T/ak. The non-stable set {Vl, V2} satisfies wvl + WV2 ~ 1, which gives the desired bound. ,, C o r o l l a r y 15.3.4 If ~ 1 - - OL2 phic), then T(Ga | G 2 ) - a/2.
--
OL
(in particular, if G1 and G2 are isomor-
An immediate consequence of Corollary 15.3.4 is that it is hard to compute the threshold measure in general. Theorem
15.3.5 It is NP-hard to compute the threshold measure of a graph.
P r o o f . This follows from a(G) = 2T(G | G). " Unlike T(G~U G2), T(G1 @ G 2 ) i s not a function of T(G1) and r(G2). Indeed, one can easily find graphs G, G' satisfying T(G) = T(G') but a(G) 5r a(G'), as illustrated in Figure 15.3. Now if there were a function f satisfying r(G1 | G2) = f(r(G1), T(G2)), we would have the absurdity
f(T(G), T(G)) -- T(G 9 G) - a(G)2 r a(G')2
=
a') -
15.3
391
Threshold Measures
Figure 15.3" Graphs with the same threshold measure but different largest stable set sizes. Optimal solutions of (15.5) are shown. r-1
c~-2
r-1
0
0
,iw
,w
1
0
0
,~,
1
1
c~-4 0
0
w
1
In the following we show that, in contrast to the situation described by Theorem 15.3.5 for general G, if G is bipartite, the linear programming problem (15.5), although still having exponentially-many essential constraints, is equivalent to a small, structured linear program with a symmetric coemcient matrix having 2's on the main diagonal and 0's and l's elsewhere. This small linear program can then be solved in polynomial time by the well-known methods of Khachian [Kha79] and Karmarkar [Kar84]. T h e o r e m 15.3.6 If G is a bipartite graph with an edge-vertex incidence matrix A, then
T(G)
-- min s.t.
eTpt A A r t t >_ e tt >_ O,
(15.12)
where e denotes an all-1 column vector of an appropriate dimension. Moreover, if It is an optimum of (15.12), then w - ATtt is an optimum of (15.5). Note that A A T is the edge adjacency matrix of G (or equivalently the adjacency matrix of the line-graph of G) with 2's along the main diagonal. P r o o f . By theorem 15.3.2 we may assume without loss of generality that G is connected, and in particular has no isolated vertices. Denote by B the maximal stable set vs. vertex incidence matrix of G and by f an all-1 column vector of an appropriate dimension. Then the definition (15.5) of r(G) can
392
Threshold
Weights
and Measures
be written as follows" T(G)
-
min
T
s.t.
Aw>e
(15.13)
Bw<_rf
w>O. m
The constraint B w <_ ~-f on w and ~- can be expressed as follows" r
>
max
wTb
s.t.
Ab < e
(15.14)
b binary, because A b <_ e and b binary imply that b is the characteristic vector of a stable set of vertices of G, so b is dominated by a row of B, and conversely. Since A has no zero columns, the constraint "b binary" of (15.14) can be relaxed to "b _> 0, integral". Since A is totally unimodular (because G is bipartite), the integrality constraint on b can be dropped. Thus by the duality theorem of linear programming, (15.14) is equivalent to the following: r
>
max
wTb
s.t.
A b <_ e
=
min
eTp,
s.t.
AT# > w
b_>O
(15.15)
#>_0.
Since A T >_ O, the inequality in (15.15) is equivalent to the existence of tt >_ 0 satisfying AT# _> w and r - eTpt. Therefore (15.13) is equivalent to the following: T(G)
--
min
7"
s.t.
Aw>e
(15.16)
ATIt >_ w eT# - r
#>o,
w>O.
The constraints involving w in (15.16), namely A w >_ e, ATtt >_ w and w >_ 0, can be replaced by A A T # >_ e, thus eliminating w. Indeed, this condition is clearly necessary, and conversely, if it holds and tt >_ 0, then w defined by w - A T # will satisfy its constraints in (15.16). This proves (15.12) and the moreover statement of the theorem. ..
15.3
Threshold Measures
393
There are several variations of Theorem 15.3.6. By the symmetry of A A T, the linear programming dual of (15.12) is given by "r(G)
-
max s.t.
err A A T v <_ e v>0.
(15.17)
Further, if G has edges, then w(G) > 0, which permits us to transform the variables/~ and r - e T # of (15.12) according to 1~-#
t T
1 T
and rewrite (15.12) as follows" =
max
t
=
s.t.
AAT)~ >_ te er,~ -- 1 ,~>0
max
min
( A A r,~)i
s.t.
eT~- 1 ,~>0.
(15.18)
Similarly, we can transform the variables v and r - e r u of (15.17) according to p=-- v S - - - -1 T
T
and rewrite (15.17) as follows" 1
=
min s.t.
s A A T p <_ se eTp--1 p>O
=
min
max
o
3
s.t.
"(AATp)j "---e Tp -1 p>_O.
(15.19)
The problem (15.19) is the linear programming dual of (15.18). The formulations (15.18) and (15.19) exhibit ~ 1 as the value of a two-person zero-sum game with payoff matrix A A T. The pure strategies of the players are the edges of G, and the payoff to the first player is the number of common endpoints of the two chosen edges. The optimal mixed strategies are the optimal ,~ and p.
:394
T h r e s h o l d W e i g h t s and M e a s u r e s
A vertex cover (or transversal) is a set of vertices meeting every edge. Using (15.17) and essentially reversing the steps in the proof of Theorem 15.3.6, we can obtain the following theorem, which together with Definition 15.3.1 gives a combinatorial rain-max relation for bipartite graphs:
T h e o r e m 15.3.7 If G -
( V , E ) is a bipartite graph with an edge-vertex incidence matrix A, then r ( G ) is the optimal value of the following linear programming problem:
max s.t.
r
~
zv >_ r
for each minimal vertex cover C c_ V
vec
(15.20)
zu+z~
for each edge uv 6 E
z>0.
Moreover, if v is an optimum of (15.17), then z of (15.20).
A T v is an o p t i m u m
P r o o f . By arguments similar to those of Theorem 15.3.6, we obtain the following from (15.17)" r(G) - m a x { r " A z < e, A T v < z, e T v -- r , z > O , v > 0}.
The existence of v > 0 satisfying A T v < z and e T v -- r is equivalent to T <_ m a x { e r r 9 A T v <_ z,~' > O} =
m i n { z T 6 9 A 6 >_ e, 6 >_ 0}
=
m i n { z T 6 9 A 6 > e , 6 binary}.
This means that with the vertex weights z, every vertex cover has a total weight of r or more, and establishes (15.20). The moreover part follows from the argument leading to the first equation of this proof. [] Figure 15.4 illustrates the optimal solutions of (15.12) and (15.17) for a tree. The optimal w and z are obtained from the illustrated tt and v, respectively, by summing them over the edges incident with each vertex. If a vector tt _> 0 satisfies A A T t t - e, then tt is an optimum of the linear programming problem (15.12) as well as of its dual (15.17). Stated differently, e v e r y / and j in (15.18) and (15.19) realizes the minimum or maximum there. This motivates the following definition.
15.3
395
Threshold Measures
3 Figure 15.4" Illustration of Theorem 15.3.6 for a tree. r - eTlu- eTv- 3"
oI
o
dk
A
0
1
lii1
3 A
1
5
0
A
1
0
3 A
0
A
1
7
D e f i n i t i o n 15.3.8 A bipartite graph with an edge-vertex incidence matrix A is called e q u i t a b l e if there exists a vector tt >_ 0 satisfying A A T t t - e. Clearly a graph is equitable if and only if all its connected components are equitable. Below we characterize the connected equitable bipartite graphs in terms of the maximum weight of a stable set of vertices under certain vertex-weights. The problem of finding a stable set with maximum weight in a bipartite graph has well-known network flow algorithms. We also give a characterization of equitable bipartite graphs in terms of a certain generalization of Hall's condition for the existence of a perfect matching in a bipartite graph. For trees the matrix A A T is non-singular, and we give very simple combinatorial algorithm for solving A A r t t = e for trees, leading to a characterization of equitable trees. We use the convention that the color classes of a bipartite graph are called red and blue. T h e o r e m 15.3.9 Let G be a connected bipartite graph having r >_ 1 red and b >_ 1 blue vertices. Assign a weight of ir to each red vertex and a weight of-g1
396
Threshold
Weights
and Measures
to each blue vertex. Then G is equitable if and only if the largest total weight of a stable set is 1.
P r o o f . Let i and j index the red and blue vertices of G - (V, E), respectively. We can write the linear programming problem (15.12) as follows, using the vertex variables w = ATtt, which by Theorem 15.3.6 constitute an o p t i m u m of (15.5): r(G)
-
min
~#~j i,j
s.t.
E
#ij -- Wi
J E
#ij -- Wj
(15.21)
i Wi nt- Wj ~ 1
ijcE
#~j >_ 0
ijEE
#~j - 0
ij~E.
If G is equitable, then (15.21) has an o p t i m u m satisfying wi + wj = 1 for all ij C E. Then by the connectivity of G all the wi are equal and all the wj b for all i are equal. Since ~ i wi - ~ i j pij - ~ j wj, it follows that wi - -;-4-g r wj = ~+b for all j, and r(G) - r+b" ~b Since w is a feasible solution of (15.5) every stable set S must satisfy ~ e s Wv < ;~b" This means that with the vertex weights given in the theorem, the total weight of every stable set is 1 or less. Since the stable set of all red vertices has a total weight of 1, the "only if" part of the theorem follows. Conversely, if G satisfies the condition of the theorem, then
1
~
max
s.t.
(
l~xi+
1 )
7" i
-b j
xi nt- xj ~ 1
~xj
ij E E
(15.22)
x binary. Since the constraint matrix of (15.22) is totally unimodular and there are no isolated vertices, the condition "x binary" can be relaxed to x >_ 0. Then
15.3
Threshold
397
Measures
by linear programming duality there exist
)~ij, ij
C E, satisfying
Aij
b
ijEE
1
~j >_ j:ijEE
for all i
r
(~5.23)
1
for all j
i:ijEE
A~j > 0
ij C E.
But every solution of (15.23) must satisfy all its inequalities except for the non-negativity constraints with equality, as can be seen by summing the /-inequalities or the j-inequalities. Therefore the vector A*=
rb A>O r+b -
satisfies AATA * - e, which proves the "if" part. 9 Next we characterize equitable bipartite graphs by a generalization of Hall's condition for the existence of a perfect matching in a bipartite graph. T h e o r e m 15.3.10 Let G be a connected bipartite graph having r >_ 1 red and b >_ 1 blue vertices. Then G is equitable if and only if every set X of red vertices satisfies 1
IN(X)l >_ -~ F ~h~
(15.24)
N ( X ) d ~ o t ~ th~ ~ t of ~ighbo~ of th~ w~tic~ of X .
P r o o f . Denote by R and B the sets of red and blue vertices, and assign weights of !~ and g1 to their vertices, respectively. Condition (15.24) states that the total weight of N ( X ) is at least the total weight of X, for each XcR. To prove the "if" part, let S be any stable set of vertices, and take X - S N R, so that S and N ( X ) are disjoint. Then B includes the set ( S N B ) U N ( X ) , whose total weight is at least the total weight of ( S N B ) U X = S by (15.24). Hence B is a stable set of maximum weight, and so G is equitable by Theorem 15.3.9. To prove the "only if" part, assume that G is equitable, and therefore the weight of every stable set is at most 1 by Theorem 15.3.9. For every set
Threshold Weights and Measures
398
-IXl+w(b-IN(X)l
1 X C R, the set X U ( B - N ( X ) ) i s stable, and hence 1 _> r giving (15.24). 9 From Theorem 15.3.10 and Hall's condition we immediately obtain the following.
Corollary 15.3.11 Let G be a bipartite graph with an equal number of red and black vertices. Then G is equitable if and only if G has a perfect matching. To characterize equitable trees, we need some notation. We continue the convention that i, i0 index red vertices and j, jo index blue vertices. For a tree T and any edge e = ij of T, deleting e from T produces two subtrees. We denote by Tij the subtree containing i and by Tji the subtree containing
j. P r o p o s i t i o n 15.3.12 Let T = (V, E) be a tree and let x be an assignment of vertex-weights, possibly negative, satisfying
E xi - E xj. i
(15.25)
j
Then there exist unique edge-weights Aij, ij E E satisfying ~ij
-
xi
for all i
-
xj
f o r aU j.
(15.26)
j:ijEE i:ijEE
An explicit formula for the ~iojo = E ieTio3o
xi-
,~ij i8 given by E
xj-
JET/0~ 0
E
xj-
jET30i 0
y~ xi.
(15.27)
iET~0,0
P r o o f . The existence and uniqueness of the Aij follow from an algorithm that solves (15.26) "from the leaves up". That is, choose a leaf (a vertex of degree 1), say i ~, and its unique neighbor j'. Set ~i,j, = xi, as dictated by (15.26), delete i' and the edge i'j' and replace x~ by x j , - x~,. The result is a smaller tree that still satisfies (15.25), to which we can apply induction. The basis of the induction is the one-edge tree, where (15.25) is utilized. To prove the explicit formula (15.27), we show below that the Aij defined by (15.27) satisfy
E j:iojEE
Xo.
(15.28)
15.3
399
Threshold Measures
Figure 15.5: Illustration of the proof of Proposition 15.3.12. i0
Tjxio
~/j2io
Tjkio
A similar proof holds for the other equation of (15.26). Let j l , . . . ,jk be all the blue neighbors of i0, as in Figure 15.5. Then
k
k(
E ~,oj- E ~,o~- E r=l
j:ioj6E
r=l
j
i
E x~j6Tj,.i o
Zx )
iETj,., o
xo)
proving (15.28). " We are now ready for a simple combinatorial characterization of equitable trees. T h e o r e m 1 5 . 3 . 1 3 Let T be a tree having r > 1 red and b >_ 1 blue vertices. For each edge e - iojo of T, define _ ~(~) r
r
b(~) b '
(15.29)
Tiojo containing io, respectively. Then T is equitable if and only if ~ >_ 0 for each edge e. In that case )~ is an optimum of the threshold measure problem (15.18).
Threshold Weights and Measures
400
P r o o f . Formula (15.29) is obtained from (15.27) by setting x~ xj __ ~. 1 Therefore by Proposition 15.3.12, )~ satisfies 1
A~j -
-
j:ijEE
all i
r
Aij
1 ~
-
1?- and
(15.30) all j,
i:ijEE
where T - (V, E). Thus if )~ _> 0, then )~ satisfies (15.23), and the argument of the "if" part of Theorem 15.3.9 shows that T is equitable. Conversely, if T is equitable, then as in the "only if" part of Theorem 15.3.9, the equations (15.30) admit a solution )~' _> 0. But by Proposition 15.3.12 these 1 equations have a unique solution given by (15.27), where xi - 1 and xj = -g, namely the ,k defined by (15.29). Therefore ,V - ,k and ,k _> 0 [] We conclude this section with two examples of equitable trees. T h e o r e m 15.3.14 Let T be a tree in which all red vertices have degree 2 (equivalently, T is obtained by subdividing each edge of a tree with a new vertex). Then T is equitable. Proof. To see vertex from j
T satisfies b - r + l . A l s o , each edge e - iojo of T satisfies r(e) - b(e). this, use the bijection mapping each red vertex i of Tiojo to the blue j of Tiojo such that i is the immediate successor of j along the path to i0. Therefore formula (15.29) gives A(e)-r(e)
(1 1) r
r + l
>0"
A complete k-ary tree is a rooted tree in which every internal vertex has exactly k children, and all the leaves have the same distance from the root. Theorem
15.3.15 Every complete k-ary tree is equitable.
P r o o f . Let T - (V, E) be a complete k-dry tree, and assume without loss of generality that its root is blue. Let h be the height of T (the distance from the root to each leaf) 9 The total number of vertices of T is IV] - k h]+~ l l l 9 The numbers r and b of red and blue vertices of T are functions of k and h. Specifically, if h is even, then b - P(k, h) "- 1 + k 2 +
k 2]Ch -
-
Q ( k , h) . -
kh + 2 - 1
k 4 --~-""" + ~h __
IVI - P ( k ,
1
h) ]~2
__1
~
1
15.4
401
Threshold and Majorization Gaps
and if h is odd, then k h+l -- 1 k:-i
b - R(k,h) "- g ( k , h - 1 ) -
k h+l - 1
- s(k, h) . - IVI - R(k, h) - k k~---=-V To compute the A~ of (15.29) for a given edge e, it is convenient to always use that subtree of T - e that contains the root, using either (15.29) or its analog with red and blue switched. Let 1 be the height of this subtree. If h is even, then
_
P(k,l) Q(k,1) V~(k~h) - Q(k, h)'
R(k,~)
S(k,1)
-d-(-i l h ) - P ( k, h ) '
for k even for k odd,
and if h is odd, then
~ -
P(k, 1) Q(k,l) 5 ( ; , ~ - R(k,h)' R(k,~) S(k,t)
for k even = 0,
for k odd.
In all cases, one obtains Ae _> 0.
15.4
Threshold
and
Majorization
Gaps
In this section we introduce two measures of non-thresholdness of a degree sequence: the threshold gap, based on the work of Hammer, Ibaraki and Simeone [HIS78, HISS1], and the majorizaion gap, based on the work of Arikati and Peled lAP94]. It turns out that these two measures coincide, and we investigate their properties and the relations between them. Recall from Section 3.1 that a vector d - ( d l , . . . , d~) with integer components is called a proper sequence if n - 1 >_ dn >_ " " >_ dl > 0. Recall also the definition of the corrected Ferrers diagram C(d) representing a proper sequence d (Definition 3.1.6), and of the corrected conjugate sequence d' and the corrected Durfee number m of d. Also recall (Theorem 3.2.2) that a proper sequence d is threshold if and only if C(d) is symmetric (i.e., d' - d), in which case C(d) is the adjacency matrix of the unique labeled realization of d. We define a distance between proper sequences as follows.
402
T h r e s h o l d Weights and M e a s u r e s
D e f i n i t i o n 15.4.1 The distance between proper sequences d and e of the same length n is defined as n
l i d - ell -
(15.31)
I & - e l. i=1
In other words, the distance is just 1/2 of the Ll-norm of the difference d - e . If ~'~'~in._=ldi and ~i~1 ei are even, as is the case when d and e are graphic sequences, then the distance lid- ~11 is an integer. The reason is that
9
di~ei
di>_ei
i
di<ei
Since 2in___l di and ~i~a ei are even, so are ~d,>~, di--~-~d,<e, di and ~d,<~, e i ~d,>~, ei, and therefore ~i~1 I d i - ei] is an even integer. We denote by 7~T,~ the set of proper threshold sequences of length n. The threshold gap of d is defined as follows. D e f i n i t i o n 15.4.2 If d is a proper sequence of length n, its t h r e s h o l d g a p is eE D"I'n
lid-
Thus the threshold gap of d is a measure of the non-thresholdness of d. In Subsection 15.4.1 we determine the threshold gap of a proper sequence and all the threshold sequences that realize it. Recall the definitions of the majorization ~ and strict majorization ~relations between sequences of length n (Definition 3.1.1). Recall also the definition of unit transformation (Definition 3.1.2). If a is obtained from b by a unit transformation, we say that b is obtained from a by a reverse unit transformation. By Condition 9 of Theorem 3.1.7, every degree sequence d is majorized by some threshold sequence, and by Condition 8 of Theorem 3.2.2 the majorization is strict if and only if d is not a threshold sequence. From this and from the Muirhead Lemma (Theorem 3.1.3) it follows that if d is any degree sequence, then some threshold sequence can be obtained from d by a finite number of successive reverse unit transformations. This motivates the following definition of the majorization gap of d as a measure of the non-thresholdness of d.
15.4
Threshold and Majorization Gaps
403
D e f i n i t i o n 15.4.3 The m a j o r i z a t i o n g a p R ( d ) of a graphical sequence d is the smallest number of reverse unit transformations required to transform d into a threshold sequence. Thus R(d) = 0 if and only if d is already a threshold sequence. In Subsection 15.4.2 we give a formula for R(d) and show that it is equal to the threshold gap of d. We also determine its m a x i m u m for a fixed number of edges or vertices, as well as exhibiting all the sequences that realize this maximum, which can be thought of as the most non-threshold in this sense. We also discuss the related questions of the difference gap and some others.
15.4.1
The Threshold Gap
Before we discuss the threshold gap, we introduce two binary operations on the proper sequences of length n. D e f i n i t i o n 15.4.4 If d and e are proper sequences of length n, their j o i n and m e e t are defined as the proper sequences d V e and d A e given by (dV e)i
-
max(di, ei)
i - 1,...,n
(dA e)i
-
min(di, ei)
i - 1,...,n.
It turns out that DT-~ forms a lattice under the operations of join and meet, having the largest element ( n - 1, n - 1 , . . . , n - 1) and the smallest element (0, 0 , . . . , 0). This follows from the following proposition. Proposition
15.4.5 DT~ is closed under joins and meets.
P r o o f . For integers k _> 1 and h >_ 0, we denote by S(k, h) the set of the smallest h positive integers excluding k, that is to say
S(k,h)-
{1,...,h}, {1, ,k-l,k+l,...,h+l},
ifhk.
If d is a proper threshold sequence whose unique labeled realization on the vertices 1 , . . . , n is G, then the neighborhood of each vertex i in G is Na(i) = S(i, di). Conversely, if a graph G on the vertices 1 , . . . , n has neighborhoods satisfying this condition, then G is a threshold graph with degree sequence d, so d is a threshold sequence.
404
Threshold
Weights and Measures
We prove the closure of 2)7",~ under joins; the results for meets can be proved similarly or deduced from the closure under complements. Let d, e, C 2)Tn, and let G and H be the threshold graphs on the vertices 1 , . . . , n in which vertex i has degree d~ and e~, respectively. Thus N o ( i ) = S(i, d~) and NH(i) = S(i, ei) for each i. Put f = dV e and F = G tO H. Then for each i we have
NF(i) -- S(i, d~) U S(i, e~) - S(i, max(d~, e~)) - S(i, f~). Hence f is a threshold sequence, i.e., f C ~)']"n. 9 We now define an easily-computed quantity t(d) associated with a proper sequence d, and show that it is equal to the threshold gap of d. D e f i n i t i o n 1 5 . 4 . 6 If d is a proper sequence of length n and corrected Durfee
number rn, we put 1
m
t(d) - -~ ~
!
1
d~[ -
Id~ -
7-51
n
E
!
Id - d l.
( 5.a2)
~=m+l
To justify the equality between the two expressions in the definition of t(d), consider the corrected Ferrers diagram C - C(d), and divide it into four submatrices M, A, B, 0 as illustrated in Figure 15.6. Figure 15.6: The corrected Ferrers diagram of a proper sequence. The submatrix M is full of l's except on its main diagonal; the submatrix O is full of O's. 1
m
m+l
n
M
B
A
O
m
m+l
Since each row and column sum of M is m - 1, d~ - di is equal to the difference between the i-th column sum of A and the i-th row sum of B. Since
15.4
Threshold and Majorization Gaps
405
the l's of A are at the top of the columns and the l's of B are at the left n ~" 1, if Cij r Cji of the rows, we have Id~- di I - ~j=~+~ u~j, where u~y - ~ O, otherwise Consequently m
m
i=1
n
i=1 j = m + l
A similar argument involving the rows of A and the columns of B shows that n
m
E Id:-d i=m+l
n
l-E E
Uij~
i=1 j = m + l
and therefore the equality in Definition 15.32 has been justified, and we also have an interpretation of t(d) as a measure of the deviation of C(d) from symmetry. Furthermore, we have ~i~=~ di - m ( m - 1) + a + b, where a and b are the numbers of l's in the submatrices A and B, respectively. Therefore if ~in=.l di is even, as is the case when d is graphic, a and b have the same parity, and it follows that t(d) is an integer. As a first step in proving that t(d) is the majorization gap of d, we associate with each proper sequence d of length n with corrected Durfee number m the sequences d and d defined by
d i - { d'i' f o r i - 1 , . . . , r n
di,
for i - m
+ 1,..., n
cli- { di, f o r / - 1 , . . . , r n d}, for i - m + l , . . . , n .
Referring to Figure 15.6, we see that C(d) is obtained from C(d) by replacing the submatrix B with A T, whereas C(d) is obtained by replacing A with B r. Therefore d and d are proper sequences and their Ferrers diagrams are symmetric, i.e., d, d C 7PTn. To find the corrected Durfee numbers r'n - re(d) and rh - re(d) of d and d, we notice that for C - C(d) we always have Cm+l,~n = 0 (for if Cm+l,,~ = 1 one would also have Cm,m+l = 1 by dm >_ din+l, and m could be increased by 1). In contrast, x - C~n,m+l can be either 0 or 1. From the definition of d it is clear that d - C(d) satisfies C',~+~,,~ = 0 and therefore rh - m. On the other hand, d' - C(d) s a t i s f i e s C m + l , m = x and Cm+2,m+l = 0, and therefore rh is m or m + 1 according as x is 0 or 1. We have therefore verified the following formula: ~-m
~_{ '
m, re+l,
if d i n - m - 1 if d i n > m - 1 .
(15.33)
Thre s hold Weights and Measures
406
It follows directly from (15.31) and (15.32) that for each proper sequence d, the proper threshold sequences d and d satisfy
lid- rill - l i d - rill -
t(d).
(15.34)
T h e o r e m 15.4.7 E v e r y proper sequence d of length n satisfies t(d) -
min l i d - cll.
cEDTn
P r o o f . Let g: C 77T~ be optimal, i.e., lid- ~11- mincev~rn lid- ell. Let d be the corrected Ferrers diagram of ~: and rh its corrected Durfee number. First we show that rn _< rh _< rh, where rh is the corrected Durfee number of d, given by (15.33). Assume that, if possible, rh < m. Put h = ~:,~+1 < rh, and define the sequence c by { ~i+1, fori-h+l,...,rh ci ~, for i - rh + 1 g:i, otherwise. Since C is symmetric and h < rh, c is a proper threshold sequence, and its symmetric corrected Ferrers diagram is obtained from ~' by enlarging its corrected Durfee,square from size rh to size rh + 1. We have C~+l - h < c~+1 - r h _< r n - 1 _< dm _< drh+l and therefore Ic~+l - d~+l I < 1~=~+1- d~+a I - ( ~ - h).
(15.35)
In addition, we have in any case that (i-
h+ 1,...,~).
(15.36)
By adding the inequalities (15.35) and (15.36), we obtain IIc-dll < II~-dll, contradicting the optimality of ~:. This proves that m < ~n, and a similar argument shows that rh < rh. We have shown that m < rh < rh, and therefore by (15.33) rh is either m or rh. We show below that l[~:- dll - l i d dll if r~ - m, and it can be similarly shown that I1~- dl[ - l i d - dll if ~ - ~ . Consequently, at least one of J and d is an optimal threshold sequence, and the required conclusion
that l i d - ~11-
t(d) will follow from (15.34).
As stated above, we consider the case ~ - m and have to show that I 1 ~ - d l l - lid-dll. Note that ~ ~nd d ~re proper threshold sequences with the
15.4
T h r e s h o l d a n d M a j o r i z a t i o n Gaps
407
same corrected Durfee n u m b e r m. If g: - d, we are done. Otherwise there must be some i - m + 1 , . . . , n such that g:i r a~i, because rows m + 1 , . . . , n of the s y m m e t r i c corrected Ferrers diagram determine it completely. Let k be the largest such i satisfying g:i > di, if any. Put h - g:k and define the sequence c' by
, ~ c.i-1, ci - ~ ci,
fori-k,h otherwise.
The sequence c' is proper, because by the maximality of k we have g:k > dk _> dk+l >_ ck+l, and by the s y m m e t r y of its corrected Ferrers diagram it is a threshold sequence. Clearly its corrected Durfee n u m b e r is again rn. Since c~ - g : k - 1 >_ dk - dk, we have I c ~ - d k [ - Ig:k--dkl-- 1. Hence I I c ' - d l l _< I]g;- dll because in any case I c ~ - dh] _< Ig:h- dhl + 1. It follows that c' is another optimal threshold sequence and we may replace g: with c'. R e p e a t e d application of this procedure eventually allows us to assume that ci <_ di for i - m + 1 , . . . , n. If we still have g: =/= d, there must be some i - rn + 1 , . . . , n such that ~i < di. Let k be the smallest such i. Put h - g:k and define the sequence c" by ,,
]' g : i + l ,
ci - ~ ci,
fori-k,h+l otherwise.
The sequence c" is again proper, because by the minimality of k we have g:k < dk _< dk-1 _< g:k-1, and by the s y m m e t r y of its corrected Ferrers diagram it is a threshold sequence. Its corrected Durfee n u m b e r is again rn. Since c~ - g:k + 1 _< dk - dk, we have [[c"-d][ _< IIg:- dll as before, so c" is optimal and we may replace g: with c". R e p e a t e d application of this procedure allows us to assume finally that ci - di for i - m + 1 , . . . , n. This implies that g: - d and completes the proof. " For a given proper sequence d of length n, we denote by 2)Tn(d) the set of proper threshold sequences of length n at m i n i m u m distance from d, that is to say, by T h e o r e m 15.4.7, lPT~(d) = {c C 2P7"~ : [ I c - all = t(d)}. We determine this set below. For this purpose we put
d+-dvd,
d--dAd.
Since d, d E 2)Tn, we have d +, d- E 2)Tn by Proposition 15.4.5. It is easy to see that d + - max(d~, d'~) and d~- - min(d~, d'~). To justify (15.32), we have argued that t(d) is equal to one half of the n u m b e r of positions where the submatrix A in Figure 15.6 differs from B T.
408
T h r e s h o l d Weights and M e a s u r e s
It is easy to see that both lid + - d l l quantity, which means that
and lid- - d l l
are equal to the same
d +, d- C DT'n(d).
(15.37)
We need the following l e m m a to determine D'Y~(d). Lemma
1 5 . 4 . 8 Let d be a proper sequence and h, k integers satisfying d-~ <
h <_ d +. Then the following implications hold:
d; < & G+ > d k
G+ > & ---->, d ; < & .
P r o o f . We prove only the first implication for k - rn + 1 , . . . , n; the other cases are similar. The hypothesis d~- < dk implies t h a t d~ < dk and hence d~- - d~ and d + - dk. Therefore the condition d~- < h _< d + of the l e m m a reads d~ < h <_ dk. Since k _> rn + 1, the condition dk _> h is equivalent to d~ _> k - 1 and the condition d~ < h is equivalent to dh < k - 1. Therefore dh < d~, which means dh < d +. 9 We are now ready to characterize ~D'Yn(d). Theorem
1 5 . 4 . 9 Let d be a proper sequence of length n. Then -
{c
Z
7. . d - <
< d + }.
In other words, I)T~(d) is the sublattice of 7?T~ with the largest element d + and the smallest element d-. P r o o f . First we prove that if c C Z)Tn and d- _< c _< d +, then c C Z)'Yn(d). Observe that since d + and d- have the same corrected Durfee n u m b e r rn and c lies between them, c too has the same corrected Durfee n u m b e r m. We m a y assume t h a t c -r d - , for otherwise the result follows from (15.37). Let k be the largest subscript i satisfying d~- < ci. This k must be larger t h a n m, for otherwise ci - d~ for each i > m, which would imply that the threshold sequences c and d- coincide. We assume that dk -- d +, i.e., that d;- < dk; the case dk - d~- is similar. P u t h - ck. Since rn < k, we have h < rn and therefore Ch _> k - 1. Since d~- < h _< d + and d~- < dk, L e m m a 15.4.8 gives us t h a t d + > dh - d~. If D - - C ( d - ) is the corrected Ferrers diagram of d - , then from h - ck > d~- we have D-~h -- O, hence by the s y m m e t r y of D -
15.4
T h r e s h o l d a n d M a j o r i z a t i o n Gaps
we have D~k - 0, and hence d~ < k given by
1
~
409
1 _< Ch. Consider now the sequence c 1 fori-h,k otherwise.
ci--1,
ci - ~ Ci
This sequence is proper because of the s y m m e t r y of C(c) and the fact that if ck - ck+l, then Ck+l > d~- >_ d~-+l , contradicting the maximality of k. By the s y m m e t r y of C(c) and the definition of h it is also clear that C(c 1) is symmetric, so c 1 C DT-n. By Ch > d~ and ck > d~- we also have d- <_ c I _< d + and IIc I - d-II < I I c - d-II. Furthermore, from ck _< d + - dk we have Iclk--dkl -- Ick--dkl+ 1, and from Ch > d-~ - dh we have Iclh--dhl -- Ich--dhl--1; consequently IIc1 - a l l - I I c - all. By repeating this argument, we obtain a finite sequence c - cO,..., c s - d- of proper threshold sequences all at the same distance from d. Therefore c e DT-n(d) by (15.37). Conversely, given that c C D T n ( d ) , we show that c _< d+; the argument for d- _< c is similar. Assume otherwise, and let k be any subscript satisfying ck > d +. Let G and H be the threshold graphs on 1 , . . . ,n satisfying dega(i ) - ci and degH(i ) -- d + for all i. Let h be the largest subscript such that kh is an edge of G. Since degH(k ) < dega(k), kh is not an edge of H. Therefore degH(h ) < dega(h), that is to say d + < Ch. Consider the sequence c' given by , ( ci-1, fori-k,h ci - ~ ci, otherwise. By our familiar argument, c' C DT-n, and by ck > d + > dk and Ch > d + > dh, we have ] [ c ' - dll < I I c - dll , contradicting c e "D'-f'n(d). 9
15.4.2
The Majorization Gap
In order to find an explicit expression for the majorization gap R ( d ) , we use the following notations. For a sequence d - ( d l , . . . , dn), let S k ( d ) denote the k-th partial sum of d, i.e 9, Sk(d) - 2~=1d~. k Note that Sn(d) - Sn(d'). For a proper sequence d - ( d l , . . . , dn), put 6i(d) - (d~i - di) +,
i - 1 , . . . , n,
where x + - max(x, 0), and n -
i=1
Threshold Weights and Measures
410
Our first main result is a formula for the majorization gap, to be proved below"
T h e o r e m 1 5 . 4 . 1 0 For every proper degree sequence d,
R(d)
6(d)
-
E x a m p l e . Let d = (2,2,2,2,2). Then d ' = ( 4 , 4 , 2 , 0 , 0 ) and 5(d) = 4. The theorem asserts that R(d) = 2. A reverse unit transformation from 5 to 1 transforms d into f = (3, 2,2,2, 1), and a reverse unit transformation from 4 to 1 transforms f into e = ( 4 , 2 , 2 , 1 , 1 ) . Since e = e', e is a threshold sequence. Before we prove Theorem 15.4.10, we discuss some preliminary results. For any two sequences a = ( a l , . . . , an) and b = ( b l , . . . , bn), we define
i-1,...,n
5i(a, b) - (ai - bi) +, and n
6(a,
-
6 (a, i=1
If a and b are integer sequences, a ~ b, a l _> . " _> a~ and bl > " ' " > bn, we define U ( a , b) to be the m i n i m u m number of unit transformations required to transform a into b. Observe that under these conditions the following are equivalent: (i) a = b; (ii) 5(a, b ) = 0; (iii) U(a, b ) = O. Lemma
15.4.11 Let a -
(al,...,an)
quences such that a ~ b, aa >_ .'. U(a, b) - 5(a, b).
and b - ( b l , . . . , b n ) >_ an and bl >_ ""
be integer se-
> bn.
Then
P r o o f . It is easy to see that if a r b and c is obtained from a by a unit transformation, then 5(a, b)+ 1 _> 5(c, b) _> 5(a, b ) - 1. Thus U(a, b) >_ 5(a, b). Also, as given on page 135 of [MO79], if a r b, we can always perform a unit transformation on a to obtain a c such that c ~ b and 5(c, b) = 5(a, b ) - 1. Thus U(a, b)<_ 5(a, b). ..
15.4
T h r e s h o l d and Majorization Gaps
411
It is easy to check that for integer x, (x+l)+_x+_
{ 1, i f x _ > 0 0, otherwise, 2, if x_>0 1, if x - - 1 0, otherwise,
x +-
(x + 2) +
x+_(x_l)+_
x+-(x-2)
{ 1, i f x > _ l 0, otherwise,
+-
[ 2, if x>_2 / 1, if x - 1 0, otherwise. (15.38)
We use these facts to prove the following lemma.
L e m m a 15.4.12 Let
d - (dl,...,dn) be a proper sequence and a s s u m e that e is obtained f r o m d by a reverse unit t r a n s f o r m a t i o n . Then
6(d)- 2 < 6(~) < ~(d)+ 2. Proof. Represent d by its corrected Ferrers diagram and assume that e d - up + U~. Let or-
{ d~+l, d~+2,
ifd~<~r-I ifd~_>Tr-1,
7-
{ do, dp+l,
ifdo<
p
ifdp>p.
Thus the transfer is from row p, column T of C ( d ) to row 7r, column or, and consequently 7r 5r cr and p 5r r. See Figure 15.7. We have four cases. Case 1" 7r 7~ r and p -/ a. Since e - d - U p + u~,, for 1 <_ i <_ n, we have e i - - d i except for e~= d~+l, e o d R - 1 , and e i - - d i except for D
l
l
l
l
~-d~+l,~=d~ .
6~(~)- (~"
i. T h ~ n. 6 ~ ( ~ l - ( ~. l
!
d~
~ ) + - ( .d "
e~) + - ( d ~ - d ~ + 1) +. Hence 5~(e) - 5~(d) -
-1, ifd'-d~> 0, otherwise,
5o(e) - 5o(d) -
1, i f d ' - d ~ >_0 0, otherwise.
5~
1, i f d ' p - d p > O 0, otherwise,
Similarly, - 5~
-
-1, ~ ( e ) - 5~(d) -
ifd'~-d~>l O, otherwise.
I
1
l)+,~nd
412
Threshold
Weights and Measures
Figure 15.7: Illustrating a transfer from p to 7r. Solid lines represent l's and possibly . ' s .
T
~T
I
1 ....
I
C a s e 2: 7r 7~ T and p - or. Here, ~ r ( e ) - ~ ( d ) and 8 ; ( e ) - ~ ( d ) Case 1. Also 6 p ( e ) - ( e ' p - ep) + - ( d ' p - d p + 2) +. Hence
8 p ( e ) - 6p(d) -
2, if d'p - dp > 0 1, if d'p - - d p - - - - 1 O, otherwise.
C a s e 3" 7 r - T and p5r a. H e r e S p ( e ) - S p ( d ) )+ - ( d rI - d ~ - 2 ) Case 1. S i n c e 6 r ( e ) - ( G - e/r --2,
6r(e)-6r(d)
-
are as in
-1, O,
and 5o(e)-5~,(d) + we obtain
are as in
if d'~ - dr > 2 if d" - d~ - 1 otherwise.
C a s e 4" 7r - ~- and p - ~r. We now h a v e S r ( e ) - S r ( d ) as in Case 3, and 5 p ( e ) - 6p(d) as in Case 2. To complete the proof, note that 5i(e) - 5i(d) except for i E {~r, p, ~, ~-}. For future reference, note the following from the proof of L e m m a 15.4.12. Necessary and sufficient conditions for 6(e) - 5 ( d ) - 2 in Cases 1, 2, 3 are: 1. if 7r -~ T, p -~ or, then (a) d ' -
d~> 1,
15.4
Threshold and Majorization Gaps
(b)
r
413
0,
(c) f ~ - d ~ < O , (d) s
d~>_ 1.
2. if 7r 7~ r, p - (r, then (a) d ' -
(b)
d~>_ 1,
l
(c) d ' -
d~_> 1.
3. if 7c - r, p -r a, then
d'-
2,
(b) d ' p - d p < O ,
d'-
O.
L e m m a 1 5 . 4 . 1 3 Let d be a proper sequence. For 1 ( i , j (_ n, if di < j - 1, ! then dj < i. P r o o f . The proof is simple. L e m m a 1 5 . 4 . 1 4 Let d C D~ and let p be the largest index i such that di < d~. Then p < n. Further, 1. A s s u m e d'p (_ p -
!
1 and let q - d;. Then dq - p -
!
1 and dq ( p -
2.
2. A s s u m e dpt >_ p and let q - dpt + l. Then dq - p and dql <_ p - 1 . P r o o f . Since Sn_l(d) < Sn_l(d') and Sn(d) - Sn(d'), we have d= >_ d~, so p < n by definition of p. The fact that p < n justifies our mentioning of column p + 1 (of C) below. In both cases q is the position of the last 1 in I ! column p, so Cqp - 1. The assumption on p implies dp+ 1 _< dp+l _< dp < dp. ' 1 < dp, ' implying that Cq,p_t_ 1 r 1. We prove the two parts as Hence dp+ follows" !
1. See Figure 15.8. If d; _< p - 1 , then p > q and Cq,p+l r "k. It follows that Cq,p_t. 1 -- 0, and therefore (since Cqq - * and Cqp - 1) dq - p - 1. Also dp < d; - q gives Cpq - 0, and again C(q, q) - * implies d; _< p - 2.
T h r e s h o l d Weights and M e a s u r e s
414
Figure 15.8: Illustrating Part 1 of Lemma 15.4.14. q
P
~ * ~ 1 0 0
*
!
2. In this case, apply L e m m a 15.4.13 with i - p and j - 1 - dp. T h e n ! j - dip + 1 - q and dq < p, as required. In our case p < q. See Figure 15.9. We have seen t h a t Cq,;+l r 1, b u t Cqp - 1, so dq _> p. If q > p + 1, t h e n Cq,p+l = 0 and dq - p, as required. If q - p + 1, t h e n Cqp - Cp+l,p = 1 and Cqq - , . On the other h a n d , Cq,q+l m u s t be 0 if ! it exists, for otherwise Cp;;+l would be 1, c o n t r a d i c t i n g dq < p. T h u s again dq - p.
Figure 15.9: Illustrating Part 2 of Lemma 15.4.14.
Lemma 1,...,p-
p
q
,
0
1
*
Let d C Dn and let p be as in L e m m a 15.~.1~. FOr r 1, dr >_ p implies dr < dlr.
15.4.15
-
-
15.4
Threshold and Majorization Gaps
415
Figure 15.10" Illustrating the proof of Lemma 15.4.15. r
p
t
~ * ~ I 0
0
*
P r o o f . A s s u m e to the c o n t r a r y t h a t d~ > d'~. Let t - d~ + 1 > p (since d~ > r, t is the position of the last 1 in row r. See Figure 15.10). By c o n s t r u c t i o n C~t - 1, and by a s s u m p t i o n Ct~ - O, so d't ~_ r and dt < r - 1. B u t t h e n dlt > dt c o n t r a d i c t i n g the definition of p. 9 Lemma
15.4.16
Let d be a proper sequence. If there exists a k such that
d'k < d'k+l, then 1. d'k - k - l , d ' k +
~-k;
2. k is unique. P r o o f . 1" If d~ < k - 1 or d~ > k, then d~+ 1 < d~ since the l's of C(d) are left-justified. Hence d~ - k - 1. T h e n again by this reason and the a s s u m p t i o n t h a t d~ < d~+l, we obtain d~+ 1 - k. 2" T h e s a m e p r o p e r t y of C(d) implies t h a t the conditions d~ - i - 1 and d~+ 1 - i are possible for at most one i. ,, 1 5 . 4 . 1 7 (1) Let d C Dn have corrected Durfee number m, and let C(e) be obtained from C(d) by deleting the last 1 in row i, where 1 < i < rn and (a) if i < m, then di > di+l; (b) if i - r n , then dm >_ m. Then e C D , . Further, if d} > d,, then 5(e) > 5(d). (2) Let d G Dn, and let C(e) be obtained from C(d) by adding a 1 to the end of column i, where 1 < i < rn and (a) if i > 1, then d~ < d~_l;
Lemma
416
Threshold Weights and Measures
(b) if i = m, then dm >_ m. Then e e D , . Further, if d~ >_ d~, then 5(e) > 5(d). P r o o f . 1: The a s s u m p t i o n s on i g u a r a n t e e t h a t e is a proper sequence. The c o l u m n of the 1 t h a t is removed is j = 1 + di > m. This implies t h a t e E Dn. Further, if d~ > di, then Cji - 1, and thus dj ~_ i. But the a s s u m p t i o n s on i i m p l y d~ - i. Therefore by equation (15.38),
5(e) - 5(d) - (d'i - di + 1) + - (d'i - di) + + (d~ - dj - 1) + - (d} - dj) + - 1 + O. 2: This is similar to Part 1.
..
Let d c Dn with d~ > 0 and m - 2. Then S(d) <_ n with equality if and only if dl - d2.
2,
Lemma15.4.18
P r o o f . Note t h a t the condition dn > 0 implies n _> 2. Using d2 < dl _< n - 1, d~ - 1, d2 _> 1, and di - 1, d~ - 2, for i - 3 , . . . , d2 + 1, we obtain n
~(d)
-
~ (d'~ - d~)+ i=1
=
(n-
_< ( n -
1-dl)+
-~-(d2- 1)(2-
1)
1 -d2) + + d2- 1
=
n-l-d2+d2-1
"~
rt ~2.
We need three more l e m m a s to prove T h e o r e m 15.4.10. Lemma
1 5 . 4 . 1 9 Let d C D~. A s s u m e that dn > O, d~ < d'a, and let p be the
largest i such that di < d~. Let q be such that dq > dqt and either (a) q < n or (b) q - n , dn > 2. Then Sk(d) < X k ( d ' ) - 1,
for k -
p,...,q-
1.
Since d C Dn, Sk(d) <_ Sk(d'). A s s u m e t h a t , if possible, Sk(d) >_ Sk(d') - 1 for some k satisfying p _< k _< q - 1. W h e n q < n we have
Proof.
X~(d) > S~(d')d~ > d~,
( a s s u m p t i o n on p) ( a s s u m p t i o n on q) ( a s s u m p t i o n on p)
I dq >_ dq-+-i
(d~ < dl ~ d'n - 0 , d. > 0)
d. > d ' + l .
d~ > d~,
i-k+l,...,q-1 i-q+l,...,n-1
15.4
417
Threshold and Majorization Gaps
Adding all these inequalities, we obtain a contradiction, S~(d) > S ~ ( d ' ) + 1. W h e n q - n, the inequality for dq drops, but by assumption the inequality for dn can be strengthened by 1, and the same contradiction is obtained.
1 5 . 4 . 2 0 Let d C Dn, a s s u m e that dl < d'1, dn > O, and let p be as in Lemma 15.~. 19. Then
Lemma
Sk(d) <_ S k ( d ' ) - 1,
k - p,...,n-
1.
P r o o f . We have Sk(d) < Sk(d') since d E Dn. If Sk(d) - Sk(d'), then there exists an i, k < i < n such t h a t d~ < d~, since d~ > d'n and S n ( d ) - Sn(d'). But then i > p, contradicting the definition of p. tt Lemma
15.4.21
Under the assumptions of Lemma 15.~.20:
1. if d'p < p - 1, then Sk(d) < S k ( d ' ) - 1 for k - 1 , . . . , dpI - 1 ; !
2. if dp >_ p, then Sk(d) <_ Sk(d') - 1 for k - 1 , . . . , p -
1.
P r o o f . 1" Let q - d p I < p - 1 . By L e m m a 15.4.14, dq - p - 1 and dq/ < p - 2 , so dq > d'q. I f d i < d} for i - 2 , . . . , q 1, then the assumption dl < d~ implies Sk(d) < S k ( d ' ) - 1 for k - 1 , . . . , q - 1, as required. So assume t h a t there exists an i, 2 < i < q - 1, such that di > d}, and let r be the smallest such i. Since r < q, d~ k dq - p - 1 . But the fact that & > d'~ and L e m m a 15.4.15 imply d~ < p - 1. Therefore d~ - p - 1. We assert t h a t di > d} for i - r , . . . , q . Indeed, for such i, p - 1 d~ > di k dq - p - 1, so di - p - 1. This implies, by the construction of C, t h a t for i - r , . . . , q 1, d'~ > q - 1 > i, and therefore d} > d'~+1 by I I l L e m m a 15.4.16. Hence d~ >_ d~+ 1 >_ ..- >~ dq_ 1 ~_ dq. Thus for i - r , . . . , q, d~ <_ d~ < d~ - p - 1 - d i , proving the assertion. Now for k - 1 , . . . , r 1, the facts dl < d~ and di <_ d~ for i - 2 , . . . , k imply t h a t Sk(d) <_ Sk(d') - 1. Also, for k - r , . . . , q - 1, if Sk(d) - Sk(d'), then Sk+l(d) > Sk+l(d') as dk+l > d~+ 1 by the assertion. But this contradicts d C D~. Hence again Sk(d) <_ S k ( d ' ) - 1. ! 2" Let q - d p + 1 _> p + 1. From L e m m a 15.4.14, dq - p. S i n c e p < q,
Threshold Weights
418
and
Measures
dp _> dq - p. Thus d l > . . . > dp. Using L e m m a 15.4.15, we obtain di _< d~ for i - 1 , . . . , p - 1. This and the assumption d l < d~ complete the proof. 9 P r o o f of T h e o r e m 15.4.10. From L e m m a 15.4.12 we have R(d) >_ [ ~ 1 , as a reverse unit transformation can decrease 5(d) by at most 2. We show that if 5(d) > 0, we can always construct a proper sequence e such that 1. e is obtained from d by a reverse unit transformation, 2. e is a degree sequence, and 3.
= e(d)-
2.
It then follows that 5(d)is even and R(d) - 6(d) 2 " To show that e is a degree sequence we use the Berge Condition of Theorem 3.1.7, i.e., & ( e ) is even and Sk(e)_< Sk(e')for k = 1 , . . . , n . To show that 5(e) = 5 ( d ) - 2 we use the observation made after the proof of L e m m a 15.4.12. Without loss of generality, we may assume that dn > 0, for if dn = 0, then we work with c - ( d l , . . . ,d~-l). We may also assume that d 1 < d~, for if d 1 - d i ( - 7 " t - 1), then we work with c - ( d 2 - 1 , . . . , d ~ - 1). We distinguish two cases. C a s e 1" There exists an i > 1 such that di < d~. Let p be the largest such i. The basic idea is to transfer the 1 at the end of column p to the end of row 1. Let s = dl + 2 be the destination column for the moving 1. We have two subcases now. ! ! C a s e 1.1" dp _< p - 1 . Then q - dp is the source row for the moving 1. Also dq = p - 1 by L e m m a 15.4.14 and hence p is the source column for the moving 1. Define e = d - uq + Ul. Then for i = 1 , . . . , n , (a) ei = di except for e l - - d l q- 1 and eq - - d q - 1, and (b) e Ii - - d Ii except for epI - d Ip - 1 and Cs,
1.
We first prove that e is a degree sequence. Since 5's(e') = S'n(e), it sumces to prove S'k(e) _< S'k(e'), for k = 1 , . . . , s - 1. This is done as follows: Sk(e)=Sk(d)+l_< Sk(d') = S k ( e ' ) for k = 1 , . . . , q - 1 (by L e m m a 15.4.21), Sk(e) = Sk(d) < Sk(d') = Sk(e') for k = q , . . . , p - 1,
15.4
Threshold and Majorization Gaps
Sk(e)=Sk(d)<_Sk(d')-i
419
=Sk(e')
fork=p,...,s-1
(by L e m m a 15.4.20). To show that 5(e) = 5 ( d ) - 2, note that (p, r, 7r, a) = (q, p, 1, s), where p, T, 7r, a are as defined in the proof of L e m m a 15.4.12. By assumption p -r 1. ! Also 0 < dn _< dp < dp i m p l i e s p _ < s - l , and q < p. H e n c e q < s - l , giving q =fi s. Now the necessary and sufficient conditions for 5(e) = 5 ( d ) - 2 are verified as follows" (a) d ~ - d 1 ~ 1 by assumption; (b) d ' q - dq < 0 as dq - p - 1 and d'q _< p - 2 by L e m m a 15.4.14; (c) d'~ - d~ < 0 as d~ _> d~ _> 1 and d'~ - 0 ; and (d) d ' p - dp >_ 1 by definition of p. ! C a s e 1.2" dp > p. From L e m m a s 15.4.20 and 15.4.21 we have Sk(d) < Sk(d'),
k-
1,..., n-
1.
(15.39)
Let q - dp! + 1 be the source row for the moving 1, and define e as in Case 1.1. We first show that Sk(e) _< Sk(e') for k = 1 , . . . , s - 1. It follows from <_ d ~ <_ L e m m a 15.4.14 that dq - p and dq' <_ p - 1 . Note t h a t s - 1 - d l + l n - 1. We have: Sk(e) = Sk(d) + 1 <_ Sk(d') = Sk(e') for k = 1 , . . . , p - 1 (by (15.39)), -
_<
+
-
(since ep - dp _< dpI _ _ 1 _ _ epl ) , Sk(e) = S k ( d ) + 1 <_ S k ( d ' ) - 1 = Sk(e') for k = p + 1 , . . . , q 1 (by L e m m a 15.4.19), Sk(e)=Sk(d)<_Sk(d')-i =Sk(e') fork=q,...,s-1 (by (15.39)). To show that 5(e) = 5 ( d ) - 2, observe that again (p, T, 7r, a) = (q,p, 1,s). ! If q r s, then (a), (c), and (d) are as in Case 1.1, and (b) d q - dq < 0 by L e m m a 1 5 . 4 . 1 4 . If q - s, t h e n d ~ - d l >_ 1 a n d d ' p - d , _ > 1 as before, and I / ! dq - dq ~ - 2 since dq - p ~ 2 and dq - d s - O. C a s e 2: i - 1 is the only index with the property di < d}. Then dn - 1, for dn >_ 2 implies d~ - n - 1 - d~ > dl >_ d2, contradicting the assumption of the case. We assert that d~ >_ dl -t- 2. Indeed, we show that d~ - dl ~- 1 implies that S~(d) is odd, contradicting the assumption that d is a degree sequence. We have d~ - d 1 + 1 , d~ <_ di, i-2,...,n-1, d" - d ~ - l - 0 .
420
Threshold Weights and Measures
By adding we obtain ~n(d') < Sn(d) = Sn(d'). Thus all the inequalities above are in fact equalities, i.e., d~ - di for i - 2 , . . . , n - 1. Therefore the sequence c = ( d l , . . . , dn-1,0) has a symmetric corrected Ferrers diagram. This implies that S~(c) is even, which in turn implies that S n ( d ) is odd. This proves the assertion. Let s = d l q- 2 and define e = d - un + U l. Then for i = 1 , . . . , n, ei = di except for el - dl -t- 1 and en - d n - 1 - 0, and e Ii - d Ii except for e II - d II - 1 and e ts - 1. To show that e is a degree sequence, set q = s (_< n - 1), p = 1 and apply L e m m a 15.4.19. Then for k = 1 , . . . , s - 1, Sk(e) = S k ( d ) + 1 <_ S k ( d ' ) - 1 = Sk(e'). Clearly for k = s , . . . , n, Sk(e) <_ Sk(e'). It remains to verify the necessary and sufficient conditions for 5(e) = 5 ( d ) - 2. Note that here (p, T, 7r, ~r) = (n, 1, 1, s). Observe that s ~ n by the assertion. Now (a) d~ - d 1 ~ 2 b y the assertion; (b) d~ - d n = - 1 < 0; and
(~) d'~- d ~ - - d ~ < - d ~ < 0. We now study the connection between the majorization gap R ( d ) and the threshold gap t(d). Specifically we show that these gaps are equal and every threshold sequence achieving the majorization gap also achieves the threshold gap. Theorem
15.4.22 For every p r o p e r degree sequence d,
t(d)
-
R(d).
P r o o f . Let A - {i " 1 < i < m , d ~ - d i > 0}, A' - {i " 1 < i < m , d } - d ~ < 0}, and B - {i 9 m + l <_ i <_ n , d ' ~ - d i >_ 0}. Define a+ - E~eAd'~--d~, a _ -- ~ i e A , d ~ - di, /3+ - ~ i e B d } di. It follows from the equality (15.4.6) that a _ - - / 3 + . Therefore 1
t(d)
=
~
=
, 1 1 [di - d~l - ~(a+ - a _ ) - ~(~+ + 3+)
~
-~ ~ AK
~1 ~ iEAuB
(d'~ - d~) - ~1 ~~( d , -,
d~)+ _ 15(d) - R(d),
i=1
where the last equality follows by Theorem 15.4.10. 9 The following result states that all threshold sequences achieving the majorization gap R ( d ) also achieve the threshold gap t(d). Recall that if a ~ b, U ( a , b) denotes the m i n i m u m number of unit transformations required to transform a into b.
15.4
Threshold and Majorization Gaps
421
T h e o r e m 15.4.23 Let d be a proper degree sequence and e a proper threshold sequence such that e ~ d and U(e, d ) - R(d). Then lie- dll- t(d) P r o o f . It suffices to prove lie- dll - R(d) by virtue of Theorem 15.4.22. Since e > d, we have S n ( e ) - Sn(d), and so
( e i - di) ei >di
~
( d i - ei).
(15.40)
ei < di
We then have, where n is the length of d and e, n
lie- d[I -- ~ ~ le~- &l i=1
=
1 ~ ~
1 (~, - <) + ~ ~
ei >di
-
~
(< - ~)
ei
(ei-di)
(by (15.40))
ei>di n
=
E(~,-
<)+
i=1
=
~(~, d)
=
U(e,d)
=
R(d).
(by Lemma 15.4.11)
We remark that the assumptions that e is threshold, l i e - dll - t(d), and S~(d) - Sn(e) do not imply that e > d. For example consider d (6,6,4,4,3,3,1,1) and e - ( 7 , 6 , 4 , 3 , 3 , 2 , 2 , 1 ) . We now consider the problem of characterizing the degree sequences with m a x i m u m majorization. We show that for a fixed number of edges and a variable number of vertices, R(d) is maximized precisely when d is the degree sequence of a matching plus isolated vertices. For a fixed number n of vertices and a variable number of edges, we exhibit all the degree sequences that maximize R(d), and they turn out to be almost ~-regular. As is customary, we denote the constant sequence (a, a , . . . , a) of length n by a n, the sequence (a, b , . . . , b) by ab n-l, etc. T h e o r e m 15.4.24 Let d be a proper degree sequence with a fixed sum 2q > O. Then R(d) <_ q - 1.
Furthermore, equality holds if and only if d is of the form d - 12qO~.
Threshold Weights and Measures
422
P r o o f . We have
~(d)
-
~ ( d ' , - d~)+ i>l
=
( d '1 -
dl)+
-t-
E ( d t i - di) + i>2
_< d'l -d~ + ~; d'~
(~n~ dl _> d~ ~na d~, d~ _> 0).
i>2
If dl > 2, then 5(d) < Ei>l d ~ - 2 - 2q - 2. If dl - 1, then d - 12q0r, and so 5(d) - 2 q - 2. Conversely, let d satisfy ~ > l ( d } - d ~ ) + - 2 q - 2 . Assume that, if possible, dl>
1. T h e n
(d i - d l ) + 2 (d~-d~)+
dl-dl _< dl _< d~,
--
i>_2.
Adding these inequalities, we obtain 2q - 2q, hence all the above inequalities hold as equalities. Therefore for i >_ 2, if d} > 0, then di - O. But this fails for i - 2, as d~ >_ dl - 2. [] Let us now consider the majorization gap of the degree sequences of a fixed length n. We make use of the following functions:
f(n)
f(n)-l, -
L~J
[~],
g(n) -
f(n),
ifn-3mod4 otherwise.
We reproduce the definition of Dn for convenience. For positive integers n, Dn - { d -
( d l , . . . , dn)" d is proper, Sk(d) < Sk(d') for k - 1 , . . . , n}.
proper degree sequence of length 5(d) <_ g(n). Further, for n >_ 5, equality holds if and only if
Theorem
15.4.25
Let d be a
for n ~ 3 mod 4
d-
F~I
~
o~
d-l~J
n.
Then
~
n-3 2 '
for n - 3 mod 4 or
To prove Theorem 15.4.25, we find it convenient to prove the following theorem:
15.4
Threshold and Majorization Gaps
Theorem
15.4.26
423
For d C D~, 5(d) <_ f(n). Further, for n > 5, equality
holds if and only if d -
[~-~1 n or d -
We need several results to prove these theorems. about the functions f ( n ) and g(n).
1. f ( n -
1) < f ( n ) for n > 1, f ( n -
2. f ( n ) > n 3. g ( n - 1 )
First, some simple facts
1) < f ( n ) for n > 3;
2 for n _> 2, with strict inequality for n > 5;
< g(n) for n > 4, g(n) > n + l f o r n > 7 .
Next, three lemmas about corrected Ferrers diagrams. 1 5 . 4 . 2 7 Let 0 r d C D n . Put s - dl + 1, p - d~s, q - d~p + 1, r - ds. Thus s > _ r e > p > 1 and q > m > r > 1. Assume that the following hold (See Figure 15.11): Lemma
1. s > m + 1, and if equality holds, then p < m; 2. q < s ; 3. r < p - r . Then: 1. there exists a sequence e C
Dn
such that
e I
--
dl-1 and 5(e) > 5(d)+2;
2. there exists a sequence f c D~ such that (a) (i) f l
-
dl -
1 or (ii) f l
-
dl
and f'~ - 1;
(b) 5 ( f ) > 5(d) + 1; (c) S n ( f ) and Sn(d) have the same parity. P r o o f . We begin by proving s t a t e m e n t 1. First note that p _< m _< q and r < p. Secondly, we m a y assume that the first r columns of C(d) are full, i.e., d~i - n - 1, i - 1,...,r, (15.41) for otherwise we can fill column 1, then 2, and so on up to r (by adding l's at the end of these columns) without going out of D~, and increase 5(d) at each step, by L e m m a 15.4.17.
424
Threshold Weights and Measures
Figure 15.11: Illustrating L e m m a 15.4.27. r
p
m
q
s
*
0
m
0
Counting in two ways the number of l's in rows 1 , . . . , s and columns r + 1 , . . . , p of C(d), we obtain p
~
d:-(p-r)(q-1)+ i=r+l
(15.42)
(di-r).
i=q+l
Since d e Dn, ~p(d) ~ ~p(d'). This implies, by (15.41) and (15.42), p(s - 1 )
p
~
d'i - r ( n - 1 )
+ (p- r)(q-1)
i=r+l
•
(di - r).
i=q+l
Therefore p(s - q) <_ r(n - 1 - q) + r + EiLq+l (di ~--q+l ( d ~ - r), and it follows that (p-
+
r)(s - q) < r(n - l - s) + p +
~
F) < r ( r t - -
(di - r).
1 - q) + p +
(15.43)
i=q+l !
!
' for if d~ < d~+1 for some By L e m m a 15.4.16, dr+ 1 _> dr+ 2 >_ 9.. > dp, i < p _< q, a contradiction. Also r < i < p, then q - 1 _< d~ < d~+1 -
15.4
425
Threshold and Majorization Gaps
di-s-1
I a <_s-2. andd~+
fori-r+l,...,p,
d~ > d'~,
Hence
i - r + 1,...,p.
(15.44)
I I l l Again by Lemma 15.4.16, dlq+l ~ dq+ 2 ~ . . . ~ ds, f o r if d i < di+ 1 f o r some q < i < s, then d~+1 - i > q >_ m, a contradiction. Therefore for i - q + 1 , . . . , s , di <_ dq+l _< p - 1 and d~ >_ d'~ - p . Hence
d'~ > d,,
i-
q + 1,...,s.
(15.45)
Using (15.41), (15.44) and (15.45), we have q
5(d) - r(n - s) + ~
(d'i - di) + + ~
i=p+l
(d'i - di).
(15.46)
i=q+l
Define a sequence e such that C(e) is obtained from C(d) by making the first p columns full and deleting the s-th column, i.e., , ei-
f n-l, / 0, d~
fori-l,...,p fori-s otherwise
It is easy to check (using s > m + 1) that e C Dn by Lemma 15.4.17. Further, s--1
~(~) -
~(~,,-
~)+
i=1 q
= p(n-s+l)+
s-1
y~ (d'i - d i ) + +
y~ (d'i - p )
i=p+l
=
i=q+l q
~(~ - ~) + ( p - ~)(~ - ~) + p + ~
(d'~ - d~) + +
i=p+l
(d'~ - p)
(~s d' - p)
i=q+l q
=
r(n-s)+(p-r)(n-s)+p+
Z
(d',- d,) + +
i----p+l
(d'i - di) i--q+l
=
~
( p - di)
i-q+l
~(d) + ( p - ~)(~ - ~) + p -
~ i=q+l
( p - d~)
(by (15.46))
Threshold Weights and Measures
426
=
5(d)+(p-r)(n-s)+p-
)_2 ( P - r ) + i=q+l
=
~(d) + (p - ~)(~ - ~) + p -
~_~ ( d i - r ) i=q+l
(~ - q ) ( p - ~) + ~
(d~-
~)
i=q+l
> 6(d)+ ( p - r)(n - s ) - r(n - 1 - s) = ~(d) + ( p - ~)(~ - ~ ) - r(~ - ~ ) + >
~ ( d ) + ~.
( ~ ~ < p-
(by (15.43))
~)
So 5(e) >_ 5(d)+ 2. This proves Statement 1. We now prove Statement 2. If S'~(e) has the same parity as S~(d) (before the achievement of (15.41)), then f = e has the required properties. If the parities differ, take f = e + u l . In this case C ( f ) can be obtained from C(d) by making the first p columns full and deleting all the l's except the first 1 in the s-th column. So f C Dn by Lemma 15.4.17. The other required properties of e follow from S~(I) = S~(e)+ 1, 5~(f) = 5 1 ( e ) - 1, and 5~(f) = 5~(e) for i = 2,...,n. ,, L e m m a 15.4.28 relaxes one of the assumptions of L e m m a 15.4.27. Lemma
15.4.28
Under the conditions of Lemma 15.4.27 except r <_ p - r"
1. there exists a sequence e G Dn such that
e I
--
d l - 1 and 5(e) >_ 5(d) + 1;
2. there exists a sequence f C D~ such that (a) (i) f l -- dl - 1 or (ii) f a - dl and f~ - 1; (b) in case (i) above, 5(f) > 5(d) + 1; in case (ii) above, 5(f) >_ 5(d); (c) S~(f) and con(d) have the same parity. P r o o f . If r _< p - r, then the results follow from Lemm~ 15.4.27, so assume r > p - r. As in the proof of Lemma 15.4.27, we may assume that (15.41) holds. We also deduce Equation (15.46) as before. Define a sequence e such that C(e) is obtained from C(d) by deleting the s-th column. Then c E D~ by L e m m a 15.4.17 and
~(~)
s--1
-
E(~'~-
~)+
i=1 q
=
r(n+l-s)+
~ i=p+l
s-1
(d'i - d i ) ++ ~ i=q+l
(d'i - d i )
15.4
427
Threshold and Majorization Gaps
=
~(~ - ~) + ~ +
Z
(d~ - d~) + +
i=p+l
=
5(d)+r-p+r
>
~(d).
( d ' , - d,) - d: + d~ i=q+l
(by (15.46) and the definition o f p a n d r )
( ~ ~ > p - ~)
This proves Statement 1. To prove Statement 2, define f from e as in the proof of L e m m a 15.4.27. 9 L e m m a 15.4.29 is a variation of L e m m a 15.4.27. L e m m a 1 5 . 4 . 2 9 Let 0 ~ d C Dn. Put s - da + 1, p - dis, r - ds. A s s u m e that s - m + 1 and p - m (see Figure 15.12). Figure 15.12" Illustrating Lemma 15.4.29.
r
m8
.
m 8
0
-k
0
O.
Then 1. if m > 3, then there exists a sequence and 5(e) > 5(d) + 1;
e C Dn such that el - d l - 1
2. if m > 4, then there exists a sequence f c Dn such that (a) (i) f l = d l -
1 or (ii) f l - - d ,
and f~ = 1;
(b) 5 ( f ) > 5(d)-4- 1; (c) S ~ ( f ) and Sn(d) have the same parity. P r o o f . We begin by proving Statement 1. First, observe that m < n - 1, because m = n - 1 and p = m would imply Sin(d) > Sm(d'), contradicting d E Dn. Secondly, assume without loss of generality that (15.41) holds as in
428
Threshold Weights and Measures
t h e p r o o f of L e m m a 15.4.27. Define a s e q u e n c e e such t h a t C ( e ) is o b t a i n e d f r o m C(d) by m a k i n g t h e first m - 1 c o l u m n s full, if necessary, a n d d e l e t i n g t h e c o l u m n s - rn + 1, i.e.,
ei! m
rtml 07
d~, Then e E
Dn
~ for i - 1 , . . . , r n for i - m + 1 otherwise.
1
by L e m m a 15.4.17. Using t h e facts d} - n -
di
m, d~ - m - 1 for i - r + 1 , . . . , definition of m a n d r), we o b t a i n
5(d) - r ( n -
1 - m)+ m-
m,
d i 'n +
r < (m-
1 -
m,
1 for i - 1 , . . . , r, < 1 (by _ m -
dm+l - r
1)(n - 1 - m ) +
m - r.
Also, 5(e) - ( r n -
1)(n - 1 - ( r n
- 1)) - (rn - 1)(n - 1 - r n ) + m - 1.
It is now clear t h a t if r > 1, t h e n 5(e) > 5(d). If r = 1, t h e s a m e c o n c l u s i o n holds, since m - 1 > 1 a n d n - 1 - m > 0. T h i s proves S t a t e m e n t 1. W e now prove S t a t e m e n t 2. If Sn(d) before t h e a c h i e v e m e n t of (15.41) a n d S~(e) h a v e t h e s a m e parity, t h e n f = e has t h e r e q u i r e d p r o p e r t i e s . O t h e r w i s e t a k e f = e + Um+l. O n c e again, C ( f ) can be o b t a i n e d f r o m C(d) by m a k i n g t h e first m - 1 c o l u m n s full a n d d e l e t i n g all t h e l ' s e x c e p t t h e first 1 in c o l u m n m + 1. T h e r e f o r e f C Dn by L e m m a 15.4.17. F u r t h e r , (~(f) = ( ~ ( e ) - 1, as (~l(f) = ( ~ l ( e ) - 1, a n d 5~(f) = 5~(e) for i = 2 , . . . , r n . Hence 5 ( f ) = (rn - 1)(n - 1 - rn) + m - 2. N o w it is clear t h a t if r > 2, t h e n 5 ( f ) > 5(d). If r - 2, t h e s a m e c o n c l u s i o n holds since m - 1 > r ( b e c a u s e m >_ 4) a n d n - 1 - m > 0. Finally, if r - 1, t h e n t h e conclusion holds again, since
5(f)
-(m-2)(n-l-rn)+n-l-m+m-2 >_
(m-2)(n-l-rn)+m-1
>
n-l-rn+m-1
(asn-2>rn)
(asm>_4andn-l-m>O)
=
W e are now r e a d y to prove T h e o r e m s 15.4.25 a n d 15.4.26.
15.4
Threshold and Majorization Gaps
429
P r o o f o f T h e o r e m 1 5 . 4 . 2 6 . T h e s t a t e m e n t is true for n - 1, so a s s u m e n > 2. If d n - 0, t h e n by induction on n, 8(d) < f ( n 1) < f ( n ) , and f ( n - 1) < f ( n ) for n > 3. We m a y therefore assume t h a t d~ > 0, and c o n s e q u e n t l y m > 2. If m 2, then 5(d) < n - 2 by L e m m a 15.4.18, and hence 8(d) _< f(n). E q u a l i t y holds if and only if d~ - d2 and n - 2 - f ( n ) , which implies n < 4. Hence we m a y assume m _> 3. P u t s - dl + 1, p - d~s, q - dp~ + 1, r - ds, and observe as before t h a t p _< m < q, and m < s Proposition. If s > m + 1, then there exists a sequence e C Dn such that el
-
-
dl
-
1 and 5(e) > 5(d). Consequently we may assume that s - m.
To prove the proposition, first assume t h a t q > s. Define a sequence e such t h a t C(e) is o b t a i n e d from C(d) by m a k i n g the first p columns full, and deleting the s-th column. T h e n e C D~ and 5(e) > 5(d) by L e m m a 15.4.17. Now a s s u m e q < s. T h e n r d~ < dq+l < p - l , and h e n c e r < p. I f s > m + l or p < m, t h e n the required sequence e exists by L e m m a 15.4.28. If s - m + 1 and p - m, t h e n the required sequence e exists by L e m m a 15.4.29. This proves the proposition, and we m a y assume t h a t s - m. F u r t h e r , we m a y a s s u m e t h a t the first m - 1 columns of d are full, for otherwise we m a k e t h e m full w i t h o u t leaving D~, t h e r e b y increasing 8(d) by L e m m a 15.4.17. Then d - ( m - 1) n ,
5(d)- (m-
1)(n-
1 -(m-
1)),
and 5(d) reaches a m a x i m u m when n--1
m-
2 ' n ~ 7-1,7,
1 -
nodd neven.
(15.47)
Therefore 5(d)_<
__tl )2, ~(~-1),
n odd neven.
This m e a n s t h a t 5(d) <_ f(n). Further, for n _> 5, equality holds if and only if d - ( m - 1) n, where m - 1 is given by E q u a t i o n (15.47), i.e., if and only if d-[~-~l
Proof of Theorem
n
or
d - L - ~ - ! j n.
1 5 . 4 . 2 5 . We use the n o t a t i o n E~ - {d E D ~ - S~(d) even},
Threshold Weights and Measures
430
i.e., En(d) is the set of all proper degree sequences of length n. Since E~ C_ Dn, we have 5(d) _< f ( n ) by Theorem 15.4.26. For n ~ 3 mod 4, f ( n ) - g(n) and hence 5(d) _< g(n). The cases of equality for d C Dn are when d - [ _ ~ ] n or d - [~-~]~. Since these d belong to E~ when n ~ 3 m o d 4 , all the conclusions of Theorem 15.4.25 are established in this case. However, for n = n-l~2 is odd, whereas (~(d)is even by Theorem 15.4.10, since 3 rood 4, f ( n ) - (--5-~ d is a degree sequence. Therefore (~(d) < f ( n ) - 1 - g(n) for n - 3 mod 4. It remains to track down the cases of equality for n - 3 mod 4. Thus from now on, we assume that n - 3 rood 4, n _> 7, and ~i(d) - g(n). If d n - - 0 , then ~(d) <_ g ( n - 1) < g(n), contradicting our assumption, so we may assume that dn > 0, and therefore m > 2. Also m - 2 implies, by L e m m a 15.4.18, that ~i(d) _< n - 2 < g(n), again contradicting our assumption, so we assume that m > 3 . P u t s - d l + l . Proposition. If s > m + 2, then there exists a sequence f E En such that
(~(f) > ~(d), contradicting ~(d) - g(n). Consequently we may assume that s-m ors-m+ l. We prove the proposition by showing that, when s > m + 2, 1. if d's - 1, then there exists an f E En such that 5(f) > 5(d); 2. if d'~ >_ 2, then there exists an f E E~ such that 6(f) >_ 5(d), and if equality holds, then fl - d~ (so that f and d have the same s) and f;-1. C a s e 1" d's - 1. The basic idea is to work with the sequence ( d l 1, d 2 , . . . , d~) and introduce a 1 at the end of the first row if the parity becomes odd. Put t - s - l , p - d ~ t , q d tp + l . T h e n p _ < m_< q. Assume that q >_ t. Define a sequence f such that C ( f ) is obtained from C(d) by deleting the last 1 in column s - 1 and the 1 in column s. Then f C E~ and 5(f) > 5(d) by L e m m a 15.4.17. Therefore we may assume q < t. Put r = dr. See Figure 15.13. C a s e 1.1: t > m + 1 or p < m. Define a sequence c such that C(c) is obtained from C(d) by deleting the last 1 in the first row. Note that c E D~ by L e m m a 15.4.17 and, further, c satisfies all the hypotheses of L e m m a 15.4.28. By the latter, there exists a sequence g E Dn such that 5(g) >_ 5(c) + 1. The required sequence f is defined by f
_ J" g, (g~ + 1 , 9 2 , . . . , g ~ ) ,
\
Sn(g) even S~(g) odd.
15.4
Threshold and Majorization Gaps
431
Figure 15.13" Illustrating Case 1 of the Proposition in the proof of Theorem 15.4.25. r
m
p
m
ts
.jrm
0
To see this, recall that in the proof of L e m m a 15.4.28, C(g) is obtained from C(c) by making the first p columns full and deleting the t-th column (if r _< p - r ) , or by making the first r columns full and deleting the t-th column (if r > p - r). Note that when S~(g) is odd, C(f) could be obtained from C(c) by making the appropriate columns full and then deleting all but the first 1 in column t. Therefore f C Dn in this case by L e m m a 15.4.17. Clearly f E Dn also holds when S~(g) is even. Further, Sn(f) is even in both cases. Thus f C E~. From the construction of c and f it is clear that 5(c) - (5(d)+ 1 and (5(f) _> ( 5 ( g ) - 1. Therefore 5(f) >_ 5 ( g ) - 1 _> (5(c) - 5 ( d ) + 1. 1.2" t - m + 1 and p - m. This is similar to Case 1.1, except that here we use L e m m a 15.4.29 instead of L e m m a 15.4.28. Case
C a s e 2" 2 _< d', _< rn. Put p - d'~ and q - d'p + 1. If q _> s, then we may remove the last two l's in the s-th column without leaving En and thereby increase (5(d) by L e m m a 15.4.17. We therefore assume that q < s. Then the required f exists by L e m m a 15.4.28.
This completes the proof of the proposition and hence we may assume that s - m or s - m + 1.
Threshold Weights
432
and
Measures
It is convenient here to define a new function. Let a _> 6 be a fixed integer such t h a t a - 2 m o d 4. For 0 _< k _< a, define k(a
h~(k) -
k(a-
-- k),
k)-
k
l,
even
k odd,
i.e.,
h~(k)- 2 L"~-"~ 2 J. Note t h a t the m a x i m u m of ha(k) occurs at k -
~2
1, 7, 7 + 1~, ~
and the
m a x i m u m is ~2-4 4 " Proposition. if and only if
If s - m or s - m + 1, then 5(d) _< h n - l ( m -
d
-
(m-l)
d
-
(m -
~
1), with equality
formodd
1) n - 1 ( m -
2)
or
d - m(m
-
1) n - 1
f o r m even.
To prove the proposition, consider first the case t h a t s - m. If columns 1 , . . . , m - 1 are m a d e full in this order, then d stays in Dn and 5(d) increases at each step by L e m m a 15.4.17. For odd m, the resulting d - ( m - 1) n also belongs to E~, and so it is the only sequence of E~ satisfying s - m t h a t m a x i m i z e s 5(d). T h e m a x i m u m in this case equals ( m - 1 ) ( n - 1 - ( m 1)) hn-1 (m1 ) . For even m, the above d does not belong to E~, and so the only sequence of E~ satisfying s - m t h a t maximizes 5(d) is the previous sequence in the filling-up process, n a m e l y d - ( m - 1 ) ~ - l ( m - 2). T h e m a x i m u m in this case equals ( m - 1)(n - 1 - ( m 1 ) ) - 1 - h~-i (m - 1). Now consider the case t h a t s - m + 1. We assert t h a t if d'~ _> 2, t h e n there exists f C E~ such t h a t 5 ( f ) > 5(d), and consequently we m a y a s s u m e t h a t d'~- 1. To prove the assertion we distinguish two cases. ! C a s e 1" 2 _< d~ < m. P u t p - d~, r - d~, q - dp + 1. We m a y a s s u m e t h a t q < s, for otherwise the last two l's in the s-th column of d m a y be r e m o v e d w i t h o u t leaving E~, t h e r e b y increasing 5(d) by L e m m a 15.4.17. T h u s q - m. If r _< p - r , then the required f exists by L e m m a 15.4.27, so we a s s u m e t h a t r > p - r. Using dli > rn and di - rn for i -- 1 , . . . , r, d~ - m - 1 and di - rn ' for i - r + 1 , . . . , p, d~ - di - r n - 1 for i - p + 1 , . . . , m , din+ 1 - - p, d m + l - r and d} - 0 for i - rn + 2 , . . . , n , we obtain 5(d) - ~ ( d ' i - di) + p i=1
r.
(15.48)
15.4
Threshold
and Majorization
Gaps
433
Let f be a sequence such that C(f) is obtained from C(d) by (a) deleting the s-th column and (b) adding a 1 at the end of the (r + 1)-st column if p is odd. Then f C En by L e m m a 15.4.17 and 7-
5(f)
>
~-~(d'~- ( d ~ - 1)) i=1 r
=
r
i=1
>
5(d).
(by (15.48) a n d r > p - r )
C a s e 2" d~, - m. If m > 4, then the required f exists by L e m m a 15.4.29. Now assume the special case m - 3. Then d - 32d'2-21n-d'2-1 with d~ > 2 (see Figure 15.14).
Figure 15.14: Illustrating a special case in the proof of Theorem 15.4.25. m
* 1
1 1
1 1 * 1 1 0
1
1
m s
:
d;-t-1
*
:
1 1 1
n
8
1 1
0
1
If d~ - 2, then Sn(d) - n + 6 is odd, since n - 3 mod 4, contradicting d C En. Therefore d~ >_ 3. Hence 5(d) - ( n - 4 ) + + ( d ; - 3 ) + + ( 2 3) + + ( 3 - 2 ) + - n+d~-6 _< 2 n - 7 , and writing n - 4 k + 3 , we have 5(d) <_ 8 k - 1 < 4k 2 + 4 k - ( 2 k + 1) 2 - 1 - g(n), contradicting the assumption This completes the proof of the assertion, and consequently we may assume that d ~, - 1. If m is odd, then make the first m - 1 columns of C(d) full and delete the last 1 in the first row without leaving En, thereby increasing 5(d) by L e m m a 15.4.17. Therefore m may be assumed to be even. Then it is easy to
Threshold Weights and Measures
434
check as before that d = m ( m - 1)n-1 is the only sequence in En satisfying s =rn + 1 and d~ = 1 that maximizes 5(d), and 5 ( d ) = hn-1( r n - 1). This proves the proposition, and so 5(d) _< h ~ _ l ( r n - 1). The function h ~ _ l ( m - 1) reaches its m a x i m u m when rn-
1 - n-1 2
1'
or
rn-
1 --
n -21
'
or
m--l--
_~ +1.
The m a x i m u m i s ( _ ~ ) 2 _ 1 - g(n). By the previous proposition it is achieved only by the following sequences d: when r n -
1 - n-x 2
when r n -
1 - -~
1 (rn odd)" (rn even)"
d-
(
or d when r n -
)nl ~
2 ---fn + l (~__A1 ) ~-1
1 - - ~ + 1 (rn Odd)"
See [AP94] for related results about the difference gap and the fact that every degree sequence d such that R(d) - 1 has a realization that is both bithreshold and cobithreshold.
Chapter 16 Threshold Graphs and Order Relations 16.1
Introduction
In a type of test frequently used in social sciences, the subjects in a set A are presented with all the dichotomous items in a set B. For instance, suppose A is a set of children and B is a set of skills. Do all the children learn the skills in the same order? At what age do children learn a given skill? To answer these questions, define a relation R from A to B such that aRb if and only if child a has learned skill b. The data can be interpreted by the assumption that easier skills are learnt first. This idea, which is due to G u t t m a n [Gut44], amounts to the existence of two scales f : A --. IR and g : B --. N, such that
aRb if and only if f(a) > g(b). In this interpretation, f is a scale measuring the subjects ability, and g is a scale measuring the difficulty of the skill. Ducamp and Falmagne [DF69] have shown that for finite sets A and B, such scales f, g exist if and only if the following condition holds for R:
(aRb and cRd) ~
(aRd or cRb).
We have already seen essentially this result in Section 4.5. A relation R satisfying this condition is called biorder. Doignon et al. [DDF84] have investigated biorders of arbitrary cardinality. The results in the next two sections 435
T h r e s h o l d Graphs and Order R e l a t i o n s
436
are based on their work. In the finite case, many of their results were obtained independently by Bouchet [Bou71] and Cogis [Cog79]. Observe that if G is a bipartite graph with color classes A, B and edge set {ab : aRb}, then G is a difference graph if and only if R is a biorder. As we see in the next two sections, some of the results on difference graphs and threshold dimension were obtained independently by these authors using the terminology of biorders and bidimensions. We define below various order relations that are used in this chapter. First recall that a relation R C A x A is said to be reflexive if aRa for each a E A; irreflexive if -,aRa for each a E A; symmetric if aRb ---5, bRa for all a, b E A; asymmetric if aRb m ~ -~bRa for all a, b E A; antisymmetric if for all a 5r b, aRb ----5, -,bRa; transitive if (aRb, bRc) ~ a r c for all a, b, c E A; negatively transitive if the complement of R (i.e., (A x A ) - R) is transitive; complete if for all distinct a, b E A, aRb or bRa; strongly complete if for all a, b E A, aRb or bRa; and countable if A is a countable set. D e f i n i t i o n 16.1.1 Let R be a binary relation on A, i.e., R C A • A. Then
9 R is a q u a s i o r d e r if it is reflexive and transitive; 9 R is a w e a k o r d e r if it is transitive and strongly complete; is a s i m p l e o r d e r if it is transitive, antisymmetric and strongly complete;
9 R
9 R is a s t r i c t s i m p l e o r d e r if it is transitive, asymmetric and complete; 9 R is a s t r i c t w e a k o r d e r if it is asymmetric and negatively transitive; 9 R is a p a r t i a l o r d e r if it is reflexive, transitive and antisymmetric; 9 R is a s t r i c t p a r t i a l o r d e r if it is transitive and asymmetric; 9 R is an e q u i v a l e n c e r e l a t i o n if it is reflexive, symmetric and transitive.
16.2
Biorders
437
A partially ordered set is also called a poset. A complete partial order is also called total or linear. If R is a partial order on A, then a least element of a subset B of A is an element a C B such that aRb for every b C B. Note that a least element need not exist. A well-ordered set is a poset in which every nonempty subset has a least element. In particular, a well-ordered set is a chain (i.e., a set on which the partial order is total). The Well-Order Principle, equivalent to the Axiom of Choice, states that every set can be well-ordered.
16.2
Biorders
Recall that a biorder is a relation R from A to D such that for all a, b, c, d,
(aRb and cRd) ----5, (aRd or cRb).
(16.1)
We characterize biorders in this section. All the results are due to [DDF84]. We first need some notations and definitions. An ordered pair (a, d) is often denoted by ad. Thus aRd ~ ad C R. The converse relation R -1 is the set of all ordered pairs da such that ad C R. The complement of R is denoted by R. The relative product R S of two relations R and S is defined by
R S - {a f " aRd, dS f for some d}. It is easy to see that a binary relation R is a biorder if and only if
~/~-1/~ C /~.
(16.2)
Observe that if we associate a digraph G with the relation R the natural way (i.e., A U D as the vertex set and {ad: aRd} as the arc set), then G is a Ferrers digraph if and only if R is a biorder. Hence the graphical representation of Condition (16.1) is given in Figure 2.1 or Figure 2.2. Considering the forbidden subgraphs of Figure 2.2, it is easy to prove the following proposition. P r o p o s i t i o n 16.2.1 Let R be a biorder on a set E. If 1~ is reflexive on E, then R is strongly complete and negatively transitive on E. If R is irreflexive on E, then R is asymmetric and transitive on E.
T h r e s h o l d Graphs and Order R e l a t i o n s
438
Definition 16.2.2 Let R be a relation from A to D. For a C A and d C D we put a R - {y e D " aRy} and R d - {x e A" xRd}. Furthermore, we define a relation RA on A and a relation RD on D by aRAb
if and only if
aR 2 bR
dRDe
if and only if
Rd C_ Re
and for all a, b E A and d, e C D.
Some useful facts concerning RA and RD are collected below. P r o p o s i t i o n 16.2.3 For every relation R from A to D we have 1. RA and RD are quasi orders;
2. RA - -RR -1 and RD -- R-l-R; 3. the following conditions are equivalent: (a) R is a biorder; (b) RA is a weak order on A; (c) RD is a weak order on D.
We now turn to the problem of embedding a given relation R in the reals, in the following sense. Definition 16.2.4 A relation R from A to D is realizable w i t h r e s p e c t to < (respectively <) if there exist two mappings f " A ~ N and g" D ---+N such that aRd
if and only if
f ( a ) < g(d)
(resp. f ( a ) < g(d))
for all a C A and d C D.
It is useful to notice the following. P r o p o s i t i o n 16.2.5 (f,g) is a realization of R with respect to < if and only if (g, f ) is a realization of R -1 with respect to <.
16.2
Biorders
439
It is also easy to verify that if R is realizable with respect to _< or with respect to <, then R is a biorder. The converse is true if R is countable as stated in the following theorem and proved after Proposition 16.2.10. T h e o r e m 16.2.6 Let R be a countable relation from A to D. following conditions are equivalent:
Then the
1. R is a biorder; 2. R is realizable with respect to <_; 3. R is realizable with respect to <. As a first step in proving Theorem 16.2.6, we see that there is no loss of generality in assuming that A and D are disjoint.
D e f i n i t i o n 16.2.7 A (disjoint) d u p l i c a t i o n of a relation R from A to D is a relation R' from A' to D' defined as follows:
1. A' is a copy of A; i.e., there exists a one-to-one correspondence c~ from A' to A. 2. D' is a copy of D; i.e., there exists a one-to-one correspondence 5 from D' to D. 3. A' and D' are disjoint. ~. a'R'd' Proposition
if and only if
c~(a')RJ(d').
16.2.8 Let R' be a duplication of R.
1. R is a biorder if and only if R' is a biorder. 2. R is realizable with respect to <_ (resp. <) if and only if R' is realizable with respect to <_ (resp. <). The following is an important result that is used later. P r o p o s i t i o n 16.2.9 Let R C_ A x D for two disjoint sets A and D. Among all the relations Q on A U D such that
1. Q is a quasi order,
440
Threshold Graphs and Order Relations
2. Q N ( A • D ) -
R,
there exists one Qn that is maximal in the sense that it contains all the others. It is given by the formula QR -- R U RA U RD U R - 1 R R -1. P r o o f . Let Q be any relation on A U D satisfying Conditions 1 and 2. Then for every a, b E A and c, d C D,
9 aQb ~
aRAb since R C Q and Q is transitive,
9 cQd ~
cRDd since R C Q and Q is transitive,
9 aQc~aRcsinceQN(AxD)-R, 9 dQb ~ arc.
-~(dR-I-RR-lb) since R C_ Q, Q is transitive, and aQc ------>
Thus Q c_ Qn. It is straightforward to verify that Qn satisfies Conditions 1 and 2. 9 P r o p o s i t i o n 16.2.10 Let R C_ A x D for two disjoint sets A and D. Then the following conditions are equivalent:
1. R is a biorder; 2. Q R is a weak order on A U D. P r o o f . Assume first that R is a biorder. Then from Part 3 of Proposition 16.2.3, it follows that RA, RD are weak orders. In addition, for a E A and d E D, a-Rd ---> --,(dR-l~/~-la) ~ dQna. Hence it follows that for every a, b G A U D, aQnb or bQna. Therefore Qn is a weak order. Conversely, assume that Qn is a weak order. For every a, b E A and c, d E D such that arc, bRd and -~aRd, we have cR-I-RR -1 b. Hence -~cQRb. But then, Qn being a weak order, we must have bQRc and therefore bRc. Thus R is a biorder. " We now prove Theorem 16.2.6, which characterizes biorders among the countable relations. P r o o f of T h e o r e m 16.2.6. We only prove 1) -----5, 2). Then the rest of the implications easily follow.
16.2
Biorders
441
1) =~ 2): By Proposition 16.2.8 we may assume that A and D are disjoint. Let QR be the maximal extension of R as in Proposition 16.2.9. QR is a weak order on A U D by Proposition 16.2.10. Since A U D is countable there exists a function h defined on A U D such that for all p, q C A U D
pQnq
if and only if
h(p)<_ h(q).
(We can construct h by enumerating A U D and defining h inductively.) Thus if f, g are the restrictions of h to A, D respectively, then (f, g) is a realization of R with respect to _<. " One can derive from Theorems 16.2.14 and 16.2.16 below that the relation <_ on R is realizable with respect to _< but not realizable with respect to <. Similarly, the relation < on R is realizable with respect to < but not realizable with respect to <_. This shows that Theorem 16.2.6 does not hold in general for uncountable sets. We give other characterizations of biorders below. First we need some definitions and notations. D e f i n i t i o n 16.2.11 Let R be a relation from A to D. A subset M of A U D is said to be w i d e l y d e n s e if for all a E A and d C D, aRd implies the
existence of an element rn E M such that n
m
either (m C A, mRd, mRAa) or (m C D, dRDrn, arm).
(16.3)
A subset M of A U D is said to be o r d e r - d e n s e if for every p, q E A U D, qQnp implies the existence of an element m C M such that pQnm and mQnq, where as usual Qn is the maximal quasi order extension of R in the sense of Proposition 16.2.9. P r o p o s i t i o n 1 6 . 2 . 1 2 Let R C_ A x D be a biorder with A M D - 0 . every widely dense subset is order-dense.
Then
P r o o f . Let M be order-dense and let qQnp. We must show that pQRm and mQnq for some m E M. C a s e 1" p,q E A. Since qQnp, we have qRAp. Hence there exists some d C D such that pRd and qRd. Since M is order-dense, there exists some m C M such that either (a) q-Rrn and dRDrn or (b) m--Rd and mRaq. If (~), then from pRd, dRDm, it follows that pQRm. Since QR is a weak order and q-Rm, it follows that mQRq. If (b), then from pRd and mRd and from the
442
Threshold Graphs and Order Relations
fact that Qn is a weak order it follows that pQndQnm and hence pQRm. Also from mRAq it follows that mQRq. Case 2" p, q C D. This case is similar to Case 1. Case 3" p C A, q C D. From qQnp it follows that there exist a C A, d E D such that pRd, aRd and aRq. From aRd it follows that there exists some m C M such that either (a) aRm and dRDm or (b) mRd and mRAa. If (a), then from pRd and dRDm it follows that pQnm. Also since Qn is a weak order and aRm, aRq, it follows that mQnq. If (b), then since pRd, mRd, we have pQnm. Also from mRAa and aRq, we have mQRq. Case 4" p E D, q E A. From qQRp, we have qRp. Hence there exists some m E M such that either (a) qRm and pRDm or (b) mRp and mRAq. If (a), then from qRm we have mQRq. also from pRDrn, we have pQRm by the definition of Qn. If (b), then from mRp, we have pQnm. Also from mRAq we have mQnq by the definition of Qn. 9
L e m m a 16.2.13 ( B i r k h o f f - M i l g r a m T h e o r e m [Rob79, p. 112])
For every relation R on A, the following conditions are equivalent: .
There exists a function h" A ---, N satisfying aRb if and only if h(a) < h(b);
2. R is a weak order with a countable order-dense subset. T h e o r e m 16.2.14 For every relation R C_ A x D, R is realizable with respect
to < if and only if R is a biorder with a countable widely dense subset. P r o o f . Observe that the concepts of biorder, realizable, widely dense set remain invariant under duplication. See Proposition 16.2.8. Hence we may assume that A gl D - O. "If"" Let M be a countable widely dense subset for the biorder R. By Proposition 16.2.12, M is an order-dense subset, and by Proposition 16.2.10, Qn is a weak order. Hence by Lemma 16.2.13 there exists a function h 9 AUD --. IR such that aQnb if and only if h(a) <_ h(b). The restrictions of h to A and D constitute a realization of R with respect to <_ by Proposition 16.2.9. " O n l y if"" Assume that ( f , g ) is a realization of R with respect to _<. We have already observed that R must be a biorder. It will be shown that A has a countable subset A* that is widely dense. By a similar argument, one could alternatively show that D has a countable subset D* that is widely dense.
16.2
Biorders
443
Consider all the real numbers c~i in f ( A ) for which there exists some real number 5i in g(D) satisfying 5i < c~i and (5i, c~i)n f ( A ) -
~.
(16.4)
With every such c~i let us associate a particular 5i for which (16.4) holds. Notice that the open intervals (Si, c~i) are nonempty and disjoint. Indeed, consider two intervals (5i, c~i), (Sj, c~j) with c~i < c~j. We have c~i <_ 5j since otherwise c~i E (Sj,c~j)in contradiction with (16.4). As a consequence, the collection of c~i is countable. We can thus find a countable subset A 1 of A such that f(A~) contains all the c~. Furthermore, let us select a subset A~ of A such that for every pair (p < q) of rationals the following is true: (p, q)N I ( A ) 7/= rg implies the existence of an element m* C A~ such that p < f(m*) < q. Clearly, A~ can be taken to be countable. It remains to show that the countable set A* - A~ U A~ is widely dense. Let a C A and d C D be such that aRd. We therefore have f(a) > g(d). Let us consider two cases: (a) (g(d), f ( a ) ) n I ( A ) - ;g. In this case, f(a) is one of the c~. Let m* be the element in A~ such that f(m*) - f(a). One readily sees that m*Rd and m*RAa and Condition (16.3) is fulfilled. (b) (g(d), f ( a ) ) n I(A) :/: ;g. Let a' be an element in A such that g(d) < f(a') < f(a). Furthermore let p and q be rational numbers such that
g(d) < p < f(a') < q < f(a). Finally, let m* be an element in A~ such that p < f(m*) < q. Therefore we have g(d) < f(m*) < f ( a ) , which implies m*Rd and m*RAa and Condition (16.3) is again fulfilled. 9 According to Proposition 16.2.5, R is realizable with respect to < if and only if R -1 is realizable with respect to <. We are thus led to define below a strictly dense condition on R as a restatement of a widely dense condition o n R -1 . D e f i n i t i o n 16.2.15 Let R C_ A x D. A subset M of A U D is said to be s t r i c t l y d e n s e if for all a C A, d E D, aRd implies the existence of an
element m E M such that either ( m e D, aRm, mRDd) or (m e A, aRAm, mRd).
(16.5)
444
Threshold Graphs and Order Relations
Theorem 16.2.16 now follows as a corollary to Theorem 16.2.14. T h e o r e m 16.2.16 For every relation R from A to D, R is realizable with respect to < if and only if R is a biorder with a countable strictly dense subset. The following results on the realizability of interval orders follow easily from Theorems 16.2.14 and 16.2.16. T h e o r e m 16.2.17 For every relation R on a set E, the following conditions are equivalent:
1. R is an interval order (i.e., an irreflexive biorder) with a countable widely dense subset; 2. there exist mappings u 9 E ~ R and r 9 E ~ N + such that, for all p, q C E, pRq if and only if u(p) + r(p) <_ u(q). T h e o r e m 16.2.18 For every relation R on a set E, the following conditions are equivalent:
1. R is an interval order with a countable strictly dense subset; 2. there exist mappings u 9 E ~ R and r 9 E ~ R + such that, for all p, q C E, pRq if and only if u(p) + r(p) < u(q).
16.3
Bidimensions
We now consider the problem of the representation of an arbitrary relation by the intersection of a collection of biorders. We remark that if R has cardinality 1, then both R and R are biorders. Hence every relation R C_ A x D is a union (intersection) of biorders from A to D. We use intersection of biorders to define bidimension. D e f i n i t i o n 16.3.1 The b i d i m e n s i o n dB(R) of a relation R is the smallest cardinal a such that there exists a family of biorders {Bi " i C I} with ] I ] - c~ and
R- A i
(16.6)
16.3
Bidimensions
445
The bidimension is also called the i - b i d i m e n s i o n . Similarly we define the u - b i d i m e n s i o n using union instead of intersection.
In the finite case, the bidimension is the same as the Ferrers dimension of Section 2.3, and it is interesting to compare that section with our results below. The following is an example of a bidimension being an arbitrary cardinal. m
D e f i n i t i o n 16.3.2 A relation R C_ A x D is called a c r o w n if R is a oneto-one correspondence from A to D. The common cardinality a - I A I - IDI is called the size of the crown. P r o p o s i t i o n 16.3.3 The bidimension of a crown R of size a > 2 is equal to a. We leave the proof as an exercise. The following theorem represents the bidimension by an embedding in a product of linear orders. T h e o r e m 16.3.4 The i-bidimension (resp. u-bidimension) of a relation R C_ A x D is the smallest cardinal a such that there exist a family of linear orders {(Wi,_
p r i ( f ( a ) )
where pri denotes the canonical projection of W on Wi.
P r o o f . We only consider the case of i-bidimension since u-bidimension is similar. The proof follows from Lemma 16.3.5 below, which generalizes (but is easier than) Theorem 16.2.14. 9 L e m m a 16.3.5 For R C A x D, A n D - 0 , the following conditions are equivalent: 1. R is a biorder; 2. there exists a linear order (W, <) and two mappings f " A ~ W , and g" D --~ W such that aRd if and only if f ( a ) <_ g(d).
T h r e s h o l d Graphs and Order Relations
446
P r o o f . 2) =~ 1)" This follows from the definition of biorders. 1) =~ 2)" By Proposition 16.2.10, QR is a weak order. Define the equivalence relation E on A U D by x E y if and only if x Q R y and yQRx. Then the quotient W - Q / E is a linear order. Let h be the canonical homomorphism from A UD to W defined by h ( x ) - { y ' x E y } . Then since Q n N ( A x D) - R, the restrictions f, g of h to A, D respectively satisfy the required property. 9 Note that if R is countable, then we can use Theorem 16.2.6 in place of Lemma 16.3.5 to derive the following proposition in place of Theorem 16.3.4. P r o p o s i t i o n 16.3.6 Let R be a countable relation f r o m A to D. Then the bidimension of R is the smallest cardinal a for which there exist two mappings f " A ~ IR ~, and g " D ~ IR ~ such that for all a C A and d E D aRd
if and only if
f ( a ) < g(d),
where < denotes the product order on R ~.
Recall that the dimension of a quasi order Q (resp. strict partial order P) on a set E is the smallest cardinal a for which there exists a family of weak orders (resp. strict weak orders) on E of cardinal a whose intersection is Q (resp. P). It is denoted by d ( Q ) ( r e s p , d(P)). Thus from Proposition 16.2.3 the following three conditions are equivalent" d s ( R ) - 1, d ( R A ) - 1, d ( R D ) - 1. Also if R is a crown of size > 2, then we have 2 - d ( R n ) - d(RD) < We may have d(RA) - 2 and d(RD) arbitrarily large as the next example shows. Let S be any set of cardinal a > 2. D e f i n e A t o b e S a n d D to be the set of all one-element subsets of S together with all their complementary subsets in S. Define R by a R d if and only if a C_ d. One can check that 2 - d(RA) < d(RD) - ds (R) - a. We show in this section that for every quasi order Q, dB(Q) -- d(Q). D e f i n i t i o n 16.3.7 A n n - a l t e r n a t i n g cycle of a relation R is a finite sequence al, d l , . . . , an, d~ such that (ai, di) C R
for i - 1, . . . , n,
(di, ai+l ) r R -1 for i - 1 , . . . , n, where an+l - al. We say that this cycle i n c l u d e s the pairs (ai, di) C R and the pairs (di, ai+l) C /~.
16.3
447
Bidimensions
Figure 16.1" A 4-alternating cycle. al
a2 /
~"
a3 Z
/
/
dl
a4
/
d2
d3
d4
See Figure 16.1 for an example of an alternating cycle. L e m m a 16.3.8 A relation is a biorder if and only if it has no alternating cycle. P r o o f . The "if" part is clear since the forbidden subgraph is a 2-alternating cycle. For the "only if" part we prove by induction on n > 2 that a biorder R has no n-alternating cycle. The case n - 2 follows since R is a biorder. Assume the condition for n - k, and consider an alternating cycle al , dl , . . . , ak+l , dk+l . From a k R d k , ak+lRdk+l and ak+lRdk we infer akRdk+l since R is a biorder. Hence the sequence al , dl , . . . , ak-1, dk-1, ak, dk+l
is a k-alternating cycle of R, yielding a contradiction. D e f i n i t i o n 16.3.9 A n n-alternating cycle al, d l , . . . , an, dn is called b a r e if f o r all i , j - 1 , . . . , n a i R d j ----'z i - j .
See Figure 16.2 for a bare 3-alternating cycle. Clearly every alternating cycle contains a bare alternating cycle. D e f i n i t i o n 16.3.10 Let R be any relation. The h y p e r g r a p h a s s o c i a t e d w i t h R is the hypergraph H ( R ) whose vertices are the ordered pairs in R and such that e is an edge of H ( R ) if and only if e is the collection of
448
Threshold Graphs and Order Relations
Figure 16.2" A bare 3-alternating cycle. a-
a2
IL q'- ...
/
a3
t \
f \
• /
f
) ( X
1
f \
I"#"
f \
/ /
x
/
/
#
/
x..x
I
dl
d2
d3
all pairs in R included in some alternating cycle. The b a r e h y p e r g r a p h w i t h R is the hypergraph Hb(R) obtained from H ( R ) by deleting every edge that strictly contains another edge and every vertex not contained in the remaining edges.
associated
Figure 16.3 shows some examples of these hypergraphs and bare hypergraphs. L e m m a 16.3.11 1. A set of pairs in R forms an edge of Hb(R) if and only if it consists of all the non-arcs included in some bare alternating cycle of R.
2. A pair in R is a vertex of Hb(R) if and only if it is included in some 2-alternating cycle of R. 3. If R is a quasi order, then the vertices of Hb(I~) are precisely the incomparable pairs in R, that is to say the pairs (re, n) such that (m, n), (n, m) e R. In that case {(m, n), (n, m)} is an edge of Hb(R). P r o o f . Part 1 follows from the definitions. Part 2 follows from Part 1. Part 3 follows from Part 2. " Recall that the chromatic number x(H) of a hypergraph H is the least cardinal a such that the vertices of H can be partitioned into a classes, each one containing no edge of H having cardinality 2 or more, that is to say, no such edge is monochromatic. In the rest of this section we prove the equalities dB(R) - x(Hb(R)) - X(Hb(QR)) -- dB(QR) - d(Qn). We need a number of lemmas for this purpose.
Q
9
~
9
t~
?
~
v
A v
i~.
J ~
?
v
A v
~
~
~IL
j
IL
o
O~
~J
9
o
~o
~J
~mJ
~176
_lo
~d
mlo
450
Lemma
Threshold Graphs and Order Relations
16.3.12 For every relation R, we have
1. d , ( R ) -
x(H(R)) - X(Hb(R));
2. if ds(R) - c~, then R is the intersection of c~ biorders included in RU RR-1R. P r o o f . 1" To show x(H(R)) <_dB(R), consider any family of biorders {Bi" i C I} such that R - ('1~B~. Each B~ is a set of vertices of H(R) that cannot contain an edge of H(R), for otherwise Bi would have an alternating cycle, contrary to L e m m a 16.3.8. Furthermore, we have Ui B i - - R. Now take a strict simple order < on I and define
c,- BZ- U j
The sets Ci partition the vertices of H(R) and none of them contains an edge of H(R). We thus have x(H(R)) <_dB(R). To prove the reverse inequality, let us assume that {Di 9 i C I} is a partition of R such that n o Di contains an edge of H(R). For each i C I, let C~ be such that (i) D~ C_ C~ C_ R, (ii) C~ does not contain any edge of H(R), and (iii) C~ is maximal for these properties. Clearly we have R C_ ('1~C~ = Ui Ci c_ Ui D i - R, and so
R - fl . i
We will have ds(R) <_x(H(R)) if we show that B~ - C~ is a biorder for each
icI. If this is not true, we have aBid, bBie, aBie, and bBid for some a, b E A and d,e C D, where R C_ A x D. We show below that this implies that Ci - Bi contains an edge of H(R), a contradiction. We have four cases to consider. C a s e 1" (a,d) e R and (b,e) E R. In this case {(a, e), (b,d)} is an edge of H(R) contained in B-T. C a s e 2" (a,d) e R and (b,e)C B ~ - R. By the maximality of C ~ - B~, there must be an edge of H(R) contained in Ci U {(b,e)} and not contained in Ci. That is, we can find b2,..., bq C A, e 2 , . . . , eq E D such that {(b, e), (b2, e 2 ) , . . . , (bq, %)} is an edge in H(R) with (bj, ej) E Ci for j - 2 , . . . , q . The set {(b,d), (b2,e2),..., (bq, eq), (a,e)} is then an edge of H(R) contained in C~ since by hypothesis (b, d) C C~ and (a, e) E C~. C a s e 3: (a, d) C B i - R and (b, e) E R. This case is analogous to Case 2.
~
~~
+
"
~,._~
~ ~~ . -
~
~
, ~
+~~
~
~
In
~.
~
t+ ~
~-'~ o~"
9
~,
m
'~:~,., ~ +-~
m,
<:"b ~+.
~~+' ~m " b
'+-'~
m "+
~+ . + ~
I-~
~
"~ - ~ "
9
~"
9
~+
..
~
++
m..,
~
~
~
~
-+ ~
".
m
m ..
~:~
+~ m
9
~
II
+
~
~
~
~
~
++ ~-
~
+
~
"--.
++
~
II
~
++
m...
+
~~
~
~
+-..
~
m ~
~
".
~+
+
--
~
~
++ ~
"9
m
"+
m
~
..
~ ~
~
~
~
~
~
~
+
~
~ ~
""
~++' - '
". ' mlo
+
'
~
~
+ +
s b
9
~
~
.
~
~
~
..
~
=-+ ~
CI) +,,.,..+.'-""~
o~l=..
~
o.. ~::l
~
-.
~-,
++ + ~ F:" + ~
~'
~' +
g m
+
~
~
~
0
I
0
o,.%,
+'+=
O9
~
~
~
#
~
~
.91
rh
C'~
I
+
~
+_.,~
+ o
~
++.
8
.o
=+ +
~
9 o " ~ ~...,,.
++
O'J
M
+ %
t~+.,
" ~ii
S
e " +o
~
~" " +
=
~
0~
~ ~
~
E"
M~>'<
~"
B~
~~ ~ S+'
~c~"
+ r,, " +
+ ~
"~8
" " ~ ""
"+
q.
+~+~.++,,
o
~ o L
~
9
t'O
+ -.
+ +4+ ,_._,~"
"
"+
"E 9 ++ , _ , ~ +
~'+" ~::~
="~m+
+++ + o++ + 9 .+c'Q~..
~
~
9
kO
"
~
~,
&
"~
"
+,-,
~
"..~
C"b
+':'
.
~-+
+.
,,..+
,.+.
m
+~.+
=-+
"
. ~+-~.
-."
~ ' ~
I
<
~.
"
=,_,,..,m
"
' - ~
+~
9
~~ +&~
~
.~
+-"+ . _"." m.,
~
+
+ + +" =++-~
+
=-+m +
~
,...,
o
,.,.
+~
1" ~"
.
l,i.+
9 ~-~
9
9
~"
9
---
~-
r
o
9
~
~,~.
~
~
=-
~
~
~ .~
~'~
~
~
~ ~ ~
~
~ ~ ~
(1)
9
0 ~
~ qII ~~
~
~= "
9
~ ~
~
a ~~
s
..~
o ~
~~r
o
~-~
~.~
~ .,~
~"
~II
~
~
~
~
~
9
~
~
o~
o-
~.
S~
~!
9
~
~
~
s
9
~
~b~
" "
~
o
9
9
~
~
~
oa
~
~
8
~
~
~
o
~
~
" "~ : ~ ~
=-
~
~
- ~~. ' ~ - ~ =
-
~
~
~
~
f
~ ~
~
~,
~
~
>S ~ ;-
~
~
~bm
~.~
a
~
~
~
"-" ,_,..,
~
~ ~
m,(:bm
~
~
~
~.~
~
T
~
=
~
~
9
~-"
~
..
~
~
~.
--
o
i,..., o
p'1
9
0
t~
t~
16.3
Bidimensions
453
-- { ( a l , d l ) , . . . , ( a k , dk)} is monochromatic in is an edge of Hb(R), to obtain a contradiction. either ai = mi or aiRmi, and similarly either ni therefore from mi+lQnni and the transitivity of taken cyclically. Therefore S is indeed an edge of
Hb(R). We show Observe that for = di or niRdi. It Qn that ai+lRdi, Hb(R).
that S each i, follows indices ..
L e m m a 1 6 . 3 . 1 6 If B is a biorder extending a relation R, then there exists a minimal biorder B m such that R C B m C t3. m
P r o o f . Consider the family/3 of biorders B' satisfying R C B' C_ B, partially ordered by inclusion. By Hausdorff Maximal Principle, equivalent to the Axiom of Choice, the poset /3 has a maximal chain C. The intersection C - N{B " B C C} of all the biorders in C is also a biorder. To see this, assume that a, b C A and d, e C D are such that aCd, bCe, aCe, bCd. We must have able and bB2d for some B1,/32 C C. Since C is a chain, we have either Ba C_ B2 or B2 C B1. Assuming the former, we have aBld, bBle, able, bBld in contradiction to the fact that B1 is a biorder. Thus C is a lower bound for C, and by the maximality of C, C must be a minimal element of B. ,, L e m m a 1 6 . 3 . 1 7 Let R C_ A • D and let B be a minimal biorder extending R. Then,
1. B A R 2. B -
B-
RBD;
B B - 1 B C R.
P r o o f . 1" BA being reflexive, one has R C BAR and BAR C BAB C_ B. Hence, by the minimality of B, the equality BAR - B will be established if we prove that BAR is a biorder. Let a, b C A and d, e C D be such that aBaRd and bBARe. Since BA is a weak order we may assume that we have aBAb. Since BA is transitive (i.e., BABA C_ BA), this implies aBARe and proves that BAR is a biorder. The equality B - RBD can be proved in a similar way. 2" It is sufficient to notice that for every biorder B, if (a, d) G B - B B - 1 B , then B - {(a, d)} is also a biorder (otherwise abe, bBd, and bBe for some b C A and e C D, yielding (a, d) C B B - 1 B ) . " The following lemma states a much deeper property of minimal biorders.
454
Threshold Graphs and Order Relations
L e m m a 16.3.18 Let B be a minimal biorder extending a relation R. If R is transitive, then B is transitive. Furthermore, B has the same loops as R. P r o o f . The transitivity of B is a result of the following computation based on Part 1 of Lemma 16.3.17:
B 2 -(BAR)(RBD)-
BA(RR)BD C_ BARBD - BBD C_ B.
As for the loops of B, let us remark that, B being transitive, a B B 1Bd implies a ~ d. According to Part 2 of Lemma 16.3.17, this implies that all the loops in B are loops in R. 9 L e m m a 16.3.19 For every quasi order Q, we have dB(Q) - d(Q). P r o o f . Since every weak order is a biorder, we have dB(Q) <_ d(Q). In order to prove that dB(Q) >_ d(Q), let us consider a family of biorders {B~" i C I} such that Q - Ni B~ and Ill- dB(Q). According to Lemma 16.3.16, for each i E I there exists a minimal biorder B ~ such that Q c_ B ~ C_ Bi. We have thus Q -~B?. (16.7) i
Using Lemma 16.3.18 we see that each B ~ is transitive and reflexive. B ~ is thus a weak order (see Proposition 16.2.1). The desired inequality follows from the fact that Q is, according to (16.7), the intersection of Ill weak orders. [] Theorem
16.3.20 For every relation R C A x D with A N D - 0, we have d . ( R )
-
-
-
P r o o f . Applying Part 1 of Lemma 16.3.12 to R and QR, we obtain the first and third equalities. The second equality follows from Lemma 16.3.15. The last equality follows from Lemma 16.3.19 and Proposition 16.2.9. .. T h e o r e m 16.3.21 For every strict partial order P, d s ( P ) - di(P) (i.e., the interval dimension of P). P r o o f . This is similar to Lemma 16.3.19 (remember that the interval orders are the irreflexive biorders). []
16.4
Relations of Bidimension 2
16.4
455
R e l a t i o n s of B i d i m e n s i o n 2
In this section we study the relations of bidimension 2. We characterize them and the uniqueness of their representation as the intersection of two biorders in terms of the graphs defined as follows. 16.4.1 Let R be a relation. The g r a p h a s s o c i a t e d w i t h R is the graph G(R) whose vertices are the ordered pairs in R and whose edges are the sets {(a, e), (b, d)} such that aRd, are, bRe, bRd. The b a r e g r a p h a s s o c i a t e d w i t h R is the graph Gb(R) obtained from G(R) by deleting every vertex not contained in an edge. Definition
It is easy to see that every coloring of H(R) is a coloring of G(R), hence x(G(R)) < x(H(R)). For some relations R we may have strict inequality, as shown by the example of Cozzens and Leibowitz in Section 6.1. Remark.
F a c t 16.4.2
1. The edges of Gb(R) are the edges of cardinality 2 of Hb(R); 2. Gb(R) and Hb(R) have the same vertices;
P r o o f . Part 1 follows from Part 1 of Lemma 16.3.11. Part 2 follows from Part 2 of Lemma 16.3.11. Part 3 follows from Parts 1 and 2. Lemma
16.4.3 For every relation R C_ A • D with A N D - 0,
P r o o f . This is similar to Lemma 16.3.15. 9 Let C(P), I(P) denote the comparability and the incomparability graphs of a poset P. This means that P is the vertex set of both C(P) and I(P), and xy is an edge of C(P) (resp. I(P)) if and only if xPy V yPx (resp.
-~(xPyVyPx)). A poset P has dimension at most 2 if and only if I(P) is a comparability graph.
Lemma
16.4.4 ( D u s h n i k - M i l l e r T h e o r e m )
456
T h r e s h o l d Graphs and Order R e l a t i o n s
P r o o f . " O n l y if"" Let P - L1 VI L2 where L1 and L2 are linear orders. Then L11 VI L2 is a transitive orientation of I(P). "If"" Let P* be a transitive orientation of I(P). Define L1 - P U P* and L2 - P U ( p . ) - l . Then it can be checked that L1, L2 are linear orders and L1 N L2 - P. L e m m a 16.4.5 ([GH64]) A graph G - (V, E) is a comparability graph if and only if G has no sequence v0,...,v2t of vertices with vivi+l E E and v~v~+2 ~ E for i - 0 , . . . , 2 1 (indices mod 21 + 1). The following theorem gives a convenient characterization of relations of bidimension 2. Theorem
16.4.6 For every relation R C_ A x D with A N D - 0, dB(R) <_ 2
if and only if X(Gb(R)) < 2. P r o o f . dB(R) - X(Hb(R)) >_ X(Gb(R)), by Theorem 16.3.20 and Part 3 of Fact 16.4.2. Thus if dB(R) _< 2, then X(Gb(R)) _< 2. Conversely, we show that if X(Gb(R))<_ 2, then dB(R)<_ 2. Observe that
dB(R) - d ( Q R ) - d(P),
X(Gb(R)) - x(Gb(QR)) - x(Gb(P)),
where P is the poset defined as the quotient P - Q n / E and xEy if and only if xQny A yQnx: the first chain of equalities follows from Theorem 16.3.20 and definitions; the second from Lemma 16.4.3 and definitions. We finish the proof by showing that for every poset P, if ~(Gb(P)) _< 2, then d(P) _< 2, or, equivalently, that if d(P) > 2, then Gb(P) has an odd cycle. By Lemma 16.4.4, since d(P) > 2, I(P) is not a comparability graph and hence, by Lemma 16.4.5, there exists a sequence m 0 , . . . , m21 of elements of P such that {mi, mi+l} is an incomparable pair and {m~, m~+2} is a comparable pair of P for each i, with indices taken mod 21. Since P is reflexive and miPmi+l and mi+lPmi, the pairs (mi, mi+l) and (mi+l, mi) are adjacent vertices of Gb(P). Consider the cyclic sequence of the 21 + 1 vertices (m~, m~+l) of Gb(P). By virtue of rni+lPmi+l, the consecutive vertices (rn~, rni+l) and (m~+~, mi+2) are adjacent if and only if m~Pm~+2. If they are not adjacent, then mi+2Pmi and hence (mi+l, mi) and (mi+2, mi+l) are adjacent, in which case we insert them between (mi, mi+l) and (m~+l,m~+2), obtaining a path of length 3 between (m~, m~+l) and (m~+l, m~+2). Having done all the appropriate insertions, we obtain an odd cycle in Gb(P). []
16.4
457
Relations of Bidimension 2
D e f i n i t i o n 16.4.7 A graph G - (V, E) is u n i q u e l y o r d e r a b l e when IVI 1 or there exist exactly two (opposite) partial orders on V whose comparability graph is G. D e f i n i t i o n 16.4.8 Given a graph G, we say that two of its edges are dir e c t l y e q u i v a l e n t if they are of the form ran, rap with np not an edge. The transitive closure of this reflexive symmetric relation is an equivalence relation on the set of edges of G, whose equivalence classes are called the i m p l i c a t i o n c l a s s e s of G. Fact 16.4.9 Let P be a poset of dimension 2. Then P is uniquely representable as an intersection of two linear orders if and only if I(P) is uniquely orderable. P r o o f . This follows from the proof of Lemma 16.4.4. Fact 16.4.10 (see [Gol80]) A graph is uniquely orderable if and only if it is a comparability graph with only one implication class. L e m m a 16.4.11 A partial order P of dimension 2 has a unique representation as an intersection of two linear orders if and only if the graph Gb(P) is connected. P r o o f . From Lemma 16.4.4 and Facts 16.4.9 and 16.4.10, it is enough to show that I(P) has only one implication class if and only if Gb(P) is connected. Associate with each edge mn of I(P) the two adjacent vertices (m, n), (n, rn) of Gb(P). If two edges rnn and rnp of I(P) are directly equivalent, then { (n, m), (m, p) } or {(p,m), (re, n)} are edges of Gb(P). It follows that if I(P) has only one implication class, then Gb(P) is connected. On the other hand, if {(re, n), (p,q)} is an edge Gb(P), then rnn and pq are in the same implication class of I(P). Indeed, rnq and np are nonedges of I(P) by definition of a 2-alternating cycle, whereas rnn, pq and nq are edges of I(P) by the transitivity of P, and hence mn is directly equivalent to nq, which is directly equivalent to pq. It follows that if Gb(P) is connected, then I(P) has only one implication class. .' L e m m a 16.4.12 For every relation R C_ A x D with A N D -
1. if Gb(QR) is connected then Gb(R) is connected;
r
we have
458
T h r e s h o l d Graphs and Order R e l a t i o n s
2. if (re, n) and (a,d) are as in Definition 16.3.13, then mn and ad are edges of I(QR) belonging to the same implication class. P r o o f . 1" Let (a, d) and (a', d') be any two vertices of Gb(R). Since they are also vertices of Gb(QR),there exists a path (a, d) -- (?Ttl, rt 1), (m2, rt2),... , (?T/k, ~tk) --
(a', d')
in Gb(Qn). Replacing each (mi, ni) by the associated (ai, di) as in Definition 16.3.13, we obtain a path from (a,d) to (a',d')in Gb(R) by Part 2 of Lemma 16.3.14. 2: Since ( m , n ) i s a vertex of Hb(QR), we have mQnn and Qn has a 2alternating cycle including the pairs (m, n) and (rn', n') of Qn. By the transitivity of Qn we have nQnm. Therefore mn is an edge of I(QR). By Part 3 of Lemma 16.3.14, (a, d) is a vertex of Hb(R), and hence aRd and aQnd. By Part 2 of Lemma 16.3.14, R has a 2-alternating cycle including the pairs (a, d) and (a', d') of R, and hence by Proposition 16.2.9, we have dQna. Therefore ad is an edge of I(Qn). To show that mn and ad are in the same implication class of I(Qn), we consider separately the four cases of Definition 16.3.13. In Case a), ad - mn and there is nothing to prove. In Case b), we have nRd, hence nQnd, and so nd is a nonedge of I(Qn), and a d - md and rnn are directly equivalent. Case c) is similar to Case b). In Case d), we have mQnd by the transitivity of Qn and dQnm by Proposition 16.2.9. Therefore md is an edge of I(Qn). Moreover, am and nd are nonedges of I(Qn) by virtue of a r m and nRd. Hence rnd is directly equivalent to both mn and ad. 9 T h e o r e m 16.4.13 Let R C A x D with A N D - O and dB(R) - 2. Then
R is uniquely representable as an intersection of two biorders contained in R U R R - 1 R if and only if the graph Gb(R) is connected. P r o o f . Notice that by Part 2 of Lemma 16.3.12, R is indeed representable as the intersection of two biorders included in R t_JRR -1R. The only issue is the uniqueness of the representation. " I f " : Let R = B1 N B2, where each Bi is a biorder contained in R U R R -1R. Every vertex (a,d) of Gb(R) belongs to an edge {(a,d), (a',d')} of Gb(R). The biorder B~ must contain one of (a,d) and (a',d'), say (a,d). Then (a, d) C B~ - B2 and (a', d') E B 2 - B~. Thus every vertex of Gb(R) belongs to one of B1 - R and B 2 - R, and no edge meets both of them. In other words,
16.4
459
R e l a t i o n s of B i d i m e n s i o n 2
(B1 - R, B2 - R) is a proper coloring of Gb(R). Since Gb(R) is connected, the coloring is uniquely determined and with it B1 and B2. " O n l y if"" Assume that Gb(R) is not connected. Then by Part 1 of Lemma 16.4.12, Gb(QR) is not connected. Hence Gb(P) is not connected, where P is the poset defined by P - Q n / E and xEy if and only if zQny A yQnx. Hence by Lemma 16.4.11, P has two representations P - L1 N L2 = L i N L~, where Li and L~i are linear orders and L1, L i agree on one implication class of I(P) and disagree on another. It follows that Qn - W1 N W2 = W; N W~, where W~, W[ are weak orders and W~, W~ agree on one implication class of I(QR) and disagree on another. By Part 2 of Lemma 16.4.12, each implication class of I(Qn) has an edge ad with (a, d) e A x D. Therefore by Lemma 16.2.10, Wi N (A x D) and W[N (A x D) define two representations of R, as required. ,, The following theorem exhibits many ways of representing a relation R of bidimension 2 as the intersection of two biorders, under a certain condition. Theorem
16.4.14
Let R C_ A x D, A N D - 0 ,
and assume that R admits
no 3-alternating cycles. Then 1. d . ( n )
-
2. if d , ( R ) <_ 2, then for every proper coloring R U R1 and R U R2 are biorders.
(R1,R2) of Gb(t~), both
P r o o f . 1" It is easy to see that R admits no bare k-alternating cycles for any k >__3. Hence Hb(R) - Gb(R) and the result follows from Theorem 16.3.20. 2: Let B - R U R1. It is enough to show that B is a biorder. If not, then B contains a 2-alternating cycle a, d, a', d' with aBd, a'Bd ~, a B f , a'Bd. There are four cases. (i) If aRd, a'Rd', then (a,d') and (a',d) are adjacent vertices of Gb(R) and hence one of them is in B, a contradiction. (ii) If aRd, a'-Rd', then (a', d')is in R1 and hence is a vertex of Gb(R). Let (a", d") be adjacent to ( a ' , )d ~ . Then a, d, a', d", a", d ~ is a 3-alternating cycle in R, a contradiction. (iii) If aRd, a'Rd', then we argue as in (ii). (iv) If a-Rd, a'-Rd', then both (a, d) and (a', d') are vertices of Gb(R). Let (b, e) and (b', e') be vertices adjacent to (a, d) and (a', d'), respectively. Then b, d, a t, e ~, b', d ~, a, e is a 4-alternating cycle. Hence R admits a 3-alternating cycle, a contradiction. 9
Threshold Graphs and Order Relations
460
16.5
Multiple Semiorders
A special kind of biorders is the relation called semiorder, defined below. D e f i n i t i o n 16.5.1 A binary relation P on a finite set X is said to be a s e m i o r d e r if there exist a function f 9 X ~ 11{ and a nonnegative real number t such that for all x, y E X ,
xPy ~
f ( x ) > f(y)-4-t.
We then say that (f; t) is a c o n s t a n t t h r e s h o l d r e p r e s e n t a t i o n of P. Notice that every semiorder is indeed a biorder, but the converse is not true, as we see in Corollary 16.5.6. The above definition is generalized to multiple semiorders as follows. D e f i n i t i o n 16.5.2 Let 7) = ( P 1 , . . . , Pro) be an m-tuple of binary relations on the same finite set X . A c o n s t a n t t h r e s h o l d r e p r e s e n t a t i o n for 7) consists of a real-valued function f on X and real numbers t l , . . . , tm such that for all j = 1 , . . . , m and x , y C X ,
xPjy ~
f ( x ) > f ( y ) + tj.
(16.8)
We denote this representation by (f; t l , . . . , tin). When such a mapping f exists, we call P a m u l t i p l e s e m i o r d e r and ( t l , . . . ,tin) its c o n s t a n t t h r e s h old v e c t o r . Clearly, if 7~ is a multiple semiorder, then Pj must be irreflexive if tj >_ 0 and reflexive if tj < 0. In psychology, Pj may capture one level of the preferences that a person expresses among the elements of X, and the existence of a representation of the form (16.8) is a very strong consistency requirement for such preferences. We report in this section Doignon's results [Doi77] characterizing multiple semiorders. For more details on applications of such families of relations in psychological measurement and in the theory of "probabilistic consistency", refer to [Doi77]. We need the following two notations. 1. For a binary relation R, its dual R' is the converse of its complement, i.e., aR'b if and only if bRa. 2. We associate with the m-tuple 7~ - ( P 1 , . . . , P,~) of binary relations on X a digraph G(7 )) - (X, A), where A is the multiset P1 U ... U P,~ U P ; u . . . uP' .
16.5
Multiple Semiorders
461
D e f i n i t i o n 16.5.3 Let P = ( P 1 , . . . , Pro) be an m-tuple of binary relations on X , A c y c l e f r o m 79 is a directed cycle in G(T)). We associate with this ! cycle the numbers pj,pj of arcs that belong to Pj, P~ for each j - 1 , . . . , m, ! and set qj - pj - pj. We assume in the definition of a cycle that pj > 0 for at least one j. A k - c y c l o n e f r o m P is a nonempty union of at most k cycles from 79. ! We define the numbers pj, pj, qj for a cyclone as for a cycle, and say that the cyclone is b a l a n c e d if qj = 0 for each j. We are now ready to characterize semiorders. L e m m a 16.5.4 Let G = ( V , A , w ) be a weighted multiple digraph, where w : A ~ N. The weight of a subset of A is obtained by summing w over it. Then the following two conditions are equivalent:
1. there exists a mapping f : V ~ R such that for all ( x , y ) C A, f ( x ) >_ f ( y ) + w(x, y); 2. no (directed) cycle of G has a strictly positive weight. Clearly, one may replace "cycle" by "simple cycle" in Condition 2. P r o o f . Condition 1 implies Condition 2 by summing the inequalities over the arcs of the cycle. The converse follows from the Farkas L e m m a (see [Sch86].
L e m m a 1 6 . 5 . 5 Let 7) = ( P 1 , . . . , P m ) be an m-tuple of binary relations on X . The m-tuple ( t l , . . . , t m ) of real numbers is a constant threshold vector for 7-9 if and only if each cycle from ~P satisfies
qltl nt-''" -~- qmtm > O. P r o o f . Assume that (f; t l , . . . , t i n ) iS a constant threshold representation for T ~. Since there is only a finite number of strictly positive values f ( x ) - f ( y ) tj, we can find an e > 0 that is a lower bound for all these values. We then have
xPjy ---.. f(x) >_ f(y) + tj + and also
xPjy - .
f(x) >_ f(y) - tj
Threshold Graphs and Order Relations
462
It follows that f and the following weights for G(T') satisfy Condition 1 of Lemma 16.5.4: w(x~ y) -- I tj--tj,-4- e, ifif xPjy xP~y. Therefore every cycle of G has a non-positive weight. Thus m
m
E pj(tj + ~)+ E p}(-tj) < O, j-1
j=l
which implies m
E qjtj > O. j=l
Conversely, since there is only a finite number of simple cycles from 7', we can find an e > 0 such that each cycle satisfies rn
m
E qjtj - e E p j >_ O. j=l
j=l
Using the same weights on G and taking the argument in reverse order, one derives the existence of a mapping f such that (f; t ~ , . . . , tin) is a constant threshold representation for 7'. 9
binary relation P is irreflexive and for all a, b, c, d C X,
Corollary 16.5.6 A
a
semiorder if and only if P is
(aPb A cPd) ~
(aPd V cPb),
(aPb A bPc) ~
(aPd V dPc).
Figure 16.~ shows the configurations forbidden by these conditions. P r o o f . The "Only if" part follows from the definition. To prove the "if" part, we assume that P does not have the configurations of Figure 16.4, and show that the 1-tuple (1) is a constant threshold vector for P. By Lemma 16.5.5, what we need to show is that q > 0 for every simple cycle from P. We show this by induction on the length of the cycle. The statement is true for cycles of length 1, 2 or 3 since the configurations G1, G2 and G3 of Figure 16.4 are forbidden. Let C be a simple cycle of length >_ 4 with q _< 0, if that were possible. If all arcs of C are in P, then we must have G3 or G2, a
16.5
Multiple Semiorders
463
Figure 16.4" The forbidden configurations for a semiorder.
G1
G2
G3
G4
G5
contradiction. Hence C has arcs in P'. Assume that C has two consecutive arcs in P. Then it has consecutive vertices a, b,c, d with aPbPcP'd, and hence aPd holds since Gs is forbidden. We can use the arc (a, d) to shortcut C and obtain a shorter cycle with the same q _< 0, contradicting the induction hypothesis. The only remaining possibility is that C has no consecutive arcs in P, and since q _< 0, its arcs actually alternate between P and P' and q = 0. Consider consecutive vertices a, b, c, d with aPbP'cPd. Then aPd holds since G4 is forbidden, and we can use the arc (a, d) to shortcut C and obtain a shorter cycle with q = 0, again contradicting the induction hypothesis. 9 The following theorem characterizes multiple semiorders. T h e o r e m 16.5.7 Let T' - ( P 1 , . . . , P r o ) be an m-tuple of binary relations on X , with m > 1. There is a constant threshold representation for ~P ( P 1 , . . . , Pro) if and only if no m-cyclone from 7:) is balanced. P r o o f . " O n l y if"" Assume that P admits a constant threshold representation ( f ; t l , . . . , t m ) . Then
xpjy ~
f ( x ) - f(y) > tj,
xpjy ~
f ( x ) - f(y) >_ -tj.
Threshold Graphs and Order Relations
464
If we consider any k-cyclone, write these implications for all its arcs and sum the resulting inequalities, we obtain m
m
m
o > E pJJ + E p}(-tJ)- E(pJ- p})tj. j=l
j= l
j=l
Moreover, the inequality is strict since at least one arc from some Pj is used by the cyclone. This clearly implies that pj r p} for at least one j. Hence the cyclone is not balanced. "If"" Assume that no cyclone from P is balanced. Observe that each Pj is either reflexive or irreflexive (otherwise we construct a balanced 2-cyclone by taking one loop in Pj and another one in P~). Consider first the case m - 1. If P1 is irreflexive, we show that the 1-tuple (1) is a constant threshold vector for P1. By Lemma 16.5.5, it is enough to show that q > 0 for each cycle. If C were a cycle with q _< 0, we could add Iq[ loops from P~ to obtain a balanced 1-cyclone, a contradiction. Similarly, If P1 is reflexive, then ( - 1 ) is a constant threshold vector for P1. Now assume that m >_ 2. Since there is only a finite number of values f ( x ) - f(y), we may always look for a nonzero threshold tl, and by an appropriate change of scale, even assume that tl - +1. We treat the case that P1 is irreflexive, setting tl - 1 (the other case is similar). By Lemma 16.5.5, we have to show the existence of a common solution ( t 2 , . . . ,try) to all the inequalities
q2t2 + ' " + qmtm > --ql associated with simple cycles from P. By Helly's Theorem (see [Chv83, p. 266]) applied to the convex sets defined by these inequalities in the Euclidean space of all ( m - 1)-tuples (t2, t 3 , . . . , tin), it is sufficient to show that every m of these inequalities have a common solution, say
qi2t2 + " " + qimtm > -qil
(16.9)
with i - 1 , . . . , m. By the Farkas Lemma, this is equivalent to the following assertion" given real numbers 11,..., lm with li >_ 0 for each i, and li > 0 for at least one i, m
-
i=1
0
j -
2,...,
(16.10)
16.5
Multiple Semiorders
465
implies m
liqil
> 0.
(16.11)
i=1 !
Since qij -- Pij - - P i j is an integer, we only have to verify the assertion for rational numbers l~ (because the real tuples ( / 1 , . . . , lm) satisfying l~ >_ 0 and (16.10) form a polyhedron with rational extreme points and directions). It follows that we need only consider li's that are natural numbers. Now each of the equations in (16.9), for fixed i, comes from a cycle Ci from 7). Assuming that li is a natural number, we consider the cycle C[ obtained by traversing the cycle Ci li times, and then the union U of these C~. Then U is an m-cyclone that uses ~i~__1lip}j arcs from P~ and ~i~=1 lipij arcs from Pj. Equation (16.10) tells us that for j - 2 , . . . , m , these two quantities are equal. Since by assumption U is not balanced, we deduce m
liqil 7~ O. i=1
In order to establish (16.11), and thus complete the proof, it remains to show that (16.10) together with m
liqil < 0
(16.12)
i=1
lead to a contradiction. If (16.12) were true, we would of course have one of the qil strictly negative (because all li are nonnegative), and thus the mcyclone U would use at least one arc (x,y) from P1. Now we form a new m-cyclone U' by adding m
I ~ liqil I i=1
times the arc (x, x) to U. Since P~ is irreflexive, (x, x ) i s in P~, so the new arcs increase the left-hand side of (16.12) to zero. Thus U' is a balanced m-cyclone, a contradiction. 9 Let us make the following remark. The proof above used only a restricted version of Helly's Theorem, namely the convex sets were open half spaces in I~ m-1 (a similar result for closed half spaces can be found in [Chv83, p. 146]). This restricted version follows easily from the Farkas L e m m a as follows. Assume that A x > b is unsolvable, where A has m - 1 columns. Then Am > tb, t > 0 is also unsolvable. Hence by the Farkas L e m m a there exist y > O, Yo > O, (y, yo) r (0, 0), satisfying y T A -- O , - - y r b + Yo -- O, and,
466
moreover, we m a y find such (y, eliminating yo, we are left with c o m p o n e n t s and satisfying y r A most m inequalities among Ax
Threshold Graphs and Order Relations
Y0) with at most m positive components. By a non-zero y >_ 0 having at most rn positive -- 0, yTb >_ O. Therefore a subsystem of at > b is unsolvable.
Chapter 17 Enumeration 17.1
Introduction
In this chapter we look at enumeration results of some families of graphs. For convenience we assume that all our graphs have the vertex set N = {0,...,n1}. Recall that two graphs G = (N,E) and H = (N,F) are the same unlabeled graph when they are isomorphic, i.e., when there is a permutation 7r of N such that ij C E if and only if ~r(i)Tr(j) e F. We say that G and H are the same labeled graph when E = F. Many enumeration results are expressed in terms of ordinary and exponential generating functions. The ordinary generating function (ogf) of a sequence a0, al, a 2 , . . . is ~ > 0 a~ x~ and its exponential generating function (egf) is ~ > 0 anxn/n!" The elementary properties of these functions are discussed in most introductory combinatorics books. In this chapter we have occasion to use the Burnside Lemma and other basic enumeration results, which can be found in the same books. We have already seen in Section 13.4 and 13.5 that decomposition techniques can be used to find the egf of the number of unlabeled box-threshold, matroidal and matrogenic graphs. See also Section 12.4 for the egf of the number of unlabeled domishold and hereditary pseudodomishold graphs. In Section 17.2 we discuss enumeration of threshold graphs, both unlabeled and labeled. It turns out that the enumeration of unlabeled threshold graphs can be used to derive the q-binomial theorem, and the enumeration of labeled threshold graphs can be used to derive a theorem of Frobenius connecting the Eulerian polynomial with Stirling numbers of the second kind. In 467
468
Enumeration
Section 17.3 we enumerate difference graphs, both unlabeled and labeled. Recall that difference graphs are bipartite. We refer to a bipartite graph G = (N, E) together with a fixed partition of N into two stable sets as bipartitioned. Section 17.3 discusses labeled and unlabeled difference graphs, either bipartitioned or not.
17.2
E n u m e r a t i o n of Threshold Graphs
We begin with the enumeration of unlabeled threshold graphs, based on Peled [Pel80]. Denote by r,~mk the number of unlabeled threshold graphs having n vertices, m edges, and m a x i m u m clique size k, and consider the generating function
Tn(x, q) - ~ 7"nmkqmxk. m,k We evaluate theorem. Lemma
T~(x, q) in two ways, and compare them to obtain the q-binomial
17.2.1
Tn(x, q) = x(1 + qx)(1 + q2x)... (1
+
qn-lx).
(17.1)
P r o o f . For each binary vector u = ( u 0 , . . . , Itn-1) ~ {0, 1}" with u0 = 1, we construct a graph G(u) - ( N , E ) on the vertex set N - { 0 , . . . , n 1} where E is such that for all i < j we have ij E E if and only if uj = 1. By Condition 4 of Theorem 1.2.4, G(u) is a threshold graph for each u, and every threshold graph can be obtained in this way. Moreover, G(u) is isomorphic to G(v) if and only if u - v. Indeed, the "if" part is obvious. Conversely, assume that u r v yet G(u) is isomorphic to G(v), and let j be the largest subscript such that uj --fi vj. Then G(u') is isomorphic to G(v'), where u ' = ( u 0 , . . . , uj) and v ' = ( v 0 , . . . , vj), since removing an isolated or a dominating vertex does not affect isomorphism. But this is impossible, since one of G(u') and G(v') has an isolated vertex and the other one does not. From this we already see that the number of unlabeled threshold graphs on n vertices is 2 "-1. The number of edges of G(u) is ~2j=0 n-1 jUj. Further, the set K - {j 9 uj 1} is a m a x i m u m clique of G(u). Indeed, K is clearly a clique containing 0, and consider any other clique K ~ % K. Then K ~ contains some element i > 0
17.2
E n u m e r a t i o n of T h r e s h o l d Graphs
469
with ui = 0, and so i is adjacent only to elements j C K such that i < j, i.e., to fewer than IKI elements. Hence IK'I _< IKI. We conclude that the unlabeled graphs enumerated by Tnmk are in oneto-one correspondence with the binary sequences u such that n-1
u0-1,
n-1
m-Eju
j,
k-Eu
j =o
j,
j =o
and (17.1) follows. 9 We remark that by putting q = i in (17.1) and extracting the coefficient of x k, we find that the number of unlabeled threshold graphs having n vertices n--1 and maximum clique size k is ~m r~,~k - (k-l)" This result can also be obtained by counting symmetric corrected Ferrers diagrams having n rows and corrected Durfee number k (Definition 3.1.6). The diagram is determined by the sequence of its first k row sums, which are non-increasing, do not exceed n - 1, and the last of them is equal to k - 1. The number of such [ n-1 \ sequences is [k-l), as can be seen by standard techniques. The next lemma makes use of the Gaussian polynomials [n.]_
[3J
(q)~
,
where(q)n-(1-q)(1-q2).-.(1-qn).
(q)j(q)n-j
L e m m a 17.2.2 T~(x,q) -
.
J
1
"
P r o o f . If G is a split graph having a split partition (K, S) with K a clique and S stable, and if K is a maximal clique, then K is in fact a maximum clique, since no vertex of S can be adjacent to all the vertices of K. If in addition G is a threshold graph, then by Condition 3 of Theorem 1.2.4, G is determined up to isomorphism by n, IK[, and the degrees of the vertices of S. Hence the unlabeled threshold graphs enumerated by rnmk are determined by the partitions of the integer m - (k2) (the number of edges outside IKI)into at most n - k positive parts (the positive degrees in S) not larger than k - 1. It is well-known [And76, p. 33] that the ogf for the number of partitions of integers into at most A positive integers not larger than B is [A+B]. Therefore rn~nk is the coefficient of qm-(~) in In-l], k-1 which is equal to the coefficient of nl q m x k in t h e s u m ~ j =
[ j-1 n-l] q (~)xj 9
This proves 17 92 9
"
Enumeration
470
By comparing (17.1) with (17.2), changing the index of summation and increasing n by 1, we obtain the following. C o r o l l a r y 17.2.3 (The q - B i n o m i a l T h e o r e m )
(1 + x)(1 +
qz)...
(1 +
q~-ax) - j~o
q(~)xJ"
(17.3)
Identity (17.3) goes back to Cauchy [Cau93] and probably to Euler. Many important identities are easily derivable from (17.3) and vice versa. For example, by letting n --+ cx~, we can obtain the following formal-power-series identity of Euler" (1 - x)(1
- qx)(1
-
q2x) . . . .
q('~)(-x)J
j~0 (1 - q)(1 - q~ :- (1 -
qJ)"
(17.4)
From (17.4), again using (17.3), we obtain the companion identity of Euler:
1 (1 - x)(1
- qx)(1
oo -
q2x)...
xj
= j~0 (1 - q)(1 - q2)...
(1 -
qi)"
(17.5)
From (17.4) and (17.5) we can get, again using (17.3), the following identity of Heine: (1 - ax)(1 - qax)(1 - q 2 a x ) . . . = ~-,~ (1 - a)(i - qa~_2..!l_. - qJ-la)x j (1-x)(1-q/)(1-q2x)... ~o ( 1 - q ) ( 1 - u --). ( 1 - q J ) (17.6) Andrews [And76] derives many series-product identities from (17.6), including the q-binomial theorem itself. Knuth [Knu71] discusses an interesting connection between the fact that [~] is the number of k-dimensional subspaces of GF(q) ~ and the fact that it is the egf for the number of partitions of integers into at most k parts not exceeding n - k. The connection is via matrices in row-echelon form, whose shape can be interpreted as a threshold graph. We now present the work of Beissinger and Peled [BP87] on enumerating labeled threshold graphs and the identity of Frobenius. Let tnjk denote the number of labeled threshold graphs with n vertices, j isolated vertices, and exactly k distinct vertex-degrees. For convenience we set tojk = ~jo~ko,
(17.7)
17.2
E n u m e r a t i o n of T h r e s h o l d G r a p h s
471
where ~ is the Kronecker symbol. We denote by
tn - ~ tnjk
(17.8)
j,k
the total number of labeled threshold graphs on n vertices. We determine the generating function n
F(x,y,z)- ~ t~jk~.yJz k.
(17.9)
n,j,k
Theorem
17.2.4
The generatingfunction defined by (17.9) is given by 1/z+e~Y-1 F(x,y,z)- (1 - xz)1/z - e~ + 1" (17.10)
P r o o f . It is clear that for n >_ 2 one has t~jk - 0 unless 0 _< j _< n and 1 _< k <_ n - 1 (k cannot equal n, because at least two degrees must be equal, as the graph cannot have both isolated and dominating vertices). We list below some other properties of tnjk.
tnjk--(~)tn-j,O,k-1 forj>_l
(17.11)
since any number of isolated vertices can be added to or removed from a threshold graph without affecting its thresholdness, as follows from Condition 4 of Theorem 1.2.4.
tnok- ~tnjk
for n >__2
(17.12)
j>__l
because, by Theorem 1.2.4, the complement of a threshold graph with n >_ 2 vertices, no isolated vertices, and k distinct vertex-degrees is a threshold graph with n vertices, one or more isolated vertices, and k distinct vertexdegrees. Equations (17.11) and (17.12) can be combined to obtain the recurrence
The boundary conditions (17.14) and (17.15) below apply to all classes of graphs, not just to threshold graphs. t~,~_,,k - 0
(17.14)
472
Enumeration
tnnk -- 5kl
(17.15)
for n > 1.
As an aid in determining F(x, y, z), consider the generating function
XnZk
yj(x, z) - E E t~j~ ~!
(17.16)
n>0 k>0
Then r 0 ( x , z) Xn
E E t~o~-fzk n)>0 k > 0
Xn
= 1 + o + E E t~o~., Z k
by (17.7),(17.14)
n>2 k>0
Xn
= 1+ E E Et~J~-~z k
by (17.12)
n>_2k>_Oj>_l
X~zk
= 1 + ~ ~ ~ ~njk n! j>_l n>_2 kkO
= 1 + ~-~ ( F j ( x ' z ) - O>_k~ t ~
k>_O ~-'~tljkxzk
-- l-Jr-j~>l ( F j ( x ' z ) - - E ~ j Ok>_Oe ~ k o Z k - -
by (17.16)
k>_O
by (17.7),(17.14),(17.15). Thus
Fo(x, z)
-
~
j>l
Fj(x, z)+ 1 - xz.
(17.17)
It follows from (17.11) and (17.16)that
xj Fj(x, z) - z~Fo(x, z) for j _> 1.
(17.18)
By summing (17.18) for j > 1 and using (17.17), we obtain
Fo(x,z)- 1 + xz - z(e ~ - 1)F0(x,z) and therefore F 0 ( x , ~) -
1-xz 1 - ( e ~ - 1)z
x-l/z e~ - (1 + l/z)"
(17.19)
17.2
E n u m e r a t i o n of T h r e s h o l d Graphs
473
By (17.18) we have
F(x,y,z)-
~ Fj(x,z)y j - Fo(x,z)(1 + z(e ~ y - 1)) j>o
and (17.10) follows. 9 To expand functions with denominators like that of (17.10), we use the Eulerian polynomials An(u), defined as follows (cf. Comtet [Com74] or Riordan [Rio58]): u-
1
U -- e v(u-1)
1
v~
U n>l
n'
= 1 + - ~ An(u)--r,
A o ( u ) - 1.
(17.20)
One combinatorial interpretation of the Eulerian polynomials is that for n _> 1, the coefficient of u m in An(u) is the number of permutations 7rl,..., 7r~ of 1 , . . . , n having m - 1 ascents, that is to say, positions j such that 7rj < 71"j+ 1 [GKP89, Equation (7.56)]. By substituting u - 2 in (17.20), we obtain 1
Xn
-
2
~
(17.21)
gn
n>O
where gn - A~(2)/2 for n >_ 1 and go - 1. The well-known numbers g~ were studied by Cayley in the 19th century and several references to them can be found in Knuth [Knu73] and Good [Goo75]. gn is the number of ordered partitions of the set { 0 , . . . , n - 1}, that is to say, the number of ways to partition the set into non-empty blocks and to arrange the blocks in a sequence. Equivalently, g~ is the number of those n-letter words over the alphabet { 1 , 2 , . . . } that for some k contain precisely the letters { 1 , . . . ,k}, repetitions allowed. To see this interpretation of gn, we only have to write 1
2-e ~
=
1
1 - ( e ~ - 1)
=
~-~(eX
-
1) k
k>0
and note that (e ~ - 1)k is the egf for the number of words over the alphabet { 1 , . . . , k} with each letter appearing at least once. Because of this interpretation of g~, we have
g n - ~ kk=0 !
nk '
(17.22)
474
Enumeration
where (~} denotes the Stirling number of the second kind, i.e., the number of partitions of { 0 , . . . , n - 1} into k unordered non-empty blocks. This agrees with the well-known expansion (see Comtet [Com74] or Riordan [Rio58])
1)
E k>0
"
k
"
Knuth [Knu73, Ex. 5.3.1.4] presents the following asymptotic for gn: g--5~-1 ( 1 ) nl9 -- 2(ln2)n+ 1 + k>, ~ Re (ln2 + 27rik) ~+1
n > - 1"
(17.23)
It is not hard to use (17.23) to obtain that
1
(1)
We can now enumerate the labeled threshold graphs. T h e o r e m 1'/'.2.5 The number of labeled threshold graphs on n vertices is given by 1, if n - 0,1 t~ 2(g~ - - ngn-1), if n _> 2. (17.24) P r o o f . According to (17.9) and (17.8), F(x, 1, 1) = E~>0 tnxn/n!" evaluate F(x, 1, 1)using (17.10), we obtain (1 - x)e ~ (2 2-e ~ -(l-x)2-e
) ~
1
If we
x~
-l-at-x-~-2E(gn-ngn_l)----(, n>2
~"
and the result follows. .. We now see a combinatorial argument that gives another proof of Theorem 17.2.5, as well as of the theorem of Frobenius. We denote by Tnk the set of labeled threshold graphs with the vertices { 0 , . . . , n - 1}, no isolated vertices, and exactly k distinct vertex-degrees, so that t~0k = IT~kl.
(17.25)
We also denote by Dnk the set of ordered partitions ( B 1 , . . . , Bk) of { 0 , . . . , n 1} into non-empty blocks B~ such that IB~] >_ 2. It is easy to see that
,D~k, - k ' { nk} - n(k - 1)'{k " - 1 1} "
(17.26)
17.2
475
E n u m e r a t i o n of Threshold Graphs
L e m m a 17.2.6 There exists a bijection between Dnk and Tnk. P r o o f . Both sets are empty if n - 1, so we may assume that n > 2. Given a partition d - ( B 1 , . . . , Bk) E Dnk, we construct a labeled graph G on the vertices 0 , . . . , n - 1 by joining each vertex of Bi to all the other vertices of B1 U - . . U Bi if i + k is odd, and to none of them if i -+- k is even. Then G is a threshold graph by Condition 4 of Theorem 1.2.4, and it has no isolated vertices, since the vertices of Bk are dominating. We show that G has exactly k distinct vertex-degrees by showing that two vertices v C Bi and w C Bj have the same degree if and only if i - j. The "if" part is obvious. Conversely, assume that i < j. If i + j is even, then i -t- 1 < j and every vertex of Bi+l is adjacent to exactly one of v and w, hence v and w have different degrees. If k + i is even and k + j is odd, then v has some neighbor in B1U---UB~ (because IB~I > 2), whereas w has no such neighbor; therefore v and w again have different degrees. A similar argument shows the same conclusion if k -4- 1 is odd and k -4-j is even. Therefore G C Tnk. Given G C Tnk, we construct an ordered partition d as follows. Let G1 - G. If Gi has been constructed as a threshold graph with two or more vertices, then it has either isolated vertices or dominating vertices, but not both, and we remove all these vertices to obtain Gi+l. By an argument similar to the one in the previous paragraph, we can show that two vertices of G have the same degree if and only if they are removed at the same time. Since G has exactly k distinct vertex-degrees, the last non-empty graph is Gk, and it has at least two vertices. We put the vertices of Gi - Gi+~ into the block Bk+~-i for i -- 1 , . . . , k and obtain an ordered partition d - ( B 1 , . . . , Bk) C Dnk. It is easy to see that the two mappings defined above between Dnk and Tnk a r e inverses of each other, and the proof is complete. 9 The second proof of Theorem 17.2.5 can be seen as follows. From (17.25), (17.26) and Lemma 17.2.6, we obtain " k
"
1} 1
(17.27)
for n >_ 1, and this equation also holds for n - 0 by our convention that took - ~k0. If we sum (17.27) over k, the left-hand side becomes t~/2 for n >_ 2 by (17.12), the right-hand side becomes g n - ng~_~ by (17.22), and (17.24) results. The reason we presented the first proof of Theorem 17.2.5 is that it enables us to prove the theorem of Frobenius [Frol0] (see also Comtet [Com74]),
IV
0
~.
I
....
I
._
~ ~,
~
I
I
~
~
IV
I
I
I
I
I--t,
~
~
I ~
oc--F-'
0
~
"~
i,~
~
~
9
~ ~
~
,~ o
o
~
I
CD
0
~
~.~
t'~
IV ~
I
9
~
.-
I
~
~
I
'ov
o
~
I I
;._,
o
~ ~
I
"--,.1
-~
0
~
O
c--c-
0
I
"
O0
-q
9
II
'--'
~1~
+
II
I
~ I
I
I
II
I
c~
I
~-~
I
o~
9
II
I
II
~
~
~
:~
~ 9
~ 9
~o~
IV
~
'ov
o ~ "~
i.-~~
~
0
~
~
o-'
~'~
0
~-
~
~
~
~
l:r'
0
eo
~
O~ ~
I
~
~
~. .
to
~
~
0 ~ o0
0~
0
""
~<
~'0~
l~-~
~
i.,J~
=
17.3
Enumeration of Difference Graphs
17.3
477
E n u m e r a t i o n of Difference Graphs
This section is based on Peled and Sun [PS94a]. We begin our discussion with enumerating labeled difference graphs, and express the results in terms of the numbers gn defined in (17.21) or (17.22). 17.3.1 Let dn be the number of labeled bipartitioned difference graphs on n vertices. Then
Theorem
ifn-O 2gn, i f n > _ l .
d n _ _ { 1,
P r o o f . By Theorem 2.4.4, dn is equal to the number of ordered partitions of { 0 , . . . , n - 1 } of the form (X0, X 1 , . . . , Xk, Yk,..., Y1, Y0), where only the blocks Xo and Y0 may be empty. We define a mapping f from the set of all such partitions P into the set of ordered partitions of { 0 , . . . , n - 1 } with nonempty blocks. We obtain f ( P ) by removing the empty blocks of P, if any. Then for n >_ 1, f is precisely two-to-one. To see this, let Q - ( B ~ , . . . , Bk) be an ordered partition with non-empty blocks. If k is even, then
f - l ( Q ) _ {@,(~,B1,...,Bk,~)}, and if k is odd, then
f - l ( Q ) _ {(O, B1,...,Bk),(B1,...,Bk, O)}. The same result can also be obtained by writing the egf for the d,. The egf for the number of ordered partitions of { 0 , . . . , n - 1 } into 2 k + 2 blocks, where only the first and last blocks may be empty, is e~(e ~ - 1)2ke ~. Therefore the egf for the d, is
k>0
e2~(e ~ - 1)2k _ e2~ e~ 2 - 1-(e ~-1) 2 = 2-e ~ = 2-e ~
1,
so d 0 - 2 9 0 - 1 - 1 anddn-2gnforn>_ 1. 9 One can introduce other parameters into the the generating function. For example, suppose that we have a set of p + q elements and want to construct an ordered partition the first p elements into k + 1 ordered blocks where only the first block may be empty, and an ordered partition of the last q elements into k + 1 blocks where only the last block may be empty. The number of
478
Enumeration
xP xq
possible ways to do this is the coefficient of ~ 7
in e~(e ~ - 1)k(e y - 1)ke y.
9
The coefficmnt of (p+q),, namely times the previous coefficient, is the number of ordered partitions of p + q distinct elements into 2k + 2 blocks, where only the first and last blocks may be empty. By summing over all k > 0 we find that
ex+Y
dpq xPYq
(p + q)!
1 -(e
~ -
1)(ey -
1)'
where dpq is the number of labeled bipartitioned difference graphs with color classes of cardinality p and q. By manipulating the egf for the dn we can derive identities involving Stirling numbers of the second kind. For example, using the fact that e = ( e ~ 1)k= d (e ~ - 1) k + l dx k + l
_
1 d x~~-,-d{ +1)1{ r k + 1 dx ~>0 , . ( k " k+l
}
-
"
k + l
'
we find
xs
1 + E ~2Ej! s>_l
" j_>0
{;} -
E k>0
([e~( e ~ - 1)]k) ~ - E k_>0
~.k!
{r + k -~
and therefore 2
j>0 J!
{ ~ } _ ~ > 0 ( : ) k ~ > ok?2 { r + l } { s - r + l } k+ 1 k+ 1 _ _
T h e o r e m 17.3.2
s>l.
The number of labeled difference graphs on n vertices is
(l+gn)/2. Proof. By Theorem 2.4.4 every difference graph consists of zero or more isolated vertices and a connected difference graph, and conversely. As in Theorem 17.3.1, the egf for the number of labeled non-empty bipartitioned connected difference graphs is ~k>l(e ~ - 1) 2k. Hence the egf for the number of labeled non-empty connected difference graphs is 71 E k ~ l ( ex - 1) 2 k where 1 the factor g comes from exchanging the two color classes. By adding 1 we also include the empty graph, and by then multiplying by e~ we allow for the
17.3
E n u m e r a t i o n of Difference G r a p h s
479
isolated vertices. Thus the egf for the number of labeled difference graphs is given by
(
e~ l + a . y -k>l ~(e~_l)2k 1
= z e~
(1+
) 1(
)
_ 2 e~ 1 + k>0 ~(eX-
1 )l(e~ 1 _ (e~_ 1)2 - ~
-+
1) 2k
1 ) 2_e~
and the number of labeled difference graphs on n vertices is the coefficient of W., namely (1 + gn)/2. " In the rest of this section we consider the enumeration of unlabeled difference graphs. We denote by | the set of unlabeled threshold graphs on n vertices, and by A, the set of unlabeled bipartitioned difference graphs on rz vertices. By (17.1) we have I O n l - 2n-l, as already noticed. We use the following connection between IZX~Iand IO~l. X n
L e m m a 17.3.3 [An[- IOnl + IAn_ll
7/
>_ 1.
Proof. Consider the mapping f 9 An -+ | given by f ( D ) - T, where D - (X,Y; E) C A~ is a bipartitioned difference graph with bipartition (X, Y), T - ( X U Y, E U E x ) , and E x is the edge-set of the complete graph on X. By Theorem 2.1.9 f is onto | but it is not one-to-one. To find f - x ( f ( D ) ) , we note that T and D are determined by their degree partitions according to Theorem 1.2.4 and Theorem 2.4.4. In T, the degree of every vertex of Y/ is [Xk U . . - U Xk-i+x[ and the degree of every vertex of Xi is IYk tO... U Yk-i+x [q-IX0 U . . . LI Xk[- 1. Since Xi and Y/are non-empty for i >_ 1, it follows that the degree partition of T is simply (Y0,..., Yk) unless one of the following conditions holds in D" 1. x 0 - o , IYkl - 1, in which case the degree partition of T is ( Yo , . . . , rk-1,
Yk
I,.,J X l
, X2 , . . . , Xk
);
2. I X 0 [ - 1, in which case the degree partition of T is ( ro , . . . , rk - l , Yk
[,-J X o
, X l , . . . , X k).
It follows that f - l ( f ( D ) ) - {D} unless Condition 1 or 2 holds for D, in which case f - l ( f ( D ) ) - {D,D*}, where D* is obtained from D by moving
480
Enumeration
the singleton Yk to X in Condition 1 and the singleton X0 to Y in Condition 2. Note that if Condition 1 holds for D, Condition 2 holds for D* and conversely. It follows that IOnl - Izx f- Izx'~l, where A" denotes the set of unlabeled bipartitioned difference graphs satisfying Condition 1 or 2. We complete the proof by indicating a bijection from A~ to An-l- It is given by deleting the singleton Yk in Condition 1 and the singleton X0 in Condition 2. The resulting bipartitioned difference graph D' has isolated vertices in X in Condition 1 and does not have them in Condition 2. Therefore we can uniquely reconstruct D from D' by adding a singleton Yk to Y if D 1 has isolated vertices in X and adding a singleton X0 to X if D' has none. This shows that indeed we have a bijection. 9 Theorem
17.3.4
The number of unlabeled bipartitioned difference graphs
on n vertices is 2 n. P r o o f . By Lemma 17.3.3 and the fact that IO~1- 2 n-l, we have [ A n [ - 2 n-1 q- 2 n-2 + " "
q- 20 + [ A o [ - 2n - 1 + 1 - 2 ~.
Another way to see this result is to modify the bijection between | and the set of binary words of length n - 1 into a bijection between A~ and the set of binary words of length n. We omit the details. 9 17.3.5 The number of unlabeled difference graphs on n >_ 1 vertices is 2~-2 + 2[~J -1.
Theorem
P r o o f . Again, according to Theorem 2.4.4, a difference graph consists of zero or more isolated vertices and a connected difference graph. Hence the required number is ~ - - 0 c~, where c~ is the number of unlabeled difference graphs with no isolated vertices on s vertices. According to Theorem 2.4.4, a bipartitioned difference graph with no isolated vertices is determined up to isomorphism by the cardinalities of the blocks X 1 , . . . , Xk and Y1,..., Yk, so the number of unlabeled bipartitioned difference graphs with no isolated vertices on s vertices is equal to the number of compositions of s into an even number of parts, i.e., sequences ( x l , . . . , x k , Y l , . . . , Y k ) of positive integers whose sum is s. For s _> 2, there a r e (;[21) compositions of s into 2k parts, and therefore a total of ~k (~k-~l) - 2s-2 compositions of s into an even number of parts. Since we are counting non-bipartitioned difference graphs
17.3
481
E n u m e r a t i o n of Difference Graphs
with no isolated vertices, Cs equals the number of inequivalent compositions of s into an even number of parts, where the composition ( x l , . . . , xk, yl,. 9 9 yk) is considered equivalent to itself and to ( y l , . . . ,xk, zl,... ,xk). We find c~ by the Burnside Lemma. All 2 ~-2 compositions into an even number of parts are invariant under the identity permutation. A composition into an even number of parts is invariant under the permutation 7r that switches color classes if and only if it has the form (if:l,...,3g.k, X l , . . . , X k ) , and ( x a , . . . , x k ) must then be a composition of s/2. Hence there are (~s even)compositions of s into 2k parts that are invariant under 7r, where the Iversonian (s even) stands for 1 if s is even and for 0 otherwise. By summing over all k >_ 1, we find that there are 2~/2-1(s even) compositions of s into an even number of parts that are invariant under 7r. Hence by the Burnside L e m m a c~ = 89(2 ~-2 + 2~/2-1(s even)) for s >_ 2. Clearly Co = 1 and cl - 0. therefore the number of unlabeled difference graphs on n >_ 2 vertices is given by n
~ - ~ Cs s~O n
1+ 0+ ~
(2 s-3 +
2s/2-2(s
even))
s~-2 n
= 2+ ~
(2 s-3 + 242-2(s even))
s----3
=2+2~-2-1+
(1+2+4+...2[~J
-2)
- 1 + 2 '~-2 + 2[~J -~ - 1 - 2 ~-2 + 2[~J -~. This value is also correct for n - 1.
9
Chapter 18 Extremal Problems 18.1
Introduction
Consider the following problems. How many connected threshold subgraphs can a graph have? What graphs with n vertices and rn edges have the largest number of connected threshold subgraphs? These problems still remain open. Paul ErdSs conjectured that for a fixed number of vertices, the complement of a matching contains the largest number of threshold subgraphs (private communication). Erd6s et al. [EGOZ89] consider the following problems. Given a graph G with n vertices and m edges, what is the largest number of edges that a chordal subgraph of G can have? What about an interval subgraph or a threshold subgraph? We report the results of these authors on interval subgraphs and threshold subgraphs in Section 18.2. Boesch et al. [BBB+90] considered the following problem. Which graphs on n vertices and m edges maximize the sum of squares of the degrees? It turns out that these graphs must be threshold graphs. However, not every threshold graph maximizes the sum of squares of the degrees. Only partial results are known in characterizing these threshold graphs. We report these results in Section 18.3. 483
484
Extremal Problems
18.2
Large Interval and Threshold Subgraphs of Dense Graphs
Given a graph with n vertices and m edges, what is the largest number of edges a chordal subgraph can have? What about an interval subgraph or a threshold subgraph? ErdSs et al. [EGOZ89] studied this problem for m >_ n2/4 + 1. They gave a complete answer for chordal subgraphs, and partial answers for interval and threshold subgraphs. We report their results for interval and threshold subgraphs. All results in this section are from [EGOZ89]. Let G be the class of graphs with n vertices and m edges, and 7 / b e a class of graphs closed under vertex deletion. Then there is a number f such that every member of ~ contains a member of 7-/with at least f edges, and there is a member of G containing no member of 7t with more than f edges. In practice, f may be hard to find, and it may be possible to bound it by finding a lower bound fl (there must be a member of 7-t with at least fl edges) and an upper bound f2 (there need not be a member of 7-t with more than f2 edges). The questions above are only interesting if the graphs contain sufficiently many edges. The complete bipartite graph Kn/2,n/2, for example, has no triangles and thus contains no interval graphs larger than a path ( n - 1 edges) and no threshold graph larger than a star (n/2 edges). We only consider graphs with n vertices and at least n2/4 + 1 edges (sufficient to guarantee the existence of a triangle), and refer to them as dense graphs. We define the size of a graph as the number of edges in the graph. The results in this section can be summarized as follows (all graphs are assumed to be dense graphs)" 9 Every graph has an interval subgraph of size > (1 + c)n. 9 There is a graph with no interval subgraph of size > 3n/2 - 1. 9 Every graph has a threshold subgraph of size > (1 + c)n/2. 9 There is a graph with no threshold subgraph of size > (1 + 0.5)n/2. The two constants c remain to be determined. By the star of a vertex a we mean the graph consisting of all vertices in the closed neighborhood of a, along with the edges joining a to all its
18.2
Large Interval and Threshold Subgraphs of Dense Graphs
485
neighbors. By the star of an edge ab we mean the union of the star of a and the star of b. We call a graph G an edge-star or an e-star if G has an edge ab such that G is the star in G on the edge ab. We need the following Lemmas. L e m m a 18.2.1 Let G be a threshold graph with no K4. Then G has an edge ab (called the r o o t edge) such that every edge of G is either incident to a (the r o o t v e r t e x ) , or is of the form bc for some c such that abc is a triangle of G. Proof. Let a, b be the first two vertices in the non-increasing order of degrees in the threshold graph G. " It is a known principle that if a graph has average degree A, it has a vertex of degree considerably larger than A or almost no vertices of degree much below A. The next lemma makes this more formal. L e m m a 18.2.2 For every 1 > e > 0 there is a d > 0 (depending only on e) such that every graph with n vertices and average degree A has a vertex of degree exceeding (1 + d)A or fewer than en vertices of degree at most (1 - e)A. Proof. Choose d < e2/(1 - e ) . Suppose the conclusion is false. Then the en smallest degrees do not exceed ( 1 - e)A each, for a total not exceeding e ( 1 - e)An, and the remaining ( 1 - e)n degrees do not exceed (1 + d)A each, for a total not exceeding (1 - e ) ( 1 + d)An. Thus the grand total degree for the whole graph is at most (1 + d - e 2 - ed)An < An, contradicting the fact that the total degree is An. 9 Another commonly-used fact is that in the neighborhood of the largestdegree vertex there must be a vertex of "not too small" degree. The next lemma states this more formally. L e m m a 18.2.3 Let G have average degree exceeding n/2. Let the largestdegree vertex of G have degree (1 + c)n/2. Then in its neighborhood there must be a vertex of degree exceeding
1-c+
2c 2 ) n i + c 2"
Proof. If not, then each of the (1 + c)n/2 vertices in the neighborhood has degree not exceeding that, while each of the (1 - c ) n / 2 vertices not in that
Extremal Problems
486
neighborhood has degree not exceeding (1 + c)n/2. Again, the total degree of all the vertices is no more than n2/2, a contradiction. .. Yet another general result is that if not too many vertices of small degree are deleted from a dense graph, the resulting graph is still dense. The next l e m m a formalizes this. L e m m a 18.2.4 Let 1 > e > O. If G is a dense graph on n vertices, and at most en vertices of degree at most ( 1 - e ) n / 2 are deleted from G, the resulting graph is still dense. P r o o f . The number of deleted vertices is k < en and the total number of edges deleted is at most k(1 - e ) n / 2 . The number of remaining edges is therefore at least
~ -~-+ 1 - k(1-
n
( ~ - k) ~
e)~ -
4
k(2~+ 1+
4
k) > ( ~ - k) ~ -
4
+ 1.
L e m m a 18.2.5 ([Edw]) If G has n vertices and at least n2/4 + 1 edges, then G has an edge that is on at least n/6 triangles. T h e o r e m 18.2.6 There is a constant c > 0 such that for sufficiently large n, every dense graph on n vertices has an interval subgraph with at least (1 + c)n edges. P r o o f . Let e - 0.1 and d - 0.01. If there is a vertex with at least (1 + d ) n / 2 neighbors, then the largest-degree vertex a has degree (1 + f ) n / 2 , where d _< f < 1. Then by Lemma 18.2.3, a has a neighbor b with degree exceeding (1 - f + 2_]_!_~ ~ The e-star on edge ab is an interval graph with more than l+fJ~" d~ < -l+f ~ this (1 + -l +~f ) n 1 edges. For sufficiently large n ~ and for c < V -e-star has at least (1 + c)n edges. Otherwise, by L e m m a 18.2.2, there are e2 fewer than en vertices of degree at most (1 - e)n/2 (because d < i-~-~, as required in the proof of L e m m a 18.2.2). If all these vertices are deleted, the resulting graph G ~ is still dense by Lemma 18.2.4. By L e m m a 18.2.5, G' has an edge ab lying on at least ( n - en)/6 - 0.15n triangles. Let abc be one of these triangles. The set of edges consisting of these triangles, the star on a, and the star on c form a graph H with at least n(0.45 + 0.45 + 0.15) - 2 edges. This is at least (1 + c)n for sufficiently large n and c < 0.05. Further, it is easy to construct an interval model for H. 9
18.2
Large Interval and Threshold Subgraphs of Dense Graphs
487
T h e o r e m 18.2.7 There is a constant c > 0 such that every dense graph on n vertices has a threshold subgraph with at least (1 + c)n/2 edges. P r o o f . Let 0 < e < 1/4 and 0 < d < e2/(1 - e) be two constants. If there is a vertex a of degree at least (1 + d)n/2, then the star on a is a threshold graph with at least (1 + c)n/2) edges for each c, 0 < c _< d. Otherwise, by Lemma 18.2.2, the number of vertices of degree at most (1 - e)n/2 is k < en. Delete all these vertices to obtain G ~. By Lemma 18.2.4, G ~ is dense. Hence, by Theorem 18.2.5, G' has an edge ab lying on at least ( n - k)/6 triangles. The union of these triangles and the star on a is a threshold graph whose number of edges is at least
n ~(1-r provided c _< ( 1 -
n-k 6
n >~(1-r
n-en 6
2 = 5 ~(1 - r
n ->(l+c)g'
4e)/3.
F a c t 18.2.8 There is a dense graph on n vertices whose largest interval subgraph has exactly (3/2)n - 1 edges. P r o o f . Consider the dense graph G obtained by adding an edge ab to the complete bipartite graph Kn/2,n/2. Let H be any interval subgraph of G. Delete one vertex from H, making sure it is a or b if H contains one of them. The resulting induced subgraph of H is still an interval subgraph of a bipartite graph on n - 1 vertices, and hence is a forest and has at most n - 2 edges. Adding back the star on the deleted vertex adds at most (n/2) + 1 edges, showing that H has a total of at most (3/2)n - 1 edges. On the other hand, let abc be any triangle in G. It is easy to see that the union of the stars of a, b and c is an interval graph with exactly (3/2)n - 1 edges. .. F a c t 18.2.9 For n sufficiently large and any fixed e > O, there is a dense graph on n vertices having no threshold subgraph with at least (1.5 + e)n/2 edges. (Hence the c in Theorem 18.2.7 cannot exceed 1/2.) P r o o f . Let A and B be vertex sets of size (1 + c)n/2 and ( 1 - c)n/2 respectively and add all ( 1 - c 2 ) n 2 / 4 edges from A to B, where c = 1/3. Now divide A into two equal parts A1 and A2 and add (cn)2/4 + 1 edges between those two parts, distributed as regularly as possible. The degree of a vertex in B is simply (1 + c)n/2, while each vertex in A1 has (1 - c)n/2 edges leading to
488
Extremal Problems
B and at most just over ((cn)2/4)/((1 + c)n/4) = nc2/(1 + c) edges leading to A2; so no star can be a big enough threshold graph. Consider a threshold subgraph containing a triangle. The graph is tripartite so has no K4; hence by Lemma 18.2.1 it has a root vertex and a root edge. We distinguish three cases: (i) root edge from A1 to A2, root vertex in either set; (ii) root edge from B to A1, root vertex in B; (iii) root edge from B to A1, root vertex in A1. All other cases are equivalent to these. (i) The root edge is from A1 to A2 and lies on at most ( 1 - c)n/2 triangles (the other vertex of the triangle must be in B); the root vertex has in addition about nc2/(1 +c) edges from A1 to A2. The total size of this threshold graph is about (1 - c)n + nc2/(1 + c), which equals (1.5)n/2 (since c = 1/3). (ii) The root edge joins B to A1. It lies on about c2n/(1 + c) triangles, and the degree of the vertex at B is at most (1 + c)n/2, of which c2n/(1 + c) edges have already been counted. The total size of this graph is thus about (1 + c)n/2 + c2n/(1 + c), which again equals (1.5)(n/2). (iii) The root edge again joins A1 to B, but we consider also the edges from the vertex in A1 to B, of which there are (1 - c)n/2. The total size of the threshold graph is about 2nc2/(1 + c) + (1 - c)n/2 = n/2. ..
18.3
M a x i m i z i n g the S u m of Squares of Degrees
Recall that a graph having n vertices and e edges is called an (n, e)-graph. In this section we consider the following problem. Given n and e, which (n, e)graphs have the largest sum of squares of the degrees? We refer to these graphs as a-optimal. Boesch et al. [BBB+90] consider this problem and show that these graphs must be threshold. However, not every threshold graph is a-optimal. For every valid choice of n and e, the authors define two threshold (n, e)graphs, which always exist and are unique, and prove that at least one of them is a-optimal. This enables us to compute the optimal value for any valid choice of n and e. We give examples showing that not both need be a-optimal, as well as a-optimal graphs that are not of this form. This leaves open the problem of characterizing the threshold graphs that are ~r-optimal. In this section we report the results of [BBB+90]. If r is a function from graphs to integers, then a graph G is called r
18.3
M a x i m i z i n g t h e S u m of Squares of Degrees
489
optimal if r >_ r for all graphs G' with the same number of vertices and edges as G. One such function of interest here is a(G) - ~ n d~, where ( d l , . . . , dn) is the degree sequence of G. Throughout this section we assume that n and e denote, respectively, the number of vertices and edges of a graph. Thus 0 <_e _< (2). As usual, Ki, Sj and Kl,k denote the complete graph on i vertices, the edgeless graph on j vertices and a star on k + 1 vertices, respectively. Lemma
18.3.1 Every a-optimal graph is a threshold graph.
P r o o f . If G is a graph with vertices a, b, c such that ac is an edge, bc is a nonedge and deg(b) > deg(a), consider the graph G' obtained from G by replacing edge ac with bc. It is easy to see that a(G') > a(G). Thus if a graph G is a-optimal, then for every two vertices a, b, deg(a) >_ deg(b) if and only if N[a] D_ N(b). Therefore G is a threshold graph by Condition 5 of Theorem 1.2.4. 9 Lemma
18.3.2 A graph G is a-optimal if and only if its complement G is
a-optimal. P r o o f . The result is immediate, since a(G) - ~"~in__l[(rt -- 1) - d~]2 or(G), where k(n, e)is a constant depending only on n and e. Lemma
18.3.3 Let G -
+
K1 0 H be an (n, e)-graph. Then
1. If G is a-optimal, then H is a-optimal. 2. Conversely, if H is a-optimal and if there is a connected a-optimal (n, e)-graph, then G is a-optimal. P r o o f . Part 1 follows from the fact that a(IQ | H) = k(n, e)+ a(H), where k is a constant depending only on n and e. To prove Part 2, let G t be a connected a-optimal graph. Then G ~ is a threshold graph of the form K1 | H', and both H and H' are ( n - 1, e - n + 1)-graphs. By part 1, H' is ~r-optimal, hence a(H) = a(H'), a(G) = cr(G'), and G is a-optimal. 9 D e f i n i t i o n 18.3.4 For fixed n and e, G1 and G2 are the following threshold
(n, e)-graphs (Figure 18.1)" (~l(p, q, r) --
I~p (~ ( ~q [,_JKl,r),
490
Extremal Problems
where n - p + q + r + l, e - ( ~ ) + p ( q + r + l ) + r ,
G2(p, q, r) - Sp I.J (I(q (]~ KI,~),
Figure 18.1: The (7, 6)-graphs of the forms G1 and G2.
GI(0, 0, 6) L e m m a 18.3.5
G2(2, 0,4)
1. G~ (p, q, r) is the complement of G2(p, q, r).
2. For every valid n and e, there exist (n, e)-graphs of the form G1 and G2.
~. If G1 (p, q, r) and G1 (pt qt rt) are (n, e)-graphs, they are isomorphic, and similarly for G2.
P r o o f . 1" This is obvious from the definition. 2" By part 1, it is enough to show that G2(p, q, r) exists whenever 0 < e < (2). Let k be the largest integer satisfying (k2) < e. Then k < n. If k - n~ then e -
(2) and we can t a k e q -
n-l,p-r-
0. I f k _< n - l ,
take
qe - ( k 2 ) _> 0, r - k - q > 0 (for otherwise e > ( ~ ) + k - (k+l), contradicting the maximality of k), and p - n - k - 1 > 0. 3: Let G1 (p, q, r) and GI(p', q', r') be (n, e)-graphs. If p - p', then clearly q _ ql and r - r' and we are done. Now assume that p' - p + 5 and 5 > 0. When p is increased by 1, (~) + p ( n - p)increases by n - p 1. Therefore
p,+,n
p 1,+,n
2,+
p
18.3
Maximizing the Sum of Squares of Degrees
491
Hence e - r' >_ (e - r) + (n - p - 1) - e + q, i.e., q + r' _< O, and we conclude that q - r' - 0 as well as 6 - 1. Therefore G1 (p, q, r) - G1 (p, 0, r) - Kp+a | S~_p_a,
G~ (p', q', r') - G~ (p', q', O) - Kp, | Sq, - Kp+, | Sn-p-1. We frequently use the following operation in the proof of Theorem 18.3.7 below (see Figure 18.2). Let G be a graph, a and b two vertices of G of degrees a and/3, respectively, T1 a set of m neighbors of a, all different from b and having the same degree tl, and T2 a set of m non-neighbors of b, all different from a and having the same degree t2. Then G ( a , b, Tx, T2) is obtained from G b y d e l e t i n g all edges from a to T1 and adding all edges from b to T2. A simple calculation shows that
a(G(a, b, T1, T2)) - ~r(G) - 2m(/3 - a + t2
-
tl
-~- m
-t- 1)
(18.1)
Figure 18.2: An operation used in the proof of Theorem 18.3.7.
G
T~
a
T~
T2
b
T2
G(a,b, T1,T2)
F a c t 1 8 . 3 . 6 If e < 3 and n is arbitrary, then both G1 and G2 are or-optimal
(n, e) -graphs. P r o o f . This follows from L e m m a 18.3.1, since if e _< 3, all the threshold (n, e)-graphs have the same ~r. 9 Theorem
1 8 . 3 . 7 For every fixed n and e, at least one of the (n, e)-graphs
G l a n d G2 is a-optimal.
492
Extremal Problems
P r o o f . We prove the result by induction on n. Obviously, the result holds for n - 1. Assume that for every e' <_ ( ~ 1 ) , one of the a-optimal ( n - 1, e')graphs is of the form G1 or G2. We may also assume that some connected (n,e)-graph is a-optimal. (If not, the complement G of every a-optimal (n, e)-graph G is connected and a-optimal by Lemma 18.3.2. If we can show that one of these G is of the form G1 or G2, then by L e m m a 18.3.5 G is also of the form G1 or G2.) By Lemma 18.3.1, a connected a-optimal (n, e)-graph contains a dominating vertex, deleting which we get an ( n - l , e - n + l ) - g r a p h . By the induction hypothesis there exists a a-optimal (n - 1, e - n + 1)-graph H of the form G1 or G2. By Lemma 18.3.3, G - K I | is a a-optimal (n, e)-graph. If H is of the form G1, then G is also of the form G1 and the proof is complete. So we assume that H is of the form G2(p, q, r), and there is no a-optimal (n - 1, e - n + 1)-graph of the form G1. We may also assume that p > O, (18.2) for otherwise G is of the form G2 and we are done. We have q + r >_ 3,
(18.3)
for otherwise H has at most 3 edges and hence by Fact 18.3.6, there is also a a-optimal (n - 1, e - n + 1)-graph of the form G1, contrary to our assumption. The proof is completed by obtaining an (n, e)-graph G' of the form G1 or G2 such that a(G') _> ~r(G). Observe that in G, every vertex of Sp has degree 1, every vertex of Kq has degree q + r + 1, every vertex of Kr has degree q + r, there is a vertex x of degree q + 1 adjacent to every vertex of Kq, and there is a vertex y of degree n - 1. See Figure 18.3. C a s e 1: q >_ 1. We first show that
p<_q+r-1.
(18.4)
Suppose p > q + r - 1. We show that H cannot be or-optimal, a contradiction. Starting with H, let 9 a be the vertex x of degree q, 9 b be a vertex in Kq of degree q + r, 9
9 T2 be a set of q - 1 vertices in S'p (which exist by p > q + r - 1), and
18.3
493
Maximizing t h e S u m of Squares of Degrees
Figure 18.3: The graph G used in the proof of Theorem 18.3.7.
s~
Y
G -
9 H'-
Is
@
G2(p, q, r)
H(a,b,T~,T2).
T h e n c r ( H ' ) - a ( H ) - 0 by (lS.1). Note t h a t H ' has the form ((/s I,.JS;)@ K~) U Sp_q+l, where K ' and S' are cliques and stable sets of the i n d i c a t e d cardinalities, all positive. P u t m - min(q + r - 2 , p - q + 1), and observe t h a t m > 0 by (18.3) and our a s s u m p t i o n . In H', let 9 b be the s a m e v e r t e x b as before, now of degree 2q + r - 1, 9 c be a v e r t e x in K~+r_ 1 of degree q + r - 1, 9 T; be a set of m vertices
*' in I(q+r_ 1 other
9 T~ be a set of m vertices
in Slp_q_t_l of
9 H"-
H'(c,b,T~,T~).
t h a n c, of degree q + r -
degree 0,
1
494
Extremal Problems
Then a( H") - (r( H') = 2 m ( m + 2 - r ) by (18.1). I f m = q + r - 2 , then ( r ( H " ) - a ( H ' ) = 2mq > 0 since we are in Case 1. I f m = p - q + l , then ~r(H")-a(H') = 2m(p+3-q-r) > 0 because p > q + r 1. This p roves (18.4). We now show t h a t r = 0. For otherwise, let m = min(p, r) > 0 by (18.2), and in G let 9 a be the vertex y of degree n - 1, 9 b be the vertex x of degree q + 1, 9 T1 be a set of m vertices from Sp of degree 1, 9 T2 be a set of m vertices from Kr of degree q + r, and
9 G ' - G(a,b, T1,T2). Then ~r(G')-a(G) = 2re(re+q-p) by (18.1). If m = p, then a(G')-cr(G) = 2mq > 0, and if m = r, then a ( G ' ) - a ( G ) = 2m(r + q - p ) > 0 by (18.4), so in both cases we have a contradiction to the a - o p t i m a l i t y of G. This proves t h a t r = 0. Thus H is of the form Kq+l Ig Sp. Now if p = 1, then G is in the form G2, as required. Otherwise p _> 2 by (18.2), and we let 9 a be the vertex y of degree n - 1, 9 b be a vertex of Sp of degree 1, 9 T1 - Sp - {b}, a set of vertices with degree 1, 9 T2 be a set of p - 1 vertices in Kq (which exist by (18.4) and r - 0) of degree q + 1, and
9 G ' - G(a,b, T1,T2). Then c r ( G ' ) - a ( G ) - 0 by (18.1). Thus G' is also a-optimal. Clearly, G' is an (n, e)-graph of the form G ~ ( p - 1, p, q - p + 1). C a s e 2" q - 0. Then H is of the form K~ t2 Sp+l, which is isomorphic to a2(p + 1, 1, 0). By (18.3) and q - 0 we certainly have r - 1 >_ 1, and we are again in Case 1. 9 R e m a r k . For (7, 6)-graphs, G2 is not a-optimal, since a ( G l ) > or(G2) (see Figure 18.1). By considering the complements of these two graphs as well,
18.3
Maximizing the Sum of Squares of Degrees
495
we conclude that neither G1 nor G2 need always be a-optimal. Moreover, the (6, 7)-graph G of Figure 18.4 is not of the form G1 or G2, yet is a-optimal along with G1 and G2, since all these graphs have the same cr value. Figure 18.4: Examples of it-optimal (6, 7)-graphs.
GI(1, 2,2)
G2(1, 1,3)
G
Chapter 19 Other Extensions 19.1
Introduction
In this chapter we discuss three unrelated concepts on threshold graphs. In Section 19.2 we look at a generalization of threshold graphs based on geometrical embeddings of graphs. The threshold graphs can be thought of as the graphs for which there exist a non-negative real weight w~ associated with each vertex u and a positive real threshold t such that u v is an edge if and only if w u w v > t . If we allow the weights and threshold to be any reals, we obtain the generalized threshold graphs characterized by Reiterman et al. in [RRS89]. If the weights are replaced by vectors and the product is replaced by the scalar product, we obtain a further generalization of the threshold dimension. In Section 19.3 we introduce a new class of graphs called C-tolerance intersection graphs, due to Jacobson et al. [JMM91]. Golumbic et al. [GM82, GMT84] defined the tolerance graphs by assigning to each vertex u an interval I~ and a non-negative tolerance t~, such that u v is an edge if and only if IIu n Iv I _> min(t~, t~). These graphs clearly generalize the interval graphs. Monma et al. [MRT88] defined the threshold tolerance graphs by assigning to each vertex u a non-negative weight w~ and a tolerance t~ such that u v is an edge if and only if w~ + w~ > min(t~, t~). Both these classes are special cases of C-tolerance intersection graphs. In Section 19.4 we study the universal graphs for the class T~ of threshold graphs on n vertices. A d-universal graph for a class C of graphs is a graph G such that every graph in d is an induced subgraph of G. Hammer and 497
498
Other Extensions
Kelmans [HK94] completely characterize those T~-universal graphs with the least number of vertices that are themselves threshold graphs.
19.2
Geometric Embeddings of Graphs
Given a simple graph G, a representation of G is a function that assigns to each vertex x of G a vector ~ C R d, such that two vertices x and y are adjacent in G if and only if x and y satisfy some specified geometrical condition. Representations of graphs of this type have been considered by numerous authors. Reiterman et al. [RRS89] consider the representation of a graph G = (V, E) such that for some real threshold t, xyCE
if and only if
~y_t.
The scalar product dimension dp(G) is the minimum number d such that G admits such a representation in R d. The authors show that dp(G) <_ t(G), where t is the threshold dimension. They call graphs for which dp(G) = 1 generalized threshold graphs and characterize them. We report their results here. Recall from Theorem 1.2.4 that G = (V, E) is a threshold graph if and only if there exist a function w : V --, N and a threshold number t C R such that xyCE if and only if w ~ + w v > t , or equivalently, using w' - e ~, t' xy E E
-
e t,
if and only if
w~wy~ ~ >_ t',
wherew t:V--+N +,t ~EN +,andN +={xCN:x>0}. Relaxing f r o m N + to N, we have the following generalization of threshold graphs. D e f i n i t i o n 19.2.1 A graph G = (V, E) is a g e n e r a l i z e d t h r e s h o l d g r a p h when there are a threshold t C N and a label x C N 1 associated with each vertex x, such that for all distinct x, y C V, xy C E
if and only if
x y >_ t.
(19.1)
Thus the threshold graphs are precisely those generalized threshold graphs that can be represented by a positive labeling and a positive threshold. Generalized threshold graphs are not necessarily threshold. For instance, the
19.2
Geometric Embeddings of Graphs
499
graph 2K2 is a generalized threshold graph, as shown in Proposition 19.2.2. However, if in Definition 19.2.1 the labeling and the threshold are nonnegative, then G = (V, E) is in fact a threshold graph, as is easy to see. We can always ensure, by slightly decreasing t if necessary, that the inequality in (19.1) never holds with equality. P r o p o s i t i o n 19.2.2 A graph is a generalized threshold graph if and only if it is the disjoint union of two threshold graphs or the complement of a difference graph. P r o o f . Suppose G - (V, E) is the disjoint union of threshold graphs G1 = (V1, EI) and G2 - ( 89 E2), and let x ~ x C R (x e V), ti > 0 represent G~ for i - 1, 2, where x >_ 0 (x E V). By a simple rescaling we may assume that t 1 t 2 t . Then the labeling x ~ x ~ defined by x'-
~" x, ( -x,
for x E V~ for x C 1/2
together with the threshold t represent G. Suppose the complement G is a difference graph with color classes V1 and V2. By Theorem 2.4.3, if we add to G all the edges joining vertices of V1, it becomes a threshold graph T. Let x H x be a positive labeling and t > 0 a threshold representing T, such that x y =/= t for all distinct x, y. Then G is represented by x ~ x ~ and t ~, where x'-
~ x, [ -x,
for x C V1 for x E
t ! --
--t.
Conversely, let G be a generalized threshold graph represented by x H x and a threshold t such that the inequality in (19.1) never holds with equality. Put
{xc
<0}.
First, assume t > 0. Then there is no edge between V1 and 1/2. The induced subgraph G1 - (VI, El) is a threshold graph as the labeling is non-negative on V1. As for the induced subgraph G2 - (1/2, E2), we use the non-negative labeling x ~ - x and the same threshold t to see that G2 is also a threshold graph. Next, assume t _< 0. Then V1 and 1/2 are cliques and the non-negative labeling x ~ [x[ together with the threshold Itl represent a threshold graph
500
Other Extensions
(V, E") such that for all x C 1/1 and y C 1/2, we have xy E E if and only if xy ~ E". Thus by Theorem 2.4.3 G is the complement of a difference graph.
C o r o l l a r y 19.2.3 The generalized threshold graphs have Dilworth number at most 2. Proof. This follows from Propositions 19.2.2 and 2.4.2. 9 The following theorem gives a characterization of generalized threshold graphs by forbidden induced subgraphs. The proof can be found in [RRS89]. T h e o r e m 19.2.4 ([RRSS9]) A graph is generalized threshold if and only if it does not contain any of the graphs G1,..., G10 of Figure 19.1 as induced subgraphs.
Figure 19.1: The forbidden induced subgraphs for generalized threshold graphs.
": 9 i i i I t ! G1
G2
Ga
G4
G5
G6
G7
G8
G9
GlO
We now consider the dimension of generalized threshold graphs. Recall that the threshold dimension t(G) of a graph G = (1/, E) is the minimum number t of threshold spanning subgraphs G1,..., Gt of G whose union is E; in other words, two vertices form a nonedge in G if and only if they form a nonedge in each of G1,..., Gt. By taking exponents, we can say equivalently
19.2
Geometric Embeddings of Graphs
501
that the threshold dimension t(G) of G is the minimum number t with the property that there are a function f " V ~ IRt with f ( x ) > 0 (x E V) and a vector c > 0 in IRt, such that for distinct x, y C V,
xy~E
if and only if
f(x),J'(y)
where 9 denotes the coordinatewise product and a < b means ai < bi for all i. Again, by a simple rescaling we may require that each component of e is the same number t. We now consider replacing a , y by the usual scalar product x y , admitting also negative values.
Definition 19.2.5 A representation of a graph G - (V, E) in R d is a labeling x ~ x (x C V) with values in ]I~ d together with a threshold t C N, such that for all distinct x, y C V we have
xy C E
if and only if
x y > t.
The s c a l a r product d i m e n s i o n dp(G) of a graph G is the minimum number d such that G admits a representation in N d. The assignment x ~ x, where x is the row of the vertex-edge incidence matrix of G corresponding to x, together with the threshold t - 1, provide the simplest example of a representation of G. This shows that dp(G) is well-defined and gives the trivial upper bound dp(G) _< n, where n is the number of vertices (since the vectors a generate a subspace of dimension _< n over N). A better upper bound for dp(G) is established in the following theorem, which shows that the scalar product representation is more efficient than the threshold one, in the sense that it represents more graphs using small dimensions.
T h e o r e m 19.2.6 Every graph G satisfies dR(G) < t(G). P r o o f . Let G - (V,E), t(G) - s, and E - U~=IEk , where the (V, Ek) are threshold graphs. Let V - Dok U ... U D mkk be the degree partition of (V, Ek), k - 1 , . . . , s, as in Definition 1.2.3. Recall that for every distinct x , y C V with x C D~, y C D~,
xyCEk
if and only if
i+j>_mk+l.
502
Other Extensions
We construct a labeling x ~ x with values in IR~ by p u t t i n g 1
(x)k - M i- ~'~k f o r k - 1 , . . - , s ,
ifxcD/k,
where M > s is arbitrary. If xy C E, then xy C Ek for some k and x C D/k, y E D) for some i , j satisfying i + j _> mk + 1. Hence 1
1
x y > xkyk -- M i - ~ m k M j-~mk - M i+j-mk >_ M.
If xy ~ E for distinct x, y, then for every k - 1 , . . . , s we have xy ~ Ek. Let x E D~, y E D). Then i + j - i n k < 1. Thus xkyk -- M ~+j-mk _< 1, and hence xy-
~-~xkyk < S < M. k=l
This proves t h a t our labeling together with the threshold t - M represent G in N s, and hence dp(G) <_ s. 9 R e m a r k . t(G) can be much larger than dp(G). For instance, dp(C~) - 2 ( T h e o r e m 19.2.8), whereas t(Cn) >_ n/2 for n _> 4. W h e n G is the disjoint union of two or more graphs each of which has at least one edge, then again dp(G) is much smaller than t(G), as can be seen from the proposition below. Proposition
1 9 . 2 . 7 If G is the disjoint union of graphs G I , . . . , Gn, then
dp(G) <_ m a x ( d p ( G 1 ) , . . . , d p ( G ~ ) ) + 1. P r o o f . Let m - m a x ( d p ( G 1 ) , . . . , d p ( G n ) ) - ~ - 1. For each of the graphs G~ - (V~, E~), consider a fixed representation x ~ x (x C V~) in N TM with a threshold ti such that the last coordinate of every ~ is 0. Consider the m x m matrices 1 0 01 0 0 Ai _ 0 0
0 0
cosi~n - s i n 'z n
siniZn cos 'z n
and vectors d i - ( 0 , . . . , O, v / t - ti) E R m, where t > m a x / t i is for the mom e n t unspecified. We show that if t is sufficiently large, then the assignment
19.2
503
Geometric Embeddings of Graphs
x ~ x', where ~ e ' - Ai(x + d i) for x C V/, i - 1 , . . . , n, represents G in IRm with the threshold t. Indeed, if x E !Vi and y C Vj, then
x'y' - A i ( x + d i ) A J ( y + d j) - ( x + d i ) T A iT A J ( y + d j) - ( x + d i ) T A J - i ( y + d j) m-2 (j -i)Tr ~(j = ~ xkyk + Xm-lY~n-1 COS ~ + ~ / t - tjxm-1 sin k=l
-
T/
v/t - t~ sin ~ (jy -m -i)Tr 1
i)Tr ?~
+ ~ / ( t - t i ) ( t - tj)cos (j - i)Tr
n
n
Now if i - j, then x'y' - x y + t - ti, and hence x y > t if and only if x y > ti, which happens for x :fi y if and only if xy is an edge of Gi. If i -r j, then obviously lira x y -- cos (j - i)Tr < 1. t ---*oo
t
r/
Hence x y < t for all x in Gi, y in Gj if t is sufficiently large. This verifies that we have defined a correct representation for G. 9 R e m a r k . In general, the upper bound of Proposition 19.2.7 cannot be improved. For instance, d e ( K 2 ) = de(2K2) = 1, but dp(3K2) > 1. On the other hand, it is not known whether de(V, UE~) <_ ~ de(V, E~). We conclude this section with some examples. Theorem
19.2.8
1. dp(C~) - 2 for every n > 4. 2. d p ( P n ) - 2
>__ 5
3. dp(nK2) - 2 for every n >_ 3. ~. dp(Kn,~) - n for every n >_ 1. P r o o f . 1" Let Xl , . . . , X n be vertices of Cn along the cycle. For i - 1 , . . . , n, the vectors 27ri 27ri) R2 cos~,sin-C n
n
represent Cn in IR2 with the threshold t - cos 2_~. Hence dp(Cn) <_ 2. The reverse inequality follows by Proposition 19.2.2. 2" It follows from Part 1 that dp(P~) _< 2, since P~ is an induced subgraph of Cn+l. The reverse inequality holds for n >_ 5 by Proposition 19.2.2.
504
O t h e r Extensions
3: This follows from Propositions 19.2.7 and 19.2.2. 4: Let the two color classes of Kn,~ be { X l , . . . , X n } and {Yl,...,Yn}. We prove that if Kn,n can be represented in R d, then I(n_l,n_ 1 c a n be represented in R d-~. From this and from the fact that d p ( K 2 , 2 ) = d p ( C 4 ) = 2, it follows that d p ( K n , ~ ) >_ n. Let X l , . . . ,Xn, Y l , . . . ,Yn together with a threshold t represent K~,n in R d.
We have x i x j < t,
fori,j=l,...,n,i-Cj,
yiyj < t
for i , j - 1 , . . . , n .
xiYj >_ t
Set Xn U
-
-- Yn
-
Ilxn -- Y~II
(notice that the denominator is nonzero). Let us consider the projections xi,t Yi! of the vectors xi, yi, i - 1 , . . . , n, onto the hyperplane u x - O. We have x 'i -
xi -- ( u x i ) ~ ,
Yi' -
Yi - ( u y ~ ) u .
We show that these projections represent Kn-l,n-1 (on X l , . . . ,Xn-1 and y l , . . . , y~-l) with the same threshold t. Indeed, for i < n we have Xn UXi
-
IlXn Xn
~Y~ -
!
!
!
!
!
!
XiXj
YiYj
Yn
XnXi
w
--
Yn
--
ynXi
IlXn - y~ll < o, x n y i -- YnYi > O,
IlXn -- Y~II y~ --
and hence for i , j - 1 , . . . , n xiYj
--
-- Ynll xi
IlXn
-- Ynll
1
-
(x~- (,,x,),,)(yj -(uyj)u)
=
x~yj- (ux~)(uyj)>
t,
-
x~xj-
t,
-
y ~ y j - ( u y ~ ) ( ~ y j ) < t.
(~x~)(uxj)<
As the hyperplane u x - 0 is a ( d - 1)-dimensional subspace, the above may be transformed into a representation in R d-1. We have proved d p ( K n , n ) >_ n. The reverse inequality is obtained by checking that the vectors xi
-
( O , . . . , O , n + 1 , 0 , . . . , 0 ) C R ~ (with n + 1 at the i th coordinate),
yi
_
(1,1,...,1) CR n
represent
Kn,n in
R n with t - n + 1.
19.3
19.3
Tolerance Intersection Graphs
505
Tolerance Intersection Graphs
Recall the definitions of interval graphs, comparability graphs and permutation graphs (Definition 1.4.1). Golumbic and Monma [GM82] introduced a generalization of interval graphs using tolerances, whose graphs were called tolerance graphs or interval tolerance graphs in [GM82, GMT84]. For these graphs one can associate with each vertex v an interval Iv on the real line and a positive real number tv, its tolerance, such that two vertices u and v are adjacent if and only if [I~ n I,[ >_ min(t~, t.), where Ill denotes the length of the interval I. Two significant special cases are given by the following two propositions. P r o p o s i t i o n 19.3.1 ( [ G M S 2 ] ) A graph G is an interval tolerance graph with equal tolerances if and only if G is an interval graph. P r o o f . Every interval graph G has an interval model in which the non-empty intersections of intervals have positive lengths. If we take the smallest of these lengths as our tolerance, we obtain an interval tolerance model with equal tolerances for G. Conversely, let G have an interval tolerance model with constant tolerance t. Replace each interval I~ = [a, b] with the interval
i~v _ ( [a + t/2, b - t/2], [ 0,
ifb-a>_t otherwise.
Then I'~ NIIv -~ ~ if and only if tin N / , I _> t, and hence G is an interval graph.
Proposition
19.3.2 ( [ G M 8 2 ] ) A graph G is an interval tolerance graph with tv = [Iv[ for each vertex v if and only if G is a permutation graph.
P r o o f . The condition of the 'only if' part amounts to the fact that vertices u and v are adjacent if and only if Iu C_ Iv or Iv C_ In. In that case, consider a fixed order < on the vertex set of G, and orient every edge uv of G from u t o y when either Iu C Iv, or I~ = I~ and u < v. This gives a t r a n s i t i v e orientation of G. Also, orienting every nonedge uv of G from u to v when m i n l u < minI~ gives a transitive orientation of the complement G. As we observed after Definition 1.4.1, this means that G is a permutation graph.
506
Other Extensions
Conversely, assume that G is a permutation graph, which means that G and G are comparability graphs. By Lemma 16.4.4, every transitive orientation of G is a poset of dimension at most 2. Therefore we can represent each vertex of G by a point (Vl, v2) E (R+) 2 so that vertices u and v are adjacent in G if and only if (Ul,U2) _< (Va,V2) or (Vl,V2) _< (Ul,U2). We can then define the intervals I~ - I-v2, vl] for all vertices v, and obtain the result that vertices u and v are adjacent in G if and only if I~ C_ I~ or Iv C_ I~. 9 Monma et al. [MRT88] call a graph a threshold tolerance graph if there are weights Wv and tolerances tv for each vertex v such that uv is an edge if and only if wu + Wv >_ min(tu, tv). By Condition 8 of Theorem 1.2.4, if all the tolerances are equal, we obtain precisely the threshold graphs. The complements of threshold tolerance graphs are referred to as coTT graphs. Jacobson et al. [JMM91] use the term C-tolerance (S, #)-graphs to refer to a broader family of classes of graphs, extending the interval tolerance graphs and the coTT graphs. These graphs, also called the C-tolerance intersection graphs, provide a unified approach for investigating and characterizing several interesting classes of graphs. To define these graphs, consider the definition of tolerance graphs and replace the intervals {Iv} with a family S - {Sv}vev of subsets of a set Z on which a measure # is defined. Replace 'min' with a positive function r of two real arguments. As before, {tv}~ev is a set of positive real numbers. Now replace the condition for adjacency with uv@E
if and only if
#(SurlSv)>_r
tv),
and we have the definition of C-tolerance (S, #)-graphs. For fixed S, #, r the tolerance intersection graphs are closed under induced subgraphs. Thus a characterization by forbidden induced subgraphs may be possible. Also, the two special subclasses when all the tolerances are equal and when tv = #(S v) can be studied separately. Some of the interesting possibilities for r and S that Jacobson et al. consider are as follows: 1. r b) could be min(a, b), max(a, b) or a + b. The corresponding classes are called rain-tolerance, max-tolerance, or sum-tolerance intersection graphs, respectively. 2. 5' could be a family of intervals on the real-line, finite non-empty sets, or subgraphs, in which case tt would be the length of the intervals, the size of the sets, or the number of vertices in the subgraphs, respectively. In particular, if S is a family of nested sets, i.e. S - { S 1 , . . . , S~} with
19.3
Tolerance Intersection Graphs
$1 C_ . . .
507
C_ Sn, the associated tolerance interval graphs are called
~-tolerance chain graphs. Below we list some of the results of [JMM91]. The proofs are simple. 19.3.3 1. Every graph is a rain-tolerance intersection graph of substars of a star for some constant tolerance.
Theorem
2. A graph is a rain-tolerance intersection graph of substars of a star with tolerances equal to the number of vertices in substars if and only if it is a comparability graph. 3. A graph is a C-tolerance chain graph with constant tolerances if and only if it consists of a clique and isolated vertices. ~,. A graph is a rain-tolerance chain graph with tolerances equal to the set-sizes if and only if it is a complete graph. 5. A graph is a max-tolerance chain graph with tolerances equal to set-sizes if and only if it is a disjoint union of cliques. 6. A graph is a sum-tolerance chain graph with tolerances equal to set-sizes if and only if is an edgeless graph. The following results do not assume that the tolerances are restricted to the special cases where all tolerances are equal or where tv - #(Sv). 19.3.4 ( [ J M M 9 1 ] ) 1. A graph is a rain-tolerance chain graph if and only if it is a threshold graph.
Theorem
2. A graph is a max-tolerance chain graph if and only if it is an interval graph. 3. A graph is a sum-tolerance chain graph if and only if it is a co T T graph. Proof. 1" Let G - (V, E) be a rain-tolerance chain graph with S1 C_ . . . C_ S~ as the family of nested set and t a , . . . , t~ as the corresponding tolerances. Thus we have for u < v,
uvE E
if and only if
] S u ] - [ S u N I v ] >__min(t~,tv).
508
Other Extensions
In particular, if t~ _< IS~ l, then vertex 1 is dominating. If t 1 ) ISll and vertex 1 is not isolated, let u be adjacent to 1. Then tu <_ ISll and hence u is dominating. In any case, G contains an isolated or a dominating vertex. So does every induced subgraph of G by the heredity of being a min-tolerance chain graph. Hence G must be a threshold graph by Condition 3 of Theorem 1.2.4. Conversely, let G be a threshold graph, and consider its degree partition D o , . . . , Dm as in Definition 1.2.3. For each vertex v C Dy, define the set S~ and the tolerance tv by S,-
{1,...,j+l}, {1, , m + 1},
t~- { re+l, 2+m-j,
if j < L~J ifj >
Observe that the Sv are nested sets. i _< j _< [~], then ISuNSvl-i+l
if j < [~J ifj >
Further, for u E Di and v C Dj, if
<m+l-min(tu,
tv),
so u and v are not adjacent. If i _> j > [~J, then
n Xvl-
+ 1 _> min(t~, t~),
so u and v are adjacent. Finally, if/_< [~J < j, then ISunSvl-i+l_>rn-j+2
if and only if
i+j>m.
Since by Condition 6 of Theorem 1.2.4, u and v are adjacent if and only if i + j > m, G is a min-tolerance chain graph with the assigned nested sets and tolerances. 2" Let G be a max-tolerance chain graph on the vertices V l , . . . , v ~ . We may assume without loss of generality that the associated nested sets are { 1 , . . . , r i } for i - 1 , . . . , n , where 1 _< r~ _< ... _< r~. Let the corresponding tolerance of vertex vi be ti. We may also assume that ti _< ri for all i, for if ti > ri, then vi is isolated and we can disregard vi. Consequently, we can associate the interval Ii - [ti, ri] with each vertex vi. Now vertices vi and vj are adjacent if and only if min(ri, rj) >_ m a x ( t i , t j ) . This holds if and only if Ii N Ij 5r 0 , and thus G is an interval graph. Conversely, if G is an interval graph with associated intervals [ti, ri], i - 1 , . . . ,n, we may assume without loss of generality that the ti and ri are positive integers. Then the sets { 1 , . . . ,ri} along with the tolerances ti represent G as a max-tolerance chain graph.
19.4
509
Universal Threshold Graphs
3: Recall that the complements of threshold tolerance graphs (coTT graphs) have the adjacency defined by
ij C E
if and only if
wi + wj < min(ti, tj).
Again we may assume that the ti are positive integers. Hence the coTT graphs are the same as the sum-tolerance chain graphs with nested sets { 1 , . . . , t i } and tolerances wi + 1/2. 9 R e m a r k . There is no known characterization of threshold tolerance graphs by forbidden subgraphs. However, a polynomial-time algorithm for recognizing this class of graphs is given in [MRT88].
19.4
Universal Threshold Graphs
In [HK94], Hammer and Kelmans studied the universal graphs for threshold graphs. Given a class C of graphs, a graph G is called a C-universal graph, or simply a C-UG, if every graph in C is isomorphic to an induced subgraph of G. If in addition G has the least number of vertices among all C-UGs, then G is called a minimum C-UG, or simply a C-MUG. Observe that if d is closed under complements, then G is a C-UG whenever its complement is, and similarly for C-MUGs. Likewise, if C* is the class of all induced subgraphs of the graphs in C, then every C-UG is a C*-UG, and similarly for MUGs. Let T~ denote the class of all threshold graphs on n vertices. We characterize all the :m-MUGs that are themselves threshold (i.e., the threshold T~-MUGs), a result originally proved by Hammer and Kelmans [HK94]. N o t a t i o n . We denote by (G, xy) the graph obtained from a graph G by adding two adjacent new vertices x, y, and joining y to all vertices of G. In other words, (O, xy) = (O U x) @ y. Similarly, we denote by (G,g-~y) the graph obtained by adding two nonadjacent new vertices x, y, and joining y to all vertices of G. In other words, (a,
= (G 9 y) u x.
Note that (G, xy) = (G, yx). Theorem
19.4.1 For every graph G, the following conditions are equivalent:
1. G is a (threshold)2/-~-UG;
510
Other E x t e n s i o n s
2. (G, xy) is a (threshold)~n+I-UG; 3. (G,-~y) is a (threshold)~n+I-UG. P r o o f . By Condition 4 of Theorem 1.2.4, if one of the three graphs is threshold, so are the other two. 1) =~ 2): Assume that G is a ~ - U G . Let T be any threshold graph on n + 1 vertices. If T contains an isolated vertex x, then T - {x} is isomorphic to an induced subgraph of G, and hence T is isomorphic to an induced subgraph of (G, xy). Otherwise T contains a dominating vertex y, and the proof is similar. 2) ~ 1): Assume that (G, xy) is a Tn+I-UG. Let T be any threshold graph on n vertices. The graph T' = T U {a} is isomorphic to an induced subgraph of (G, xy) on some vertex set X. Clearly, X does not contain y, since T' contains an isolated vertex. We may assume without loss of generality that x is the isolated vertex. It follows that T is isomorphic to the subgraph induced by X - {x} in G. The fact that 1) ,z---->, 3) follows from 1) ~ 2) by a simple complementarity argument. 9 Notation. Let a ~ = ( a l , . . . , a t ) b e a 0-1 sequence. Let H = G(a ~) be the graph constructed from G as described below: 1. s e t H : = G ; 2. for i = 1 , . . . , r , do H "-
(H, xiyi), (H, x-~),
if ai = 1, if ai = O.
1. Observe that G(a ~) is isomorphic to G(b ~) if and only if a ~ = b ~, and that, as with threshold graphs, there is a 1-to-1 correspondence between the set of 0-1 sequences a ~ and the set of graphs of the
F a c t 19.4.2
form 2. From Theorem 19.~. 1, it follows that G(a n) is a T~+k- UG if and only if G is a Tk- UG. 3. Since K1 is a threshold ~ - U G , K l ( a ~-a) is a threshold Tn-UG for each 0-1 sequence a n-1. Thus there are at least 2 n - 1 threshold T~-UGs, each with exactly 2 n - 1 vertices.
19.4
Universal Threshold Graphs
511
In fact, the 2 n-1 threshold Tn-UGs K l ( a n - l ) are all the threshold T~-MUGs, as we show below. T h e o r e m 1 9 . 4 . 3 If G is a Tn-MUG, then
1. the vertices of G can be partitioned into a stable set { S l , . . . , s n } and a clique { C l , . . . , Cn-1}. Hence G contains exactly 2n - 1 vertices. 2. If the si are indexed so that deg(sl) <_ . . . _< deg(sn), then deg(sn) n - 1 and k - l <_ deg(sk) <_ k for k - l , . . . , n - 1 . P r o o f . By Part 3 of Fact 19.4.2, G contains at most 2 n - 1 vertices. Now Part 1 follows since both K~ and its complement are induced subgraphs of G. To prove Part 2, first consider the threshold graphs of the form I~ | Kn_~ for r - 1 , . . . , n. The graph G contains t h e m all as induced subgraphs. Now setting r - 1, we obtain deg(s~) - n - 1. Then setting r - 2, we obtain deg(sn_~) _> n - 2. Then setting r - 3, we obtain deg(s~_2) >_ n - 3. Continuing in this way, we obtain deg(sk) >_ k - 1 for k - 1 , . . . , n - 1. Similarly, G contains as induced subgraphs all threshold graphs of the form I~UKn_~ for r - 1 , . . . , n - 1 . Now setting r - 1 we obtain deg(s~) _< 1. Then setting r - 2 we obtain deg(s2) _< 2. Continuing in this way, we obtain deg(sk) <_ k for k - 1 , . . . , n 1. Hence the result. 9 We can now replace 'UG' with ' M U G ' in Theorem 19.4.1, as stated below. Theorem
19.4.4
1. For every graph G, the following conditions are equivalent: (a) G is a (threshold) ~n-MUG; (b) (G, xy) is a (threshold) 7-n+I-MUG; (c) (G,-2--yy) is a (threshold) ~ + I - M U G . 2. G(a n) is a 7-~+k-MUG if and only if G is a Tk-MUG. P r o o f . By T h e o r e m 19.4.3, a ~ - M U G contains exactly 2 k - 1 vertices. Hence the result follows from Theorem 19.4.1 and Part 2 of Fact 19.4.2.
Theorem 19.4.5
the form K1 (a n-l).
The threshold 7-n-MUGs are precisely the
2 n-1
graphs of
512
Other Extensions
P r o o f . If G is a :m-MUG, then it is of the form described in Theorem 19.4.3. If in addition G is threshold, then N ( s l ) C_ . . . C_ N(sn). It follows that if the c~ are indexed so that deg(c~) < . . . _< deg(cn_l), then N(sk) is either { c l , . . . , ck-1} or { C l , . . . , ck}. Hence there are at most 2 ~-1 threshold T~-MUGs. But there are at least 2 n-1 by Part 3 of Fact 19.4.2. .. We close this section with the following three facts. F a c t 1 9 . 4 . 6 It follows from Theorem 19.~.3 that 1(1(0n-l) has the least number of edges and K1 (1 n-1 ) the most number of edges among all 7-~-MUGs. (Here, as usual, 0 n-1 - ( 0 , . . . , 0 ) and I n-1 - ( 1 , . . . , 1).) Thus the extreme values for the number of edges for 7-~-MUGs are achieved by threshold graphs. F a c t 1 9 . 4 . 7 The A graph illustrated in Figure 1~.2 is a non-threshold 7"3MUG, and n - 3 is the smallest value of n for which a non-threshold 7-~MUG exists. By Part 2 of Theorem 19.~.~, we can construct from the A graph non-threshold 7-n-MUGs for every n >_ 3. F a c t 1 9 . 4 . 8 The graph illustrated in Figure 19.2 satisfies the necessary conditions of Theorem 19.~.3, but is not a 7-4-UG, since it has no induced subgraph isomorphic to K1,3. It is the smallest such example in terms of the number of vertices or edges. By Part 2 of Theorem 19.~.~, we can construct from it similar examples for every n >_ 4.
Figure 19.2" A non-'Y4-UG satisfying the conditions of Theorem 19.4.3. 81
82
@
Cl
83
84
Bibliography [ABLFN77] Y. Alavi, M. Behzad, L. M. Lesniak-Foster, and E. A. Nordhaus. Total matchings and total coverings of graphs. Journal of Graph Theory, 1:135-140, 1977. [And76]
G. E. Andrews. The Theory of Partitions. Encyclopedia of Mathematics and Its Applications 2. Addison-Wesley, Reading, MA, 1976.
[AP94]
S. Arikati and U. N. Peled. Degree sequences and majorization. Linear Algebra and Its Applications, 199:179-211, 1994.
[APT79]
B. Aspvall, M. F. Plass, and R. E. Tarjan. A linear-time algorithm for testing the truth of certain quantified boolean formulas. Information Processing Letters, 8:121-123, 1979.
[BBB+90]
F. Boesch, R. Brigham, S. Burr, R. Dutton, and R. Tindell. Maximizing the sum of the squares of the degrees of a graph. Technical report, Stevens Institute of Technology, Hoboken, N J, c. 1990.
[B084]
C. Berge and V. Chvs Topics on Perfect Graphs. Annals of Discrete Mathematics 21. North-Holland, New York, 1984.
[Ber61]
C. Berge. Fgrbung von Graphen, deren s/imtliche bzw. deren ungerade Kreise starr sind. Wiss. Zeitung 114, Martin Luther University, Halle-Wittenberg, 1961.
[Ber76]
C. Berge. Graphs and Hypergraphs. North Holland, Amsterdam, second edition, 1976. 513
514
Bibliography
[BH78]
C. Benzaken and P. L. Hammer. Linear separation of dominating sets in graphs. In B. Bollobas, editor, Advances in Graph Theory, pages 1-10. North-Holland, New York, 1978. Annals of Discrete Mathematics 3.
[BH80]
R. E. Burkard and P. L. Hammer. A note on Hamiltonian split graphs. Journal of Combinatorial Theory B, 28:245-248, 1980.
[BHd85a]
C. Benzaken, P. L. Hammer, and D. de Werra. Split graphs of Dilworth number 2. Discrete Mathematics, 55:123-127, 1985.
[BHdS5b]
C. Benzaken, P. L. Hammer, and D. de Werra. Threshold characterization of graphs with Dilworth number two. Journal of Graph Theory, 9:245-267, 1985.
[BM761
J. A. Bondy and U. S. R. Murty. Graph Theory with Applications. North Holland, New York, 1976.
[Bou71]
A. Bouchet. Etude Combinatoire des Ordonnds Finis Applications. PhD thesis, Universit6 Scientifique et M6dicale de Grenoble, France, 1971. Th6se d'l~tat.
[BP871
J. S. Beissinger and U. N. Peled. Enumeration of labelled threshold graphs and a theorem of Frobenius involving Eulerian polynomials. Graphs and Combinatorics, 3:213-219, 1987.
[Bra91]
A. Brandsts Special graph classes a survey. Schriftenreihe des Fachbereichs Mathematik SM-DU-199, Universits Duisburg Gesamthochschule, Postfach 10 15 03, D-4100 Duisburg 1, Germany, Oct. 1991.
[Cau93]
A. Cauchy. Oevres Completes, Ser. 1, volume 8, pages 42-50. Gauthier-Villars, Paris, 1893.
[CC811
Zh. A. Chernyak and A. A. Chernyak. Sequences of degrees of edges and their realization. Doklady Akademii nauk BSSR, 25(4):594-597, 1981. In Russian.
[cc86]
Zh. A. Chernyak and A. A. Chernyak. About recognizing (c~,/3) classes of polar graphs. Discrete Mathematics, 62:133-138, 1986.
Bibliography
515
[CC90]
A. A. Chernyak and Zh. A. Chernyak. Pseudodomishold graphs. Discrete Mathematics, 84:193-196, 1990.
[CC91]
Zh. A. Chernyak and A. A. Chernyak. Split dimension of graphs. Discrete Mathematics, 89:1-6, 1991.
[CH73]
V. Chvs and P. L. Hammer. Set-packing problems and threshold graphs. CORR 73-21, University of Waterloo, Canada, August 1973.
[CH77]
V. Chvs and P. L. Hammer. Aggregation of inequalities in integer programming. In P. L. Hammer, E. L. Johnson, B. H. Korte, and G. L. Nemhauser, editors, Studies in Integer Programming, pages 145-162. North-Holland, New York, 1977. Annals of Discrete Mathematics 1.
[CH91]
M. B. Cozzens and M. D. Halsey. The relationship between the threshold dimension of split graphs and various dimensional parameters. Discrete Applied Mathematics, 30:125-135, 1991.
[CHMd87]
V. Chvs C. T. Hokng, N. V. R. Mahadev, and D. de Werra. Four classes of perfectly orderable graphs. Journal of Graph Theory, 11:481-495, 1987.
[Chv72]
V. Chvs On Hamilton's ideals. Journal of Combinatorial Theory B, 12:163-168, 1972.
[Chv75]
V. Chvs On certain polytopes associated with graphs. Journal of Combinatorial Theory B, 18:138-154, 1975.
[Chv83]
V. Chvs Linear Programming. W.H. Freeman and Company, New York, 1983.
[CL84]
M. B. Cozzens and R. Leibowitz. Threshold dimension of graphs. SIAM Journal on Algebraic and Discrete Methods, 5:579-595, 1984.
[CL871
M. B. Cozzens and R. Leibowitz. Multidimensional scaling and threshold graphs. Journal of Mathematical Psychology, 31:179191, 1987.
516
Bibliography
[Cog79]
O. Cogis. Une caractfirisation des graphes orient(~s de dimension Ferrers (~gale ~ 2. Rapport de Recherche 19, Universit(~ Pierre et Marie Curie (Paris VI), C.N.R.S., Paris, JUIN 1979. In French.
[Cog80]
O. Cogis. On a digraph dimension. In M. Deza and I. G. Rosenberg, editors, Combinatorics 79, pages 279-281. North-Holland, New York, 1980. Annals of Discrete Mathematics 8.
[Cog82a]
O. Cogis. Ferrers digraphs and threshold graphs. Discrete Mathematics, 38:33-46, 1982.
[Cog82b]
O. Cogis. On the Ferrers dimension of a digraph. Mathematics, 38:47-52, 1982.
[Com74]
L. Comtet. Advanced Combinatorics. Reidel, Boston, 1974.
[cR88]
M. B. Cozzens and F. S. Roberts. On dimensional properties of graphs. Graphs and Combinatorics, 5:99-115, 1988.
[DDF84]
J.-P. Doignon, A. Ducamp, and J.-C. Falmagne. On realizable biorders and the biorder dimension of a relation. Journal of Mathematical Psychology, 28:73-109, 1984.
[DF69]
A. Ducamp and J.-C. Falmagne. Composite measurment. Journal of Mathematical Psychology, 6:359-390, 1969.
[Dil50]
R. P. Dilworth. A decomposition theorem for partially ordered sets. Annals of Mathematics, 51:161-166, 1950.
[DM41]
B. Dushnik and E. Miller. Partially ordered sets. Journal of mathematics, 63:600-610, 1941.
[Doi77]
J.-P. Doignon. Threshold representation of multiple semiorders. SIAM Journal on Algebraic and Discrete Methods, 8:77-84, 1977.
[Edw]
C. S. Edwards. A lower bound for the largest number of triangles with a common edge. Manuscript.
[EG60]
P. ErdSs and T. Gallai. Graphen mit punkten vorgeschriebenen grades. Mat. Lapok, 11:264-274, 1960. in Hungarian.
Discrete
American
Bibliography
517
[EG84]
J. Edmonds and R. Giles. Total dual integrality of linear inequality systems. In W. R. Pulleyblank, editor, Progress in Combinatorial Optimization, pages 117-129. Academic Press, Toronto, 1984.
[EGOZ89]
P. Erd6s, A. Gys E. T. Ordman, and Y. Zalcstein. The size of chordal, interval and threshold subgraphs. Combinatorica, 9:245-253, 1989.
[Eoz87]
P. Erd6s, E. T. Ordman, and Y. Zalcstein. Bounds on threshold dimension and disjoint threshold coverings. SIAM Journal on Algebraic and Discrete Methods, 8:151-154, 1987.
[Erd61]
P. Erd6s. Graph theory and probability II. Canadian Journal of Mathematics, 13:346-352, 1961.
[EZ77]
K. Ecker and S. Zaks. On a graph labelling problem. Bericht 99, Gesellschraft ffir Mathematik und Datenverarbeitung MBH, Bonn, 1977.
[FF621
L. R. Ford and D. R. Fulkerson. Flows in Networks. Princeton University Press, Princeton, N J, 1962.
[FH76]
S. FSldes and P. L. Hammer. On split graphs and some related questions. In Probl~mes Combinatoires et Thdorie Des Graphes, pages 139-140, Orsay, France, 1976. Colloques internationaux C.N.R.S. 260.
[FH77a]
S. FSldes and P. L. Hammer. Split graphs having Dilworth number two. Canadian Journal of Mathematics, 29:666-672, 1977.
[VH77b]
S. FSldes and P. L. Hammer. Split graphs. Congressus Numerantium, 19:311-315, c. 1977.
[FH78a]
S. Fgldes and P. L. Hammer. The Dilworth number of a graph. In B. Alspach, P. Hell, and D. J. Miller, editors, Algorithmic Aspects of Combinatorics, pages 211-219. North-Holland, New York, 1978. Annals of Discrete Mathematics 2.
518
Bibliography
[FH78b]
S. FSldes and P. L. Hammer. On a class of matroid-producing graphs. In A. Hajnal and V. T. Sds, editors, Combinatorics, Keszthely (Hungary), 1976, pages 331-352. North-Holland, Budapest, 1978. Colloquia Mathematica Societatis Jdnos Bolyai 18.
[FHM65]
D. R. Fulkerson, A. J. Hoffman, and M. H. McAndrew. Some properties of graphs with multiple edges. Canadian Journal of Mathematics, 17:166-177, 1965.
[Fis70]
P. C. Fishburn. Intransitive indifference with unequal indifference intervals. Journal of Mathematical Psychology, 7:144-149, 1970.
[Fis85]
P. C. Fishburn. Interval Orders and Interval Graphs. Wiley, New York, 1985.
[Fro10]
G. Frobenius. [lber die bernoullischen und die eulerschen polynome. Sitzungsberichte der Preussische Akademie der Wissenschaflen, pages 809-847, 1910.
[GH641
P. C. Gilmore and A. J. Hoffman. A characterization of comparability graphs and of interval graghs. Canadian Journal of Mathematics, 16:539-548, 1964.
[GJTS]
M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, San Francisco, 1978.
[GJS76]
M. R. Garey, D. S. Johnson, and L. Stockmeyer. Some simplified NP-complete graph problems. Theoretical Computer Science, 1:237-267, 1976.
[GKP891
R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics. Addison-Wesley, Reading, MA, 1989.
[GKS94]
M. C. Golumbic, H. Kaplan, and R. Shamir. Algorithms and complexity of sandwich problems in graphs. In J. van Leeuwan, editor, 19th International Workshop on Graph Theoretic Concepts in Computer Science (WG '93): Lecture Notes in Computer Science 790, pages 57-69, Berlin, 1994. Springer-Verlag. To appear in the Journal of Algorithms.
Bibliography [GLS82]
519 M. GrStschel, L. Lovs and A. Schrijver. Polynomial algorithms for perfect graphs. In A. Bachem, M. GrStschel, and B. Korte, editors, Bonn Workshop on Combinatorial Optimization, pages 439-500. North-Holland, New York, 1982. Annals of
Discrete Mathematics 16. [GM82]
M. C. Golumbic and C. L. Monma. A generalization of interval graphs with tolerances. Congressus Numerantium, 35:321-331, 1982.
[GMT84]
M. C. Golumbic, C. L. Monma, and W. T. Trotter. Tolerance graphs. Discrete Applied Mathematics, 9:157-170, 1984.
[ColTS]
M. C. Golumbic. Trivially perfect graphs. Discrete Mathematics, 24:105-107, 1978.
[ColS0]
M. C. Golumbic. Algorithmic Graph Theory and Pefect Graphs. Academic Press, New York, 1980.
[Goo75]
I. J. Good. The number of orderings of n candidates when ties are permitted. Fibonacci Quarterly, 13:11-18, 1975.
[Gut44]
L. Guttman.
[Hak62]
S. L. Hakimi. On realizability of a set of integers as degrees of the vertices of a linear graph I. SIAM Journal, 10:496-506, 1962.
[Har53]
F. Harary. On the notion of balance of a signed graph. Michigan Mathematics Journal, 2:143-146, 1953.
[Hav55]
V. Havel. A remark on the existence of finite graphs. Casopis Pgst. Mat., 80:477-480, 1955. in Czech.
[Hay851
R. Hayward. Weakly triangualted graphs. Journal of Combinatorial Theory B, 39:200-208, 1985.
[Her90]
A. Hertz. A fast algorithm for coloring Meyniel graphs. Journal of Combinatorial Theory B, 50:231-240, 1990.
A basis for scaling qualitative data. Sociological Review, 9:139-150, 1944.
American
520
Bibliography
[HIP81]
P. L. Hammer, T. Ibaraki, and U. N. Peled. Threshold numbers and threshold completions. In P. Hansen, editor, Studies on Graphs and Discrete Programming, pages 125-145. NorthHolland, New York, 1981. Annals of Discrete Mathematics 11.
[HIS78]
P. L. Hammer, T. Ibaraki, and B. Simeone. Degree sequences of threshold graphs. Congressus Numerantium, 21:329-355, 1978.
[HIS81]
P. L. Hammer, T. Ibaraki, and B. Simeone. Threshold sequences. SIAM Journal on Algebraic and Discrete Methods, 2:39-49, 1981.
[HK94]
P. L. Hammer and A. K. Kelmans. On universal threshold graphs. Combinatorics, Probability and Computing, 3:327-344, 1994.
[HLP521
G. H. Hardy, J. E. Littlewood, and G. Pdlya. Inequalities. Cambridge University Press, Cambridge, second edition, 1952.
[HM85]
P. L. Hammer and N. V. R. Mahadev. Bithreshold graphs. SIAM Journal on Algebraic and Discrete Methods, 6:497-506, 1985.
[HM89]
C. T. Ho~ng and N. V. R. Mahadev. A note on perfect orders. Discrete Mathematics, 74:77-84, 1989.
[HMP89]
P. L. Hammer, N. V. R. Mahadev, and U. N. Peled. Some properties of 2-threshold graphs. Networks, 19:17-23, 1989.
[HogS7]
C. T. HoSing. On a conjecture of Meyniel. Journal of Combinatorial Theory B, 42:302-312, 1987.
[HP871
F. Harary and U. N. Peled. Hamiltonian threshold graphs. Discrete Applied Mathematics, 16:11-15, 1987.
[HPS90]
P. L. Hammer, U. N. Peled, and X. Sun. Difference graphs. Discrete Applied Mathematics, 28:35-44, 1990.
[HS81]
P. L. Hammer and B. Simeone. The splittance of a graph. Combinatorica, 1:275-284, 1981.
Bibliography
521
[HZ771
P. B. Henderson and Y. Zalcstein. A graph-theoretic characterization of the PVchunk class of synchronizing primitives. SIAM Journal of Computing, 6:88-108, 1977.
[IP81]
T. Ibaraki and U. N. Peled. Sufficient conditions for graphs to have threshold number 2. In P. Hansen, editor, Studies on Graphs and Discrete Programming, pages 241-268. NorthHolland, New York, 1981. Annals of Discrete Mathematics 11.
[JMM91]
M. S. Jacobson, F. R. McMorris, and M. Mulder. An introduction to tolerance intersection graphs. In Y. Alavi, G. Chartrand, O. R. Oellermann, and A. J. Schwenk, editors, Proceedings of the Sixth International Conference on the Theory and Applications of Graphs, Western Michigan University, pages 705-724, New York, 1991. Wiley.
[Kar841
N. Karmarkar. A new polynomial-time algorithm for linear programming. Combinatorica, 4"373-395, 1984.
[Kha791
L. G. Khachian. A polynomial algorithm in linear programming. Doklady Akademii nauk SSSR, 244:1093-1096, 1979. English translation: Soviet Mathematics Doklady 20: 191-194.
[Kim73]
R. Kimbel. Extremal problems in dimension theory for partially ordered sets. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, 1973.
[Knu71]
D. E. Knuth. Subspaces, subsets, and partitions. Journal of Combinatorial Theory A, 10:178-180, 1971.
[Knu73]
D. E. Knuth. The Art of Computer Programming, volume 3. Addison Wesley, Reading, MA, 1973.
[Koo86]
G. J. Koop. Cyclic scheduling of offweekends. Operations Research Letters, 4:259-263, 1986.
[Kor73]
M. Koren. Extreme degree sequences of simple graphs. Journal of Combinatorial Theory B, 15:213-224, 1973.
[Lov72]
L. Lovs Normal hypergraphs and the perfect graph conjecture. Discrete Mathematics, 2:253-276, 1972.
522
Bibliography
[Ma93]
T.-H. Ma. On the threshold dimension 2 graphs. Technical report, Institute of Information Science, Academia Sinica, Nankang, Taipei, Republic of China 11529, September 1993.
[Ma94]
T.-H. Ma, 1994. Private communication.
[Mah84]
N. V. R. Mahadev. Stability Numbers in Structured Graphs. PhD thesis, University of Waterloo, Waterloo, Ontario, Canada, 1984.
[Mar94a]
F. Margot, 1994. Private communication.
[Mar94b]
F. Margot. Some complexity results about threshold graphs. Discrete Applied Mathematics, 49:199-308, 1994.
[Mey76]
H. Meyniel. On the perfect graph conjecture. Discrete Mathematics, 16:339-342, 1976.
[MMPS84]
P. Marchioro, A. Morgana, R. Petreschi, and B. Simeone. Degree sequences of matrogenic graphs. Discrete Mathematics, 51:4761, 1984.
[M0791
A. W. Marshall and I. Olkin. Inequalities: Theory of Majorization and Its Applications. Academic Press, New York, 1979.
[Mon78]
B. Monjardet. Axiomatiques et propri6t6s des quasi-orders. Math. Sci. Humaines, 63:51-82, 1978. in French.
IMP88]
N. V. R. Mahadev and U. N. Peled. Strict 2-threshold graphs. Discrete Applied Mathematics, 21:113-131, 1988.
[MP91]
N. V. R. Mahadev and U. N. Peled. On a conjecture of Wang and Williams. Journal of Graph Theory, 15:115-120, 1991.
[MP94]
N. V. R. Mahadev and U. N. Peled. Longest cycles in threshold graphs. Discrete Mathematics, 135:169-176, 1994.
IMPS94]
N. V. R. Mahadev, U. N. Peled, and F. Sun. Equistable graphs. Journal of Graph Theory, 18:281-299, 1994.
[MRT881
C. L. Monma, B. Reed, and W. T. Trotter. Threshold tolerance graphs. Journal of Graph Theory, 12:343-362, 1988.
Bibliography
523
[MS941
T.-H. Ma and J. P. Spinrad. On the 2-chain subgraph cover and related problems. Journal of Algorithms, 17:251-268, 1994.
[MT85]
N. V. R. Mahadev and W. T. Trotter. Manuscript, 1985.
[Mui03]
R. F. Muirhead. Some methods applicable to identities and inequalities of symmetric algebraic functions of n letters. Proceedings of the Edinburgh Mathematical Society, 21:144-157, 1903.
[Mur79]
S. Muroga. Logic Design and Switching Theory. Wiley, New York, 1979.
[Ord851
E. T. Ordman. Threshold coverings and resource allocation. In 16th Southeastern Conference on Combinatorics, Graph Theory and Computing, pages 99-113, 1985.
[Ord86]
E. T. Ordman. Dining philosophers and graph covering problems. Lecture at Carbondale, 1986.
[Ord89]
E. T. Ordman. Minimal threshold separators and memory requirements for synchronization. SIAM Journal on Computing, 18:152-165, 1989.
[Ore62]
O. Ore. Theory of Graphs. Colloquium Publications 38. American Mathematical Society, Providence, RI, 1962.
[0r177]
J. Orlin. The minimal integral separator of a threshold graph. In P. L. Hammer, E. L. Johnson, B. H. Korte, and G. L. Nemhauser, editors, Studies in Integer Programming, pages 415419. North-Holland, New York, 1977. Annals of Discrete Mathematics 1.
[PayS0]
C. Payan. A class of threshold and domishold graphs: Equistable and equidominating graphs. Discrete Mathematics, 29:47-52, 1980.
[Pay83]
C. Payan. Perfectness and Dilworth number. Discrete Mathematics, 44:229-230, 1983.
[Pe1771
U. N. Peled. Matriodal graphs. Discrete Mathematics, 20:263286, 1977.
Domination graphs.
524
Bibliography
[PelS0]
U. N. Peled. Threshold graph enumeration and series-product identities. Congressus Numerantium, 29"735-738, 1980.
[PLE71]
A. Pnueli, A. Lempel, and S. Even. Transitive orientation of graphs and identification of permutation graphs. Canadian Journal of Mathematics, 23:160-175, 1971.
[Po174]
S. Poljak. A note on stable sets and colorings of graphs. Commentationes Mathematicae Universitatis Carolinae, 15:307-309, 1974.
[PS84]
U. N. Peled and B. Simeone. Box-threshold graphs. Journal of Graph Theory, 8:331-345, 1984.
[PS89a]
U. N. Peled and B. Simeone. The threshold measure of a graph. In M. F. Capobianco, M. Guan, D. F. Hsu, and F. Tian, editors,
Graph Theory and Its Applications: East and West. Proceedings of the First China-USA International Graph Theory Conference., pages 441-457, New York, 1989. New York Academy of Sciences. Annals of the New York Academy of Sciences 576. [PS89b]
U. N. Peled and M. K. Srinivasan. The polytope of degree sequences. Linear Algebra and Its Applications, 114/115:349-377, 1989.
[PS94a]
U. N. Peled and F. Sun. Enumeration of difference graphs. Technical report, University of Illinois at Chicago, Chicago, IL, 1994. To appear in Discrete Applied Mathematics.
[PS94b]
R. Peterschi and A. Sterbini. Recognizing strict 2-threshold graphs in o(rn)-time, c. 1994. To appear in Information Pro-
cessing Letters. [Rao81]
S. B. Rao. A survey of the thoery of potentially P-graphic sequences. In Lecture Notes in Mathematics, 885, pages 441458. Springer-Verlag, 1981.
[Rav82]
G. Ravindra. Meyniel graphs are strongly perfect. Journal of Combinatorial Theory B, 33:187-190, 1982.
Bibliography
525
[RE79]
K. T. Rawlinson and R. C. Entringer. Class of graphs with restricted neighborhoods. Journal of Graph Theory, 3:257-262, 1979.
[RG79]
E. Ruch and I. Gutman. The branching extent of graphs. Journal of Combinatorics, Information $J System Sciences, 4:285295, 1979.
[Rigs ]
J. Riguet. Les relations de ferrers. Comptes Rendus de l'Academie des Sciences, Paris, Serie I, Mathematique, 232:17291730, 1951. In French.
[Rio58]
J. Riordan. An Introduction to Combinatorial Analysis. Wiley, New York, 1958.
[Rob69]
F. S. Roberts. Indifference graphs. In F. Harary, editor, Proof Techniques in Graph Theory, pages 139-146. Academic Press, New York, 1969.
[Rob79]
F. S. Roberts. Measurement Theory. Encyclopedia of Mathematics and its Applications 7. Addison-Wesley, Reading, MA, 1979.
[RRS891
J. Reiterman, V. R5dl, and E. Sifiajov~. Geometrical embeddings of graphs. Discrete Mathematics, 74:291-319, 1989.
[RS951
T. Raschle and K. Simon. Recognition of graphs with threshold dimension two. In The 27th Annual A CM Symposium on Theory of Computing, Las Vegas, NE, May 29-June 1, 1995.
[Rys63]
H. J. Ryser. Combinatorial Mathematics. The Carus Mathematical Monographs 14. Mathematical Association of America, Washington, DC, 1963. Distributed by Wiley, New York.
[Sch86]
A. Schrijver. Theory of Linear and Integer Programming. Wiley, New York, 1986.
[Sei74]
D. Seinsche. On a property of the class of n-colorable graphs. Journal of Combinatorial Theory B, 16:191-193, 1974.
526
Bibliography
[SH91]
G. Sierksma and H. Hoogeveen. Seven criteria for integer sequences being graphic. Journal of Graph Theory, 15:223-231, 1991.
[Sta91]
R. P. Stanley. A zonotope associated with graphical degree sequences. In Applied Geometry and Discrete Combinatorics, pages 555-570, 1991. DIMACS Series in Discrete Mathematics 4.
[Ste94]
A. Sterbini. 2-Thresholdness and Its Implications: From the Synchronization with PVchun k to the Ibaraki-Peled Conjecture. PhD thesis, University of Rome "La Sapienza", 1994.
[swT0]
J. Stoer and C. Witzgall. Convexity and Optimization in Finite Dimensions L Springer-Verlag, New York, 1970.
[TCS5a]
R. I. Tyshkevich and A. A. Chernyak. Box-threshold graphs: The structure and the enumeration. In 30 Intern. Wiss. Koll. TH, Vortragsreihe "Graphen Und Netzwerke- Theorie Und A nwendungen", Ilmenau, Germany, 1985.
[TC85b]
R. I. Tyshkevich and A. A. Chernyak. Decomposition of graphs. Cybernetics, 21:231-242, 1985.
[TCC88a]
R. I. Tyshkevich, A. A. Chernyak, and Zh. Chernyak. Graphs and degree sequences. I. Cybernetics, 23:734-745, 1988.
[TCCSSb]
R. I. Tyshkevich, A. A. Chernyak, and Zh. Chernyak. Graphs and degree sequences. II. Cybernetics, 24:137-152, 1988.
[TCC891
R. I. Tyshkevich, A. A. Chernyak, and Zh. Chernyak. Graphs and degree sequences: A survey. III. Cybernetics, 24:539-548, 1989.
[TIAO77]
S. Tsukiyma, M. Ide, H. Ariyoshi, and H. Ozaki. A new algorithm for generating all the maximal independent sets. SIAM Journal on Computing, 6:505-517, 1977.
[TysS0]
R. I. Tyshkevich. Canonical decomposition of a graph. Doklady Akademii nauk BSSR, 24:677-679, 1980. In Russian.
Bibliography
527
[Tys84]
R. I. Tyshkevich. Once more on matrogenic graphs. Discrete Mathematics, 51:91-100, 1984.
[WW91]
C. Wang and A. C. Williams. The threshold weight of a graphs. Journal of Graph Theory, 15:235-249, 1991.
[Yan81]
M. Yannakakis. Computing the minimum fill-in is NP-complete. SIAM Journal on Algebraic and Discrete Methods, 2:77-79, 1981.
[Yan82]
M. Yannakakis. The complexity of the partial order dimension problem. SIAM Journal on Algebraic and Discrete Methods, 3:351-358, 1982.
List o f N o t a t i o n s "~ (graph isomorphism), 3 > (strict domination), 241 L (domination), 241 (vicinal preorder), 3 ~ c (domination with respect to G), 341 ~>t,- (domination in I•), 111 --. (domination equivalence), 241 >~d (dominal preorder), 314 II (incomparable), 1 (strict majorization), 60 (majorization), 60 U (graph union), 4 @ (graph join), 4 @ • (graph composition), 324 (3 (split g r a p h composition), 304 A (symmetric difference), 79 IR+ (positive reals), 2 IR+ (nonnegative reals), 2 {~} (Stirling n u m b e r of the second kind), 474 [3] (Gaussian polynomial), 469 II II (proper sequence distance), 402 #v (storage bits), 103
B(D) (bipartite representation), 35 b(G) (boxicity), 148 C(d) (corrected Ferrers diagram), 62 c(G) (cubicity), 149 ch(B) (difference dimension), 141 x(G) (chromatic number), 4 x(H) (hypergraph chromatic number), 5 C. (cycle on n vertices), 4
D(G) (Dilworth number), l l l , 241 d(Q) (dimension), 446 D(X) (Dilworth n u m b e r of a set), 111
dB(R) (bidimension), 444 dE(D) (Ferrers dimension), 47 dz(P) (interval dimension), 147 D,~ (polytope of degree sequences), 76 do(P) (partial o r d e r dimension), 47 de(G) (scalar product dimension), 501 Dp,q (polytope of bipartite degree sequences), 94 d' (corrected conjugate sequence), 62 ds(G) (split dimension), 163 DS,, (set of degree sequences), 75
(A, B; E ) (bipartite graph), 4 a(G) (stability number), 4 (c~,/~) (polar graphs), 168, 328 ALTCa(H) (alternating cycle of H rel. to G), 21 528
529
List of Notations
19Sp,q (set of bipartite degree se-
No(v) (neighborhood), 3 Nc(x) (neighbors of x in C), 341 Na[v] (closed neighborhood), 3
quences), 94 d* (conjugate sequence), 62 19T,~ (set of threshold sequences), 402
w(G) (clique number), 4
E(W) (induced edges), 3
P(D) (dimensional order), 50
f (Durfee number), 62
G(R) (graph of a relation), 455 G(x -+ .H) (graph substitution), 134 G* (conflict graph), 124 G[W] (induced subgraph), 3 "y(G) (domination number), 242, a~a F+(v) (out-neighborhood), 5 I'-(v) (in-neighborhood), 5 C~(R) (bare graph of a relation), 455
H(R) hypergraph of a relation), 447
H~(R) (bare hypergraph of a relation), 448
I(P) (incomparability graph), 140 idimp(G) (i-dimension), 128 J2k (cocktail party graph), 314 n(G) (clique cover number), 4 Kn (complete graph), 5 Kv, .....p~ (completemultipartitegraph), 5 m (corrected Durfee number), 63 inK2 (perfect matching), 5, 282
NA(B) (neighbors of/3 in A), 341 N(v) (non neighborhood), :3
P,~ (path on n vertices), 4
R(d) (majorization gap), 403 p(G) (vertex cover number), 4 Sn (edgeless graph), 5
t(d) (threshold gap), 404 t(G) (threshold dimension), 98 r(G) (threshold measure), 387 T,~ (n-vertex threshold graphs), 509
U(D) (underlying graph), 35 ndimp(G) (u-dimension), 128
Author Index Cogis, O., 8, 33, 36, 38, 39, 46, 48, 50, 176, 213, 436 Comtet, L., 473-475 Cozzens, M. B., 109, 124, 129, 134136, 455
Alavi, Y., 27-29 Andrews, G. E., 470 Arikati, S., 33, 376, 401,434, 468, 469 Ariyoshi, H., 165 Aspvall, B., 22
de Werra, D., 53, 176-178, 241,245, 246, 250, 252 Dilworth, R. P., 241 Doignon, J.-P., 7, 176, 213, 435, 437, 460 Ducamp, A., 7, 33, 176, 213, 435, 437 Dushnik, B., 46, 47, 140 Dutton, R., 483, 488
Behzad, M., 27-29 Beissinger, J. S., 470 Benzaken, C., 53, 241, 245, 246, 250, 252, 313, 314 Berge, C., 17, 62, 93, 176, 189, 371 Boesch, F., 483, 488 Bondy, J. A., 5 Bouchet, A., 33, 47, 436 Brandstgdt, A., 17 Brigham, R., 483, 488 Burkard, R. E., 116 Burr, S., 483, 488
Ecker, K., 7, 10, 134 Edmonds, J., 90 Edwards, C. S., 486 Entringer, R. C., 258 ErdSs, P., 119, 124, 126-128, 483, 484 Euler, L., 470 Even, S., 18, 140
Cauchy, A., 470 Cayley, A., 473 Chernyak, A. A., 3, 111, 164-166, 168, 169, 258,304, 313,323, 327, 328, 335, 336,339,341 Chernyak, Z. A., 3, 111, 164-166, 168, 169,313, 323,327, 339 Chvs V., 5, 7, 8, 10, 17, 22, 25, 29, 97, 98, 123, 124, 175178, 295, 351,370, 371,386, 464, 465
Falmagne, J.-C., 7, 33, 176, 213, 435, 437 Fishburn, P. C., 36, 37 FSldes, S., 111, 112, 241-243, 245, 252, 272, 296 Ford, L. R., 62, 93 530
Author Index
Frobenius, G., 475 Fulkerson, D. R., 62, 72, 93 Gale, D., 65, 93 Gallai, T., 119 Garey, M. R., 5, 22, 116, 141, 151, 152, 165, 169 Giles, R., 90 Gilmore, P. C., 37, 131,456 Golumbic, M. C., vii, 10, 17-19, 21, 22, 25, 27, 130, 242, 255, 457, 497, 505 Good, I. J., 473 Graham, R. L., 473 Gr5tschel, M., 17, 18 Gutman, I., 13, 75 Guttman, L., 435 Gys163 A., 483, 484 Hakimi, S. L., 71 Halsey, M. D., 129 Hammer, P. L., 7, 8, 10, 21, 22, 25, 29, 33, 52, 53, 71, 83, 97, 98, 111, 112, 116, 117, 123, 124, 175-179, 188, 192, 195, 241-243,245,246,250,252, 272,295, 296,313,314, 351, 376, 401,498, 509 Harary, F., 22, 179 Hardy, G. H., 59, 60 Havel, V., 71 Hayward, R., 255 Henderson, P. B., 7, 10, 15, 101 Hertz, A., 374 Ho~ng, C. T., 176-178, 241, 253, 374 Hoffman, A. J., 37, 72, 131,456 Hoogeveen, H:, 63
531
Ibaraki, T., 21, 22, 71, 83, 176, 192, 195, 213, 376, 401 Ide, M., 165 Jacobson, M. S., 497, 506, 507 Johnson, D. S., 5, 22, 116, 141,151, 152, 165, 169 Kaplan, H., 21 Karmarkar, N., 391 Kelmans, A. K., 498, 509 Khachian, L. G., 391 Kimbel, R., 145 Knuth, D. E., 470, 473, 474 Koop, G. J., 7, 105 Koren, M., 8, 75, 77, 91 Leibowitz, R., 109, 124, 134-136, 455 Lempel, A., 18, 140 Lesniak-Foster, L. M., 27-29 Littlewood, L. E., 59, 60 Lovs L., 17, 18, 253, 370 Ma, T.-H., 176, 213, 223, 224, 229 Mahadev, N. V. R., 22, 176-179, 188,241,242,253,255,351, 356, 375, 376, 380 Marchioro, P., 272, 303 Margot, F., 150, 158, 237, 258 Marshall, A. W., 59, 60, 93, 410 McAndrew, M. H., 72 McMorris, F. R., 497, 506, 507 Meyniel, H., 373 Miller, E., 46, 47, 140 Minty, G., 22, 25 Monjardet, B., 33 Monma, C. L., 497, 505, 506, 509 Morgana, A., 272, 303
532
Muirhead, R. F., 60 Mulder, M., 497, 506, 507 Muroga, S., 9 Murty, U. S. R., 5 Nordhaus, E. A., 27-29 Olkin, I., 59, 60, 93, 410 Ordman, E. T., 7, 15, 99, 101-103, 105, 124, 126, 128, 483,484 Ore, O., 33, 46, 47, 50 Orlin, J., 14 Ozaki, H., 165 Patashnik, O., 473 Payan, C., 90, 241, 253, 313, 314, 320, 351,356 Peled, U. N., 21, 22, 29, 33, 52, 63, 75, 94, 176, 177, 188, 192, 195, 213,258,272,336, 351, 356,375,376,380,386,401, 434, 468-470, 477 Petreschi, R., 188, 272, 303 Plass, M. F., 22 Pnueli, A., 18, 140 Poljak, S., 124 Pdlya, G., 59, 60 Rao, S. B., 3 Raschle, T., 21, 176, 179, 190 Ravin&a, G., 374 Rawlinson, K. T., 258 Reed, B., 497, 506, 509 Reiterman, J., 497, 498, 500 Riguet, J., 33 Riordan, J., 473, 474 Roberts, F. S., 129, 149, 442 R6dl, V., 497, 498, 500 Ruth, E., 13, 75
Author Index
Ryser, H. J., 65, 93, 121 Schrijver, A., 17, 18, 90, 461 Seinsche, D., 359 Shamir, R., 21 Sierksma, G., 63 Simeone, B., 29, 71, 83, 117, 258, 272, 303, 375,376, 386,401 Simon, K., 21, 176, 179, 190 Sifiajovs E., 497, 498, 500 Spinrad, a. P., 176, 213 Srinivasan, M. K., 33, 63, 75, 94 Stanley, R. P., 92 Sterbini, A., 188, 227 Stockmeyer, L., 141 Stoer, a., 5 Sun, F., 33, 351,356, 477 Sun, X., 33, 52 Tarjan, R. E., 22 Tindell, R., 483, 488 Trotter, W. T., 242, 255, 497, 505, 506, 509 Tsukiyma, S. I., 165 Tyshkevich, R. I., 3, 258, 272, 304, 327, 328,334-336, 341,348, 349 Wang, C., 375, 376 Williams, A., 375, 376 Witzgall, C., 5 Yannakakis, M., 8, 53, 139, 154 Zaks, S., 7, 10, 134 Zalcstein, Y., 7, 10, 15, 101, 124, 126, 128, 483, 484
Index 2-connected graph, 4 2-satisfiability, 22 2-summability graph, s e e conflict graph 2-threshold graph, 177, 178 complement is perfectly orderable, 178 is perfectly ordrable, 177 is weakly triangulated, 177 recognition, 191,224 strict, 188 characterization, 186, 188 is comparability graph, 188 recognition, 188
two, 213 big clique, 384 existence, 384 implies graph not heavy, 385 partial converse, 385 biorder, 7, 437 characterization, 447 bipartite graph, 4, 328 bipartitioned graph, 468 Birkhoff-Milgram Theorem, 442 bisimplicial edge, 255 bistar, 382, 383 bithreshold graph, 179 characterization, 185 block, 4 block graph, 362 Bollobgs Criterion, 64, 73 Boolean function, 2 biregular, 179 graphic, 179 regular, 179 threshold, 9 box, 257, 261,262 box-threshold, see BT graph boxicity, 244 is at most Dilworth number, 244 brittle graph, 253 BT graph, 257, 259 characterization, 261 Burnside Lemma, 481
adjacency matrix, 2 adjacent edges, 2 adjacent vertices, 2 aggregation of inequalities, 98 alternating 4-anticircuit, 33 alternating 4-cycle, 9, 10, 12, 72 alternating cycle, 21,190, 446 bare, 447 alternating cycle in S, 191 antichain, 1 arc of a digraph, 5 Axiom of Choice, 437 Berge Criterion, 64, 73 bidimension, 444, 454, 459 characterization, 445, 446 533
534
C4-free graph, 318 caterpillar, 242 center of a star, 5 chain, 1 chain graph, s e e difference graph characteristic vector, 2 chord of a cycle, 130 chordal bipartite graph, 255 chordal graph, s e e triangulated graph chromatic number, 4, 459 hypergraph, 5,454 circle graph, s e e overlap graph circuit, 271 circular-arc graph, 130 representation, 130 claw, 18 clique, 4, 17 k-, 4 clique cover, 18 threshold, 19, 20 clique cover number, 4 clique number, 4 clique partition, 4 cobithreshold graph, 180 cocktail-party graph, 314 cocomparability graph, 18, 112 codomishold graph, 337 cointerval graph, 18, 37 characterization, 37 color classes, 4 color-regular, s e e CR coloring, 4 communications network, 258 comparability and weakly triangulated graph is domination graph, 255
Index
comparability graph, 18, 19, 115, 140, 188, 250, 255 characterization, 189, 456 comparable, 1,140, 241 complement of a graph, 4 complete k-ary tree, 400 complete graph, 4 complete multipartite graph, 5 completely connected, 260 completely disconnected, 261 composition, 304, 324, 329, 480 configuration .T, 272 conflict, 175 conflict graph, 124, 175,180, 186, 191 conflict, edges, 124, 186 conjugate sequence, 61 corrected, 62 connected component, 4 connected graph, 4 consumer-priority flow, 263 core, 300 cotriangulated graph, 18 coTT graph, 506 recognition, 509 couple, 271 CR (color-regular), 260 CR connected, 260 crown, 445 cycle, 4 cyclic scheduling, 7, 105, 106 decomposition at the level (a,/3), 329 BT graph characterization, 344 canonical at the level (a,/3), 330 in the class (a,/3), 330
Index
uniqueness, 333 domishold graphs, 338 graph isomorphism, 334 hierarchy, 333 in the class (c~,~), 329 matrogenic graph, 348 indecomposable, 349 matroidal graph, 348 indecomposable, 349 non-polar uniqueness, 333 split graph isomorphism, 334 threshold graph, 348 unigraph, 348 uniqueness, 330 degree, 3 degree of an edge, 3 degree partition, 9, 11, 15, 24, 25, 55, 79, 84, 508 degree sequence, 3, 8, 13, 64 bipartite, 93 characterization, 93 BT characterization, 264, 307 is forcible, 259 characterization, 92 difference, 93 characterization, 94, 95 recognition, 96 domishold is edge-unigraphic, 339 forcibly P-graphic, 3 forcibly domishold, 340 is unigraphic, 340 matrogenic, 303 is unigraphic, 303 split graph characterization, 310
535 polytope, 76 bipartite, 94, 95 boundary, 355 dimension, 91 edges, 80, 83, 84 facets, 91 linear description, 87 potentially P-graphic, 3 realization, 3, 59 split, 92, 120 characterization, 92 is forcible, 120 strongly unigraphic, 3 threshold, 72, 73 characterization, 92 is strictly unigraphic, 72 unigraphic, 3 dense graph, 484 large interval subgraph, 486,487 large threshold subgraph, 487 diameter, 5 is at most D(G) + 1,242 difference graph, 7, 8, 33, 37, 38, 53-57 characterization, 54, 55 digraph, 5 bipartite representation, 35 underlying graph, 35 Dilworth number, 53,241,242,243 < 2, 53, 112, 250, 500 < 3 is brittle, 253 < 4 is perfect, 253 computing, 242 of a vertex set, 111 Dilworth Theorem, 1,241,250 dimension, 446, 454 biorder, see bidimension boxicity, 148
536
Index
cubicity, 149 difference, 141,147-149 two, 213 Ferrers, 33, 47, 50, 52 is poset dimension, 50 two, 213
characterization, 315 domistable graph, 314, 318 Durfee number, 62 corrected, 63, 120, 404, 469 Dushnik-Miller Theorem, 455
i-, 1 2 8
edge, 2 edge clique cover number, 101,102 edge-degree sequence, 3 edge-unigraph, 3 edge-vertex incidence matrix, 2 edgeless graph, 4 ellipsoid method, 18 embedding, 46 end of an edge, 2 enumeration BT graphs, 344 domishold graphs, 326 HP graphs, 324 labeled difference graphs, 477, 478 labeled threshold graphs, 471, 474 asymptotics, 474 matrogenic graphs, 349 matroidal graphs, 349 threshold graphs, 336, 468,469 unlabeled difference graphs, 480 equidominating graph, 314, 320 equistable graph, 356 A-free is strongly equistable, 360 block graph is strongly equistable, 362 co-Meyniel is strongly equistable, 374 necessary condition, 359 outerplanar is strongly equistable, 367
difference, 213 interval, 147 partial order, 8, 47, 50, 52, 140 as difference dimension, 221 two, 221 split, 163 <_ 2, 164 threshold, 98, 101, 123, 135, 149 complete multipartite, 134 is at most D(G), 243 matrogenic, 302 matroidal, 293, 295 restricted, 136, 138 triangle-free, 123, 124 u-, 1 2 8
difference, 213 dimensional order, 50 directed path, 5 disjoint union, 4 domigraphic inequality, 319 characterization, 319 dominating set, 242, 313 dominating vertex, 3 domination, 111,241 domination graph, 242,254, 255 domination number, 242,313 is at most D(G), 243 domishold and equidominating graph characterization, 320 domishold graph, 314, 318
537
Index
perfect is strongly equistable, 370 pseudothreshold is strongly equistable, 364 split is strongly equistable, 363 substitution, 372 equitable graph, 395 characterization, 395, 397 equitable tree characterization, 399 example, 400 ErdSs-GMlai Criterion, 64, 73, 92, 119, 120 Eulerian polynomial, 473 exclusion graph, 100,101,103, 104 Farkas Lemma, 461,464, 465 Ferrers diagram, 35 corrected, 62, 63, 262, 469 Ferrers digraph, 8, 33, 35-37, 4749 bipartite representation, 38 characterization, 39 forbidden configurations, 34 is interval order, 37 underlying graph, 37 frame, 266 BT characterization, 266, 267 Frobenius Theorem, 476 Fulkerson- Hoffman- McAndrew Criterion, 64 Gale-Ryser Theorem, 65, 93 Gaussian polynomial, 469 generating function exponential, 467 ordinary, 467 graph, 2
graph join, 4 graph property, 3 graph substitution, 134, 372 graph union, 4 graphical sequence, see degree sequence Grfinbaum Criterion, 64, 73 Guttman scale, 109 extended, 110 Hgsselbarth Criterion, 64, 73 Hall's Theorem, 4, 25, 26 Hamiltonian cycle, 5 Hamiltonian graph, 25 Hasse diagram, 1 Hausdorff Maximal Principle, 453 Havel-Hakimi Theorem, 71 head, 5 heavy graph, 3 7 7 characterization, 379 construction, 381 example, 379-383 Helly's Theorem, 464, 465 hereditary property, 3 hereditary pseudodomishold, see HP graph H-free graph, 4 HP graph, 323 characterization, 324 hypergraph, 5 T'-~ 5
Hamilton cycle, 150 edge of, 5 ideal, 140 implication class, 457 in-degree, 5 in-degree partition, 38
538 in-isolated, 5 in-neighborhood, 5 incomparability graph, 140 incomparable, 1, 140, 241 independence system, 271 intersection graph, 98 interval dimension, 454 interval graph, 18, 37, 115, 129, 130, 148, 252, 318 is circular arc, 130 is tolerance graph, 505 unit, 18, 129, 130 interval order, 37, 147, 444 characterization, 37 interval tolerance graph, 505 isolated vertex, 3 isomorphism, 3 labeled graph same, 467 labeling, 3 LCL (Largest Cycle Length), 22, 24, 27 length of a path, 5 light edges, 377 linear extension, 140 corresponds to maximal difference subgraph, 216 linear order, 46, 47, 140, 437 loop of a digraph, 5 loop of a graph, 2 majorization, 8, 60, 61, 65 strict, 60 majorization gap, 403 bound, 421,422 equals threshold gap, 420 formula, 410
Index
matching, 4 perfect, 4 special, 23, 25 largest, 24 matching with loops, 266, 267 matrogenic graph, 259, 272 characterization, 296 Dilworth number, 302 structure, 302 threshold dimension, 302 matroid, 271 matroidal graph, 271 characterization, 272 is triangulated, 295 strict, 284 structure, 284 structure, 288, 291 threshold dimension, 293, 295 maximal element, 1 maximum clique, 18 2-threshold graph, 179 threshold, 19, 20 weighted, 19 maximum stable set, 18 2-threshold graph, 179 threshold, 19, 20 weighted, 19 maximum total matching, 28 Meyniel graph, 373 characterization, 374 substitution, 373, 374 minimal element, 1 minimally imperfect graph, 252 minimum coloring, 18 2-threshold graph, 179 threshold, 19, 20 minimum number of resource units, 102
539
Index
minimum total cover, 27 missed by a matching, 4 MUG, s e e universal graph, minimum Muirhead Lemma, 60, 402 multiple semiorder, 460 characterization, 463 n-cycle, 5 (n, e)-graph, 2 neighborhood, 3 nested sets, 1 net, 276 net-complement, 276 NP-complete r-cyclic scheduling, 161,162 boxicity, 149 clique, 151 cubicity, 149 difference dimension, 145 < 3, 145 Hamiltonicity, 22 split graph, 116 HTrH, 162 interval dimension height 1,148 largest threshold subgraph, 153 longest cycle, 22 MON3PART, 158 NMTS, 152 one-in-three 3-SAT, 152 partial order dimension, 8 < 3, 144 height 1,145 partition into cliques, 165 POLAR, 171 POLAR(~), 169
smallest threshold supergraph, 153 split dimension, 165 bipartite, 166 threshold dimension, 124 split, 150 vertex cover, 165 weighted 2-threshold cover, 156 weighted 2-threshold partition, 156 on/off-weekend, 105 order-dense set, 441 out-degree, 5 out-degree partition, 38 out-dominating, 5 out-neighborhood, 5 outerplanar graph, 366 overlap graph, 129, 130 representation, 129 P completion, 21 P4-free graph characterization, 359 is strongly equistable, 359 pancyclic graph, 27 parallel processing, 7, 99 partial order, 46, 47, 49, 50, 139 height, 145 height 1,147 Kimbel's result, 145 path, 4 Peled-Srinivasan Criterion, 65, 73 pentagon, 5 perfect graph, 17 Perfect Graph Conjecture, 17 Perfect Graph Theorem, 17, 370 perfect matching, 282
i40 ~erfect order, 176 )erfect orientation, 253 ~erfectly orderable, 176, 177, 178, 253 ~ermutation graph, 18 is tolerance graph, 505 ~olar equivalence, 329 ~olar graph, 111,168, 328 hierarchy, 328 recognition, 169 ~olar isomorphism, 328 ~olar partition, 168, 328 ~oset, s e e partial order ?reorder, 1, 46, 49 dominal, 315 vicinal, 10, 12, 14, 55, 241 principal clique, 135 principal stable set, 135 problem r-cyclic scheduling, 151 chromatic number < 3, 141 clique, 151 cyclic scheduling with ratio constraint, 105, 106 HTrH, 151 largest threshold subgraph, 150 MON3PART, 151 NMTS, 152 one-in-three 3-SAT, 151 partial order dimension < 3, 141 partition into cliques, 165 POLAR, 169 POLAR(~), 169 sandwich, 21 split, 21, 22 threshold, 21 smallest threshold supergraph,
Index 151 vertex cover, 165 weighted 2-threshold cover, 151 weighted 2-threshold partition, 151 proper sequence, 62 property i-dimensional, 128 u-dimensional, 128 pseudodomishold graph, 323 pseudothreshold graph, 352 characterization, 354 has half-integer weights, 355 PV-chunk, 100, 104 PV-chunk definable graph, 7, 101 q-Binomial Theorem, 470 realizer, 213 regular graph, 5 relation antisymmetric, 436 asymmetric, 436 bare graph of, 455,459 bare hypergraph of, 448 complete, 436 countable, 436 dual of, 460 equivalence, 436 graph of, 455 hypergraph of, 447 irreflexive, 436 negatively transitive, 436 partial order, 436 quasi order, 436, 454 realizable, 438 characterization, 439,442,444 reflexive, 436
Index
simple order, 436 strict partial order, 436 strict simple order, 436 strict weak order, 436 strongly complete, 436 symmetric, 436 transitive, 436 weak order, 436 relation ~d is preorder, 314 relative product, 437 representation of a graph, 501 resource allocation, 7, 101-104 rigid circuit graph, see triangulated graph Ryser Criterion, 64, 73 saturated by a matching, 4 scalar product dimension, 501 example, 503 is at most t(G), 501 of disjoint union, 502 semiorder, 460 characterization, 462 separator, 9, 14, 100 set-packing problem, 7, 97 a-optimal graph, 488 example, 489, 491 is threshold, 489 signed graph, 179 balanced, 179 simplicial clique, 371 simplicial vertex, 253 sink, 5 source, 5 split graph, 10, 23, 111, 150, 318, 328 characterization, 112, 120
541 chromatic number, 121 clique number, 121 comparability graph characterization, 115 corrected Durfee number, 121 Dilworth number _< 2, 115 Hamiltonian, 116 interval graph characterization, 112 matrogenic graph characterization, 304 recognition, 163 split isomorphism, 333 split partition, 111,150 splittance, 117, 119 computing, 120 square, 5 stability number, 4 stable set, 4, 17 star, 5 Stirling number of the second kind, 474 strictly dense set, 443 strong unigraph, 3 strongly equistable graph, 357 is closed under disjoint union, 357 is closed under join, 358 is equistable, 357 substitution, 372, 373 sufficient condition, 360 strongly perfect graph, 371 subgraph, 3 edge-induced, 3 induced, 3 spanning, 3 supplier-priority flow, 262 support, 2
542
Index
tail, 5 test-and-set, 100, 103, 104 threshold completion, 21 threshold function, 2 threshold gap, 402 equals majorization gap, 420 formula, 406 realizations, 408 threshold graph, 7, 8, 35-37, 130, 318 add/delete edge, 79 characterization, 10 generalized, 498, 500 characterization, 499 forbidden subgraphs, 500 has D ( G ) <_ 2, 500 Hamiltonian, 22, 25-27, 106,163 is interval, 130 is overlap, 130 maximum matching, 32 maximum stable set, 31 Orlin weights, 14, 15, 101,103, 104 perfect matching, 32 recognition, 19, 20 total covering number, 30 total matching number, 30 threshold graph with loops, 266, 267 threshold hypergraph, 7 r-, 1 5 0
threshold measure, 387 bipartite graph is polynomial, 391 rain-max relation, 394 is NP-hard, 390 of disjoint union, 387 of join, 390
threshold number, 98 threshold partition number, 124, 126 threshold signed graph, see TS graph threshold tolerance graph, 5 0 6 threshold weight, 376 T~-MUG construction, 511 non-threshold, 512 threshold characterization, 511
T.-UG construction, 510 tolerance chain graph
r
507
max-
interval, 507 minis threshold, 507 is
sum-
is coTT, 507 tolerance graph, see tolerance intersection graph tolerance intersection graph r 506 max-, 5 0 6 rain-, 5 0 6 sum-, 5 0 6 total cover, 27 total covering number, 27 total dual integrality, 90 total matching, 27 total matching number, 28 total order, 1,437 transfer, 72,260 transitive orientation, 18 transitively orientable graph, see comparability graph
Index
transportation network, 262,263 tree, 5 triangle, 5 triangle-free graph, 123 triangulated graph, 17, 18, 112, 130 trivially perfect graph, 27 TS graph, 53, 245 characterization, 250 is comparability graph, 250 split graph characterization, 252 twins, 135 UG, s e e universal graph unigraph, 3 uniquely orderable graph, 457 characterization, 457 unit interval graph, 149 unit transformation, 60, 61 reverse, 402 universal graph, 509 minimum, 509 unlabeled graph same, 467 vertex, 2 vertex cover, 4 vertex cover number, 4 vicinal preorder, 3 weakly triangulated graph, 176, 177, 254, 255 Well-Order Principle, 437 well-ordered set, 437 widely dense set, 441
543